首页 > 最新文献

2013 47th Annual Conference on Information Sciences and Systems (CISS)最新文献

英文 中文
High-speed structured light scanning system and 3D gestural point cloud recognition 高速结构光扫描系统与三维手势点云识别
Pub Date : 2013-03-20 DOI: 10.1109/CISS.2013.6552323
Yin Zhou, Kai Liu, Jinglun Gao, K. Barner, F. Kiamilev
In computer-vision-based human computer interaction (HCI), higher-quality signal leads to better system performance. In this paper, we develop a real-time high-resolution 3D object scanning system based on structured light illumination (SLI). Our system fuses depth information with RGB texture to reconstruct high-resolution 3D point cloud. The point cloud preserves accurate surface geometry of the object (e.g., finger postures of hands, facial expressions, etc). Respectively, for a 640 × 480 video stream, our system can generate phase and texture video at 1500 frames per second (fps) and produce full 3D point clouds at 300 fps. For gesture recognition, we propose to combine the module of robust face recognition with the module of 3D point cloud classification. Moreover, rather than extracting sophisticated features, we leverage the accurate reconstruction and classify each point cloud by directly matching the whole 3D surface geometry with the templates of different classes. The proposed recognition system is robust to the scaling, translation, rotation and texture of objects. Finally, utilizing the system, we contribute to the research community two large-scale high-resolution 3D point cloud databases, i.e., SLI 3D Hand Gesture Database and SLI 3D Face Database. The proposed point cloud recognition approach achieves recognition rates up to 98.0% over the gesture database and 88.2% over the face database in our pilot study.
在基于计算机视觉的人机交互(HCI)中,信号质量越高,系统性能越好。本文开发了一种基于结构光照明(SLI)的实时高分辨率三维物体扫描系统。我们的系统融合了深度信息和RGB纹理来重建高分辨率的三维点云。点云保留物体的精确表面几何形状(例如,手的手指姿势,面部表情等)。对于640 × 480视频流,我们的系统可以以每秒1500帧(fps)的速度生成相位和纹理视频,并以每秒300帧(fps)的速度生成全3D点云。对于手势识别,我们提出将鲁棒人脸识别模块与三维点云分类模块相结合。此外,我们没有提取复杂的特征,而是利用精确的重建,通过将整个三维表面几何形状与不同类别的模板直接匹配,对每个点云进行分类。该识别系统对物体的缩放、平移、旋转和纹理具有鲁棒性。最后,利用该系统,我们向研究界贡献了两个大规模的高分辨率三维点云数据库,即SLI 3D手势数据库和SLI 3D人脸数据库。在我们的试点研究中,所提出的点云识别方法在手势数据库上的识别率高达98.0%,在人脸数据库上的识别率高达88.2%。
{"title":"High-speed structured light scanning system and 3D gestural point cloud recognition","authors":"Yin Zhou, Kai Liu, Jinglun Gao, K. Barner, F. Kiamilev","doi":"10.1109/CISS.2013.6552323","DOIUrl":"https://doi.org/10.1109/CISS.2013.6552323","url":null,"abstract":"In computer-vision-based human computer interaction (HCI), higher-quality signal leads to better system performance. In this paper, we develop a real-time high-resolution 3D object scanning system based on structured light illumination (SLI). Our system fuses depth information with RGB texture to reconstruct high-resolution 3D point cloud. The point cloud preserves accurate surface geometry of the object (e.g., finger postures of hands, facial expressions, etc). Respectively, for a 640 × 480 video stream, our system can generate phase and texture video at 1500 frames per second (fps) and produce full 3D point clouds at 300 fps. For gesture recognition, we propose to combine the module of robust face recognition with the module of 3D point cloud classification. Moreover, rather than extracting sophisticated features, we leverage the accurate reconstruction and classify each point cloud by directly matching the whole 3D surface geometry with the templates of different classes. The proposed recognition system is robust to the scaling, translation, rotation and texture of objects. Finally, utilizing the system, we contribute to the research community two large-scale high-resolution 3D point cloud databases, i.e., SLI 3D Hand Gesture Database and SLI 3D Face Database. The proposed point cloud recognition approach achieves recognition rates up to 98.0% over the gesture database and 88.2% over the face database in our pilot study.","PeriodicalId":268095,"journal":{"name":"2013 47th Annual Conference on Information Sciences and Systems (CISS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124057747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A model of auditory deviance detection 听觉偏差检测模型
Pub Date : 2013-03-20 DOI: 10.1109/CISS.2013.6552254
Emine Merve Kaya, Mounya Elhilali
