-
Performance Analysis of UAV-Assisted RF-UOWC Systems
Authors:
Tijana Devaja,
Milica Petkovic,
Marko Beko,
Dejan Vukobratovic
Abstract:
This paper introduces a relay-assisted solution for downlink communications in a mixed system of Radio Frequency (RF) and Underwater Optical Wireless Communications (UOWC) technologies. During the initial downlink phase, data transmission occurs via RF link between hovering Unmanned Aerial Vehicle (UAV) and the floating buoys at the water surface. As fixed buoy acts as amplify-and-forward relays,…
▽ More
This paper introduces a relay-assisted solution for downlink communications in a mixed system of Radio Frequency (RF) and Underwater Optical Wireless Communications (UOWC) technologies. During the initial downlink phase, data transmission occurs via RF link between hovering Unmanned Aerial Vehicle (UAV) and the floating buoys at the water surface. As fixed buoy acts as amplify-and-forward relays, the second UOWC link represents downlink signal transmission from the floating buoy to the underwater device. Best relay selection is adopted, meaning that only the buoy with the best estimated RF-based UAV-buoy channel will perform signal transmission to an underwater device. Analytical expression for the outage probability is derived and utilized to examine the system's performance behaviour for various UOWC and RF channel conditions.
△ Less
Submitted 3 July, 2024;
originally announced July 2024.
-
UAV-assisted Distributed Learning for Environmental Monitoring in Rural Environments
Authors:
Vukan Ninkovic,
Dejan Vukobratovic,
Dragisa Miskovic
Abstract:
Distributed learning and inference algorithms have become indispensable for IoT systems, offering benefits such as workload alleviation, data privacy preservation, and reduced latency. This paper introduces an innovative approach that utilizes unmanned aerial vehicles (UAVs) as a coverage extension relay for IoT environmental monitoring in rural areas. Our method integrates a split learning (SL) s…
▽ More
Distributed learning and inference algorithms have become indispensable for IoT systems, offering benefits such as workload alleviation, data privacy preservation, and reduced latency. This paper introduces an innovative approach that utilizes unmanned aerial vehicles (UAVs) as a coverage extension relay for IoT environmental monitoring in rural areas. Our method integrates a split learning (SL) strategy between edge devices, a UAV and a server to enhance adaptability and performance of inference mechanisms. By employing UAVs as a relay and by incorporating SL, we address connectivity and resource constraints for applications of learning in IoT in remote settings. Our system model accounts for diverse channel conditions to determine the most suitable transmission strategy for optimal system behaviour. Through simulation analysis, the proposed approach demonstrates its robustness and adaptability, even excelling under adverse channel conditions. Integrating UAV relaying and the SL paradigm offers significant flexibility to the server, enabling adaptive strategies that consider various trade-offs beyond simply minimizing overall inference quality.
△ Less
Submitted 2 July, 2024;
originally announced July 2024.
-
Slotted Aloha for Optical Wireless Communications in Internet of Underwater Things
Authors:
Milica Petkovic,
Sotiris A. Tegos,
Panagiotis D. Diamantoulakis,
Dejan Vukobratovic,
Erdal Panayirci,
Cedomir Stefanovic,
George K. Karagiannidis
Abstract:
In this work, we design and analyse a Slotted ALOHA (SA) solution for Optical Wireless Communication (OWC)-based Internet of Underwater Things (IoUT). In the proposed system, user devices exchange data with an access point (AP) which exploits the capture effect. The space spanned by the IoUT nodes is three-dimensional, i.e., users are located in half-sphere centered at the AP placed at the bottom…
▽ More
In this work, we design and analyse a Slotted ALOHA (SA) solution for Optical Wireless Communication (OWC)-based Internet of Underwater Things (IoUT). In the proposed system, user devices exchange data with an access point (AP) which exploits the capture effect. The space spanned by the IoUT nodes is three-dimensional, i.e., users are located in half-sphere centered at the AP placed at the bottom of a floating object at the water surface level. The analytical expressions for the system throughput and reliability expressed in terms of the outage probability are derived. Based on the simulated signal-to-noise-and-interference-ratio statistics and derived analytical expressions, we present numerical results that investigate the trade-off between the system performance and the IoUT system parameters, such as the number of users, activation probability and type of water medium. The presented conclusions provide valuable insights into the design of an SA-based solution for IoUT communications.
△ Less
Submitted 1 December, 2023;
originally announced December 2023.
-
Timely and Efficient Information Delivery in Real-Time Industrial IoT Networks
Authors:
Hossam Farag,
Dejan Vukobratovic,
Andrea Munari,
Cedomir Stefanovic
Abstract:
Enabling real-time communication in Industrial Internet of Things (IIoT) networks is crucial to support autonomous, self-organized and re-configurable industrial automation for Industry 4.0 and the forthcoming Industry 5.0. In this paper, we consider a SIC-assisted real-time IIoT network, in which sensor nodes generate reports according to an event-generation probability that is specific for the m…
▽ More
Enabling real-time communication in Industrial Internet of Things (IIoT) networks is crucial to support autonomous, self-organized and re-configurable industrial automation for Industry 4.0 and the forthcoming Industry 5.0. In this paper, we consider a SIC-assisted real-time IIoT network, in which sensor nodes generate reports according to an event-generation probability that is specific for the monitored phenomena. The reports are delivered over a block-fading channel to a common Access Point (AP) in slotted ALOHA fashion, which leverages the imbalances in the received powers among the contending users and applies successive interference cancellation (SIC) to decode user packets from the collisions. We provide an extensive analytical treatment of the setup, deriving the Age of Information (AoI), throughput and deadline violation probability, when the AP has access to both the perfect as well as the imperfect channel-state information. We show that adopting SIC improves all the performance parameters with respect to the standard slotted ALOHA, as well as to an age-dependent access method. The analytical results agree with the simulation based ones, demonstrating that investing in the SIC capability at the receiver enables this simple access method to support timely and efficient information delivery in IIoT networks.
△ Less
Submitted 22 November, 2023;
originally announced November 2023.
-
Distributed Sensing, Computing, Communication, and Control Fabric: A Unified Service-Level Architecture for 6G
Authors:
Dejan Vukobratović,
Nikolaos Bartzoudis,
Mona Ghassemian,
Firooz Saghezchi,
Peizheng Li,
Adnan Aijaz,
Ricardo Martinez,
Xueli An,
Ranga Rao Venkatesha Prasad,
Helge Lüders,
Shahid Mumtaz
Abstract:
With the advent of the multimodal immersive communication system, people can interact with each other using multiple devices for sensing, communication and/or control either onsite or remotely. As a breakthrough concept, a distributed sensing, computing, communications, and control (DS3C) fabric is introduced in this paper for provisioning 6G services in multi-tenant environments in a unified mann…
▽ More
With the advent of the multimodal immersive communication system, people can interact with each other using multiple devices for sensing, communication and/or control either onsite or remotely. As a breakthrough concept, a distributed sensing, computing, communications, and control (DS3C) fabric is introduced in this paper for provisioning 6G services in multi-tenant environments in a unified manner. The DS3C fabric can be further enhanced by natively incorporating intelligent algorithms for network automation and managing networking, computing, and sensing resources efficiently to serve vertical use cases with extreme and/or conflicting requirements. As such, the paper proposes a novel end-to-end 6G system architecture with enhanced intelligence spanning across different network, computing, and business domains, identifies vertical use cases and presents an overview of the relevant standardization and pre-standardization landscape.
△ Less
Submitted 18 July, 2023;
originally announced July 2023.
-
A Weighted Autoencoder-Based Approach to Downlink NOMA Constellation Design
Authors:
Vukan Ninkovic,
Dejan Vukobratovic,
Adriano Pastore,
Carles Anton-Haro
Abstract:
End-to-end design of communication systems using deep autoencoders (AEs) is gaining attention due to its flexibility and excellent performance. Besides single-user transmission, AE-based design is recently explored in multi-user setup, e.g., for designing constellations for non-orthogonal multiple access (NOMA). In this paper, we further advance the design of AE-based downlink NOMA by introducing…
▽ More
End-to-end design of communication systems using deep autoencoders (AEs) is gaining attention due to its flexibility and excellent performance. Besides single-user transmission, AE-based design is recently explored in multi-user setup, e.g., for designing constellations for non-orthogonal multiple access (NOMA). In this paper, we further advance the design of AE-based downlink NOMA by introducing weighted loss function in the AE training. By changing the weight coefficients, one can flexibly tune the constellation design to balance error probability of different users, without relying on explicit information about their channel quality. Combined with the SICNet decoder, we demonstrate a significant improvement in achievable levels and flexible control of error probability of different users using the proposed weighted AE-based framework.
△ Less
Submitted 23 June, 2023;
originally announced June 2023.
