116 results
Search Results
2. Source coding with conditionally less noisy side information
- Abstract
We consider a lossless multi-terminal source coding problem with one transmitter, two receivers and side information. The achievable rate region of the problem is not well understood. In this paper, we characterise the rate region when the side information at one receiver is conditionally less noisy than the side information at the other, given this other receiver's desired source. The conditionally less noisy definition includes degraded side information and a common message as special cases, and it is motivated by the concept of less noisy broadcast channels. The key contribution of the paper is a new converse theorem employing a telescoping identity and the Csiszár sum identity., QC 20130219
- Published
- 2012
- Full Text
- View/download PDF
3. Source coding with conditionally less noisy side information
- Abstract
We consider a lossless multi-terminal source coding problem with one transmitter, two receivers and side information. The achievable rate region of the problem is not well understood. In this paper, we characterise the rate region when the side information at one receiver is conditionally less noisy than the side information at the other, given this other receiver's desired source. The conditionally less noisy definition includes degraded side information and a common message as special cases, and it is motivated by the concept of less noisy broadcast channels. The key contribution of the paper is a new converse theorem employing a telescoping identity and the Csiszár sum identity., QC 20130219
- Published
- 2012
- Full Text
- View/download PDF
4. Dynamic decode-and-forward relaying with rate-compatible LDPC convolutional codes
- Abstract
Dynamic decode-and-forward (DDF) is an improved decode-and-forward (DF) protocol under which the relay decides based on its received channel-state information (CSI) when to switch from listening mode to transmission mode without knowing the CSI of other links. In this paper we propose to apply rate-compatible LDPC convolutional (RC-LDPCC) codes to the DDF relay channel. The RC-LDPCC codes are constructed by successive graph extensions, and they have been proved analytically to be capacity achieving over the binary erasure channel. In this paper we show that the RC-LDPCC codes fit well with the DDF relaying, and the regularity of degree distributions simplifies the code optimization. Numerical results in terms of bit erasure rate and achievable rate are provided to evaluate the performance of the system. The results show that the RC-LDPCC codes are able to provide high achievable rates for the DDF relay channel., QC 20120831
- Published
- 2012
- Full Text
- View/download PDF
5. Source coding with conditionally less noisy side information
- Abstract
We consider a lossless multi-terminal source coding problem with one transmitter, two receivers and side information. The achievable rate region of the problem is not well understood. In this paper, we characterise the rate region when the side information at one receiver is conditionally less noisy than the side information at the other, given this other receiver's desired source. The conditionally less noisy definition includes degraded side information and a common message as special cases, and it is motivated by the concept of less noisy broadcast channels. The key contribution of the paper is a new converse theorem employing a telescoping identity and the Csiszár sum identity., QC 20130219
- Published
- 2012
- Full Text
- View/download PDF
6. Source coding with conditionally less noisy side information
- Abstract
We consider a lossless multi-terminal source coding problem with one transmitter, two receivers and side information. The achievable rate region of the problem is not well understood. In this paper, we characterise the rate region when the side information at one receiver is conditionally less noisy than the side information at the other, given this other receiver's desired source. The conditionally less noisy definition includes degraded side information and a common message as special cases, and it is motivated by the concept of less noisy broadcast channels. The key contribution of the paper is a new converse theorem employing a telescoping identity and the Csiszár sum identity., QC 20130219
- Published
- 2012
- Full Text
- View/download PDF
7. Source coding with conditionally less noisy side information
- Abstract
We consider a lossless multi-terminal source coding problem with one transmitter, two receivers and side information. The achievable rate region of the problem is not well understood. In this paper, we characterise the rate region when the side information at one receiver is conditionally less noisy than the side information at the other, given this other receiver's desired source. The conditionally less noisy definition includes degraded side information and a common message as special cases, and it is motivated by the concept of less noisy broadcast channels. The key contribution of the paper is a new converse theorem employing a telescoping identity and the Csiszár sum identity., QC 20130219
- Published
- 2012
- Full Text
- View/download PDF
8. Encoder-controller design for control over the binary-input Gaussian channel
- Abstract
In this paper, we consider the problem of the joint optimization of encoder-controller for closed-loop control with state feedback over a binary-input Gaussian channel (BGC). The objective is to minimize the expected linear quadratic cost over a finite horizon. Thisencoder-controller optimization problem is hard in general, mostly because of the curse of dimensionality. The result of this paper is a synthesis technique for a computationally feasible suboptimal controller which exploits both the soft and hard information of thechannel outputs. The proposed controller is efficient in the sense that it embraces measurement quantization, error protection and control over a finite-input infinite-output noisy channel. How to effectively implement this controller is also addressed in the paper. In particular, this is done by using Hadamard techniques. Numerical experiments are carried out to verify the promising gain offered by the combined controller, in comparison to the hard-information-based controller., QC 20120124
- Published
- 2010
- Full Text
- View/download PDF
9. Privacy-Preserving Energy Flow Control in Smart Grids
- Abstract
In this paper, an energy flow control strategy to reduce the smart meter privacy leakage is studied. The considered smart grid is equipped with an energy storage device. The privacy leakage is modeled as optimal Bayesian detections on the behaviors of the consumer made by an authorized adversary. To evaluate the privacy risk, a Bayesian detection-operational privacy leakage metric is proposed. The design of an optimal privacy-preserving energy control strategy can be formulated as a belief state MDP problem. Therefore, standard methods and algorithms can be utilized to obtain or to approximate the optimal control strategy. A simplified problem to design an instantaneous optimal privacy-preserving control strategy is also considered. It is shown that the problem of the instantaneous optimal control strategy design can be formulated as a set of linear programmings., QC 20160401
- Published
- 2016
- Full Text
- View/download PDF
10. Privacy-Preserving Energy Flow Control in Smart Grids
- Abstract
In this paper, an energy flow control strategy to reduce the smart meter privacy leakage is studied. The considered smart grid is equipped with an energy storage device. The privacy leakage is modeled as optimal Bayesian detections on the behaviors of the consumer made by an authorized adversary. To evaluate the privacy risk, a Bayesian detection-operational privacy leakage metric is proposed. The design of an optimal privacy-preserving energy control strategy can be formulated as a belief state MDP problem. Therefore, standard methods and algorithms can be utilized to obtain or to approximate the optimal control strategy. A simplified problem to design an instantaneous optimal privacy-preserving control strategy is also considered. It is shown that the problem of the instantaneous optimal control strategy design can be formulated as a set of linear programmings., QC 20160401
- Published
- 2016
- Full Text
- View/download PDF
11. Privacy-Preserving Energy Flow Control in Smart Grids
- Abstract
In this paper, an energy flow control strategy to reduce the smart meter privacy leakage is studied. The considered smart grid is equipped with an energy storage device. The privacy leakage is modeled as optimal Bayesian detections on the behaviors of the consumer made by an authorized adversary. To evaluate the privacy risk, a Bayesian detection-operational privacy leakage metric is proposed. The design of an optimal privacy-preserving energy control strategy can be formulated as a belief state MDP problem. Therefore, standard methods and algorithms can be utilized to obtain or to approximate the optimal control strategy. A simplified problem to design an instantaneous optimal privacy-preserving control strategy is also considered. It is shown that the problem of the instantaneous optimal control strategy design can be formulated as a set of linear programmings., QC 20160401
- Published
- 2016
- Full Text
- View/download PDF
12. Privacy-Preserving Energy Flow Control in Smart Grids
- Abstract
In this paper, an energy flow control strategy to reduce the smart meter privacy leakage is studied. The considered smart grid is equipped with an energy storage device. The privacy leakage is modeled as optimal Bayesian detections on the behaviors of the consumer made by an authorized adversary. To evaluate the privacy risk, a Bayesian detection-operational privacy leakage metric is proposed. The design of an optimal privacy-preserving energy control strategy can be formulated as a belief state MDP problem. Therefore, standard methods and algorithms can be utilized to obtain or to approximate the optimal control strategy. A simplified problem to design an instantaneous optimal privacy-preserving control strategy is also considered. It is shown that the problem of the instantaneous optimal control strategy design can be formulated as a set of linear programmings., QC 20160401
- Published
- 2016
- Full Text
- View/download PDF
13. Privacy-Preserving Energy Flow Control in Smart Grids
- Abstract
In this paper, an energy flow control strategy to reduce the smart meter privacy leakage is studied. The considered smart grid is equipped with an energy storage device. The privacy leakage is modeled as optimal Bayesian detections on the behaviors of the consumer made by an authorized adversary. To evaluate the privacy risk, a Bayesian detection-operational privacy leakage metric is proposed. The design of an optimal privacy-preserving energy control strategy can be formulated as a belief state MDP problem. Therefore, standard methods and algorithms can be utilized to obtain or to approximate the optimal control strategy. A simplified problem to design an instantaneous optimal privacy-preserving control strategy is also considered. It is shown that the problem of the instantaneous optimal control strategy design can be formulated as a set of linear programmings., QC 20160401
- Published
- 2016
- Full Text
- View/download PDF
14. Privacy on Hypothesis Testing in Smart Grids
- Abstract
In this paper, we study the problem of privacy information leakage in a smart grid. The privacy risk is assumed to be caused by an unauthorized binary hypothesis testing of the consumer's behaviour based on the smart meter readings of energy supplies from the energy provider. Another energy supplies are produced by an alternative energy source. A controller equipped with an energy storage device manages the energy inflows to satisfy the energy demand of the consumer. We study the optimal energy control strategy which minimizes the asymptotic exponential decay rate of the minimum Type II error probability in the unauthorized hypothesis testing to suppress the privacy risk. Our study shows that the cardinality of the energy supplies from the energy provider for the optimal control strategy is no more than two. This result implies a simple objective of the optimal energy control strategy. When additional side information is available for the adversary, the optimal control strategy and privacy risk are compared with the case of leaking smart meter readings to the adversary only., QC 20160121
- Published
- 2015
- Full Text
- View/download PDF
