We gratefully acknowledge support from
the Simons Foundation and member institutions.

Signal Processing

New submissions

[ total of 18 entries: 1-18 ]
[ showing up to 2000 entries per page: fewer | more ]

New submissions for Thu, 23 Jan 20

[1]  arXiv:2001.07707 [pdf, other]
Title: Tomographic and entropic analysis of modulated signals
Comments: 6 pages, 4 figures
Subjects: Signal Processing (eess.SP); Data Analysis, Statistics and Probability (physics.data-an); Optics (physics.optics)

We study an application of the quantum tomography framework for the time-frequency analysis of modulated signals. In particular, we calculate optical tomographic representations and Wigner-Ville distributions for signals with amplitude and frequency modulations. We also consider time-frequency entropic relations for modulated signals, which are naturally associated with the Fourier analysis. A numerical toolbox for calculating optical time-frequency tomograms based on pseudo Wigner-Ville distributions for modulated signals is provided.

[2]  arXiv:2001.07708 [pdf, ps, other]
Title: Towards Comparability in Non-Intrusive Load Monitoring: On Data and Performance Evaluation
Subjects: Signal Processing (eess.SP); Machine Learning (cs.LG)

Non-Intrusive Load Monitoring (NILM) comprises of a set of techniques that provide insights into the energy consumption of households and industrial facilities. Latest contributions show significant improvements in terms of accuracy and generalisation abilities. Despite all progress made concerning disaggregation techniques, performance evaluation and comparability remains an open research question. The lack of standardisation and consensus on evaluation procedures makes reproducibility and comparability extremely difficult. In this paper, we draw attention to comparability in NILM with a focus on highlighting the considerable differences amongst common energy datasets used to test the performance of algorithms. We divide discussion on comparability into data aspects, performance metrics, and give a close view on evaluation processes. Detailed information on pre-processing as well as data cleaning methods, the importance of unified performance reporting, and the need for complexity measures in load disaggregation are found to be the most urgent issues in NILM-related research. In addition, our evaluation suggests that datasets should be chosen carefully. We conclude by formulating suggestions for future work to enhance comparability.

[3]  arXiv:2001.07787 [pdf, other]
Title: Machine Learning for Performance-Aware Virtual Network Function Placement
Comments: 6 pages, 6 figures, 1 table, 9 equations, 18 references, Conference
Subjects: Signal Processing (eess.SP); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI); Machine Learning (stat.ML)

With the growing demand for data connectivity, network service providers are faced with the task of reducing their capital and operational expenses while simultaneously improving network performance and addressing the increased connectivity demand. Although Network Function Virtualization (NFV) has been identified as a solution, several challenges must be addressed to ensure its feasibility. In this paper, we address the Virtual Network Function (VNF) placement problem by developing a machine learning decision tree model that learns from the effective placement of the various VNF instances forming a Service Function Chain (SFC). The model takes several performance-related features from the network as an input and selects the placement of the various VNF instances on network servers with the objective of minimizing the delay between dependent VNF instances. The benefits of using machine learning are realized by moving away from a complex mathematical modelling of the system and towards a data-based understanding of the system. Using the Evolved Packet Core (EPC) as a use case, we evaluate our model on different data center networks and compare it to the BACON algorithm in terms of the delay between interconnected components and the total delay across the SFC. Furthermore, a time complexity analysis is performed to show the effectiveness of the model in NFV applications.

[4]  arXiv:2001.07797 [pdf, other]
Title: Point Cloud Segmentation based on Hypergraph Spectral Clustering
Subjects: Signal Processing (eess.SP)

Hypergraph spectral analysis has become a significant tool in data analysis due to its power in processing complex data structure. In this work, we investigate its efficacy for 3D point cloud segmentation, where the underlying surface of point clouds and the multilateral relationship among the points can be naturally captured by the high-dimensional hyperedges. Leveraging the power of hypergraph signal processing, we estimate and order the hypergraph spectrum from observed coordinates. By trimming redundant information from the estimated hypergraph spectral space based on the strengths of spectral components, we develop a clustering-based method to achieve effective segmentation. We apply the proposed segmentation method to different point clouds, and analyze their respective spectral properties. Our experimental results clearly demonstrate the effectiveness of estimated hypergraph spectrum and efficiency of the proposed segmentation method.

