-
Deep LPPLS: Forecasting of temporal critical points in natural, engineering and financial systems
Authors:
Joshua Nielsen,
Didier Sornette,
Maziar Raissi
Abstract:
The Log-Periodic Power Law Singularity (LPPLS) model offers a general framework for capturing dynamics and predicting transition points in diverse natural and social systems. In this work, we present two calibration techniques for the LPPLS model using deep learning. First, we introduce the Mono-LPPLS-NN (M-LNN) model; for any given empirical time series, a unique M-LNN model is trained and shown…
▽ More
The Log-Periodic Power Law Singularity (LPPLS) model offers a general framework for capturing dynamics and predicting transition points in diverse natural and social systems. In this work, we present two calibration techniques for the LPPLS model using deep learning. First, we introduce the Mono-LPPLS-NN (M-LNN) model; for any given empirical time series, a unique M-LNN model is trained and shown to outperform state-of-the-art techniques in estimating the nonlinear parameters $(t_c, m, ω)$ of the LPPLS model as evidenced by the comprehensive distribution of parameter errors. Second, we extend the M-LNN model to a more general model architecture, the Poly-LPPLS-NN (P-LNN), which is able to quickly estimate the nonlinear parameters of the LPPLS model for any given time-series of a fixed length, including previously unseen time-series during training. The Poly class of models train on many synthetic LPPLS time-series augmented with various noise structures in a supervised manner. Given enough training examples, the P-LNN models also outperform state-of-the-art techniques for estimating the parameters of the LPPLS model as evidenced by the comprehensive distribution of parameter errors. Additionally, this class of models is shown to substantially reduce the time to obtain parameter estimates. Finally, we present applications to the diagnostic and prediction of two financial bubble peaks (followed by their crash) and of a famous rockslide. These contributions provide a bridge between deep learning and the study of the prediction of transition times in complex time series.
△ Less
Submitted 21 May, 2024;
originally announced May 2024.
-
Coupled generator decomposition for fusion of electro- and magnetoencephalography data
Authors:
Anders Stevnhoved Olsen,
Jesper Duemose Nielsen,
Morten Mørup
Abstract:
Data fusion modeling can identify common features across diverse data sources while accounting for source-specific variability. Here we introduce the concept of a \textit{coupled generator decomposition} and demonstrate how it generalizes sparse principal component analysis (SPCA) for data fusion. Leveraging data from a multisubject, multimodal (electro- and magnetoencephalography (EEG and MEG)) n…
▽ More
Data fusion modeling can identify common features across diverse data sources while accounting for source-specific variability. Here we introduce the concept of a \textit{coupled generator decomposition} and demonstrate how it generalizes sparse principal component analysis (SPCA) for data fusion. Leveraging data from a multisubject, multimodal (electro- and magnetoencephalography (EEG and MEG)) neuroimaging experiment, we demonstrate the efficacy of the framework in identifying common features in response to face perception stimuli, while accommodating modality- and subject-specific variability. Through split-half cross-validation of EEG/MEG trials, we investigate the optimal model order and regularization strengths for models of varying complexity, comparing these to a group-level model assuming shared brain responses to stimuli. Our findings reveal altered $\sim170ms$ fusiform face area activation for scrambled faces, as opposed to real faces, particularly evident in the multimodal, multisubject model. Model parameters were inferred using stochastic optimization in PyTorch, demonstrating comparable performance to conventional quadratic programming inference for SPCA but with considerably faster execution. We provide an easily accessible toolbox for coupled generator decomposition that includes data fusion for SPCA, archetypal analysis and directional archetypal analysis. Overall, our approach offers a promising new avenue for data fusion.
△ Less
Submitted 2 March, 2024;
originally announced March 2024.
-
Near Real-Time Data-Driven Control of Virtual Reality Traffic in Open Radio Access Network
Authors:
Andreas Casparsen,
Beatriz Soret,
Jimmy Jessen Nielsen,
Petar Popovski
Abstract:
In mobile networks, Open Radio Access Network (ORAN) provides a framework for implementing network slicing that interacts with the resources at the lower layers. Both monitoring and Radio Access Network (RAN) control is feasible for both 4G and 5G systems. In this work, we consider how data-driven resource allocation in a 4G context can enable adaptive slice allocation to steer the experienced lat…
▽ More
In mobile networks, Open Radio Access Network (ORAN) provides a framework for implementing network slicing that interacts with the resources at the lower layers. Both monitoring and Radio Access Network (RAN) control is feasible for both 4G and 5G systems. In this work, we consider how data-driven resource allocation in a 4G context can enable adaptive slice allocation to steer the experienced latency of Virtual Reality (VR) traffic towards a requested latency. We develop an xApp for the near real-time RAN Intelligent Controller (RIC) that embeds a heuristic algorithm for latency control, aiming to: (1) maintain latency of a VR stream around a requested value; and (2) improve the available RAN allocation to offer higher bit rate to another user. We have experimentally demonstrated the proposed approach in an ORAN testbed. Our results show that the data-driven approach can dynamically follow the variation of the traffic load while satisfying the required latency. This results in 15.8% more resources to secondary users than a latency-equivalent static allocation.
△ Less
Submitted 3 January, 2024;
originally announced January 2024.
-
Joint Alignment of Multivariate Quasi-Periodic Functional Data Using Deep Learning
Authors:
Vi Thanh Pham,
Jonas Bille Nielsen,
Klaus Fuglsang Kofoed,
Jørgen Tobias Kühl,
Andreas Kryger Jensen
Abstract:
The joint alignment of multivariate functional data plays an important role in various fields such as signal processing, neuroscience and medicine, including the statistical analysis of data from wearable devices. Traditional methods often ignore the phase variability and instead focus on the variability in the observed amplitude. We present a novel method for joint alignment of multivariate quasi…
▽ More
The joint alignment of multivariate functional data plays an important role in various fields such as signal processing, neuroscience and medicine, including the statistical analysis of data from wearable devices. Traditional methods often ignore the phase variability and instead focus on the variability in the observed amplitude. We present a novel method for joint alignment of multivariate quasi-periodic functions using deep neural networks, decomposing, but retaining all the information in the data by preserving both phase and amplitude variability. Our proposed neural network uses a special activation of the output that builds on the unit simplex transformation, and we utilize a loss function based on the Fisher-Rao metric to train our model. Furthermore, our method is unsupervised and can provide an optimal common template function as well as subject-specific templates. We demonstrate our method on two simulated datasets and one real example, comprising data from 12-lead 10s electrocardiogram recordings.
△ Less
Submitted 14 November, 2023;
originally announced December 2023.
-
Multiview Aerial Visual Recognition (MAVREC): Can Multi-view Improve Aerial Visual Perception?
Authors:
Aritra Dutta,
Srijan Das,
Jacob Nielsen,
Rajatsubhra Chakraborty,
Mubarak Shah
Abstract:
Despite the commercial abundance of UAVs, aerial data acquisition remains challenging, and the existing Asia and North America-centric open-source UAV datasets are small-scale or low-resolution and lack diversity in scene contextuality. Additionally, the color content of the scenes, solar-zenith angle, and population density of different geographies influence the data diversity. These two factors…
▽ More
Despite the commercial abundance of UAVs, aerial data acquisition remains challenging, and the existing Asia and North America-centric open-source UAV datasets are small-scale or low-resolution and lack diversity in scene contextuality. Additionally, the color content of the scenes, solar-zenith angle, and population density of different geographies influence the data diversity. These two factors conjointly render suboptimal aerial-visual perception of the deep neural network (DNN) models trained primarily on the ground-view data, including the open-world foundational models.
To pave the way for a transformative era of aerial detection, we present Multiview Aerial Visual RECognition or MAVREC, a video dataset where we record synchronized scenes from different perspectives -- ground camera and drone-mounted camera. MAVREC consists of around 2.5 hours of industry-standard 2.7K resolution video sequences, more than 0.5 million frames, and 1.1 million annotated bounding boxes. This makes MAVREC the largest ground and aerial-view dataset, and the fourth largest among all drone-based datasets across all modalities and tasks. Through our extensive benchmarking on MAVREC, we recognize that augmenting object detectors with ground-view images from the corresponding geographical location is a superior pre-training strategy for aerial detection. Building on this strategy, we benchmark MAVREC with a curriculum-based semi-supervised object detection approach that leverages labeled (ground and aerial) and unlabeled (only aerial) images to enhance the aerial detection. We publicly release the MAVREC dataset: https://mavrec.github.io.
△ Less
Submitted 7 December, 2023;
originally announced December 2023.
