-
Direct Search Algorithm for Clock Skew Compensation Immune to Floating-Point Precision Loss
Authors:
Kyeong Soo Kim
Abstract:
We have been investigating clock skew compensation immune to floating-point precision loss by taking into account the discrete nature of clocks in digital communication systems; extending Bresenham's line drawing algorithm, we constructed an incremental error algorithm using only integer addition/subtraction and comparison. Still, bounding the initial value of the clock remains a challenge, which…
▽ More
We have been investigating clock skew compensation immune to floating-point precision loss by taking into account the discrete nature of clocks in digital communication systems; extending Bresenham's line drawing algorithm, we constructed an incremental error algorithm using only integer addition/subtraction and comparison. Still, bounding the initial value of the clock remains a challenge, which determines the initial condition of the algorithm and thereby its number of iterations. In this letter, we propose a new incremental error algorithm for clock skew compensation, called direct search, which no longer relies on the bounds on the initial value of the clock. The numerical examples demonstrate that the proposed algorithm can significantly reduce the number of iterations in comparison to the prior work while eliminating the effect of floating-point precision loss on clock skew compensation.
△ Less
Submitted 21 April, 2025; v1 submitted 21 April, 2025;
originally announced April 2025.
-
Zero-shot Depth Completion via Test-time Alignment with Affine-invariant Depth Prior
Authors:
Lee Hyoseok,
Kyeong Seon Kim,
Kwon Byung-Ki,
Tae-Hyun Oh
Abstract:
Depth completion, predicting dense depth maps from sparse depth measurements, is an ill-posed problem requiring prior knowledge. Recent methods adopt learning-based approaches to implicitly capture priors, but the priors primarily fit in-domain data and do not generalize well to out-of-domain scenarios. To address this, we propose a zero-shot depth completion method composed of an affine-invariant…
▽ More
Depth completion, predicting dense depth maps from sparse depth measurements, is an ill-posed problem requiring prior knowledge. Recent methods adopt learning-based approaches to implicitly capture priors, but the priors primarily fit in-domain data and do not generalize well to out-of-domain scenarios. To address this, we propose a zero-shot depth completion method composed of an affine-invariant depth diffusion model and test-time alignment. We use pre-trained depth diffusion models as depth prior knowledge, which implicitly understand how to fill in depth for scenes. Our approach aligns the affine-invariant depth prior with metric-scale sparse measurements, enforcing them as hard constraints via an optimization loop at test-time. Our zero-shot depth completion method demonstrates generalization across various domain datasets, achieving up to a 21\% average performance improvement over the previous state-of-the-art methods while enhancing spatial understanding by sharpening scene details. We demonstrate that aligning a monocular affine-invariant depth prior with sparse metric measurements is a proven strategy to achieve domain-generalizable depth completion without relying on extensive training data. Project page: https://hyoseok1223.github.io/zero-shot-depth-completion/.
△ Less
Submitted 10 February, 2025;
originally announced February 2025.
-
Expected Diverse Utility (EDU): Diverse Bayesian Optimization of Expensive Computer Simulators
Authors:
John Joshua Miller,
Simon Mak,
Benny Sun,
Sai Ranjeet Narayanan,
Suo Yang,
Zongxuan Sun,
Kenneth S. Kim,
Chol-Bum Mike Kweon
Abstract:
The optimization of expensive black-box simulators arises in a myriad of modern scientific and engineering applications. Bayesian optimization provides an appealing solution, by leveraging a fitted surrogate model to guide the selection of subsequent simulator evaluations. In practice, however, the objective is often not to obtain a single good solution, but rather a ``basket'' of good solutions f…
▽ More
The optimization of expensive black-box simulators arises in a myriad of modern scientific and engineering applications. Bayesian optimization provides an appealing solution, by leveraging a fitted surrogate model to guide the selection of subsequent simulator evaluations. In practice, however, the objective is often not to obtain a single good solution, but rather a ``basket'' of good solutions from which users can choose for downstream decision-making. This need arises in our motivating application for real-time control of internal combustion engines for flight propulsion, where a diverse set of control strategies is essential for stable flight control. There has been little work on this front for Bayesian optimization. We thus propose a new Expected Diverse Utility (EDU) method that searches for diverse ``$ε$-optimal'' solutions: locally-optimal solutions within a tolerance level $ε> 0$ from a global optimum. We show that EDU yields a closed-form acquisition function under a Gaussian process surrogate model, which facilitates efficient sequential queries via automatic differentiation. This closed form further reveals a novel exploration-exploitation-diversity trade-off, which incorporates the desired diversity property within the well-known exploration-exploitation trade-off. We demonstrate the improvement of EDU over existing methods in a suite of numerical experiments, then explore the EDU in two applications on rover trajectory optimization and engine control for flight propulsion.
△ Less
Submitted 2 February, 2025; v1 submitted 1 October, 2024;
originally announced October 2024.
-
SGP-RI: A Real-Time-Trainable and Decentralized IoT Indoor Localization Model Based on Sparse Gaussian Process with Reduced-Dimensional Inputs
Authors:
Zhe Tang,
Sihao Li,
Zichen Huang,
Guandong Yang,
Kyeong Soo Kim,
Jeremy S. Smith
Abstract:
Internet of Things (IoT) devices are deployed in the filed, there is an enormous amount of untapped potential in local computing on those IoT devices. Harnessing this potential for indoor localization, therefore, becomes an exciting research area. Conventionally, the training and deployment of indoor localization models are based on centralized servers with substantial computational resources. Thi…
▽ More
Internet of Things (IoT) devices are deployed in the filed, there is an enormous amount of untapped potential in local computing on those IoT devices. Harnessing this potential for indoor localization, therefore, becomes an exciting research area. Conventionally, the training and deployment of indoor localization models are based on centralized servers with substantial computational resources. This centralized approach faces several challenges, including the database's inability to accommodate the dynamic and unpredictable nature of the indoor electromagnetic environment, the model retraining costs, and the susceptibility of centralized servers to security breaches. To mitigate these challenges we aim to amalgamate the offline and online phases of traditional indoor localization methods using a real-time-trainable and decentralized IoT indoor localization model based on Sparse Gaussian Process with Reduced-dimensional Inputs (SGP-RI), where the number and dimension of the input data are reduced through reference point and wireless access point filtering, respectively. The experimental results based on a multi-building and multi-floor static database as well as a single-building and single-floor dynamic database, demonstrate that the proposed SGP-RI model with less than half the training samples as inducing inputs can produce comparable localization performance to the standard Gaussian Process model with the whole training samples. The SGP-RI model enables the decentralization of indoor localization, facilitating its deployment to resource-constrained IoT devices, and thereby could provide enhanced security and privacy, reduced costs, and network dependency. Also, the model's capability of real-time training makes it possible to quickly adapt to the time-varying indoor electromagnetic environment.
△ Less
Submitted 24 August, 2024;
originally announced September 2024.
-
Mean Teacher based SSL Framework for Indoor Localization Using Wi-Fi RSSI Fingerprinting
Authors:
Sihao Li,
Zhe Tang,
Kyeong Soo Kim,
Jeremy S. Smith
Abstract:
Wi-Fi fingerprinting is widely applied for indoor localization due to the widespread availability of Wi-Fi devices. However, traditional methods are not ideal for multi-building and multi-floor environments due to the scalability issues. Therefore, more and more researchers have employed deep learning techniques to enable scalable indoor localization. This paper introduces a novel semi-supervised…
▽ More
Wi-Fi fingerprinting is widely applied for indoor localization due to the widespread availability of Wi-Fi devices. However, traditional methods are not ideal for multi-building and multi-floor environments due to the scalability issues. Therefore, more and more researchers have employed deep learning techniques to enable scalable indoor localization. This paper introduces a novel semi-supervised learning framework for neural networks based on wireless access point selection, noise injection, and Mean Teacher model, which leverages unlabeled fingerprints to enhance localization performance. The proposed framework can manage hybrid in/outsourcing and voluntarily contributed databases and continually expand the fingerprint database with newly submitted unlabeled fingerprints during service. The viability of the proposed framework was examined using two established deep-learning models with the UJIIndoorLoc database. The experimental results suggest that the proposed framework significantly improves localization performance compared to the supervised learning-based approach in terms of floor-level coordinate estimation using EvAAL metric. It shows enhancements up to 10.99% and 8.98% in the former scenario and 4.25% and 9.35% in the latter, respectively with additional studies highlight the importance of the essential components of the proposed framework.
△ Less
Submitted 18 July, 2024;
originally announced July 2024.