15. Privacy on Hypothesis Testing in Smart Grids
- Abstract
In this paper, we study the problem of privacy information leakage in a smart grid. The privacy risk is assumed to be caused by an unauthorized binary hypothesis testing of the consumer's behaviour based on the smart meter readings of energy supplies from the energy provider. Another energy supplies are produced by an alternative energy source. A controller equipped with an energy storage device manages the energy inflows to satisfy the energy demand of the consumer. We study the optimal energy control strategy which minimizes the asymptotic exponential decay rate of the minimum Type II error probability in the unauthorized hypothesis testing to suppress the privacy risk. Our study shows that the cardinality of the energy supplies from the energy provider for the optimal control strategy is no more than two. This result implies a simple objective of the optimal energy control strategy. When additional side information is available for the adversary, the optimal control strategy and privacy risk are compared with the case of leaking smart meter readings to the adversary only., QC 20160121
- Published
- 2015
- Full Text
- View/download PDF
16. Privacy on Hypothesis Testing in Smart Grids
- Abstract
In this paper, we study the problem of privacy information leakage in a smart grid. The privacy risk is assumed to be caused by an unauthorized binary hypothesis testing of the consumer's behaviour based on the smart meter readings of energy supplies from the energy provider. Another energy supplies are produced by an alternative energy source. A controller equipped with an energy storage device manages the energy inflows to satisfy the energy demand of the consumer. We study the optimal energy control strategy which minimizes the asymptotic exponential decay rate of the minimum Type II error probability in the unauthorized hypothesis testing to suppress the privacy risk. Our study shows that the cardinality of the energy supplies from the energy provider for the optimal control strategy is no more than two. This result implies a simple objective of the optimal energy control strategy. When additional side information is available for the adversary, the optimal control strategy and privacy risk are compared with the case of leaking smart meter readings to the adversary only., QC 20160121
- Published
- 2015
- Full Text
- View/download PDF
17. Privacy on Hypothesis Testing in Smart Grids
- Abstract
In this paper, we study the problem of privacy information leakage in a smart grid. The privacy risk is assumed to be caused by an unauthorized binary hypothesis testing of the consumer's behaviour based on the smart meter readings of energy supplies from the energy provider. Another energy supplies are produced by an alternative energy source. A controller equipped with an energy storage device manages the energy inflows to satisfy the energy demand of the consumer. We study the optimal energy control strategy which minimizes the asymptotic exponential decay rate of the minimum Type II error probability in the unauthorized hypothesis testing to suppress the privacy risk. Our study shows that the cardinality of the energy supplies from the energy provider for the optimal control strategy is no more than two. This result implies a simple objective of the optimal energy control strategy. When additional side information is available for the adversary, the optimal control strategy and privacy risk are compared with the case of leaking smart meter readings to the adversary only., QC 20160121
- Published
- 2015
- Full Text
- View/download PDF
18. Privacy on Hypothesis Testing in Smart Grids
- Abstract
In this paper, we study the problem of privacy information leakage in a smart grid. The privacy risk is assumed to be caused by an unauthorized binary hypothesis testing of the consumer's behaviour based on the smart meter readings of energy supplies from the energy provider. Another energy supplies are produced by an alternative energy source. A controller equipped with an energy storage device manages the energy inflows to satisfy the energy demand of the consumer. We study the optimal energy control strategy which minimizes the asymptotic exponential decay rate of the minimum Type II error probability in the unauthorized hypothesis testing to suppress the privacy risk. Our study shows that the cardinality of the energy supplies from the energy provider for the optimal control strategy is no more than two. This result implies a simple objective of the optimal energy control strategy. When additional side information is available for the adversary, the optimal control strategy and privacy risk are compared with the case of leaking smart meter readings to the adversary only., QC 20160121
- Published
- 2015
- Full Text
- View/download PDF
19. Secure Successive Refinement with Degraded Side Information
- Abstract
In this paper, we investigate the problem of successive refinement with side information (SI) under secrecy constraint. In particular, under classical successive refinement coding scheme, there are degraded SI sequences Y-n and Z(n) at two decoders and E-n at the eavesdropper. Based on the status of two switches, three different cases are investigated. In case 1 and 3, the eavesdropper only observes output of encoder 1 and 2, respectively, while in case 2, the eavesdropper observes outputs of both encoder 1 and 2. The Markov chain X - Y - (Z, E) holds in all cases. The equivocation is measured by the normalized entropy of source sequence conditioned on the observation of eavesdropper. We completely characterize the rate-distortion-equivocation regions for all three cases, and show that layered coding is optimal. Finally, a binary source example is given., QC 20150227
- Published
- 2014
- Full Text
- View/download PDF
20. Test-Bed Implementation of Iterative Interference Alignment and Power Control for Wireless MIMO Interference Networks
- Abstract
This paper presents for the first time the testbed implementation of an iterative interference alignment and power control algorithm for downlink transmission in a multiple-input multiple-output (MIMO) cellular network. The network is composed of three cells where within each cell one base station (BS) communicates with one mobile station (MS). Each terminal is equipped with two antennas. All the BSs transmit at the same time and the same frequency band. Transmitter beamforming vectors and receiver filtering vectors are computed according to the interference alignment concept, and power control is performed to guarantee successful communication of each BS-MS pair at a desired fixed rate. The indoor measurements performed on an universal software radio peripheral (USRP) based test-bed, show that the power can be reduced by at least 4 dB, 90% of the time, while at the same time reducing the bit-error-rate (BER)., QC 20150227
- Published
- 2014
- Full Text
- View/download PDF
21. Multi-Cell Cooperation with Random User Locations under Arbitrary Signaling
- Abstract
Base station cooperation in cellular networks has been recently recognized as a key technology for mitigating interference, providing thus significant improvements in the system performance. In this paper, we consider a simple scenario consisting of two one-dimensional cells, where the base stations have fixed locations, while the user terminals are randomly distributed on a line. Exploiting the replica method from statistical physics, we derive the ergodic sum-rate under arbitrary signaling for both cooperative and non-cooperative scenarios, when the system size grows large. The obtained results are analytically tractable and can be used to optimize the system parameters in a simple manner. The numerical examples show that the analysis provides good approximations for finite-sized systems., QC 20140131
- Published
- 2013
- Full Text
- View/download PDF
22. Capacity Region of a Class of Interfering Relay Channels
- Abstract
This paper studies a new model for cooperative communication, the interfering relay channels. We show that thehash-forward scheme introduced by Kim for the primitive relay channel is capacity achieving for a class of semideterministic interfering relay channels. The obtained capacity result generalizes and unifies earlier capacity results for a class of primitive relay channels and a class of deterministic interference channels., QC 20140225
- Published
- 2013
- Full Text
- View/download PDF
23. High SNR performance of amplify-and-forward relaying in Rayleigh fading wiretap channels
- Abstract
This paper investigates amplify-and-forward (AF) relaying for secrecy in quasi-static Rayleigh fading channels. We consider a four-node network where a helping node intends to enhance secrecy of the transmission between the source and the destination in presence of a passive eavesdropper. In this scenario, the common assumption of full CSI on the eavesdropper's channels is not realistic, and thus, we study the performance of cooperation from an outage perspective. Starting from the secrecy outage probability, we introduce a novel measure, the conditional secrecy outage probability to analyze the performance of AF. In particular, we derive closed-form expressions for AF for these two secrecy measures under a high SNR assumption. Moreover, we use numerical examples to illustrate our results and to characterize the effect of the nodes' geometry. We also show numerically how AF improves the secrecy performance in comparison to direct transmission in terms of outage probability and secure throughput., QC 20131112
- Published
- 2013
- Full Text
- View/download PDF
24. Cooperation for Secure Broadcasting in Cognitive Radio Networks
- Abstract
This paper explores the trade-off between cooperation and secrecy in cognitive radio networks. We consider a scenario consisting of a primary and a secondary system. In the simplest case, each system is represented by a pair of transmitter and receiver. We assume a secrecy constraint on the transmission in the sense that the message of the primary transmitter has to be concealed from the secondary receiver. Both situations where the secondary transmitter is aware and unaware of the primary message are investigated and compared. In the first case, the secondary transmitter helps by allocating power for jamming, which increases the secrecy of the first message. In the latter case, it can also act as a relay for the primary message, thus improving the reliability of the primary transmission. Furthermore, we extend our results to the scenario where the secondary system comprises multiple receivers. For each case we present achievable rate regions. We then provide numerical illustrations for these rate regions. Our main result is that, in spite of the secrecy constraint, cooperation is beneficial in terms of the achievable rates. In particular, the secondary system can achieve a significant rate without decreasing the primary rate below the benchmark rate achievable without the help of the secondary transmitter. Finally, we investigate the influence of the distances between users on the system's performance., QC 20121219
- Published
- 2012
- Full Text
- View/download PDF
25. Analysis of Sparse Representations Using Bi-Orthogonal Dictionaries
- Abstract
The sparse representation problem of recovering an N dimensional sparse vector x from M < N linear observations y = Dx given dictionary D is considered. The standard approach is to let the elements of the dictionary be independent and identically distributed (IID) zero-mean Gaussian and minimize the l1-norm of x under the constraint y = Dx. In this paper, the performance of l1-reconstruction is analyzed, when the dictionary is bi-orthogonal D = [O1 O2], where O1, O 2 are independent and drawn uniformly according to the Haar measure on the group of orthogonal M × M matrices. By an application of the replica method, we obtain the critical conditions under which perfect l 1-recovery is possible with bi-orthogonal dictionaries., QC 20130219
- Published
- 2012
- Full Text
- View/download PDF
26. A new inner bound for the interference relay channel
- Abstract
This paper proposes a new coding scheme for the discrete memoryless interference channel with a dedicated relay. The scheme is built upon rate-splitting encoding, layered noisy network coding, and joint decoding. The result is extended to two Gaussian channels. For the Gaussian channel whose relay is connected to the destinations via orthogonal links we indirectly show that the proposed scheme achieves a bounded gap to the capacity region under certain channel conditions. For the Gaussian channel wherein the relay receives and transmits in the same spectral resource with the transmitters the numerical results show that the proposed scheme achieves higher sum rate than other compress-forward-based schemes. This work, together with our previous work [1], shows that noisy network coding can be extended by the well-known rate-splitting technique of the interference channel to achieve a bounded gap to the capacity region of some multi-unicast networks., QC 20121212