-
Two-Tier UAV-based Low Power Wide Area Networks: A Testbed and Experimentation Study
Authors:
Srdjan Sobot,
Milan Lukic,
Dusan Bortnik,
Vladimir Nikic,
Brena Lima,
Marko Beko,
Dejan Vukobratovic
Abstract:
In this paper, we propose, design, deploy and demonstrate a two-tier Low Power Wide Area Network (LP WAN) system based on Unmanned Aerial Vehicle (UAV) base stations suitable for dynamic deployment in deep rural environments. The proposed UAV-based LP WAN network augments the existing macro-cellular LP WAN network (Tier 1) with an additional layer of mobile base stations (Tier 2) based also on LP…
▽ More
In this paper, we propose, design, deploy and demonstrate a two-tier Low Power Wide Area Network (LP WAN) system based on Unmanned Aerial Vehicle (UAV) base stations suitable for dynamic deployment in deep rural environments. The proposed UAV-based LP WAN network augments the existing macro-cellular LP WAN network (Tier 1) with an additional layer of mobile base stations (Tier 2) based also on LP WAN technology. Mobile Tier 2 LP WAN base stations provide connectivity to static or mobile LP WAN user equipment deployed in the areas without direct Tier 1 LP WAN network coverage. The proposed two-tier LP WAN network scenario is suitable for various agricultural, forestry and environmental applications such as livestock or wild animal monitoring. In this experimental work, we report the prototype that was successfully deployed and used in a real-world deep rural environment without Tier 1 LP WAN network coverage.
△ Less
Submitted 18 May, 2023;
originally announced May 2023.
-
Graph Neural Networks on Factor Graphs for Robust, Fast, and Scalable Linear State Estimation with PMUs
Authors:
Ognjen Kundacina,
Mirsad Cosovic,
Dragisa Miskovic,
Dejan Vukobratovic
Abstract:
As phasor measurement units (PMUs) become more widely used in transmission power systems, a fast state estimation (SE) algorithm that can take advantage of their high sample rates is needed. To accomplish this, we present a method that uses graph neural networks (GNNs) to learn complex bus voltage estimates from PMU voltage and current measurements. We propose an original implementation of GNNs ov…
▽ More
As phasor measurement units (PMUs) become more widely used in transmission power systems, a fast state estimation (SE) algorithm that can take advantage of their high sample rates is needed. To accomplish this, we present a method that uses graph neural networks (GNNs) to learn complex bus voltage estimates from PMU voltage and current measurements. We propose an original implementation of GNNs over the power system's factor graph to simplify the integration of various types and quantities of measurements on power system buses and branches. Furthermore, we augment the factor graph to improve the robustness of GNN predictions. This model is highly efficient and scalable, as its computational complexity is linear with respect to the number of nodes in the power system. Training and test examples were generated by randomly sampling sets of power system measurements and annotated with the exact solutions of linear SE with PMUs. The numerical results demonstrate that the GNN model provides an accurate approximation of the SE solutions. Furthermore, errors caused by PMU malfunctions or communication failures that would normally make the SE problem unobservable have a local effect and do not deteriorate the results in the rest of the power system.
△ Less
Submitted 28 April, 2023;
originally announced April 2023.
-
Supporting Future Electrical Utilities: Using Deep Learning Methods in EMS and DMS Algorithms
Authors:
Ognjen Kundacina,
Gorana Gojic,
Mile Mitrovic,
Dragisa Miskovic,
Dejan Vukobratovic
Abstract:
Electrical power systems are increasing in size, complexity, as well as dynamics due to the growing integration of renewable energy resources, which have sporadic power generation. This necessitates the development of near real-time power system algorithms, demanding lower computational complexity regarding the power system size. Considering the growing trend in the collection of historical measur…
▽ More
Electrical power systems are increasing in size, complexity, as well as dynamics due to the growing integration of renewable energy resources, which have sporadic power generation. This necessitates the development of near real-time power system algorithms, demanding lower computational complexity regarding the power system size. Considering the growing trend in the collection of historical measurement data and recent advances in the rapidly develo** deep learning field, the main goal of this paper is to provide a review of recent deep learning-based power system monitoring and optimization algorithms. Electrical utilities can benefit from this review by re-implementing or enhancing the algorithms traditionally used in energy management systems (EMS) and distribution management systems (DMS).
△ Less
Submitted 1 March, 2023;
originally announced March 2023.
-
Scalability and Sample Efficiency Analysis of Graph Neural Networks for Power System State Estimation
Authors:
Ognjen Kundacina,
Gorana Gojic,
Mirsad Cosovic,
Dragisa Miskovic,
Dejan Vukobratovic
Abstract:
Data-driven state estimation (SE) is becoming increasingly important in modern power systems, as it allows for more efficient analysis of system behaviour using real-time measurement data. This paper thoroughly evaluates a phasor measurement unit-only state estimator based on graph neural networks (GNNs) applied over factor graphs. To assess the sample efficiency of the GNN model, we perform multi…
▽ More
Data-driven state estimation (SE) is becoming increasingly important in modern power systems, as it allows for more efficient analysis of system behaviour using real-time measurement data. This paper thoroughly evaluates a phasor measurement unit-only state estimator based on graph neural networks (GNNs) applied over factor graphs. To assess the sample efficiency of the GNN model, we perform multiple training experiments on various training set sizes. Additionally, to evaluate the scalability of the GNN model, we conduct experiments on power systems of various sizes. Our results show that the GNN-based state estimator exhibits high accuracy and efficient use of data. Additionally, it demonstrated scalability in terms of both memory usage and inference time, making it a promising solution for data-driven SE in modern power systems.
△ Less
Submitted 2 March, 2023; v1 submitted 28 February, 2023;
originally announced March 2023.
-
Two-Tier Multi-Rate Slotted ALOHA for OWC/RF-Based IoT Networks
Authors:
Milica Petkovic,
Dejan Vukobratovic,
Andrea Munari,
Federico Clazzer
Abstract:
We consider a massive Internet of Things (IoT) scenario where indoor IoT devices access the network via optical wireless communication (OWC) IoT systems that relay data via a backhaul radio frequency (RF) low-power wide-area network (LP WAN). We propose a novel two-tier multi-rate Slotted ALOHA (SA) system model to design and analyse such hybrid OWC/RF networks. For a particular hybrid OWC/RF setu…
▽ More
We consider a massive Internet of Things (IoT) scenario where indoor IoT devices access the network via optical wireless communication (OWC) IoT systems that relay data via a backhaul radio frequency (RF) low-power wide-area network (LP WAN). We propose a novel two-tier multi-rate Slotted ALOHA (SA) system model to design and analyse such hybrid OWC/RF networks. For a particular hybrid OWC/RF setup, we present an in-depth numerical investigation that provides insights into the proposed two-tier multi-rate hybrid OWC/RF SA system design.
△ Less
Submitted 20 February, 2023;
originally announced February 2023.
-
Rateless Autoencoder Codes: Trading off Decoding Delay and Reliability
Authors:
Vukan Ninkovic,
Dejan Vukobratovic,
Christian Häger,
Henk Wymeersch,
Alexandre Graell i Amat
Abstract:
Most of today's communication systems are designed to target reliable message recovery after receiving the entire encoded message (codeword). However, in many practical scenarios, the transmission process may be interrupted before receiving the complete codeword. This paper proposes a novel rateless autoencoder (AE)-based code design suitable for decoding the transmitted message before the noisy c…
▽ More
Most of today's communication systems are designed to target reliable message recovery after receiving the entire encoded message (codeword). However, in many practical scenarios, the transmission process may be interrupted before receiving the complete codeword. This paper proposes a novel rateless autoencoder (AE)-based code design suitable for decoding the transmitted message before the noisy codeword is fully received. Using particular dropout strategies applied during the training process, rateless AE codes allow to trade off between decoding delay and reliability, providing a graceful improvement of the latter with each additionally received codeword symbol. The proposed rateless AEs significantly outperform the conventional AE designs for scenarios where it is desirable to trade off reliability for lower decoding delay.
△ Less
Submitted 31 January, 2023; v1 submitted 28 January, 2023;
originally announced January 2023.
-
Machine Learning Methods for Device Identification Using Wireless Fingerprinting
Authors:
Srđan Šobot,
Vukan Ninković,
Dejan Vukobratović,
Milan Pavlović,
Miloš Radovanović
Abstract:
Industrial Internet of Things (IoT) systems increasingly rely on wireless communication standards. In a common industrial scenario, indoor wireless IoT devices communicate with access points to deliver data collected from industrial sensors, robots and factory machines. Due to static or quasi-static locations of IoT devices and access points, historical observations of IoT device channel condition…
▽ More
Industrial Internet of Things (IoT) systems increasingly rely on wireless communication standards. In a common industrial scenario, indoor wireless IoT devices communicate with access points to deliver data collected from industrial sensors, robots and factory machines. Due to static or quasi-static locations of IoT devices and access points, historical observations of IoT device channel conditions provide a possibility to precisely identify the device without observing its traditional identifiers (e.g., MAC or IP address). Such device identification methods based on wireless fingerprinting gained increased attention lately as an additional cyber-security mechanism for critical IoT infrastructures. In this paper, we perform a systematic study of a large class of machine learning algorithms for device identification using wireless fingerprints for the most popular cellular and Wi-Fi IoT technologies. We design, implement, deploy, collect relevant data sets, train and test a multitude of machine learning algorithms, as a part of the complete end-to-end solution design for device identification via wireless fingerprinting. The proposed solution is currently being deployed in a real-world industrial IoT environment as part of H2020 project COLLABS.