-
Hierarchical Stage-Wise Training of Linked Deep Neural Networks for Multi-Building and Multi-Floor Indoor Localization Based on Wi-Fi RSSI Fingerprinting
Authors:
Sihao Li,
Kyeong Soo Kim,
Zhe Tang,
Graduate,
Jeremy S. Smith
Abstract:
In this paper, we present a new solution to the problem of large-scale multi-building and multi-floor indoor localization based on linked neural networks, where each neural network is dedicated to a sub-problem and trained under a hierarchical stage-wise training framework. When the measured data from sensors have a hierarchical representation as in multi-building and multi-floor indoor localizati…
▽ More
In this paper, we present a new solution to the problem of large-scale multi-building and multi-floor indoor localization based on linked neural networks, where each neural network is dedicated to a sub-problem and trained under a hierarchical stage-wise training framework. When the measured data from sensors have a hierarchical representation as in multi-building and multi-floor indoor localization, it is important to exploit the hierarchical nature in data processing to provide a scalable solution. In this regard, the hierarchical stage-wise training framework extends the original stage-wise training framework to the case of multiple linked networks by training a lower-hierarchy network based on the prior knowledge gained from the training of higher-hierarchy networks. The experimental results with the publicly-available UJIIndoorLoc multi-building and multi-floor Wi-Fi RSSI fingerprint database demonstrate that the linked neural networks trained under the proposed hierarchical stage-wise training framework can achieve a three-dimensional localization error of 8.19 m, which, to the best of the authors' knowledge, is the most accurate result ever obtained for neural network-based models trained and evaluated with the full datasets of the UJIIndoorLoc database, and that, when applied to a model based on hierarchical convolutional neural networks, the proposed training framework can also significantly reduce the three-dimensional localization error from 11.78 m to 8.71 m.
△ Less
Submitted 18 July, 2024;
originally announced July 2024.
-
Static vs. Dynamic Databases for Indoor Localization based on Wi-Fi Fingerprinting: A Discussion from a Data Perspective
Authors:
Zhe Tang,
Ruocheng Gu,
Sihao Li,
Kyeong Soo Kim,
Jeremy S. Smith
Abstract:
Wi-Fi fingerprinting has emerged as the most popular approach to indoor localization. The use of ML algorithms has greatly improved the localization performance of Wi-Fi fingerprinting, but its success depends on the availability of fingerprint databases composed of a large number of RSSIs, the MAC addresses of access points, and the other measurement information. However, most fingerprint databas…
▽ More
Wi-Fi fingerprinting has emerged as the most popular approach to indoor localization. The use of ML algorithms has greatly improved the localization performance of Wi-Fi fingerprinting, but its success depends on the availability of fingerprint databases composed of a large number of RSSIs, the MAC addresses of access points, and the other measurement information. However, most fingerprint databases do not reflect well the time varying nature of electromagnetic interferences in complicated modern indoor environment. This could result in significant changes in statistical characteristics of training/validation and testing datasets, which are often constructed at different times, and even the characteristics of the testing datasets could be different from those of the data submitted by users during the operation of localization systems after their deployment. In this paper, we consider the implications of time-varying Wi-Fi fingerprints on indoor localization from a data-centric point of view and discuss the differences between static and dynamic databases. As a case study, we have constructed a dynamic database covering three floors of the IR building of XJTLU based on RSSI measurements, over 44 days, and investigated the differences between static and dynamic databases in terms of statistical characteristics and localization performance. The analyses based on variance calculations and Isolation Forest show the temporal shifts in RSSIs, which result in a noticeable trend of the increase in the localization error of a Gaussian process regression model with the maximum error of 6.65 m after 14 days of training without model adjustments. The results of the case study with the XJTLU dynamic database clearly demonstrate the limitations of static databases and the importance of the creation and adoption of dynamic databases for future indoor localization research and real-world deployment.
△ Less
Submitted 20 February, 2024;
originally announced February 2024.
-
On the Multidimensional Augmentation of Fingerprint Data for Indoor Localization in A Large-Scale Building Complex Based on Multi-Output Gaussian Process
Authors:
Zhe Tang,
Sihao Li,
Kyeong Soo Kim,
Jeremy Smith
Abstract:
Wi-Fi fingerprinting becomes a dominant solution for large-scale indoor localization due to its major advantage of not requiring new infrastructure and dedicated devices. The number and the distribution of Reference Points (RPs) for the measurement of localization fingerprints like RSSI during the offline phase, however, greatly affects the localization accuracy; for instance, the UJIIndoorLoc is…
▽ More
Wi-Fi fingerprinting becomes a dominant solution for large-scale indoor localization due to its major advantage of not requiring new infrastructure and dedicated devices. The number and the distribution of Reference Points (RPs) for the measurement of localization fingerprints like RSSI during the offline phase, however, greatly affects the localization accuracy; for instance, the UJIIndoorLoc is known to have the issue of uneven spatial distribution of RPs over buildings and floors. Data augmentation has been proposed as a feasible solution to not only improve the smaller number and the uneven distribution of RPs in the existing fingerprint databases but also reduce the labor and time costs of constructing new fingerprint databases. In this paper, we propose the multidimensional augmentation of fingerprint data for indoor localization in a large-scale building complex based on Multi-Output Gaussian Process (MOGP) and systematically investigate the impact of augmentation ratio as well as MOGP kernel functions and models with their hyperparameters on the performance of indoor localization using the UJIIndoorLoc database and the state-of-the-art neural network indoor localization model based on a hierarchical RNN. The investigation based on experimental results suggests that we can generate synthetic RSSI fingerprint data up to ten times the original data -- i.e., the augmentation ratio of 10 -- through the proposed multidimensional MOGP-based data augmentation without significantly affecting the indoor localization performance compared to that of the original data alone, which extends the spatial coverage of the combined RPs and thereby could improve the localization performance at the locations that are not part of the test dataset.
△ Less
Submitted 19 November, 2022;
originally announced November 2022.
-
Theoretical and Practical Bounds on the Initial Value of Skew-Compensated Clock for Clock Skew Compensation Algorithm Immune to Floating-Point Precision Loss
Authors:
Seungyeop Kang,
Kyeong Soo Kim
Abstract:
A clock skew compensation algorithm was recently proposed based on the extension of Bresenham's line drawing algorithm (Kim and Kang, IEEE Commun. Lett., vol. 26, no. 4, pp. 902--906, Apr. 2022), which takes into account the discrete nature of clocks in digital communication systems and mitigates the effect of limited floating-point precision on clock skew compensation. It lacks, however, a theore…
▽ More
A clock skew compensation algorithm was recently proposed based on the extension of Bresenham's line drawing algorithm (Kim and Kang, IEEE Commun. Lett., vol. 26, no. 4, pp. 902--906, Apr. 2022), which takes into account the discrete nature of clocks in digital communication systems and mitigates the effect of limited floating-point precision on clock skew compensation. It lacks, however, a theoretical analysis of the range of the initial value of skew-compensated clock, which is also an initial condition for the proposed algorithm. In this letter, we provide practical as well as theoretical bounds on the initial value of skew-compensated clock based on a systematic analysis of the errors of floating-point operations, which replace the approximate bounds in Theorem 1 of the prior work.
△ Less
Submitted 27 August, 2022; v1 submitted 24 August, 2022;
originally announced August 2022.
-
GRAM: Fast Fine-tuning of Pre-trained Language Models for Content-based Collaborative Filtering
Authors:
Yoonseok Yang,
Kyu Seok Kim,
Minsam Kim,
Juneyoung Park
Abstract:
Content-based collaborative filtering (CCF) predicts user-item interactions based on both users' interaction history and items' content information. Recently, pre-trained language models (PLM) have been used to extract high-quality item encodings for CCF. However, it is resource-intensive to train a PLM-based CCF model in an end-to-end (E2E) manner, since optimization involves back-propagating thr…
▽ More
Content-based collaborative filtering (CCF) predicts user-item interactions based on both users' interaction history and items' content information. Recently, pre-trained language models (PLM) have been used to extract high-quality item encodings for CCF. However, it is resource-intensive to train a PLM-based CCF model in an end-to-end (E2E) manner, since optimization involves back-propagating through every content encoding within a given user interaction sequence. To tackle this issue, we propose GRAM (GRadient Accumulation for Multi-modality in CCF), which exploits the fact that a given item often appears multiple times within a batch of interaction histories. Specifically, Single-step GRAM aggregates each item encoding's gradients for back-propagation, with theoretic equivalence to the standard E2E training. As an extension of Single-step GRAM, we propose Multi-step GRAM, which increases the gradient update latency, achieving a further speedup with drastically less GPU memory. GRAM significantly improves training efficiency (up to 146x) on five datasets from two task domains of Knowledge Tracing and News Recommendation. Our code is available at https://github.com/yoonseok312/GRAM.
△ Less
Submitted 6 May, 2022; v1 submitted 8 April, 2022;
originally announced April 2022.
