首页 > 最新文献

2009 43rd Annual Conference on Information Sciences and Systems最新文献

英文 中文
Sharp upper bound on error probability of exact sparsity recovery 精确稀疏恢复误差概率的尖锐上界
Pub Date : 2009-03-18 DOI: 10.1109/CISS.2009.5054681
Kamiar Rahnama Rad
Imagine the vector y = Xβ + ε where β ∈ ℝm has only k non zero entries and ε ∈ Rn is a Gaussian noise. This can be viewed as a linear system with sparsity constraints corrupted with noise. We find a non-asymptotic upper bound on the error probability of exact recovery of the sparsity pattern given any generic measurement matrix X. By drawing X from a Gaussian ensemble, as an example, to ensure exact recovery, we obtain asymptotically sharp sufficient conditions on n which meet the necessary conditions introduced in (Wang et al., 2008).
假设向量y = Xβ + ε,其中β∈λ m只有k个非零项,ε∈Rn是高斯噪声。这可以看作是一个被噪声破坏的具有稀疏性约束的线性系统。我们找到了给定任意一般测量矩阵X的稀疏模式精确恢复的误差概率的非渐近上界。以高斯系综中的X为例,为了保证精确恢复,我们在n上得到了渐近尖锐的充分条件,满足(Wang et al., 2008)中引入的必要条件。
{"title":"Sharp upper bound on error probability of exact sparsity recovery","authors":"Kamiar Rahnama Rad","doi":"10.1109/CISS.2009.5054681","DOIUrl":"https://doi.org/10.1109/CISS.2009.5054681","url":null,"abstract":"Imagine the vector y = Xβ + ε where β ∈ ℝ<sup>m</sup> has only k non zero entries and ε ∈ R<sup>n</sup> is a Gaussian noise. This can be viewed as a linear system with sparsity constraints corrupted with noise. We find a non-asymptotic upper bound on the error probability of exact recovery of the sparsity pattern given any generic measurement matrix X. By drawing X from a Gaussian ensemble, as an example, to ensure exact recovery, we obtain asymptotically sharp sufficient conditions on n which meet the necessary conditions introduced in (Wang et al., 2008).","PeriodicalId":433796,"journal":{"name":"2009 43rd Annual Conference on Information Sciences and Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128301356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Preliminary results in comparing the expected and observed Fisher information for maximum likelihood estimates 对最大似然估计的预期和观察费雪信息进行比较的初步结果
Pub Date : 2009-03-18 DOI: 10.1109/CISS.2009.5054760
X. Cao, J. Spall
Confidence intervals for the maximum likelihood estimates (MLEs) are commonly used in statistical inference. To accurately construct such confidence intervals, one typically needs to know the distribution of the MLE. Standard statistical theory says normalized MLE is asymptotically normal with mean zero and variance being a function of the Fisher Information Matrix (FIM) at the unknown parameter. Two common estimates for the variance of MLE are the observed FIM (same as Hessian of negative log-likelihood) and the expected FIM, both of which are evaluated at the MLE given sample data. We show that, under reasonable conditions, the expected FIM tends to outperform the observed FIM under a mean-squared error criterion. This result suggests that, under certain conditions, the expected FIM is a better estimate for the variance of MLE when used in confidence interval calculations.
