首页 > 最新文献

2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)最新文献

英文 中文
A consensus algorithm for networks with process noise and quantization error 带有过程噪声和量化误差的网络一致性算法
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447044
F. Rego, Ye Pu, A. Alessandretti, Antonio Pedro Aguiar, C. Jones
In this paper we address the problem of quantized consensus where process noise or external inputs corrupt the state of each agent at each iteration. We propose a quantized consensus algorithm with progressive quantization, where the quantization interval changes in length at each iteration by a pre-specified value. We derive conditions on the design parameters of the algorithm to guarantee ultimate boundedness of the deviation from the average of each agent. Moreover, we determine explicitly the bounds of the consensus error under the assumption that the process disturbances are ultimately bounded within known bounds. A numerical example of cooperative path-following of a network of single integrators illustrates the performance of the proposed algorithm.
在本文中,我们解决了量化共识问题,其中过程噪声或外部输入在每次迭代中破坏每个代理的状态。我们提出了一种渐进量化的量化一致性算法,其中量化区间在每次迭代时的长度变化预设值。我们推导了算法设计参数的条件,以保证每个agent的平均偏差的最终有界性。此外,在过程扰动最终有界于已知界的假设下,我们明确地确定了一致误差的界。单个积分器网络协同路径跟踪的数值算例说明了该算法的有效性。
{"title":"A consensus algorithm for networks with process noise and quantization error","authors":"F. Rego, Ye Pu, A. Alessandretti, Antonio Pedro Aguiar, C. Jones","doi":"10.1109/ALLERTON.2015.7447044","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447044","url":null,"abstract":"In this paper we address the problem of quantized consensus where process noise or external inputs corrupt the state of each agent at each iteration. We propose a quantized consensus algorithm with progressive quantization, where the quantization interval changes in length at each iteration by a pre-specified value. We derive conditions on the design parameters of the algorithm to guarantee ultimate boundedness of the deviation from the average of each agent. Moreover, we determine explicitly the bounds of the consensus error under the assumption that the process disturbances are ultimately bounded within known bounds. A numerical example of cooperative path-following of a network of single integrators illustrates the performance of the proposed algorithm.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125631918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Adaptive CSMA under the SINR model: Fast convergence through local gibbs optimization SINR模型下的自适应CSMA:通过局部吉布斯优化快速收敛
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447015
Subrahmanya Swamy Peruru, R. Ganti, K. Jagannathan
In this paper, we consider an adaptive CSMA based scheduling algorithm for a single-hop wireless network under a realistic SINR (signal-to-interference-plus-noise ratio) model for the interference, and propose an efficient local optimization based algorithm to estimate certain parameters of the algorithm called fugacities. It is known that adaptive CSMA based algorithms can achieve throughput optimality, by sampling feasible schedules from a Gibbs distribution with appropriate fugacities. Unfortunately, estimating the optimal fugacities for a desired service rate vector is an NP-hard problem. Further, the existing adaptive CSMA algorithms use a stochastic gradient descent based method, which usually entails an impractically slow (exponential in the size of the network) convergence to the optimal fugacities. In contrast, the convergence rate and the complexity of our algorithm is independent of the network size, and depends only on the neighborhood size of a link. In particular, in spatial networks where the neighborhood size does not scale with the network size, our algorithm is order optimal. We show that the proposed algorithm corresponds exactly to performing the well-known Bethe approximation to the underlying Gibbs distribution. We also consider two special cases of the SINR interference model and obtain the corresponding fugacities in closed form. Numerical results indicate that the proposed method achieves extremely fast convergence to near-optimal fugacities, and often outperforms the convergence rate of the stochastic gradient descent by a few orders of magnitude.