-
Multi-Output Gaussian Process-Based Data Augmentation for Multi-Building and Multi-Floor Indoor Localization
Authors:
Zhe Tang,
Sihao Li,
Kyeong Soo Kim,
Jeremy Smith
Abstract:
Location fingerprinting based on RSSI becomes a mainstream indoor localization technique due to its advantage of not requiring the installation of new infrastructure and the modification of existing devices, especially given the prevalence of Wi-Fi-enabled devices and the ubiquitous Wi-Fi access in modern buildings. The use of AI/ML technologies like DNNs makes location fingerprinting more accurat…
▽ More
Location fingerprinting based on RSSI becomes a mainstream indoor localization technique due to its advantage of not requiring the installation of new infrastructure and the modification of existing devices, especially given the prevalence of Wi-Fi-enabled devices and the ubiquitous Wi-Fi access in modern buildings. The use of AI/ML technologies like DNNs makes location fingerprinting more accurate and reliable, especially for large-scale multi-building and multi-floor indoor localization. The application of DNNs for indoor localization, however, depends on a large amount of preprocessed and deliberately-labeled data for their training. Considering the difficulty of the data collection in an indoor environment, especially under the current epidemic situation of COVID-19, we investigate three different methods of RSSI data augmentation based on Multi-Output Gaussian Process (MOGP), i.e., by a single floor, by neighboring floors, and by a single building; unlike Single-Output Gaussian Process (SOGP), MOGP can take into account the correlation among RSSI observations from multiple Access Points (APs) deployed closely to each other (e.g., APs on the same floor of a building) by collectively handling them. The feasibility of the MOGP-based RSSI data augmentation is demonstrated through experiments based on the state-of-the-art RNN indoor localization model and the UJIIndoorLoc, i.e., the most popular publicly-available multi-building and multi-floor indoor localization database, where the RNN model trained with the UJIIndoorLoc database augmented by using the whole RSSI data of a building in fitting an MOGP model (i.e., by a single building) outperforms the other two augmentation methods as well as the RNN model trained with the original UJIIndoorLoc database, resulting in the mean three-dimensional positioning error of 8.42 m.
△ Less
Submitted 31 July, 2023; v1 submitted 4 February, 2022;
originally announced February 2022.
-
Hierarchical Multi-Building And Multi-Floor Indoor Localization Based On Recurrent Neural Networks
Authors:
Abdalla Elmokhtar Ahmed Elesawi,
Kyeong Soo Kim
Abstract:
There has been an increasing tendency to move from outdoor to indoor lifestyle in modern cities. The emergence of big shopping malls, indoor sports complexes, factories, and warehouses is accelerating this tendency. In such an environment, indoor localization becomes one of the essential services, and the indoor localization systems to be deployed should be scalable enough to cover the expected ex…
▽ More
There has been an increasing tendency to move from outdoor to indoor lifestyle in modern cities. The emergence of big shopping malls, indoor sports complexes, factories, and warehouses is accelerating this tendency. In such an environment, indoor localization becomes one of the essential services, and the indoor localization systems to be deployed should be scalable enough to cover the expected expansion of those indoor facilities. One of the most economical and practical approaches to indoor localization is Wi-Fi fingerprinting, which exploits the widely-deployed Wi-Fi networks using mobile devices (e.g., smartphones) without any modification of the existing infrastructure. Traditional Wi-Fi fingerprinting schemes rely on complicated data pre/post-processing and time-consuming manual parameter tuning. In this paper, we propose hierarchical multi-building and multi-floor indoor localization based on a recurrent neural network (RNN) using Wi-Fi fingerprinting, eliminating the need of complicated data pre/post-processing and with less parameter tuning. The RNN in the proposed scheme estimates locations in a sequential manner from a general to a specific one (e.g., building->floor->location) in order to exploit the hierarchical nature of the localization in multi-building and multi-floor environments. The experimental results with the UJIIndoorLoc dataset demonstrate that the proposed scheme estimates building and floor with 100% and 95.24% accuracy, respectively, and provides three-dimensional positioning error of 8.62 m, which outperforms existing deep neural network-based schemes.
△ Less
Submitted 23 December, 2021;
originally announced December 2021.
-
Clock Skew Compensation Algorithm Immune to Floating-Point Precision Loss
Authors:
Kyeong Soo Kim,
Seungyeop Kang
Abstract:
We propose a novel clock skew compensation algorithm based on Bresenham's line drawing algorithm. The proposed algorithm can avoid the effect of limited floating-point precision (e.g., 32-bit single precision) on clock skew compensation and thereby provide high-precision time synchronization even with resource-constrained sensor nodes in wireless sensor networks.
We propose a novel clock skew compensation algorithm based on Bresenham's line drawing algorithm. The proposed algorithm can avoid the effect of limited floating-point precision (e.g., 32-bit single precision) on clock skew compensation and thereby provide high-precision time synchronization even with resource-constrained sensor nodes in wireless sensor networks.
△ Less
Submitted 17 December, 2021; v1 submitted 1 September, 2021;
originally announced September 2021.
-
User Detection Performance Analysis for Grant-Free Uplink Transmission in Large-Scale Antenna Systems
Authors:
Jonghyun Kim,
Kyung Lin Ryu,
Kwang Soon Kim
Abstract:
In this paper, user detection performance of a grant-free uplink transmission in a large scale antenna system is analyzed, in which a general grant-free multiple access is considered as the system model and Zadoff-Chu sequence is used for the uplink pilot. The false alarm probabilities of various user detection schemes under the target detection probabilities are evaluated.
In this paper, user detection performance of a grant-free uplink transmission in a large scale antenna system is analyzed, in which a general grant-free multiple access is considered as the system model and Zadoff-Chu sequence is used for the uplink pilot. The false alarm probabilities of various user detection schemes under the target detection probabilities are evaluated.
△ Less
Submitted 9 July, 2019;
originally announced July 2019.
-
Ultrareliable and Low-Latency Communication Techniques for Tactile Internet Services
Authors:
Kwang Soon Kim,
Dong Ku Kim,
Chan-Byoung Chae,
Sunghyun Choi,
Young-Chai Ko,
Jonghyun Kim,
Yeon-Geun Lim,
Minho Yang,
Sundo Kim,
Byungju Lim,
Kwanghoon Lee,
Kyung Lin Ryu
Abstract:
This paper presents novel ultrareliable and low-latency communication (URLLC) techniques for URLLC services, such as Tactile Internet services. Among typical use-cases of URLLC services are tele-operation, immersive virtual reality, cooperative automated driving, and so on. In such URLLC services, new kinds of traffic such as haptic information including kinesthetic information and tactile informa…
▽ More
This paper presents novel ultrareliable and low-latency communication (URLLC) techniques for URLLC services, such as Tactile Internet services. Among typical use-cases of URLLC services are tele-operation, immersive virtual reality, cooperative automated driving, and so on. In such URLLC services, new kinds of traffic such as haptic information including kinesthetic information and tactile information need to be delivered in addition to high-quality video and audio traffic in traditional multimedia services. Further, such a variety of traffic has various characteristics in terms of packet sizes and data rates with a variety of requirements of latency and reliability. Furthermore, some traffic may occur in a sporadic manner but require reliable delivery of packets of medium to large sizes within a low latency, which is not supported by current state-of-the-art wireless communication systems and is very challenging for future wireless communication systems. Thus, to meet such a variety of tight traffic requirements in a wireless communication system, novel technologies from the physical layer to the network layer need to be devised. In this paper, some novel physical layer technologies such as waveform multiplexing, multiple access scheme, channel code design, synchronization, and full-duplex transmission for spectrally-efficient URLLC are introduced. In addition, a novel performance evaluation approach, which combines a ray-tracing tool and system-level simulation, is suggested for evaluating the performance of the proposed schemes. Simulation results show the feasibility of the proposed schemes providing realistic URLLC services in realistic geographical environments, which encourages further efforts to substantiate the proposed work.
△ Less
Submitted 9 July, 2019;
originally announced July 2019.
-
Optimal Message Bundling with Delay and Synchronization Constraints in Wireless Sensor Networks
Authors:
Xintao Huan,
Kyeong Soo Kim
Abstract:
Message bundling is an effective way to reduce the energy consumption for message transmissions in wireless sensor networks. However, bundling more messages could increase both end-to-end delay and message transmission interval; the former needs to be maintained within a certain value for time-sensitive applications like environmental monitoring, while the latter affects time synchronization accur…
▽ More
Message bundling is an effective way to reduce the energy consumption for message transmissions in wireless sensor networks. However, bundling more messages could increase both end-to-end delay and message transmission interval; the former needs to be maintained within a certain value for time-sensitive applications like environmental monitoring, while the latter affects time synchronization accuracy when the bundling includes synchronization messages as well. Taking as an example a novel time synchronization scheme recently proposed for energy efficiency, we propose an optimal message bundling approach to reduce the message transmissions while maintaining the user-defined requirements on end-to-end delay and time synchronization accuracy. Through translating the objective of joint maintenance to an integer linear programming problem, we compute a set of optimal bundling numbers for the sensor nodes to constrain their link-level delays, thereby achieve and maintain the required end-to-end delay and synchronization accuracy while the message transmission is minimized.
△ Less
Submitted 21 June, 2019;
originally announced June 2019.
