Pub Date : 2016-12-12DOI: 10.1109/ISSPIT.2016.7886011
Robert Chreiky, G. Delmaire, M. Puigt, G. Roussel, A. Abche
Source apportionment is usually tackled with blind Positive/Non-negative Matrix factorization (PMF/NMF) methods. However, the obtained results may be poor due to the dependence between some rows of the second factor. We recently proposed to inform the estimation of this factor using some prior knowledge provided by chemists—some entries are set to some fixed values—and the sum-to-one property of each row. These constraints were recently taken into account by using a parameterization which gathers all of them. In this paper, a novel robust NMF approach able to cope with outliers is proposed. For that purpose, we consider the Huber loss function—a ℓ2-ℓ1 cost function—which is robust to outliers, contrary to the Frobenius norm classically met in NMF. We thus propose new update rules for the informed Huber NMF in the framework of the split gradient techniques. The choice of the adaptive cutoff parameter—which links both single cost functions—is discussed along this paper. The proposed approach is shown to outperform state-of-the-art methods on several source apportionment simulations involving various input SNRs and outliers.
{"title":"Informed Split Gradient Non-negative Matrix factorization using Huber cost function for source apportionment","authors":"Robert Chreiky, G. Delmaire, M. Puigt, G. Roussel, A. Abche","doi":"10.1109/ISSPIT.2016.7886011","DOIUrl":"https://doi.org/10.1109/ISSPIT.2016.7886011","url":null,"abstract":"Source apportionment is usually tackled with blind Positive/Non-negative Matrix factorization (PMF/NMF) methods. However, the obtained results may be poor due to the dependence between some rows of the second factor. We recently proposed to inform the estimation of this factor using some prior knowledge provided by chemists—some entries are set to some fixed values—and the sum-to-one property of each row. These constraints were recently taken into account by using a parameterization which gathers all of them. In this paper, a novel robust NMF approach able to cope with outliers is proposed. For that purpose, we consider the Huber loss function—a ℓ2-ℓ1 cost function—which is robust to outliers, contrary to the Frobenius norm classically met in NMF. We thus propose new update rules for the informed Huber NMF in the framework of the split gradient techniques. The choice of the adaptive cutoff parameter—which links both single cost functions—is discussed along this paper. The proposed approach is shown to outperform state-of-the-art methods on several source apportionment simulations involving various input SNRs and outliers.","PeriodicalId":371691,"journal":{"name":"2016 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133745372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ISSPIT.2016.7886034
Ahmad Bazzi, D. Slock, Lisa Meilhac
This paper presents an iterative Variational Bayes (VB) algorithm that allows sparse recovery of the desired transmitted vector. The VB algorithm is derived based on the latent variables introduced in the Bayesian model in hand. The proposed algorithm is applied to the Angle-of-Arrival (AoA) estimation problem and simulations demonstrate the potential of the proposed VB algorithm when compared to existing sparse recovery and compressed sensing algorithms, especially in the case of closely spaced sources. Furthermore, the proposed algorithm does not require prior knowledge of the number of sources and operates with only one snapshot.
{"title":"Sparse recovery using an iterative Variational Bayes algorithm and application to AoA estimation","authors":"Ahmad Bazzi, D. Slock, Lisa Meilhac","doi":"10.1109/ISSPIT.2016.7886034","DOIUrl":"https://doi.org/10.1109/ISSPIT.2016.7886034","url":null,"abstract":"This paper presents an iterative Variational Bayes (VB) algorithm that allows sparse recovery of the desired transmitted vector. The VB algorithm is derived based on the latent variables introduced in the Bayesian model in hand. The proposed algorithm is applied to the Angle-of-Arrival (AoA) estimation problem and simulations demonstrate the potential of the proposed VB algorithm when compared to existing sparse recovery and compressed sensing algorithms, especially in the case of closely spaced sources. Furthermore, the proposed algorithm does not require prior knowledge of the number of sources and operates with only one snapshot.","PeriodicalId":371691,"journal":{"name":"2016 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115272342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ISSPIT.2016.7886050
D. Prasad, M. Srivastava, Laxya, Farah Jabin, Ghania Fatima, S. Khan, Safa Tanzeem
PID is most widely used in industrial process control. Voltage Differencing Transconductance Amplifier (VDTA) which is recently more popular in analog signal processing applications is discussed and integrated a proportional-integral-derivative (PID) controller. The proposed controller needs minimum number of active and passive components and demonstrates independent/electronic tuning of control parameters. In order to verify the suggested controller and controller's effect on second order step response of a VDTA based circuit is analyzed and presented in section II. The theoretical analysis proposed in this paper is tested through Or-CAD SPICE 9.1 simulations with TSMC 180nm CMOS process parameters.