- Published
- 2012
- Full Text
- View/download PDF
27. Ground Plane Feature Detection in Mobile Vision-Aided Inertial Navigation
- Abstract
In this paper, a method for determining ground plane features in a sequence of images captured by a mobile camera is presented. The hardware of the mobile system consists of a monocular camera that is mounted on an inertial measurement unit (IMU). An image processing procedure is proposed, first to extract image features and match them across consecutive image frames, and second to detect the ground plane features using a two-step algorithm. In the first step, the planar homography of the ground plane is constructed using an IMU-camera motion estimation approach. The obtained homography constraints are used to detect the most likely ground features in the sequence of images. To reject the remaining outliers, as the second step, a new plane normal vector computation approach is proposed. To obtain the normal vector of the ground plane, only three pairs of corresponding features are used for a general camera transformation. The normal-based computation approach generalizes the existing methods that are developed for specific camera transformations. Experimental results on real data validate the reliability of the proposed method., QC 20121107
- Published
- 2012
- Full Text
- View/download PDF
28. Layered quantize-forward for the two-way relay channel
- Abstract
This paper proposes two new coding schemes for the discretememoryless two-way relay channel. The main target is to show thebenefits of compress-forward without Wyner-Ziv binning and oflayered relaying in networks wherein a relay is to help multipledestinations, that may have unequal channel quality and/or haveaccess to different side information. Numerical results for aGaussian channel show that the new coding schemes outperformvariants of compress-forward relaying and offer a good trade-offbetween achievable rates and complexity and decoding delay. The ideacan also be applied to other relay networks., QC 20121115
- Published
- 2012
- Full Text
- View/download PDF
29. On the asymptotic sum-rate of the relay-assisted amplify-and-forward cognitive MIMO channel
- Abstract
This paper studies the asymptotic sum-rate of the primary network within the relay-assisted multi-antenna cognitive radio system performing amplify-and-forward relaying. The achievable sum-rates are derived in the large-system limit by means of the replica method. A closed-form expression for the sum-rate of the primary network is obtained for large antenna arrays as a function of parameters obtained by solving a set of fixed-point equations. Numerical simulations confirm the validity of the results even for systems with only a few antennas at each terminal., QC 20121219
- Published
- 2012
- Full Text
- View/download PDF
30. FROGS : A serial reversible greedy search algorithm
- Abstract
For compressed sensing, in the framework of greedy search reconstruction algorithms, we introduce the notion of initial support-set. The initial support-set is an estimate given to a reconstruction algorithm to improve the performance of the reconstruction. Furthermore, we classify existing greedy search algorithms as being serial or parallel. Based on this classification and the goal of robustness to errors in the initial support-sets we develop a new greedy search algorithm called FROGS. We end the paper with careful numerical experiments concluding that FROGS perform well compared to existing algorithms (both in terms of performance and execution time) and that it is robust against errors in the initial support-set., QC 20121108
- Published
- 2012
- Full Text
- View/download PDF
31. Ground Plane Feature Detection in Mobile Vision-Aided Inertial Navigation
- Abstract
In this paper, a method for determining ground plane features in a sequence of images captured by a mobile camera is presented. The hardware of the mobile system consists of a monocular camera that is mounted on an inertial measurement unit (IMU). An image processing procedure is proposed, first to extract image features and match them across consecutive image frames, and second to detect the ground plane features using a two-step algorithm. In the first step, the planar homography of the ground plane is constructed using an IMU-camera motion estimation approach. The obtained homography constraints are used to detect the most likely ground features in the sequence of images. To reject the remaining outliers, as the second step, a new plane normal vector computation approach is proposed. To obtain the normal vector of the ground plane, only three pairs of corresponding features are used for a general camera transformation. The normal-based computation approach generalizes the existing methods that are developed for specific camera transformations. Experimental results on real data validate the reliability of the proposed method., QC 20121107
- Published
- 2012
- Full Text
- View/download PDF
32. Ground Plane Feature Detection in Mobile Vision-Aided Inertial Navigation
- Abstract
In this paper, a method for determining ground plane features in a sequence of images captured by a mobile camera is presented. The hardware of the mobile system consists of a monocular camera that is mounted on an inertial measurement unit (IMU). An image processing procedure is proposed, first to extract image features and match them across consecutive image frames, and second to detect the ground plane features using a two-step algorithm. In the first step, the planar homography of the ground plane is constructed using an IMU-camera motion estimation approach. The obtained homography constraints are used to detect the most likely ground features in the sequence of images. To reject the remaining outliers, as the second step, a new plane normal vector computation approach is proposed. To obtain the normal vector of the ground plane, only three pairs of corresponding features are used for a general camera transformation. The normal-based computation approach generalizes the existing methods that are developed for specific camera transformations. Experimental results on real data validate the reliability of the proposed method., QC 20121107
- Published
- 2012
- Full Text
- View/download PDF
33. FROGS : A serial reversible greedy search algorithm
- Abstract
For compressed sensing, in the framework of greedy search reconstruction algorithms, we introduce the notion of initial support-set. The initial support-set is an estimate given to a reconstruction algorithm to improve the performance of the reconstruction. Furthermore, we classify existing greedy search algorithms as being serial or parallel. Based on this classification and the goal of robustness to errors in the initial support-sets we develop a new greedy search algorithm called FROGS. We end the paper with careful numerical experiments concluding that FROGS perform well compared to existing algorithms (both in terms of performance and execution time) and that it is robust against errors in the initial support-set., QC 20121108
- Published
- 2012
- Full Text
- View/download PDF
34. Ground Plane Feature Detection in Mobile Vision-Aided Inertial Navigation
- Abstract
In this paper, a method for determining ground plane features in a sequence of images captured by a mobile camera is presented. The hardware of the mobile system consists of a monocular camera that is mounted on an inertial measurement unit (IMU). An image processing procedure is proposed, first to extract image features and match them across consecutive image frames, and second to detect the ground plane features using a two-step algorithm. In the first step, the planar homography of the ground plane is constructed using an IMU-camera motion estimation approach. The obtained homography constraints are used to detect the most likely ground features in the sequence of images. To reject the remaining outliers, as the second step, a new plane normal vector computation approach is proposed. To obtain the normal vector of the ground plane, only three pairs of corresponding features are used for a general camera transformation. The normal-based computation approach generalizes the existing methods that are developed for specific camera transformations. Experimental results on real data validate the reliability of the proposed method., QC 20121107
- Published
- 2012
- Full Text
- View/download PDF
35. FROGS : A serial reversible greedy search algorithm
- Abstract
For compressed sensing, in the framework of greedy search reconstruction algorithms, we introduce the notion of initial support-set. The initial support-set is an estimate given to a reconstruction algorithm to improve the performance of the reconstruction. Furthermore, we classify existing greedy search algorithms as being serial or parallel. Based on this classification and the goal of robustness to errors in the initial support-sets we develop a new greedy search algorithm called FROGS. We end the paper with careful numerical experiments concluding that FROGS perform well compared to existing algorithms (both in terms of performance and execution time) and that it is robust against errors in the initial support-set., QC 20121108
- Published
- 2012
- Full Text
- View/download PDF
36. FROGS : A serial reversible greedy search algorithm
- Abstract
For compressed sensing, in the framework of greedy search reconstruction algorithms, we introduce the notion of initial support-set. The initial support-set is an estimate given to a reconstruction algorithm to improve the performance of the reconstruction. Furthermore, we classify existing greedy search algorithms as being serial or parallel. Based on this classification and the goal of robustness to errors in the initial support-sets we develop a new greedy search algorithm called FROGS. We end the paper with careful numerical experiments concluding that FROGS perform well compared to existing algorithms (both in terms of performance and execution time) and that it is robust against errors in the initial support-set., QC 20121108
- Published
- 2012
- Full Text
- View/download PDF
37. FROGS : A serial reversible greedy search algorithm
- Abstract
For compressed sensing, in the framework of greedy search reconstruction algorithms, we introduce the notion of initial support-set. The initial support-set is an estimate given to a reconstruction algorithm to improve the performance of the reconstruction. Furthermore, we classify existing greedy search algorithms as being serial or parallel. Based on this classification and the goal of robustness to errors in the initial support-sets we develop a new greedy search algorithm called FROGS. We end the paper with careful numerical experiments concluding that FROGS perform well compared to existing algorithms (both in terms of performance and execution time) and that it is robust against errors in the initial support-set., QC 20121108
- Published
- 2012
- Full Text
- View/download PDF
38. Ground Plane Feature Detection in Mobile Vision-Aided Inertial Navigation
- Abstract
In this paper, a method for determining ground plane features in a sequence of images captured by a mobile camera is presented. The hardware of the mobile system consists of a monocular camera that is mounted on an inertial measurement unit (IMU). An image processing procedure is proposed, first to extract image features and match them across consecutive image frames, and second to detect the ground plane features using a two-step algorithm. In the first step, the planar homography of the ground plane is constructed using an IMU-camera motion estimation approach. The obtained homography constraints are used to detect the most likely ground features in the sequence of images. To reject the remaining outliers, as the second step, a new plane normal vector computation approach is proposed. To obtain the normal vector of the ground plane, only three pairs of corresponding features are used for a general camera transformation. The normal-based computation approach generalizes the existing methods that are developed for specific camera transformations. Experimental results on real data validate the reliability of the proposed method., QC 20121107