-
Enabling On-Demand Cyber-Physical Control Applications with UAV Access Points
Authors:
Igor Donevski,
Jimmy Jessen Nielsen
Abstract:
Achieving cyber-physical control over a wireless channel requires satisfying both the timeliness of a single packet and preserving the latency reliability across several consecutive packets. To satisfy those requirements as an ubiquitous service requires big infrastructural developments, or flexible on-demand equipment such as UAVs. To avoid the upfront cost in terms of finance and energy, this pa…
▽ More
Achieving cyber-physical control over a wireless channel requires satisfying both the timeliness of a single packet and preserving the latency reliability across several consecutive packets. To satisfy those requirements as an ubiquitous service requires big infrastructural developments, or flexible on-demand equipment such as UAVs. To avoid the upfront cost in terms of finance and energy, this paper analyzes the capability of UAV access points (UAVAPs) to satisfy the requirements for cyber-physical traffic. To investigate this, we perform a Gilbert-Eliott burst-error analysis that is analytically derived as a combination of two separate latency measurement campaigns and provide an upper-bound analysis of the UAVAP system. The analysis is centered around a UAVAP that uses its LTE connection to reach the backhaul, while providing service to ground nodes (GNs) with a Wi-Fi access point (AP). Thus, we combine both measurement campaigns to analyze the plausibility of the described setup in casual, crowded or mixed network settings.
△ Less
Submitted 22 November, 2022;
originally announced November 2022.
-
Sustainable Wireless Services with UAV Swarms Tailored to Renewable Energy Sources
Authors:
Igor Donevski,
Marco Virgili,
Nithin Babu,
Jimmy Jessen Nielsen,
Andrew J. Forsyth,
Constantinos B. Papadias,
Petar Popovski
Abstract:
Unmanned Aerial Vehicle (UAV) swarms are often required in off-grid scenarios, such as disaster-struck, war-torn or rural areas, where the UAVs have no access to the power grid and instead rely on renewable energy. Considering a main battery fed from two renewable sources, wind and solar, we scale such a system based on the financial budget, environmental characteristics, and seasonal variations.…
▽ More
Unmanned Aerial Vehicle (UAV) swarms are often required in off-grid scenarios, such as disaster-struck, war-torn or rural areas, where the UAVs have no access to the power grid and instead rely on renewable energy. Considering a main battery fed from two renewable sources, wind and solar, we scale such a system based on the financial budget, environmental characteristics, and seasonal variations. Interestingly, the source of energy is correlated with the energy expenditure of the UAVs, since strong winds cause UAV hovering to become increasingly energy-hungry. The aim is to maximize the cost efficiency of coverage at a particular location, which is a combinatorial optimization problem for dimensioning of the multivariate energy generation system under non-convex criteria. We have devised a customized algorithm by lowering the processing complexity and reducing the solution space through sampling. Evaluation is done with condensed real-world data on wind, solar energy, and traffic load per unit area, driven by vendor-provided prices. The implementation was tested in four locations, with varying wind or solar intensity. The best results were achieved in locations with mild wind presence and strong solar irradiation, while locations with strong winds and low solar intensity require higher Capital Expenditure (CAPEX) allocation.
△ Less
Submitted 23 November, 2022; v1 submitted 22 November, 2022;
originally announced November 2022.
-
PaRTAA: A Real-time Multiprocessor for Mixed-Criticality Airborne Systems
Authors:
Shibarchi Majumder,
Jens F D Nielsen,
Thomas Bak
Abstract:
Mixed-criticality systems, where multiple systems with varying criticality-levels share a single hardware platform, require isolation between tasks with different criticality-levels. Isolation can be achieved with software-based solutions or can be enforced by a hardware level partitioning. An asymmetric multiprocessor architecture offers hardware-based isolation at the cost of underutilized hardw…
▽ More
Mixed-criticality systems, where multiple systems with varying criticality-levels share a single hardware platform, require isolation between tasks with different criticality-levels. Isolation can be achieved with software-based solutions or can be enforced by a hardware level partitioning. An asymmetric multiprocessor architecture offers hardware-based isolation at the cost of underutilized hardware resources, and the inter-core communication mechanism is often a single point of failure in such architectures. In contrast, a partitioned uniprocessor offers efficient resource utilization at the cost of limited scalability.
We propose a partitioned real-time asymmetric architecture (PaRTAA) specifically designed for mixed-criticality airborne systems, featuring robust partitioning within processing elements for establishing isolation between tasks with varying criticality. The granularity in the processing element offers efficient resource utilization where inter-dependent tasks share the same processing element for sequential execution while preserving isolation, and independent tasks simultaneously execute on different processing elements as per system requirements.
△ Less
Submitted 31 August, 2022;
originally announced August 2022.
-
Ærø: A Platform Architecture for Mixed-Criticality Airborne Systems
Authors:
Shibarchi Majumder,
Jens Frederik Dalsgaard Nielsen,
Thomas Bak
Abstract:
Real-time embedded platforms with resource constraints can take the benefits of mixed-criticality system where applications with different criticality-level share computational resources, with isolation in the temporal and spatial domain. A conventional software-based isolation mechanism adds additional overhead and requires certification with the highest level of criticality present in the system…
▽ More
Real-time embedded platforms with resource constraints can take the benefits of mixed-criticality system where applications with different criticality-level share computational resources, with isolation in the temporal and spatial domain. A conventional software-based isolation mechanism adds additional overhead and requires certification with the highest level of criticality present in the system, which is often an expensive process. In this article, we present a different approach where the required isolation is established at the hardware-level by featuring partitions within the processor. A four-stage pipelined soft-processor with replicated resources in the data-path is introduced to establish isolation and avert interference between the partitions. A cycle-accurate scheduling mechanism is implemented in the hardware for hard-real-time partition scheduling that can accommodate different periodicity and execution time for each partition as per user needs, while preserving time-predictability at the individual application level. Applications running within a partition has no sense of the virtualization and can execute either on a host-software or directly on the hardware. The proposed architecture is implemented on FPGA thread and demonstrated with an avionics use case.
△ Less
Submitted 30 August, 2022;
originally announced August 2022.
-
Fairness Based Energy-Efficient 3D Path Planning of a Portable Access Point: A Deep Reinforcement Learning Approach
Authors:
Nithin Babu,
Igor Donevski,
Alvaro Valcarce,
Petar Popovski,
Jimmy Jessen Nielsen,
Constantinos B. Papadias
Abstract:
In this work, we optimize the 3D trajectory of an unmanned aerial vehicle (UAV)-based portable access point (PAP) that provides wireless services to a set of ground nodes (GNs). Moreover, as per the Peukert effect, we consider pragmatic non-linear battery discharge for the battery of the UAV. Thus, we formulate the problem in a novel manner that represents the maximization of a fairness-based ener…
▽ More
In this work, we optimize the 3D trajectory of an unmanned aerial vehicle (UAV)-based portable access point (PAP) that provides wireless services to a set of ground nodes (GNs). Moreover, as per the Peukert effect, we consider pragmatic non-linear battery discharge for the battery of the UAV. Thus, we formulate the problem in a novel manner that represents the maximization of a fairness-based energy efficiency metric and is named fair energy efficiency (FEE). The FEE metric defines a system that lays importance on both the per-user service fairness and the energy efficiency of the PAP. The formulated problem takes the form of a non-convex problem with non-tractable constraints. To obtain a solution, we represent the problem as a Markov Decision Process (MDP) with continuous state and action spaces. Considering the complexity of the solution space, we use the twin delayed deep deterministic policy gradient (TD3) actor-critic deep reinforcement learning (DRL) framework to learn a policy that maximizes the FEE of the system. We perform two types of RL training to exhibit the effectiveness of our approach: the first (offline) approach keeps the positions of the GNs the same throughout the training phase; the second approach generalizes the learned policy to any arrangement of GNs by changing the positions of GNs after each training episode. Numerical evaluations show that neglecting the Peukert effect overestimates the air-time of the PAP and can be addressed by optimally selecting the PAP's flying speed. Moreover, the user fairness, energy efficiency, and hence the FEE value of the system can be improved by efficiently moving the PAP above the GNs. As such, we notice massive FEE improvements over baseline scenarios of up to 88.31%, 272.34%, and 318.13% for suburban, urban, and dense urban environments, respectively.
△ Less
Submitted 10 August, 2022;
originally announced August 2022.
-
Performance trade-offs in cyber-physical control applications with multi-connectivity
Authors:
Igor Donevski,
Israel Leyva Mayorga,
Jimmy Jessen Nielsen,
Petar Popovski
Abstract:
Modern communication devices are often equipped with multiple wireless communication interfaces with diverse characteristics. This enables exploiting a form of multi-connectivity known as interface diversity to provide path diversity with multiple communication interfaces. Interface diversity helps to combat the problems suffered by single-interface systems due to error bursts in the link, which a…
▽ More
Modern communication devices are often equipped with multiple wireless communication interfaces with diverse characteristics. This enables exploiting a form of multi-connectivity known as interface diversity to provide path diversity with multiple communication interfaces. Interface diversity helps to combat the problems suffered by single-interface systems due to error bursts in the link, which are a consequence of temporal correlation in the wireless channel. The length of an error burst is an essential performance indicator for cyber-physical control applications with periodic traffic, as these define the period in which the control link is unavailable. However, the available interfaces must be correctly orchestrated to achieve an adequate trade-off between latency, reliability, and energy consumption. This work investigates how the packet error statistics from different interfaces impacts the overall latency-reliability characteristics and explores mechanisms to derive adequate interface diversity policies. For this, we model the optimization problem as a partially observable Markov Decision Process (POMDP), where the state of each interface is determined by a Gilbert-Elliott model whose parameters are estimated based on experimental measurement traces from LTE and Wi-Fi. Our results show that the POMDP approach provides an all-round adaptable solution, whose performance is only 0.1% below the absolute upper bound, dictated by the optimal policy under the impractical assumption of full observability.