{"title":"Novel active PID controller employing VDTA","authors":"D. Prasad, M. Srivastava, Laxya, Farah Jabin, Ghania Fatima, S. Khan, Safa Tanzeem","doi":"10.1109/ISSPIT.2016.7886050","DOIUrl":"https://doi.org/10.1109/ISSPIT.2016.7886050","url":null,"abstract":"PID is most widely used in industrial process control. Voltage Differencing Transconductance Amplifier (VDTA) which is recently more popular in analog signal processing applications is discussed and integrated a proportional-integral-derivative (PID) controller. The proposed controller needs minimum number of active and passive components and demonstrates independent/electronic tuning of control parameters. In order to verify the suggested controller and controller's effect on second order step response of a VDTA based circuit is analyzed and presented in section II. The theoretical analysis proposed in this paper is tested through Or-CAD SPICE 9.1 simulations with TSMC 180nm CMOS process parameters.","PeriodicalId":371691,"journal":{"name":"2016 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127505079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ISSPIT.2016.7886018
R. Mesleh, Abdelhamid Younis
Capacity analysis for line-of-sight (LOS) millimeter-wave (mmWave) quadrature spatial modulation (QSM) multiple-input multiple-output (MIMO) system is presented in this paper. QSM is a new MIMO technique proposed to enhance the performance of conventional spatial modulation (SM) while retaining almost all its inherent advantages. Furthermore, mmWave utilizes a license-free wide-bandwidth spectrum and is a very promising candidate for future wireless systems. Detailed and novel analysis of the mutual information and the achievable capacity for mmWave-QSM system are presented in this study. The conditions under which theoretical capacity can be achieved are derived and discussed. Monte Carlo simulation results are provided to corroborate derived formulas. It is shown that significant performance enhancements can be achieved under different system and channel configurations.
{"title":"LOS millimeter-wave communication with quadrature spatial modulation","authors":"R. Mesleh, Abdelhamid Younis","doi":"10.1109/ISSPIT.2016.7886018","DOIUrl":"https://doi.org/10.1109/ISSPIT.2016.7886018","url":null,"abstract":"Capacity analysis for line-of-sight (LOS) millimeter-wave (mmWave) quadrature spatial modulation (QSM) multiple-input multiple-output (MIMO) system is presented in this paper. QSM is a new MIMO technique proposed to enhance the performance of conventional spatial modulation (SM) while retaining almost all its inherent advantages. Furthermore, mmWave utilizes a license-free wide-bandwidth spectrum and is a very promising candidate for future wireless systems. Detailed and novel analysis of the mutual information and the achievable capacity for mmWave-QSM system are presented in this study. The conditions under which theoretical capacity can be achieved are derived and discussed. Monte Carlo simulation results are provided to corroborate derived formulas. It is shown that significant performance enhancements can be achieved under different system and channel configurations.","PeriodicalId":371691,"journal":{"name":"2016 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114408605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ISSPIT.2016.7886002
Rania R. Ziedan, Michael N. Micheal, Abdulwahab K. Alsammak, M. Mursi, Adel Said Elmaghraby
This article proposes a gender and geographical origin recognition system for Arabic speakers based on the dialect and accent characteristics. We demonstrate that the speaker gender and nationality can be determined from colloquial Arabic speech and recommend that this system can be integrated to more complex biometric applications. The acoustic features of our proposed dataset used to identify the speaker's dialect and accent, are extracted using Mel Frequency Cepstral Coefficients (MFCC) and Relative Spectral Analysis (RASTA) techniques. We compare results of classification based on Gaussian Mixture Model with Universal Background Model (GMM-UBM) and Identity Vector (I-vector) classifiers implemented using the MSR Identity Toolbox, which is a MATLAB toolbox for speaker-recognition research from Microsoft. The results show a significant decrease of equal error rate (EER) when recognizing dialect or accent based on gender. In addition, feature fusion of RASTA and MFCC is used to enhance the EER. Results show a 9.8% enhancement in EER over using the RASTA features only.