A key component in computational analysis of the auditory environment is the detection of novel sounds in the scene. Deviance detection aids in the segmentation of auditory objects and is also the basis of bottom-up auditory saliency, which is crucial in directing attention to relevant events. There is growing evidence that deviance detection is executed in the brain through mapping of the temporal regularities in the acoustic scene. The violation of these regularities is reflected as mismatch negativity (MMN), a signature electrical response observed using electro-encephalograpy (EEG) or magneto-encephalograpy (MEG). While numerous experimental results have quantified the properties of this MMN response, there have been few attempts at developing general computational frameworks of MMN that can be integrated in comprehensive models of scene analysis. In this work, we interpret the underlying mechanism of the MMN response as a Kalman-filter formulation that provides a recursive prediction of sound features based on the past sensory information; eliciting an MMN when predictions are violated. The model operates in a high-dimensional space, mimicking the rich set of features that underlie sound encoding up the level of auditory cortex. We test the proposed scheme on a variety of simple oddball paradigms adapted to various features of sounds: Pitch, intensity, direction, and inter-stimulus interval. Our model successfully finds the deviant onset times when the deviant varies from the standard in one or more of the calculated dimensions. Our results not only lay a foundation for modeling more complex elicitations of MMN, but also provide a versatile and robust mechanism for outlier detection in temporal signals and ultimately parsing of auditory scenes.
听觉环境的计算分析的一个关键组成部分是在场景中检测新的声音。偏差检测有助于对听觉对象的分割,也是自下而上的听觉显著性的基础,这对于将注意力引向相关事件至关重要。越来越多的证据表明,异常检测是通过绘制声音场景的时间规律在大脑中执行的。违反这些规律反映为失配负性(MMN),这是一种使用脑电图(EEG)或脑磁图(MEG)观察到的标志性电反应。虽然许多实验结果已经量化了MMN响应的特性,但很少有人尝试开发MMN的通用计算框架,以便将其集成到场景分析的综合模型中。在这项工作中,我们将MMN响应的潜在机制解释为卡尔曼滤波公式,该公式提供了基于过去感官信息的声音特征递归预测;当预测被违背时,就会触发MMN。该模型在高维空间中运行,模拟了听觉皮层中声音编码的丰富特征。我们在各种简单的古怪范式上测试了所提出的方案,这些范式适应于声音的各种特征:音调、强度、方向和刺激间隔。当偏差在一个或多个计算维度上偏离标准时,我们的模型成功地找到了偏差的开始时间。我们的研究结果不仅为更复杂的MMN引出建模奠定了基础,而且还为时间信号的异常值检测和最终的听觉场景解析提供了一种通用和强大的机制。
{"title":"A model of auditory deviance detection","authors":"Emine Merve Kaya, Mounya Elhilali","doi":"10.1109/CISS.2013.6552254","DOIUrl":"https://doi.org/10.1109/CISS.2013.6552254","url":null,"abstract":"A key component in computational analysis of the auditory environment is the detection of novel sounds in the scene. Deviance detection aids in the segmentation of auditory objects and is also the basis of bottom-up auditory saliency, which is crucial in directing attention to relevant events. There is growing evidence that deviance detection is executed in the brain through mapping of the temporal regularities in the acoustic scene. The violation of these regularities is reflected as mismatch negativity (MMN), a signature electrical response observed using electro-encephalograpy (EEG) or magneto-encephalograpy (MEG). While numerous experimental results have quantified the properties of this MMN response, there have been few attempts at developing general computational frameworks of MMN that can be integrated in comprehensive models of scene analysis. In this work, we interpret the underlying mechanism of the MMN response as a Kalman-filter formulation that provides a recursive prediction of sound features based on the past sensory information; eliciting an MMN when predictions are violated. The model operates in a high-dimensional space, mimicking the rich set of features that underlie sound encoding up the level of auditory cortex. We test the proposed scheme on a variety of simple oddball paradigms adapted to various features of sounds: Pitch, intensity, direction, and inter-stimulus interval. Our model successfully finds the deviant onset times when the deviant varies from the standard in one or more of the calculated dimensions. Our results not only lay a foundation for modeling more complex elicitations of MMN, but also provide a versatile and robust mechanism for outlier detection in temporal signals and ultimately parsing of auditory scenes.","PeriodicalId":268095,"journal":{"name":"2013 47th Annual Conference on Information Sciences and Systems (CISS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127992154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Low-complexity methods for soft estimation of QAM Symbols QAM符号软估计的低复杂度方法
Pub Date : 2013-03-20 DOI: 10.1109/CISS.2013.6552343
G. Yue, S. Rangarajan
In this paper, we develop low-complexity methods to compute the soft estimation of quadrature amplitude modulation (QAM) symbols with applications to iterative receivers. To reduce the complexity of the soft QAM estimation, we first consider squared QAM constellations and present a bit flipping based soft estimation scheme. With the gray mapping we derive an efficient approach which has a very low complexity of O(log N) for an NQAM constellation. To further simplify the approach, we propose a method which completely removes the multiplication operations at a cost of a slight performance degradation. Finally, we extend the proposed method to the non-squared QAM.