在本文中,我们考虑了一种基于自适应CSMA的单跳无线网络调度算法,该算法在真实的干扰SINR(信噪比)模型下,提出了一种有效的基于局部优化的算法来估计算法的某些参数,称为模糊度。已知基于自适应CSMA的算法可以通过从具有适当模糊度的吉布斯分布中采样可行调度来实现吞吐量最优。不幸的是,估计期望的服务率向量的最优功能是一个np困难问题。此外,现有的自适应CSMA算法使用基于随机梯度下降的方法,这通常需要一个不切实际的缓慢(网络大小呈指数级)收敛到最优离散度。相比之下,我们的算法的收敛速度和复杂度与网络大小无关,而只取决于链路的邻域大小。特别是在邻域大小不随网络大小缩放的空间网络中,我们的算法是有序最优的。我们表明,所提出的算法完全对应于对潜在的吉布斯分布执行著名的贝特近似。我们还考虑了SINR干涉模型的两种特殊情况,并以封闭形式得到了相应的离散度。数值结果表明,该方法能极快地收敛到近最优离散度,且收敛速度往往比随机梯度下降法的收敛速度快几个数量级。
{"title":"Adaptive CSMA under the SINR model: Fast convergence through local gibbs optimization","authors":"Subrahmanya Swamy Peruru, R. Ganti, K. Jagannathan","doi":"10.1109/ALLERTON.2015.7447015","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447015","url":null,"abstract":"In this paper, we consider an adaptive CSMA based scheduling algorithm for a single-hop wireless network under a realistic SINR (signal-to-interference-plus-noise ratio) model for the interference, and propose an efficient local optimization based algorithm to estimate certain parameters of the algorithm called fugacities. It is known that adaptive CSMA based algorithms can achieve throughput optimality, by sampling feasible schedules from a Gibbs distribution with appropriate fugacities. Unfortunately, estimating the optimal fugacities for a desired service rate vector is an NP-hard problem. Further, the existing adaptive CSMA algorithms use a stochastic gradient descent based method, which usually entails an impractically slow (exponential in the size of the network) convergence to the optimal fugacities. In contrast, the convergence rate and the complexity of our algorithm is independent of the network size, and depends only on the neighborhood size of a link. In particular, in spatial networks where the neighborhood size does not scale with the network size, our algorithm is order optimal. We show that the proposed algorithm corresponds exactly to performing the well-known Bethe approximation to the underlying Gibbs distribution. We also consider two special cases of the SINR interference model and obtain the corresponding fugacities in closed form. Numerical results indicate that the proposed method achieves extremely fast convergence to near-optimal fugacities, and often outperforms the convergence rate of the stochastic gradient descent by a few orders of magnitude.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"351 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134408900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Erasure adversarial wiretap channels 消除对抗性窃听渠道
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447126
P. Wang, R. Safavi-Naini, Fuchun Lin
In an erasure adversarial wiretap channel (eAWTP-channel), the adversary can select a fraction ρr of the codeword to read, and a fraction ρe of the codeword to erase. The model can be seen as an extension of the wiretap II model where the adversary not only selects its view of the transmitted word, but also can erase a fraction of the codeword. eAWTP codes provide security and reliability for communication over eAWTP channels. We derive an upper bound on the rate of eAWTP codes, and give an efficient construction of a code family that achieves the bound, hence deriving secrecy capacity of the channel. We then show that the construction can also be used for AWTP channels in which instead of erasing code components, the adversary can add noise to the codeword. The construction is the only AWTP code with constant alphabet size.