△ Less
Submitted 6 August, 2021;
originally announced August 2021.
-
Extracting functional programs from Coq, in Coq
Authors:
Danil Annenkov,
Mikkel Milo,
Jakob Botsch Nielsen,
Bas Spitters
Abstract:
We implement extraction of Coq programs to functional languages based on MetaCoq's certified erasure. We extend the MetaCoq erasure output language with ty** information and use it as an intermediate representation, which we call $λ^T_\square$. We complement the extraction functionality with a full pipeline that includes several standard transformations (eta-expansion, inlining, etc) implemented…
▽ More
We implement extraction of Coq programs to functional languages based on MetaCoq's certified erasure. We extend the MetaCoq erasure output language with ty** information and use it as an intermediate representation, which we call $λ^T_\square$. We complement the extraction functionality with a full pipeline that includes several standard transformations (eta-expansion, inlining, etc) implemented in a proof-generating manner along with a verified optimisation pass removing unused arguments. We prove the pass correct wrt. a conventional call-by-value operational semantics of functional languages. From the optimised $λ^T_\square$ representation, we obtain code in two functional smart contract languages (Liquidity and CameLIGO), the functional language Elm, and a subset of the multi-paradigm language for systems programming Rust. Rust is currently gaining popularity as a language for smart contracts, and we demonstrate how our extraction can be used to extract smart contract code for the Concordium network. The development is done in the context of the ConCert framework that enables smart contract verification. We contribute with two verified real-world smart contracts (boardroom voting and escrow), which we use, among other examples, to exemplify the applicability of the pipeline. In addition, we develop a verified web application and extract it to fully functional Elm code. In total, this gives us a way to write dependently typed programs in Coq, verify, and then extract them to several target languages while retaining a small trusted computing base of only MetaCoq and the pretty-printers into these languages.
△ Less
Submitted 6 August, 2021;
originally announced August 2021.
-
On Addressing Heterogeneity in Federated Learning for Autonomous Vehicles Connected to a Drone Orchestrator
Authors:
Igor Donevski,
Jimmy Jessen Nielsen,
Petar Popovski
Abstract:
In this paper we envision a federated learning (FL) scenario in service of amending the performance of autonomous road vehicles, through a drone traffic monitor (DTM), that also acts as an orchestrator. Expecting non-IID data distribution, we focus on the issue of accelerating the learning of a particular class of critical object (CO), that may harm the nominal operation of an autonomous vehicle.…
▽ More
In this paper we envision a federated learning (FL) scenario in service of amending the performance of autonomous road vehicles, through a drone traffic monitor (DTM), that also acts as an orchestrator. Expecting non-IID data distribution, we focus on the issue of accelerating the learning of a particular class of critical object (CO), that may harm the nominal operation of an autonomous vehicle. This can be done through proper allocation of the wireless resources for addressing learner and data heterogeneity. Thus, we propose a reactive method for the allocation of wireless resources, that happens dynamically each FL round, and is based on each learner's contribution to the general model. In addition to this, we explore the use of static methods that remain constant across all rounds. Since we expect partial work from each learner, we use the FedProx FL algorithm, in the task of computer vision. For testing, we construct a non-IID data distribution of the MNIST and FMNIST datasets among four types of learners, in scenarios that represent the quickly changing environment. The results show that proactive measures are effective and versatile at improving system accuracy, and quickly learning the CO class when underrepresented in the network. Furthermore, the experiments show a tradeoff between FedProx intensity and resource allocation efforts. Nonetheless, a well adjusted FedProx local optimizer allows for an even better overall accuracy, particularly when using deeper neural network (NN) implementations.
△ Less
Submitted 5 August, 2021;
originally announced August 2021.
-
An Experimental Analysis on Drone-Mounted Access Points for Improved Latency-Reliability
Authors:
Igor Donevski,
Christian Raffelsberger,
Micha Sende,
Aymen Fakhreddine,
Jimmy Jessen Nielsen
Abstract:
The anticipated densification of contemporary communications infrastructure expects the use of drone small cells (DSCs). Thus, we experimentally evaluate the capability of providing local and personalized coverage with a drone mounted Wi-Fi access point that uses the nearby LTE infrastructure as a backhaul in areas with mixed line of sight(LoS) and Non-LoS (NLoS) links to the local cellular infras…
▽ More
The anticipated densification of contemporary communications infrastructure expects the use of drone small cells (DSCs). Thus, we experimentally evaluate the capability of providing local and personalized coverage with a drone mounted Wi-Fi access point that uses the nearby LTE infrastructure as a backhaul in areas with mixed line of sight(LoS) and Non-LoS (NLoS) links to the local cellular infrastructure. To assess the potential of DSCs for reliable and low latency communication of outdoor users, we measure the channel quality and the total round trip latency of the system. For a drone following the ground user, the DSC-provided network extends the coverage for an extra 6.4% when compared to the classical LTE-direct link. Moreover, the DSC setup provides latencies that are consistently smaller than 50 msfor 95% of the experiment. Within the coverage of the LTE-direct connection, we observed a latency ceiling of 120ms for 95% reliability of the LTE-direct connection. The highest latency observed for the DSC system was 1200ms, while the LTE-direct link never exceeded 500 ms. As such, DSC setups are not only essential in NLoS situations, but consistently improve the latency of users in outdoor scenarios.
△ Less
Submitted 30 June, 2021;
originally announced June 2021.
-
Modelling and Experimental Validation for Battery Lifetime Estimation in NB-IoT and LTE-M
Authors:
André Sørensen,
Hua Wang,
Maxime Jérôme Remy,
Nicolaj Kjettrup,
René Brandborg Sørensen,
Jimmy Jessen Nielsen,
Petar Popovski,
Germán Corrales Madueño
Abstract:
Internet of Things (IoT) is one of the main features in 5G. Low-power wide-area networking (LPWAN) has attracted enormous research interests to enable large scale deployment of IoT, with the design objectives of low cost, wide coverage area, as well as low power consumption. In particular, long battery lifetime is essential since many of the IoT devices will be deployed in hard-to-access locations…
▽ More
Internet of Things (IoT) is one of the main features in 5G. Low-power wide-area networking (LPWAN) has attracted enormous research interests to enable large scale deployment of IoT, with the design objectives of low cost, wide coverage area, as well as low power consumption. In particular, long battery lifetime is essential since many of the IoT devices will be deployed in hard-to-access locations. Prediction of the battery lifetime depends on the accurate modelling of energy consumption. This paper presents a comprehensive power consumption model for battery lifetime estimation, which is based on User Equipment(UE) states and procedures, for two cellular IoT technologies: Narrowband Internet of Things (NB-IoT) and Long Term Evolution for Machines (LTE-M). A measurement testbed has been setup and the proposed model has been tested and validated via extensive measurements under various traffic patterns and network scenarios, achieving the modelling inaccuracy within5%. The measurement results show that the battery lifetime of an IoT device can reach up to 10 years as required by 3GPP, with proper configuration of the traffic profile, the coverage scenario, as well as the network configuration parameters.
△ Less
Submitted 27 February, 2022; v1 submitted 24 June, 2021;
originally announced June 2021.
-
Speech Decomposition Based on a Hybrid Speech Model and Optimal Segmentation
Authors:
Alfredo Esquivel Jaramillo,
Jesper Kjær Nielsen,
Mads Græsbøll Christensen
Abstract:
In a hybrid speech model, both voiced and unvoiced components can coexist in a segment. Often, the voiced speech is regarded as the deterministic component, and the unvoiced speech and additive noise are the stochastic components. Typically, the speech signal is considered stationary within fixed segments of 20-40 ms, but the degree of stationarity varies over time. For decomposing noisy speech in…
▽ More
In a hybrid speech model, both voiced and unvoiced components can coexist in a segment. Often, the voiced speech is regarded as the deterministic component, and the unvoiced speech and additive noise are the stochastic components. Typically, the speech signal is considered stationary within fixed segments of 20-40 ms, but the degree of stationarity varies over time. For decomposing noisy speech into its voiced and unvoiced components, a fixed segmentation may be too crude, and we here propose to adapt the segment length according to the signal local characteristics. The segmentation relies on parameter estimates of a hybrid speech model and the maximum a posteriori (MAP) and log-likelihood criteria as rules for model selection among the possible segment lengths, for voiced and unvoiced speech, respectively. Given the optimal segmentation markers and the estimated statistics, both components are estimated using linear filtering. A codebook-based approach differentiates between unvoiced speech and noise. A better extraction of the components is possible by taking into account the adaptive segmentation, compared to a fixed one. Also, a lower distortion for voiced speech and higher segSNR for both components is possible, as compared to other decomposition methods.
△ Less
Submitted 4 May, 2021;
originally announced May 2021.
