-
A jump operator on the Weihrauch degrees
Authors:
Uri Andrews,
Steffen Lempp,
Alberto Marcone,
Joseph S. Miller,
Manlio Valenti
Abstract:
A partial order $(P,\le)$ admits a jump operator if there is a map $j\colon P \to P$ that is strictly increasing and weakly monotone. Despite its name, the jump in the Weihrauch lattice fails to satisfy both of these properties: it is not degree-theoretic and there are functions $f$ such that $f\equiv_{\mathrm{W}} f'$. This raises the question: is there a jump operator in the Weihrauch lattice? We…
▽ More
A partial order $(P,\le)$ admits a jump operator if there is a map $j\colon P \to P$ that is strictly increasing and weakly monotone. Despite its name, the jump in the Weihrauch lattice fails to satisfy both of these properties: it is not degree-theoretic and there are functions $f$ such that $f\equiv_{\mathrm{W}} f'$. This raises the question: is there a jump operator in the Weihrauch lattice? We answer this question positively and provide an explicit definition for an operator on partial multi-valued functions that, when lifted to the Weihrauch degrees, induces a jump operator. This new operator, called the totalizing jump, can be characterized in terms of the total continuation, a well-known operator on computational problems. The totalizing jump induces an injective endomorphism of the Weihrauch degrees. We study some algebraic properties of the totalizing jump and characterize its behavior on some pivotal problems in the Weihrauch lattice.
△ Less
Submitted 20 February, 2024;
originally announced February 2024.
-
The weakness of finding descending sequences in ill-founded linear orders
Authors:
Jun Le Goh,
Arno Pauly,
Manlio Valenti
Abstract:
We prove that the Weihrauch degree of the problem of finding a bad sequence in a non-well quasi order ($\mathsf{BS}$) is strictly above that of finding a descending sequence in an ill-founded linear order ($\mathsf{DS}$). This corrects our mistaken claim in arXiv:2010.03840, which stated that they are Weihrauch equivalent. We prove that König's lemma $\mathsf{KL}$ and the problem…
▽ More
We prove that the Weihrauch degree of the problem of finding a bad sequence in a non-well quasi order ($\mathsf{BS}$) is strictly above that of finding a descending sequence in an ill-founded linear order ($\mathsf{DS}$). This corrects our mistaken claim in arXiv:2010.03840, which stated that they are Weihrauch equivalent. We prove that König's lemma $\mathsf{KL}$ and the problem $\mathsf{wList}_{2^{\mathbb{N}},\leqω}$ of enumerating a given non-empty countable closed subset of $2^\mathbb{N}$ are not Weihrauch reducible to $\mathsf{DS}$ either, resolving two main open questions raised in arXiv:2010.03840.
△ Less
Submitted 2 July, 2024; v1 submitted 22 January, 2024;
originally announced January 2024.
-
The tree pigeonhole principle in the Weihrauch degrees
Authors:
Damir Dzhafarov,
Reed Solomon,
Manlio Valenti
Abstract:
We study versions of the tree pigeonhole principle, $\mathsf{TT}^1$, in the context of Weihrauch-style computable analysis. The principle has previously been the subject of extensive research in reverse mathematics. Two outstanding questions from the latter investigation are whether $\mathsf{TT}^1$ is $Π^1_1$-conservative over the ordinary pigeonhole principle, $\mathsf{RT}^1$, and whether it is e…
▽ More
We study versions of the tree pigeonhole principle, $\mathsf{TT}^1$, in the context of Weihrauch-style computable analysis. The principle has previously been the subject of extensive research in reverse mathematics. Two outstanding questions from the latter investigation are whether $\mathsf{TT}^1$ is $Π^1_1$-conservative over the ordinary pigeonhole principle, $\mathsf{RT}^1$, and whether it is equivalent to any first-order statement of second-order arithmetic. Using the recently introduced notion of the first-order part of an instance-solution problem, we formulate, and answer in the affirmative, the analogue of the first question for Weihrauch reducibility. We then use this, in combination with other results, to answer in the negative the analogue of the second question. Our proofs develop a new combinatorial machinery for constructing and understanding solutions to instances of $\mathsf{TT}^1$.
△ Less
Submitted 16 December, 2023;
originally announced December 2023.
-
Minimal covers in the Weihrauch degrees
Authors:
Steffen Lempp,
Joseph S. Miller,
Arno Pauly,
Mariya I. Soskova,
Manlio Valenti
Abstract:
In this paper, we study the existence of minimal covers and strong minimal covers in the Weihrauch degrees. We characterize when a problem $f$ is a minimal cover or strong minimal cover of a problem $h$. We show that strong minimal covers only exist in the cone below $\mathsf{id}$ and that the Weihrauch lattice above $\mathsf{id}$ is dense. From this, we conclude that the degree of $\mathsf{id}$ i…
▽ More
In this paper, we study the existence of minimal covers and strong minimal covers in the Weihrauch degrees. We characterize when a problem $f$ is a minimal cover or strong minimal cover of a problem $h$. We show that strong minimal covers only exist in the cone below $\mathsf{id}$ and that the Weihrauch lattice above $\mathsf{id}$ is dense. From this, we conclude that the degree of $\mathsf{id}$ is first-order definable in the Weihrauch degrees and that the first-order theory of the Weihrauch degrees is computably isomorphic to third-order arithmetic.
△ Less
Submitted 21 November, 2023;
originally announced November 2023.
-
Wearable data from subjects playing Super Mario, sitting university exams, or performing physical exercise help detect acute mood episodes via self-supervised learning
Authors:
Filippo Corponi,
Bryan M. Li,
Gerard Anmella,
Clàudia Valenzuela-Pascual,
Ariadna Mas,
Isabella Pacchiarotti,
Marc Valentí,
Iria Grande,
Antonio Benabarre,
Marina Garriga,
Eduard Vieta,
Allan H Young,
Stephen M. Lawrie,
Heather C. Whalley,
Diego Hidalgo-Mazzei,
Antonio Vergari
Abstract:
Personal sensing, leveraging data passively and near-continuously collected with wearables from patients in their ecological environment, is a promising paradigm to monitor mood disorders (MDs), a major determinant of worldwide disease burden. However, collecting and annotating wearable data is very resource-intensive. Studies of this kind can thus typically afford to recruit only a couple dozens…
▽ More
Personal sensing, leveraging data passively and near-continuously collected with wearables from patients in their ecological environment, is a promising paradigm to monitor mood disorders (MDs), a major determinant of worldwide disease burden. However, collecting and annotating wearable data is very resource-intensive. Studies of this kind can thus typically afford to recruit only a couple dozens of patients. This constitutes one of the major obstacles to applying modern supervised machine learning techniques to MDs detection. In this paper, we overcome this data bottleneck and advance the detection of MDs acute episode vs stable state from wearables data on the back of recent advances in self-supervised learning (SSL). This leverages unlabelled data to learn representations during pre-training, subsequently exploited for a supervised task. First, we collected open-access datasets recording with an Empatica E4 spanning different, unrelated to MD monitoring, personal sensing tasks -- from emotion recognition in Super Mario players to stress detection in undergraduates -- and devised a pre-processing pipeline performing on-/off-body detection, sleep-wake detection, segmentation, and (optionally) feature extraction. With 161 E4-recorded subjects, we introduce E4SelfLearning, the largest to date open access collection, and its pre-processing pipeline. Second, we show that SSL confidently outperforms fully-supervised pipelines using either our novel E4-tailored Transformer architecture (E4mer) or classical baseline XGBoost: 81.23% against 75.35% (E4mer) and 72.02% (XGBoost) correctly classified recording segments from 64 (half acute, half stable) patients. Lastly, we illustrate that SSL performance is strongly associated with the specific surrogate task employed for pre-training as well as with unlabelled data availability.
△ Less
Submitted 7 November, 2023;
originally announced November 2023.
-
Where to Deploy an Airborne Relay in Unknown Environments: Feasible Locations for Throughput and LoS Enhancement
Authors:
Juan David Pabon,
Matthew C. Valenti,
Xi Yu
Abstract:
The deployment of heterogeneous teams of both air and ground mobile assets combines the advantages of mobility, sensing capability, and operational duration when performing complex tasks. Air assets in such teams act to relay information between ground assets but must maintain unblocked paths to enable high-capacity communication modes. Obstacles in the operational environment may block the line o…
▽ More
The deployment of heterogeneous teams of both air and ground mobile assets combines the advantages of mobility, sensing capability, and operational duration when performing complex tasks. Air assets in such teams act to relay information between ground assets but must maintain unblocked paths to enable high-capacity communication modes. Obstacles in the operational environment may block the line of sight (LoS) between air assets and ground assets depending on their locations and heights. In this paper, we analyze the probability of spanning a two-hop communication between a pair of ground assets deployed in an environment with obstacles at random locations and with random heights (i.e. a Poisson Forest) using an air asset at any location near the ground assets. We provide a closed-form expression of the LoS probability based on the 3-dimensional locations of the air asset. We then compute a 3-D manifold of the air asset locations that satisfy a given LoS probability constraint. We further consider throughput as a measure of communication quality, and use it as an optimization objective.
△ Less
Submitted 1 November, 2023;
originally announced November 2023.