在本文中,我们开发了一种低复杂度的方法来计算正交调幅(QAM)符号的软估计,并应用于迭代接收机。为了降低软QAM估计的复杂性,我们首先考虑平方QAM星座,提出了一种基于位翻转的软估计方案。利用灰度映射,我们得到了一种求解NQAM星座的有效方法,该方法的复杂度非常低,为O(log N)。为了进一步简化该方法,我们提出了一种方法,该方法以轻微的性能下降为代价完全消除乘法操作。最后,我们将该方法推广到非平方QAM。
{"title":"Low-complexity methods for soft estimation of QAM Symbols","authors":"G. Yue, S. Rangarajan","doi":"10.1109/CISS.2013.6552343","DOIUrl":"https://doi.org/10.1109/CISS.2013.6552343","url":null,"abstract":"In this paper, we develop low-complexity methods to compute the soft estimation of quadrature amplitude modulation (QAM) symbols with applications to iterative receivers. To reduce the complexity of the soft QAM estimation, we first consider squared QAM constellations and present a bit flipping based soft estimation scheme. With the gray mapping we derive an efficient approach which has a very low complexity of O(log N) for an NQAM constellation. To further simplify the approach, we propose a method which completely removes the multiplication operations at a cost of a slight performance degradation. Finally, we extend the proposed method to the non-squared QAM.","PeriodicalId":268095,"journal":{"name":"2013 47th Annual Conference on Information Sciences and Systems (CISS)","volume":"35 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128606205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Optimal strategies in jamming resistant uncoordinated frequency hopping systems 抗干扰非协调跳频系统的优化策略
Pub Date : 2013-03-20 DOI: 10.1109/CISS.2013.6552328
Bingwen Zhang, L. Lai
Uncoordinated frequency hopping (UFH) has recently emerged as an effective mechanism to defend against jamming attacks. Existing research focuses on the optimal design of the hopping pattern, which implicitly assumes that the strategy of the attacker is fixed. In practice, the attacker might adjust its strategy to maximize its damage on the communication system. In this paper, we study the design of optimal hopping pattern (the defense strategy) as long as the optimal jamming pattern (the attack strategy). In particular, we model the dynamic between the legitimate users and the attacker as a zero sum game, and study the property of this game. We show that when the legitimate users and the jammer can access only one channel at any time, the game has a unique Nash equilibrium. In the Nash equilibrium, the legitimate users and Eve will access or jam only a subset of channels that have good channel quality. Furthermore, the better the channel, the larger the probability that Eve will jam the channel and the smaller the probability the legitimate users will access this channel. We further extend the study to multiple access multiple jamming case and characterize the Nash equilibrium. We also give numerical results to illustrate the analytical results derived in this paper.
