-
Modeling and Mitigating Errors in Belief Propagation for Distributed Detection
Authors:
Younes Abdi,
Tapani Ristaniemi
Abstract:
We study the behavior of the belief-propagation (BP) algorithm affected by erroneous data exchange in a wireless sensor network (WSN). The WSN conducts a distributed binary hypothesis test where the joint statistical behavior of the sensor observations is modeled by a Markov random field whose parameters are used to build the BP messages exchanged between the sensing nodes. Through linearization o…
▽ More
We study the behavior of the belief-propagation (BP) algorithm affected by erroneous data exchange in a wireless sensor network (WSN). The WSN conducts a distributed binary hypothesis test where the joint statistical behavior of the sensor observations is modeled by a Markov random field whose parameters are used to build the BP messages exchanged between the sensing nodes. Through linearization of the BP message-update rule, we analyze the behavior of the resulting erroneous decision variables and derive closed-form relationships that describe the impact of stochastic errors on the performance of the BP algorithm. We then develop a decentralized distributed optimization framework to enhance the system performance by mitigating the impact of errors via a distributed linear data-fusion scheme. Finally, we compare the results of the proposed analysis with the existing works and visualize, via computer simulations, the performance gain obtained by the proposed optimization.
△ Less
Submitted 10 April, 2020;
originally announced April 2020.
-
The Max-Product Algorithm Viewed as Linear Data-Fusion: A Distributed Detection Scenario
Authors:
Younes Abdi,
Tapani Ristaniemi
Abstract:
In this paper, we disclose the statistical behavior of the max-product algorithm configured to solve a maximum a posteriori (MAP) estimation problem in a network of distributed agents. Specifically, we first build a distributed hypothesis test conducted by a max-product iteration over a binary-valued pairwise Markov random field and show that the decision variables obtained are linear combinations…
▽ More
In this paper, we disclose the statistical behavior of the max-product algorithm configured to solve a maximum a posteriori (MAP) estimation problem in a network of distributed agents. Specifically, we first build a distributed hypothesis test conducted by a max-product iteration over a binary-valued pairwise Markov random field and show that the decision variables obtained are linear combinations of the local log-likelihood ratios observed in the network. Then, we use these linear combinations to formulate the system performance in terms of the false-alarm and detection probabilities. Our findings indicate that, in the hypothesis test concerned, the optimal performance of the max-product algorithm is obtained by an optimal linear data-fusion scheme and the behavior of the max-product algorithm is very similar to the behavior of the sum-product algorithm. Consequently, we demonstrate that the optimal performance of the max-product iteration is closely achieved via a linear version of the sum-product algorithm which is optimized based on statistics received at each node from its one-hop neighbors. Finally, we verify our observations via computer simulations.
△ Less
Submitted 29 April, 2020; v1 submitted 20 September, 2019;
originally announced September 2019.
-
Optimization of the Belief-Propagation Algorithm for Distributed Detection by Linear Data-Fusion Techniques
Authors:
Younes Abdi,
Tapani Ristaniemi
Abstract:
In this paper, we investigate distributed inference schemes, over binary-valued Markov random fields, which are realized by the belief propagation (BP) algorithm. We first show that a decision variable obtained by the BP algorithm in a network of distributed agents can be approximated by a linear fusion of all the local log-likelihood ratios. The proposed approach clarifies how the BP algorithm wo…
▽ More
In this paper, we investigate distributed inference schemes, over binary-valued Markov random fields, which are realized by the belief propagation (BP) algorithm. We first show that a decision variable obtained by the BP algorithm in a network of distributed agents can be approximated by a linear fusion of all the local log-likelihood ratios. The proposed approach clarifies how the BP algorithm works, simplifies the statistical analysis of its behavior, and enables us to develop a performance optimization framework for the BP-based distributed inference systems. Next, we propose a blind learning-adaptation scheme to optimize the system performance when there is no information available a priori describing the statistical behavior of the wireless environment concerned. In addition, we propose a blind threshold adaptation method to guarantee a certain performance level in a BP-based distributed detection system. To clarify the points discussed, we design a novel linear-BP-based distributed spectrum sensing scheme for cognitive radio networks and illustrate the performance improvement obtained, over an existing BP-based detection method, via computer simulations.