- Published
- 2012
- Full Text
- View/download PDF
39. Outage Performances for Amplify-and-Forward, Decode-and-Forward and Cooperative Jamming Strategies for the Wiretap Channel
- Abstract
In this paper, we investigate the wiretap channel in the presence of a cooperative relay node. We analyze and compare the outage performance of three cooperatives schemes: cooperative jamming (CJ), decode-and-forward (DF), and amplify-and-forward (AF) for the Rayleigh slow fading channel. In particular, we derive a closed-form expression for the outage probability for the DF and CJ strategies, which allows an optimal strategy selection in terms of outage performance. We compare the three cooperative schemes through numerical simulations., QC 20111208
- Published
- 2011
- Full Text
- View/download PDF
40. Outage Performance and Power Allocation for Decode-and-Forward Relaying and Cooperative Jamming for the Wiretap Channel
- Abstract
In this paper, we investigate the wiretap channel in the presence of a cooperative helping node. We derive a closed-form expression for the secrecy outage probability for the decode-and-forward (DF) relaying and cooperative jamming (CJ) strategies for the Rayleigh slow fading channel. We investigate the power allocation at the source and helping node, and compare the secrecy outage performance of the two schemes., QC 20111208
- Published
- 2011
- Full Text
- View/download PDF
41. A joint design of code and training sequence for frequency-selective block fading channels with partial CSI
- Abstract
In this paper, we propose an iterative algorithm to jointly design codes and trainingsequences for frequency-selective block fading channels with partial channel state information (CSI) at the receiver. After showing that the maximum-likelihood (ML) decoding metric over channels with partial CSI can be well approximated by the joint maximum-likelihood (JML) decoding metric for combined channel estimation and data detection, we propose to use the JML criterion to search for good codes and training sequences in an iterative fashion. Simulations show that the code and training sequence found by our method can outperform a typical system using a channel code with a separately designedtraining sequence, in particular when codes of low rates are considered., QC 20120207
- Published
- 2011
- Full Text
- View/download PDF
42. On the use of Compressive Sampling for Wide-band Spectrum Sensing
- Abstract
In a scenario where a cognitive radio unit wishes to transmit, it needs to know over which frequency bands it can operate. It can obtain thisknowledge by estimating the power spectral density from a Nyquist-rate sampled signal. For wide-band signals sampling at the Nyquistrate is a major challenge and may be unfeasible. In this paper we accurately detect spectrum holes in sub-Nyquist frequencies without assuming wide sense stationarity in the compressed sampled signal. A novel extension to further reduce the sub-Nyquist samples is thenpresented by introducing a memory based compressed sensing thatrelies on the spectrum to be slowly varying., © 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. QC 20110707
- Published
- 2010
- Full Text
- View/download PDF
43. On the use of Compressive Sampling for Wide-band Spectrum Sensing
- Abstract
In a scenario where a cognitive radio unit wishes to transmit, it needs to know over which frequency bands it can operate. It can obtain thisknowledge by estimating the power spectral density from a Nyquist-rate sampled signal. For wide-band signals sampling at the Nyquistrate is a major challenge and may be unfeasible. In this paper we accurately detect spectrum holes in sub-Nyquist frequencies without assuming wide sense stationarity in the compressed sampled signal. A novel extension to further reduce the sub-Nyquist samples is thenpresented by introducing a memory based compressed sensing thatrelies on the spectrum to be slowly varying., © 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. QC 20110707
- Published
- 2010
- Full Text
- View/download PDF
44. On the use of Compressive Sampling for Wide-band Spectrum Sensing
- Abstract
In a scenario where a cognitive radio unit wishes to transmit, it needs to know over which frequency bands it can operate. It can obtain thisknowledge by estimating the power spectral density from a Nyquist-rate sampled signal. For wide-band signals sampling at the Nyquistrate is a major challenge and may be unfeasible. In this paper we accurately detect spectrum holes in sub-Nyquist frequencies without assuming wide sense stationarity in the compressed sampled signal. A novel extension to further reduce the sub-Nyquist samples is thenpresented by introducing a memory based compressed sensing thatrelies on the spectrum to be slowly varying., © 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. QC 20110707
- Published
- 2010
- Full Text
- View/download PDF
45. On the use of Compressive Sampling for Wide-band Spectrum Sensing
- Abstract
In a scenario where a cognitive radio unit wishes to transmit, it needs to know over which frequency bands it can operate. It can obtain thisknowledge by estimating the power spectral density from a Nyquist-rate sampled signal. For wide-band signals sampling at the Nyquistrate is a major challenge and may be unfeasible. In this paper we accurately detect spectrum holes in sub-Nyquist frequencies without assuming wide sense stationarity in the compressed sampled signal. A novel extension to further reduce the sub-Nyquist samples is thenpresented by introducing a memory based compressed sensing thatrelies on the spectrum to be slowly varying., © 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. QC 20110707
- Published
- 2010
- Full Text
- View/download PDF
46. On the use of Compressive Sampling for Wide-band Spectrum Sensing
- Abstract
In a scenario where a cognitive radio unit wishes to transmit, it needs to know over which frequency bands it can operate. It can obtain thisknowledge by estimating the power spectral density from a Nyquist-rate sampled signal. For wide-band signals sampling at the Nyquistrate is a major challenge and may be unfeasible. In this paper we accurately detect spectrum holes in sub-Nyquist frequencies without assuming wide sense stationarity in the compressed sampled signal. A novel extension to further reduce the sub-Nyquist samples is thenpresented by introducing a memory based compressed sensing thatrelies on the spectrum to be slowly varying., © 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. QC 20110707
- Published
- 2010
- Full Text
- View/download PDF
47. Optimized rate allocation for state feedback control over noisy channels
- Abstract
Optimal rate allocation in a networked control system with highly limited communication resources is instrumental to achieve satisfactory overall performance. In this paper, we propose a rate allocation technique for state feedback control in linear dynamic systems over a noisy channel. Our method consists of two steps: (i) the overall distortion is expressed as a function of rates at all time instants by means of high-rate quantization theory, and (ii) a constrained optimization problem to minimize the overall distortion is solved. We show that a non-uniform quantization is in general the best strategy for state feedback control over noisy channels. Monte Carlo simulations illustrate the proposed scheme, which is shown to have good performance compared to arbitrarily selected rate allocations., QC 20120215
- Published
- 2009
- Full Text
- View/download PDF
48. Encoder-decoder design for event-triggered feedback control over bandlimited channels
- Abstract
Bandwidth limitations and energy constraints set severe restrictions on the design of control systems that utilize wireless sensor and actuator networks. It is common in these systems that a sensor node needs not be continuously monitored, but communicates to the controller only at certain instances when it detects a disturbance event. In this paper, such a scenario is studied and particular emphasis is on efficient utilization of the shared communication resources. Encoder-decoder design for an event-based control system with the plant affected by pulse disturbances is considered. A new iterative procedure is proposed which can jointly optimize encoder-decoder pairs for a certainty equivalent controller. The goal is to minimize a design criterion, in particular, a linear quadratic cost over a finite horizon. The algorithm leads to a feasible design of time-varying non-uniform encoder-decoder pairs. Numerical results demonstrate significant improvements in performance compared to a system using uniform quantization., © 2006 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.QC 20101221
- Published
- 2006
- Full Text
- View/download PDF
49. Encoder-decoder design for event-triggered feedback control over bandlimited channels
- Abstract
Bandwidth limitations and energy constraints set severe restrictions on the design of control systems that utilize wireless sensor and actuator networks. It is common in these systems that a sensor node needs not be continuously monitored, but communicates to the controller only at certain instances when it detects a disturbance event. In this paper, such a scenario is studied and particular emphasis is on efficient utilization of the shared communication resources. Encoder-decoder design for an event-based control system with the plant affected by pulse disturbances is considered. A new iterative procedure is proposed which can jointly optimize encoder-decoder pairs for a certainty equivalent controller. The goal is to minimize a design criterion, in particular, a linear quadratic cost over a finite horizon. The algorithm leads to a feasible design of time-varying non-uniform encoder-decoder pairs. Numerical results demonstrate significant improvements in performance compared to a system using uniform quantization., © 2006 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.QC 20101221
- Published
- 2006
- Full Text
- View/download PDF
50. Encoder-decoder design for event-triggered feedback control over bandlimited channels
- Abstract
Bandwidth limitations and energy constraints set severe restrictions on the design of control systems that utilize wireless sensor and actuator networks. It is common in these systems that a sensor node needs not be continuously monitored, but communicates to the controller only at certain instances when it detects a disturbance event. In this paper, such a scenario is studied and particular emphasis is on efficient utilization of the shared communication resources. Encoder-decoder design for an event-based control system with the plant affected by pulse disturbances is considered. A new iterative procedure is proposed which can jointly optimize encoder-decoder pairs for a certainty equivalent controller. The goal is to minimize a design criterion, in particular, a linear quadratic cost over a finite horizon. The algorithm leads to a feasible design of time-varying non-uniform encoder-decoder pairs. Numerical results demonstrate significant improvements in performance compared to a system using uniform quantization., © 2006 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.QC 20101221
- Published
- 2006
- Full Text
- View/download PDF
51. Encoder-decoder design for event-triggered feedback control over bandlimited channels
- Abstract
Bandwidth limitations and energy constraints set severe restrictions on the design of control systems that utilize wireless sensor and actuator networks. It is common in these systems that a sensor node needs not be continuously monitored, but communicates to the controller only at certain instances when it detects a disturbance event. In this paper, such a scenario is studied and particular emphasis is on efficient utilization of the shared communication resources. Encoder-decoder design for an event-based control system with the plant affected by pulse disturbances is considered. A new iterative procedure is proposed which can jointly optimize encoder-decoder pairs for a certainty equivalent controller. The goal is to minimize a design criterion, in particular, a linear quadratic cost over a finite horizon. The algorithm leads to a feasible design of time-varying non-uniform encoder-decoder pairs. Numerical results demonstrate significant improvements in performance compared to a system using uniform quantization., © 2006 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.QC 20101221
- Published
- 2006
- Full Text
- View/download PDF
52. Encoder-decoder design for event-triggered feedback control over bandlimited channels