近年来,非协调跳频(UFH)技术作为一种有效的抗干扰机制应运而生。现有的研究主要集中在跳跃模式的优化设计上,它隐含地假设攻击者的策略是固定的。在实践中,攻击者可能会调整策略,使其对通信系统的破坏最大化。本文研究了最优跳跃模式(防御策略)和最优干扰模式(攻击策略)的设计。特别地,我们将合法用户和攻击者之间的动态建模为零和博弈,并研究了这种博弈的性质。我们证明,当合法用户和干扰者在任何时间只能访问一个频道时,游戏具有独特的纳什均衡。在纳什均衡中,合法用户和Eve只会访问或干扰具有良好信道质量的信道子集。此外,信道越好,Eve阻塞信道的可能性就越大,合法用户访问该信道的可能性就越小。我们进一步将研究扩展到多址多干扰情况,并描述了纳什均衡。文中还给出了数值结果来说明本文的分析结果。
{"title":"Optimal strategies in jamming resistant uncoordinated frequency hopping systems","authors":"Bingwen Zhang, L. Lai","doi":"10.1109/CISS.2013.6552328","DOIUrl":"https://doi.org/10.1109/CISS.2013.6552328","url":null,"abstract":"Uncoordinated frequency hopping (UFH) has recently emerged as an effective mechanism to defend against jamming attacks. Existing research focuses on the optimal design of the hopping pattern, which implicitly assumes that the strategy of the attacker is fixed. In practice, the attacker might adjust its strategy to maximize its damage on the communication system. In this paper, we study the design of optimal hopping pattern (the defense strategy) as long as the optimal jamming pattern (the attack strategy). In particular, we model the dynamic between the legitimate users and the attacker as a zero sum game, and study the property of this game. We show that when the legitimate users and the jammer can access only one channel at any time, the game has a unique Nash equilibrium. In the Nash equilibrium, the legitimate users and Eve will access or jam only a subset of channels that have good channel quality. Furthermore, the better the channel, the larger the probability that Eve will jam the channel and the smaller the probability the legitimate users will access this channel. We further extend the study to multiple access multiple jamming case and characterize the Nash equilibrium. We also give numerical results to illustrate the analytical results derived in this paper.","PeriodicalId":268095,"journal":{"name":"2013 47th Annual Conference on Information Sciences and Systems (CISS)","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115999878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Biorealistic spiking neural network on FPGA 基于FPGA的生物现实脉冲神经网络
Pub Date : 2013-03-20 DOI: 10.1109/CISS.2013.6616689
Matthieu Ambroise, T. Levi, Y. Bornat, S. Saighi
In this paper, we present a digital hardware implementation of a biorealistic spiking neural network composed of 117 Izhikevich neurons. This digital system works in hard real-time, which means that it keeps the same biological time of simulation at the millisecond scale. The Izhikevich neuron implementation requires few resources. The neurons behavior is validated by comparing their firing rate to biological data. The interneuron connections are composed of biorealistic synapses. The architecture of the network implementation allows working on a single computation core. It is freely configurable from an independent-neuron configuration to all-to-all configuration or a mix with several independent small networks. This spiking neural network will be used for the development of a new proof-of-concept Brain Machine Interface, i.e. a neuromorphic chip for neuroprosthesis, which has to replace the functionality of a damaged part of the central nervous system.
在本文中,我们提出了一种由117个Izhikevich神经元组成的生物现实脉冲神经网络的数字硬件实现。这个数字系统工作在硬实时,这意味着它保持相同的生物时间在毫秒级的模拟。Izhikevich神经元的实现需要很少的资源。神经元的行为是通过比较它们的放电率和生物数据来验证的。神经元间的连接是由生物现实的突触组成的。网络实现的体系结构允许在单个计算核心上工作。它可以自由配置,从独立神经元配置到全对全配置,或者与几个独立的小网络混合。这种脉冲神经网络将用于开发一种新的概念验证脑机接口,即用于神经假体的神经形态芯片,它必须取代中枢神经系统受损部分的功能。
{"title":"Biorealistic spiking neural network on FPGA","authors":"Matthieu Ambroise, T. Levi, Y. Bornat, S. Saighi","doi":"10.1109/CISS.2013.6616689","DOIUrl":"https://doi.org/10.1109/CISS.2013.6616689","url":null,"abstract":"In this paper, we present a digital hardware implementation of a biorealistic spiking neural network composed of 117 Izhikevich neurons. This digital system works in hard real-time, which means that it keeps the same biological time of simulation at the millisecond scale. The Izhikevich neuron implementation requires few resources. The neurons behavior is validated by comparing their firing rate to biological data. The interneuron connections are composed of biorealistic synapses. The architecture of the network implementation allows working on a single computation core. It is freely configurable from an independent-neuron configuration to all-to-all configuration or a mix with several independent small networks. This spiking neural network will be used for the development of a new proof-of-concept Brain Machine Interface, i.e. a neuromorphic chip for neuroprosthesis, which has to replace the functionality of a damaged part of the central nervous system.","PeriodicalId":268095,"journal":{"name":"2013 47th Annual Conference on Information Sciences and Systems (CISS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117183359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Variable rate adaptive modulation (VRAM) for introducing small-world model into WSNs 在无线传感器网络中引入小世界模型的可变速率自适应调制(VRAM)