△ Less
Submitted 3 November, 2022;
originally announced November 2022.
-
Distributed Inference over Linear Models using Alternating Gaussian Belief Propagation
Authors:
Mirsad Cosovic,
Dragisa Miskovic,
Muhamed Delalic,
Darijo Raca,
Dejan Vukobratovic
Abstract:
We consider the problem of maximum likelihood estimation in linear models represented by factor graphs and solved via the Gaussian belief propagation algorithm. Motivated by massive internet of things (IoT) networks and edge computing, we set the above problem in a clustered scenario, where the factor graph is divided into clusters and assigned for processing in a distributed fashion across a numb…
▽ More
We consider the problem of maximum likelihood estimation in linear models represented by factor graphs and solved via the Gaussian belief propagation algorithm. Motivated by massive internet of things (IoT) networks and edge computing, we set the above problem in a clustered scenario, where the factor graph is divided into clusters and assigned for processing in a distributed fashion across a number of edge computing nodes. For these scenarios, we show that an alternating Gaussian belief propagation (AGBP) algorithm that alternates between inter- and intra-cluster iterations, demonstrates superior performance in terms of convergence properties compared to the existing solutions in the literature. We present a comprehensive framework and introduce appropriate metrics to analyse AGBP algorithm across a wide range of linear models characterised by symmetric and non-symmetric, square, and rectangular matrices. We extend the analysis to the case of dynamic linear models by introducing dynamic arrival of new data over time. Using a combination of analytical and extensive numerical results, we show the efficiency and scalability of AGBP algorithm, making it a suitable solution for large-scale inference in massive IoT networks.
△ Less
Submitted 30 May, 2023; v1 submitted 18 October, 2022;
originally announced October 2022.
-
Mixed RF-VLC Relaying Systems for Interference-Sensitive Mobile Applications
Authors:
Milica I. Petkovic,
Aleksandra M. Cvetkovic,
Milan Narandzic,
Nestor D. Chatzidiamantis,
Dejan Vukobratovic,
George K. Karagiannidis
Abstract:
Due to their Radio-Frequency (RF) immunity, Visible Light Communications (VLC) pose as a promising technology for interference sensitive applications such as medical data networks. In this paper, we investigate mixed RF-VLC relaying systems especially suited for this type of applications that support mobility. In this system setup, the end-user, who is assumed to be on a vehicle that is in dynamic…
▽ More
Due to their Radio-Frequency (RF) immunity, Visible Light Communications (VLC) pose as a promising technology for interference sensitive applications such as medical data networks. In this paper, we investigate mixed RF-VLC relaying systems especially suited for this type of applications that support mobility. In this system setup, the end-user, who is assumed to be on a vehicle that is in dynamic movement, is served by an indoor VLC system, while the outdoor data traffic is conveyed through multiple backhaul RF links. Furthermore, it is assumed that a single backhaul RF link is activated by the mobile relay and due to feedback delay, the RF link activation is based on outdated channel state information (CSI). The performance of this system is analyzed in terms of outage probability and bit error rate (BER), and novel closed form analytical expressions are provided. Furthermore, the analysis is extended for the case where the average SNR over the RF links and/or LED optical power is high, and approximate analytical expressions are derived which determine performance floors. Numerical results are provided which demonstrate that the utilization of multiple RF backhaul links can significantly improve overall RF-VLC system performance when outage/BER floors are avoided. This calls upon joint design of both subsystems. Additionally, the outdated CSI exploited for active RF selection can significantly degrade the quality of system performance.
△ Less
Submitted 22 September, 2022;
originally announced September 2022.
-
Relay-aided Slotted Aloha for Optical Wireless Communications
Authors:
Milica Petkovic,
Dejan Vukobratović,
Andrea Munari,
Federico Clazzer
Abstract:
We consider a relay-aided Slotted ALOHA solution for uplink random access for an Optical Wireless Communications (OWC)-based Internet of Things (IoT). The first phase of uplink, the one between IoT devices and the relays, is realized using indoor OWC, while the second phase, between the relays and a base station, represents the long-range RF transmission based on low-power wide area network such a…
▽ More
We consider a relay-aided Slotted ALOHA solution for uplink random access for an Optical Wireless Communications (OWC)-based Internet of Things (IoT). The first phase of uplink, the one between IoT devices and the relays, is realized using indoor OWC, while the second phase, between the relays and a base station, represents the long-range RF transmission based on low-power wide area network such as LoRaWAN and occurs outdoors. The throughput performance dependence on the OWC and RF channel conditions is observed. The behavior of the performance gain due to adding relays is highlighted and investigated under different channel and traffic conditions.
△ Less
Submitted 22 September, 2022;
originally announced September 2022.
-
Mixed RF-VLC Relaying System with Radio-Access Diversity
Authors:
Milica I. Petkovic,
Aleksandra Cvetkovic,
Milan Narandzic,
Dejan Vukobratovic
Abstract:
We present a statistical analysis of a mixed radio-frequency (RF)-visible light communications (VLC) relaying system, where outdoor millimeter wave based RF links are utilized to provide backhaul connectivity for indoor VLC broadcasting. The multiple RF links are assumed to communicate with the VLC access point through decode-and-forward relay. Novel closed-form outage probability and average bit…
▽ More
We present a statistical analysis of a mixed radio-frequency (RF)-visible light communications (VLC) relaying system, where outdoor millimeter wave based RF links are utilized to provide backhaul connectivity for indoor VLC broadcasting. The multiple RF links are assumed to communicate with the VLC access point through decode-and-forward relay. Novel closed-form outage probability and average bit error rate expressions are derived and utilized to obtain numerical results. Monte Carlo simulations validate presented numerical results, which are further used to examine the effects of system and channel parameters on system performance.
△ Less
Submitted 22 September, 2022;
originally announced September 2022.
-
Distributed Nonlinear State Estimation in Electric Power Systems using Graph Neural Networks
Authors:
Ognjen Kundacina,
Mirsad Cosovic,
Dragisa Miskovic,
Dejan Vukobratovic
Abstract:
Nonlinear state estimation (SE), with the goal of estimating complex bus voltages based on all types of measurements available in the power system, is usually solved using the iterative Gauss-Newton method. The nonlinear SE presents some difficulties when considering inputs from both phasor measurement units and supervisory control and data acquisition system. These include numerical instabilities…
▽ More
Nonlinear state estimation (SE), with the goal of estimating complex bus voltages based on all types of measurements available in the power system, is usually solved using the iterative Gauss-Newton method. The nonlinear SE presents some difficulties when considering inputs from both phasor measurement units and supervisory control and data acquisition system. These include numerical instabilities, convergence time depending on the starting point of the iterative method, and the quadratic computational complexity of a single iteration regarding the number of state variables. This paper introduces an original graph neural network based SE implementation over the augmented factor graph of the nonlinear power system SE, capable of incorporating measurements on both branches and buses, as well as both phasor and legacy measurements. The proposed regression model has linear computational complexity during the inference time once trained, with a possibility of distributed implementation. Since the method is noniterative and non-matrix-based, it is resilient to the problems that the Gauss-Newton solver is prone to. Aside from prediction accuracy on the test set, the proposed model demonstrates robustness when simulating cyber attacks and unobservable scenarios due to communication irregularities. In those cases, prediction errors are sustained locally, with no effect on the rest of the power system's results.
△ Less
Submitted 8 September, 2022; v1 submitted 23 July, 2022;
originally announced July 2022.
-
Near Real-Time Distributed State Estimation via AI/ML-Empowered 5G Networks
Authors:
Ognjen Kundacina,
Miodrag Forcan,
Mirsad Cosovic,
Darijo Raca,
Merim Dzaferagic,
Dragisa Miskovic,
Mirjana Maksimovic,
Dejan Vukobratovic
Abstract:
Fifth-Generation (5G) networks have a potential to accelerate power system transition to a flexible, softwarized, data-driven, and intelligent grid. With their evolving support for Machine Learning (ML)/Artificial Intelligence (AI) functions, 5G networks are expected to enable novel data-centric Smart Grid (SG) services. In this paper, we explore how data-driven SG services could be integrated wit…
▽ More
Fifth-Generation (5G) networks have a potential to accelerate power system transition to a flexible, softwarized, data-driven, and intelligent grid. With their evolving support for Machine Learning (ML)/Artificial Intelligence (AI) functions, 5G networks are expected to enable novel data-centric Smart Grid (SG) services. In this paper, we explore how data-driven SG services could be integrated with ML/AI-enabled 5G networks in a symbiotic relationship. We focus on the State Estimation (SE) function as a key element of the energy management system and focus on two main questions. Firstly, in a tutorial fashion, we present an overview on how distributed SE can be integrated with the elements of the 5G core network and radio access network architecture. Secondly, we present and compare two powerful distributed SE methods based on: i) graphical models and belief propagation, and ii) graph neural networks. We discuss their performance and capability to support a near real-time distributed SE via 5G network, taking into account communication delays.