- Abstract
Bandwidth limitations and energy constraints set severe restrictions on the design of control systems that utilize wireless sensor and actuator networks. It is common in these systems that a sensor node needs not be continuously monitored, but communicates to the controller only at certain instances when it detects a disturbance event. In this paper, such a scenario is studied and particular emphasis is on efficient utilization of the shared communication resources. Encoder-decoder design for an event-based control system with the plant affected by pulse disturbances is considered. A new iterative procedure is proposed which can jointly optimize encoder-decoder pairs for a certainty equivalent controller. The goal is to minimize a design criterion, in particular, a linear quadratic cost over a finite horizon. The algorithm leads to a feasible design of time-varying non-uniform encoder-decoder pairs. Numerical results demonstrate significant improvements in performance compared to a system using uniform quantization., © 2006 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.QC 20101221
- Published
- 2006
- Full Text
- View/download PDF
53. Optimal Decoding and Performance analysis of a Noisy Channel Network with Network Coding
- Abstract
We investigate sink decoding approaches and performance analysis for a network with intermediate node encoding (coded network). The network consists of statistically independent noisy channels. The sink bit error probability (BEP) is the performance measure. First, we investigate soft-decision decoding without statistical information on the upstream channels (the channels not directly connected to the sink). Numerical results show that the decoder cannot significantly improve the performance from a hard-decision decoder. We develop union bounds for analysis. The bounds show the asymptotic (regarding SNR: signal-to-noise ratio) performance of the decoder. Using statistical information about the upstream channels, we can find the error patterns of final hop channels (channels directly connected to sinks).With the error patterns, maximum-likelihood (ML) decoding can be performed, and a significant improvement in the BEP is obtained. To evaluate the union bound for the ML decoder, we use an equivalent point procedure. It is reduced to the least-squares problem with a linear constraint in the medium-to-high SNR region. With deterministic knowledge of the errors in the upstream channels, a genie-aided decoder can further improve the performance. We give the union bound for the genie decoder, which is straightforward to evaluate. By analyzing these decoders, we find that knowledge about the upstream channels is essential for good sink decoding., © 2009 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.QC 20111101. Updated from conference paper to article, VR Project
- Published
- 2009
- Full Text
- View/download PDF
54. Optimal Decoding and Performance analysis of a Noisy Channel Network with Network Coding
- Abstract
We investigate sink decoding approaches and performance analysis for a network with intermediate node encoding (coded network). The network consists of statistically independent noisy channels. The sink bit error probability (BEP) is the performance measure. First, we investigate soft-decision decoding without statistical information on the upstream channels (the channels not directly connected to the sink). Numerical results show that the decoder cannot significantly improve the performance from a hard-decision decoder. We develop union bounds for analysis. The bounds show the asymptotic (regarding SNR: signal-to-noise ratio) performance of the decoder. Using statistical information about the upstream channels, we can find the error patterns of final hop channels (channels directly connected to sinks).With the error patterns, maximum-likelihood (ML) decoding can be performed, and a significant improvement in the BEP is obtained. To evaluate the union bound for the ML decoder, we use an equivalent point procedure. It is reduced to the least-squares problem with a linear constraint in the medium-to-high SNR region. With deterministic knowledge of the errors in the upstream channels, a genie-aided decoder can further improve the performance. We give the union bound for the genie decoder, which is straightforward to evaluate. By analyzing these decoders, we find that knowledge about the upstream channels is essential for good sink decoding., © 2009 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.QC 20111101. Updated from conference paper to article, VR Project
- Published
- 2009
- Full Text
- View/download PDF
55. Optimal Decoding and Performance analysis of a Noisy Channel Network with Network Coding
- Abstract
We investigate sink decoding approaches and performance analysis for a network with intermediate node encoding (coded network). The network consists of statistically independent noisy channels. The sink bit error probability (BEP) is the performance measure. First, we investigate soft-decision decoding without statistical information on the upstream channels (the channels not directly connected to the sink). Numerical results show that the decoder cannot significantly improve the performance from a hard-decision decoder. We develop union bounds for analysis. The bounds show the asymptotic (regarding SNR: signal-to-noise ratio) performance of the decoder. Using statistical information about the upstream channels, we can find the error patterns of final hop channels (channels directly connected to sinks).With the error patterns, maximum-likelihood (ML) decoding can be performed, and a significant improvement in the BEP is obtained. To evaluate the union bound for the ML decoder, we use an equivalent point procedure. It is reduced to the least-squares problem with a linear constraint in the medium-to-high SNR region. With deterministic knowledge of the errors in the upstream channels, a genie-aided decoder can further improve the performance. We give the union bound for the genie decoder, which is straightforward to evaluate. By analyzing these decoders, we find that knowledge about the upstream channels is essential for good sink decoding., © 2009 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.QC 20111101. Updated from conference paper to article, VR Project
- Published
- 2009
- Full Text
- View/download PDF
56. Optimal Decoding and Performance analysis of a Noisy Channel Network with Network Coding
- Abstract
We investigate sink decoding approaches and performance analysis for a network with intermediate node encoding (coded network). The network consists of statistically independent noisy channels. The sink bit error probability (BEP) is the performance measure. First, we investigate soft-decision decoding without statistical information on the upstream channels (the channels not directly connected to the sink). Numerical results show that the decoder cannot significantly improve the performance from a hard-decision decoder. We develop union bounds for analysis. The bounds show the asymptotic (regarding SNR: signal-to-noise ratio) performance of the decoder. Using statistical information about the upstream channels, we can find the error patterns of final hop channels (channels directly connected to sinks).With the error patterns, maximum-likelihood (ML) decoding can be performed, and a significant improvement in the BEP is obtained. To evaluate the union bound for the ML decoder, we use an equivalent point procedure. It is reduced to the least-squares problem with a linear constraint in the medium-to-high SNR region. With deterministic knowledge of the errors in the upstream channels, a genie-aided decoder can further improve the performance. We give the union bound for the genie decoder, which is straightforward to evaluate. By analyzing these decoders, we find that knowledge about the upstream channels is essential for good sink decoding., © 2009 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.QC 20111101. Updated from conference paper to article, VR Project
- Published
- 2009
- Full Text
- View/download PDF
57. Optimal Decoding and Performance analysis of a Noisy Channel Network with Network Coding
- Abstract
We investigate sink decoding approaches and performance analysis for a network with intermediate node encoding (coded network). The network consists of statistically independent noisy channels. The sink bit error probability (BEP) is the performance measure. First, we investigate soft-decision decoding without statistical information on the upstream channels (the channels not directly connected to the sink). Numerical results show that the decoder cannot significantly improve the performance from a hard-decision decoder. We develop union bounds for analysis. The bounds show the asymptotic (regarding SNR: signal-to-noise ratio) performance of the decoder. Using statistical information about the upstream channels, we can find the error patterns of final hop channels (channels directly connected to sinks).With the error patterns, maximum-likelihood (ML) decoding can be performed, and a significant improvement in the BEP is obtained. To evaluate the union bound for the ML decoder, we use an equivalent point procedure. It is reduced to the least-squares problem with a linear constraint in the medium-to-high SNR region. With deterministic knowledge of the errors in the upstream channels, a genie-aided decoder can further improve the performance. We give the union bound for the genie decoder, which is straightforward to evaluate. By analyzing these decoders, we find that knowledge about the upstream channels is essential for good sink decoding., © 2009 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.QC 20111101. Updated from conference paper to article, VR Project
- Published
- 2009
- Full Text
- View/download PDF
58. Pilot-assisted opportunistic user scheduling for wireless multi-cell networks
- Abstract
We consider downlink transmission in multi-cell wireless networks where in each cell one base station is serving multiple mobile terminals. There is no a priori channel state information (CSI) available at base stations and mobile terminals. We propose a low-complexity pilot-assisted opportunistic user scheduling (PAOUS) scheme. The proposed scheme operates in four subsequent phases: channel training; feedback transmission; user scheduling; and data transmission. We deploy an orthogonal pilot-assisted channel training scheme for acquiring CST at mobile terminals. Consequently, each mobile terminal obtains a noisy estimation of the corresponding local CST (i.e. channel gains from base stations to the mobile terminal). Then, it makes a local decision based on the estimated channel gains of the interfering links (i.e. the links between base stations in neighboring cells and the mobile terminal) and sends a one-bit feedback signal to the base station of the corresponding cell. Each base station schedules one mobile terminal for communication. We compute the achievable rate region and the achievable degrees of freedom (DoF) of the proposed transmission scheme. Our results show that in a multi-cell network with K base stations and coherence time T, the total DoF K-opt (1 - K-opt/T) is achievable given that the number of mobile terminals in each cell scales proportional to signal-to-noise-ratio. Since limited radio resources are available, only a subset of base stations should be activated, where the optimum number of active base stations is K-opt = min {K, T/2}. This recommends that in large networks (K > T/2), select only a subset of the base stations to be active and perform the PAOUS scheme within the cells associated to these base stations. Our results reveal that, even with single antenna at base stations and no a priori CSI at terminals, a non-trivial DoF gain can be achieved. We also investigate the power allocation between channel training and data transmission, QC 20160923
- Published
- 2015
- Full Text
- View/download PDF
59. Subspace Estimation and Decomposition for Hybrid Analog-Digital Millimetre-Wave MIMO systems
- Abstract
In this work, we address the problem of channel estimation and precoding / combining for the so-called hybrid millimeter wave (mmWave) MIMO architecture. Our proposed channel estimation scheme exploits channel reciprocity in TDD MIMO systems, by using echoing, thereby allowing us to implement Krylov subspace methods in a fully distributed way. The latter results in estimating the right (resp. left) singular subspace of the channel at the transmitter (resp. receiver). Moreover, we also tackle the problem of subspace decomposition whereby the estimated right (resp. left) singular subspaces are approximated by a cascade of analog and digital precoder (resp. combiner), using an iterative method. Finally we compare our scheme with an equivalent fully digital case and conclude that a relatively similar performance can be achieved, however, with a drastically reduced number of RF chains - 4 ~ 8 times less (i.e., massive savings in cost and power consumption)., QC 20151217