-
A Beaconless Asymmetric Energy-Efficient Time Synchronization Scheme for Resource-Constrained Multi-Hop Wireless Sensor Networks
Authors:
Xintao Huan,
Kyeong Soo Kim,
Sanghyuk Lee,
Eng Gee Lim,
Alan Marshall
Abstract:
The ever-increasing number of WSN deployments based on a large number of battery-powered, low-cost sensor nodes, which are limited in their computing and power resources, puts the focus of WSN time synchronization research on three major aspects, i.e., accuracy, energy consumption and computational complexity. In the literature, the latter two aspects have not received much attention compared to t…
▽ More
The ever-increasing number of WSN deployments based on a large number of battery-powered, low-cost sensor nodes, which are limited in their computing and power resources, puts the focus of WSN time synchronization research on three major aspects, i.e., accuracy, energy consumption and computational complexity. In the literature, the latter two aspects have not received much attention compared to the accuracy of WSN time synchronization. Especially in multi-hop WSNs, intermediate gateway nodes are overloaded with tasks for not only relaying messages but also a variety of computations for their offspring nodes as well as themselves. Therefore, not only minimizing the energy consumption but also lowering the computational complexity while maintaining the synchronization accuracy is crucial to the design of time synchronization schemes for resource-constrained sensor nodes. In this paper, focusing on the three aspects of WSN time synchronization, we introduce a framework of reverse asymmetric time synchronization for resource-constrained multi-hop WSNs and propose a beaconless energy-efficient time synchronization scheme based on reverse one-way message dissemination. Experimental results with a WSN testbed based on TelosB motes running TinyOS demonstrate that the proposed scheme conserves up to 95% energy consumption compared to the flooding time synchronization protocol while achieving microsecond-level synchronization accuracy.
△ Less
Submitted 21 June, 2019;
originally announced June 2019.
-
Hierarchical Auxiliary Learning
Authors:
Jaehoon Cha,
Kyeong Soo Kim,
Sanghyuk Lee
Abstract:
Conventional application of convolutional neural networks (CNNs) for image classification and recognition is based on the assumption that all target classes are equal(i.e., no hierarchy) and exclusive of one another (i.e., no overlap). CNN-based image classifiers built on this assumption, therefore, cannot take into account an innate hierarchy among target classes (e.g., cats and dogs in animal im…
▽ More
Conventional application of convolutional neural networks (CNNs) for image classification and recognition is based on the assumption that all target classes are equal(i.e., no hierarchy) and exclusive of one another (i.e., no overlap). CNN-based image classifiers built on this assumption, therefore, cannot take into account an innate hierarchy among target classes (e.g., cats and dogs in animal image classification) or additional information that can be easily derived from the data (e.g.,numbers larger than five in the recognition of handwritten digits), thereby resulting in scalability issues when the number of target classes is large. Combining two related but slightly different ideas of hierarchical classification and logical learning by auxiliary inputs, we propose a new learning framework called hierarchical auxiliary learning, which not only address the scalability issues with a large number of classes but also could further reduce the classification/recognition errors with a reasonable number of classes. In the hierarchical auxiliary learning, target classes are semantically or non-semantically grouped into superclasses, which turns the original problem of mapping between an image and its target class into a new problem of mapping between a pair of an image and its superclass and the target class. To take the advantage of superclasses, we introduce an auxiliary block into a neural network, which generates auxiliary scores used as additional information for final classification/recognition; in this paper, we add the auxiliary block between the last residual block and the fully-connected output layer of the ResNet. Experimental results demonstrate that the proposed hierarchical auxiliary learning can reduce classification errors up to 0.56, 1.6 and 3.56 percent with MNIST, SVHN and CIFAR-10 datasets, respectively.
△ Less
Submitted 3 June, 2019;
originally announced June 2019.
-
On the Practical Implementation of Propagation Delay and Clock Skew Compensated High-Precision Time Synchronization Schemes with Resource-Constrained Sensor Nodes in Multi-Hop Wireless Sensor Networks
Authors:
Xintao Huan,
Kyeong Soo Kim
Abstract:
In wireless sensor networks (WSNs), implementing a high-precision time synchronization scheme on resource-constrained sensor nodes is a major challenge. Our investigation of the practical implementation on a real testbed of the state-of-the-art WSN time synchronization scheme based on the asynchronous source clock frequency recovery and the reverse two-way message exchange, which can compensate fo…
▽ More
In wireless sensor networks (WSNs), implementing a high-precision time synchronization scheme on resource-constrained sensor nodes is a major challenge. Our investigation of the practical implementation on a real testbed of the state-of-the-art WSN time synchronization scheme based on the asynchronous source clock frequency recovery and the reverse two-way message exchange, which can compensate for both propagation delay and clock skew for higher precision, reveals that its performance on battery-powered, low-complexity sensor nodes is not up to that predicted from simulation experiments due to the limited precision floating-point arithmetic of sensor nodes. Noting the lower computational capability of typical sensor nodes and its impact on time synchronization, we propose an asymmetric high-precision time synchronization scheme that can provide high-precision time synchronization even with resource-constrained sensor nodes in multi-hop WSNs. In the proposed scheme, all synchronization-related computations are done at the head node equipped with abundant computing and power resources, while the sensor nodes are responsible for timestamping only. Experimental results with a testbed based on TelosB motes running TinyOS demonstrate that the proposed time synchronization scheme can avoid time synchronization errors resulting from the single-precision floating-point arithmetic of the resource-constrained sensor nodes and achieve microsecond-level time synchronization accuracy in multi-hop WSNs.
△ Less
Submitted 12 May, 2019; v1 submitted 1 May, 2019;
originally announced May 2019.
-
A Personalized Preference Learning Framework for Caching in Mobile Networks
Authors:
Adeel Malik,
Joongheon Kim,
Kwang Soon Kim,
Won-Yong Shin
Abstract:
This paper comprehensively studies a content-centric mobile network based on a preference learning framework, where each mobile user is equipped with a finite-size cache. We consider a practical scenario where each user requests a content file according to its own preferences, which is motivated by the existence of heterogeneity in file preferences among different users. Under our model, we consid…
▽ More
This paper comprehensively studies a content-centric mobile network based on a preference learning framework, where each mobile user is equipped with a finite-size cache. We consider a practical scenario where each user requests a content file according to its own preferences, which is motivated by the existence of heterogeneity in file preferences among different users. Under our model, we consider a single-hop-based device-to-device (D2D) content delivery protocol and characterize the average hit ratio for the following two file preference cases: the personalized file preferences and the common file preferences. By assuming that the model parameters such as user activity levels, user file preferences, and file popularity are unknown and thus need to be inferred, we present a collaborative filtering (CF)-based approach to learn these parameters. Then, we reformulate the hit ratio maximization problems into a submodular function maximization and propose two computationally efficient algorithms including a greedy approach to efficiently solve the cache allocation problems. We analyze the computational complexity of each algorithm. Moreover, we analyze the corresponding level of the approximation that our greedy algorithm can achieve compared to the optimal solution. Using a real-world dataset, we demonstrate that the proposed framework employing the personalized file preferences brings substantial gains over its counterpart for various system parameters.
△ Less
Submitted 20 February, 2020; v1 submitted 15 April, 2019;
originally announced April 2019.
-
MTFS: Merkle-Tree-Based File System
Authors:
Jia Kan,
Kyeong Soo Kim
Abstract:
The blockchain technology has been changing our daily lives since Bitcoin - i.e., the first decentralized cryptocurrency - was invented and released as open-source software by an unidentified person or a group called Satoshi Nakamoto in 2009. Of many applications which can be implemented based on the blockchain, storage is an important one, a notable example of which is the InterPlanetary File Sys…
▽ More
The blockchain technology has been changing our daily lives since Bitcoin - i.e., the first decentralized cryptocurrency - was invented and released as open-source software by an unidentified person or a group called Satoshi Nakamoto in 2009. Of many applications which can be implemented based on the blockchain, storage is an important one, a notable example of which is the InterPlanetary File System (IPFS). IPFS is a distributed web based on a peer-to-peer hypermedia protocol to make the web faster, safer, and more open and focuses on public accessible files. To provide a solution for private file storage in the blockchain way, in this paper we propose a Merkle-tree-based File System (MTFS). In MTFS, the blockchain is more than a trust machine; it is an abstract of a cluster system. Distributed random nodes form a tree network cluster without a central controller to provide a secure private storage service and faster message propagation. Advance proxy re-encryption algorithm is applied to guarantee secure file exchanges under permission. Merkle tree will make sure that the files are distributed among the service nodes in a balanced way. The proposed MTFS can be used not only for personal file storage and exchange but also for industry requiring mutual trust in file uploading and downloading in making contracts like insurances.
△ Less
Submitted 12 April, 2019; v1 submitted 25 February, 2019;
originally announced February 2019.