在擦除对抗性窃听信道(eawtp信道)中,对手可以选择码字的一部分ρr来读取,并选择码字的一部分ρe来擦除。该模型可以看作是窃听II模型的扩展,在窃听II模型中,对手不仅可以选择其对传输字的视图,而且可以擦除代码字的一小部分。eAWTP代码为eAWTP信道上的通信提供了安全性和可靠性。我们给出了eAWTP码率的上界,并给出了达到该上界的码族的有效构造,从而得到了信道的保密容量。然后,我们展示了这种构造也可以用于AWTP信道,在这种信道中,攻击者可以向码字添加噪声,而不是擦除代码组件。该结构是唯一具有恒定字母大小的AWTP代码。
{"title":"Erasure adversarial wiretap channels","authors":"P. Wang, R. Safavi-Naini, Fuchun Lin","doi":"10.1109/ALLERTON.2015.7447126","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447126","url":null,"abstract":"In an erasure adversarial wiretap channel (eAWTP-channel), the adversary can select a fraction ρr of the codeword to read, and a fraction ρe of the codeword to erase. The model can be seen as an extension of the wiretap II model where the adversary not only selects its view of the transmitted word, but also can erase a fraction of the codeword. eAWTP codes provide security and reliability for communication over eAWTP channels. We derive an upper bound on the rate of eAWTP codes, and give an efficient construction of a code family that achieves the bound, hence deriving secrecy capacity of the channel. We then show that the construction can also be used for AWTP channels in which instead of erasing code components, the adversary can add noise to the codeword. The construction is the only AWTP code with constant alphabet size.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131964487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Robust regularized ZF in decentralized Broadcast Channel with correlated CSI noise 具有相关CSI噪声的分散广播信道鲁棒正则化ZF
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447023
Qianrui Li, Paul de Kerret, D. Gesbert, N. Gresset
We consider in this work the Distributed Channel State Information (DCSI) Broadcast Channel (BC) setting, in which the various Transmitters (TXs) compute elements of the precoder based on their individual estimates of the global multiuser channel matrix. Previous works relative to the DCSI setting assume the estimation errors at different TXs to be uncorrelated, while we consider in contrast in this work that the CSI noises can be correlated. This generalization bridges the gap between the fully distributed and the centralized setting, and offers an avenue to analyze partially centralized networks. In addition, we generalize the regularized Zero Forcing (ZF) precoding by letting each TX use a different regularization coefficient. Building upon random matrix theory tools, we obtain a deterministic equivalent for the rate achieved in the large system limit from which we can optimize the regularization coefficients at different TXs. This extended precoding scheme in which each TX applies the optimal regularization coefficient is denoted as “DCSI Regularized ZF” and we show by numerical simulations that it allows to significantly reduce the negative impact of the distributed CSI configuration and is robust to the distribution of CSI quality level across all TXs.
在这项工作中,我们考虑了分布式信道状态信息(DCSI)广播信道(BC)设置,其中各种发射机(TXs)基于它们对全局多用户信道矩阵的单独估计来计算预编码器的元素。之前关于DCSI设置的工作假设不同TXs的估计误差是不相关的,而我们在这项工作中相反地认为CSI噪声是可以相关的。这种概括弥合了完全分布式和集中式设置之间的差距,并提供了分析部分集中式网络的途径。此外,我们通过让每个TX使用不同的正则化系数来推广正则化零强制(ZF)预编码。在随机矩阵理论工具的基础上,我们得到了在大系统极限下达到的速率的确定性等价,由此我们可以优化不同TXs下的正则化系数。这种扩展的预编码方案,其中每个TX应用最优正则化系数,被表示为“DCSI正则化ZF”,我们通过数值模拟表明,它允许显着减少分布式CSI配置的负面影响,并且对CSI质量水平在所有TX中的分布具有鲁棒性。
{"title":"Robust regularized ZF in decentralized Broadcast Channel with correlated CSI noise","authors":"Qianrui Li, Paul de Kerret, D. Gesbert, N. Gresset","doi":"10.1109/ALLERTON.2015.7447023","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447023","url":null,"abstract":"We consider in this work the Distributed Channel State Information (DCSI) Broadcast Channel (BC) setting, in which the various Transmitters (TXs) compute elements of the precoder based on their individual estimates of the global multiuser channel matrix. Previous works relative to the DCSI setting assume the estimation errors at different TXs to be uncorrelated, while we consider in contrast in this work that the CSI noises can be correlated. This generalization bridges the gap between the fully distributed and the centralized setting, and offers an avenue to analyze partially centralized networks. In addition, we generalize the regularized Zero Forcing (ZF) precoding by letting each TX use a different regularization coefficient. Building upon random matrix theory tools, we obtain a deterministic equivalent for the rate achieved in the large system limit from which we can optimize the regularization coefficients at different TXs. This extended precoding scheme in which each TX applies the optimal regularization coefficient is denoted as “DCSI Regularized ZF” and we show by numerical simulations that it allows to significantly reduce the negative impact of the distributed CSI configuration and is robust to the distribution of CSI quality level across all TXs.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117334191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Near-optimal multi-version codes 近乎最佳的多版本代码