-
Uniqueness of Iris Pattern Based on AR Model
Authors:
Katelyn M. Hampel,
**yu Zuo,
Priyanka Das,
Natalia A. Schmid,
Stephanie Schuckers,
Joseph Skufca,
Matthew C. Valenti
Abstract:
The assessment of iris uniqueness plays a crucial role in analyzing the capabilities and limitations of iris recognition systems. Among the various methodologies proposed, Daugman's approach to iris uniqueness stands out as one of the most widely accepted. According to Daugman, uniqueness refers to the iris recognition system's ability to enroll an increasing number of classes while maintaining a…
▽ More
The assessment of iris uniqueness plays a crucial role in analyzing the capabilities and limitations of iris recognition systems. Among the various methodologies proposed, Daugman's approach to iris uniqueness stands out as one of the most widely accepted. According to Daugman, uniqueness refers to the iris recognition system's ability to enroll an increasing number of classes while maintaining a near-zero probability of collision between new and enrolled classes. Daugman's approach involves creating distinct IrisCode templates for each iris class within the system and evaluating the sustainable population under a fixed Hamming distance between codewords. In our previous work [23], we utilized Rate-Distortion Theory (as it pertains to the limits of error-correction codes) to establish boundaries for the maximum possible population of iris classes supported by Daugman's IrisCode, given the constraint of a fixed Hamming distance between codewords. Building upon that research, we propose a novel methodology to evaluate the scalability of an iris recognition system, while also measuring iris quality. We achieve this by employing a sphere-packing bound for Gaussian codewords and adopting a approach similar to Daugman's, which utilizes relative entropy as a distance measure between iris classes. To demonstrate the efficacy of our methodology, we illustrate its application on two small datasets of iris images. We determine the sustainable maximum population for each dataset based on the quality of the images. By providing these illustrations, we aim to assist researchers in comprehending the limitations inherent in their recognition systems, depending on the quality of their iris databases.
△ Less
Submitted 21 June, 2023;
originally announced June 2023.
-
Empirical Assessment of End-to-End Iris Recognition System Capacity
Authors:
Priyanka Das,
Richard Plesh,
Veeru Talreja,
Natalia Schmid,
Matthew Valenti,
Joseph Skufca,
Stephanie Schuckers
Abstract:
Iris is an established modality in biometric recognition applications including consumer electronics, e-commerce, border security, forensics, and de-duplication of identity at a national scale. In light of the expanding usage of biometric recognition, identity clash (when templates from two different people match) is an imperative factor of consideration for a system's deployment. This study explo…
▽ More
Iris is an established modality in biometric recognition applications including consumer electronics, e-commerce, border security, forensics, and de-duplication of identity at a national scale. In light of the expanding usage of biometric recognition, identity clash (when templates from two different people match) is an imperative factor of consideration for a system's deployment. This study explores system capacity estimation by empirically estimating the constrained capacity of an end-to-end iris recognition system (NIR systems with Daugman-based feature extraction) operating at an acceptable error rate i.e. the number of subjects a system can resolve before encountering an error. We study the impact of six system parameters on an iris recognition system's constrained capacity -- number of enrolled identities, image quality, template dimension, random feature elimination, filter resolution, and system operating point. In our assessment, we analyzed 13.2 million comparisons from 5158 unique identities for each of 24 different system configurations. This work provides a framework to better understand iris recognition system capacity as a function of biometric system configurations beyond the operating point, for large-scale applications.
△ Less
Submitted 20 March, 2023;
originally announced March 2023.
-
Air-Aided Communication Between Ground Assets in a Poisson Forest
Authors:
Juan David Pabon,
Shaikha Alkandari,
Matthew C. Valenti,
Xi Yu
Abstract:
Ground assets deployed in a cluttered environment with randomized obstacles (e.g., a forest) may experience line of sight (LoS) obstruction due to those obstacles. Air assets can be deployed in the vicinity to aid the communication by establishing two-hop paths between the ground assets. Obstacles that are taller than a position-dependent critical height may still obstruct the LoS between a ground…
▽ More
Ground assets deployed in a cluttered environment with randomized obstacles (e.g., a forest) may experience line of sight (LoS) obstruction due to those obstacles. Air assets can be deployed in the vicinity to aid the communication by establishing two-hop paths between the ground assets. Obstacles that are taller than a position-dependent critical height may still obstruct the LoS between a ground asset and an air asset. In this paper, we provide an analytical framework for computing the probability of obtaining a LoS path in a Poisson forest. Given the locations and heights of a ground asset and an air asset, we establish the critical height, which is a function of distance. To account for this dependence on distance, the blocking is modeled as an inhomogenous Poisson point process, and the LoS probability is its void probability. Examples and closed-form expressions are provided for two obstruction height distributions: uniform and truncated Gaussian. The examples are validated through simulation. Additionally, the end-to-end throughput is determined and shown to be a metric that balances communication distance with the impact of LoS blockage. Throughput is used to determine the range at which it is better to relay communications through the air asset, and, when the air asset is deployed, its optimal height.
△ Less
Submitted 19 November, 2022;
originally announced November 2022.
-
The Weihrauch lattice at the level of $\boldsymbolΠ_1^1\mathsf{-CA}_0$: the Cantor-Bendixson theorem
Authors:
Vittorio Cipriani,
Alberto Marcone,
Manlio Valenti
Abstract:
This paper continues the program connecting reverse mathematics and computable analysis via the framework of Weihrauch reducibility. In particular, we consider problems related to perfect subsets of Polish spaces, studying the perfect set theorem, the Cantor-Bendixson theorem and various problems arising from them. In the framework of reverse mathematics these theorems are equivalent respectively…
▽ More
This paper continues the program connecting reverse mathematics and computable analysis via the framework of Weihrauch reducibility. In particular, we consider problems related to perfect subsets of Polish spaces, studying the perfect set theorem, the Cantor-Bendixson theorem and various problems arising from them. In the framework of reverse mathematics these theorems are equivalent respectively to $\mathsf{ATR}_0$ and $\boldsymbolΠ_1^1\mathsf{-CA}_0$, the two strongest subsystems of second order arithmetic among the so-called big five. As far as we know, this is the first systematic study of problems at the level of $\boldsymbolΠ_1^1\mathsf{-CA}_0$ in the Weihrauch lattice.
We show that the strength of some of the problems we study depends on the topological properties of the Polish space under consideration, while others have the same strength once the space is rich enough.
△ Less
Submitted 27 October, 2022;
originally announced October 2022.
-
Categorifying computable reducibilities
Authors:
Davide Trotta,
Manlio Valenti,
Valeria de Paiva
Abstract:
This paper presents categorical formulations of Turing, Medvedev, Muchnik, and Weihrauch reducibilities in Computability Theory, utilizing Lawvere doctrines. While the first notions lend themselves to a smooth categorical presentation, essentially dualizing the traditional notion of realizability doctrines, Weihrauch reducibility and its extensions for represented and multi-represented spaces requ…
▽ More
This paper presents categorical formulations of Turing, Medvedev, Muchnik, and Weihrauch reducibilities in Computability Theory, utilizing Lawvere doctrines. While the first notions lend themselves to a smooth categorical presentation, essentially dualizing the traditional notion of realizability doctrines, Weihrauch reducibility and its extensions for represented and multi-represented spaces require a thorough investigation and the formulation of a new appropriate extension of the category of assemblies as a foundation for the respective doctrine.
Our abstract analysis of these concepts highlights a shared characteristic among all these reducibilities. Specifically, we demonstrate that all these doctrines stemming from computability concepts can be proven to be instances of completions of quantifiers for doctrines, analogous to what occurs for doctrines for realizability.
As a corollary of these results, we will be formally able to compare Weihrauch reducibility with the dialectica doctrine constructed from a doctrine representing Turing degrees.
△ Less
Submitted 16 March, 2024; v1 submitted 18 August, 2022;
originally announced August 2022.
-
LDD: A Dataset for Grape Diseases Object Detection and Instance Segmentation
Authors:
Leonardo Rossi,
Marco Valenti,
Sara Elisabetta Legler,
Andrea Prati
Abstract:
The Instance Segmentation task, an extension of the well-known Object Detection task, is of great help in many areas, such as precision agriculture: being able to automatically identify plant organs and the possible diseases associated with them, allows to effectively scale and automate crop monitoring and its diseases control. To address the problem related to early disease detection and diagnosi…
▽ More
The Instance Segmentation task, an extension of the well-known Object Detection task, is of great help in many areas, such as precision agriculture: being able to automatically identify plant organs and the possible diseases associated with them, allows to effectively scale and automate crop monitoring and its diseases control. To address the problem related to early disease detection and diagnosis on vines plants, a new dataset has been created with the goal of advancing the state-of-the-art of diseases recognition via instance segmentation approaches. This was achieved by gathering images of leaves and clusters of grapes affected by diseases in their natural context. The dataset contains photos of 10 object types which include leaves and grapes with and without symptoms of the eight more common grape diseases, with a total of 17,706 labeled instances in 1,092 images. Multiple statistical measures are proposed in order to offer a complete view on the characteristics of the dataset. Preliminary results for the object detection and instance segmentation tasks reached by the models Mask R-CNN and R^3-CNN are provided as baseline, demonstrating that the procedure is able to reach promising results about the objective of automatic diseases' symptoms recognition.
△ Less
Submitted 21 June, 2022;
originally announced June 2022.
-
Algebraic properties of the first-order part of a problem
Authors:
Giovanni Solda,
Manlio Valenti
Abstract:
In this paper we study the notion of first-order part of a computational problem, first introduced by Dzhafarov, Solomon, and Yokoyama, which captures the "strongest computational problem with codomain $\mathbb{N}$ that is Weihrauch reducible to $f$". This operator is very useful to prove separation results, especially at the higher levels of the Weihrauch lattice. We explore the first-order part…
▽ More
In this paper we study the notion of first-order part of a computational problem, first introduced by Dzhafarov, Solomon, and Yokoyama, which captures the "strongest computational problem with codomain $\mathbb{N}$ that is Weihrauch reducible to $f$". This operator is very useful to prove separation results, especially at the higher levels of the Weihrauch lattice. We explore the first-order part in relation with several other operators already known in the literature. We also introduce a new operator, called unbounded finite parallelization, which plays an important role in characterizing the first-order part of parallelizable problems. We show how the obtained results can be used to explicitly characterize the first-order part of several known problems.