-
On the Transformation of Latent Space in Autoencoders
Authors:
Jaehoon Cha,
Kyeong Soo Kim,
Sanghyuk Lee
Abstract:
Noting the importance of the latent variables in inference and learning, we propose a novel framework for autoencoders based on the homeomorphic transformation of latent variables, which could reduce the distance between vectors in the transformed space, while preserving the topological properties of the original space, and investigate the effect of the latent space transformation on learning gene…
▽ More
Noting the importance of the latent variables in inference and learning, we propose a novel framework for autoencoders based on the homeomorphic transformation of latent variables, which could reduce the distance between vectors in the transformed space, while preserving the topological properties of the original space, and investigate the effect of the latent space transformation on learning generative models and denoising corrupted data. The experimental results demonstrate that our generative and denoising models based on the proposed framework can provide better performance than conventional variational and denoising autoencoders due to the transformation, where we evaluate the performance of generative and denoising models in terms of the Hausdorff distance between the sets of training and processed i.e., either generated or denoised images, which can objectively measure their differences, as well as through direct comparison of the visual characteristics of the processed images.
△ Less
Submitted 3 June, 2019; v1 submitted 24 January, 2019;
originally announced January 2019.
-
XJTLUIndoorLoc: A New Fingerprinting Database for Indoor Localization and Trajectory Estimation Based on Wi-Fi RSS and Geomagnetic Field
Authors:
Zhenghang Zhong,
Zhe Tang,
Xiangxing Li,
Tiancheng Yuan,
Yang Yang,
Meng Wei,
Yuanyuan Zhang,
Renzhi Sheng,
Naomi Grant,
Chongfeng Ling,
Xintao Huan,
Kyeong Soo Kim,
Sanghyuk Lee
Abstract:
In this paper, we present a new location fingerprinting database comprised of Wi-Fi received signal strength (RSS) and geomagnetic field intensity measured with multiple devices at a multi-floor building in Xi'an Jiatong-Liverpool University, Suzhou, China. We also provide preliminary results of localization and trajectory estimation based on convolutional neural network (CNN) and long short-term…
▽ More
In this paper, we present a new location fingerprinting database comprised of Wi-Fi received signal strength (RSS) and geomagnetic field intensity measured with multiple devices at a multi-floor building in Xi'an Jiatong-Liverpool University, Suzhou, China. We also provide preliminary results of localization and trajectory estimation based on convolutional neural network (CNN) and long short-term memory (LSTM) network with this database. For localization, we map RSS data for a reference point to an image-like, two-dimensional array and then apply CNN which is popular in image and video analysis and recognition. For trajectory estimation, we use a modified random way point model to efficiently generate continuous step traces imitating human walking and train a stacked two-layer LSTM network with the generated data to remember the changing pattern of geomagnetic field intensity against (x,y) coordinates. Experimental results demonstrate the usefulness of our new database and the feasibility of the CNN and LSTM-based localization and trajectory estimation with the database.
△ Less
Submitted 16 October, 2018;
originally announced October 2018.
-
Hybrid Building/Floor Classification and Location Coordinates Regression Using A Single-Input and Multi-Output Deep Neural Network for Large-Scale Indoor Localization Based on Wi-Fi Fingerprinting
Authors:
Kyeong Soo Kim
Abstract:
In this paper, we propose hybrid building/floor classification and floor-level two-dimensional location coordinates regression using a single-input and multi-output (SIMO) deep neural network (DNN) for large-scale indoor localization based on Wi-Fi fingerprinting. The proposed scheme exploits the different nature of the estimation of building/floor and floor-level location coordinates and uses a d…
▽ More
In this paper, we propose hybrid building/floor classification and floor-level two-dimensional location coordinates regression using a single-input and multi-output (SIMO) deep neural network (DNN) for large-scale indoor localization based on Wi-Fi fingerprinting. The proposed scheme exploits the different nature of the estimation of building/floor and floor-level location coordinates and uses a different estimation framework for each task with a dedicated output and hidden layers enabled by SIMO DNN architecture. We carry out preliminary evaluation of the performance of the hybrid floor classification and floor-level two-dimensional location coordinates regression using new Wi-Fi crowdsourced fingerprinting datasets provided by Tampere University of Technology (TUT), Finland, covering a single building with five floors. Experimental results demonstrate that the proposed SIMO-DNN-based hybrid classification/regression scheme outperforms existing schemes in terms of both floor detection rate and mean positioning errors.
△ Less
Submitted 13 October, 2018;
originally announced October 2018.
-
On Blocking Collisions between People, Objects and other Robots
Authors:
Kwan Suk Kim,
Luis Sentis
Abstract:
Intentional or unintentional contacts are bound to occur increasingly more often due to the deployment of autonomous systems in human environments. In this paper, we devise methods to computationally predict imminent collisions between objects, robots and people, and use an upper-body humanoid robot to block them if they are likely to happen. We employ statistical methods for effective collision p…
▽ More
Intentional or unintentional contacts are bound to occur increasingly more often due to the deployment of autonomous systems in human environments. In this paper, we devise methods to computationally predict imminent collisions between objects, robots and people, and use an upper-body humanoid robot to block them if they are likely to happen. We employ statistical methods for effective collision prediction followed by sensor-based trajectory generation and real-time control to attempt to stop the likely collisions using the most favorable part of the blocking robot. We thoroughly investigate collisions in various types of experimental setups involving objects, robots, and people. Overall, the main contribution of this paper is to devise sensor-based prediction, trajectory generation and control processes for highly articulated robots to prevent collisions against people, and conduct numerous experiments to validate this approach.
△ Less
Submitted 4 March, 2018;
originally announced March 2018.
-
A Scalable Deep Neural Network Architecture for Multi-Building and Multi-Floor Indoor Localization Based on Wi-Fi Fingerprinting
Authors:
Kyeong Soo Kim,
Sanghyuk Lee,
Kaizhu Huang
Abstract:
One of the key technologies for future large-scale location-aware services covering a complex of multi-story buildings --- e.g., a big shopping mall and a university campus --- is a scalable indoor localization technique. In this paper, we report the current status of our investigation on the use of deep neural networks (DNNs) for scalable building/floor classification and floor-level position est…
▽ More
One of the key technologies for future large-scale location-aware services covering a complex of multi-story buildings --- e.g., a big shopping mall and a university campus --- is a scalable indoor localization technique. In this paper, we report the current status of our investigation on the use of deep neural networks (DNNs) for scalable building/floor classification and floor-level position estimation based on Wi-Fi fingerprinting. Exploiting the hierarchical nature of the building/floor estimation and floor-level coordinates estimation of a location, we propose a new DNN architecture consisting of a stacked autoencoder for the reduction of feature space dimension and a feed-forward classifier for multi-label classification of building/floor/location, on which the multi-building and multi-floor indoor localization system based on Wi-Fi fingerprinting is built. Experimental results for the performance of building/floor estimation and floor-level coordinates estimation of a given location demonstrate the feasibility of the proposed DNN-based indoor localization system, which can provide near state-of-the-art performance using a single DNN, for the implementation with lower complexity and energy consumption at mobile devices.
△ Less
Submitted 5 December, 2017;
originally announced December 2017.
-
Millimeter-Wave Interference Avoidance via Building-Aware Associations
Authors:
Jeemin Kim,
Jihong Park,
Seunghwan Kim,
Seong-Lyun Kim,
Ki Won Sung,
Kwang Soon Kim
Abstract:
Signal occlusion by building blockages is a double-edged sword for the performance of millimeter-wave (mmW) communication networks. Buildings may dominantly attenuate the useful signals, especially when mmW base stations (BSs) are sparsely deployed compared to the building density. In the opposite BS deployment, buildings can block the undesired interference. To enjoy only the benefit, we propose…
▽ More
Signal occlusion by building blockages is a double-edged sword for the performance of millimeter-wave (mmW) communication networks. Buildings may dominantly attenuate the useful signals, especially when mmW base stations (BSs) are sparsely deployed compared to the building density. In the opposite BS deployment, buildings can block the undesired interference. To enjoy only the benefit, we propose a building-aware association scheme that adjusts the directional BS association bias of the user equipments (UEs), based on a given building density and the concentration of UE locations around the buildings. The association of each BS can thereby be biased: (i) toward the UEs located against buildings for avoiding interference to other UEs; or (ii) toward the UEs providing their maximum reference signal received powers (RSRPs). The proposed association scheme is optimized to maximize the downlink average data rate derived by stochastic geometry. Its effectiveness is validated by simulation using real building statistics.
△ Less
Submitted 1 December, 2017;
originally announced December 2017.