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447076
M. Khabbazian
Motivated by applications to distributed storage and computing, the multi-version coding problem was formulated by Wang and Cadambe in [4]. In this problem, a client sequently over time stores v independent versions of a message in a storage system with n server nodes. It is assumed that, a message version may not reach some servers, and that each server is unaware of what has been stored in other servers. The problem requires that any c servers must be able to reconstruct their latest common version. An extended multi-version problem introduced in [5] relaxes the above requirement by requiring any c servers to be able to reconstruct their latest common version or any version later than that. The objective in both the original and extended multi-version problem is to minimize the worst case storage cost. In this work, we propose codes for both the multi-version problem and its extension. For the original multi-version coding problem, we show that the storage cost of our proposed codes are near-optimal. For the extended multi-version coding problem, we show that the storage cost of our first algorithm is optimal when v|c - 1. Our second proposed extended multi-version code shows that storage cost of strictly less than one is achievable even when v is 50% larger than c. This is interesting, as the storage cost of existing codes becomes one as soon as v becomes larger than c.
受分布式存储和计算应用的影响,Wang和Cadambe在[4]中提出了多版本编码问题。在这个问题中,客户端在具有n个服务器节点的存储系统中依次存储消息的v个独立版本。假设消息版本可能无法到达某些服务器,并且每个服务器都不知道其他服务器中存储的内容。该问题要求任何c服务器都必须能够重建其最新的公共版本。[5]中引入的扩展多版本问题放宽了上述要求,要求任何c服务器能够重构其最新的通用版本或任何更新的版本。原始多版本问题和扩展多版本问题的目标都是最小化最坏情况下的存储成本。在这项工作中,我们提出了多版本问题及其扩展的代码。对于原始的多版本编码问题,我们证明了我们所提出的编码的存储成本接近最优。对于扩展的多版本编码问题,我们证明了第一种算法的存储成本在v|c - 1时是最优的。我们提出的第二个扩展多版本代码表明,即使v比c大50%,也可以实现严格小于1的存储成本。这很有趣,因为一旦v大于c,现有代码的存储成本就会变为1。
{"title":"Near-optimal multi-version codes","authors":"M. Khabbazian","doi":"10.1109/ALLERTON.2015.7447076","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447076","url":null,"abstract":"Motivated by applications to distributed storage and computing, the multi-version coding problem was formulated by Wang and Cadambe in [4]. In this problem, a client sequently over time stores v independent versions of a message in a storage system with n server nodes. It is assumed that, a message version may not reach some servers, and that each server is unaware of what has been stored in other servers. The problem requires that any c servers must be able to reconstruct their latest common version. An extended multi-version problem introduced in [5] relaxes the above requirement by requiring any c servers to be able to reconstruct their latest common version or any version later than that. The objective in both the original and extended multi-version problem is to minimize the worst case storage cost. In this work, we propose codes for both the multi-version problem and its extension. For the original multi-version coding problem, we show that the storage cost of our proposed codes are near-optimal. For the extended multi-version coding problem, we show that the storage cost of our first algorithm is optimal when v|c - 1. Our second proposed extended multi-version code shows that storage cost of strictly less than one is achievable even when v is 50% larger than c. This is interesting, as the storage cost of existing codes becomes one as soon as v becomes larger than c.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121134255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Inferning trees Inferning树
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447164
Mina Karzand, Guy Bresler
We consider the problem of learning an Ising model for the purpose of subsequently performing inference from partial observations. This is in contrast to most other work on graphical model learning, which tries to learn the true underlying graph. This objective requires a lower bound on the strength of edges for identifiability of the model. We show that in the relatively simple case of tree models, the Chow-Liu algorithm learns a distribution with accurate low-order marginals despite the model possibly being non-identifiable. In other words, a model that appears rather different from the truth nevertheless allows to carry out inference accurately.