最大似然估计的置信区间是统计推断中常用的一种方法。为了准确地构建这样的置信区间,通常需要知道最大似然值的分布。标准统计理论认为,归一化最大似然是渐近正态的,均值为零,方差是未知参数处Fisher信息矩阵(FIM)的函数。MLE方差的两种常见估计是观察到的FIM(与负对数似然的Hessian相同)和期望的FIM,两者都在给定样本数据的MLE上进行评估。我们表明,在合理的条件下,在均方误差准则下,预期的FIM倾向于优于观察到的FIM。这一结果表明,在一定条件下,在置信区间计算中使用期望FIM可以更好地估计MLE的方差。
{"title":"Preliminary results in comparing the expected and observed Fisher information for maximum likelihood estimates","authors":"X. Cao, J. Spall","doi":"10.1109/CISS.2009.5054760","DOIUrl":"https://doi.org/10.1109/CISS.2009.5054760","url":null,"abstract":"Confidence intervals for the maximum likelihood estimates (MLEs) are commonly used in statistical inference. To accurately construct such confidence intervals, one typically needs to know the distribution of the MLE. Standard statistical theory says normalized MLE is asymptotically normal with mean zero and variance being a function of the Fisher Information Matrix (FIM) at the unknown parameter. Two common estimates for the variance of MLE are the observed FIM (same as Hessian of negative log-likelihood) and the expected FIM, both of which are evaluated at the MLE given sample data. We show that, under reasonable conditions, the expected FIM tends to outperform the observed FIM under a mean-squared error criterion. This result suggests that, under certain conditions, the expected FIM is a better estimate for the variance of MLE when used in confidence interval calculations.","PeriodicalId":433796,"journal":{"name":"2009 43rd Annual Conference on Information Sciences and Systems","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126433623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using adaptive lossless compression to characterize network traffic 使用自适应无损压缩来表征网络流量
Pub Date : 2009-03-18 DOI: 10.1109/CISS.2009.5054730
K. Benson, L. Marvel
Detecting anomalies in network traffic is a challenging task, not only because of the inherent difficulty of identifying anomalies such as intrusions [1] but also because of the sheer volume of data. In this paper, we attempt to extend existing work in the field of steganalysis to the problem of detecting anomalies in network traffic. By losslessly compressing network traffic using an adaptive compression algorithm, we postulate that it is possible to characterize normal network traffic. Once typical traffic has been defined, it is possible to identify anomalous traffic as the traffic that does not compress well.
检测网络流量中的异常是一项具有挑战性的任务,不仅因为识别入侵等异常具有固有的难度[1],还因为数据量巨大。在本文中,我们尝试将隐写分析领域的现有工作扩展到检测网络流量中的异常问题。通过使用自适应压缩算法对网络流量进行无损压缩,我们假设可以表征正常的网络流量。一旦定义了典型流量,就可以将异常流量识别为不能很好地压缩的流量。
{"title":"Using adaptive lossless compression to characterize network traffic","authors":"K. Benson, L. Marvel","doi":"10.1109/CISS.2009.5054730","DOIUrl":"https://doi.org/10.1109/CISS.2009.5054730","url":null,"abstract":"Detecting anomalies in network traffic is a challenging task, not only because of the inherent difficulty of identifying anomalies such as intrusions [1] but also because of the sheer volume of data. In this paper, we attempt to extend existing work in the field of steganalysis to the problem of detecting anomalies in network traffic. By losslessly compressing network traffic using an adaptive compression algorithm, we postulate that it is possible to characterize normal network traffic. Once typical traffic has been defined, it is possible to identify anomalous traffic as the traffic that does not compress well.","PeriodicalId":433796,"journal":{"name":"2009 43rd Annual Conference on Information Sciences and Systems","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126456635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secondary user friendly TDMA scheduling for primary users in cognitive radio networks 认知无线网络中主用户的辅助用户友好TDMA调度
Pub Date : 2009-03-18 DOI: 10.1109/CISS.2009.5054788
Hang Su, Xi Zhang
Cognitive radio technology is widely accepted as an efficient approach to solve the problem that the wireless spectrum has been getting scarcer and scarcer due to the rapid growth in the ubiquitous wireless applications. Several cognitive medium access control (MAC) protocols have been proposed for the secondary users (non-licensed users) to take advantage of the vacant channels whenever they are not occupied by the primary users (licensed users) in the wireless time division multiple access (TDMA)-based networks. In this paper, by exploiting the unique property of the wireless fading channel and cross-layer design technique, we develop a packets scheduling scheme for the primary users in the context of wireless TDMA networks, which is set up to operate friendly towards the secondary users in terms of vacant-channel probability. Our proposed scheme can be implemented with just slight modification on the traditional TDMA scheduling algorithm. We develop a rigorous queuing model and then quantitatively analyze the tradeoff among multiple performance metrics to identify when and where the cost for favoring the secondary users is worthy. The analytical results show that our proposed scheme can generate more vacant-channel opportunities for secondary users, at the expense of little increasing packet delay, as compared with the traditional wireless TDMA scheduling algorithm. In addition, since the implementation of our proposed scheme only needs little modification on the existing TDMA scheduling algorithm, our proposed scheme is a practical and cost-effective approach to increase the wireless spectrum utilization.