-
Intelligent Collision Management in Dynamic Environments for Human-Centered Robots
Authors:
Kwan Suk Kim
Abstract:
In this context, a major focus of this thesis is on unintentional collisions, where a straight goal is to eliminate injury from users and passerby's via realtime sensing and control systems. A less obvious focus is to combine collision response with tools from motion planning in order to produce intelligent safety behaviors that ensure the safety of multiple people or objects. Yet, an even more ch…
▽ More
In this context, a major focus of this thesis is on unintentional collisions, where a straight goal is to eliminate injury from users and passerby's via realtime sensing and control systems. A less obvious focus is to combine collision response with tools from motion planning in order to produce intelligent safety behaviors that ensure the safety of multiple people or objects. Yet, an even more challenging problem is to anticipate future collisions between objects external to the robot and have the robot intervene to prevent imminent accidents. In this dissertation, we study all of these sophisticated flavors of collision reaction and intervention. We investigate in-depth multiple key and interesting topics related to collisions and safety of mobile robots and robotic manipulators operating in human environments. Overall we deeply investigate collisions from many perspectives and develop techniques that borrow and contribute to the areas of mechatronic design, sensor processing, feedback controls, motion planning, and probabilistic reasoning methods. The result of this study is a set of key experiments and guidelines to deal with collisions in mobile robots and robotic manipulators. This study aims at influencing future studies on field operations of robots and accelerate the employment of advanced robots in our daily environments without compromising our safety.
△ Less
Submitted 7 November, 2017;
originally announced November 2017.
-
Large-Scale Location-Aware Services in Access: Hierarchical Building/Floor Classification and Location Estimation using Wi-Fi Fingerprinting Based on Deep Neural Networks
Authors:
Kyeong Soo Kim,
Ruihao Wang,
Zhenghang Zhong,
Zikun Tan,
Haowei Song,
Jaehoon Cha,
Sanghyuk Lee
Abstract:
One of key technologies for future large-scale location-aware services in access is a scalable indoor localization technique. In this paper, we report preliminary results from our investigation on the use of deep neural networks (DNNs) for hierarchical building/floor classification and floor-level location estimation based on Wi-Fi fingerprinting, which we carried out as part of a feasibility stud…
▽ More
One of key technologies for future large-scale location-aware services in access is a scalable indoor localization technique. In this paper, we report preliminary results from our investigation on the use of deep neural networks (DNNs) for hierarchical building/floor classification and floor-level location estimation based on Wi-Fi fingerprinting, which we carried out as part of a feasibility study project on Xi'an Jiaotong-Liverpool University (XJTLU) Campus Information and Visitor Service System. To take into account the hierarchical nature of the building/floor classification problem, we propose a new DNN architecture based on a stacked autoencoder for the reduction of feature space dimension and a feed-forward classifier for multi-label classification with argmax functions to convert multi-label classification results into multi-class classification ones. We also describe the demonstration of a prototype DNN-based indoor localization system for floor-level location estimation using real received signal strength (RSS) data collected at one of the buildings on the XJTLU campus. The preliminary results for both building/floor classification and floor-level location estimation clearly show the strengths of DNN-based approaches, which can provide near state-of-the-art performance with less parameter tuning and higher scalability.
△ Less
Submitted 10 October, 2017; v1 submitted 2 October, 2017;
originally announced October 2017.
-
Interference-Aware Opportunistic Random Access in Dense IoT Networks
Authors:
Huifa Lin,
Kwang Soon Kim,
Won-Yong Shin
Abstract:
It is a challenging task to design a random access protocol that achieves the optimal throughput in multi-cell random access with decentralized transmission due to the difficulty of coordination. In this paper, we present a decentralized interference-aware opportunistic random access (IA-ORA) protocol that enables us to obtain the optimal throughput scaling in an ultra-dense multi-cell random acce…
▽ More
It is a challenging task to design a random access protocol that achieves the optimal throughput in multi-cell random access with decentralized transmission due to the difficulty of coordination. In this paper, we present a decentralized interference-aware opportunistic random access (IA-ORA) protocol that enables us to obtain the optimal throughput scaling in an ultra-dense multi-cell random access network with one access point (AP) and a number of users. In sharp contrast to opportunistic scheduling for cellular multiple access where users are selected by base stations, under the IA-ORA protocol, each user opportunistically transmits with a predefined physical layer (PHY) data rate in a decentralized manner if not only the desired signal power to the serving AP is sufficiently large but also the generating interference leakage power to the other APs is sufficiently small (i.e., two threshold conditions are fulfilled). As a main result, it is shown that the optimal aggregate throughput scaling (i.e., the MAC throughput of $\frac{1}{e}$ in a cell and the power gain) is achieved in a high signal-to-noise ratio regime if the number of per-cell users exceeds some level. Additionally, it is numerically demonstrated via computer simulations that under practical settings, the proposed IA-ORA protocol outperforms conventional opportunistic random access protocols in terms of aggregate throughput.
△ Less
Submitted 14 June, 2020; v1 submitted 9 August, 2017;
originally announced August 2017.
-
Multi-Hop Extensions of Energy-Efficient Wireless Sensor Network Time Synchronization
Authors:
Yangyu Wang,
Kyeong Soo Kim
Abstract:
We present the multi-hop extensions of the recently proposed energy-efficient time synchronization scheme for wireless sensor networks, which is based on the asynchronous source clock frequency recovery and reversed two-way message exchanges. We consider two hierarchical extensions based on packet relaying and time-translating gateways, respectively, and analyze their performance with respect to t…
▽ More
We present the multi-hop extensions of the recently proposed energy-efficient time synchronization scheme for wireless sensor networks, which is based on the asynchronous source clock frequency recovery and reversed two-way message exchanges. We consider two hierarchical extensions based on packet relaying and time-translating gateways, respectively, and analyze their performance with respect to the number of layers and the delay variations through simulations. The simulation results demonstrate that the time synchronization performance of the packet relaying, which has lower complexity, is close to that of time-translating gateways.
△ Less
Submitted 1 February, 2017;
originally announced February 2017.
-
Cooperative Transmissions in Ultra-Dense Networks under a Bounded Dual-Slope Path Loss Model
Authors:
Yanpeng Yang,
Ki Won Sung,
Jihong Park,
Seong-Lyun Kim,
Kwang Soon Kim
Abstract:
In an Ultra-dense network (UDN) where there are more base stations (BSs) than active users, it is possible that many BSs are instantaneously left idle. Thus, how to utilize these dormant BSs by means of cooperative transmission is an interesting question. In this paper, we investigate the performance of a UDN with two types of cooperation schemes: non-coherent joint transmission (JT) without chann…
▽ More
In an Ultra-dense network (UDN) where there are more base stations (BSs) than active users, it is possible that many BSs are instantaneously left idle. Thus, how to utilize these dormant BSs by means of cooperative transmission is an interesting question. In this paper, we investigate the performance of a UDN with two types of cooperation schemes: non-coherent joint transmission (JT) without channel state information (CSI) and coherent JT with full CSI knowledge. We consider a bounded dual-slope path loss model to describe UDN environments where a user has several BSs in the near-field and the rest in the far-field. Numerical results show that non-coherent JT cannot improve the user spectral efficiency (SE) due to the simultaneous increment in signal and interference powers. For coherent JT, the achievable SE gain depends on the range of near-field, the relative densities of BSs and users, and the CSI accuracy. Finally, we assess the energy efficiency (EE) of cooperation in UDN. Despite costing extra energy consumption, cooperation can still improve EE under certain conditions.
△ Less
Submitted 5 May, 2017; v1 submitted 15 January, 2017;
originally announced January 2017.
-
Stacked-VLAN-Based Modeling of Hybrid ISP Traffic Control Schemes and Service Plans Exploiting Excess Bandwidth in Shared Access Networks
Authors:
Kyeong Soo Kim
Abstract:
The current practice of shaping subscriber traffic using a token bucket filter by Internet service providers may result in a severe waste of network resources in shared access networks; except for a short period of time proportional to the size of a token bucket, it cannot allocate excess bandwidth among active subscribers even when there are only a few active subscribers. To better utilize the ne…
▽ More
The current practice of shaping subscriber traffic using a token bucket filter by Internet service providers may result in a severe waste of network resources in shared access networks; except for a short period of time proportional to the size of a token bucket, it cannot allocate excess bandwidth among active subscribers even when there are only a few active subscribers. To better utilize the network resources in shared access networks, therefore, we recently proposed and analyzed the performance of access traffic control schemes, which can allocate excess bandwidth among active subscribers proportional to their token generation rates. Also, to exploit the excess bandwidth allocation enabled by the proposed traffic control schemes, we have been studying flexible yet practical service plans under a hybrid traffic control architecture, which are attractive to both an Internet service provider and its subscribers in terms of revenue and quality of service. In this paper we report the current status of our modeling of the hybrid traffic control schemes and service plans with OMNeT++/INET-HNRL based on IEEE standard 802.1Q stacked VLANs.
△ Less
Submitted 16 September, 2016;
originally announced September 2016.