- Published
- 2015
- Full Text
- View/download PDF
60. Subspace Estimation and Decomposition for Hybrid Analog-Digital Millimetre-Wave MIMO systems
- Abstract
In this work, we address the problem of channel estimation and precoding / combining for the so-called hybrid millimeter wave (mmWave) MIMO architecture. Our proposed channel estimation scheme exploits channel reciprocity in TDD MIMO systems, by using echoing, thereby allowing us to implement Krylov subspace methods in a fully distributed way. The latter results in estimating the right (resp. left) singular subspace of the channel at the transmitter (resp. receiver). Moreover, we also tackle the problem of subspace decomposition whereby the estimated right (resp. left) singular subspaces are approximated by a cascade of analog and digital precoder (resp. combiner), using an iterative method. Finally we compare our scheme with an equivalent fully digital case and conclude that a relatively similar performance can be achieved, however, with a drastically reduced number of RF chains - 4 ~ 8 times less (i.e., massive savings in cost and power consumption)., QC 20151217
- Published
- 2015
- Full Text
- View/download PDF
61. Subspace Estimation and Decomposition for Hybrid Analog-Digital Millimetre-Wave MIMO systems
- Abstract
In this work, we address the problem of channel estimation and precoding / combining for the so-called hybrid millimeter wave (mmWave) MIMO architecture. Our proposed channel estimation scheme exploits channel reciprocity in TDD MIMO systems, by using echoing, thereby allowing us to implement Krylov subspace methods in a fully distributed way. The latter results in estimating the right (resp. left) singular subspace of the channel at the transmitter (resp. receiver). Moreover, we also tackle the problem of subspace decomposition whereby the estimated right (resp. left) singular subspaces are approximated by a cascade of analog and digital precoder (resp. combiner), using an iterative method. Finally we compare our scheme with an equivalent fully digital case and conclude that a relatively similar performance can be achieved, however, with a drastically reduced number of RF chains - 4 ~ 8 times less (i.e., massive savings in cost and power consumption)., QC 20151217
- Published
- 2015
- Full Text
- View/download PDF
62. Subspace Estimation and Decomposition for Hybrid Analog-Digital Millimetre-Wave MIMO systems
- Abstract
In this work, we address the problem of channel estimation and precoding / combining for the so-called hybrid millimeter wave (mmWave) MIMO architecture. Our proposed channel estimation scheme exploits channel reciprocity in TDD MIMO systems, by using echoing, thereby allowing us to implement Krylov subspace methods in a fully distributed way. The latter results in estimating the right (resp. left) singular subspace of the channel at the transmitter (resp. receiver). Moreover, we also tackle the problem of subspace decomposition whereby the estimated right (resp. left) singular subspaces are approximated by a cascade of analog and digital precoder (resp. combiner), using an iterative method. Finally we compare our scheme with an equivalent fully digital case and conclude that a relatively similar performance can be achieved, however, with a drastically reduced number of RF chains - 4 ~ 8 times less (i.e., massive savings in cost and power consumption)., QC 20151217
- Published
- 2015
- Full Text
- View/download PDF
63. Subspace Estimation and Decomposition for Hybrid Analog-Digital Millimetre-Wave MIMO systems
- Abstract
In this work, we address the problem of channel estimation and precoding / combining for the so-called hybrid millimeter wave (mmWave) MIMO architecture. Our proposed channel estimation scheme exploits channel reciprocity in TDD MIMO systems, by using echoing, thereby allowing us to implement Krylov subspace methods in a fully distributed way. The latter results in estimating the right (resp. left) singular subspace of the channel at the transmitter (resp. receiver). Moreover, we also tackle the problem of subspace decomposition whereby the estimated right (resp. left) singular subspaces are approximated by a cascade of analog and digital precoder (resp. combiner), using an iterative method. Finally we compare our scheme with an equivalent fully digital case and conclude that a relatively similar performance can be achieved, however, with a drastically reduced number of RF chains - 4 ~ 8 times less (i.e., massive savings in cost and power consumption)., QC 20151217
- Published
- 2015
- Full Text
- View/download PDF
64. Cooperation-based Network Coding in Cognitive Radio Networks
- Abstract
We consider a scenario consisting of a primary and asecondary system, each represented by a pair of a transmitter anda receiver. The secondary transmitter assists in the retransmission of the primary message, which prevents the primary performance from being degraded by allowing the secondary system to access the transmission resources. Two network coding schemes applied in retransmission phase are investigated, the stationary network coding (SNC) scheme and the adaptive network coding(ANC) scheme. For each scheme we derive analytical results on packet throughput and infer that the ANC scheme outperforms the SNC scheme. We then provide a numerical performance comparison and a numerical optimization of the secondary packet throughput. Our main result shows cooperation can provide a significant performance improvement through effective network coding., QC 20150410
- Published
- 2014
- Full Text
- View/download PDF
65. The CEO Problem with Secrecy Constraints
- Abstract
A lossy source coding problem with secrecy constraints is considered where a remote information source should be transmitted to a single destination via multiple agents in the presence of an eavesdropper. The agents observe noisy versions of the source and independently encode and transmit their observations to the destination via noiseless rate-limited links. Unbeknownst to the agents, an eavesdropper intercepts one of the links from the agents to the destination to learn as much as possible about the source. The destination should estimate the remote source subject to a mean distortion threshold. This problem can be viewed as the CEO problem with addition of secrecy constraints. We establish inner and outer bounds on the rate-distortion-equivocation region. In addition, we provide the optimal rate-distortion-equivocation region for the quadratic Gaussian case when the eavesdropper has no side information., QC 20150227
- Published
- 2014
- Full Text
- View/download PDF
66. A new design framework for LT codes over noisy channels
- Abstract
Luby transform (LT) codes are a class of rateless codes that automatically adapt their rate to the quality of the communication channel. In the original LT codes, fixed check-node degree distributions are used to combine variable nodes uniformly at random to extend the code graph and produce code bits. Here we propose a different approach: we design a sequence of rate-compatible degree distributions, and develop an algorithm that produces code bits in a manner such that the resulting degree distributions follow the designed sequence. Using this new design framework, we develop low-complexity LT codes suitable for time-varying noisy channels. Performance and complexity of the proposed LT codes are measured in terms of bit error rate and average number of edges per information and coded bit, respectively. Numerical examples illustrate the resulting trade-off between performance and complexity of the designed LT codes., QC 20150227
- Published
- 2014
- Full Text
- View/download PDF
67. Lossy Source Coding with Reconstruction Privacy
- Abstract
We consider the problem of lossy source coding with side information under a privacy constraint that the reconstruction sequence at a decoder should be kept secret to a certain extent from another terminal such as an eavesdropper, a sender, or a helper. We are interested in how the reconstruction privacy constraint at a particular terminal affects the rate-distortion tradeoff. In this work, we allow the decoder to use a random mapping, and give inner and outer bounds to the rate-distortion-equivocation region for different cases. In the case where each reconstruction symbol depends only on the source description and current side information symbol, the complete rate-distortion-equivocation region is provided. A binary example illustrating a new tradeoff due to the new privacy constraint, and a gain from the use of randomized decoder is given., QC 20150227
- Published
- 2014
- Full Text
- View/download PDF
68. Interference Alignment via Controlled Perturbations
- Abstract
In this work, we study the so-called leakage minimization problem, within the context of interference alignment (IA). For that purpose, we propose a novel approach based on controlled perturbations of the leakage function, and show how the latter can be used as a mechanism to control the algorithm's convergence (and thus tradeoff convergence speed for reliability). Although the proposed scheme falls under the broad category of stochastic optimization, we show through simulations that it has a quasi-deterministic convergence that we exploit to improve on the worst case performance of its predecessor, resulting in significantly better sum-rate capacity and average cost function value., QC 20140602, METIS
- Published
- 2013
- Full Text
- View/download PDF
69. On secure source coding with side information at the encoder
- Abstract
We consider a secure source coding problem with side informations at the decoder and the eavesdropper. The encoder has a source that it wishes to describe with limited distortion through a rate-limited link to a legitimate decoder. The message sent is also observed by the eavesdropper. The encoder aims to minimize both the distortion incurred by the legitimate decoder; and the information leakage rate at the eavesdropper. When the encoder has access to the side information (S.I.) at the decoder, we characterize the rate-distortion-information leakage rate (R.D.I.) region under a Markov chain assumption and when S.I. at the encoder does not improve the rate-distortion region as compared to the case when S.I. is absent. We then extend our setting to consider the case where the encoder and decoder obtain coded S.I. through a rate-limited helper, and characterize the R.D.I. region for several special cases under logarithmic loss distortion (log-loss). Finally, we consider the case of list or entropy constraints at the decoder and show that the R.D.I. region coincides with R.D.I. region under log-loss., QC 20140312
- Published
- 2013
- Full Text
- View/download PDF
70. Interference Alignment via Controlled Perturbations
- Abstract
In this work, we study the so-called leakage minimization problem, within the context of interference alignment (IA). For that purpose, we propose a novel approach based on controlled perturbations of the leakage function, and show how the latter can be used as a mechanism to control the algorithm's convergence (and thus tradeoff convergence speed for reliability). Although the proposed scheme falls under the broad category of stochastic optimization, we show through simulations that it has a quasi-deterministic convergence that we exploit to improve on the worst case performance of its predecessor, resulting in significantly better sum-rate capacity and average cost function value., QC 20140602, METIS
- Published
- 2013
- Full Text
- View/download PDF
71. On the Achievable Degrees of Freedom in a Class of Multi-user Half-duplex Relay Networks
- Abstract