△ Less
Submitted 22 July, 2022;
originally announced July 2022.
-
Robust and Fast Data-Driven Power System State Estimator Using Graph Neural Networks
Authors:
Ognjen Kundacina,
Mirsad Cosovic,
Dejan Vukobratovic
Abstract:
The power system state estimation (SE) algorithm estimates the complex bus voltages based on the available set of measurements. Because phasor measurement units (PMUs) are becoming more widely employed in transmission power systems, a fast SE solver capable of exploiting PMUs' high sample rates is required. To accomplish this, we present a method for training a model based on graph neural networks…
▽ More
The power system state estimation (SE) algorithm estimates the complex bus voltages based on the available set of measurements. Because phasor measurement units (PMUs) are becoming more widely employed in transmission power systems, a fast SE solver capable of exploiting PMUs' high sample rates is required. To accomplish this, we present a method for training a model based on graph neural networks (GNNs) to learn estimates from PMU voltage and current measurements, which, once it is trained, has a linear computational complexity with respect to the number of nodes in the power system. We propose an original GNN implementation over the power system's factor graph to simplify the incorporation of various types and numbers of measurements both on power system buses and branches. Furthermore, we augment the factor graph to improve the robustness of GNN predictions. Training and test examples were generated by randomly sampling sets of power system measurements and annotated with the exact solutions of linear SE with PMUs. The numerical results demonstrate that the GNN model provides an accurate approximation of the SE solutions. Additionally, errors caused by PMU malfunctions or the communication failures that make the SE problem unobservable have a local effect and do not deteriorate the results in the rest of the power system.
△ Less
Submitted 6 June, 2022;
originally announced June 2022.
-
Optimal Error-Detecting Codes for General Asymmetric Channels via Sperner Theory
Authors:
Mladen Kovačević,
Dejan Vukobratović
Abstract:
Several communication models that are of relevance in practice are asymmetric in the way they act on the transmitted "objects". Examples include channels in which the amplitudes of the transmitted pulses can only be decreased, channels in which the symbols can only be deleted, channels in which non-zero symbols can only be shifted to the right (e.g., timing channels), subspace channels in which th…
▽ More
Several communication models that are of relevance in practice are asymmetric in the way they act on the transmitted "objects". Examples include channels in which the amplitudes of the transmitted pulses can only be decreased, channels in which the symbols can only be deleted, channels in which non-zero symbols can only be shifted to the right (e.g., timing channels), subspace channels in which the dimension of the transmitted vector space can only be reduced, unordered storage channels in which the cardinality of the stored (multi)set can only be reduced, etc. We introduce a formal definition of an asymmetric channel as a channel whose action induces a partial order on the set of all possible inputs, and show that this definition captures all the above examples. Such a general approach allows one to treat all these different models in a unified way, and to obtain a characterization of optimal error-detecting codes for many interesting asymmetric channels by using Sperner theory.
△ Less
Submitted 15 August, 2022; v1 submitted 15 May, 2022;
originally announced May 2022.
-
Slotted Aloha with Capture for OWC-based IoT: Finite Block-Length Performance Analysis
Authors:
Tijana Devaja,
Milica Petkovic,
Francisco J. Escribano,
Cedomir Stefanovic,
Dejan Vukobratovic
Abstract:
In this paper, we propose a Slotted ALOHA (SA)-inspired solution for an indoor optical wireless communication (OWC)-based Internet of Things (IoT) system. Assuming that the OWC receiver exploits the capture effect, we are interested in the derivation of error probability of decoding a short-length data packet originating from a randomly selected OWC IoT transmitter. The presented OWC system analys…
▽ More
In this paper, we propose a Slotted ALOHA (SA)-inspired solution for an indoor optical wireless communication (OWC)-based Internet of Things (IoT) system. Assuming that the OWC receiver exploits the capture effect, we are interested in the derivation of error probability of decoding a short-length data packet originating from a randomly selected OWC IoT transmitter. The presented OWC system analysis rests on the derivation of the signal-to-noise-and-interference-ratio (SINR) statistics and usage of finite block-length (FBL) information theory, from which relevant error probability and throughput is derived. Using the derived expressions, we obtain numerical results which are further utilized to characterize the trade-offs between the system performance and the OWC system setup parameters. The indoor OWC-based system geometry plays an important role in the system performance, thus the presented results can be used as a guideline for the system design to optimize the performance of the SA-based random access protocol.
△ Less
Submitted 16 November, 2022; v1 submitted 5 May, 2022;
originally announced May 2022.
-
State Estimation in Electric Power Systems Leveraging Graph Neural Networks
Authors:
Ognjen Kundacina,
Mirsad Cosovic,
Dejan Vukobratovic
Abstract:
The goal of the state estimation (SE) algorithm is to estimate complex bus voltages as state variables based on the available set of measurements in the power system. Because phasor measurement units (PMUs) are increasingly being used in transmission power systems, there is a need for a fast SE solver that can take advantage of high sampling rates of PMUs. This paper proposes training a graph neur…
▽ More
The goal of the state estimation (SE) algorithm is to estimate complex bus voltages as state variables based on the available set of measurements in the power system. Because phasor measurement units (PMUs) are increasingly being used in transmission power systems, there is a need for a fast SE solver that can take advantage of high sampling rates of PMUs. This paper proposes training a graph neural network (GNN) to learn the estimates given the PMU voltage and current measurements as inputs, with the intent of obtaining fast and accurate predictions during the evaluation phase. GNN is trained using synthetic datasets, created by randomly sampling sets of measurements in the power system and labelling them with a solution obtained using a linear SE with PMUs solver. The presented results display the accuracy of GNN predictions in various test scenarios and tackle the sensitivity of the predictions to the missing input data.
△ Less
Submitted 12 April, 2022; v1 submitted 11 January, 2022;
originally announced January 2022.
-
Reliability Analysis of Slotted Aloha with Capture for an OWC-based IoT system
Authors:
Milica Petkovic,
Tijana Devaja,
Dejan Vukobratovic,
Francisco J. Escribano,
Cedomir Stefanovic
Abstract:
In this article, we consider a random access scheme for an indoor Internet of Things (IoT) framework that uses optical wireless communication (OWC). We focus on a Slotted ALOHA (SA)-based solution where a number of OWC IoT users contend to send data to a central OWC receiver. In any given slot, and for a randomly selected active user, we consider the reliability of decoding the user's data packet…
▽ More
In this article, we consider a random access scheme for an indoor Internet of Things (IoT) framework that uses optical wireless communication (OWC). We focus on a Slotted ALOHA (SA)-based solution where a number of OWC IoT users contend to send data to a central OWC receiver. In any given slot, and for a randomly selected active user, we consider the reliability of decoding the user's data packet at the receiver. This is done by deriving the signal-to-noise-and-interference-ratio (SINR) statistics from a randomly chosen user and evaluating the probability that the user's SINR is below a given threshold. By placing our analysis in the context of an indoor OWC IoT uplink setup, and employing the standard OWC channel model, we investigate the trade-offs between the reliability and the OWC system parameters such as the cell area or the transmitter's semi-angle. We obtain valuable insights into the design of an SA-based random access solution for a typical indoor OWC cell.
△ Less
Submitted 15 July, 2021;
originally announced July 2021.
-
Asymptotic Behavior and Typicality Properties of Runlength-Limited Sequences
Authors:
Mladen Kovačević,
Dejan Vukobratović
Abstract:
This paper studies properties of binary runlength-limited sequences with additional constraints on their Hamming weight and/or their number of runs of identical symbols. An algebraic and a probabilistic (entropic) characterization of the exponential growth rate of the number of such sequences, i.e., their information capacity, are obtained by using the methods of multivariate analytic combinatoric…
▽ More
This paper studies properties of binary runlength-limited sequences with additional constraints on their Hamming weight and/or their number of runs of identical symbols. An algebraic and a probabilistic (entropic) characterization of the exponential growth rate of the number of such sequences, i.e., their information capacity, are obtained by using the methods of multivariate analytic combinatorics, and properties of the capacity as a function of its parameters are stated. The second-order term in the asymptotic expansion of the rate of these sequences is also given, and the typical values of the relevant quantities are derived. Several applications of the results are illustrated, including bounds on codes for weight-preserving and run-preserving channels (e.g., the run-preserving insertion-deletion channel), a sphere-packing bound for channels with sparse error patterns, and the asymptotics of constant-weight sub-block constrained sequences. In addition, the asymptotics of a closely related notion -- $ q $-ary sequences with fixed Manhattan weight -- is briefly discussed, and an application in coding for molecular timing channels is illustrated.
△ Less
Submitted 11 December, 2021; v1 submitted 10 May, 2021;
originally announced May 2021.