-
Standalone Deployment of a Dynamic Drone Cell for Wireless Connectivity of Two Services
Authors:
Igor Donevski,
Jimmy Jessen Nielsen,
Petar Popovski
Abstract:
We treat a setting in which two priority wireless service classes are offered in a given area by a drone small cell (DSC). Specifically, we consider broadband (BB) user with high priority and reliability requirements that coexists with random access machine-type-communications (MTC) devices. The drone serves both connectivity types with a combination of orthogonal slicing of the wireless resources…
▽ More
We treat a setting in which two priority wireless service classes are offered in a given area by a drone small cell (DSC). Specifically, we consider broadband (BB) user with high priority and reliability requirements that coexists with random access machine-type-communications (MTC) devices. The drone serves both connectivity types with a combination of orthogonal slicing of the wireless resources and dynamic horizontal opportunistic positioning (D-HOP). We treat the D-HOP as a computational geometry function over stochastic BB user locations which requires careful adjustment in the deployment parameters to ensure MTC service at all times. Using an information theoretic approach, we optimize DSC deployment properties and radio resource allocation for the purpose of maximizing the average rate of BB users. While respecting the strict dual service requirements we analyze how system performance is affected by stochastic user positioning and density, topology, and reliability constraints combinations. The numerical results show that this approach outperforms static DSCs that fit the same coverage constraints, with outstanding performance in the urban setting.
△ Less
Submitted 24 January, 2021;
originally announced January 2021.
-
Extracting Smart Contracts Tested and Verified in Coq
Authors:
Danil Annenkov,
Mikkel Milo,
Jakob Botsch Nielsen,
Bas Spitters
Abstract:
We implement extraction of Coq programs to functional languages based on MetaCoq's certified erasure. As part of this, we implement an optimisation pass removing unused arguments. We prove the pass correct wrt. a conventional call-by-value operational semantics of functional languages. We apply this to two functional smart contract languages, Liquidity and Midlang, and to the functional language E…
▽ More
We implement extraction of Coq programs to functional languages based on MetaCoq's certified erasure. As part of this, we implement an optimisation pass removing unused arguments. We prove the pass correct wrt. a conventional call-by-value operational semantics of functional languages. We apply this to two functional smart contract languages, Liquidity and Midlang, and to the functional language Elm. Our development is done in the context of the ConCert framework that enables smart contract verification. We contribute a verified boardroom voting smart contract featuring maximum voter privacy such that each vote is kept private except under collusion of all other parties. We also integrate property-based testing into ConCert using QuickChick and our development is the first to support testing properties of interacting smart contracts. We test several complex contracts such as a DAO-like contract, an escrow contract, an implementation of a Decentralized Finance (DeFi) contract which includes a custom token standard (Tezos FA2), and more. In total, this gives us a way to write dependent programs in Coq, test them semi-automatically, verify, and then extract to functional smart contract languages, while retaining a small trusted computing base of only MetaCoq and the pretty-printers into these languages.
△ Less
Submitted 26 April, 2021; v1 submitted 16 December, 2020;
originally announced December 2020.
-
Optimal Inspection and Maintenance Planning for Deteriorating Structural Components through Dynamic Bayesian Networks and Markov Decision Processes
Authors:
P. G. Morato,
K. G. Papakonstantinou,
C. P. Andriotis,
J. S. Nielsen,
P. Rigo
Abstract:
Civil and maritime engineering systems, among others, from bridges to offshore platforms and wind turbines, must be efficiently managed as they are exposed to deterioration mechanisms throughout their operational life, such as fatigue or corrosion. Identifying optimal inspection and maintenance policies demands the solution of a complex sequential decision-making problem under uncertainty, with th…
▽ More
Civil and maritime engineering systems, among others, from bridges to offshore platforms and wind turbines, must be efficiently managed as they are exposed to deterioration mechanisms throughout their operational life, such as fatigue or corrosion. Identifying optimal inspection and maintenance policies demands the solution of a complex sequential decision-making problem under uncertainty, with the main objective of efficiently controlling the risk associated with structural failures. Addressing this complexity, risk-based inspection planning methodologies, supported often by dynamic Bayesian networks, evaluate a set of pre-defined heuristic decision rules to reasonably simplify the decision problem. However, the resulting policies may be compromised by the limited space considered in the definition of the decision rules. Avoiding this limitation, Partially Observable Markov Decision Processes (POMDPs) provide a principled mathematical methodology for stochastic optimal control under uncertain action outcomes and observations, in which the optimal actions are prescribed as a function of the entire, dynamically updated, state probability distribution. In this paper, we combine dynamic Bayesian networks with POMDPs in a joint framework for optimal inspection and maintenance planning, and we provide the formulation for develo** both infinite and finite horizon POMDPs in a structural reliability context. The proposed methodology is implemented and tested for the case of a structural component subject to fatigue deterioration, demonstrating the capability of state-of-the-art point-based POMDP solvers for solving the underlying planning optimization problem. Within the numerical experiments, POMDP and heuristic-based policies are thoroughly compared, and results showcase that POMDPs achieve substantially lower costs as compared to their counterparts, even for traditional problem settings.
△ Less
Submitted 28 November, 2021; v1 submitted 9 September, 2020;
originally announced September 2020.
-
Queuing with Deterministic Service Times and No Waiting Lines in Machine Type Communications
Authors:
René Brandborg Sørensen,
Jimmy Jessen Nielsen,
Petar Popovski
Abstract:
The growth of Machine-Type Communication (MTC) increases the relevance of queuing scenarios with deterministic service times. In this letter, we present a model for queues without waiting lines and with degenerate service time distributions and show how the framework is extendable to model general service time distributions. Simple bounds and a close approximation of the blocking probability are d…
▽ More
The growth of Machine-Type Communication (MTC) increases the relevance of queuing scenarios with deterministic service times. In this letter, we present a model for queues without waiting lines and with degenerate service time distributions and show how the framework is extendable to model general service time distributions. Simple bounds and a close approximation of the blocking probability are derived and the results are shown to hold for simulated queues with Markovian and degenerate arrival processes.
△ Less
Submitted 8 September, 2020;
originally announced September 2020.
-
Dynamic Standalone Drone-Mounted Small Cells
Authors:
Igor Donevski,
Jimmy Jessen Nielsen
Abstract:
This paper investigates the feasibility of Dynamic Horizontal Opportunistic Positioning (D-HOP) use in Drone Small Cells (DSCs), with a central analysis on the impact of antenna equipment efficiency onto the optimal DSC altitude that has been chosen in favor of maximizing coverage. We extend the common urban propagation model of an isotropic antenna to account for a directional antenna, making it…
▽ More
This paper investigates the feasibility of Dynamic Horizontal Opportunistic Positioning (D-HOP) use in Drone Small Cells (DSCs), with a central analysis on the impact of antenna equipment efficiency onto the optimal DSC altitude that has been chosen in favor of maximizing coverage. We extend the common urban propagation model of an isotropic antenna to account for a directional antenna, making it dependent on the antenna's ability to fit the ideal propagation pattern. This leads us to define a closed-form expression for calculating the Rate improvement of D-HOP implementations that maintain constant coverage through antenna tilting. Assuming full knowledge of the uniformly distributed active users' locations, three D-HOP techniques were tested: in the center of the Smallest Bounding Circle (SBC); the point of Maximum Aggregated Rate (MAR); and the Center-Most Point (CMP) out of the two aforementioned. Through analytic study and simulation we infer that DSC D-HOP implementations are feasible when using electrically small and tiltable antennas. Nonetheless, it is possible to achieve average per user average rate increases of up to 20-35% in low user density scenarios, or 3-5% in user-dense scenarios, even when using efficient antennas in a DSC that has been designed for standalone coverage.
△ Less
Submitted 4 September, 2020;
originally announced September 2020.
-
Machine Learning Methods for Monitoring of Quasi-Periodic Traffic in Massive IoT Networks
Authors:
René Brandborg Sørensen,
Jimmy Jessen Nielsen,
Petar Popovski
Abstract:
One of the central problems in massive Internet of Things (IoT) deployments is the monitoring of the status of a massive number of links. The problem is aggravated by the irregularity of the traffic transmitted over the link, as the traffic intermittency can be disguised as a link failure and vice versa. In this work we present a traffic model for IoT devices running quasi-periodic applications an…
▽ More
One of the central problems in massive Internet of Things (IoT) deployments is the monitoring of the status of a massive number of links. The problem is aggravated by the irregularity of the traffic transmitted over the link, as the traffic intermittency can be disguised as a link failure and vice versa. In this work we present a traffic model for IoT devices running quasi-periodic applications and we present both supervised and unsupervised machine learning methods for monitoring the network performance of IoT deployments with quasi-periodic reporting, such as smart-metering, environmental monitoring and agricultural monitoring. The unsupervised methods are based on the Lomb-Scargle periodogram, an approach developed by astronomers for estimating the spectral density of unevenly sampled time series.
△ Less
Submitted 27 February, 2020; v1 submitted 4 February, 2020;
originally announced February 2020.