由于无处不在的无线应用的快速增长,无线频谱越来越稀缺,认知无线电技术作为一种有效的解决方法被广泛接受。在基于无线时分多址(TDMA)的网络中,为了使辅助用户(非许可用户)能够利用未被主用户(许可用户)占用的空闲信道,提出了几种认知介质访问控制(MAC)协议。本文利用无线衰落信道的独特特性和跨层设计技术,开发了一种无线TDMA网络中主用户的分组调度方案,该方案从空信道概率的角度考虑,对次用户友好。该方案在传统TDMA调度算法的基础上稍加修改即可实现。我们开发了一个严格的排队模型,然后定量分析多个性能指标之间的权衡,以确定何时何地值得为次要用户付出代价。分析结果表明,与传统的无线TDMA调度算法相比,该方案可以为二次用户提供更多的空闲信道机会,而数据包延迟的增加很少。此外,由于该方案的实施只需要对现有的TDMA调度算法进行很少的修改,因此该方案是提高无线频谱利用率的一种实用且经济的方法。
{"title":"Secondary user friendly TDMA scheduling for primary users in cognitive radio networks","authors":"Hang Su, Xi Zhang","doi":"10.1109/CISS.2009.5054788","DOIUrl":"https://doi.org/10.1109/CISS.2009.5054788","url":null,"abstract":"Cognitive radio technology is widely accepted as an efficient approach to solve the problem that the wireless spectrum has been getting scarcer and scarcer due to the rapid growth in the ubiquitous wireless applications. Several cognitive medium access control (MAC) protocols have been proposed for the secondary users (non-licensed users) to take advantage of the vacant channels whenever they are not occupied by the primary users (licensed users) in the wireless time division multiple access (TDMA)-based networks. In this paper, by exploiting the unique property of the wireless fading channel and cross-layer design technique, we develop a packets scheduling scheme for the primary users in the context of wireless TDMA networks, which is set up to operate friendly towards the secondary users in terms of vacant-channel probability. Our proposed scheme can be implemented with just slight modification on the traditional TDMA scheduling algorithm. We develop a rigorous queuing model and then quantitatively analyze the tradeoff among multiple performance metrics to identify when and where the cost for favoring the secondary users is worthy. The analytical results show that our proposed scheme can generate more vacant-channel opportunities for secondary users, at the expense of little increasing packet delay, as compared with the traditional wireless TDMA scheduling algorithm. In addition, since the implementation of our proposed scheme only needs little modification on the existing TDMA scheduling algorithm, our proposed scheme is a practical and cost-effective approach to increase the wireless spectrum utilization.","PeriodicalId":433796,"journal":{"name":"2009 43rd Annual Conference on Information Sciences and Systems","volume":"1 21","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120842426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Sleeping policy cost analysis for sensor nodes collecting heterogeneous data 采集异构数据的传感器节点睡眠策略成本分析
Pub Date : 2009-03-18 DOI: 10.1109/CISS.2009.5054796
Zhen Zhao, A. Elancheziyan, J. D. Oliveira
Sleeping policies are widely used in many contexts to reduce energy consumption in sensor nodes, ad-hoc terminals or mobile cell phones. Although there is extensive literature on energy saving in sensor networks, little has been done with respect to comparing additional costs, such as packet drop probability and buffer occupancies of sleeping versus non-sleeping policies, especially for multiple classes of data. In this paper, we employ discrete time vacation modeling results from queueing theory to obtain the quantities of interest, i.e., blocking probabilities, and queue lengths incurred by sleeping policies for a sensor node with a finite buffer.We propose a 2-class Geo/G/1/K vacation model, where two classes of data, each with its own buffer, are collected by a sensor node following a sleeping policy. At any time instant, only one packet can be transferred and the transmission order is selected by a scheduling function. The sleeping, transfer and selection processes have general distributions. To the best of our knowledge, this is the first work on modeling and analyzing the performance characteristics of a sensor node with a sleeping policy, collecting heterogeneous data. First, we present a Markov renewal process embedded at the time instant of transfer completion and then obtain the marginal occupancy distributions at an arbitrary time instant. Simulation results validate our theoretical derivation and demonstrate how the results can be applied to understand the behavior of sensor nodes with heterogeneous data.