Pub Date : 2013-03-20 DOI: 10.1109/CISS.2013.6552329
Waqar Asif, H. K. Qureshi, M. Rajarajan
Data communication has a strong impact on the design of a Wireless Sensor Network (WSN), since the data transmission energy cost is typically higher than the data processing cost. In order to reduce the data transmission cost, small world phenomenon is introduced into WSNs. Networks that do not have the small world structure can be converted to achieve a small world property by the addition of few extra links. The problem is that most large scale WSNs are inherently unstructured and a node has no precise information of the overall model of the network and thus has to rely on the knowledge of its neighbor. For this reason, in most unstructured networks, information is propagated using gossiping. In this paper, we exploit this information propagation mechanism and use Neighbor Avoiding Walk (NAW), where the information is propagated to node that has not been visited previously and which is not the neighbor of a previously visited node. Using this, a novel approach is presented, in which nodes with highest betweenness centrality form a long distance relay path by using a lower order modulation scheme and therefore resulting in a relatively reduced data rate, but maintaining the same bit error rate. Our empirical and analytical evaluations demonstrate that this leads to a significant reduction in average path length and an increase in node degree.
数据通信对无线传感器网络(WSN)的设计有很大的影响,因为数据传输的能量成本通常高于数据处理的成本。为了降低数据传输成本,在无线传感器网络中引入小世界现象。没有小世界结构的网络可以通过添加一些额外的链接来转换成小世界属性。问题是大多数大规模wsn本质上是非结构化的,节点没有网络整体模型的精确信息,因此必须依赖其邻居的知识。因此,在大多数非结构化网络中,信息是通过八卦传播的。在本文中,我们利用这种信息传播机制,并使用邻居避免行走(NAW),其中信息传播到以前没有访问过的节点,并且不是以前访问过的节点的邻居。在此基础上,提出了一种新颖的方法,该方法采用低阶调制方案,使具有最高中间度的节点形成长距离中继路径,从而在保持相同误码率的情况下相对降低数据速率。我们的实证和分析评估表明,这导致平均路径长度的显著减少和节点度的增加。
{"title":"Variable rate adaptive modulation (VRAM) for introducing small-world model into WSNs","authors":"Waqar Asif, H. K. Qureshi, M. Rajarajan","doi":"10.1109/CISS.2013.6552329","DOIUrl":"https://doi.org/10.1109/CISS.2013.6552329","url":null,"abstract":"Data communication has a strong impact on the design of a Wireless Sensor Network (WSN), since the data transmission energy cost is typically higher than the data processing cost. In order to reduce the data transmission cost, small world phenomenon is introduced into WSNs. Networks that do not have the small world structure can be converted to achieve a small world property by the addition of few extra links. The problem is that most large scale WSNs are inherently unstructured and a node has no precise information of the overall model of the network and thus has to rely on the knowledge of its neighbor. For this reason, in most unstructured networks, information is propagated using gossiping. In this paper, we exploit this information propagation mechanism and use Neighbor Avoiding Walk (NAW), where the information is propagated to node that has not been visited previously and which is not the neighbor of a previously visited node. Using this, a novel approach is presented, in which nodes with highest betweenness centrality form a long distance relay path by using a lower order modulation scheme and therefore resulting in a relatively reduced data rate, but maintaining the same bit error rate. Our empirical and analytical evaluations demonstrate that this leads to a significant reduction in average path length and an increase in node degree.","PeriodicalId":268095,"journal":{"name":"2013 47th Annual Conference on Information Sciences and Systems (CISS)","volume":"1958 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128034043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Formal analysis for practical gain sequence selection in recursive stochastic approximation algorithms 递归随机逼近算法中实际增益序列选择的形式化分析
Pub Date : 2013-03-20 DOI: 10.1109/CISS.2013.6552320
Qi Wang
For many popular stochastic approximation algorithms, such as simultaneous perturbation stochastic approximation method and stochastic gradient method, the practical gain sequence selections are different from the optimal selection, which is theoretically derived from asymptotically performance. We provide formal justification for the reasons why we choose such gain sequence in practice.