We study the achievable sum degrees of freedom(DoF) in a class of wireless single-antenna multi-hop half-duplexrelay networks. The networks contain Ms information sources, Md information destinations, and arbitrary layers of relays, each with 2K (K ≥ max{Ms,Md}) half-duplex relays, in between. A cluster successive relaying transmission scheme is applied to conduct the communication: We divide the relays in each layer into two equal-size clusters and activate them successively to efficiently use the available channel. It is shown that in a time-varying fading environment this scheme asymptotically achieves the sum DoF min{MsK/(Ms+K) , MdK/(Md+K−1)}, which is irrelevant to the number of hops the source messages have to pass through. This result also implies that, when the number of relays in each layeris infinitely large, the available DoF (i.e. the optimally achievable sum DoF) of the considered networks is min{Ms,Md}. Neither distributed signal processing nor multiple layers of half-duplex relay operation negatively affects the system DoF performance., QC 20130903
- Published
- 2013
- Full Text
- View/download PDF
72. On stabilization over a Gaussian interference channel
- Abstract
The problem of feedback stabilization of LTI plants over a Gaussian interference channel is considered. Two plants with arbitrary distributed initial states are monitored by two separate sensors which communicate their measurements to two separate controllers over a Gaussian interference channel under average transmit power constraints. The necessary conditions for mean square-stabilization over a memoryless symmetric Gaussian interference channel are derived. These conditions are shown to be tight for some system parameters. Further it is shown that linear memoryless sensing and control schemes are optimal for stabilization in some special cases., QC 20140128
- Published
- 2013
- Full Text
- View/download PDF
73. Secure key agreement over reciprocal fading channels in the low SNR regime
- Abstract
We study the low SNR scaling of the non-coherent secret-key agreement capacity over a reciprocal, block-fading channel. For the restricted class of strategies, where one of the nodes is constrained to transmit pilot-only symbols, we show that the secret-key capacity scales as SNR ·log T if T ≤ 1/SNR, where T denotes the coherence period, and as SNR·log(1/SNR) otherwise. Our upper bound is inspired by the genie-aided argument of Borade and Zheng (IT-Trans 2010). Our lower bound is based on bursty communication, channel training, and secret message transmission., QC 20140121
- Published
- 2013
- Full Text
- View/download PDF
74. Feedback stabilization over a Gaussian interference relay channel
- Abstract
A transmission scheme for mean square stabilization of two linear systems over a Gaussian interference relay channel is studied. A delay-free linear sensing and control strategy is proposed and an achievable stability region is derived. It shows that the stability region can be significantly enlarged by deploying a relay node in such a multi-user Gaussian channels. Furthermore we observe that the separation structure between estimation and control is inadequate in high interference regime., QC 20140121
- Published
- 2013
- Full Text
- View/download PDF
75. Distributed Bayesian detection for the butterfly network
- Abstract
We consider a distributed detection problem where two nodes, or decision makers, observe a common source and aim to decide on one of several hypotheses. Before making their individual decisions, the nodes are allowed to communicate over rate-constrained links, through a bidirectional relay. We show that if the rate of the common relay-to-node link is greater than or equal to the rate of the individual node-to-relay links, and the individual decisions are not coupled by the cost metric, then network coding at the relay allows the overall problem to decouple into two separate two-node distributed detection problems over serial networks; and the two serial networks can be designed independently. However, if the rate of the relay-to-node link is strictly less than the node-to-relay links, no such decoupling can be assumed in general, and the overall detection network needs to be jointly designed., QC 20131210
- Published
- 2013
- Full Text
- View/download PDF
76. Asymptotic Analysis of Full-Duplex Bidirectional MIMO Link with Transmitter Noise
- Abstract
Bidirectional wireless communication between two multi-antenna terminals that operate in a full-duplex mode is considered. The effects of loopback self-interference and transmit-side noise due to radio front-end imperfections are analyzed in the asymptotic regime where the number of antennas at both terminals grows large. The study compares two transparent mitigation schemes by which conventional spatial multiplexing can operate without being aware of the self-interference issue: spatial-domain null-space projection and time-domain subtractive cancellation. Both schemes eliminate the information-bearing part of the self-interference perfectly, but due to transmitter noise, the subtractive cancellation suffers from residual self-interference. The receive-side null-space projection, on the other hand, suppresses also the transmit-side noise, but at the cost of reduction in the degrees of freedom available for data reception. The results indicate that suppression becomes preferred when the level of transmit-side noise increases and the receiver does not have instantaneous knowledge about the spatial structure of the self-interference. Exhaustive Monte Carlo simulations also show that the asymptotic analytical results are useful for evaluating the performance of practical not-so-large systems., QC 20140217
- Published
- 2013
- Full Text
- View/download PDF
77. Statistical mechanics approach to sparse noise denoising
- Abstract
Reconstruction fidelity of sparse signals contaminated by sparse noise is considered. Statistical mechanics inspired tools are used to show that the l(1)-norm based convex optimization algorithm exhibits a phase transition between the possibility of perfect and imperfect reconstruction. Conditions characterizing this threshold are derived and the mean square error of the estimate is obtained for the case when perfect reconstruction is not possible. Detailed calculations are provided to expose the mathematical tools to a wide audience., QC 20140625
- Published
- 2013
78. Interference Alignment via Controlled Perturbations
- Abstract
In this work, we study the so-called leakage minimization problem, within the context of interference alignment (IA). For that purpose, we propose a novel approach based on controlled perturbations of the leakage function, and show how the latter can be used as a mechanism to control the algorithm's convergence (and thus tradeoff convergence speed for reliability). Although the proposed scheme falls under the broad category of stochastic optimization, we show through simulations that it has a quasi-deterministic convergence that we exploit to improve on the worst case performance of its predecessor, resulting in significantly better sum-rate capacity and average cost function value., QC 20140602, METIS
- Published
- 2013
- Full Text
- View/download PDF
79. Interference Alignment via Controlled Perturbations
- Abstract
In this work, we study the so-called leakage minimization problem, within the context of interference alignment (IA). For that purpose, we propose a novel approach based on controlled perturbations of the leakage function, and show how the latter can be used as a mechanism to control the algorithm's convergence (and thus tradeoff convergence speed for reliability). Although the proposed scheme falls under the broad category of stochastic optimization, we show through simulations that it has a quasi-deterministic convergence that we exploit to improve on the worst case performance of its predecessor, resulting in significantly better sum-rate capacity and average cost function value., QC 20140602, METIS
- Published
- 2013
- Full Text
- View/download PDF
80. Interference Alignment via Controlled Perturbations
- Abstract
In this work, we study the so-called leakage minimization problem, within the context of interference alignment (IA). For that purpose, we propose a novel approach based on controlled perturbations of the leakage function, and show how the latter can be used as a mechanism to control the algorithm's convergence (and thus tradeoff convergence speed for reliability). Although the proposed scheme falls under the broad category of stochastic optimization, we show through simulations that it has a quasi-deterministic convergence that we exploit to improve on the worst case performance of its predecessor, resulting in significantly better sum-rate capacity and average cost function value., QC 20140602, METIS
- Published
- 2013
- Full Text
- View/download PDF
81. Delay constrained throughput analysis of SISO
- Abstract
We analyze the traffic carrying capacity of a single-input single-output system for a given delay guarantee at the flow level. A continuous time ON/OFF data source is considered as the traffic model while the wireless channel is modeled using the Gilbert-Elliot model. We study the impact of the delay bound violation probability, traffic burstiness, channel memory and the delay requirements at the network layer on the throughput under different signal strength., QC 20130111
- Published
- 2012
- Full Text
- View/download PDF
82. A Greedy Pursuit Algorithm for Distributed Compressed Sensing
- Abstract
We develop a greedy pursuit algorithm for solving the distributed compressed sensing problem in a connected network. This algorithm is based on subspace pursuit and uses the mixed support-setsignal model. Through experimental evaluation, we show that the distributed algorithm performs significantly better than the standalone (disconnected) solution and close to a centralized (fully connected to a central point) solution., QC 20121114
- Published
- 2012
- Full Text
- View/download PDF
83. On combined beamforming and OSTBC over the cognitive radio S-channel with partial CSI
- Abstract
A pair of secondary (cognitive, unlicensed) users is communicating in the presence of multiple primary (licensed) user pairs. The cognitive transceiver is implementing beamforming and orthogonal space-time block coding in the presence of external interference, induced by the primary system transmission, that has to be properly handled. Moreover, the cognitive link nodes, both the transmitter and the receiver, are supplied with different levels of network side information (NSI), i.e. primary messages and partial channel side information (CSI). We investigate how this side information can be taken into account in the cognitive system design and how interference affects the behaviour of the beamforming solution. Through numerical simulations, we illustrate the impact of partial CSI on system performance and discuss its implications on the feasibility of cognitive systems., QC 20121218
- Published
- 2012
- Full Text
- View/download PDF
84. Pairwise secret key agreement using the source common randomness
- Abstract
A secret key agreement setup between three users is considered in which each pair of them wishes to agree on a secret key hidden from the remaining user. The three users observe i.i.d. outputs of correlated sources and there is a noiseless public channel from each user for communication to the others. In this setup, inner and outer bounds of the secret key capacity region is derived. Moreover, some special cases are obtained in which the inner bound coincides the explicit outer bound. Also a binary-erasure example is presented through which the results are examined., QC 20130115
- Published
- 2012
- Full Text
- View/download PDF
85. Robust transmit strategies for multiantenna bidirectional broadcast channels
- Abstract
In this work the multiantenna bidirectional broadcast channel under channel uncertainty is studied. This problem is motivated by the broadcast phase of the decode-and-forward bidirectional relaying protocol, where a relay node establishes a bidirectional communication between two other nodes while having only imperfect channel state information available. Different uncertainty models are investigated, where the nominal channels experience either a multiplicative or additive perturbation based on a spectral norm constraint. For these uncertainty models the corresponding capacity regions of the multiantenna bidirectional broadcast channel are analyzed. Further, robust transmit strategies are characterized and worst-case perturbations are identified., QC 20120625
- Published
- 2012
- Full Text
- View/download PDF
86. Secret key agreement using correlated sources over the generalized multiple access channel
- Abstract