睡眠策略被广泛应用于许多环境中,以减少传感器节点、自组织终端或移动电话的能量消耗。尽管有大量关于传感器网络节能的文献,但很少有关于比较额外成本的研究,例如睡眠策略与非睡眠策略的丢包概率和缓冲区占用,特别是对于多类数据。在本文中,我们利用排队理论的离散时间休假建模结果来获得具有有限缓冲区的传感器节点的兴趣量,即阻塞概率和睡眠策略引起的队列长度。我们提出了一个2类Geo/G/1/K休假模型,其中两类数据都有自己的缓冲区,由传感器节点按照睡眠策略收集。在任何时刻,只能传输一个数据包,并由调度功能选择传输顺序。休眠、转移和选择过程具有一般的分布。据我们所知,这是第一次对具有睡眠策略的传感器节点的性能特征进行建模和分析,收集异构数据。首先,我们提出了嵌入在转移完成时刻的马尔可夫更新过程,然后得到了任意时刻的边际占用分布。仿真结果验证了我们的理论推导,并演示了如何将结果应用于理解具有异构数据的传感器节点的行为。
{"title":"Sleeping policy cost analysis for sensor nodes collecting heterogeneous data","authors":"Zhen Zhao, A. Elancheziyan, J. D. Oliveira","doi":"10.1109/CISS.2009.5054796","DOIUrl":"https://doi.org/10.1109/CISS.2009.5054796","url":null,"abstract":"Sleeping policies are widely used in many contexts to reduce energy consumption in sensor nodes, ad-hoc terminals or mobile cell phones. Although there is extensive literature on energy saving in sensor networks, little has been done with respect to comparing additional costs, such as packet drop probability and buffer occupancies of sleeping versus non-sleeping policies, especially for multiple classes of data. In this paper, we employ discrete time vacation modeling results from queueing theory to obtain the quantities of interest, i.e., blocking probabilities, and queue lengths incurred by sleeping policies for a sensor node with a finite buffer.We propose a 2-class Geo/G/1/K vacation model, where two classes of data, each with its own buffer, are collected by a sensor node following a sleeping policy. At any time instant, only one packet can be transferred and the transmission order is selected by a scheduling function. The sleeping, transfer and selection processes have general distributions. To the best of our knowledge, this is the first work on modeling and analyzing the performance characteristics of a sensor node with a sleeping policy, collecting heterogeneous data. First, we present a Markov renewal process embedded at the time instant of transfer completion and then obtain the marginal occupancy distributions at an arbitrary time instant. Simulation results validate our theoretical derivation and demonstrate how the results can be applied to understand the behavior of sensor nodes with heterogeneous data.","PeriodicalId":433796,"journal":{"name":"2009 43rd Annual Conference on Information Sciences and Systems","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129351463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimal power allocation for achieving perfect secrecy capacity in MIMO wire-tap channels 实现MIMO线接信道完美保密能力的最优功率分配
Pub Date : 2009-03-18 DOI: 10.1109/CISS.2009.5054790
Jia Liu, Yiwei Thomas Hou, H. Sherali
In this paper, we investigate optimal power allocation to achieve perfect secrecy capacity in Gaussian MIMO wire-tap channels. The number of antennas in the MIMO wire-tap channel is arbitrary at the transmitter, the intended receiver, and the eavesdropper. For this challenging non-convex optimization problem, we design a novel global optimization algorithm called branch-and-bound with reformulation and linearization technique (BB/RLT). As opposed to convex programming methods that only yield local optimal solutions, our proposed BB/RLT method guarantees finding a global optimal solution. The main contribution in this paper is that our proposed BB/RLT algorithm is the first method that solves the optimal power allocation problem for achieving perfect secrecy capacity problem in MIMO wire-tap channels. Numerical examples are also given to demonstrate the efficacy of the proposed algorithm.