-
Performance of regression models as a function of experiment noise
Authors:
Gang Li,
Jan Zrimec,
Boyang Ji,
Jun Geng,
Johan Larsbrink,
Aleksej Zelezniak,
Jens Nielsen,
Martin KM Engqvist
Abstract:
A challenge in develo** machine learning regression models is that it is difficult to know whether maximal performance has been reached on a particular dataset, or whether further model improvement is possible. In biology this problem is particularly pronounced as sample labels (response variables) are typically obtained through experiments and therefore have experiment noise associated with the…
▽ More
A challenge in develo** machine learning regression models is that it is difficult to know whether maximal performance has been reached on a particular dataset, or whether further model improvement is possible. In biology this problem is particularly pronounced as sample labels (response variables) are typically obtained through experiments and therefore have experiment noise associated with them. Such label noise puts a fundamental limit to the performance attainable by regression models. We address this challenge by deriving a theoretical upper bound for the coefficient of determination (R2) for regression models. This theoretical upper bound depends only on the noise associated with the response variable in a dataset as well as its variance. The upper bound estimate was validated via Monte Carlo simulations and then used as a tool to bootstrap performance of regression models trained on biological datasets, including protein sequence data, transcriptomic data, and genomic data. Although we study biological datasets in this work, the new upper bound estimates will hold true for regression models from any research field or application area where response variables have associated noise.
△ Less
Submitted 16 January, 2020; v1 submitted 17 December, 2019;
originally announced December 2019.
-
Smart Contract Interactions in Coq
Authors:
Jakob Botsch Nielsen,
Bas Spitters
Abstract:
We present a model/executable specification of smart contract execution in Coq. Our formalization allows for inter-contract communication and generalizes existing work by allowing modelling of both depth-first execution blockchains (like Ethereum) and breadth-first execution blockchains (like Tezos). We represent smart contracts programs in Coq's functional language Gallina, enabling easier reason…
▽ More
We present a model/executable specification of smart contract execution in Coq. Our formalization allows for inter-contract communication and generalizes existing work by allowing modelling of both depth-first execution blockchains (like Ethereum) and breadth-first execution blockchains (like Tezos). We represent smart contracts programs in Coq's functional language Gallina, enabling easier reasoning about functional correctness of concrete contracts than other approaches. In particular we develop a Congress contract in this style. This contract -- a simplified version of the infamous DAO -- is interesting because of its very dynamic communication pattern with other contracts. We give a high-level partial specification of the Congress's behavior, related to reentrancy, and prove that the Congress satisfies it for all possible smart contract execution orders.
△ Less
Submitted 12 November, 2019;
originally announced November 2019.
-
Wasserstein Neural Processes
Authors:
Andrew Carr,
Jared Nielsen,
David Wingate
Abstract:
Neural Processes (NPs) are a class of models that learn a map** from a context set of input-output pairs to a distribution over functions. They are traditionally trained using maximum likelihood with a KL divergence regularization term. We show that there are desirable classes of problems where NPs, with this loss, fail to learn any reasonable distribution. We also show that this drawback is sol…
▽ More
Neural Processes (NPs) are a class of models that learn a map** from a context set of input-output pairs to a distribution over functions. They are traditionally trained using maximum likelihood with a KL divergence regularization term. We show that there are desirable classes of problems where NPs, with this loss, fail to learn any reasonable distribution. We also show that this drawback is solved by using approximations of Wasserstein distance which calculates optimal transport distances even for distributions of disjoint support. We give experimental justification for our method and demonstrate performance. These Wasserstein Neural Processes (WNPs) maintain all of the benefits of traditional NPs while being able to approximate a new class of function map**s.
△ Less
Submitted 9 January, 2020; v1 submitted 1 October, 2019;
originally announced October 2019.
-
Reliability and Error Burst Length Analysis of Wireless Multi-Connectivity
Authors:
Jimmy J. Nielsen,
Israel Leyva-Mayorga,
Petar Popovski
Abstract:
Multi-connectivity offers diversity in terms of multiple interfaces through which the data can be sent, thereby improving simultaneously the overall reliability and latency. This makes interface diversity a natural candidate for supporting Ultra-Reliable Low Latency Communications (URLLC). This work investigates how the packet error statistics from different interfaces impacts the overall reliabil…
▽ More
Multi-connectivity offers diversity in terms of multiple interfaces through which the data can be sent, thereby improving simultaneously the overall reliability and latency. This makes interface diversity a natural candidate for supporting Ultra-Reliable Low Latency Communications (URLLC). This work investigates how the packet error statistics from different interfaces impacts the overall reliability-latency characteristics. We use the simple Gilbert-Elliott model for burst errors and estimate its parameters based on experimental measurement traces from LTE and {Wi-Fi} packet transmissions collected over several days. The results show that using interface diversity configurations that include at least one {Wi-Fi} interface leads to, somewhat surprisingly, since Wi-Fi is generally less reliable than LTE, superior results in terms of packet success and error burst duration. Another interesting finding is that {Wi-Fi}-based interface diversity configurations outperform even ultra-reliable single links.
△ Less
Submitted 9 September, 2019;
originally announced September 2019.
-
ConCert: A Smart Contract Certification Framework in Coq
Authors:
Danil Annenkov,
Jakob Botsch Nielsen,
Bas Spitters
Abstract:
We present a new way of embedding functional languages into the Coq proof assistant by using meta-programming. This allows us to develop the meta-theory of the language using the deep embedding and provides a convenient way for reasoning about concrete programs using the shallow embedding. We connect the deep and the shallow embeddings by a soundness theorem. As an instance of our approach, we dev…
▽ More
We present a new way of embedding functional languages into the Coq proof assistant by using meta-programming. This allows us to develop the meta-theory of the language using the deep embedding and provides a convenient way for reasoning about concrete programs using the shallow embedding. We connect the deep and the shallow embeddings by a soundness theorem. As an instance of our approach, we develop an embedding of a core smart contract language into Coq and verify several important properties of a crowdfunding contract based on a previous formalisation of smart contract execution in blockchains.
△ Less
Submitted 20 December, 2019; v1 submitted 24 July, 2019;
originally announced July 2019.
-
Bayesian Pitch Tracking Based on the Harmonic Model
Authors:
Liming Shi,
Jesper Kjaer Nielsen,
Jesper Rindom Jensen,
Max A. Little,
Mads Graesboll Christensen
Abstract:
Fundamental frequency is one of the most important characteristics of speech and audio signals. Harmonic model-based fundamental frequency estimators offer a higher estimation accuracy and robustness against noise than the widely used autocorrelation-based methods. However, the traditional harmonic model-based estimators do not take the temporal smoothness of the fundamental frequency, the model o…
▽ More
Fundamental frequency is one of the most important characteristics of speech and audio signals. Harmonic model-based fundamental frequency estimators offer a higher estimation accuracy and robustness against noise than the widely used autocorrelation-based methods. However, the traditional harmonic model-based estimators do not take the temporal smoothness of the fundamental frequency, the model order, and the voicing into account as they process each data segment independently. In this paper, a fully Bayesian fundamental frequency tracking algorithm based on the harmonic model and a first-order Markov process model is proposed. Smoothness priors are imposed on the fundamental frequencies, model orders, and voicing using first-order Markov process models. Using these Markov models, fundamental frequency estimation and voicing detection errors can be reduced. Using the harmonic model, the proposed fundamental frequency tracker has an improved robustness to noise. An analytical form of the likelihood function, which can be computed efficiently, is derived. Compared to the state-of-the-art neural network and non-parametric approaches, the proposed fundamental frequency tracking algorithm reduces the mean absolute errors and gross errors by 15\% and 20\% on the Keele pitch database and 36\% and 26\% on sustained /a/ sounds from a database of Parkinson's disease voices under 0 dB white Gaussian noise. A MATLAB version of the proposed algorithm is made freely available for reproduction of the results\footnote{An implementation of the proposed algorithm using MATLAB may be found in \url{https://tinyurl.com/yxn4a543}
△ Less
Submitted 21 May, 2019;
originally announced May 2019.
-
Video Extrapolation with an Invertible Linear Embedding
Authors:
Robert Pottorff,
Jared Nielsen,
David Wingate
Abstract:
We predict future video frames from complex dynamic scenes, using an invertible neural network as the encoder of a nonlinear dynamic system with latent linear state evolution. Our invertible linear embedding (ILE) demonstrates successful learning, prediction and latent state inference. In contrast to other approaches, ILE does not use any explicit reconstruction loss or simplistic pixel-space assu…
▽ More
We predict future video frames from complex dynamic scenes, using an invertible neural network as the encoder of a nonlinear dynamic system with latent linear state evolution. Our invertible linear embedding (ILE) demonstrates successful learning, prediction and latent state inference. In contrast to other approaches, ILE does not use any explicit reconstruction loss or simplistic pixel-space assumptions. Instead, it leverages invertibility to optimize the likelihood of image sequences exactly, albeit indirectly. Comparison with a state-of-the-art method demonstrates the viability of our approach.
△ Less
Submitted 28 February, 2019;
originally announced March 2019.