-
Autoencoder-Based Unequal Error Protection Codes
Authors:
Vukan Ninkovic,
Dejan Vukobratovic,
Christian Häger,
Henk Wymeersch,
Alexandre Graell i Amat
Abstract:
We present a novel autoencoder-based approach for designing codes that provide unequal error protection (UEP) capabilities. The proposed design is based on a generalization of an autoencoder loss function that accommodates both message-wise and bit-wise UEP scenarios. In both scenarios, the generalized loss function can be adjusted using an associated weight vector to trade off error probabilities…
▽ More
We present a novel autoencoder-based approach for designing codes that provide unequal error protection (UEP) capabilities. The proposed design is based on a generalization of an autoencoder loss function that accommodates both message-wise and bit-wise UEP scenarios. In both scenarios, the generalized loss function can be adjusted using an associated weight vector to trade off error probabilities corresponding to different importance classes. For message-wise UEP, we compare the proposed autoencoder-based UEP codes with a union of random coset codes. For bit-wise UEP, the proposed codes are compared with UEP rateless spinal codes and the superposition of random Gaussian codes. In all cases, the autoencoder-based codes show superior performance while providing design simplicity and flexibility in trading off error protection among different importance classes.
△ Less
Submitted 16 April, 2021;
originally announced April 2021.
-
Deep Learning Anomaly Detection for Cellular IoT with Applications in Smart Logistics
Authors:
Milos Savic,
Milan Lukic,
Dragan Danilovic,
Zarko Bodroski,
Dragana Bajovic,
Ivan Mezei,
Dejan Vukobratovic,
Srdjan Skrbic,
Dusan Jakovetic
Abstract:
The number of connected Internet of Things (IoT) devices within cyber-physical infrastructure systems grows at an increasing rate. This poses significant device management and security challenges to current IoT networks. Among several approaches to cope with these challenges, data-based methods rooted in deep learning (DL) are receiving an increased interest. In this paper, motivated by the upcomi…
▽ More
The number of connected Internet of Things (IoT) devices within cyber-physical infrastructure systems grows at an increasing rate. This poses significant device management and security challenges to current IoT networks. Among several approaches to cope with these challenges, data-based methods rooted in deep learning (DL) are receiving an increased interest. In this paper, motivated by the upcoming surge of 5G IoT connectivity in industrial environments, we propose to integrate a DL-based anomaly detection (AD) as a service into the 3GPP mobile cellular IoT architecture. The proposed architecture embeds autoencoder based anomaly detection modules both at the IoT devices (ADM-EDGE) and in the mobile core network (ADM-FOG), thereby balancing between the system responsiveness and accuracy. We design, integrate, demonstrate and evaluate a testbed that implements the above service in a real-world deployment integrated within the 3GPP Narrow-Band IoT (NB-IoT) mobile operator network.
△ Less
Submitted 2 April, 2021; v1 submitted 17 February, 2021;
originally announced February 2021.
-
Preamble-Based Packet Detection in Wi-Fi: A Deep Learning Approach
Authors:
Vukan Ninkovic,
Dejan Vukobratovic,
Aleksandar Valka,
Dejan Dumic
Abstract:
Wi-Fi systems based on the family of IEEE 802.11 standards that operate in unlicenced bands are the most popular wireless interfaces that use Listen Before Talk (LBT) methodology for channel access. Distinctive feature of majority of LBT-based systems is that the transmitters use preambles that precede the data to allow the receivers to acquire initial signal detection and synchronization. The fir…
▽ More
Wi-Fi systems based on the family of IEEE 802.11 standards that operate in unlicenced bands are the most popular wireless interfaces that use Listen Before Talk (LBT) methodology for channel access. Distinctive feature of majority of LBT-based systems is that the transmitters use preambles that precede the data to allow the receivers to acquire initial signal detection and synchronization. The first digital processing step at the receiver applied over the incoming discrete-time complex-baseband samples after analog-to-digital conversion is the packet detection step, i.e., the detection of the initial samples of each of the frames arriving within the incoming stream. Since the preambles usually contain repetitions of training symbols with good correlation properties, conventional digital receivers apply correlation-based methods for packet detection. Following the recent interest in data-based deep learning (DL) methods for physical layer signal processing, in this paper, we challenge the conventional methods with DL-based approach for Wi-Fi packet detection. Using one-dimensional Convolutional Neural Networks (1D-CNN), we present a detailed complexity vs performance analysis and comparison between conventional and DL-based Wi-Fi packet detection approaches.
△ Less
Submitted 12 September, 2020;
originally announced September 2020.
-
In-depth Real-World Evaluation of NB-IoT Module Energy Consumption
Authors:
Milan Lukic,
Srdjan Sobot,
Ivan Mezei,
Dragan Danilovic,
Dejan Vukobratovic
Abstract:
Narrowband Internet of Things (NB-IoT) is a recent addition to the 3GPP standards offering low power wide area networking (LP-WAN) for a massive amount of IoT devices communicating at low data rates in the licensed bands. As the number of deployed NB-IoT devices worldwide increases, the question of energy-efficient real-world NB-IoT device and network operation that would maximize the device batte…
▽ More
Narrowband Internet of Things (NB-IoT) is a recent addition to the 3GPP standards offering low power wide area networking (LP-WAN) for a massive amount of IoT devices communicating at low data rates in the licensed bands. As the number of deployed NB-IoT devices worldwide increases, the question of energy-efficient real-world NB-IoT device and network operation that would maximize the device battery lifetime becomes crucial for NB-IoT service popularity and adoption. In this paper, we present a detailed energy consumption of an NB-IoT module obtained from a custom-designed NB-IoT platform from which a large amount of high time-resolution data is collected. We perform a detailed energy consumption analysis of each NB-IoT data transfer phase and discuss both the device and the network-side configurations that may affect the module energy consumption in each of the phases. Preliminary results and conclusions are put forth along with the discussion of ongoing and future study plans.
△ Less
Submitted 27 May, 2020;
originally announced May 2020.
-
Deep Learning Based Packet Detection and Carrier Frequency Offset Estimation in IEEE 802.11ah
Authors:
Vukan Ninkovic,
Aleksandar Valka,
Dejan Dumic,
Dejan Vukobratovic
Abstract:
Wi-Fi systems based on the IEEE 802.11 standards are the most popular wireless interfaces that use Listen Before Talk (LBT) method for channel access. The distinctive feature of a majority of LBT-based systems is that the transmitters use preambles that precede the data to allow the receivers to perform packet detection and carrier frequency offset (CFO) estimation. Preambles usually contain repet…
▽ More
Wi-Fi systems based on the IEEE 802.11 standards are the most popular wireless interfaces that use Listen Before Talk (LBT) method for channel access. The distinctive feature of a majority of LBT-based systems is that the transmitters use preambles that precede the data to allow the receivers to perform packet detection and carrier frequency offset (CFO) estimation. Preambles usually contain repetitions of training symbols with good correlation properties, while conventional digital receivers apply correlation-based methods for both packet detection and CFO estimation. However, in recent years, data-based machine learning methods are disrupting physical layer research. Promising results have been presented, in particular, in the domain of deep learning (DL)-based channel estimation. In this paper, we present a performance and complexity analysis of packet detection and CFO estimation using both the conventional and the DL-based approaches. The goal of the study is to investigate under which conditions the performance of the DL-based methods approach or even surpass the conventional methods, but also, under which conditions their performance is inferior. Focusing on the emerging IEEE 802.11ah standard, our investigation uses both the standard-based simulated environment, and a real-world testbed based on Software Defined Radios.
△ Less
Submitted 21 July, 2021; v1 submitted 24 April, 2020;
originally announced April 2020.
-
Adaptive Multi-Receiver Coded Slotted ALOHA for Indoor Optical Wireless Communications
Authors:
Dejan Vukobratovic,
Francisco J. Escribano
Abstract:
In this paper, we design a novel high-throughput random access scheme for an indoor optical wireless communication (OWC) massive Internet of Things (IoT) scenario. Due to the large density of both IoT devices and OWC access points (APs), we base the proposed scheme on multi-receiver coded slotted ALOHA. In this scenario, collisions at APs are resolved by a centralized interference cancellation dec…
▽ More
In this paper, we design a novel high-throughput random access scheme for an indoor optical wireless communication (OWC) massive Internet of Things (IoT) scenario. Due to the large density of both IoT devices and OWC access points (APs), we base the proposed scheme on multi-receiver coded slotted ALOHA. In this scenario, collisions at APs are resolved by a centralized interference cancellation decoder that may exploit both spatial and temporal diversity. By applying adaptive control of each OWC AP field of view (FOV), the proposed system is able to dynamically adapt to different IoT device activation rates, in order to maintain a high total throughput. Using illustrative simulation results, we demonstrate the design methodology and performance possibilities of the proposed method.
△ Less
Submitted 17 April, 2020; v1 submitted 24 February, 2020;
originally announced February 2020.