△ Less
Submitted 25 March, 2023; v1 submitted 30 March, 2022;
originally announced March 2022.
-
Attribute-Based Deep Periocular Recognition: Leveraging Soft Biometrics to Improve Periocular Recognition
Authors:
Veeru Talreja,
Nasser M. Nasrabadi,
Matthew C. Valenti
Abstract:
In recent years, periocular recognition has been developed as a valuable biometric identification approach, especially in wild environments (for example, masked faces due to COVID-19 pandemic) where facial recognition may not be applicable. This paper presents a new deep periocular recognition framework called attribute-based deep periocular recognition (ADPR), which predicts soft biometrics and i…
▽ More
In recent years, periocular recognition has been developed as a valuable biometric identification approach, especially in wild environments (for example, masked faces due to COVID-19 pandemic) where facial recognition may not be applicable. This paper presents a new deep periocular recognition framework called attribute-based deep periocular recognition (ADPR), which predicts soft biometrics and incorporates the prediction into a periocular recognition algorithm to determine identity from periocular images with high accuracy. We propose an end-to-end framework, which uses several shared convolutional neural network (CNN)layers (a common network) whose output feeds two separate dedicated branches (modality dedicated layers); the first branch classifies periocular images while the second branch predicts softn biometrics. Next, the features from these two branches are fused together for a final periocular recognition. The proposed method is different from existing methods as it not only uses a shared CNN feature space to train these two tasks jointly, but it also fuses predicted soft biometric features with the periocular features in the training step to improve the overall periocular recognition performance. Our proposed model is extensively evaluated using four different publicly available datasets. Experimental results indicate that our soft biometric based periocular recognition approach outperforms other state-of-the-art methods for periocular recognition in wild environments.
△ Less
Submitted 1 November, 2021;
originally announced November 2021.
-
Optimization of a Millimeter-Wave UAV-to-Ground Network in Urban Deployments
Authors:
Enass Hriba,
Matthew C. Valenti,
Robert W. Heath Jr
Abstract:
An urban tactical wireless network is considered wherein the base stations are situated on unmanned aerial vehicles (UAVs) that provide connectivity to ground assets such as vehicles located on city streets. The UAVs are assumed to be randomly deployed at a fixed height according to a two-dimensional point process. Millimeter-wave (mmWave) frequencies are used to avail of large available bandwidth…
▽ More
An urban tactical wireless network is considered wherein the base stations are situated on unmanned aerial vehicles (UAVs) that provide connectivity to ground assets such as vehicles located on city streets. The UAVs are assumed to be randomly deployed at a fixed height according to a two-dimensional point process. Millimeter-wave (mmWave) frequencies are used to avail of large available bandwidths and spatial isolation due to beamforming. In urban environments, mmWave signals are prone to blocking of the line-of-sight (LoS) by buildings. While reflections are possible, the desire for consistent connectivity places a strong preference on the existence of an unblocked LoS path. As such, the key performance metric considered in this paper is the connectivity probability, which is the probability of an unblocked LoS path to at least one UAV within some maximum transmission distance. By leveraging tools from stochastic geometry, the connectivity probability is characterized as a function of the city type (e.g., urban, dense urban, suburban), density of UAVs (average number of UAVs per square km), and height of the UAVs. The city streets are modeled as a Manhattan Poisson Line Process (MPLP) and the building heights are randomly distributed. The analysis first finds the connectivity probability conditioned on a particular network realization (location of the UAVs) and then removes the conditioning to uncover the distribution of the connectivity; i.e., the fraction of network realizations that will fail to meet an outage threshold. While related work has applied an MPLP to networks with a single UAV, the contributions of this paper are that it (1) considers networks of multiple UAVs, (2) characterizes the performance by a connectivity distribution, and (3) identifies the optimal altitude for the UAVs.
△ Less
Submitted 31 October, 2021;
originally announced November 2021.
-
Effective aspects of Hausdorff and Fourier dimension
Authors:
Alberto Marcone,
Manlio Valenti
Abstract:
In this paper, we study Hausdorff and Fourier dimension from the point of view of effective descriptive set theory and Type-2 Theory of Effectivity. Working in the hyperspace $\mathbf{K}(X)$ of compact subsets of $X$, with $X=[0,1]^d$ or $X=\mathbb{R}^d$, we characterize the complexity of the family of sets having sufficiently large Hausdorff or Fourier dimension. This, in turn, allows us to show…
▽ More
In this paper, we study Hausdorff and Fourier dimension from the point of view of effective descriptive set theory and Type-2 Theory of Effectivity. Working in the hyperspace $\mathbf{K}(X)$ of compact subsets of $X$, with $X=[0,1]^d$ or $X=\mathbb{R}^d$, we characterize the complexity of the family of sets having sufficiently large Hausdorff or Fourier dimension. This, in turn, allows us to show that family of all the closed Salem sets is $Π^0_3$-complete. One of our main tools is a careful analysis of the effectiveness of a classical theorem of Kaufman. We furthermore compute the Weihrauch degree of the functions computing Hausdorff and Fourier dimension of closed sets.
△ Less
Submitted 25 July, 2022; v1 submitted 16 August, 2021;
originally announced August 2021.
-
Profile to Frontal Face Recognition in the Wild Using Coupled Conditional GAN
Authors:
Fariborz Taherkhani,
Veeru Talreja,
Jeremy Dawson,
Matthew C. Valenti,
Nasser M. Nasrabadi
Abstract:
In recent years, with the advent of deep-learning, face recognition has achieved exceptional success. However, many of these deep face recognition models perform much better in handling frontal faces compared to profile faces. The major reason for poor performance in handling of profile faces is that it is inherently difficult to learn pose-invariant deep representations that are useful for profil…
▽ More
In recent years, with the advent of deep-learning, face recognition has achieved exceptional success. However, many of these deep face recognition models perform much better in handling frontal faces compared to profile faces. The major reason for poor performance in handling of profile faces is that it is inherently difficult to learn pose-invariant deep representations that are useful for profile face recognition. In this paper, we hypothesize that the profile face domain possesses a latent connection with the frontal face domain in a latent feature subspace. We look to exploit this latent connection by projecting the profile faces and frontal faces into a common latent subspace and perform verification or retrieval in the latent domain. We leverage a coupled conditional generative adversarial network (cpGAN) structure to find the hidden relationship between the profile and frontal images in a latent common embedding subspace. Specifically, the cpGAN framework consists of two conditional GAN-based sub-networks, one dedicated to the frontal domain and the other dedicated to the profile domain. Each sub-network tends to find a projection that maximizes the pair-wise correlation between the two feature domains in a common embedding feature subspace. The efficacy of our approach compared with the state-of-the-art is demonstrated using the CFP, CMU Multi-PIE, IJB-A, and IJB-C datasets. Additionally, we have also implemented a coupled convolutional neural network (cpCNN) and an adversarial discriminative domain adaptation network (ADDA) for profile to frontal face recognition. We have evaluated the performance of cpCNN and ADDA and compared it with the proposed cpGAN. Finally, we have also evaluated our cpGAN for reconstruction of frontal faces from input profile faces contained in the VGGFace2 dataset.
△ Less
Submitted 29 July, 2021;
originally announced July 2021.
-
Deep Hashing for Secure Multimodal Biometrics
Authors:
Veeru Talreja,
Matthew Valenti,
Nasser Nasrabadi
Abstract:
When compared to unimodal systems, multimodal biometric systems have several advantages, including lower error rate, higher accuracy, and larger population coverage. However, multimodal systems have an increased demand for integrity and privacy because they must store multiple biometric traits associated with each user. In this paper, we present a deep learning framework for feature-level fusion t…
▽ More
When compared to unimodal systems, multimodal biometric systems have several advantages, including lower error rate, higher accuracy, and larger population coverage. However, multimodal systems have an increased demand for integrity and privacy because they must store multiple biometric traits associated with each user. In this paper, we present a deep learning framework for feature-level fusion that generates a secure multimodal template from each user's face and iris biometrics. We integrate a deep hashing (binarization) technique into the fusion architecture to generate a robust binary multimodal shared latent representation. Further, we employ a hybrid secure architecture by combining cancelable biometrics with secure sketch techniques and integrate it with a deep hashing framework, which makes it computationally prohibitive to forge a combination of multiple biometrics that pass the authentication. The efficacy of the proposed approach is shown using a multimodal database of face and iris and it is observed that the matching performance is improved due to the fusion of multiple biometrics. Furthermore, the proposed approach also provides cancelability and unlinkability of the templates along with improved privacy of the biometric data. Additionally, we also test the proposed hashing function for an image retrieval application using a benchmark dataset. The main goal of this paper is to develop a method for integrating multimodal fusion, deep hashing, and biometric security, with an emphasis on structural data from modalities like face and iris. The proposed approach is in no way a general biometric security framework that can be applied to all biometric modalities, as further research is needed to extend the proposed framework to other unconstrained biometric modalities.
△ Less
Submitted 29 December, 2020;
originally announced December 2020.