△ Less
Submitted 18 September, 2019;
originally announced September 2019.
-
Secrecy Analysis and Learning-based Optimization of Cooperative NOMA SWIPT Systems
Authors:
Furqan Jameel,
Wali Ullah Khan,
Zheng Chang,
Tapani Ristaniemi,
Ju Liu
Abstract:
Non-orthogonal multiple access (NOMA) is considered to be one of the best candidates for future networks due to its ability to serve multiple users using the same resource block. Although early studies have focused on transmission reliability and energy efficiency, recent works are considering cooperation among the nodes. The cooperative NOMA techniques allow the user with a better channel (near u…
▽ More
Non-orthogonal multiple access (NOMA) is considered to be one of the best candidates for future networks due to its ability to serve multiple users using the same resource block. Although early studies have focused on transmission reliability and energy efficiency, recent works are considering cooperation among the nodes. The cooperative NOMA techniques allow the user with a better channel (near user) to act as a relay between the source and the user experiencing poor channel (far user). This paper considers the link security aspect of energy harvesting cooperative NOMA users. In particular, the near user applies the decode-and-forward (DF) protocol for relaying the message of the source node to the far user in the presence of an eavesdropper. Moreover, we consider that all the devices use power-splitting architecture for energy harvesting and information decoding. We derive the analytical expression of intercept probability. Next, we employ deep learning based optimization to find the optimal power allocation factor. The results show the robustness and superiority of deep learning optimization over conventional iterative search algorithm.
△ Less
Submitted 12 July, 2019;
originally announced July 2019.
-
Internet of Autonomous Vehicles: Architecture, Features, and Socio-Technological Challenges
Authors:
Furqan Jameel,
Zheng Chang,
Jun Huang,
Tapani Ristaniemi
Abstract:
Mobility is the backbone of urban life and a vital economic factor in the development of the world. Rapid urbanization and the growth of mega-cities is bringing dramatic changes in the capabilities of vehicles. Innovative solutions like autonomy, electrification, and connectivity are on the horizon. How, then, we can provide ubiquitous connectivity to the legacy and autonomous vehicles? This paper…
▽ More
Mobility is the backbone of urban life and a vital economic factor in the development of the world. Rapid urbanization and the growth of mega-cities is bringing dramatic changes in the capabilities of vehicles. Innovative solutions like autonomy, electrification, and connectivity are on the horizon. How, then, we can provide ubiquitous connectivity to the legacy and autonomous vehicles? This paper seeks to answer this question by combining recent leaps of innovation in network virtualization with remarkable feats of wireless communications. To do so, this paper proposes a novel paradigm called the Internet of autonomous vehicles (IoAV). We begin painting the picture of IoAV by discussing the salient features, and applications of IoAV which is followed by a detailed discussion on the key enabling technologies. Next, we describe the proposed layered architecture of IoAV and uncover some critical functions of each layer. This is followed by the performance evaluation of IoAV which shows the significant advantage of the proposed architecture in terms of transmission time and energy consumption. Finally, to best capture the benefits of IoAV, we enumerate some social and technological challenges and explain how some unresolved issues can disrupt the widespread use of autonomous vehicles in the future.
△ Less
Submitted 24 June, 2019;
originally announced June 2019.
-
Simultaneous Harvest-and-Transmit Ambient Backscatter Communications under Rayleigh Fading
Authors:
Furqan Jameel,
Tapani Ristaniemi,
Imran Khan,
Byung Moo Lee
Abstract:
Ambient backscatter communications is an emerging paradigm and a key enabler for pervasive connectivity of low-powered wireless devices. It is primarily beneficial in the Internet of things (IoT) and the situations where computing and connectivity capabilities expand to sensors and miniature devices that exchange data on a low power budget. The premise of the ambient backscatter communication is t…
▽ More
Ambient backscatter communications is an emerging paradigm and a key enabler for pervasive connectivity of low-powered wireless devices. It is primarily beneficial in the Internet of things (IoT) and the situations where computing and connectivity capabilities expand to sensors and miniature devices that exchange data on a low power budget. The premise of the ambient backscatter communication is to build a network of devices capable of operating in a battery-free manner by means of smart networking, radio frequency (RF) energy harvesting and power management at the granularity of individual bits and instructions. Due to this innovation in communication methods, it is essential to investigate the performance of these devices under practical constraints. To do so, this article formulates a model for wireless-powered ambient backscatter devices and derives a closed-form expression of outage probability under Rayleigh fading. Based on this expression, the article provides the power-splitting factor that balances the tradeoff between energy harvesting and achievable data rate. Our results also shed light on the complex interplay of a power-splitting factor, amount of harvested energy, and the achievable data rates.