-
Observability Analysis for Large-Scale Power Systems Using Factor Graphs
Authors:
Mirsad Cosovic,
Muhamed Delalic,
Darijo Raca,
Dejan Vukobratovic
Abstract:
The state estimation algorithm estimates the values of the state variables based on the measurement model described as the system of equations. Prior to applying the state estimation algorithm, the existence and uniqueness of the solution of the underlying system of equations is determined through the observability analysis. If a unique solution does not exist, the observability analysis defines o…
▽ More
The state estimation algorithm estimates the values of the state variables based on the measurement model described as the system of equations. Prior to applying the state estimation algorithm, the existence and uniqueness of the solution of the underlying system of equations is determined through the observability analysis. If a unique solution does not exist, the observability analysis defines observable islands and further defines an additional set of equations (measurements) needed to determine a unique solution. For the first time, we utilise factor graphs and Gaussian belief propagation algorithm to define a novel observability analysis approach. The observable islands and placement of measurements to restore observability are identified by following the evolution of variances across the iterations of the Gaussian belief propagation algorithm over the factor graph. Due to sparsity of the underlying power network, the resulting method has the linear computational complexity (assuming a constant number of iterations) making it particularly suitable for solving large-scale systems. The method can be flexibly matched to distributed computational resources, allowing for determination of observable islands and observability restoration in a distributed fashion. Finally, we discuss performances of the proposed observability analysis using power systems whose size ranges between 1354 and 70000 buses.
△ Less
Submitted 2 February, 2021; v1 submitted 24 July, 2019;
originally announced July 2019.
-
Distributed Intelligent Illumination Control in the Context of Probabilistic Graphical Models
Authors:
M. Cosovic,
T. Devaja,
D. Bajovic,
J. Machaj,
G. McCutcheon,
V. Stankovic,
L. Stankovic,
D. Vukobratovic
Abstract:
Lighting systems based on light-emitting diodes (LEDs) possess many benefits over their incandescent counterparts including longer lifespans, lower energy costs, better quality of light and no toxic elements, all without sacrificing consumer satisfaction. Their lifespan is not affected by switching frequency allowing for better illumination control and system efficiency. In this paper, we present…
▽ More
Lighting systems based on light-emitting diodes (LEDs) possess many benefits over their incandescent counterparts including longer lifespans, lower energy costs, better quality of light and no toxic elements, all without sacrificing consumer satisfaction. Their lifespan is not affected by switching frequency allowing for better illumination control and system efficiency. In this paper, we present a fully distributed energy-saving illumination dimming control strategy for the system of a lighting network which consists of a group of LEDs and user-associated devices. In order to solve the optimization problem, we are using a distributed approach that utilizes factor graphs and the belief propagation algorithm. Using probabilistic graphical models to represent and solve the system model provides for a natural description of the problem structure, where user devices and LED controllers exchange data via line-of-sight communication.
△ Less
Submitted 12 June, 2019;
originally announced June 2019.
-
Visible Light Communications Based Indoor Positioning via Compressed Sensing
Authors:
Kristina Gligoric,
Manisha Ajmani,
Dejan Vukobratovic,
Sinan Sinanovic
Abstract:
This paper presents an approach for visible light communication-based indoor positioning using compressed sensing. We consider a large number of light emitting diodes (LEDs) simultaneously transmitting their positional information and a user device equipped with a photo-diode. By casting the LED signal separation problem into an equivalent compressed sensing framework, the user device is able to d…
▽ More
This paper presents an approach for visible light communication-based indoor positioning using compressed sensing. We consider a large number of light emitting diodes (LEDs) simultaneously transmitting their positional information and a user device equipped with a photo-diode. By casting the LED signal separation problem into an equivalent compressed sensing framework, the user device is able to detect the set of nearby LEDs using sparse signal recovery algorithms. From this set, and using proximity method, position estimation is proposed based on the concept that if signal separation is possible, then overlap** light beam regions lead to decrease in positioning error due to increase in the number of reference points. The proposed method is evaluated in a LED-illuminated large-scale indoor open-plan office space scenario. The positioning accuracy is compared against the positioning error lower bound of the proximity method, for various system parameters.
△ Less
Submitted 2 May, 2018;
originally announced May 2018.
-
Random Linear Network Coding for 5G Mobile Video Delivery
Authors:
Dejan Vukobratovic,
Andrea Tassi,
Savo Delic,
Chadi Khirallah
Abstract:
An exponential increase in mobile video delivery will continue with the demand for higher resolution, multi-view and large-scale multicast video services. Novel fifth generation (5G) 3GPP New Radio (NR) standard will bring a number of new opportunities for optimizing video delivery across both 5G core and radio access networks. One of the promising approaches for video quality adaptation, throughp…
▽ More
An exponential increase in mobile video delivery will continue with the demand for higher resolution, multi-view and large-scale multicast video services. Novel fifth generation (5G) 3GPP New Radio (NR) standard will bring a number of new opportunities for optimizing video delivery across both 5G core and radio access networks. One of the promising approaches for video quality adaptation, throughput enhancement and erasure protection is the use of packet-level random linear network coding (RLNC). In this review paper, we discuss the integration of RLNC into the 5G NR standard, building upon the ideas and opportunities identified in 4G LTE. We explicitly identify and discuss in detail novel 5G NR features that provide support for RLNC-based video delivery in 5G, thus pointing out to the promising avenues for future research.
△ Less
Submitted 3 April, 2018; v1 submitted 13 February, 2018;
originally announced February 2018.
-
Optimal detection and error exponents for hidden multi-state processes via random duration model approach
Authors:
Dragana Bajović,
Kanghang He,
Lina Stanković,
Dejan Vukobratović,
Vladimir Stanković
Abstract:
We study detection of random signals corrupted by noise that over time switch their values (states) from a finite set of possible values, where the switchings occur at unknown points in time. We model such signals by means of a random duration model that to each possible state assigns a probability mass function which controls the statistics of durations of that state occurrences. Assuming two pos…
▽ More
We study detection of random signals corrupted by noise that over time switch their values (states) from a finite set of possible values, where the switchings occur at unknown points in time. We model such signals by means of a random duration model that to each possible state assigns a probability mass function which controls the statistics of durations of that state occurrences. Assuming two possible signal states and Gaussian noise, we derive optimal likelihood ratio test and show that it has a computationally tractable form of a matrix product, with the number of matrices involved in the product being the number of process observations. Each matrix involved in the product is of dimension equal to the sum of durations spreads of the two states, and it can be decomposed as a product of a diagonal random matrix controlled by the process observations and a sparse constant matrix which governs transitions in the sequence of states. Using this result, we show that the Neyman-Pearson error exponent is equal to the top Lyapunov exponent for the corresponding random matrices. Using theory of large deviations, we derive a lower bound on the error exponent. Finally, we show that this bound is tight by means of numerical simulations.
△ Less
Submitted 25 December, 2017;
originally announced December 2017.
-
Linear State Estimation via 5G C-RAN Cellular Networks using Gaussian Belief Propagation
Authors:
Mirsad Cosovic,
Dejan Vukobratovic,
Vladimir Stankovic
Abstract:
Machine-type communications and large-scale information processing architectures are among key (r)evolutionary enhancements of emerging fifth-generation (5G) mobile cellular networks. Massive data acquisition and processing will make 5G network an ideal platform for large-scale system monitoring and control with applications in future smart transportation, connected industry, power grids, etc. In…
▽ More
Machine-type communications and large-scale information processing architectures are among key (r)evolutionary enhancements of emerging fifth-generation (5G) mobile cellular networks. Massive data acquisition and processing will make 5G network an ideal platform for large-scale system monitoring and control with applications in future smart transportation, connected industry, power grids, etc. In this work, we investigate a capability of such a 5G network architecture to provide the state estimate of an underlying linear system from the input obtained via large-scale deployment of measurement devices. Assuming that the measurements are communicated via densely deployed cloud radio access network (C-RAN), we formulate and solve the problem of estimating the system state from the set of signals collected at C-RAN base stations. Our solution, based on the Gaussian Belief-Propagation (GBP) framework, allows for large-scale and distributed deployment within the emerging 5G information processing architectures. The presented numerical study demonstrates the accuracy, convergence behavior and scalability of the proposed GBP-based solution to the large-scale state estimation problem.
△ Less
Submitted 2 February, 2018; v1 submitted 24 October, 2017;
originally announced October 2017.
-
Detecting random walks on graphs with heterogeneous sensors
Authors:
Dragana Bajovic,
José M. F. Moura,
Dejan Vukobratovic
Abstract:
We consider the problem of detecting a random walk on a graph, based on observations of the graph nodes. When visited by the walk, each node of the graph observes a signal of elevated mean, which we assume can be different across different nodes. Outside of the path of the walk, and also in its absence, nodes measure only noise. Assuming the Neyman-Pearson setting, our goal then is to characterize…
▽ More
We consider the problem of detecting a random walk on a graph, based on observations of the graph nodes. When visited by the walk, each node of the graph observes a signal of elevated mean, which we assume can be different across different nodes. Outside of the path of the walk, and also in its absence, nodes measure only noise. Assuming the Neyman-Pearson setting, our goal then is to characterize detection performance by computing the error exponent for the probability of a miss, under a constraint on the probability of false alarm. Since exact computation of the error exponent is known to be difficult, equivalent to computation of the Lyapunov exponent, we approximate its value by finding a tractable lower bound. The bound reveals an interesting detectability condition: the walk is detectable whenever the entropy of the walk is smaller than one half of the expected signal-to-noise ratio. We derive the bound by extending the notion of Markov types to Gauss-Markov types. These are sequences of state-observation pairs with a given number of node-to-node transition counts and the same average signal values across nodes, computed from the measurements made during the times the random walk was visiting each node's respective location. The lower bound has an intuitive interpretation: among all Gauss-Markov types that are asymptotically feasible in the absence of the walk, the bound finds the most typical one under the presence of the walk. Finally, we show by a sequence of judicious problem reformulations that computing the bound reduces to solving a convex optimization problem, which is a result in its own right.