-
Finding descending sequences through ill-founded linear orders
Authors:
Jun Le Goh,
Arno Pauly,
Manlio Valenti
Abstract:
In this work we investigate the Weihrauch degree of the problem $\mathsf{DS}$ of finding an infinite descending sequence through a given ill-founded linear order, which is shared by the problem $\mathsf{BS}$ of finding a bad sequence through a given non-well quasi-order. We show that $\mathsf{DS}$, despite being hard to solve (it has computable inputs with no hyperarithmetic solution), is rather w…
▽ More
In this work we investigate the Weihrauch degree of the problem $\mathsf{DS}$ of finding an infinite descending sequence through a given ill-founded linear order, which is shared by the problem $\mathsf{BS}$ of finding a bad sequence through a given non-well quasi-order. We show that $\mathsf{DS}$, despite being hard to solve (it has computable inputs with no hyperarithmetic solution), is rather weak in terms of uniform computational strength. To make the latter precise, we introduce the notion of the deterministic part of a Weihrauch degree. We then generalize $\mathsf{DS}$ and $\mathsf{BS}$ by considering $\boldsymbolΓ$-presented orders, where $\boldsymbolΓ$ is a Borel pointclass or $\boldsymbolΔ^1_1$, $\boldsymbolΣ^1_1$, $\boldsymbolΠ^1_1$. We study the obtained $\mathsf{DS}$-hierarchy and $\mathsf{BS}$-hierarchy of problems in comparison with the (effective) Baire hierarchy and show that they do not collapse at any finite level.
△ Less
Submitted 24 January, 2024; v1 submitted 8 October, 2020;
originally announced October 2020.
-
On the descriptive complexity of Salem sets
Authors:
Alberto Marcone,
Manlio Valenti
Abstract:
In this paper we study the notion of Salem set from the point of view of descriptive set theory. We first work in the hyperspace $\mathbf{K}([0,1])$ of compact subsets of $[0,1]$ and show that the closed Salem sets form a $\boldsymbolΠ^0_3$-complete family. This is done by characterizing the complexity of the family of sets having sufficiently large Hausdorff or Fourier dimension. We also show tha…
▽ More
In this paper we study the notion of Salem set from the point of view of descriptive set theory. We first work in the hyperspace $\mathbf{K}([0,1])$ of compact subsets of $[0,1]$ and show that the closed Salem sets form a $\boldsymbolΠ^0_3$-complete family. This is done by characterizing the complexity of the family of sets having sufficiently large Hausdorff or Fourier dimension. We also show that the complexity does not change if we increase the dimension of the ambient space and work in $\mathbf{K}([0,1]^d)$. We then generalize the results by relaxing the compactness of the ambient space, and show that the closed Salem sets are still $\boldsymbolΠ^0_3$-complete when we endow the hyperspace of all closed subsets of $\mathbb{R}^d$ with the Fell topology. A similar result holds also for the Vietoris topology.
△ Less
Submitted 7 July, 2021; v1 submitted 21 September, 2020;
originally announced September 2020.
-
PF-cpGAN: Profile to Frontal Coupled GAN for Face Recognition in the Wild
Authors:
Fariborz Taherkhani,
Veeru Talreja,
Jeremy Dawson,
Matthew C. Valenti,
Nasser M. Nasrabadi
Abstract:
In recent years, due to the emergence of deep learning, face recognition has achieved exceptional success. However, many of these deep face recognition models perform relatively poorly in handling profile faces compared to frontal faces. The major reason for this poor performance is that it is inherently difficult to learn large pose invariant deep representations that are useful for profile face…
▽ More
In recent years, due to the emergence of deep learning, face recognition has achieved exceptional success. However, many of these deep face recognition models perform relatively poorly in handling profile faces compared to frontal faces. The major reason for this poor performance is that it is inherently difficult to learn large pose invariant deep representations that are useful for profile face recognition. In this paper, we hypothesize that the profile face domain possesses a gradual connection with the frontal face domain in the deep feature space. We look to exploit this connection by projecting the profile faces and frontal faces into a common latent space and perform verification or retrieval in the latent domain. We leverage a coupled generative adversarial network (cpGAN) structure to find the hidden relationship between the profile and frontal images in a latent common embedding subspace. Specifically, the cpGAN framework consists of two GAN-based sub-networks, one dedicated to the frontal domain and the other dedicated to the profile domain. Each sub-network tends to find a projection that maximizes the pair-wise correlation between two feature domains in a common embedding feature subspace. The efficacy of our approach compared with the state-of-the-art is demonstrated using the CFP, CMU MultiPIE, IJB-A, and IJB-C datasets.
△ Less
Submitted 25 April, 2020;
originally announced May 2020.
-
Error-Corrected Margin-Based Deep Cross-Modal Hashing for Facial Image Retrieval
Authors:
Fariborz Taherkhani,
Veeru Talreja,
Matthew C. Valenti,
Nasser M. Nasrabadi
Abstract:
Cross-modal hashing facilitates map** of heterogeneous multimedia data into a common Hamming space, which can beutilized for fast and flexible retrieval across different modalities. In this paper, we propose a novel cross-modal hashingarchitecture-deep neural decoder cross-modal hashing (DNDCMH), which uses a binary vector specifying the presence of certainfacial attributes as an input query to…
▽ More
Cross-modal hashing facilitates map** of heterogeneous multimedia data into a common Hamming space, which can beutilized for fast and flexible retrieval across different modalities. In this paper, we propose a novel cross-modal hashingarchitecture-deep neural decoder cross-modal hashing (DNDCMH), which uses a binary vector specifying the presence of certainfacial attributes as an input query to retrieve relevant face images from a database. The DNDCMH network consists of two separatecomponents: an attribute-based deep cross-modal hashing (ADCMH) module, which uses a margin (m)-based loss function toefficiently learn compact binary codes to preserve similarity between modalities in the Hamming space, and a neural error correctingdecoder (NECD), which is an error correcting decoder implemented with a neural network. The goal of NECD network in DNDCMH isto error correct the hash codes generated by ADCMH to improve the retrieval efficiency. The NECD network is trained such that it hasan error correcting capability greater than or equal to the margin (m) of the margin-based loss function. This results in NECD cancorrect the corrupted hash codes generated by ADCMH up to the Hamming distance of m. We have evaluated and comparedDNDCMH with state-of-the-art cross-modal hashing methods on standard datasets to demonstrate the superiority of our method.
△ Less
Submitted 3 April, 2020;
originally announced April 2020.
-
The open and clopen Ramsey theorems in the Weihrauch lattice
Authors:
Alberto Marcone,
Manlio Valenti
Abstract:
We investigate the uniform computational content of the open and clopen Ramsey theorems in the Weihrauch lattice. While they are known to be equivalent to $\mathrm{ATR_0}$ from the point of view of reverse mathematics, there is not a canonical way to phrase them as multivalued functions. We identify 8 different multivalued functions (5 corresponding to the open Ramsey theorem and 3 corresponding t…
▽ More
We investigate the uniform computational content of the open and clopen Ramsey theorems in the Weihrauch lattice. While they are known to be equivalent to $\mathrm{ATR_0}$ from the point of view of reverse mathematics, there is not a canonical way to phrase them as multivalued functions. We identify 8 different multivalued functions (5 corresponding to the open Ramsey theorem and 3 corresponding to the clopen Ramsey theorem) and study their degree from the point of view of Weihrauch, strong Weihrauch and arithmetic Weihrauch reducibility. In particular one of our functions turns out to be strictly stronger than any previously studied multivalued functions arising from statements around $\mathrm{ATR}_0$.
△ Less
Submitted 12 January, 2021; v1 submitted 9 March, 2020;
originally announced March 2020.
-
Millimeter Wave Massive MIMO Downlink Per-Group Communications with Hybrid Linear Precoding
Authors:
Thomas Ketseoglou,
Matthew. C. Valenti,
Ender Ayanoglu
Abstract:
We address the problem of analyzing and classifying in groups the downlink channel environment in a millimeter-wavelength cell, accounting for path loss, multipath fading, and User Equipment (UE) blocking, by employing a hybrid propagation and multipath fading model, thus using accurate inter-group interference modeling. The base station (BS) employs a large Uniform Planar Array (UPA) to facilitat…
▽ More
We address the problem of analyzing and classifying in groups the downlink channel environment in a millimeter-wavelength cell, accounting for path loss, multipath fading, and User Equipment (UE) blocking, by employing a hybrid propagation and multipath fading model, thus using accurate inter-group interference modeling. The base station (BS) employs a large Uniform Planar Array (UPA) to facilitate massive Multiple-Input, Multiple-Output (MIMO) communications with high efficiency. UEs are equipped with a single antenna and are distributed uniformly within the cell. The key problem is analyzing and defining groups toward precoding. Because equitable type of throughput is desired between groups, Combined Frequency and Spatial Division and Multiplexing (CFSDM) prevails as necessary. We show that by employing three subcarrier frequencies, the UEs can be efficiently separated into high throughput groups, with each group employing Virtual Channel Model Beams (VCMB) based inner precoding, followed by efficient Multi-User Multiple-Input Multiple-Output (MU-MIMO) outer precoders. For each group, we study three different sub-grou** methods offering different advantages. We show that the improvement offered by Zero-Forcing Per-Group Precoding (ZF-PGP) over Zero-Forcing Precoding (ZFP) is very high.
△ Less
Submitted 4 February, 2020; v1 submitted 3 December, 2019;
originally announced December 2019.