对于许多流行的随机逼近算法,如同步摄动随机逼近法和随机梯度法,实际增益序列的选择与最优选择是不同的,最优选择在理论上是由渐近性能推导出来的。我们提供了在实践中选择这种增益序列的正式理由。
{"title":"Formal analysis for practical gain sequence selection in recursive stochastic approximation algorithms","authors":"Qi Wang","doi":"10.1109/CISS.2013.6552320","DOIUrl":"https://doi.org/10.1109/CISS.2013.6552320","url":null,"abstract":"For many popular stochastic approximation algorithms, such as simultaneous perturbation stochastic approximation method and stochastic gradient method, the practical gain sequence selections are different from the optimal selection, which is theoretically derived from asymptotically performance. We provide formal justification for the reasons why we choose such gain sequence in practice.","PeriodicalId":268095,"journal":{"name":"2013 47th Annual Conference on Information Sciences and Systems (CISS)","volume":"602 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121979416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust knowledge-aided multipath channel identification based on partial filter information 基于部分滤波信息的鲁棒知识辅助多径信道识别
Pub Date : 2013-03-20 DOI: 10.1109/CISS.2013.6624261
Kuang Cai, Hongbin Li, J. Mitola
The subspace method is an effective approach for blind channel identification. It works in the case when information such as the pulse shaping filter and the anti-aliasing filter responses are fully known. In practice, unknown perturbation may cause the transmitter/receiver filter response to be partially known, such as with I/Q imbalance and distortions of the filter due to environmental factors (temperature, humidity. etc.). Here we introduce two blind channel identification algorithms for two common situations, improving the performance of channel identification in cases when perturbation exists. Specifically, if the perturbation is totally unknown, we propose an iterative channel identification algorithm; for the situation in which some statistical knowledge of perturbation, such as the covariance of the perturbation, is known, we propose a robust knowledgeaided iterative channel identification algorithm to improve the estimation accuracy. Our simulation results demonstrate the performance of our new approaches.
子空间方法是一种有效的盲信道识别方法。它在脉冲整形滤波器和抗混叠滤波器响应等信息完全已知的情况下工作。在实践中,未知的扰动可能会导致发射器/接收器滤波器响应的部分已知,例如由于环境因素(温度,湿度)导致的I/Q不平衡和滤波器的畸变。等等)。本文针对两种常见情况,介绍了两种盲信道识别算法,提高了存在摄动情况下的信道识别性能。具体来说,如果扰动是完全未知的,我们提出了一种迭代信道识别算法;针对摄动的协方差等统计知识已知的情况,提出了一种鲁棒的知识辅助迭代信道识别算法,以提高估计精度。仿真结果验证了新方法的有效性。
{"title":"Robust knowledge-aided multipath channel identification based on partial filter information","authors":"Kuang Cai, Hongbin Li, J. Mitola","doi":"10.1109/CISS.2013.6624261","DOIUrl":"https://doi.org/10.1109/CISS.2013.6624261","url":null,"abstract":"The subspace method is an effective approach for blind channel identification. It works in the case when information such as the pulse shaping filter and the anti-aliasing filter responses are fully known. In practice, unknown perturbation may cause the transmitter/receiver filter response to be partially known, such as with I/Q imbalance and distortions of the filter due to environmental factors (temperature, humidity. etc.). Here we introduce two blind channel identification algorithms for two common situations, improving the performance of channel identification in cases when perturbation exists. Specifically, if the perturbation is totally unknown, we propose an iterative channel identification algorithm; for the situation in which some statistical knowledge of perturbation, such as the covariance of the perturbation, is known, we propose a robust knowledgeaided iterative channel identification algorithm to improve the estimation accuracy. Our simulation results demonstrate the performance of our new approaches.","PeriodicalId":268095,"journal":{"name":"2013 47th Annual Conference on Information Sciences and Systems (CISS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125306579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rate balancing in the vector BC with erroneous CSI at the receivers 在接收端有错误CSI的矢量BC中的速率平衡
Pub Date : 2013-03-20 DOI: 10.1109/CISS.2013.6552294
M. Joham, Andreas Gründinger, A. Pastore, J. Fonollosa, W. Utschick
For the vector broadcast channel (BC), the case of erroneous channel state information (CSI) at the receiver is considered. Employing a well established lower bound for the mutual information with Gaussian signaling, a rate balancing problem is formulated where the rates of the different users are maximized under a transmit power constraint, but the rates of the different users have fixed ratios. A duality w.r.t. the signal-to-interference-and-noise ratio (SINR) between the vector BC with erroneous receiver CSI and an appropriately constructed vector multiple access channel (MAC) is established. Based on the observation that an interference function can be defined in the dual vector MAC that is standard, an iterative algorithm can be found for an appropriately formulated quality-of-service (QoS) optimization that is used for solving the balancing problem.