我们考虑了学习伊辛模型的问题,目的是随后从部分观测进行推理。这与大多数其他关于图形模型学习的工作形成对比,这些工作试图学习真正的底层图。这个目标需要一个边缘强度的下界来保证模型的可识别性。我们表明,在相对简单的树模型情况下,尽管模型可能不可识别,但Chow-Liu算法学习了具有精确低阶边际的分布。换句话说,一个看起来与事实相当不同的模型,却可以准确地进行推理。
{"title":"Inferning trees","authors":"Mina Karzand, Guy Bresler","doi":"10.1109/ALLERTON.2015.7447164","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447164","url":null,"abstract":"We consider the problem of learning an Ising model for the purpose of subsequently performing inference from partial observations. This is in contrast to most other work on graphical model learning, which tries to learn the true underlying graph. This objective requires a lower bound on the strength of edges for identifiability of the model. We show that in the relatively simple case of tree models, the Chow-Liu algorithm learns a distribution with accurate low-order marginals despite the model possibly being non-identifiable. In other words, a model that appears rather different from the truth nevertheless allows to carry out inference accurately.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"369 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114861281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of linear & nonlinear observers for a turning process with implicit State-Dependent Delay 具有隐式状态相关延迟的车削过程线性和非线性观测器的设计
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447052
Aftab Ahmed, Erik I. Verriest
Analysis and design of present machining methods used in mechanical engineering are based on Taylor series approximations and linearizations which cause erroneous and anomalous results. High precision machining cannot tolerate such errors. We consider and analyze an exact mathematical model of the turning process without performing any kind of linearization of the model. We give a strategic design of an estimator for the position of a machining tool based on first principles. The system's dynamics are characterized by a nonlinear State-Dependent Delay Differential Equation (SD-DDE). This delay is extremely convoluted with the state by an implicit relation. The central tenet is to use inversion of the delay model and to extract the state vector given the delay. We use our recently developed observation technique referred to as Delay Injection. Both linear asymptotic and nonlinear observers with different architectures are designed for the state estimation of a machine tool based on state-dependent delay measurement. Simulation results are depicted at the end which portray the effectiveness, validity and usefulness of the proposed observer schemes.
目前机械工程中使用的加工方法的分析和设计是基于泰勒级数近似和线性化的,这会导致错误和异常的结果。高精度加工不能容忍这样的误差。我们考虑并分析了车削过程的精确数学模型,而没有对模型进行任何线性化。给出了一种基于第一性原理的机床位置估计器的设计策略。系统动力学用非线性状态相关时滞微分方程(SD-DDE)表征。这种延迟通过隐式关系与状态极其复杂。其核心原则是使用延迟模型的反演并提取给定延迟的状态向量。我们使用我们最近开发的观测技术,称为延迟注入。针对基于状态相关延迟测量的机床状态估计,设计了不同结构的线性渐近观测器和非线性观测器。仿真结果说明了所提观测器方案的有效性、有效性和实用性。
{"title":"Design of linear & nonlinear observers for a turning process with implicit State-Dependent Delay","authors":"Aftab Ahmed, Erik I. Verriest","doi":"10.1109/ALLERTON.2015.7447052","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447052","url":null,"abstract":"Analysis and design of present machining methods used in mechanical engineering are based on Taylor series approximations and linearizations which cause erroneous and anomalous results. High precision machining cannot tolerate such errors. We consider and analyze an exact mathematical model of the turning process without performing any kind of linearization of the model. We give a strategic design of an estimator for the position of a machining tool based on first principles. The system's dynamics are characterized by a nonlinear State-Dependent Delay Differential Equation (SD-DDE). This delay is extremely convoluted with the state by an implicit relation. The central tenet is to use inversion of the delay model and to extract the state vector given the delay. We use our recently developed observation technique referred to as Delay Injection. Both linear asymptotic and nonlinear observers with different architectures are designed for the state estimation of a machine tool based on state-dependent delay measurement. Simulation results are depicted at the end which portray the effectiveness, validity and usefulness of the proposed observer schemes.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121883845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Memoryless sampling rate distortion 无记忆采样率失真
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447105
Vinay Praneeth Boda, P. Narayan
Consider a discrete memoryless multiple source with m component sources. A subset of k ≤ m sources are sampled at each time instant and jointly compressed in order to reconstruct all the m sources under a given distortion criterion. A sampling rate distortion function is characterized for the case of memoryless random sampling with the sampler possibly depending on the source outputs; and the decoder is informed of the sequence of sampled sets. Examining the structure of the optimal sampler, it is shown that deterministic sampling, characterized by a conditional point-mass, suffices. Restricted forms of sampling are also addressed. An upper bound for the sampling rate distortion function is provided when the decoder is not informed of the sequence of sampled sets.