本文研究了在高斯MIMO线接信道中实现完美保密能力的最优功率分配。MIMO线路监听信道中的天线数量在发射器、预期接收器和窃听者处是任意的。针对这一具有挑战性的非凸优化问题,我们设计了一种新的全局优化算法,称为分支定界与重构线性化技术(BB/RLT)。与凸规划方法只产生局部最优解相反,我们提出的BB/RLT方法保证找到全局最优解。本文的主要贡献在于我们提出的BB/RLT算法是第一个解决MIMO线接信道中实现完美保密容量问题的最优功率分配问题的方法。数值算例验证了该算法的有效性。
{"title":"Optimal power allocation for achieving perfect secrecy capacity in MIMO wire-tap channels","authors":"Jia Liu, Yiwei Thomas Hou, H. Sherali","doi":"10.1109/CISS.2009.5054790","DOIUrl":"https://doi.org/10.1109/CISS.2009.5054790","url":null,"abstract":"In this paper, we investigate optimal power allocation to achieve perfect secrecy capacity in Gaussian MIMO wire-tap channels. The number of antennas in the MIMO wire-tap channel is arbitrary at the transmitter, the intended receiver, and the eavesdropper. For this challenging non-convex optimization problem, we design a novel global optimization algorithm called branch-and-bound with reformulation and linearization technique (BB/RLT). As opposed to convex programming methods that only yield local optimal solutions, our proposed BB/RLT method guarantees finding a global optimal solution. The main contribution in this paper is that our proposed BB/RLT algorithm is the first method that solves the optimal power allocation problem for achieving perfect secrecy capacity problem in MIMO wire-tap channels. Numerical examples are also given to demonstrate the efficacy of the proposed algorithm.","PeriodicalId":433796,"journal":{"name":"2009 43rd Annual Conference on Information Sciences and Systems","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131148900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Performance evaluation: Priority transmission using network coding with multi-generation mixing 性能评价:采用多代混音网络编码优先传输
Pub Date : 2009-03-18 DOI: 10.1109/CISS.2009.5054758
Mohammed D. Halloush, H. Radha
In this paper, we evaluate the priority transmission characteristic of Network Coding (NC) with Multi-Generation Mixing (MGM). MGM supports priority transmission by providing enhanced reliability for delivering different groups of sender packets. MGM is a generalized approach for practical network coding that enhances its performance. With MGM, sender packets are grouped in generations that constitute mixing sets. By employing the novel inter-generation network coding approach, each generation within a mixing set can be considered as a priority layer. This is due to the varying levels of data protection provided to the different generations within a mixing set. Traditionally, priority transmission is done by increasing the level of FEC protection assigned to sender data of higher priority. This incurs transmission overhead that consumes bandwidth. MGM supports priority transmission by network encoding data of higher priority in more sender packets so that more packets support its recovery. At the same time there is no increase in the total number of packets transmitted and hence no additional transmission overhead.
本文研究了多代混合网络编码(NC)的优先传输特性。MGM通过为传送不同组的发送方数据包提供增强的可靠性来支持优先传输。MGM是一种实用的网络编码方法,可以提高网络编码的性能。在MGM中,发送端数据包按代分组,构成混合集。通过采用新的代际网络编码方法,混合集中的每一代都可以视为一个优先层。这是由于为混合集中的不同代提供了不同级别的数据保护。传统上,优先级传输是通过增加分配给高优先级发送方数据的FEC保护级别来完成的。这会产生传输开销,消耗带宽。MGM支持网络优先传输,将高优先级的数据编码在更多的发送报文中,以便有更多的报文支持其恢复。同时,传输的数据包总数没有增加,因此没有额外的传输开销。
{"title":"Performance evaluation: Priority transmission using network coding with multi-generation mixing","authors":"Mohammed D. Halloush, H. Radha","doi":"10.1109/CISS.2009.5054758","DOIUrl":"https://doi.org/10.1109/CISS.2009.5054758","url":null,"abstract":"In this paper, we evaluate the priority transmission characteristic of Network Coding (NC) with Multi-Generation Mixing (MGM). MGM supports priority transmission by providing enhanced reliability for delivering different groups of sender packets. MGM is a generalized approach for practical network coding that enhances its performance. With MGM, sender packets are grouped in generations that constitute mixing sets. By employing the novel inter-generation network coding approach, each generation within a