对于矢量广播信道(BC),考虑了接收端错误信道状态信息(CSI)的情况。利用高斯信号的互信息下界,提出了一个速率平衡问题,其中不同用户的速率在发射功率约束下最大化,但不同用户的速率具有固定的比率。建立了带有错误接收端CSI的矢量BC与适当构造的矢量多址信道(MAC)之间的信噪比对偶关系。基于对标准双向量MAC中可以定义干扰函数的观察,可以找到一种迭代算法,用于适当制定用于解决平衡问题的服务质量(QoS)优化。
{"title":"Rate balancing in the vector BC with erroneous CSI at the receivers","authors":"M. Joham, Andreas Gründinger, A. Pastore, J. Fonollosa, W. Utschick","doi":"10.1109/CISS.2013.6552294","DOIUrl":"https://doi.org/10.1109/CISS.2013.6552294","url":null,"abstract":"For the vector broadcast channel (BC), the case of erroneous channel state information (CSI) at the receiver is considered. Employing a well established lower bound for the mutual information with Gaussian signaling, a rate balancing problem is formulated where the rates of the different users are maximized under a transmit power constraint, but the rates of the different users have fixed ratios. A duality w.r.t. the signal-to-interference-and-noise ratio (SINR) between the vector BC with erroneous receiver CSI and an appropriately constructed vector multiple access channel (MAC) is established. Based on the observation that an interference function can be defined in the dual vector MAC that is standard, an iterative algorithm can be found for an appropriately formulated quality-of-service (QoS) optimization that is used for solving the balancing problem.","PeriodicalId":268095,"journal":{"name":"2013 47th Annual Conference on Information Sciences and Systems (CISS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133957012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A novel preamble-based robust coarse symbol timing estimators for OFDM systems 一种基于前导的OFDM系统鲁棒粗符号定时估计方法
Pub Date : 2013-03-20 DOI: 10.1109/CISS.2013.6552313
F. Yang, Xi Zhang, Jingsong Leng
In this paper, we propose a preamble-based symbol timing estimator for wireless orthogonal frequency division multiplexing (OFDM) systems. The preamble is designed with repeated structure. By using several candidate sequences generated by the preamble, the addressed estimator is robust to the degree of channel distortions. The generated sequences with the best correlation properties are selected based on correlation ranking. Compared with the existing representative schemes, our estimator has performance improvement in ETU channel with acceptable complexity.
本文提出了一种用于无线正交频分复用(OFDM)系统的基于前导的符号时序估计器。前言采用重复结构设计。通过使用由前导产生的多个候选序列,寻址估计器对信道失真的程度具有鲁棒性。根据相关性排序,选择具有最佳相关性的生成序列。与已有的代表性方案相比,我们的估计方法在复杂度可接受的ETU信道中性能有所提高。
{"title":"A novel preamble-based robust coarse symbol timing estimators for OFDM systems","authors":"F. Yang, Xi Zhang, Jingsong Leng","doi":"10.1109/CISS.2013.6552313","DOIUrl":"https://doi.org/10.1109/CISS.2013.6552313","url":null,"abstract":"In this paper, we propose a preamble-based symbol timing estimator for wireless orthogonal frequency division multiplexing (OFDM) systems. The preamble is designed with repeated structure. By using several candidate sequences generated by the preamble, the addressed estimator is robust to the degree of channel distortions. The generated sequences with the best correlation properties are selected based on correlation ranking. Compared with the existing representative schemes, our estimator has performance improvement in ETU channel with acceptable complexity.","PeriodicalId":268095,"journal":{"name":"2013 47th Annual Conference on Information Sciences and Systems (CISS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133088024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2013 47th Annual Conference on Information Sciences and Systems (CISS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1