-
Large-Scale Cloud Radio Access Networks with Practical Constraints: Asymptotic Analysis and Its Implications
Authors:
Kyung Jun Choi,
Kwang Soon Kim
Abstract:
Large-scale cloud radio access network (LS-CRAN) is a highly promising next-generation cellular network architecture whereby lots of base stations (BSs) equipped with a massive antenna array are connected to a cloud-computing based central processor unit via digital front/backhaul links. This paper studies an asymptotic behavior of downlink (DL) performance of a LS-CRAN with three practical constr…
▽ More
Large-scale cloud radio access network (LS-CRAN) is a highly promising next-generation cellular network architecture whereby lots of base stations (BSs) equipped with a massive antenna array are connected to a cloud-computing based central processor unit via digital front/backhaul links. This paper studies an asymptotic behavior of downlink (DL) performance of a LS-CRAN with three practical constraints: 1) limited transmit power, 2) limited front/backhaul capacity, and 3) limited pilot resource. As an asymptotic performance measure, the scaling exponent of the signal-to-interference-plus-noise-ratio (SINR) is derived for interference-free (IF), maximum-ratio transmission (MRT), and zero-forcing (ZF) operations. Our asymptotic analysis reveals four fundamental operating regimes and the performances of both MRT and ZF operations are fundamentally limited by the UL transmit power for estimating user's channel state information, not the DL transmit power. We obtain the conditions that MRT or ZF operation becomes interference-free, i.e., order-optimal with three practical constraints. Specifically, as higher UL transmit power is provided, more users can be associated and the data rate per user can be increased simultaneously while keeping the order-optimality as long as the total front/backhaul overhead is $Ω(N^{η_{\rm{bs}}+η_{\rm{ant}}+η_{\rm{user}}+\frac{2}αρ^{\rm{ul}}})$ and $Ω(N^{η_{\rm{user}}-η_{\rm{bs}}})$ pilot resources are available. It is also shown that how the target quality-of-service (QoS) in terms of SINR and the number of users satisfying the target QoS can simultaneously grow as the network size increases and the way how the network size increases under the practical constraints, which can provide meaningful insights for future cellular systems.
△ Less
Submitted 8 August, 2016;
originally announced August 2016.
-
Latency-Optimal Uplink Scheduling Policy in Training-based Large-Scale Antenna Systems
Authors:
Kyung Jun Choi,
Kwang Soon Kim
Abstract:
In this paper, an uplink scheduling policy problem to minimize the network latency, defined as the air-time to serve all of users with a quality-of-service (QoS), under an energy constraint is considered in a training-based large-scale antenna systems (LSAS) employing a simple linear receiver. An optimal algorithm providing the exact latency-optimal uplink scheduling policy is proposed with a poly…
▽ More
In this paper, an uplink scheduling policy problem to minimize the network latency, defined as the air-time to serve all of users with a quality-of-service (QoS), under an energy constraint is considered in a training-based large-scale antenna systems (LSAS) employing a simple linear receiver. An optimal algorithm providing the exact latency-optimal uplink scheduling policy is proposed with a polynomial-time complexity. Via numerical simulations, it is shown that the proposed scheduling policy can provide several times lower network latency over the conventional ones in realistic environments. In addition, the proposed scheduling policy and its network latency are analyzed asymptotically to provide better insights on the system behavior. Four operating regimes are classified according to the average received signal quality, $ρ$, and the number of BS antennas, $M$. It turns out that orthogonal pilots are optimal only in the regime $ρ\gg1$ and $ M\ll \log^2ρ$. In other regimes ($ρ\ll 1$ or $ M\gg \log^2ρ$), it turns out that non-orthogonal pilots become optimal. More rigorously, the use of non-orthogonal pilots can reduce the network latency by a factor of $Θ(M)$ when $ρ\ll 1$ or by a factor of $Θ(\sqrt{M}/\log M)$ when $ρ\gg 1$ and $M\gg \logρ$, which would be a critical guideline for designing 5G future cellular systems.
△ Less
Submitted 26 July, 2016;
originally announced July 2016.
-
On The Multi-Hop Extension of Energy-Efficient WSN Time Synchronization Based on Time-Translating Gateways
Authors:
Qimeng Liao,
Kyeong Soo Kim
Abstract:
We report preliminary results of a simulation study on the multi-hop extension of the recently-proposed energy-efficient wireless sensor network time synchronization scheme based on time-translating gateways. Unlike the single-hop case, in multi-hop time synchronization a sensor node sends measurement data to a head node through gateways which translate the timestamp values of the received measure…
▽ More
We report preliminary results of a simulation study on the multi-hop extension of the recently-proposed energy-efficient wireless sensor network time synchronization scheme based on time-translating gateways. Unlike the single-hop case, in multi-hop time synchronization a sensor node sends measurement data to a head node through gateways which translate the timestamp values of the received measurement data. Through simulations for two-hop time synchronization, we analyze the impact of the addition of a gateway and its translation of timestamp values on the clock frequency and measurement time estimation and thereby demonstrate the feasibility of the multi-hop extension of the energy-efficient WSN time synchronization based on time-translating gateways.
△ Less
Submitted 29 June, 2016;
originally announced June 2016.
-
Simulation Study of an Energy-Efficient Time Synchronization Scheme based on Source Clock Frequency Recovery in Asymmetric Wireless Sensor Networks
Authors:
Kyeong Soo Kim,
Sanghyuk Lee,
Eng Gee Lim
Abstract:
In this paper we report preliminary results of a simulation study on an energy-efficient time synchronization scheme based on source clock frequency recovery (SCFR) at sensor nodes in asymmetric wireless sensor networks (WSNs), where a head node --- serving as a gateway between wired and wireless networks --- is equipped with a powerful processor and supplied power from outlet, and sensor nodes --…
▽ More
In this paper we report preliminary results of a simulation study on an energy-efficient time synchronization scheme based on source clock frequency recovery (SCFR) at sensor nodes in asymmetric wireless sensor networks (WSNs), where a head node --- serving as a gateway between wired and wireless networks --- is equipped with a powerful processor and supplied power from outlet, and sensor nodes --- connected only through wireless channels --- are limited in processing and battery-powered. In the SCFR-based WSN time synchronization scheme, we concentrate on battery-powered sensor nodes and reduce their energy consumption by minimizing the number of message transmissions from sensor nodes to the head node. Through simulation experiments we analyze the performance of the SCFR-based WSN time synchronization scheme, including the impact of SCFR on time synchronization based on two-way message exchange, and demonstrate the feasibility of the proposed time synchronization scheme.
△ Less
Submitted 17 February, 2016;
originally announced February 2016.
-
Energy-Efficient Time Synchronization Based on Asynchronous Source Clock Frequency Recovery and Reverse Two-Way Message Exchanges in Wireless Sensor Networks
Authors:
Kyeong Soo Kim,
Sanghyuk Lee,
Eng Gee Lim
Abstract:
We consider energy-efficient time synchronization in a wireless sensor network where a head node (i.e., a gateway between wired and wireless networks and a center of data fusion) is equipped with a powerful processor and supplied power from outlet, and sensor nodes (i.e., nodes measuring data and connected only through wireless channels) are limited in processing and battery-powered. It is this as…
▽ More
We consider energy-efficient time synchronization in a wireless sensor network where a head node (i.e., a gateway between wired and wireless networks and a center of data fusion) is equipped with a powerful processor and supplied power from outlet, and sensor nodes (i.e., nodes measuring data and connected only through wireless channels) are limited in processing and battery-powered. It is this asymmetry that our study focuses on; unlike most existing schemes to save the power of all network nodes, we concentrate on battery-powered sensor nodes in minimizing energy consumption for time synchronization. We present a time synchronization scheme based on asynchronous source clock frequency recovery and reverse two-way message exchanges combined with measurement data report messages, where we minimize the number of message transmissions from sensor nodes, and carry out the performance analysis of the estimation of both measurement time and clock frequency with lower bounds for the latter. Simulation results verify that the proposed scheme outperforms the schemes based on conventional two-way message exchanges with and without clock frequency recovery in terms of the accuracy of measurement time estimation and the number of message transmissions and receptions at sensor nodes as an indirect measure of energy efficiency.
△ Less
Submitted 15 February, 2016;
originally announced February 2016.
-
Comments on "On Clock Synchronization Algorithms for Wireless Sensor Networks Under Unknown Delay"
Authors:
Kyeong Soo Kim
Abstract:
The generalization of the maximum-likelihood-like estimator for clock skew by Leng and Wu in the above paper is erroneous because the correlation of the noise components in the model is not taken into account in the derivation of the maximum likelihood estimator, its performance bound, and the optimal selection of the gap between two subtracting time stamps. This comment investigates the issue of…
▽ More
The generalization of the maximum-likelihood-like estimator for clock skew by Leng and Wu in the above paper is erroneous because the correlation of the noise components in the model is not taken into account in the derivation of the maximum likelihood estimator, its performance bound, and the optimal selection of the gap between two subtracting time stamps. This comment investigates the issue of noise correlation in the model and provides the range of the gap for which the maximum likelihood estimator and its performance bound are valid and corrects the optimal selection of the gap based on the provided range.
△ Less
Submitted 1 February, 2016;
originally announced February 2016.