考虑一个具有m个分量源的离散无内存多源。在每个时刻采样k≤m个源的子集并进行联合压缩,以便在给定的失真准则下重构所有m个源。采样率失真函数的特征是用于无记忆随机采样的情况,采样器可能依赖于源输出;解码器被告知采样集的序列。通过对最优采样器结构的检验,表明以条件点质量为特征的确定性采样就足够了。还讨论了抽样的限制形式。当解码器不被告知采样集的序列时,提供采样率失真函数的上界。
{"title":"Memoryless sampling rate distortion","authors":"Vinay Praneeth Boda, P. Narayan","doi":"10.1109/ALLERTON.2015.7447105","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447105","url":null,"abstract":"Consider a discrete memoryless multiple source with m component sources. A subset of k ≤ m sources are sampled at each time instant and jointly compressed in order to reconstruct all the m sources under a given distortion criterion. A sampling rate distortion function is characterized for the case of memoryless random sampling with the sampler possibly depending on the source outputs; and the decoder is informed of the sequence of sampled sets. Examining the structure of the optimal sampler, it is shown that deterministic sampling, characterized by a conditional point-mass, suffices. Restricted forms of sampling are also addressed. An upper bound for the sampling rate distortion function is provided when the decoder is not informed of the sequence of sampled sets.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125090579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Interference-aware routing and spectrum allocation for millimeter wave backhaul in urban picocells 城市微蜂窝毫米波回程干扰感知路由与频谱分配
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7557347
M. Rasekh, Dongning Guo, Upamanyu Madhow
The exponential growth in demand for mobile data requires significant increases in spatial reuse, motivating an evolution towards picocellular architectures with densely deployed base stations. Providing backhaul for such a network is a key challenge, because of the high access link rates, and the cost and difficulty of running optical fiber to base stations that might be opportunistically placed on lampposts and rooftops. Wireless backhaul using millimeter (mm) wave spectrum is therefore an attractive and flexible approach, given the plentiful availability of spectrum and the possibility of synthesizing highly directive, steerable links. In this paper, we formulate and investigate the problem of joint resource allocation and routing on such a mm wave backhaul network, providing a linear programming formulation that accounts for mutual interference across simultaneously active links. While the number of variables grows exponentially in network size, it is possible to prune the problem size so that it is manageable for moderately sized networks. Numerical results and design implications are briefly discussed.
