-
Classifying Sums of Exponentially Damped Sinusoids Using an Associated Numerical Range
Authors:
Raymundo Albert,
Cecilia G. Galarza
Abstract:
The matrix pencil method (MPM) is a well-known technique for estimating the parameters of exponentially damped sinusoids in noise by solving a generalized eigenvalue problem. However, in several cases, this is an ill-conditioned problem whose solution is highly biased under small perturbations. When the estimation is performed to classify the observed signal into two categories, the estimation err…
▽ More
The matrix pencil method (MPM) is a well-known technique for estimating the parameters of exponentially damped sinusoids in noise by solving a generalized eigenvalue problem. However, in several cases, this is an ill-conditioned problem whose solution is highly biased under small perturbations. When the estimation is performed to classify the observed signal into two categories, the estimation errors induce several misclassifications. In this work we propose a novel signal classification criteria by exploiting the relationship between the generalized eigenvalue problem posed in the MPM and the numerical range of a pair of rectangular matrices. In particular, the classification test is formulated as a set inclusion problem, and no spectrum estimation is required. The technique is applied to a problem of electromagnetic scattering to classify dielectric materials using the scattering signal observed when a target is illuminated by an ultra-wideband signal. The performance of the classification scheme is assessed in terms of error rate and it is compared to another classification technique, the generalized likelihood rate test (GLRT).
△ Less
Submitted 17 April, 2024;
originally announced April 2024.
-
Classification of sums of complex exponentials
Authors:
Magdalena Bouza,
Andres Altieri,
Cecilia G. Galarza
Abstract:
Numerous signals in relevant signal processing applications can be modeled as a sum of complex exponentials. Each exponential term entails a particular property of the modeled physical system, and it is possible to define families of signals that are associated with the complex exponentials. In this paper, we formulate a classification problem for this guiding principle and we propose a data proce…
▽ More
Numerous signals in relevant signal processing applications can be modeled as a sum of complex exponentials. Each exponential term entails a particular property of the modeled physical system, and it is possible to define families of signals that are associated with the complex exponentials. In this paper, we formulate a classification problem for this guiding principle and we propose a data processing strategy. In particular, we exploit the information obtained from the analytical model by combining it with data-driven learning techniques. As a result, we obtain a classification strategy that is robust under modeling uncertainties and experimental perturbations. To assess the performance of the new scheme, we test it with experimental data obtained from the scattering response of targets illuminated with an impulse radio ultra-wideband radar.
△ Less
Submitted 9 November, 2021;
originally announced November 2021.
-
Model Order Estimation for A Sum of Complex Exponentials
Authors:
Raymundo Albert,
Cecilia G. Galarza
Abstract:
In this paper, we present a new method for estimating the number of terms in a sum of exponentially damped sinusoids embedded in noise. In particular, we propose to combine the shift-invariance property of the Hankel matrix associated with the signal with a constraint over its singular values to penalize small order estimations. With this new methodology, the algebraic and statistical structures o…
▽ More
In this paper, we present a new method for estimating the number of terms in a sum of exponentially damped sinusoids embedded in noise. In particular, we propose to combine the shift-invariance property of the Hankel matrix associated with the signal with a constraint over its singular values to penalize small order estimations. With this new methodology, the algebraic and statistical structures of the Hankel matrix are considered. The new order estimation technique shows significant improvements over subspace-based methods. In particular, when a good separation between the noise and the signal subspaces is not possible, the new methodology outperforms known techniques. We evaluate the performance of our method using numerical experiments and comparing its performance with previous results found in the literature.
△ Less
Submitted 18 October, 2021;
originally announced October 2021.
-
Extreme coverage in 5G Narrowband IoT: a LUT-based strategy to optimize shared channels
Authors:
Emmanuel Luján,
Juan A. Zuloaga Mellino,
Alejandro D. Otero,
Leonardo Rey Vega,
Cecilia G. Galarza,
Esteban E. Mocskos
Abstract:
One of the main challenges in IoT is providing communication support to an increasing number of connected devices. In recent years, narrowband radio technology has emerged to address this situation: Narrowband Internet of Things (NB-IoT), which is now part of 5G. Supporting massive connectivity becomes particularly demanding in extreme coverage scenarios such as underground or deep inside building…
▽ More
One of the main challenges in IoT is providing communication support to an increasing number of connected devices. In recent years, narrowband radio technology has emerged to address this situation: Narrowband Internet of Things (NB-IoT), which is now part of 5G. Supporting massive connectivity becomes particularly demanding in extreme coverage scenarios such as underground or deep inside buildings sites. We propose a novel strategy for these situations focused on optimizing NB-IoT shared channels through the selection of link parameters: modulation and coding scheme, as well as the number of repetitions. These parameters are established by the base station (BS) for each block transmitted until reaching a target block error rate (BLER_t ). A wrong selection of these magnitudes leads to radio resource waste and a decrease in the number of possible concurrent connections. Specifically, our strategy is based on a look-up table (LUT) scheme which is used for rapidly delivering the optimal link parameters given a target QoS. To validate our proposal, we compare with alternative strategies using an open source NB-IoT uplink simulator. The experiments are based on transmitting blocks of 256 bits using an AWGN channel over the NPUSCH. Results show that, especially under extreme conditions, only a few options for link parameters are available, favoring robustness against measurement uncertainties. Our strategy minimizes resource usage in all scenarios of acknowledged mode and remarkably reduces losses in the unacknowledged mode, presenting also substantial gains in performance. We expect to influence future BS software design and implementation, favoring connection support under extreme environments.