[5]  arXiv:2001.07857 [pdf, other]
Title: Inference over Wireless IoT Links with Importance-Filtered Updates
Subjects: Signal Processing (eess.SP)

We consider a communication cell comprised of Internet-of-Things (IoT) nodes transmitting to a common Access Point (AP). The nodes in the cell are assumed to generate data samples periodically, which are to be transmitted to the AP. The AP hosts artificial deep neural networks and it is able to make inferences based on the received data samples. We address the following tradeoff: The more often the IoT nodes transmit, the higher the accuracy of the inference made by the AP, but also the higher the energy expenditure at the IoT nodes. We propose a data filtering scheme employed by the IoT nodes, which we refer to as distributed importance filtering. The IoT nodes do not have an inherent learning capability and the data filtering scheme operates under periodic instructions from the neural network placed at the AP. The proposed scheme is tested in two practical scenarios: leakage detection in water distribution networks and air-pollution detection in urban areas. The results show that the proposed scheme offers significant benefits in terms of network longevity, whilst maintaining high inference accuracy. Our approach reduces the the computational complexity for training the model and obviates the need for data pre-processing, which makes it highly applicable in practical IoT scenarios.

[6]  arXiv:2001.07907 [pdf, ps, other]
Title: Reconfigurable Intelligent Surface assisted Two-Way Communications: Performance Analysis and Optimization
Subjects: Signal Processing (eess.SP); Information Theory (cs.IT)

In this paper, we investigate the two-way communication between two users assisted by a re-configurable intelligent surface (RIS). The scheme that two users communicate simultaneously in the same time slot over Rayleigh fading channels is considered. The channels between the two users and RIS can either be reciprocal or non-reciprocal. For reciprocal channels, we determine the optimal phases at the RIS to maximize the signal-to-interference-plus-noise ratio (SINR). We then derive exact closed-form expressions for the outage probability and spectral efficiency for single-element RIS. By capitalizing the insights obtained from the single-element analysis, we introduce a gamma approximation to model the product of Rayleigh random variables which is useful for the evaluation of the performance metrics in multiple-element RIS. Asymptotic analysis shows that the outage decreases at $\left(\log(\rho)/\rho\right)^L$ rate where $L$ is the number of elements, whereas the spectral efficiency increases at $\log(\rho)$ rate at large average SINR $\rho$. For non-reciprocal channels, the minimum user SINR is targeted to be maximized. For single-element RIS, closed-form solutions are derived whereas for multiple-element RIS the problem turns out to be non-convex. The latter is relaxed to be a semidefinite programming problem, whose optimal solution is achievable and serves as a sub-optimal solution.

[7]  arXiv:2001.07937 [pdf, other]
Title: Machine Learning assisted Handover and Resource Management for Cellular Connected Drones
Subjects: Signal Processing (eess.SP); Machine Learning (cs.LG); Machine Learning (stat.ML)

Enabling cellular connectivity for drones introduces a wide set of challenges and opportunities. Communication of cellular-connected drones is influenced by 3-dimensional mobility and line-of-sight channel characteristics which results in higher number of handovers with increasing altitude. Our cell planning simulations in coexistence of aerial and terrestrial users indicate that the severe interference from drones to base stations is a major challenge for uplink communications of terrestrial users. Here, we first present the major challenges in co-existence of terrestrial and drone communications by considering real geographical network data for Stockholm. Then, we derive analytical models for the key performance indicators (KPIs), including communications delay and interference over cellular networks, and formulate the handover and radio resource management (H-RRM) optimization problem. Afterwards, we transform this problem into a machine learning problem, and propose a deep reinforcement learning solution to solve H-RRM problem. Finally, using simulation results, we present how the speed and altitude of drones, and the tolerable level of interference, shape the optimal H-RRM policy in the network. Especially, the heat-maps of handover decisions in different drone's altitudes/speeds have been presented, which promote a revision of the legacy handover schemes and redefining the boundaries of cells in the sky.

[8]  arXiv:2001.07941 [pdf, other]
Title: Computing Similarity Queries for Correlated Gaussian Sources
Subjects: Signal Processing (eess.SP)

Among many current data processing systems, the objectives are often not the reproduction of data, but to compute some answers based on the data resulting from queries. The similarity identification task is to identify the items in a database that are similar to a given query item for a given metric. The problem of compression for similarity identification has been studied in arXiv:1307.6609 [cs.IT]. Unlike classical compression problems, the focus is not on reconstructing the original data. Instead, the compression rate is determined by the desired reliability of the answers. Specifically, the information measure identification rate characterizes the minimum rate that can be achieved among all schemes which guarantee reliable answers with respect to a given similarity threshold. In this paper, we propose a component-based model for computing correlated similarity queries. The correlated signals are first decorrelated by the KLT transform. Then, the decorrelated signal is processed by a distinct D-admissible system for each component. We show that the component-based model equipped with KLT can perfectly represent the multivariate Gaussian similarity queries when optimal rate-similarity allocation applies. Hence, we can derive the identification rate of the multivariate Gaussian signals based on the component-based model. We then extend the result to general Gaussian sources with memory. We also study the models equipped with practical compone\nt systems. We use TC-$\triangle$ schemes that use type covering signatures and triangle-inequality decision rules as our component systems. We propose an iterative method to numerically approximate the minimum achievable rate of the TC-$\triangle$ scheme. We show that our component-based model equipped with TC-$\triangle$ schemes can achieve better performance than the TC-$\triangle$ scheme unaided on handling the multivariate Gaussian sources.