{"title":"Improved dialect recognition for colloquial Arabic speakers","authors":"Rania R. Ziedan, Michael N. Micheal, Abdulwahab K. Alsammak, M. Mursi, Adel Said Elmaghraby","doi":"10.1109/ISSPIT.2016.7886002","DOIUrl":"https://doi.org/10.1109/ISSPIT.2016.7886002","url":null,"abstract":"This article proposes a gender and geographical origin recognition system for Arabic speakers based on the dialect and accent characteristics. We demonstrate that the speaker gender and nationality can be determined from colloquial Arabic speech and recommend that this system can be integrated to more complex biometric applications. The acoustic features of our proposed dataset used to identify the speaker's dialect and accent, are extracted using Mel Frequency Cepstral Coefficients (MFCC) and Relative Spectral Analysis (RASTA) techniques. We compare results of classification based on Gaussian Mixture Model with Universal Background Model (GMM-UBM) and Identity Vector (I-vector) classifiers implemented using the MSR Identity Toolbox, which is a MATLAB toolbox for speaker-recognition research from Microsoft. The results show a significant decrease of equal error rate (EER) when recognizing dialect or accent based on gender. In addition, feature fusion of RASTA and MFCC is used to enhance the EER. Results show a 9.8% enhancement in EER over using the RASTA features only.","PeriodicalId":371691,"journal":{"name":"2016 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128755108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ISSPIT.2016.7886032
Chengjie Li, Lidong Zhu, Zhongqiang Luo
Today's blind signal separation (BSS) processes are often controlled and supported by information systems. These systems record discrete time-frequency domain information about mixed signal during their executions. So, blind source separation problem (BSS) is transformed into data classification problem. In this paper, a novel Density Clustering algorithm (DC-algorithm) is proposed for frequency hopping signal under-determined blind source separation. Different from traditional methods, we formulate the separation problem as clustering problem, which is motivated by the fact that the mixed signal is sparse and the energy difference is as large as possible to satisfy cluster centers that are surrounded by neighbors with local lower density. In our method, we accomplish the underdetermined blind source separation by firstly computing the Short Time Fourier Transform (STFT) of each observation, secondly, formulating the separation problem as clustering problem. In this process, a new pair of cost functions are designed to improve the clustering. We verify the proposed method on several simulations. The experimental results demonstrate the effectiveness of the proposed method.
{"title":"Big time-frequency domain data mining for underdetermined BSS using density component analysis","authors":"Chengjie Li, Lidong Zhu, Zhongqiang Luo","doi":"10.1109/ISSPIT.2016.7886032","DOIUrl":"https://doi.org/10.1109/ISSPIT.2016.7886032","url":null,"abstract":"Today's blind signal separation (BSS) processes are often controlled and supported by information systems. These systems record discrete time-frequency domain information about mixed signal during their executions. So, blind source separation problem (BSS) is transformed into data classification problem. In this paper, a novel Density Clustering algorithm (DC-algorithm) is proposed for frequency hopping signal under-determined blind source separation. Different from traditional methods, we formulate the separation problem as clustering problem, which is motivated by the fact that the mixed signal is sparse and the energy difference is as large as possible to satisfy cluster centers that are surrounded by neighbors with local lower density. In our method, we accomplish the underdetermined blind source separation by firstly computing the Short Time Fourier Transform (STFT) of each observation, secondly, formulating the separation problem as clustering problem. In this process, a new pair of cost functions are designed to improve the clustering. We verify the proposed method on several simulations. The experimental results demonstrate the effectiveness of the proposed method.","PeriodicalId":371691,"journal":{"name":"2016 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129535636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ISSPIT.2016.7886028
A. Nomura, K. Okada, Y. Mizukami
This paper proposes a reaction-diffusion algorithm for image edge detection in the framework of FitzHugh-Nagumo model. FitzHugh-Nagumo model has two variables, activator and inhibitor, which are governed by two timeevolving differential equations, respectively, for simulating a process of biological excitation and inhibition phenomenon observed along a nerve. The proposed algorithm places FitzHugh-Nagumo elements, which contains a pair of activator and inhibitor variables, at the image grids. At first, the algorithm gives initial conditions of the elements according to an inputted gray level image. Then, it performs preprocessing for reducing noise by using only inhibition equation at the elements, and finally performs edge-detection by using both excitation and inhibition equations. The performance of the proposed algorithm is investigated with artificial and real images.