△ Less
Submitted 24 December, 2019; v1 submitted 7 August, 2019;
originally announced August 2019.
-
Cooperative spectrum sensing schemes with partial statistics knowledge
Authors:
Juan Augusto Maya,
Leonardo Rey Vega,
Cecilia G. Galarza
Abstract:
In this letter, we analyze the problem of detecting spectrum holes in cognitive radio systems. We consider that a group of unlicensed users can sense the radio signal energy, perform some simple processing and transmit the result to a central entity, where the decision about the presence or not of licensed users is made. We show that the proposed cooperative schemes present good performances even…
▽ More
In this letter, we analyze the problem of detecting spectrum holes in cognitive radio systems. We consider that a group of unlicensed users can sense the radio signal energy, perform some simple processing and transmit the result to a central entity, where the decision about the presence or not of licensed users is made. We show that the proposed cooperative schemes present good performances even without any knowledge about the measurements statistics in the unlicensed users and with only partial knowledge of them in the central entity.
△ Less
Submitted 2 November, 2015; v1 submitted 5 October, 2015;
originally announced October 2015.
-
Exploiting Spatial Correlation in Energy Constrained Distributed Detection
Authors:
Juan Augusto Maya,
Cecilia G. Galarza,
Leonardo Rey Vega
Abstract:
We consider the detection of a correlated random process immersed in noise in a wireless sensor network. Each node has an individual energy constraint and the communication with the processing central units are affected by the path loss propagation effect. Guided by energy efficiency concerns, we consider the partition of the whole network into clusters, each one with a coordination node or \emph{…
▽ More
We consider the detection of a correlated random process immersed in noise in a wireless sensor network. Each node has an individual energy constraint and the communication with the processing central units are affected by the path loss propagation effect. Guided by energy efficiency concerns, we consider the partition of the whole network into clusters, each one with a coordination node or \emph{cluster head}. Thus, the nodes transmit their measurements to the corresponding cluster heads, which after some processing, communicate a summary of the received information to the fusion center, which takes the final decision about the state of the nature. As the network has a fixed size, communication within smaller clusters will be less affected by the path loss effect, reducing energy consumption in the information exchange process between nodes and cluster heads. However, this limits the capability of the network of beneficially exploiting the spatial correlation of the process, specially when the spatial correlation coherence of the process is of the same scale as the clusters size. Therefore, a trade-off is established between the energy efficiency and the beneficial use of spatial correlation. The study of this trade-off is the main goal of this paper. We derive tight approximations of the false alarm and miss-detection error probabilities under the Neyman-Pearson framework for the above scenario. We also consider the application of these results to a particular network and correlation model obtaining closed form expressions. Finally, we validate the results for more general network and correlation models through numerical simulations.
△ Less
Submitted 14 September, 2015;
originally announced September 2015.
-
Distributed Detection of a Random Process over a Multiple Access Channel under Energy and Bandwidth Constraints
Authors:
Juan Augusto Maya,
Leonardo Rey Vega,
Cecilia G. Galarza
Abstract:
We analyze a binary hypothesis testing problem built on a wireless sensor network (WSN) for detecting a stationary random process distributed both in space and time with circularly-symmetric complex Gaussian distribution under the Neyman-Pearson framework. Using an analog scheme, the sensors transmit different linear combinations of their measurements through a multiple access channel (MAC) to rea…
▽ More
We analyze a binary hypothesis testing problem built on a wireless sensor network (WSN) for detecting a stationary random process distributed both in space and time with circularly-symmetric complex Gaussian distribution under the Neyman-Pearson framework. Using an analog scheme, the sensors transmit different linear combinations of their measurements through a multiple access channel (MAC) to reach the fusion center (FC), whose task is to decide whether the process is present or not. Considering an energy constraint on each node transmission and a limited amount of channel uses, we compute the miss error exponent of the proposed scheme using Large Deviation Theory (LDT) and show that the proposed strategy is asymptotically optimal (when the number of sensors approaches to infinity) among linear orthogonal schemes. We also show that the proposed scheme obtains significant energy saving in the low signal-to-noise ratio regime, which is the typical scenario of WSNs. Finally, a Monte Carlo simulation of a 2-dimensional process in space validates the analytical results.