mixing set can be considered as a priority layer. This is due to the varying levels of data protection provided to the different generations within a mixing set. Traditionally, priority transmission is done by increasing the level of FEC protection assigned to sender data of higher priority. This incurs transmission overhead that consumes bandwidth. MGM supports priority transmission by network encoding data of higher priority in more sender packets so that more packets support its recovery. At the same time there is no increase in the total number of packets transmitted and hence no additional transmission overhead.","PeriodicalId":433796,"journal":{"name":"2009 43rd Annual Conference on Information Sciences and Systems","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115409649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Iteratively re-weighted least squares for sparse signal reconstruction from noisy measurements 基于迭代加权最小二乘的噪声测量稀疏信号重构
Pub Date : 2009-03-18 DOI: 10.1109/CISS.2009.5054762
R. Carrillo, K. Barner
Finding sparse solutions of under-determined systems of linear equations is a problem of significance importance in signal processing and statistics. In this paper we study an iterative reweighted least squares (IRLS) approach to find sparse solutions of underdetermined system of equations based on smooth approximation of the L0 norm and the method is extended to find sparse solutions from noisy measurements. Analysis of the proposed methods show that weaker conditions on the sensing matrices are required. Simulation results demonstrate that the proposed method requires fewer samples than existing methods, while maintaining a reconstruction error of the same order and demanding less computational complexity.
求解欠定线性方程组的稀疏解是信号处理和统计学中的一个重要问题。本文研究了一种基于L0范数光滑逼近的求欠定方程组稀疏解的迭代重加权最小二乘方法,并将该方法推广到从噪声测量中求稀疏解。对所提方法的分析表明,传感矩阵需要较弱的条件。仿真结果表明,该方法比现有方法需要更少的样本,同时保持了相同阶数的重构误差和较低的计算复杂度。
{"title":"Iteratively re-weighted least squares for sparse signal reconstruction from noisy measurements","authors":"R. Carrillo, K. Barner","doi":"10.1109/CISS.2009.5054762","DOIUrl":"https://doi.org/10.1109/CISS.2009.5054762","url":null,"abstract":"Finding sparse solutions of under-determined systems of linear equations is a problem of significance importance in signal processing and statistics. In this paper we study an iterative reweighted least squares (IRLS) approach to find sparse solutions of underdetermined system of equations based on smooth approximation of the L0 norm and the method is extended to find sparse solutions from noisy measurements. Analysis of the proposed methods show that weaker conditions on the sensing matrices are required. Simulation results demonstrate that the proposed method requires fewer samples than existing methods, while maintaining a reconstruction error of the same order and demanding less computational complexity.","PeriodicalId":433796,"journal":{"name":"2009 43rd Annual Conference on Information Sciences and Systems","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113967512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Recursive least-squares doubly-selective MIMO channel estimation using exponential basis models 基于指数基模型的递归最小二乘双选择MIMO信道估计
Pub Date : 2009-03-18 DOI: 10.1109/CISS.2009.5054772
Hyosung Kim, Jitendra Tugnait
An adaptive MIMO channel estimation scheme, exploiting the oversampled complex exponential basis expansion model (CE-BEM), is presented for doubly-selective fading channels where we track the BEM coefficients. The time-varying nature of the channel is well captured by the CE-BEM while the time-variations of the (unknown) BEM coefficients are likely much slower than that of the channel. We apply the exponentially-weighted and sliding-window recursive least-squares (RLS) algorithms to track the BEM coefficients subblock-by-subblock, using time-multiplexed periodically transmitted training symbols. Simulation examples demonstrate its superior performance over the conventional block-wise channel estimator.