-
Analysis of LoRaWAN Uplink with Multiple Demodulating Paths and Capture Effect
Authors:
René Brandborg Sørensen,
Nasrin Razmi,
Jimmy Jessen Nielsen,
Petar Popovski
Abstract:
Low power wide area networks (LPWANs), such as the ones based on the LoRaWAN protocol, are seen as enablers of large number of IoT applications and services. In this work, we assess the scalability of LoRaWAN by analyzing the frame success probability (FSP) of a LoRa frame while taking into account the capture effect and the number of parallel demodulation paths of the receiving gateway. We have b…
▽ More
Low power wide area networks (LPWANs), such as the ones based on the LoRaWAN protocol, are seen as enablers of large number of IoT applications and services. In this work, we assess the scalability of LoRaWAN by analyzing the frame success probability (FSP) of a LoRa frame while taking into account the capture effect and the number of parallel demodulation paths of the receiving gateway. We have based our model on the commonly used {SX1301 gateway chipset}, which is capable of demodulating {up to} eight frames simultaneously; however, the results of the model can be generalized to architectures with arbitrary number of demodulation paths. We have also introduced and investigated {three} policies for Spreading Factor (SF) allocation. Each policy is evaluated in terms of coverage {probability}, {FSP}, and {throughput}. The overall conclusion is that the presence of multiple demodulation paths introduces a significant change in the analysis and performance of the LoRa random access schemes.
△ Less
Submitted 7 February, 2019;
originally announced February 2019.
-
Lower Bounds for Oblivious Data Structures
Authors:
Riko Jacob,
Kasper Green Larsen,
Jesper Buus Nielsen
Abstract:
An oblivious data structure is a data structure where the memory access patterns reveals no information about the operations performed on it. Such data structures were introduced by Wang et al. [ACM SIGSAC'14] and are intended for situations where one wishes to store the data structure at an untrusted server. One way to obtain an oblivious data structure is simply to run a classic data structure o…
▽ More
An oblivious data structure is a data structure where the memory access patterns reveals no information about the operations performed on it. Such data structures were introduced by Wang et al. [ACM SIGSAC'14] and are intended for situations where one wishes to store the data structure at an untrusted server. One way to obtain an oblivious data structure is simply to run a classic data structure on an oblivious RAM (ORAM). Until very recently, this resulted in an overhead of $ω(\lg n)$ for the most natural setting of parameters. Moreover, a recent lower bound for ORAMs by Larsen and Nielsen [CRYPTO'18] show that they always incur an overhead of at least $Ω(\lg n)$ if used in a black box manner. To circumvent the $ω(\lg n)$ overhead, researchers have instead studied classic data structure problems more directly and have obtained efficient solutions for many such problems such as stacks, queues, deques, priority queues and search trees. However, none of these data structures process operations faster than $Θ(\lg n)$, leaving open the question of whether even faster solutions exist. In this paper, we rule out this possibility by proving $Ω(\lg n)$ lower bounds for oblivious stacks, queues, deques, priority queues and search trees.
△ Less
Submitted 24 October, 2018;
originally announced October 2018.
-
Wireless Access in Ultra-Reliable Low-Latency Communication (URLLC)
Authors:
Petar Popovski,
Čedomir Stefanović,
Jimmy J. Nielsen,
Elisabeth de Carvalho,
Marko Angjelichinoski,
Kasper F. Trillingsgaard,
Alexandru-Sabin Bana
Abstract:
The future connectivity landscape and, notably, the 5G wireless systems will feature Ultra-Reliable Low Latency Communication (URLLC). The coupling of high reliability and low latency requirements in URLLC use cases makes the wireless access design very challenging, in terms of both the protocol design and of the associated transmission techniques. This paper aims to provide a broad perspective on…
▽ More
The future connectivity landscape and, notably, the 5G wireless systems will feature Ultra-Reliable Low Latency Communication (URLLC). The coupling of high reliability and low latency requirements in URLLC use cases makes the wireless access design very challenging, in terms of both the protocol design and of the associated transmission techniques. This paper aims to provide a broad perspective on the fundamental tradeoffs in URLLC as well as the principles used in building access protocols. Two specific technologies are considered in the context of URLLC: massive MIMO and multi-connectivity, also termed interface diversity. The paper also touches upon the important question of the proper statistical methodology for designing and assessing extremely high reliability levels.
△ Less
Submitted 16 October, 2018;
originally announced October 2018.
-
Model-based Speech Enhancement for Intelligibility Improvement in Binaural Hearing Aids
Authors:
Mathew Shaji Kavalekalam,
Jesper K. Nielsen,
Jesper B. Boldt,
Mads G. Christensen
Abstract:
Speech intelligibility is often severely degraded among hearing impaired individuals in situations such as the cocktail party scenario. The performance of the current hearing aid technology has been observed to be limited in these scenarios. In this paper, we propose a binaural speech enhancement framework that takes into consideration the speech production model. The enhancement framework propose…
▽ More
Speech intelligibility is often severely degraded among hearing impaired individuals in situations such as the cocktail party scenario. The performance of the current hearing aid technology has been observed to be limited in these scenarios. In this paper, we propose a binaural speech enhancement framework that takes into consideration the speech production model. The enhancement framework proposed here is based on the Kalman filter that allows us to take the speech production dynamics into account during the enhancement process. The usage of a Kalman filter requires the estimation of clean speech and noise short term predictor (STP) parameters, and the clean speech pitch parameters. In this work, a binaural codebook-based method is proposed for estimating the STP parameters, and a directional pitch estimator based on the harmonic model and maximum likelihood principle is used to estimate the pitch parameters. The proposed method for estimating the STP and pitch parameters jointly uses the information from left and right ears, leading to a more robust estimation of the filter parameters. Objective measures such as PESQ and STOI have been used to evaluate the enhancement framework in different acoustic scenarios representative of the cocktail party scenario. We have also conducted subjective listening tests on a set of nine normal hearing subjects, to evaluate the performance in terms of intelligibility and quality improvement. The listening tests show that the proposed algorithm, even with access to only a single channel noisy observation, significantly improves the overall speech quality, and the speech intelligibility by up to 15%.
△ Less
Submitted 1 October, 2018; v1 submitted 13 June, 2018;
originally announced June 2018.
-
Analysis of Latency and MAC-layer Performance for Class A LoRaWAN
Authors:
R. B. Sørensen,
D. M. Kim,
J. J. Nielsen,
P. Popovski
Abstract:
We propose analytical models that allow us to investigate the performance of long range wide area network (LoRaWAN) uplink in terms of latency, collision rate, and throughput under the constraints of the regulatory duty cycling, when assuming exponential inter-arrival times. Our models take into account sub-band selection and the case of sub-band combining. Our numerical evaluations consider speci…
▽ More
We propose analytical models that allow us to investigate the performance of long range wide area network (LoRaWAN) uplink in terms of latency, collision rate, and throughput under the constraints of the regulatory duty cycling, when assuming exponential inter-arrival times. Our models take into account sub-band selection and the case of sub-band combining. Our numerical evaluations consider specifically the European ISM band, but the analysis is applicable to any coherent band. Protocol simulations are used to validate the proposed models. We find that sub-band selection and combining have a large effect on the quality of service (QoS) experienced in an LoRaWAN cell for a given load. The proposed models allow for the optimization of resource allocation within a cell given a set of QoS requirements and a traffic model.
△ Less
Submitted 14 December, 2017;
originally announced December 2017.
-
Optimized Interface Diversity for Ultra-Reliable Low Latency Communication (URLLC)
Authors:
Jimmy J. Nielsen,
Rongkuan Liu,
Petar Popovski
Abstract:
An important ingredient of the future 5G systems will be Ultra-Reliable Low-Latency Communication (URLLC). A way to offer URLLC without intervention in the baseband/PHY layer design is to use \emph{interface diversity} and integrate multiple communication interfaces, each interface based on a different technology. Our approach is to use coding to seamlessly distribute coded payload and redundancy…
▽ More
An important ingredient of the future 5G systems will be Ultra-Reliable Low-Latency Communication (URLLC). A way to offer URLLC without intervention in the baseband/PHY layer design is to use \emph{interface diversity} and integrate multiple communication interfaces, each interface based on a different technology. Our approach is to use coding to seamlessly distribute coded payload and redundancy data across multiple available communication interfaces. We formulate an optimization problem to find the payload allocation weights that maximize the reliability at specific target latency values. By considering different scenarios, we find that optimized strategies can significantly outperform $k$-out-of-$n$ strategies, where the latter do not account for the characteristics of the different interfaces. Our approach is supported by experimental results.
△ Less
Submitted 14 December, 2017;
originally announced December 2017.