-
The Potential Gains of Macrodiversity in mmWave Cellular Networks with Correlated Blocking
Authors:
Enass Hriba,
Matthew C. Valenti
Abstract:
At millimeter wave (mmWave) frequencies, signals are prone to blocking by objects in the environment, which causes paths to go from line-of-sight (LOS) to non-LOS (NLOS). We consider macrodiversity as a strategy to improve the performance of mmWave cellular systems, where the user attempts to connect with two or more base stations. An accurate analysis of macrodiversity must account for the possib…
▽ More
At millimeter wave (mmWave) frequencies, signals are prone to blocking by objects in the environment, which causes paths to go from line-of-sight (LOS) to non-LOS (NLOS). We consider macrodiversity as a strategy to improve the performance of mmWave cellular systems, where the user attempts to connect with two or more base stations. An accurate analysis of macrodiversity must account for the possibility of correlated blocking, which occurs when a single blockage simultaneously blocks the paths to two base stations. In this paper, we analyze the macrodiverity gain in the presence of correlated random blocking and interference. To do so, we develop a framework to determine distributions for the LOS probability, SNR, and SINR by taking into account correlated blocking. We consider a cellular uplink with both diversity combining and selection combining schemes. We also study the impact of blockage size and blockage density. We show that blocking can be both a blessing and a curse. On the one hand, the signal from the source transmitter could be blocked, and on the other hand, interfering signals tend to also be blocked, which leads to a completely different effect on macrodiversity gains. We also show that the assumption of independent blocking can lead to an incorrect evaluation of macrodiversity gain, as the correlation tends to decrease macrodiversity gain.
△ Less
Submitted 1 November, 2019;
originally announced November 2019.
-
Zero-Shot Deep Hashing and Neural Network Based Error Correction for Face Template Protection
Authors:
Veeru Talreja,
Matthew C. Valenti,
Nasser M. Nasrabadi
Abstract:
In this paper, we present a novel architecture that integrates a deep hashing framework with a neural network decoder (NND) for application to face template protection. It improves upon existing face template protection techniques to provide better matching performance with one-shot and multi-shot enrollment. A key novelty of our proposed architecture is that the framework can also be used with ze…
▽ More
In this paper, we present a novel architecture that integrates a deep hashing framework with a neural network decoder (NND) for application to face template protection. It improves upon existing face template protection techniques to provide better matching performance with one-shot and multi-shot enrollment. A key novelty of our proposed architecture is that the framework can also be used with zero-shot enrollment. This implies that our architecture does not need to be re-trained even if a new subject is to be enrolled into the system. The proposed architecture consists of two major components: a deep hashing (DH) component, which is used for robust map** of face images to their corresponding intermediate binary codes, and a NND component, which corrects errors in the intermediate binary codes that are caused by differences in the enrollment and probe biometrics due to factors such as variation in pose, illumination, and other factors. The final binary code generated by the NND is then cryptographically hashed and stored as a secure face template in the database. The efficacy of our approach with zero-shot, one-shot, and multi-shot enrollments is shown for CMU-PIE, Extended Yale B, WVU multimodal and Multi-PIE face databases. With zero-shot enrollment, the system achieves approximately 85% genuine accept rates (GAR) at 0.01% false accept rate (FAR), and with one-shot and multi-shot enrollments, it achieves approximately 99.95% GAR at 0.01% FAR, while providing a high level of template security.
△ Less
Submitted 5 August, 2019;
originally announced August 2019.
-
Attribute-Guided Coupled GAN for Cross-Resolution Face Recognition
Authors:
Veeru Talreja,
Fariborz Taherkhani,
Matthew C Valenti,
Nasser M Nasrabadi
Abstract:
In this paper, we propose a novel attribute-guided cross-resolution (low-resolution to high-resolution) face recognition framework that leverages a coupled generative adversarial network (GAN) structure with adversarial training to find the hidden relationship between the low-resolution and high-resolution images in a latent common embedding subspace. The coupled GAN framework consists of two sub-…
▽ More
In this paper, we propose a novel attribute-guided cross-resolution (low-resolution to high-resolution) face recognition framework that leverages a coupled generative adversarial network (GAN) structure with adversarial training to find the hidden relationship between the low-resolution and high-resolution images in a latent common embedding subspace. The coupled GAN framework consists of two sub-networks, one dedicated to the low-resolution domain and the other dedicated to the high-resolution domain. Each sub-network aims to find a projection that maximizes the pair-wise correlation between the two feature domains in a common embedding subspace. In addition to projecting the images into a common subspace, the coupled network also predicts facial attributes to improve the cross-resolution face recognition. Specifically, our proposed coupled framework exploits facial attributes to further maximize the pair-wise correlation by implicitly matching facial attributes of the low and high-resolution images during the training, which leads to a more discriminative embedding subspace resulting in performance enhancement for cross-resolution face recognition. The efficacy of our approach compared with the state-of-the-art is demonstrated using the LFWA, Celeb-A, SCFace and UCCS datasets.
△ Less
Submitted 5 August, 2019;
originally announced August 2019.
-
Learning to Authenticate with Deep Multibiometric Hashing and Neural Network Decoding
Authors:
Veeru Talreja,
Sobhan Soleymani,
Matthew C. Valenti,
Nasser M. Nasrabadi
Abstract:
In this paper, we propose a novel multimodal deep hashing neural decoder (MDHND) architecture, which integrates a deep hashing framework with a neural network decoder (NND) to create an effective multibiometric authentication system. The MDHND consists of two separate modules: a multimodal deep hashing (MDH) module, which is used for feature-level fusion and binarization of multiple biometrics, an…
▽ More
In this paper, we propose a novel multimodal deep hashing neural decoder (MDHND) architecture, which integrates a deep hashing framework with a neural network decoder (NND) to create an effective multibiometric authentication system. The MDHND consists of two separate modules: a multimodal deep hashing (MDH) module, which is used for feature-level fusion and binarization of multiple biometrics, and a neural network decoder (NND) module, which is used to refine the intermediate binary codes generated by the MDH and compensate for the difference between enrollment and probe biometrics (variations in pose, illumination, etc.). Use of NND helps to improve the performance of the overall multimodal authentication system. The MDHND framework is trained in 3 steps using joint optimization of the two modules. In Step 1, the MDH parameters are trained and learned to generate a shared multimodal latent code; in Step 2, the latent codes from Step 1 are passed through a conventional error-correcting code (ECC) decoder to generate the ground truth to train a neural network decoder (NND); in Step 3, the NND decoder is trained using the ground truth from Step 2 and the MDH and NND are jointly optimized. Experimental results on a standard multimodal dataset demonstrate the superiority of our method relative to other current multimodal authentication systems
△ Less
Submitted 7 March, 2019; v1 submitted 11 February, 2019;
originally announced February 2019.
-
Using Deep Cross Modal Hashing and Error Correcting Codes for Improving the Efficiency of Attribute Guided Facial Image Retrieval
Authors:
Veeru Talreja,
Fariborz Taherkhani,
Matthew C. Valenti,
Nasser M. Nasrabadi
Abstract:
With benefits of fast query speed and low storage cost, hashing-based image retrieval approaches have garnered considerable attention from the research community. In this paper, we propose a novel Error-Corrected Deep Cross Modal Hashing (CMH-ECC) method which uses a bitmap specifying the presence of certain facial attributes as an input query to retrieve relevant face images from the database. In…
▽ More
With benefits of fast query speed and low storage cost, hashing-based image retrieval approaches have garnered considerable attention from the research community. In this paper, we propose a novel Error-Corrected Deep Cross Modal Hashing (CMH-ECC) method which uses a bitmap specifying the presence of certain facial attributes as an input query to retrieve relevant face images from the database. In this architecture, we generate compact hash codes using an end-to-end deep learning module, which effectively captures the inherent relationships between the face and attribute modality. We also integrate our deep learning module with forward error correction codes to further reduce the distance between different modalities of the same subject. Specifically, the properties of deep hashing and forward error correction codes are exploited to design a cross modal hashing framework with high retrieval performance. Experimental results using two standard datasets with facial attributes-image modalities indicate that our CMH-ECC face image retrieval model outperforms most of the current attribute-based face image retrieval approaches.
△ Less
Submitted 11 February, 2019;
originally announced February 2019.
-
The Impact of Correlated Blocking on Millimeter-Wave Personal Networks
Authors:
Enass Hriba,
Matthew C. Valenti
Abstract:
Due to its potential to support high data rates at low latency with reasonable interference isolation, millimeter-wave (mmWave) communications has emerged as a promising solution for wireless personal-area networks (WPAN) and an enabler for emerging applications such as high-resolution untethered virtual reality. At mmWave, signals are prone to blockage by objects in the environment, including hum…
▽ More
Due to its potential to support high data rates at low latency with reasonable interference isolation, millimeter-wave (mmWave) communications has emerged as a promising solution for wireless personal-area networks (WPAN) and an enabler for emerging applications such as high-resolution untethered virtual reality. At mmWave, signals are prone to blockage by objects in the environment, including human bodies. Most mmWave systems utilize directional antennas in order to overcome the significant path loss. In this paper, we consider the effects of blockage and antenna directivity on the performance of a mmWave WPAN. Similar to related work, we assume that the interferers are in arbitrary locations and the blockages are drawn from a random point process. However, unlike related work that assumes independent blocking, we carefully account for the possibility of correlated blocking, which arises when two interferers are close to each other and therefore an obstruction that blocks the first interferer may likely block the second interferer. Closed form expressions for the blockage correlation coefficient and the distribution of the SINR are provided for the case of two dominant interferers and a fixed number of blockages drawn from a binomial point process. Finally, the effects of antenna directivity and the spatial randomness of the interferers are taken into account, resulting in SINR curves that fully account for correlated blocking, which are compared against curves that neglect correlation. The results provide insight into the validity of the commonly held assumption of independent blocking and the improved accuracy that can be obtained when the blocking correlation is taken into account.
△ Less
Submitted 21 September, 2018;
originally announced September 2018.