针对双选择性衰落信道,提出了一种利用过采样复指数基展开模型(CE-BEM)的自适应MIMO信道估计方案,并对BEM系数进行了跟踪。通道的时变特性被CE-BEM很好地捕获,而(未知的)BEM系数的时变可能比通道的时变慢得多。我们采用指数加权和滑动窗口递归最小二乘(RLS)算法,使用时间复用周期性传输的训练符号,逐子块跟踪BEM系数。仿真实例表明,该方法优于传统的分块信道估计器。
{"title":"Recursive least-squares doubly-selective MIMO channel estimation using exponential basis models","authors":"Hyosung Kim, Jitendra Tugnait","doi":"10.1109/CISS.2009.5054772","DOIUrl":"https://doi.org/10.1109/CISS.2009.5054772","url":null,"abstract":"An adaptive MIMO channel estimation scheme, exploiting the oversampled complex exponential basis expansion model (CE-BEM), is presented for doubly-selective fading channels where we track the BEM coefficients. The time-varying nature of the channel is well captured by the CE-BEM while the time-variations of the (unknown) BEM coefficients are likely much slower than that of the channel. We apply the exponentially-weighted and sliding-window recursive least-squares (RLS) algorithms to track the BEM coefficients subblock-by-subblock, using time-multiplexed periodically transmitted training symbols. Simulation examples demonstrate its superior performance over the conventional block-wise channel estimator.","PeriodicalId":433796,"journal":{"name":"2009 43rd Annual Conference on Information Sciences and Systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115300671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
2—Sector interference channel communication for sum rates and minimum rate maximization 用于和速率和最小速率最大化的2扇区干扰信道通信
Pub Date : 2009-03-18 DOI: 10.1109/CISS.2009.5054854
M. Charafeddine, A. Paulraj
This paper applies recent advances in communicating over the interference channel while treating the interference as noise. Two maximization utilities are considered: maximizing the sum rates and maximizing the minimum rate. The channel model is based on a 2—sector interference channel within a single cell. The utilities maximization is presented from the perspective of the interference channel's achievable rates region. Maximizing the minimum rate parts from the traditional problem formulation of casting it as a pure power control problem. Instead, the problem is presented as maximization over the convex hull of the rates region, therefore employing both power control and time-sharing strategies. For maximizing the minimum rate, it is shown that optimal communication over a 2—sector channel is not homogenous, and an interplay of different time-sharing types and/or power control is required to achieve optimality. Systems results are presented together with the gains achieved by using the proposed techniques over the traditional paradigms used in communicating over the 2—sector channel. Finally, insights and the contextualization of the aforementioned techniques within an information theoretic perspective are discussed.
本文应用了干扰信道通信的最新进展,同时将干扰视为噪声。考虑了两种最大化效用:最大化总费率和最大化最小费率。通道模型基于单个单元内的2扇区干扰通道。从干扰信道可达速率区域的角度提出了效用最大化问题。将零件最小倍率最大化问题从传统的铸造问题表述为一个纯功率控制问题。相反,该问题呈现为速率区域凸壳上的最大化,因此同时采用功率控制和分时策略。为了最大化最小速率,结果表明,在2扇区信道上的最佳通信不是同质的,并且需要不同分时类型和/或功率控制的相互作用来实现最优性。系统结果与使用所提出的技术在2扇区信道通信中使用的传统范式所获得的收益一起呈现。最后,从信息论的角度讨论了上述技术的见解和语境化。
{"title":"2—Sector interference channel communication for sum rates and minimum rate maximization","authors":"M. Charafeddine, A. Paulraj","doi":"10.1109/CISS.2009.5054854","DOIUrl":"https://doi.org/10.1109/CISS.2009.5054854","url":null,"abstract":"This paper applies recent advances in communicating over the interference channel while treating the interference as noise. Two maximization utilities are considered: maximizing the sum rates and maximizing the minimum rate. The channel model is based on a 2—sector interference channel within a single cell. The utilities maximization is presented from the perspective of the interference channel's achievable rates region. Maximizing the minimum rate parts from the traditional problem formulation of casting it as a pure power control problem. Instead, the problem is presented as maximization over the convex hull of the rates region, therefore employing both power control and time-sharing strategies. For maximizing the minimum rate, it is shown that optimal communication over a 2—sector channel is not homogenous, and an interplay of different time-sharing types and/or power control is required to achieve optimality. Systems results are presented together with the gains achieved by using the proposed techniques over the traditional paradigms used in communicating over the 2—sector channel. Finally, insights and the contextualization of the aforementioned techniques within an information theoretic perspective are discussed.","PeriodicalId":433796,"journal":{"name":"2009 43rd Annual Conference on Information Sciences and Systems","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116629899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
2009 43rd Annual Conference on Information Sciences and Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1