△ Less
Submitted 1 October, 2018; v1 submitted 21 July, 2017;
originally announced July 2017.
-
User Activity Detection in Massive Random Access: Compressed Sensing vs. Coded Slotted ALOHA
Authors:
Veljko Boljanovic,
Dejan Vukobratovic,
Petar Popovski,
Cedomir Stefanovic
Abstract:
Machine-type communication services in mobile cel- lular systems are currently evolving with an aim to efficiently address a massive-scale user access to the system. One of the key problems in this respect is to efficiently identify active users in order to allocate them resources for the subsequent transmissions. In this paper, we examine two recently suggested approaches for user activity detect…
▽ More
Machine-type communication services in mobile cel- lular systems are currently evolving with an aim to efficiently address a massive-scale user access to the system. One of the key problems in this respect is to efficiently identify active users in order to allocate them resources for the subsequent transmissions. In this paper, we examine two recently suggested approaches for user activity detection: compressed-sensing (CS) and coded slotted ALOHA (CSA), and provide their comparison in terms of performance vs resource utilization. Our preliminary results show that CS-based approach is able to provide the target user activity detection performance with less overall system resource utilization. However, this comes at a price of lower energy- efficiency per user, as compared to CSA-based approach.
△ Less
Submitted 29 June, 2017;
originally announced June 2017.
-
Cooperative Slotted ALOHA for Massive M2M Random Access Using Directional Antennas
Authors:
Aleksandar Mastilovic,
Dejan Vukobratovic,
Dusan Jakovetic,
Dragana Bajovic
Abstract:
Slotted ALOHA (SA) algorithms with Successive Interference Cancellation (SIC) decoding have received significant attention lately due to their ability to dramatically increase the throughput of traditional SA. Motivated by increased density of cellular radio access networks due to the introduction of small cells, and dramatic increase of user density in Machine-to-Machine (M2M) communications, SA…
▽ More
Slotted ALOHA (SA) algorithms with Successive Interference Cancellation (SIC) decoding have received significant attention lately due to their ability to dramatically increase the throughput of traditional SA. Motivated by increased density of cellular radio access networks due to the introduction of small cells, and dramatic increase of user density in Machine-to-Machine (M2M) communications, SA algorithms with SIC operating cooperatively in multi base station (BS) scenario are recently considered. In this paper, we generalize our previous work on Slotted ALOHA with multiple-BS (SA-MBS) by considering users that use directional antennas. In particular, we focus on a simple randomized beamforming strategy where, for every packet transmission, a user orients its main beam in a randomly selected direction. We are interested in the total achievable system throughput for two decoding scenarios: i) non-cooperative scenario in which traditional SA operates at each BS independently, and ii) cooperative SA-MBS in which centralized SIC-based decoding is applied over all received user signals. For both scenarios, we provide upper system throughput limits and compare them against the simulation results. Finally, we discuss the system performance as a function of simple directional antenna model parameters applied in this paper.
△ Less
Submitted 29 June, 2017;
originally announced June 2017.
-
Fast Real-Time DC State Estimation in Electric Power Systems Using Belief Propagation
Authors:
Mirsad Cosovic,
Dejan Vukobratovic
Abstract:
We propose a fast real-time state estimator based on the belief propagation algorithm for the power system state estimation. The proposed estimator is easy to distribute and parallelize, thus alleviating computational limitations and allowing for processing measurements in real time. The presented algorithm may run as a continuous process, with each new measurement being seamlessly processed by th…
▽ More
We propose a fast real-time state estimator based on the belief propagation algorithm for the power system state estimation. The proposed estimator is easy to distribute and parallelize, thus alleviating computational limitations and allowing for processing measurements in real time. The presented algorithm may run as a continuous process, with each new measurement being seamlessly processed by the distributed state estimator. In contrast to the matrix-based state estimation methods, the belief propagation approach is robust to ill-conditioned scenarios caused by significant differences between measurement variances, thus resulting in a solution that eliminates observability analysis. Using the DC model, we numerically demonstrate the performance of the state estimator in a realistic real-time system model with asynchronous measurements. We note that the extension to the AC state estimation is possible within the same framework.
△ Less
Submitted 11 August, 2017; v1 submitted 3 May, 2017;
originally announced May 2017.
-
5G Mobile Cellular Networks: Enabling Distributed State Estimation for Smart Grids
Authors:
Mirsad Cosovic,
Achilleas Tsitsimelis,
Dejan Vukobratovic,
Javier Matamoros,
Carles Anton-Haro
Abstract:
With transition towards 5G, mobile cellular networks are evolving into a powerful platform for ubiquitous large-scale information acquisition, communication, storage and processing. 5G will provide suitable services for mission-critical and real-time applications such as the ones envisioned in future Smart Grids. In this work, we show how emerging 5G mobile cellular network, with its evolution of…
▽ More
With transition towards 5G, mobile cellular networks are evolving into a powerful platform for ubiquitous large-scale information acquisition, communication, storage and processing. 5G will provide suitable services for mission-critical and real-time applications such as the ones envisioned in future Smart Grids. In this work, we show how emerging 5G mobile cellular network, with its evolution of Machine-Type Communications and the concept of Mobile Edge Computing, provides an adequate environment for distributed monitoring and control tasks in Smart Grids. In particular, we present in detail how Smart Grids could benefit from advanced distributed State Estimation methods placed within 5G environment. We present an overview of emerging distributed State Estimation solutions, focusing on those based on distributed optimization and probabilistic graphical models, and investigate their integration as part of the future 5G Smart Grid services.
△ Less
Submitted 20 May, 2017; v1 submitted 1 March, 2017;
originally announced March 2017.
-
Distributed Gauss-Newton Method for State Estimation Using Belief Propagation
Authors:
Mirsad Cosovic,
Dejan Vukobratovic
Abstract:
We present a novel distributed Gauss-Newton method for the non-linear state estimation (SE) model based on a probabilistic inference method called belief propagation (BP). The main novelty of our work comes from applying BP sequentially over a sequence of linear approximations of the SE model, akin to what is done by the Gauss-Newton method. The resulting iterative Gauss-Newton belief propagation…
▽ More
We present a novel distributed Gauss-Newton method for the non-linear state estimation (SE) model based on a probabilistic inference method called belief propagation (BP). The main novelty of our work comes from applying BP sequentially over a sequence of linear approximations of the SE model, akin to what is done by the Gauss-Newton method. The resulting iterative Gauss-Newton belief propagation (GN-BP) algorithm can be interpreted as a distributed Gauss-Newton method with the same accuracy as the centralized SE, however, introducing a number of advantages of the BP framework. The paper provides extensive numerical study of the GN-BP algorithm, provides details on its convergence behavior, and gives a number of useful insights for its implementation.
△ Less
Submitted 26 August, 2018; v1 submitted 19 February, 2017;
originally announced February 2017.
-
Proceedings of the third "international Traveling Workshop on Interactions between Sparse models and Technology" (iTWIST'16)
Authors:
V. Abrol,
O. Absil,
P. -A. Absil,
S. Anthoine,
P. Antoine,
T. Arildsen,
N. Bertin,
F. Bleichrodt,
J. Bobin,
A. Bol,
A. Bonnefoy,
F. Caltagirone,
V. Cambareri,
C. Chenot,
V. Crnojević,
M. Daňková,
K. Degraux,
J. Eisert,
J. M. Fadili,
M. Gabrié,
N. Gac,
D. Giacobello,
A. Gonzalez,
C. A. Gomez Gonzalez,
A. González
, et al. (36 additional authors not shown)
Abstract:
The third edition of the "international - Traveling Workshop on Interactions between Sparse models and Technology" (iTWIST) took place in Aalborg, the 4th largest city in Denmark situated beautifully in the northern part of the country, from the 24th to 26th of August 2016. The workshop venue was at the Aalborg University campus. One implicit objective of this biennial workshop is to foster collab…
▽ More
The third edition of the "international - Traveling Workshop on Interactions between Sparse models and Technology" (iTWIST) took place in Aalborg, the 4th largest city in Denmark situated beautifully in the northern part of the country, from the 24th to 26th of August 2016. The workshop venue was at the Aalborg University campus. One implicit objective of this biennial workshop is to foster collaboration between international scientific teams by disseminating ideas through both specific oral/poster presentations and free discussions. For this third edition, iTWIST'16 gathered about 50 international participants and features 8 invited talks, 12 oral presentations, and 12 posters on the following themes, all related to the theory, application and generalization of the "sparsity paradigm": Sparsity-driven data sensing and processing (e.g., optics, computer vision, genomics, biomedical, digital communication, channel estimation, astronomy); Application of sparse models in non-convex/non-linear inverse problems (e.g., phase retrieval, blind deconvolution, self calibration); Approximate probabilistic inference for sparse problems; Sparse machine learning and inference; "Blind" inverse problems and dictionary learning; Optimization for sparse modelling; Information theory, geometry and randomness; Sparsity? What's next? (Discrete-valued signals; Union of low-dimensional spaces, Cosparsity, mixed/group norm, model-based, low-complexity models, ...); Matrix/manifold sensing/processing (graph, low-rank approximation, ...); Complexity/accuracy tradeoffs in numerical methods/optimization; Electronic/optical compressive sensors (hardware).