△ Less
Submitted 15 October, 2014;
originally announced October 2014.
-
On Fundamental Trade-offs of Device-to-Device Communications in Large Wireless Networks
Authors:
Andrés Altieri,
Pablo Piantanida,
Leonardo Rey Vega,
Cecilia G. Galarza
Abstract:
This paper studies the gains, in terms of served requests, attainable through out-of-band device-to-device (D2D) video exchanges in large cellular networks. A stochastic framework, in which users are clustered to exchange videos, is introduced, considering several aspects of this problem: the video-caching policy, user matching for exchanges, aspects regarding scheduling and transmissions. A famil…
▽ More
This paper studies the gains, in terms of served requests, attainable through out-of-band device-to-device (D2D) video exchanges in large cellular networks. A stochastic framework, in which users are clustered to exchange videos, is introduced, considering several aspects of this problem: the video-caching policy, user matching for exchanges, aspects regarding scheduling and transmissions. A family of \emph{admissible protocols} is introduced: in each protocol the users are clustered by means of a hard-core point process and, within the clusters, video exchanges take place. Two metrics, quantifying the "local" and "global" fraction of video requests served through D2D are defined, and relevant trade-off regions involving these metrics, as well as quality-of-service constraints, are identified. A simple communication strategy is proposed and analyzed, to obtain inner bounds to the trade-off regions, and draw conclusions on the performance attainable through D2D. To this end, an analysis of the time-varying interference that the nodes experience, and tight approximations of its Laplace transform are derived.
△ Less
Submitted 4 May, 2015; v1 submitted 9 May, 2014;
originally announced May 2014.
-
On the Outage Probability of the Full-Duplex Interference-Limited Relay Channel
Authors:
Andres Altieri,
Leonardo Rey Vega,
Pablo Piantanida,
Cecilia G. Galarza
Abstract:
In this paper, we study the performance, in terms of the asymptotic error probability, of a user which communicates with a destination with the aid of a full-duplex in-band relay. We consider that the network is interference-limited, and interfering users are distributed as a Poisson point process. In this case, the asymptotic error probability is upper bounded by the outage probability (OP). We i…
▽ More
In this paper, we study the performance, in terms of the asymptotic error probability, of a user which communicates with a destination with the aid of a full-duplex in-band relay. We consider that the network is interference-limited, and interfering users are distributed as a Poisson point process. In this case, the asymptotic error probability is upper bounded by the outage probability (OP). We investigate the outage behavior for well-known cooperative schemes, namely, decode-and-forward (DF) and compress-and-forward (CF) considering fading and path loss. For DF we determine the exact OP and develop upper bounds which are tight in typical operating conditions. Also, we find the correlation coefficient between source and relay signals which minimizes the OP when the density of interferers is small. For CF, the achievable rates are determined by the spatial correlation of the interferences, and a straightforward analysis isn't possible. To handle this issue, we show the rate with correlated noises is at most one bit worse than with uncorrelated noises, and thus find an upper bound on the performance of CF. These results are useful to evaluate the performance and to optimize relaying schemes in the context of full-duplex wireless networks.
△ Less
Submitted 15 May, 2014; v1 submitted 28 March, 2014;
originally announced March 2014.
-
Cooperative Strategies for Interference-Limited Wireless Networks
Authors:
Andres Altieri,
Leonardo Rey Vega,
Cecilia G. Galarza,
Pablo Piantanida
Abstract:
Consider the communication of a single-user aided by a nearby relay involved in a large wireless network where the nodes form an homogeneous Poisson point process. Since this network is interference-limited the asymptotic error probability is bounded from above by the outage probability experienced by the user. We investigate the outage behavior for the well-known cooperative schemes, namely, deco…
▽ More
Consider the communication of a single-user aided by a nearby relay involved in a large wireless network where the nodes form an homogeneous Poisson point process. Since this network is interference-limited the asymptotic error probability is bounded from above by the outage probability experienced by the user. We investigate the outage behavior for the well-known cooperative schemes, namely, decode-and-forward (DF) and compress-and-forward (CF). In this setting, the outage events are induced by both fading and the spatial proximity of neighbor nodes who generate the strongest interference and hence the worst communication case. Upper and lower bounds on the asymptotic error probability which are tight in some cases are derived. It is shown that there exists a clear trade off between the network density and the benefits of user cooperation. These results are useful to evaluate performances and to optimize relaying schemes in the context of large wireless networks.
△ Less
Submitted 10 March, 2011;
originally announced March 2011.