[9]  arXiv:2001.07994 [pdf, ps, other]
Title: Efficient Bound for Conditional Min-Entropy of Physical Unclonable Functions Beyond IID
Comments: Original publication at 2019 IEEE International Workshop on Information Forensics and Security (WIFS)
Subjects: Signal Processing (eess.SP)

The remaining min-entropy of a secret generated by fuzzy extraction from a Physical Unclonable Function is typically estimated under the assumption of independent and identically distributed PUF responses, but this assumption does not hold in practice. This work analyzes the more realistic case that the responses are independent but not necessarily identically distributed. For this case, we extend the (n-k) bound and a tighter bound by Delvaux et al. In particular, we suggest a grouping bound which provides a trade off for accuracy vs computational effort. Comparison to previous bounds shows the accuracy and efficiency of our bound. We also adapt the key rank (a tool from side-channel analysis) to cross-validate the state-of-the-art and our proposed min-entropy bounds based on publicly available PUF data from real hardware.

Cross-lists for Thu, 23 Jan 20

[10]  arXiv:2001.07805 (cross-list from math.ST) [pdf, other]
Title: When does the Tukey median work?
Subjects: Statistics Theory (math.ST); Machine Learning (cs.LG); Signal Processing (eess.SP); Machine Learning (stat.ML)

We analyze the performance of the Tukey median estimator under total variation (TV) distance corruptions. Previous results show that under Huber's additive corruption model, the breakdown point is 1/3 for high-dimensional halfspace-symmetric distributions. We show that under TV corruptions, the breakdown point reduces to 1/4 for the same set of distributions. We also show that a certain projection algorithm can attain the optimal breakdown point of 1/2. Both the Tukey median estimator and the projection algorithm achieve sample complexity linear in dimension.

[11]  arXiv:2001.08058 (cross-list from eess.IV) [pdf, other]
Title: Removing Multi-frame Gaussian Noise by Combining Patch-based Filters with Optical Flow
Subjects: Image and Video Processing (eess.IV); Signal Processing (eess.SP)

Patch-based methods such as 3D block matching (BM3D) and the non-local Bayes (NLB) approach produce state-of-the-art results for removing Gaussian noise from single-frame images. In this work, we propose two extensions for these filters when there exist multiple frames of the same scene. To this end, we combine two novel inter-frame connectivity strategies with robust optical flow methods. Our extensions do not require additional parameters and outperform existing techniques qualitatively by a significant margin. By exploiting spatial and temporal separability, one of our approaches is also faster than its competitors. Since our strategy is not restricted to BM3D and NLB, it can be generalised to other similar single-frame patch-based methods.

[12]  arXiv:2001.08109 (cross-list from math.OC) [pdf, ps, other]
Title: DDKSP: A Data-Driven Stochastic Programming Framework for Car-Sharing Relocation Problem
Comments: arXiv admin note: text overlap with arXiv:1909.09293
Subjects: Optimization and Control (math.OC); Machine Learning (cs.LG); Signal Processing (eess.SP); Applications (stat.AP)

Car-sharing issue is a popular research field in sharing economy. In this paper, we investigate the car-sharing relocation problem (CSRP) under uncertain demands. Normally, the real customer demands follow complicating probability distribution which cannot be described by parametric approaches. In order to overcome the problem, an innovative framework called Data-Driven Kernel Stochastic Programming (DDKSP) that integrates a non-parametric approach - kernel density estimation (KDE) and a two-stage stochastic programming (SP) model is proposed. Specifically, the probability distributions are derived from historical data by KDE, which are used as the input uncertain parameters for SP. Additionally, the CSRP is formulated as a two-stage SP model. Meanwhile, a Monte Carlo method called sample average approximation (SAA) and Benders decomposition algorithm are introduced to solve the large-scale optimization model. Finally, the numerical experimental validations which are based on New York taxi trip data sets show that the proposed framework outperforms the pure parametric approaches including Gaussian, Laplace and Poisson distributions with 3.72% , 4.58% and 11% respectively in terms of overall profits.