-
Ultra-Reliable Low Latency Communication (URLLC) using Interface Diversity
Authors:
Jimmy J. Nielsen,
Rongkuan Liu,
Petar Popovski
Abstract:
An important ingredient of the future 5G systems will be Ultra-Reliable Low-Latency Communication (URLLC). A way to offer URLLC without intervention in the baseband/PHY layer design is to use interface diversity and integrate multiple communication interfaces, each interface based on a different technology. In this work, we propose to use coding to seamlessly distribute coded payload and redundanc…
▽ More
An important ingredient of the future 5G systems will be Ultra-Reliable Low-Latency Communication (URLLC). A way to offer URLLC without intervention in the baseband/PHY layer design is to use interface diversity and integrate multiple communication interfaces, each interface based on a different technology. In this work, we propose to use coding to seamlessly distribute coded payload and redundancy data across multiple available communication interfaces. We formulate an optimization problem to find the payload allocation weights that maximize the reliability at specific target latency values. In order to estimate the performance in terms of latency and reliability of such an integrated communication system, we propose an analysis framework that combines traditional reliability models with technology-specific latency probability distributions. Our model is capable to account for failure correlation among interfaces/technologies. By considering different scenarios, we find that optimized strategies can in some cases significantly outperform strategies based on $k$-out-of-$n$ erasure codes, where the latter do not account for the characteristics of the different interfaces. The model has been validated through simulation and is supported by experimental results.
△ Less
Submitted 21 November, 2017;
originally announced November 2017.
-
Network Slicing for Ultra-Reliable Low Latency Communication in Industry 4.0 Scenarios
Authors:
Anders Ellersgaard Kalør,
René Guillaume,
Jimmy Jessen Nielsen,
Andreas Mueller,
Petar Popovski
Abstract:
An important novelty of 5G is its role in transforming the industrial production into Industry 4.0. Specifically, Ultra-Reliable Low Latency Communications (URLLC) will, in many cases, enable replacement of cables with wireless connections and bring freedom in designing and operating interconnected machines, robots, and devices. However, not all industrial links will be of URLLC type; e.g. some ap…
▽ More
An important novelty of 5G is its role in transforming the industrial production into Industry 4.0. Specifically, Ultra-Reliable Low Latency Communications (URLLC) will, in many cases, enable replacement of cables with wireless connections and bring freedom in designing and operating interconnected machines, robots, and devices. However, not all industrial links will be of URLLC type; e.g. some applications will require high data rates. Furthermore, these industrial networks will be highly heterogeneous, featuring various communication technologies. We consider network slicing as a mechanism to handle the diverse set of requirements to the network. We present methods for slicing deterministic and packet-switched industrial communication protocols at an abstraction level that is decoupled from the specific implementation of the underlying technologies. Finally, we show how network calculus can be used to assess the end-to-end properties of the network slices.
△ Less
Submitted 30 August, 2017;
originally announced August 2017.
-
Wireless Access for Ultra-Reliable Low-Latency Communication (URLLC): Principles and Building Blocks
Authors:
Petar Popovski,
Jimmy J. Nielsen,
Cedomir Stefanovic,
Elisabeth de Carvalho,
Erik Ström,
Kasper F. Trillingsgaard,
Alexandru-Sabin Bana,
Dong Min Kim,
Radoslaw Kotaba,
Jihong Park,
René B. Sørensen
Abstract:
Ultra-reliable low latency communication (URLLC) is an important new feature brought by 5G, with a potential to support a vast set of applications that rely on mission-critical links. In this article, we first discuss the principles for supporting URLLC from the perspective of the traditional assumptions and models applied in communication/information theory. We then discuss how these principles a…
▽ More
Ultra-reliable low latency communication (URLLC) is an important new feature brought by 5G, with a potential to support a vast set of applications that rely on mission-critical links. In this article, we first discuss the principles for supporting URLLC from the perspective of the traditional assumptions and models applied in communication/information theory. We then discuss how these principles are applied in various elements of the system design, such as use of various diversity sources, design of packets and access protocols. The important messages are that there is a need to optimize the transmission of signaling information, as well as a need for a lean use of various sources of diversity.
△ Less
Submitted 20 December, 2017; v1 submitted 25 August, 2017;
originally announced August 2017.
-
A Variational EM Method for Pole-Zero Modeling of Speech with Mixed Block Sparse and Gaussian Excitation
Authors:
Liming Shi,
Jesper Kjær Nielsen,
Jesper Rindom Jensen,
Mads Græsbøll Christensen
Abstract:
The modeling of speech can be used for speech synthesis and speech recognition. We present a speech analysis method based on pole-zero modeling of speech with mixed block sparse and Gaussian excitation. By using a pole-zero model, instead of the all-pole model, a better spectral fitting can be expected. Moreover, motivated by the block sparse glottal flow excitation during voiced speech and the wh…
▽ More
The modeling of speech can be used for speech synthesis and speech recognition. We present a speech analysis method based on pole-zero modeling of speech with mixed block sparse and Gaussian excitation. By using a pole-zero model, instead of the all-pole model, a better spectral fitting can be expected. Moreover, motivated by the block sparse glottal flow excitation during voiced speech and the white noise excitation for unvoiced speech, we model the excitation sequence as a combination of block sparse signals and white noise. A variational EM (VEM) method is proposed for estimating the posterior PDFs of the block sparse residuals and point estimates of mod- elling parameters within a sparse Bayesian learning framework. Compared to conventional pole-zero and all-pole based methods, experimental results show that the proposed method has lower spectral distortion and good performance in reconstructing of the block sparse excitation.
△ Less
Submitted 24 June, 2017;
originally announced June 2017.
-
Further Generalisations of Twisted Gabidulin Codes
Authors:
Sven Puchinger,
Johan Rosenkilde né Nielsen,
John Sheekey
Abstract:
We present a new family of maximum rank distance (MRD) codes. The new class contains codes that are neither equivalent to a generalised Gabidulin nor to a twisted Gabidulin code, the only two known general constructions of linear MRD codes.
We present a new family of maximum rank distance (MRD) codes. The new class contains codes that are neither equivalent to a generalised Gabidulin nor to a twisted Gabidulin code, the only two known general constructions of linear MRD codes.
△ Less
Submitted 4 August, 2017; v1 submitted 23 March, 2017;
originally announced March 2017.
-
Improved Power Decoding of One-Point Hermitian Codes
Authors:
Sven Puchinger,
Irene Bouw,
Johan Rosenkilde né Nielsen
Abstract:
We propose a new partial decoding algorithm for one-point Hermitian codes that can decode up to the same number of errors as the Guruswami--Sudan decoder. Simulations suggest that it has a similar failure probability as the latter one. The algorithm is based on a recent generalization of the power decoding algorithm for Reed--Solomon codes and does not require an expensive root-finding step. In ad…
▽ More
We propose a new partial decoding algorithm for one-point Hermitian codes that can decode up to the same number of errors as the Guruswami--Sudan decoder. Simulations suggest that it has a similar failure probability as the latter one. The algorithm is based on a recent generalization of the power decoding algorithm for Reed--Solomon codes and does not require an expensive root-finding step. In addition, it promises improvements for decoding interleaved Hermitian codes.
△ Less
Submitted 23 March, 2017;
originally announced March 2017.
-
Statistical Multiplexing of Computations in C-RAN with Tradeoffs in Latency and Energy
Authors:
Anders E. Kalør,
Mauricio I. Agurto,
Nuno K. Pratas,
Jimmy J. Nielsen,
Petar Popovski
Abstract:
In the Cloud Radio Access Network (C-RAN) architecture, the baseband signals from multiple remote radio heads are processed in a centralized baseband unit (BBU) pool. This architecture allows network operators to adapt the BBU's computational resources to the aggregate access load experienced at the BBU, which can change in every air-interface access frame. The degree of savings that can be achiev…
▽ More
In the Cloud Radio Access Network (C-RAN) architecture, the baseband signals from multiple remote radio heads are processed in a centralized baseband unit (BBU) pool. This architecture allows network operators to adapt the BBU's computational resources to the aggregate access load experienced at the BBU, which can change in every air-interface access frame. The degree of savings that can be achieved by adapting the resources is a tradeoff between savings, adaptation frequency, and increased queuing time. If the time scale for adaptation of the resource multiplexing is greater than the access frame duration, then this may result in additional access latency and limit the energy savings. In this paper we investigate the tradeoff by considering two extreme time-scales for the resource multiplexing: (i) long-term, where the computational resources are adapted over periods much larger than the access frame durations; (ii) short-term, where the adaption is below the access frame duration. We develop a general C-RAN queuing model that describes the access latency and show, for Poisson arrivals, that long-term multiplexing achieves savings comparable to short-term multiplexing, while offering low implementation complexity.
△ Less
Submitted 15 March, 2017;
originally announced March 2017.
-
Fast Exact k-Means, k-Medians and Bregman Divergence Clustering in 1D
Authors:
Allan Grønlund,
Kasper Green Larsen,
Alexander Mathiasen,
Jesper Sindahl Nielsen,
Stefan Schneider,
Mingzhou Song
Abstract:
The $k$-Means clustering problem on $n$ points is NP-Hard for any dimension $d\ge 2$, however, for the 1D case there exists exact polynomial time algorithms. Previous literature reported an $O(kn^2)$ time dynamic programming algorithm that uses $O(kn)$ space. It turns out that the problem has been considered under a different name more than twenty years ago. We present all the existing work that h…
▽ More
The $k$-Means clustering problem on $n$ points is NP-Hard for any dimension $d\ge 2$, however, for the 1D case there exists exact polynomial time algorithms. Previous literature reported an $O(kn^2)$ time dynamic programming algorithm that uses $O(kn)$ space. It turns out that the problem has been considered under a different name more than twenty years ago. We present all the existing work that had been overlooked and compare the various solutions theoretically. Moreover, we show how to reduce the space usage for some of them, as well as generalize them to data structures that can quickly report an optimal $k$-Means clustering for any $k$. Finally we also generalize all the algorithms to work for the absolute distance and to work for any Bregman Divergence. We complement our theoretical contributions by experiments that compare the practical performance of the various algorithms.