-
Outage Correlation in Finite and Clustered Wireless Networks
Authors:
S. Talarico,
M. C. Valenti,
M. Di Renzo
Abstract:
Future wireless networks are expected to adopt many different network technologies and architectures that promise to greatly enhance data rate and provide ubiquitous coverage for end users, all while enabling higher spectral efficiency. These benefits come with an increased risk of co-channel interference and possible correlation in the aggregated interference, which impacts the communication perf…
▽ More
Future wireless networks are expected to adopt many different network technologies and architectures that promise to greatly enhance data rate and provide ubiquitous coverage for end users, all while enabling higher spectral efficiency. These benefits come with an increased risk of co-channel interference and possible correlation in the aggregated interference, which impacts the communication performance. This paper introduces a mathematical framework to quantify the spatial correlation of the interference in finite and clustered wireless networks with signals subject to Rayleigh fading. Expressions are derived for the correlation coefficient of the outage probability when the interferers are located according to some of the most common point processes used in the literature to model the spatial distribution of the devices: binomial point process (i.e., relay networks with fixed users), Poisson point process (i.e., heterogeneous cellular networks), and Thomas point process (i.e., device-to-device networks).
△ Less
Submitted 19 July, 2018; v1 submitted 10 July, 2018;
originally announced July 2018.
-
Noncoherent LDPC-Coded Physical-Layer Network Coding using Multitone FSK
Authors:
Terry Ferrett,
Matthew C. Valenti
Abstract:
A noncoherent two-way relaying system is developed using physical-layer network coding for improved throughput over conventional relaying in a fading channel. Energy-efficient noncoherent operation is achieved using multitone frequency shift keying (FSK). A novel soft-output demodulator is developed for the relay, and corresponding achievable exchange rates are found for Rayleigh fading and AWGN c…
▽ More
A noncoherent two-way relaying system is developed using physical-layer network coding for improved throughput over conventional relaying in a fading channel. Energy-efficient noncoherent operation is achieved using multitone frequency shift keying (FSK). A novel soft-output demodulator is developed for the relay, and corresponding achievable exchange rates are found for Rayleigh fading and AWGN channels. Bit-error rate performance approaching the achievable rate is realized using a capacity-approaching channel code and a receiver architecture that iterates between demodulation and channel decoding. Iterative decoding is performed feeding information back from the channel decoder to the demodulator. Additionally, error-rate performance is made to approach the achievable rate more closely by optimizing LDPC codes for this system. The energy efficiency improvement obtained by increasing the modulation order is more dramatic for the proposed physical-layer network coding scheme than it is for a conventional point-to-point system. Using optimized LDPC codes, the bit-error rate performance is improved by as much as 1.1 dB over a widely known standardized LDPC code, and comes to within 0.7 dB of the limit corresponding to the achievable rate. Throughout this work, performance for physical-layer network coding is compared to conventional network coding. When noncoherent FSK is used, physical-layer network coding enables higher achievable rates, and conventional network coding exhibits better energy efficiency at low rates.
△ Less
Submitted 31 January, 2018;
originally announced January 2018.
-
Biometrics-as-a-Service: A Framework to Promote Innovative Biometric Recognition in the Cloud
Authors:
Veeru Talreja,
Terry Ferrett,
Matthew C. Valenti,
Arun Ross
Abstract:
Biometric recognition, or simply biometrics, is the use of biological attributes such as face, fingerprints or iris in order to recognize an individual in an automated manner. A key application of biometrics is authentication; i.e., using said biological attributes to provide access by verifying the claimed identity of an individual. This paper presents a framework for Biometrics-as-a-Service (Baa…
▽ More
Biometric recognition, or simply biometrics, is the use of biological attributes such as face, fingerprints or iris in order to recognize an individual in an automated manner. A key application of biometrics is authentication; i.e., using said biological attributes to provide access by verifying the claimed identity of an individual. This paper presents a framework for Biometrics-as-a-Service (BaaS) that performs biometric matching operations in the cloud, while relying on simple and ubiquitous consumer devices such as smartphones. Further, the framework promotes innovation by providing interfaces for a plurality of software developers to upload their matching algorithms to the cloud. When a biometric authentication request is submitted, the system uses a criteria to automatically select an appropriate matching algorithm. Every time a particular algorithm is selected, the corresponding developer is rendered a micropayment. This creates an innovative and competitive ecosystem that benefits both software developers and the consumers. As a case study, we have implemented the following: (a) an ocular recognition system using a mobile web interface providing user access to a biometric authentication service, and (b) a Linux-based virtual machine environment used by software developers for algorithm development and submission.
△ Less
Submitted 25 October, 2017;
originally announced October 2017.
-
Accurately Accounting for Random Blockage in Device-to-Device mmWave Networks
Authors:
Enass Hriba,
Matthew C. Valenti,
Kiran Venugopal,
Robert W. Heath, Jr
Abstract:
Millimeter-wave systems are characterized by the use of highly directional antennas and the presence of blockages, which significantly alter the path-loss and small-scale fading parameters. The received power of each interferer depends on the direction it points and whether it is line-of-sight (LOS), non-LOS (i.e., partially blocked), or completely blocked. While interferers that are sufficiently…
▽ More
Millimeter-wave systems are characterized by the use of highly directional antennas and the presence of blockages, which significantly alter the path-loss and small-scale fading parameters. The received power of each interferer depends on the direction it points and whether it is line-of-sight (LOS), non-LOS (i.e., partially blocked), or completely blocked. While interferers that are sufficiently far away will almost certainly be completely blocked, a finite number of interferers in close proximity will be subject to random partial blockages. Previous attempts to characterize mmWave networks have made the simplifying assumption that all interferers within some radius, called the LOS ball, are unblocked, while interferers beyond that radius are non-LOS. However, compared to simulation results, the LOS ball assumption tends to overestimate outage. In this paper, we present an accurate yet tractable analysis of finite mmWave networks that dispenses with the LOS ball assumption. In the analysis, each interferer has a distribution that is selected randomly from several possibilities, each representing different blockage and directivity states. First, the exact outage probability is found for a finite network with interferers in fixed locations. Then, the spatially averaged outage probability is found by averaging over the interferer locations. While the focus is on device-to-device networks, the analysis is general enough to find applications outside of the present mmWave framework.
△ Less
Submitted 1 September, 2017;
originally announced September 2017.
-
Multibiometric Secure System Based on Deep Learning
Authors:
Veeru Talreja,
Matthew C. Valenti,
Nasser M. Nasrabadi
Abstract:
In this paper, we propose a secure multibiometric system that uses deep neural networks and error-correction coding. We present a feature-level fusion framework to generate a secure multibiometric template from each user's multiple biometrics. Two fusion architectures, fully connected architecture and bilinear architecture, are implemented to develop a robust multibiometric shared representation.…
▽ More
In this paper, we propose a secure multibiometric system that uses deep neural networks and error-correction coding. We present a feature-level fusion framework to generate a secure multibiometric template from each user's multiple biometrics. Two fusion architectures, fully connected architecture and bilinear architecture, are implemented to develop a robust multibiometric shared representation. The shared representation is used to generate a cancelable biometric template that involves the selection of a different set of reliable and discriminative features for each user. This cancelable template is a binary vector and is passed through an appropriate error-correcting decoder to find a closest codeword and this codeword is hashed to generate the final secure template. The efficacy of the proposed approach is shown using a multimodal database where we achieve state-of-the-art matching performance, along with cancelability and security.
△ Less
Submitted 7 August, 2017;
originally announced August 2017.
-
Noncoherent Analog Network Coding using LDPC-coded FSK
Authors:
Terry Ferrett,
Matthew C. Valenti
Abstract:
Analog network coding (ANC) is a throughput increasing technique for the two-way relay channel (TWRC) whereby two end nodes transmit simultaneously to a relay at the same time and band, followed by the relay broadcasting the received sum of signals to the end nodes. Coherent reception under ANC is challenging due to requiring oscillator synchronization for all nodes, a problem further exacerbated…
▽ More
Analog network coding (ANC) is a throughput increasing technique for the two-way relay channel (TWRC) whereby two end nodes transmit simultaneously to a relay at the same time and band, followed by the relay broadcasting the received sum of signals to the end nodes. Coherent reception under ANC is challenging due to requiring oscillator synchronization for all nodes, a problem further exacerbated by Doppler shift. This work develops a noncoherent M-ary frequency-shift keyed (FSK) demodulator implementing ANC. The demodulator produces soft outputs suitable for use with capacity-approaching channel codes and supports information feedback from the channel decoder. A unique aspect of the formulation is the presence of an infinite summation in the received symbol probability density function. Detection and channel decoding succeed when the truncated summation contains a sufficient number of terms. Bit error rate performance is investigated by Monte Carlo simulation, considering modulation orders two, four and eight, channel coded and uncoded operation, and with and without information feedback from decoder to demodulator. The channel code considered for simulation is the LDPC code defined by the DVB-S2 standard. To our knowledge this work is the first to develop a noncoherent soft-output demodulator for ANC.
△ Less
Submitted 4 March, 2017;
originally announced March 2017.