{"title":"Preprocessing in a reaction-diffusion algorithm designed for image edge detection","authors":"A. Nomura, K. Okada, Y. Mizukami","doi":"10.1109/ISSPIT.2016.7886028","DOIUrl":"https://doi.org/10.1109/ISSPIT.2016.7886028","url":null,"abstract":"This paper proposes a reaction-diffusion algorithm for image edge detection in the framework of FitzHugh-Nagumo model. FitzHugh-Nagumo model has two variables, activator and inhibitor, which are governed by two timeevolving differential equations, respectively, for simulating a process of biological excitation and inhibition phenomenon observed along a nerve. The proposed algorithm places FitzHugh-Nagumo elements, which contains a pair of activator and inhibitor variables, at the image grids. At first, the algorithm gives initial conditions of the elements according to an inputted gray level image. Then, it performs preprocessing for reducing noise by using only inhibition equation at the elements, and finally performs edge-detection by using both excitation and inhibition equations. The performance of the proposed algorithm is investigated with artificial and real images.","PeriodicalId":371691,"journal":{"name":"2016 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133946738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ISSPIT.2016.7886007
Yousra Almathami, R. Ammar
A major concern for Air traffic controllers (ATC) are facing on a daily basis are controlled Airspace (CAS) infringements. An infringement is when aircraft penetrates CASs without an advanced clearance from the ATC. These infringement may cause a conflict or a midair collision with a commercial aircraft flying within CAS. As a result, a ground based safety net called Controlled Airspace infringement Tool (CAIT) is used by ATCs which warns them if any aircraft within uncontrolled airspace (UCAS) has penetrated (CAS). In our previous paper, we developed a probabilistic CAS infringement tool (PCAIT) that predicts future aircraft locations using the Kalman filter and calculate their probability of infringement. In this paper, we review the factors behind CAS infringements and build a classifier based on them to enhance our decision about future infringements. This model “warning system” could provide ATCs with more time to resolve any possible future conflicts.
{"title":"Controlled Airspace infringements and warning system","authors":"Yousra Almathami, R. Ammar","doi":"10.1109/ISSPIT.2016.7886007","DOIUrl":"https://doi.org/10.1109/ISSPIT.2016.7886007","url":null,"abstract":"A major concern for Air traffic controllers (ATC) are facing on a daily basis are controlled Airspace (CAS) infringements. An infringement is when aircraft penetrates CASs without an advanced clearance from the ATC. These infringement may cause a conflict or a midair collision with a commercial aircraft flying within CAS. As a result, a ground based safety net called Controlled Airspace infringement Tool (CAIT) is used by ATCs which warns them if any aircraft within uncontrolled airspace (UCAS) has penetrated (CAS). In our previous paper, we developed a probabilistic CAS infringement tool (PCAIT) that predicts future aircraft locations using the Kalman filter and calculate their probability of infringement. In this paper, we review the factors behind CAS infringements and build a classifier based on them to enhance our decision about future infringements. This model “warning system” could provide ATCs with more time to resolve any possible future conflicts.","PeriodicalId":371691,"journal":{"name":"2016 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133600498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ISSPIT.2016.7886041
Ali Alsaadi, Anup Kumar, Bin Xie, Adel Said Elmaghraby
In this paper, MobiX technology provides security for online services using mobile devices with a wide range of customers including governments, military, business enterprises, and scientific organization, and individuals have been proposed. MobiX is a software security solution technology to enhance the networked mobile device trustworthiness, application integrity, preventing users from malware attacks. MobiX provides two authentication layers and two additional security layers in addition to the conventional username-password for mobile devices in a unique system design. MobiX is fully implemented by software; therefore, it can be quickly deployed into different legacy mobile devices. More importantly, the novel device authenticity is based on the one-way a keyless cryptographic hash function and on the Generalized Concatenated Code Physically Unclonable Function (GCCPUF) to effectively protect the users from different attack vectors such as insiders, spoofing attack, or identity theft attacks. On the other hand, the app authenticity prevents malware and app-tempering cybersecurity attacks via an efficient and secure remote attestation protocol. The comprehensive protection architecture of MobiX would enable M-commerce with superior security capabilities compared with the existing solutions.