△ Less
Submitted 24 June, 2019;
originally announced June 2019.
-
Applications of Backscatter Communications for Healthcare Networks
Authors:
Furqan Jameel,
Ruifeng Duan,
Zheng Chang,
Aleksi Liljemark,
Tapani Ristaniemi,
Riku Jantti
Abstract:
Backscatter communication is expected to help in revitalizing the domain of healthcare through its myriad applications. From on-body sensors to in-body implants and miniature embeddable devices, there are many potential use cases that can leverage the miniature and low-powered nature of backscatter devices. However, the existing literature lacks a comprehensive study that provides a distilled revi…
▽ More
Backscatter communication is expected to help in revitalizing the domain of healthcare through its myriad applications. From on-body sensors to in-body implants and miniature embeddable devices, there are many potential use cases that can leverage the miniature and low-powered nature of backscatter devices. However, the existing literature lacks a comprehensive study that provides a distilled review of the latest studies on backscatter communications from the healthcare perspective. Thus, with the objective to promote the utility of backscatter communication in healthcare, this paper aims to identify specific applications of backscatter systems. A detailed taxonomy of recent studies and gap analysis for future research directions are provided in this work. Finally, we conduct measurements at 590 MHz in different propagation environments with the in-house designed backscatter device. The link budget results show the promise of backscatter devices to communicate over large distances for indoor environments which demonstrates its potential in the healthcare system.
△ Less
Submitted 21 June, 2019;
originally announced June 2019.
-
Sparse Nonnegative CANDECOMP/PARAFAC Decomposition in Block Coordinate Descent Framework: A Comparison Study
Authors:
Deqing Wang,
Fengyu Cong,
Tapani Ristaniemi
Abstract:
Nonnegative CANDECOMP/PARAFAC (NCP) decomposition is an important tool to process nonnegative tensor. Sometimes, additional sparse regularization is needed to extract meaningful nonnegative and sparse components. Thus, an optimization method for NCP that can impose sparsity efficiently is required. In this paper, we construct NCP with sparse regularization (sparse NCP) by l1-norm. Several popular…
▽ More
Nonnegative CANDECOMP/PARAFAC (NCP) decomposition is an important tool to process nonnegative tensor. Sometimes, additional sparse regularization is needed to extract meaningful nonnegative and sparse components. Thus, an optimization method for NCP that can impose sparsity efficiently is required. In this paper, we construct NCP with sparse regularization (sparse NCP) by l1-norm. Several popular optimization methods in block coordinate descent framework are employed to solve the sparse NCP, all of which are deeply analyzed with mathematical solutions. We compare these methods by experiments on synthetic and real tensor data, both of which contain third-order and fourth-order cases. After comparison, the methods that have fast computation and high effectiveness to impose sparsity will be concluded. In addition, we proposed an accelerated method to compute the objective function and relative error of sparse NCP, which has significantly improved the computation of tensor decomposition especially for higher-order tensor.
△ Less
Submitted 27 December, 2018;
originally announced December 2018.