[13]  arXiv:2001.08143 (cross-list from cs.CR) [pdf, other]
Title: You foot the bill! Attacking NFC with passive relays
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)

Imagine when you line up in a store, the person in front of you can make you pay her bill by using a passive wearable device that forces a scan of your credit card without your awareness. An important assumption of today's Near-field Communication (NFC) enabled cards is the limited communication range between the commercial reader and the NFC cards -- a distance below 5~cm. Previous approaches to attacking this assumption effectively use mobile phones and active relays to enlarge the communication range, in order to attack the NFC cards. However, these approaches require a power supply at the adversary side, and can be easily localized when mobile phones or active relays transmit NFC signals.
We propose ReCoil, a system that uses wearable passive relays to attack NFC cards by expanding the communication range to 49.6 centimeters, a ten-fold improvement over its intended commercial distance. ReCoil is a magnetically coupled resonant wireless power transfer system, which optimizes the energy transfer by searching the optimal geometry parameters. Specifically, we first narrow down the feasible area reasonably and design the ReCoil-Ant Colony Algorithm such that the relays absorb the maximum energy from the reader. In order to reroute the signal to pass over the surface of human body, we then design a half waist band by carefully analyzing the impact of the distance and orientation between two coils on the mutual inductance. Then, three more coils are added to the system to keep enlarging the communication range. Finally, extensive experiment results validate our analysis, showing that our passive relays composed of common copper wires and tunable capacitors expand the range of NFC attacks to 49.6 centimeters.

[14]  arXiv:2001.08163 (cross-list from cs.NI) [pdf, other]
Title: A Power-Efficient Audio Acquisition System for Smart City Applications
Subjects: Networking and Internet Architecture (cs.NI); Sound (cs.SD); Social and Information Networks (cs.SI); Audio and Speech Processing (eess.AS); Signal Processing (eess.SP)

Acoustic noise has adverse effects on human activities. Aside from hearing impairment and stress-related illnesses, it can also interfere with spoken communication, reduce human performance and affect the quality of life. As urbanization is intensifying, the potential benefits of reducing noise pollution in smart-city environments are extensive. Noise levels can be collected and analyzed using a wireless sensor network which can monitor the noise level by using microphones. However, every wireless system struggles in terms of the battery requirements needed for continuous data collection and monitoring. In this paper, the design of a testbed for a smart microphone system is presented. To save power, a microcontroller and an Analog-to-Digital Converter (ADC) dynamically switch between high and low power modes in response to environmental noise. Specifically, the high powered components are triggered by a spike in the acoustic noise level. Three wireless technologies, WiFi (2.4 GHz), Bluetooth Low Energy (BLE) 4.0 and Zigbee were examined. According to the results, the power consumption of a node can be lowered by 97% when idle based on the testbed.

[15]  arXiv:2001.08168 (cross-list from cs.NI) [pdf, other]
Title: Hybrid Coded Replication in LoRa Networks
Comments: 9 pages, 4 figures, to be published in IEEE Transactions on Industrial Informatics
Subjects: Networking and Internet Architecture (cs.NI); Signal Processing (eess.SP)

Low Power Wide Area Networks (LPWAN) are wireless connectivity solutions for Internet-of-Things (IoT) applications, including industrial automation. Among the several LPWAN technologies, LoRaWAN has been extensively addressed by the research community and the industry. However, the reliability and scalability of LoRaWAN are still uncertain. One of the techniques to increase the reliability of LoRaWAN is message replication, which exploits time diversity. This paper proposes a novel hybrid coded message replication scheme that interleaves simple repetition and a recently proposed coded replication method. We analyze the optimization of the proposed scheme under minimum reliability requirements and show that it enhances the network performance without requiring additional transmit power compared to the competing replication techniques.

Replacements for Thu, 23 Jan 20

[16]  arXiv:1904.00798 (replaced) [pdf, other]
Title: Performance Analysis of Channel Extrapolation in FDD Massive MIMO Systems
Comments: arXiv admin note: substantial text overlap with arXiv:1902.06844
Subjects: Signal Processing (eess.SP)
[17]  arXiv:1910.00510 (replaced) [pdf, other]
Title: Joint Subcarrier and Power Allocation in NOMA: Optimal and Approximate Algorithms
Subjects: Optimization and Control (math.OC); Computational Complexity (cs.CC); Data Structures and Algorithms (cs.DS); Signal Processing (eess.SP)
[18]  arXiv:1911.10229 (replaced) [pdf]
Title: Improved motion correction for functional MRI using an omnibus regression model
Comments: 4 pages, 2 figures, accepted for IEEE ISBI 2020 conference Updated following ISBI reviewer suggestions
Subjects: Image and Video Processing (eess.IV); Signal Processing (eess.SP); Quantitative Methods (q-bio.QM)
[ total of 18 entries: 1-18 ]
[ showing up to 2000 entries per page: fewer | more ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, eess, recent, 2001, contact, help  (Access key information)