{"title":"MobiX: A software proposal based authentication service for mobile devices","authors":"Ali Alsaadi, Anup Kumar, Bin Xie, Adel Said Elmaghraby","doi":"10.1109/ISSPIT.2016.7886041","DOIUrl":"https://doi.org/10.1109/ISSPIT.2016.7886041","url":null,"abstract":"In this paper, MobiX technology provides security for online services using mobile devices with a wide range of customers including governments, military, business enterprises, and scientific organization, and individuals have been proposed. MobiX is a software security solution technology to enhance the networked mobile device trustworthiness, application integrity, preventing users from malware attacks. MobiX provides two authentication layers and two additional security layers in addition to the conventional username-password for mobile devices in a unique system design. MobiX is fully implemented by software; therefore, it can be quickly deployed into different legacy mobile devices. More importantly, the novel device authenticity is based on the one-way a keyless cryptographic hash function and on the Generalized Concatenated Code Physically Unclonable Function (GCCPUF) to effectively protect the users from different attack vectors such as insiders, spoofing attack, or identity theft attacks. On the other hand, the app authenticity prevents malware and app-tempering cybersecurity attacks via an efficient and secure remote attestation protocol. The comprehensive protection architecture of MobiX would enable M-commerce with superior security capabilities compared with the existing solutions.","PeriodicalId":371691,"journal":{"name":"2016 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115876742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ISSPIT.2016.7886027
Ahmad Bazzi, D. Slock, Lisa Meilhac
A novel approach entitled “Joint Angle and Delay Estimator and Detector”, or simply JADED, is presented. This approach allows simultaneous estimation of number of coherent/non-coherent sources and joint estimation of the angles and times of arrival of each source. The system is composed of a Uniform Linear Array (ULA) receiving known OFDM symbols from a user in an indoor environment, which is rich in multipath. Therefore, the objective is to apply the JADED approach to this scenario, which allows extraction of the Line-of-Sight component based on the first arriving path. The first method, called JADED-RIP, makes use of the Rotational Invariance Properties (RIP) of ULAs and OFDM symbols, detects the number of multipath components, and estimates the angles and times of arrival of each path by performing a 2D search. The second method is a Computationally Efficient Single Snapshot (CESS) version of the JADED-RIP, i.e. it requires a 1D search followed by a least squares fit, and can only be used when a single OFDM symbol is available. Future insights are given in the Conclusions section.
{"title":"JADED-RIP: Joint Angle and Delay Estimator and Detector via Rotational Invariance Properties","authors":"Ahmad Bazzi, D. Slock, Lisa Meilhac","doi":"10.1109/ISSPIT.2016.7886027","DOIUrl":"https://doi.org/10.1109/ISSPIT.2016.7886027","url":null,"abstract":"A novel approach entitled “Joint Angle and Delay Estimator and Detector”, or simply JADED, is presented. This approach allows simultaneous estimation of number of coherent/non-coherent sources and joint estimation of the angles and times of arrival of each source. The system is composed of a Uniform Linear Array (ULA) receiving known OFDM symbols from a user in an indoor environment, which is rich in multipath. Therefore, the objective is to apply the JADED approach to this scenario, which allows extraction of the Line-of-Sight component based on the first arriving path. The first method, called JADED-RIP, makes use of the Rotational Invariance Properties (RIP) of ULAs and OFDM symbols, detects the number of multipath components, and estimates the angles and times of arrival of each path by performing a 2D search. The second method is a Computationally Efficient Single Snapshot (CESS) version of the JADED-RIP, i.e. it requires a 1D search followed by a least squares fit, and can only be used when a single OFDM symbol is available. Future insights are given in the Conclusions section.","PeriodicalId":371691,"journal":{"name":"2016 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116970463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}