-
Towards Service-oriented 5G: Virtualizing the Networks for Everything-as-a-Service
Authors:
Zheng Chang,
Zhenyu Zhou,
Sheng Zhou,
Tapani Ristaniemi,
Zhisheng Niu
Abstract:
It is widely acknowledged that the forthcoming 5G architecture will be highly heterogeneous and deployed with a high degree of density. These changes over the current 4G bring many challenges on how to achieve an efficient operation from the network management perspective. In this article, we introduce a revolutionary vision of the future 5G wireless networks, in which the network is no longer lim…
▽ More
It is widely acknowledged that the forthcoming 5G architecture will be highly heterogeneous and deployed with a high degree of density. These changes over the current 4G bring many challenges on how to achieve an efficient operation from the network management perspective. In this article, we introduce a revolutionary vision of the future 5G wireless networks, in which the network is no longer limited by hardware or even software. Specifically, by the idea of virtualizing the wireless networks, which has recently gained increasing attention, we introduce the Everything-as-a-Service (XaaS) taxonomy to light the way towards designing the service-oriented wireless networks. The concepts, challenges along with the research opportunities for realizing XaaS in wireless networks are overviewed and discussed.
△ Less
Submitted 6 April, 2016;
originally announced April 2016.
-
Queueing Game For Spectrum Access in Cognitive Radio Networks
Authors:
Zheng Chang,
Tapani Ristaniemi,
Zhu Han
Abstract:
In this paper, we investigate the problem of spectrum access decision-making for the Secondary Users (SUs) in the cognitive radio networks. When the Primary Users (PUs) are absent on certain frequency bandwidth, SUs can formulate a queue and wait for the Base Station (BS) to serve. The queue of the SUs will be dismissed if the PU is emerging in the system. Leveraging the queueing game approaches,…
▽ More
In this paper, we investigate the problem of spectrum access decision-making for the Secondary Users (SUs) in the cognitive radio networks. When the Primary Users (PUs) are absent on certain frequency bandwidth, SUs can formulate a queue and wait for the Base Station (BS) to serve. The queue of the SUs will be dismissed if the PU is emerging in the system. Leveraging the queueing game approaches, the decision-making process of the SUs that whether to queue or not is studied. Both individual equilibrium and social optimization strategies are derived analytically. Moreover, the optimal pricing strategy of the service provider is investigated as well. Our proposed algorithms and corresponding analysis are validated through simulation studies.
△ Less
Submitted 7 June, 2015;
originally announced June 2015.
-
Random Interruptions in Cooperation for Spectrum Sensing in Cognitive Radio Networks
Authors:
Younes Abdi,
Tapani Ristaniemi
Abstract:
In this paper, a new cooperation structure for spectrum sensing in cognitive radio networks is proposed which outperforms the existing commonly-used ones in terms of energy efficiency. The efficiency is achieved in the proposed design by introducing random interruptions in the cooperation process between the sensing nodes and the fusion center, along with a compensation process at the fusion cente…
▽ More
In this paper, a new cooperation structure for spectrum sensing in cognitive radio networks is proposed which outperforms the existing commonly-used ones in terms of energy efficiency. The efficiency is achieved in the proposed design by introducing random interruptions in the cooperation process between the sensing nodes and the fusion center, along with a compensation process at the fusion center. Regarding the hypothesis testing problem concerned, first, the proposed system behavior is thoroughly analyzed and its associated likelihood-ratio test (LRT) is provided. Next, based on a general linear fusion rule, statistics of the global test summary are derived and the sensing quality is characterized in terms of the probability of false alarm and the probability of detection. Then, optimization of the overall detection performance is formulated according to the Neyman-Pearson criterion (NPC) and it is discussed that the optimization required is indeed a decision-making process with uncertainty which incurs prohibitive computational complexity. The NPC is then modified to achieve a good affordable solution by using semidefinite programming (SDP) techniques and it is shown that this new solution is nearly optimal according to the deflection criterion. Finally, effectiveness of the proposed architecture and its associated SDP are demonstrated by simulation results.
△ Less
Submitted 10 September, 2015; v1 submitted 1 May, 2015;
originally announced May 2015.