A secret key agreement setup between three users is considered in which each of the users 1 and 2 intends to share a secret key with user 3 and users 1 and 2 are eavesdroppers with respect to each other. The three users observe i.i.d. outputs of correlated sources and there is a generalized discrete memoryless multiple access channel (GDMMAC) from users 1 and 2 to user 3 for communication between the users. The secret key agreement is established using the correlated sources and the GDMMAC. In this setup, inner and outer bounds of the secret key capacity region are investigated. Moreover, for a special case where the channel inputs and outputs and the sources form Markov chains in some order, the secret key capacity region is derived. Also a Gaussian case is considered in this setup., QC 20130115
- Published
- 2012
- Full Text
- View/download PDF
87. Secret-key agreement over a non-coherent block-fading MIMO wiretap channel
- Abstract
We study secret-key agreement over a non-coherent block-fading multiple input multiple output (MIMO) wiretap channel. We give an achievable scheme based on training and source emulation and analyze the rate in the high SNR regime. Based on this analysis we find the optimal number of antennas to use for training. Our main result is that if the sum of the number of antennas at Alice and Bob is larger than the coherence time of the channel, the achievable rate does not depend on the number of antennas at Eve. In this case source emulation is not needed, and using only training is optimal. We also consider the case when there is no public channel available. In this case we show that secret-key agreement is still possible by using the wireless channel for discussion, giving the same number of secure degrees of freedom as in the case with a public channel., QC 20130220
- Published
- 2012
- Full Text
- View/download PDF
88. Multi-stage coding for channels with a rewrite option and reversible input
- Abstract
We consider a problem of constrained multi-stage coding for channels with a rewrite option. It is a natural extension of Weissman's channels with action-dependent states to the multistage coding case where an encoder in each stage observes its own message as well as all previous-stage messages, inputs, and outputs. In addition to decoding all messages at the final stage, the new reconstruction constraint introduced in Sumszyk and Steinberg's information embedding with reversible stegotext is imposed on the problem such that the decoder is required to be able to reconstruct all channel input sequences reliably. The complete characterization of the channel capacity region is given for the two-stage case, while the inner and outer bounds to the capacity regions for the cases of three or more stages are provided. For the two-stage case, a discussion regarding the rate constraint of the message in the second stage is also given in which we can draw a connection to the two-stage coding condition which appears in our previous study on channel with action-dependent state and reversible input., QC 20121119
- Published
- 2012
- Full Text
- View/download PDF
89. On combined beamforming and OSTBC over the cognitive radio Z-channel with partial CSI
- Abstract
We consider a pair of secondary nodes (SU) coupled, in Z-topology, with multiple pairs of primary nodes (PU). The secondary (cognitive) transmitter is combining beamforming with orthogonal space-time block coding (BOSTBC) and operates under Quality-of-Service (QoS) constraints that must be guaranteed for the primary receivers (PURx). The cognitive link is designed assuming imperfect channel state information (CSI) for all links, available at the SU transmitter (SUTx). Under this premise we characterize the optimal design in terms of CSI quality and interference and evaluate their impact on the performance of BOSTBC transmission in underlay cognitive networks., QC 20130116
- Published
- 2012
- Full Text
- View/download PDF
90. Input-distribution optimization for estimate-and-forward relaying
- Abstract
We investigate the design of optimized input distributions for the two-hop Gaussian relay channel under an average power constraint. In our study, the relay is confined to implement an estimate-and-forward strategy. We demonstrate that the rate achievable by an optimized discrete input distribution can significantly outperform that achievable by a Gaussian codebook. The lower bound obtained by the optimized EF scheme is also used to establish an improved lower bound on the rates achievable by compress-and-forward., QC 20130122
- Published
- 2012
- Full Text
- View/download PDF
91. Managing interference for stabilization over wireless channels
- Abstract
The remote stabilization of a first order linear plant over a wireless channel is studied. The plant is assumed to have an arbitrary distributed initial state and the wireless channel between the plant's sensor and the controller is modeled as a white Gaussian channel subject to an external interference signal. In order to combat the interference a dedicated sensor (relay) node is deployed adjacent to the interferer, which relays the interference information to both the plant's sensor and the controller. The sensor and the controller utilize this information to mitigate interference. We use delay-free linear sensing and control scheme in order to derive sufficient conditions for mean square stability. The achievable stability region significantly enlarges with the relay assisted interference cancelation scheme. Moreover the effect of interference can be completely eliminated if the encoder knows all the future values of the interference., QC 20130218
- Published
- 2012
- Full Text
- View/download PDF
92. Anytime reliability of systematic LDPC convolutional codes
- Abstract
We propose a LDPC Convolutional Code ensemble together with an expanding-window message-passing decoder that asymptotically have anytime properties when used for streaming transmission on the binary erasure channel. We show analytically that the decoding erasure probability of these codes decays exponentially over decoding delay and determine the corresponding anytime exponents., QC 20130118
- Published
- 2012
- Full Text
- View/download PDF
93. Error floor Analysis of LT Codes over the Additive White Gaussian Noise Channel
- Abstract
We investigate the error floor performance of Luby Transform (LT) codes over the additive white Gaussian noise channel. We first derive a lower bound on the bit error rate for an LT code, which we subsequently use to show that the corresponding error floor is predominantly caused by low-degree variable nodes. Based on this observation, we propose a modified encoding scheme for LT codes that provides a lower error floor with no increase in encoding and decoding complexities. The convergence behavior of the proposed scheme is analyzed using extrinsic information transfer charts, and shown to be similar to the original LT code. Numerical examples demonstrate the improvements of the modified LT code as a stand-alone code and as a component code of a Raptor code., QC 20120206
- Published
- 2011
- Full Text
- View/download PDF
94. Relay-Aided Broadcasting with Instantaneously Decodable Binary Network Codes
- Abstract
We consider a base-station broadcasting a set of order-insensitive packets to a user population over packet-erasure channels. To improve efficiency we propose a relay-aided transmission scheme using instantaneously-decodable binary network coding. Our proposed scheme ensures that a coded packet can be immediately decoded at the user side without delay. Moreover, only binary operations are required in the encoding and decoding processes, which decrease the computational complex. We further analyze the performance of the resulting broadcast scheme, and show that significant improvements in transmission efficiency are obtained as compared to previously proposed ARQ and network-coding-based schemes., QC 20120228
- Published
- 2011
- Full Text
- View/download PDF
95. On network coding with finite channel state information
- Abstract
We study network coding for wireless networks with finite channel state information (CSI) at intermediate nodes (relays). Based on the CSI of the relay-sink channels, we adapt the network codes at the relays. For a specific network with two sources, four relays and two sinks, the analytic results show that one bit CSI of all relay-sink channels (global CSI) can reduce complexity (field size), and simultaneously decrease the erasure probability. Then, we generalize the results to relay networks with M users, N relays and J sinks. We show that fixed network codes without CSI cannot achieve instantaneous min-cut, i.e., min-cut under current channel state. We also show that with one bit global CSI, we can achieve instantaneous min-cut by adapting the network codes using an alphabet size L, where L is the number of sinks connecting to a relay. Yet, the fixed MDS network codes use an alphabet size L(M-1N-1). For the networks with perfect or imperfect source-relay channels, adaptive network codes with one bit global CSI have lower erasure probability than the codes without CSI. Thus, one bit global CSI can reduce the erasure probability, and simultaneously reduce coding complexity., QC 20120416
- Published
- 2011
- Full Text
- View/download PDF
96. Optimal-cost repair in multi-hop distributed storage systems
- Abstract
In distributed storage systems reliability is achieved through redundant storage nodes distributed in the network. Then a data collector can recover source information even if some nodes fail. To maintain reliability, an autonomous and efficient protocol should be used to reconstruct the failed node. Therepairprocess causes traffic in the network. Recent results in e.g., [1], [2] found the optimal traffic-storage tradeoff, and proposed regenerating codes to achieve the optimality. We investigate the link costs and the impact of network topologies during therepairprocess. We formulate the minimum costrepairproblem in joint and decoupled methods. We investigate the required field size for the joint method. For the decoupled method, we show that the optimization problem is linear for the linear cost. We further show that the cooperation of surviving nodes could efficiently exploit the network topology and reduce therepaircost. The numerical results in tandem, star and grid networks show the benefits of our methods in term of the repair cost., QC 20120208
- Published
- 2011
- Full Text
- View/download PDF
97. Capacity achieving instantaneous relaying
- Abstract
A class of semi-deterministic relay channels is introduced and it is shown that for channels in the class capacity can be achieved using an instantaneous relaying scheme. Applications to Gaussian channels are then discussed., QC 20120203
- Published
- 2011
- Full Text
- View/download PDF
98. MIMO bidirectional broadcast channels with common message
- Abstract
In this work, we study the MIMO Gaussian bidirectional broadcast channel (BBC) with common message and characterize the capacity region. Moreover, we show that the transmit covariance matrix optimization problem has the same structure as the corresponding optimization problem of the BBC without common message which leads to the comfortable position to transfer results from one scenario to the other. This problem is motivated by the concept of bidirectional relaying in a three-node network, where a half-duplex relay node establishes a bidirectional communication between two other nodes and thereby adds an own multicast message to the communication., QC 20111219
- Published
- 2010
- Full Text
- View/download PDF
99. Source Coding With Common Reconstruction and Action-dependent Side Information
- Abstract
We determine the rate region of a source coding problem with common reconstruction and action-dependent side information where an action sequence is taken by an encoder over a rate-limited link. We show that the rate region depends only on the sum-rate and the sum-rate distortion and cost function is characterized. The result serves as a fundamental limit in transmission scenarios where the encoder wants to control and monitor the quality of the decoder's reconstruction via the respective uses of action sequences and a common reconstruction constraint., QC 20111117
- Published
- 2010
- Full Text
- View/download PDF
100. Rate-Diversity-Delay Tradeoff for ARQ Systems over MIMO Block-Fading Channels
- Abstract
We study the effect of power adaptation on the outage diversity of Incremental-redundancy automatic-repeat-request (INR-ARQ) transmission over the multi-input multi-output (MIMO) block-fading channel. In particular, we derive the optimal outage diversity achieved by power adaptation in INR-ARQ systems, and show that power adaptation provides significant gains in outage diversity. We also prove that the optimal outage diversity is achievable with random coding schemes., QC 20120216
- Published
- 2009
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.