△ Less
Submitted 25 April, 2018; v1 submitted 25 January, 2017;
originally announced January 2017.
-
Decoding of Interleaved Reed-Solomon Codes Using Improved Power Decoding
Authors:
Sven Puchinger,
Johan Rosenkilde né Nielsen
Abstract:
We propose a new partial decoding algorithm for $m$-interleaved Reed--Solomon (IRS) codes that can decode, with high probability, a random error of relative weight $1-R^{\frac{m}{m+1}}$ at all code rates $R$, in time polynomial in the code length $n$. For $m>2$, this is an asymptotic improvement over the previous state-of-the-art for all rates, and the first improvement for $R>1/3$ in the last…
▽ More
We propose a new partial decoding algorithm for $m$-interleaved Reed--Solomon (IRS) codes that can decode, with high probability, a random error of relative weight $1-R^{\frac{m}{m+1}}$ at all code rates $R$, in time polynomial in the code length $n$. For $m>2$, this is an asymptotic improvement over the previous state-of-the-art for all rates, and the first improvement for $R>1/3$ in the last $20$ years. The method combines collaborative decoding of IRS codes with power decoding up to the Johnson radius.
△ Less
Submitted 5 May, 2017; v1 submitted 23 January, 2017;
originally announced January 2017.
-
Secure Real-Time Monitoring and Management of Smart Distribution Grid using Shared Cellular Networks
Authors:
Jimmy J. Nielsen,
Hervé Ganem,
Ljupco Jorguseski,
Kemal Alic,
Miha Smolnikar,
Ziming Zhu,
Nuno K. Pratas,
Michal Golinski,
Haibin Zhang,
Urban Kuhar,
Zhong Fan,
Ales Svigelj
Abstract:
The electricity production and distribution is facing two major changes. First, the production is shifting from classical energy sources such as coal and nuclear power towards renewable resources such as solar and wind. Secondly, the consumption in the low voltage grid is expected to grow significantly due to expected introduction of electrical vehicles. The first step towards more efficient opera…
▽ More
The electricity production and distribution is facing two major changes. First, the production is shifting from classical energy sources such as coal and nuclear power towards renewable resources such as solar and wind. Secondly, the consumption in the low voltage grid is expected to grow significantly due to expected introduction of electrical vehicles. The first step towards more efficient operational capabilities is to introduce an observability of the distribution system and allow for leveraging the flexibility of end connection points with manageable consumption, generation and storage capabilities. Thanks to the advanced measurement devices, management framework, and secure communication infrastructure developed in the FP7 SUNSEED project, the Distribution System Operator (DSO) now has full observability of the energy flows at the medium/low voltage grid. Furthermore, the prosumers are able to participate pro-actively and coordinate with the DSO and other stakeholders in the grid. The monitoring and management functionalities have strong requirements to the communication latency, reliability and security. This paper presents novel solutions and analyses of these aspects for the SUNSEED scenario, where the smart grid ICT solutions are provided through shared cellular LTE networks.
△ Less
Submitted 13 January, 2017;
originally announced January 2017.
-
Twisted Reed-Solomon Codes
Authors:
Peter Beelen,
Sven Puchinger,
Johan Rosenkilde né Nielsen
Abstract:
We present a new general construction of MDS codes over a finite field $\mathbb{F}_q$. We describe two explicit subclasses which contain new MDS codes of length at least $q/2$ for all values of $q \ge 11$. Moreover, we show that most of the new codes are not equivalent to a Reed-Solomon code.
We present a new general construction of MDS codes over a finite field $\mathbb{F}_q$. We describe two explicit subclasses which contain new MDS codes of length at least $q/2$ for all values of $q \ge 11$. Moreover, we show that most of the new codes are not equivalent to a Reed-Solomon code.
△ Less
Submitted 11 April, 2017; v1 submitted 5 January, 2017;
originally announced January 2017.
-
Distributed Co-Simulation of Maritime Systems and Operations
Authors:
Severin Sad**a,
Lars T. Kyllingstad,
Martin Rindarøy,
Stian Skjong,
Vilmar Æsøy,
Dariusz Eirik Fathi,
Vahid Hassani,
Trond Johnsen,
Jørgen Bremnes Nielsen,
Eilif Pedersen
Abstract:
Here, we present the concept of an open virtual prototy** framework for maritime systems and operations that enables its users to develop re-usable component or subsystem models, and combine them in full-system simulations for prototy**, verification, training, and performance studies. This framework consists of a set of guidelines for model coupling, high-level and low-level coupling interfac…
▽ More
Here, we present the concept of an open virtual prototy** framework for maritime systems and operations that enables its users to develop re-usable component or subsystem models, and combine them in full-system simulations for prototy**, verification, training, and performance studies. This framework consists of a set of guidelines for model coupling, high-level and low-level coupling interfaces to guarantee interoperability, a full-system simulation software, and example models and demonstrators. We discuss the requirements for such a framework, address the challenges and the possibilities in fulfilling them, and aim to give a list of best practices for modular and efficient virtual prototy** and full-system simulation. The context of our work is within maritime systems and operations, but the issues and solutions we present here are general enough to be of interest to a much broader audience, both industrial and scientific.
△ Less
Submitted 4 January, 2017;
originally announced January 2017.
-
Estimation of Received Signal Strength Distribution for Smart Meters with Biased Measurement Data Set
Authors:
Mathias Rønholt Kielgast,
Anders Charly Rasmussen,
Mathias Hjorth Laursen,
Jimmy Jessen Nielsen,
Petar Popovski,
Rasmus Krigslund
Abstract:
This letter presents an experimental study and a novel modelling approach of the wireless channel of smart utility meters placed in basements or sculleries. The experimental data consist of signal strength measurements of consumption report packets. Since such packets are only registered if they can be decoded by the receiver, the part of the signal strength distribution that falls below the recei…
▽ More
This letter presents an experimental study and a novel modelling approach of the wireless channel of smart utility meters placed in basements or sculleries. The experimental data consist of signal strength measurements of consumption report packets. Since such packets are only registered if they can be decoded by the receiver, the part of the signal strength distribution that falls below the receiver sensitivity threshold is not observable. We combine a Rician fading model with a bias function that captures the cut-off in the observed signal strength measurements. Two sets of experimental data are analysed. It is shown that the proposed method offers an approximation of the distribution of the signal strength measurements that is better than a naïve Rician fitting.
△ Less
Submitted 17 October, 2016;
originally announced October 2016.
-
Latency Analysis of Systems with Multiple Interfaces for Ultra-Reliable M2M Communication
Authors:
Jimmy J. Nielsen,
Petar Popovski
Abstract:
One of the ways to satisfy the requirements of ultra-reliable low latency communication for mission critical Machine-type Communications (MTC) applications is to integrate multiple communication interfaces. In order to estimate the performance in terms of latency and reliability of such an integrated communication system, we propose an analysis framework that combines traditional reliability model…
▽ More
One of the ways to satisfy the requirements of ultra-reliable low latency communication for mission critical Machine-type Communications (MTC) applications is to integrate multiple communication interfaces. In order to estimate the performance in terms of latency and reliability of such an integrated communication system, we propose an analysis framework that combines traditional reliability models with technology-specific latency probability distributions. In our proposed model we demonstrate how failure correlation between technologies can be taken into account. We show for the considered scenario with fiber and different cellular technologies how up to 5-nines reliability can be achieved and how packet splitting can be used to reduce latency substantially while kee** 4-nines reliability. The model has been validated through simulation.
△ Less
Submitted 7 May, 2016;
originally announced May 2016.
-
Data Structure Lower Bounds for Document Indexing Problems
Authors:
Peyman Afshani,
Jesper Sindahl Nielsen
Abstract:
We study data structure problems related to document indexing and pattern matching queries and our main contribution is to show that the pointer machine model of computation can be extremely useful in proving high and unconditional lower bounds that cannot be obtained in any other known model of computation with the current techniques. Often our lower bounds match the known space-query time trade-…
▽ More
We study data structure problems related to document indexing and pattern matching queries and our main contribution is to show that the pointer machine model of computation can be extremely useful in proving high and unconditional lower bounds that cannot be obtained in any other known model of computation with the current techniques. Often our lower bounds match the known space-query time trade-off curve and in fact for all the problems considered, there is a very good and reasonable match between the our lower bounds and the known upper bounds, at least for some choice of input parameters. The problems that we consider are set intersection queries (both the reporting variant and the semi-group counting variant), indexing a set of documents for two-pattern queries, or forbidden- pattern queries, or queries with wild-cards, and indexing an input set of gapped-patterns (or two-patterns) to find those matching a document given at the query time.
△ Less
Submitted 21 April, 2016;
originally announced April 2016.