-
Complexity-Aware Scheduling for an LDPC Encoded C-RAN Uplink
Authors:
Kyle Whetzel,
Matthew C. Valenti
Abstract:
Centralized Radio Access Network (C-RAN) is a new paradigm for wireless networks that centralizes the signal processing in a computing cloud, allowing commodity computational resources to be pooled. While C-RAN improves utilization and efficiency, the computational load occasionally exceeds the available resources, creating a computational outage. This paper provides a mathematical characterizatio…
▽ More
Centralized Radio Access Network (C-RAN) is a new paradigm for wireless networks that centralizes the signal processing in a computing cloud, allowing commodity computational resources to be pooled. While C-RAN improves utilization and efficiency, the computational load occasionally exceeds the available resources, creating a computational outage. This paper provides a mathematical characterization of the computational outage probability for low-density parity check (LDPC) codes, a common class of error-correcting codes. For tractability, a binary erasures channel is assumed. Using the concept of density evolution, the computational demand is determined for a given ensemble of codes as a function of the erasure probability. The analysis reveals a trade-off: aggressively signaling at a high rate stresses the computing pool, while conservatively backing-off the rate can avoid computational outages. Motivated by this trade-off, an effective computationally aware scheduling algorithm is developed that balances demands for high throughput and low outage rates.
△ Less
Submitted 2 February, 2017;
originally announced February 2017.
-
Controlled Barrage Regions: Stochastic Modeling, Analysis, and Optimization
Authors:
Salvatore Talarico,
Matthew C. Valenti,
Thomas R. Halford
Abstract:
A barrage relay network (BRN) is a broadcast oriented ad hoc network involving autonomous cooperative communication, a slotted time-division frame format, and a coarse slot-level synchronization. While inherently a broadcast protocol, BRNs can support unicast transmission by superimposing a plurality of controlled barrage regions (CBRs) onto the network. Within each CBRs, a new packet is injected…
▽ More
A barrage relay network (BRN) is a broadcast oriented ad hoc network involving autonomous cooperative communication, a slotted time-division frame format, and a coarse slot-level synchronization. While inherently a broadcast protocol, BRNs can support unicast transmission by superimposing a plurality of controlled barrage regions (CBRs) onto the network. Within each CBRs, a new packet is injected by the unicast source during the first time slot of each new radio frame. When a CBRs is sufficiently long that a packet might not be able to reach the other end within a radio frame, multiple packets can be active at the same time via spatial pipelining, resulting in interference within the CBRs. In this paper, the dynamics of packet transmission within a CBRs is described as a Markov process, and the outage probability of each link within the CBRs is evaluated in closed form, thereby accounting for fading and co-channel interference. In order to account for the linkage between simultaneous active packets and their temporal correlation, a Viterbi-like algorithm is used. Using this accurate analytical framework, a line network is optimized, which identifies the code rate, the number of relays, and the length of a radio frame that maximizes the transport capacity.
△ Less
Submitted 6 November, 2016; v1 submitted 26 October, 2016;
originally announced October 2016.
-
Analysis of a Frequency-Hop** Millimeter-Wave Cellular Uplink
Authors:
Don Torrieri,
Salvatore Talarico,
Matthew C. Valenti
Abstract:
Fifth-generation (5G) cellular networks are expected to exhibit at least three primary physical-layer differences relative to fourth-generation ones: millimeter-wave propagation, massive antenna arrays, and densification of base stations. As in fourth-generation systems, such as LTE, 5G systems are likely to continue to use single-carrier frequency division multiple-access (SC-FDMA) on the uplink…
▽ More
Fifth-generation (5G) cellular networks are expected to exhibit at least three primary physical-layer differences relative to fourth-generation ones: millimeter-wave propagation, massive antenna arrays, and densification of base stations. As in fourth-generation systems, such as LTE, 5G systems are likely to continue to use single-carrier frequency division multiple-access (SC-FDMA) on the uplink due to its advantageous peak-to-average power ratio. Moreover, 5G systems are likely to use frequency hop** on the uplink to help randomize interference and provide diversity against frequency-selective fading. In this paper, the implications of these and other physical-layer features on uplink performance are assessed using a novel millimeter-wave propagation model featuring distance-dependent parameters that characterize the path-loss, shadowing, and fading. The analysis proceeds by first fixing the location of the mobile devices and finding the performance conditioned on the topology. The spatially averaged performance is then found by averaging with respect to the location of the mobile devices. The analysis allows for the use of actual base-station topologies and the propagation model can leverage empirical millimeter-wave measurements. The benefits of base-station densification, highly directional sectorization, frequency hop**, a large available bandwidth, and a high code rate are illustrated. The minor importance of fractional power control is shown.
△ Less
Submitted 7 August, 2016; v1 submitted 27 July, 2016;
originally announced July 2016.
-
Frequency Hop** on a 5G Millimeter-Wave Uplink
Authors:
Salvatore Talarico,
Matthew C. Valenti
Abstract:
In order to overcome the anticipated tremendous growth in the volume of mobile data traffic, the next generation of cellular networks will need to exploit the large bandwidth offered by the millimeter-wave (mmWave) band. A key distinguishing characteristic of mmWave is its use of highly directional and steerable antennas. In addition, future networks will be highly densified through the proliferat…
▽ More
In order to overcome the anticipated tremendous growth in the volume of mobile data traffic, the next generation of cellular networks will need to exploit the large bandwidth offered by the millimeter-wave (mmWave) band. A key distinguishing characteristic of mmWave is its use of highly directional and steerable antennas. In addition, future networks will be highly densified through the proliferation of base stations and their supporting infrastructure. With the aim of further improving the overall throughput of the network by mitigating the effect of frequency-selective fading and co-channel interference, 5G cellular networks are also expected to aggressively use frequency-hop**. This paper outlines an analytical framework that captures the main characteristics of a 5G cellular uplink. This framework is used to emphasize the benefits of network infrastructure densification, antenna directivity, mmWave propagation characteristics, and frequency hop**.
△ Less
Submitted 10 December, 2015; v1 submitted 1 December, 2015;
originally announced December 2015.
-
Reduced Complexity Detection for Network-Coded Slotted ALOHA using Sphere Decoding
Authors:
Terry Ferrett,
Matthew C. Valenti
Abstract:
Network-coded slotted ALOHA (NCSA) is a re- finement to the classic slotted ALOHA protocol which im- proves throughput by enabling multiple source transmissions per ALOHA slot using physical-layer network coding (PNC). The receiver detects the network-coded combination of bits during every slot and recovers information bits by solving a system of linear equations. This work develops a receiver cap…
▽ More
Network-coded slotted ALOHA (NCSA) is a re- finement to the classic slotted ALOHA protocol which im- proves throughput by enabling multiple source transmissions per ALOHA slot using physical-layer network coding (PNC). The receiver detects the network-coded combination of bits during every slot and recovers information bits by solving a system of linear equations. This work develops a receiver capable of detecting the network-coded combination of bits during a slot considering an arbitrary number of sources, orthogonal modulation, and a block fading channel. Maximum-likelihood detection of the network-coded symbol at the receiver becomes complex as the number of sources is increased. To reduce this complexity, sphere decoding is applied at the receiver to limit the number of constellation symbols the receiver must consider for detection. The system is simulated for two modulation orders and two through five sources, and error-rate performance results are provided.
△ Less
Submitted 9 December, 2015;
originally announced December 2015.
-
Analysis of Millimeter Wave Networked Wearables in Crowded Environments
Authors:
Kiran Venugopal,
Matthew C. Valenti,
Robert W. Heath Jr
Abstract:
The millimeter wave (mmWave) band has the potential to provide high throughput among wearable devices. When mmWave wearable networks are used in crowded environments, such as on a bus or train, antenna directivity and orientation hold the key to achieving Gbps rates. Previous work using stochastic geometry often assumes an infinite number of interfering nodes drawn from a Poisson Point Process (PP…
▽ More
The millimeter wave (mmWave) band has the potential to provide high throughput among wearable devices. When mmWave wearable networks are used in crowded environments, such as on a bus or train, antenna directivity and orientation hold the key to achieving Gbps rates. Previous work using stochastic geometry often assumes an infinite number of interfering nodes drawn from a Poisson Point Process (PPP). Since indoor wearable networks will be isolated due to walls, a network with a finite number of nodes may be a more suitable model. In this paper, we characterize the significant sources of interference and develop closed-form expressions for the spatially averaged performance of a typical user's wearable communication link. The effect of human body blockage on the mmWave signals and the role of network density are investigated to show that an increase in interferer density reduces the mean number of significant interferers.
△ Less
Submitted 1 December, 2015;
originally announced December 2015.
-
Performance Comparisons of Geographic Routing Protocols in Mobile Ad Hoc Networks
Authors:
Don Torrieri,
Salvatore Talarico,
Matthew C. Valenti
Abstract:
Geographic routing protocols greatly reduce the requirements of topology storage and provide flexibility in the accommodation of the dynamic behavior of mobile ad hoc networks. This paper presents performance evaluations and comparisons of two geographic routing protocols and the popular AODV protocol. The tradeoffs among the average path reliabilities, average conditional delays, average conditio…
▽ More
Geographic routing protocols greatly reduce the requirements of topology storage and provide flexibility in the accommodation of the dynamic behavior of mobile ad hoc networks. This paper presents performance evaluations and comparisons of two geographic routing protocols and the popular AODV protocol. The tradeoffs among the average path reliabilities, average conditional delays, average conditional numbers of hops, and area spectral efficiencies and the effects of various parameters are illustrated for finite ad hoc networks with randomly placed mobiles. This paper uses a dual method of closed-form analysis and simple simulation that is applicable to most routing protocols and provides a much more realistic performance evaluation than has previously been possible. Some features included in the new analysis are shadowing, exclusion and guard zones, distance-dependent fading, and interference correlation.
△ Less
Submitted 3 September, 2015;
originally announced September 2015.