△ Less
Submitted 14 September, 2016;
originally announced September 2016.
-
CONDENSE: A Reconfigurable Knowledge Acquisition Architecture for Future 5G IoT
Authors:
Dejan Vukobratovic,
Dusan Jakovetic,
Vitaly Skachek,
Dragana Bajovic,
Dino Sejdinovic,
Gunes Karabulut Kurt,
Camilla Hollanti,
Ingo Fischer
Abstract:
In forthcoming years, the Internet of Things (IoT) will connect billions of smart devices generating and uploading a deluge of data to the cloud. If successfully extracted, the knowledge buried in the data can significantly improve the quality of life and foster economic growth. However, a critical bottleneck for realising the efficient IoT is the pressure it puts on the existing communication inf…
▽ More
In forthcoming years, the Internet of Things (IoT) will connect billions of smart devices generating and uploading a deluge of data to the cloud. If successfully extracted, the knowledge buried in the data can significantly improve the quality of life and foster economic growth. However, a critical bottleneck for realising the efficient IoT is the pressure it puts on the existing communication infrastructures, requiring transfer of enormous data volumes. Aiming at addressing this problem, we propose a novel architecture dubbed Condense, which integrates the IoT-communication infrastructure into data analysis. This is achieved via the generic concept of network function computation: Instead of merely transferring data from the IoT sources to the cloud, the communication infrastructure should actively participate in the data analysis by carefully designed en-route processing. We define the Condense architecture, its basic layers, and the interactions among its constituent modules. Further, from the implementation side, we describe how Condense can be integrated into the 3rd Generation Partnership Project (3GPP) Machine Type Communications (MTC) architecture, as well as the prospects of making it a practically viable technology in a short time frame, relying on Network Function Virtualization (NFV) and Software Defined Networking (SDN). Finally, from the theoretical side, we survey the relevant literature on computing "atomic" functions in both analog and digital domains, as well as on function decomposition over networks, highlighting challenges, insights, and future directions for exploiting these techniques within practical 3GPP MTC architecture.
△ Less
Submitted 12 September, 2016;
originally announced September 2016.
-
Distributed Gauss-Newton Method for AC State Estimation: A Belief Propagation Approach
Authors:
Mirsad Cosovic,
Dejan Vukobratovic
Abstract:
In this paper, we propose a solution to an AC state estimation problem in electric power systems using a fully distributed Gauss-Newton method. The proposed method is placed within the context of factor graphs and belief propagation algorithms and closed-form expressions for belief propagation messages exchanged along the factor graph are derived. The obtained algorithm provides the same solution…
▽ More
In this paper, we propose a solution to an AC state estimation problem in electric power systems using a fully distributed Gauss-Newton method. The proposed method is placed within the context of factor graphs and belief propagation algorithms and closed-form expressions for belief propagation messages exchanged along the factor graph are derived. The obtained algorithm provides the same solution as the conventional weighted least-squares state estimation. Using a simple example, we provide a step-by-step presentation of the proposed algorithm. Finally, we discuss the convergence behaviour using the IEEE 14 bus test case.
△ Less
Submitted 26 May, 2016;
originally announced May 2016.
-
State Estimation in Electric Power Systems Using Belief Propagation: An Extended DC Model
Authors:
Mirsad Cosovic,
Dejan Vukobratovic
Abstract:
In this paper, we model an extended DC state estimation (SE) in an electric power system as a factor graph (FG) and solve it using belief propagation (BP) algorithm. The DC model comprises bus voltage angles as state variables, while the extended DC model includes bus voltage angles and bus voltage magnitudes as state variables. By applying BP to solve the SE problem in the extended DC model, we o…
▽ More
In this paper, we model an extended DC state estimation (SE) in an electric power system as a factor graph (FG) and solve it using belief propagation (BP) algorithm. The DC model comprises bus voltage angles as state variables, while the extended DC model includes bus voltage angles and bus voltage magnitudes as state variables. By applying BP to solve the SE problem in the extended DC model, we obtain a Gaussian BP scenario for which we derive closed-form expressions for BP messages exchanged along the FG. The performance of the BP algorithm is demonstrated for the IEEE 14 bus test case. Finally, the application of BP algorithm on the extended DC scenario provides significant insights into a fundamental structure of BP equations in more complex models such as the AC model - the topic we will investigate in our follow up work. As a side-goal of this paper, we aim at thorough and detailed presentation on applying BP on the SE problem in order to make the powerful BP algorithm more accessible and applicable within the power-engineering community.
△ Less
Submitted 26 May, 2016;
originally announced May 2016.
-
Identifying Randomly Activated Users via Sign-Compute-Resolve on Graphs
Authors:
Cedomir Stefanovic,
Dejan Vukobratovic,
Jasper Goseling,
Petar Popovski
Abstract:
In this paper we treat the problem of identification of a subset of active users in a set of a large number of potentially active users. The users from the subset are activated randomly, such that the access point (AP) does not know the subset or its size a priori. The active users are contending to report their activity to the AP over a multiple access channel. We devise a contention algorithm th…
▽ More
In this paper we treat the problem of identification of a subset of active users in a set of a large number of potentially active users. The users from the subset are activated randomly, such that the access point (AP) does not know the subset or its size a priori. The active users are contending to report their activity to the AP over a multiple access channel. We devise a contention algorithm that assumes a combination of physical-layer network coding and K-out-of-N signature coding, allowing for multiple detection of up to K users at the access point. In addition, we rely on the principles of coded slotted ALOHA (CSA) and use of successive interference cancellation to enable subsequent resolution of the collisions that originally featured more than K users. The objective is to identify the subset of active users such that the target performance, e.g., probability of active user resolution and/or throughput is reached, which implies that the duration of the contention period is also not known a priori. In contrast to standard CSA approaches, in the proposed algorithm each user, active or not, has a predefined schedule of slots in which it sends its signature. We analyze the performance of the proposed algorithm both in the asymptotic and non-asymptotic settings. We also derive an estimator that, based on the observation of collision multiplicities, estimates how many users are active and thereby enables tuning of the length of the contention period.
△ Less
Submitted 7 March, 2016;
originally announced March 2016.
-
On Optimization of Network-coded Scalable Multimedia Service Multicasting
Authors:
Andrea Tassi,
Ioannis Chatzigeorgiou,
Dejan Vukobratović
Abstract:
In the near future, the delivery of multimedia multicast services over next-generation networks is likely to become one of the main pillars of future cellular networks. In this extended abstract, we address the issue of efficiently multicasting layered video services by defining a novel optimization paradigm that is based on an Unequal Error Protection implementation of Random Linear Network Codin…
▽ More
In the near future, the delivery of multimedia multicast services over next-generation networks is likely to become one of the main pillars of future cellular networks. In this extended abstract, we address the issue of efficiently multicasting layered video services by defining a novel optimization paradigm that is based on an Unequal Error Protection implementation of Random Linear Network Coding, and aims to ensure target service coverages by using a limited amount of radio resources.
△ Less
Submitted 31 January, 2015;
originally announced February 2015.
-
Optimized Network-coded Scalable Video Multicasting over eMBMS Networks
Authors:
Andrea Tassi,
Ioannis Chatzigeorgiou,
Dejan Vukobratović,
Andrew L. Jones
Abstract:
Delivery of multicast video services over fourth generation (4G) networks such as 3GPP Long Term Evolution-Advanced (LTE-A) is gaining momentum. In this paper, we address the issue of efficiently multicasting layered video services by defining a novel resource allocation framework that aims to maximize the service coverage whilst kee** the radio resource footprint low. A key point in the propose…
▽ More
Delivery of multicast video services over fourth generation (4G) networks such as 3GPP Long Term Evolution-Advanced (LTE-A) is gaining momentum. In this paper, we address the issue of efficiently multicasting layered video services by defining a novel resource allocation framework that aims to maximize the service coverage whilst kee** the radio resource footprint low. A key point in the proposed system mode is that the reliability of multicast video services is ensured by means of an Unequal Error Protection implementation of the Network Coding (UEP-NC) scheme. In addition, both the communication parameters and the UEP-NC scheme are jointly optimized by the proposed resource allocation framework. Numerical results show that the proposed allocation framework can significantly increase the service coverage when compared to a conventional Multi-rate Transmission (MrT) strategy.
△ Less
Submitted 20 January, 2015; v1 submitted 14 January, 2015;
originally announced January 2015.