移动数据需求的指数级增长要求空间重用的显著增加,从而推动向具有密集部署基站的单蜂窝架构发展。为这样的网络提供回程是一个关键的挑战,因为接入链路速率很高,并且将光纤运行到可能偶然放置在灯柱和屋顶上的基站的成本和难度。因此,利用毫米波频谱的无线回程是一种有吸引力且灵活的方法,因为频谱的可用性丰富,并且可以合成高度定向、可操纵的链路。在本文中,我们制定并研究了这种毫米波回程网络上的联合资源分配和路由问题,提供了一个考虑同时活动链路相互干扰的线性规划公式。当变量的数量随着网络规模呈指数级增长时,可以减少问题的规模,使其在中等规模的网络中易于管理。简要讨论了数值结果和设计意义。
{"title":"Interference-aware routing and spectrum allocation for millimeter wave backhaul in urban picocells","authors":"M. Rasekh, Dongning Guo, Upamanyu Madhow","doi":"10.1109/ALLERTON.2015.7557347","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7557347","url":null,"abstract":"The exponential growth in demand for mobile data requires significant increases in spatial reuse, motivating an evolution towards picocellular architectures with densely deployed base stations. Providing backhaul for such a network is a key challenge, because of the high access link rates, and the cost and difficulty of running optical fiber to base stations that might be opportunistically placed on lampposts and rooftops. Wireless backhaul using millimeter (mm) wave spectrum is therefore an attractive and flexible approach, given the plentiful availability of spectrum and the possibility of synthesizing highly directive, steerable links. In this paper, we formulate and investigate the problem of joint resource allocation and routing on such a mm wave backhaul network, providing a linear programming formulation that accounts for mutual interference across simultaneously active links. While the number of variables grows exponentially in network size, it is possible to prune the problem size so that it is manageable for moderately sized networks. Numerical results and design implications are briefly discussed.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127936415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Car-following models with delayed feedback: Local stability and Hopf bifurcation 时滞反馈汽车跟随模型:局部稳定性和Hopf分岔
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447051
G. Kamath, K. Jagannathan, G. Raina
Reaction delays play an important role in determining the qualitative dynamical properties of a platoon of vehicles driving on a straight road. In this paper, we investigate the impact of delayed feedback on the dynamics of two widely-studied car-following models; namely, the classical car-following model and the optimal velocity model. We first conduct a control-theoretic analysis for both models and derive conditions that ensure local stability. We then demonstrate that the transition of traffic flow from the locally stable to the unstable regime occurs via a Hopf bifurcation. Qualitatively, this results in the emergence of limit cycles, which manifest as a back-propagating congestion wave. The analysis is complemented with stability charts and bifurcation diagrams. We also outline some of the implications that our results may have on the design of stable systems in the context of self-driven vehicles.
反应时滞在确定直线道路上行驶车辆的定性动力学特性方面起着重要作用。在本文中,我们研究了延迟反馈对两种被广泛研究的汽车跟随模型动力学的影响;即经典的跟车模型和最优速度模型。我们首先对两个模型进行控制理论分析,并推导出保证局部稳定的条件。然后我们证明了交通流从局部稳定状态到不稳定状态的过渡是通过Hopf分岔发生的。定性地说,这导致极限环的出现,它表现为反向传播的拥塞波。分析还附有稳定性图和分岔图。我们还概述了我们的结果可能对自动驾驶车辆稳定系统设计的一些影响。
{"title":"Car-following models with delayed feedback: Local stability and Hopf bifurcation","authors":"G. Kamath, K. Jagannathan, G. Raina","doi":"10.1109/ALLERTON.2015.7447051","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447051","url":null,"abstract":"Reaction delays play an important role in determining the qualitative dynamical properties of a platoon of vehicles driving on a straight road. In this paper, we investigate the impact of delayed feedback on the dynamics of two widely-studied car-following models; namely, the classical car-following model and the optimal velocity model. We first conduct a control-theoretic analysis for both models and derive conditions that ensure local stability. We then demonstrate that the transition of traffic flow from the locally stable to the unstable regime occurs via a Hopf bifurcation. Qualitatively, this results in the emergence of limit cycles, which manifest as a back-propagating congestion wave. The analysis is complemented with stability charts and bifurcation diagrams. We also outline some of the implications that our results may have on the design of stable systems in the context of self-driven vehicles.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128365663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
期刊
2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1