-
Performance Analysis of Fifth-Generation Cellular Uplink
Authors:
Don Torrieri,
Salvatore Talarico,
Matthew C. Valenti
Abstract:
Fifth-generation cellular networks are expected to exhibit at least three primary physical-layer differences relative to fourth-generation ones: millimeter-wave propagation, antenna-array directionality, and densification of base stations. In this paper, the effects of these differences on the performance of single-carrier frequency-domain multiple-access uplink systems with frequency hop** are…
▽ More
Fifth-generation cellular networks are expected to exhibit at least three primary physical-layer differences relative to fourth-generation ones: millimeter-wave propagation, antenna-array directionality, and densification of base stations. In this paper, the effects of these differences on the performance of single-carrier frequency-domain multiple-access uplink systems with frequency hop** are assessed. A new analysis, which is much more detailed than any other in the existing literature and accommodates actual base-station topologies, captures the primary features of uplink communications. Distance-dependent power-law, shadowing, and fading models based on millimeter-wave measurements are introduced. The beneficial effects of base-station densification, highly directional sectorization, and frequency hop** are illustrated.
△ Less
Submitted 24 August, 2015;
originally announced August 2015.
-
Optimization of an Adaptive Frequency-Hop** Network
Authors:
Salvatore Talarico,
Matthew C. Valenti,
Don Torrieri
Abstract:
This paper proposes a methodology for optimizing a frequency-hop** network that uses continuous-phase frequency-shift keying and adaptive capacity-approaching channel coding. The optimization takes into account the spatial distribution of the interfering mobiles, Nakagami fading, and lognormal shadowing. It includes the effects of both co-channel interference and adjacent-channel interference, w…
▽ More
This paper proposes a methodology for optimizing a frequency-hop** network that uses continuous-phase frequency-shift keying and adaptive capacity-approaching channel coding. The optimization takes into account the spatial distribution of the interfering mobiles, Nakagami fading, and lognormal shadowing. It includes the effects of both co-channel interference and adjacent-channel interference, which arises due to spectral-splatter effects. The average network performance depends on the choice of the modulation index, the number of frequency-hop** channels, and the fractional in-band power, which are assumed to be fixed network parameters. The performance of a given transmission depends on the code rate, which is adapted in response to the interference to meet a constraint on outage probability. The optimization proceeds by choosing a set of fixed network parameters, drawing the interferers from the spatial distribution, and determining the maximum rate that satisfies the outage constraint. The process is repeated for a large number of network realizations, and the fixed network parameters that maximize the area spectral efficiency are identified.
△ Less
Submitted 24 August, 2015;
originally announced August 2015.
-
Computationally Aware Sum-Rate Optimal Scheduling for Centralized Radio Access Networks
Authors:
Peter Rost,
Andreas Maeder,
Matthew C. Valenti,
Salvatore Talarico
Abstract:
In a centralized or cloud radio access network, certain portions of the digital baseband processing of a group of several radio access points are executed at a central data center. Centralizing the processing improves the flexibility, scalability, and utilization of computational assets. However, the performance depends critically on how the limited data processing resources are allocated to serve…
▽ More
In a centralized or cloud radio access network, certain portions of the digital baseband processing of a group of several radio access points are executed at a central data center. Centralizing the processing improves the flexibility, scalability, and utilization of computational assets. However, the performance depends critically on how the limited data processing resources are allocated to serve the needs of the different wireless devices. As the processing load imposed by each device depends on its allocated transmission rate and channel quality, the rate-allocation aspect of the scheduling should take into account the available computing. In this paper, two computationally aware schedulers are proposed that have the objective of maximizing the sum-rate of the system while satisfying a constraint on the offered computational load. The first scheduler optimally allocates resources and is implemented according to a water-filling algorithm. The second scheduler is suboptimal, but uses a simpler and intuitive complexity-cut-off approach. The performance of both schedulers is evaluated using an LTE-compliant system level simulator. It is found that both schedulers avoid outages that are caused by an overflow of computational load (i.e., computational outages) at the cost of a slight loss of sum-rate.
△ Less
Submitted 24 August, 2015; v1 submitted 7 July, 2015;
originally announced July 2015.
-
Device-to-Device Millimeter Wave Communications: Interference, Coverage, Rate, and Finite Topologies
Authors:
Kiran Venugopal,
Matthew C. Valenti,
Robert W. Heath Jr
Abstract:
Emerging applications involving device-to-device communication among wearable electronics require Gbps throughput, which can be achieved by utilizing millimeter wave (mmWave) frequency bands. When many such communicating devices are indoors in close proximity, like in a train car or airplane cabin, interference can be a serious impairment. This paper uses stochastic geometry to analyze the perform…
▽ More
Emerging applications involving device-to-device communication among wearable electronics require Gbps throughput, which can be achieved by utilizing millimeter wave (mmWave) frequency bands. When many such communicating devices are indoors in close proximity, like in a train car or airplane cabin, interference can be a serious impairment. This paper uses stochastic geometry to analyze the performance of mmWave networks with a finite number of interferers in a finite network region. Prior work considered either lower carrier frequencies with different antenna and channel assumptions, or a network with an infinite spatial extent. In this paper, human users not only carry potentially interfering devices, but also act to block interfering signals. Using a sequence of simplifying assumptions, accurate expressions for coverage and rate are developed that capture the effects of key antenna characteristics like directivity and gain, and are a function of the finite area and number of users. The assumptions are validated through a combination of analysis and simulation. The main conclusions are that mmWave frequencies can provide Gbps throughput even with omni-directional transceiver antennas, and larger, more directive antenna arrays give better system performance.
△ Less
Submitted 9 June, 2016; v1 submitted 23 June, 2015;
originally announced June 2015.
-
The Complexity-Rate Tradeoff of Centralized Radio Access Networks
Authors:
Peter Rost,
Salvatore Talarico,
Matthew C. Valenti
Abstract:
In a centralized RAN, the signals from multiple RAPs are processed centrally in a data center. Centralized RAN enables advanced interference coordination strategies while leveraging the elastic provisioning of data processing resources. It is particularly well suited for dense deployments, such as within a large building where the RAPs are connected via fibre and many cells are underutilized. This…
▽ More
In a centralized RAN, the signals from multiple RAPs are processed centrally in a data center. Centralized RAN enables advanced interference coordination strategies while leveraging the elastic provisioning of data processing resources. It is particularly well suited for dense deployments, such as within a large building where the RAPs are connected via fibre and many cells are underutilized. This paper considers the computational requirements of centralized RAN with the goal of illuminating the benefits of pooling computational resources. A new analytical framework is proposed for quantifying the computational load associated with the centralized processing of uplink signals in the presence of block Rayleigh fading, distance-dependent path-loss, and fractional power control. Several new performance metrics are defined, including computational outage probability, outage complexity, computational gain, computational diversity, and the complexity-rate tradeoff. The validity of the analytical framework is confirmed by comparing it numerically with a simulator compliant with the 3GPP LTE standard. Using the developed metrics, it is shown that centralizing the computing resources provides a higher net throughput per computational resource as compared to local processing.
△ Less
Submitted 9 August, 2015; v1 submitted 30 March, 2015;
originally announced March 2015.
-
LDPC Code Design for Noncoherent Physical Layer Network Coding
Authors:
Terry Ferrett,
Matthew C. Valenti
Abstract:
This work considers optimizing LDPC codes in the physical-layer network coded two-way relay channel using noncoherent FSK modulation. The error-rate performance of channel decoding at the relay node during the multiple-access phase was improved through EXIT-based optimization of Tanner graph variable node degree distributions. Codes drawn from the DVB-S2 and WiMAX standards were used as a basis fo…
▽ More
This work considers optimizing LDPC codes in the physical-layer network coded two-way relay channel using noncoherent FSK modulation. The error-rate performance of channel decoding at the relay node during the multiple-access phase was improved through EXIT-based optimization of Tanner graph variable node degree distributions. Codes drawn from the DVB-S2 and WiMAX standards were used as a basis for design and performance comparison. The computational complexity characteristics of the standard codes were preserved in the optimized codes by maintaining the extended irregular repeat-accumulate (eIRA). The relay receiver performance was optimized considering two modulation orders M = {4, 8} using iterative decoding in which the decoder and demodulator refine channel estimates by exchanging information. The code optimization procedure yielded unique optimized codes for each case of modulation order and available channel state information. Performance of the standard and optimized codes were measured using Monte Carlo simulation in the flat Rayleigh fading channel, and error rate improvements up to 1.2 dB are demonstrated depending on system parameters.
△ Less
Submitted 20 February, 2015;
originally announced February 2015.
-
Performance Analysis of Geographic Routing Protocols in Ad Hoc Networks
Authors:
Don Torrieri,
Salvatore Talarico,
Matthew C. Valenti
Abstract:
Geographic routing protocols greatly reduce the requirements of topology storage and provide flexibility in the accommodation of the dynamic behavior of ad hoc networks. This paper presents performance evaluations and comparisons of two geographic routing protocols and the popular AODV protocol. The trade-offs among the average path reliabilities, average conditional delays, average conditional nu…
▽ More
Geographic routing protocols greatly reduce the requirements of topology storage and provide flexibility in the accommodation of the dynamic behavior of ad hoc networks. This paper presents performance evaluations and comparisons of two geographic routing protocols and the popular AODV protocol. The trade-offs among the average path reliabilities, average conditional delays, average conditional number of hops, and area spectral efficiencies and the effects of various parameters are illustrated for finite ad hoc networks with randomly placed mobiles. This paper uses a dual method of closed-form analysis and simple simulation that is applicable to most routing protocols and provides a much more realistic performance evaluation than has previously been possible. Some features included in the new analysis are shadowing, exclusion and guard zones, and distance-dependent fading.
△ Less
Submitted 8 December, 2014;
originally announced December 2014.