-
Sequence-based Detection of Slee** Cell Failures in Mobile Networks
Authors:
Fedor Chernogorov,
Sergey Chernov,
Kimmo Brigatti,
Tapani Ristaniemi
Abstract:
This article presents an automatic malfunction detection framework based on data mining approach to analysis of network event sequences. The considered environment is Long Term Evolution (LTE) for Universal Mobile Telecommunication System (UMTS) with slee** cell caused by random access channel failure. Slee** cell problem means unavailability of network service without triggered alarm. The pro…
▽ More
This article presents an automatic malfunction detection framework based on data mining approach to analysis of network event sequences. The considered environment is Long Term Evolution (LTE) for Universal Mobile Telecommunication System (UMTS) with slee** cell caused by random access channel failure. Slee** cell problem means unavailability of network service without triggered alarm. The proposed detection framework uses N-gram analysis for identification of abnormal behavior in sequences of network events. These events are collected with Minimization of Drive Tests (MDT) functionality standardized in LTE. Further processing applies dimensionality reduction, anomaly detection with k-nearest neighbor, cross-validation, post-processing techniques and efficiency evaluation. Different anomaly detection approaches proposed in this paper are compared against each other with both classic data mining metrics, such as F-score and receiver operating characteristic curves, and a newly proposed heuristic approach. Achieved results demonstrate that the suggested method can be used in modern performance monitoring systems for reliable, timely and automatic detection of random access channel slee** cells.
△ Less
Submitted 13 May, 2015; v1 submitted 16 January, 2015;
originally announced January 2015.
-
Energy Efficient Resource Allocation and User Scheduling for Collaborative Mobile Clouds with Hybrid Receivers
Authors:
Zheng Chang,
Jie Gong,
Tapani Ristaniemi,
Zhisheng Niu
Abstract:
In this paper, we study the resource allocation and user scheduling algorithm for minimizing the energy cost of data transmission in the context of OFDMA collaborative mobile cloud (CMC) with simultaneous wireless information and power transfer (SWIPT) receivers. The CMC, which consists of several collaborating MTs offers one potential solution for downlink content distribution and for the energy…
▽ More
In this paper, we study the resource allocation and user scheduling algorithm for minimizing the energy cost of data transmission in the context of OFDMA collaborative mobile cloud (CMC) with simultaneous wireless information and power transfer (SWIPT) receivers. The CMC, which consists of several collaborating MTs offers one potential solution for downlink content distribution and for the energy consumption reduction at the terminal side. Meanwhile, as RF signal can carry both information and energy simultaneously, the induced SWIPT has gained much attention for energy efficiency design of mobile nodes. Previous work on the design of CMC system mainly focused on the cloud formulation or energy efficiency investigation, while how to allocate the radio resource and schedule user transmission lacks attention. With the objective to minimize the system energy consumption, an optimization problem which jointly considers subchannel assignment, power allocation and user scheduling for a group of SWIPT receivers has been presented. The formulated problem is addressed through the convex optimization technique. Simulation results demonstrate that the proposed user scheduling and resource allocation algorithms can achieve significant energy saving performance.
△ Less
Submitted 1 October, 2014;
originally announced October 2014.
-
Diffusion map for clustering fMRI spatial maps extracted by independent component analysis
Authors:
Tuomo Sipola,
Fengyu Cong,
Tapani Ristaniemi,
Vinoo Alluri,
Petri Toiviainen,
Elvira Brattico,
Asoke K. Nandi
Abstract:
Functional magnetic resonance imaging (fMRI) produces data about activity inside the brain, from which spatial maps can be extracted by independent component analysis (ICA). In datasets, there are n spatial maps that contain p voxels. The number of voxels is very high compared to the number of analyzed spatial maps. Clustering of the spatial maps is usually based on correlation matrices. This usua…
▽ More
Functional magnetic resonance imaging (fMRI) produces data about activity inside the brain, from which spatial maps can be extracted by independent component analysis (ICA). In datasets, there are n spatial maps that contain p voxels. The number of voxels is very high compared to the number of analyzed spatial maps. Clustering of the spatial maps is usually based on correlation matrices. This usually works well, although such a similarity matrix inherently can explain only a certain amount of the total variance contained in the high-dimensional data where n is relatively small but p is large. For high-dimensional space, it is reasonable to perform dimensionality reduction before clustering. In this research, we used the recently developed diffusion map for dimensionality reduction in conjunction with spectral clustering. This research revealed that the diffusion map based clustering worked as well as the more traditional methods, and produced more compact clusters when needed.
△ Less
Submitted 27 September, 2013; v1 submitted 6 June, 2013;
originally announced June 2013.