-
Greedy Subspace Pursuit for Joint Sparse Recovery
Authors:
Kyung Su Kim,
Sae-Young Chung
Abstract:
In this paper, we address the sparse multiple measurement vector (MMV) problem where the objective is to recover a set of sparse nonzero row vectors or indices of a signal matrix from incomplete measurements. Ideally, regardless of the number of columns in the signal matrix, the sparsity (k) plus one measurements is sufficient for the uniform recovery of signal vectors for almost all signals, i.e.…
▽ More
In this paper, we address the sparse multiple measurement vector (MMV) problem where the objective is to recover a set of sparse nonzero row vectors or indices of a signal matrix from incomplete measurements. Ideally, regardless of the number of columns in the signal matrix, the sparsity (k) plus one measurements is sufficient for the uniform recovery of signal vectors for almost all signals, i.e., excluding a set of Lebesgue measure zero. To approach the "k+1" lower bound with computational efficiency even when the rank of signal matrix is smaller than k, we propose a greedy algorithm called Two-stage orthogonal Subspace Matching Pursuit (TSMP) whose theoretical results approach the lower bound with less restriction than the Orthogonal Subspace Matching Pursuit (OSMP) and Subspace-Augmented MUltiple SIgnal Classification (SA-MUSIC) algorithms. We provide non-asymptotical performance guarantees of OSMP and TSMP by covering both noiseless and noisy cases. Variants of restricted isometry property and mutual coherence are used to improve the performance guarantees. Numerical simulations demonstrate that the proposed scheme has low complexity and outperforms most existing greedy methods. This shows that the minimum number of measurements for the success of TSMP converges more rapidly to the lower bound than the existing methods as the number of columns of the signal matrix increases.
△ Less
Submitted 26 January, 2016;
originally announced January 2016.
-
On enery-efficient time synchronization based on source clock frequency recovery in wireless sensor networks
Authors:
Kyeong Soo Kim,
Sanghyuk Lee,
Eng Gee Lim
Abstract:
In this paper we study energy-efficient time synchronization schemes with focus on asymmetric wireless sensor networks, where a head node, which is connected to both wired & wireless networks, is equipped with a powerful processor and supplied power from outlet, and sensor nodes, which are connected only through wireless channels, are limited in processing and battery-powered. It is this asymmetry…
▽ More
In this paper we study energy-efficient time synchronization schemes with focus on asymmetric wireless sensor networks, where a head node, which is connected to both wired & wireless networks, is equipped with a powerful processor and supplied power from outlet, and sensor nodes, which are connected only through wireless channels, are limited in processing and battery-powered. It is this asymmetry that we focus our study on; unlike existing schemes saving the power of all sensor nodes in the network (including the head node), we concentrate on battery-powered sensor nodes in minimizing energy consumption for synchronization. Specifically, we discuss a time synchronization scheme based on source clock frequency recovery, where we minimize the number of message transmissions from sensor nodes to the head node, and its extension to network-wide, multi-hop synchronization through gateway nodes.
△ Less
Submitted 11 August, 2015;
originally announced August 2015.
-
Smart Small Cell with Hybrid Beamforming for 5G: Theoretical Feasibility and Prototype Results
Authors:
Jinyoung Jang,
MinKeun Chung,
Hae Gwang Hwang,
Yeon-Geun Lim,
Hong-jib Yoon,
TaeckKeun Oh,
Byung-Wook Min,
Yongshik Lee,
Kwang Soon Kim,
Chan-Byoung Chae,
Dong Ku Kim
Abstract:
In this article, we present a real-time three dimensional (3D) hybrid beamforming for fifth generation (5G) wireless networks. One of the key concepts in 5G cellular systems is the small cell network, which settles the high mobile traffic demand and provides uniform user-experienced data rates. The overall capacity of the small cell network can be enhanced with the enabling technology of 3D hybrid…
▽ More
In this article, we present a real-time three dimensional (3D) hybrid beamforming for fifth generation (5G) wireless networks. One of the key concepts in 5G cellular systems is the small cell network, which settles the high mobile traffic demand and provides uniform user-experienced data rates. The overall capacity of the small cell network can be enhanced with the enabling technology of 3D hybrid beamforming. This study validates the feasibility of the 3D hybrid beamforming, mostly for link-level performances, through the implementation of a realtime testbed using a software-defined radio (SDR) platform and fabricated antenna array. Based on the measured data, we also investigate system-level performances to verify the gain of the proposed smart small cell system over long term evolution (LTE) systems by performing system-level simulations based on a 3D ray-tracing tool.
△ Less
Submitted 12 March, 2016; v1 submitted 30 June, 2015;
originally announced June 2015.
-
Atomic Scheduling of Appliance Energy Consumption in Residential Smart Grid
Authors:
Kyeong Soo Kim,
Sanghyuk Lee,
Tiew On Ting,
Xin-She Yang
Abstract:
The current formulation of the optimal scheduling of appliance energy consumption uses as optimization variables the vectors of appliances' scheduled energy consumption over equally-divided time slots of a day, which does not take into account the atomicity of appliances' operations (i.e., the unsplittable nature of appliances' operations and resulting energy consumption). In this paper, we provid…
▽ More
The current formulation of the optimal scheduling of appliance energy consumption uses as optimization variables the vectors of appliances' scheduled energy consumption over equally-divided time slots of a day, which does not take into account the atomicity of appliances' operations (i.e., the unsplittable nature of appliances' operations and resulting energy consumption). In this paper, we provide a new formulation of atomic scheduling of energy consumption based on the optimal routing framework; the flow configurations of users over multiple paths between the common source and destination nodes of a ring network are used as optimization variables, which indicate the starting times of scheduled energy consumption, and optimal scheduling problems are now formulated in terms of the user flow configurations. Because the atomic optimal scheduling results in a Boolean-convex problem for a convex objective function, we propose a successive convex relaxation technique for efficient calculation of an approximate solution, where we iteratively drop fractional-valued elements and apply convex relaxation to the resulting problem until we find a feasible suboptimal solution. Numerical results for the cost and peak-to-average ratio minimization problems demonstrate that the successive convex relaxation technique can provide solutions close to, often identical to, global optimal solutions.
△ Less
Submitted 25 September, 2019; v1 submitted 31 May, 2015;
originally announced June 2015.
-
Full-Body Collision Detection and Reaction with Omnidirectional Mobile Platforms: A Step Towards Safe Human-Robot Interaction
Authors:
Kwan Suk Kim,
Travis Llado,
Luis Sentis
Abstract:
In this paper, we develop estimation and control methods for quickly reacting to collisions between omnidirectional mobile platforms and their environment. To enable the full-body detection of external forces, we use torque sensors located in the robot's drivetrain. Using model based techniques we estimate, with good precision, the location, direction, and magnitude of collision forces, and we dev…
▽ More
In this paper, we develop estimation and control methods for quickly reacting to collisions between omnidirectional mobile platforms and their environment. To enable the full-body detection of external forces, we use torque sensors located in the robot's drivetrain. Using model based techniques we estimate, with good precision, the location, direction, and magnitude of collision forces, and we develop an admittance controller that achieves a low effective mass in reaction to them. For experimental testing, we use a facility containing a calibrated collision dummy and our holonomic mobile platform. We subsequently explore collisions with the dummy colliding against a stationary base and the base colliding against a stationary dummy. Overall, we accomplish fast reaction times and a reduction of impact forces. A proof of concept experiment presents various parts of the mobile platform, including the wheels, colliding safely with humans.
△ Less
Submitted 20 January, 2015;
originally announced January 2015.
-
Stability and Performance Limits of Latency-Prone Distributed Feedback Controllers
Authors:
Ye Zhao,
Nicholas Paine,
Kwan Suk Kim,
Luis Sentis
Abstract:
Robotic control systems are increasingly relying on distributed feedback controllers to tackle complex sensing and decision problems such as those found in highly articulated human-centered robots. These demands come at the cost of a growing computational burden and, as a result, larger controller latencies. To maximize robustness to mechanical disturbances by maximizing control feedback gains, th…
▽ More
Robotic control systems are increasingly relying on distributed feedback controllers to tackle complex sensing and decision problems such as those found in highly articulated human-centered robots. These demands come at the cost of a growing computational burden and, as a result, larger controller latencies. To maximize robustness to mechanical disturbances by maximizing control feedback gains, this paper emphasizes the necessity for compromise between high- and low-level feedback control effort in distributed controllers. Specifically, the effect of distributed impedance controllers is studied where damping feedback effort is executed in close proximity to the control plant and stiffness feedback effort is executed in a latency-prone centralized control process. A central observation is that the stability of high impedance distributed controllers is very sensitive to damping feedback delay but much less to stiffness feedback delay. This study pursues a detailed analysis of this observation that leads to a physical understanding of the disparity. Then a practical controller breakdown gain rule is derived to aim at enabling control designers to consider the benefits of implementing their control applications in a distributed fashion. These considerations are further validated through the analysis, simulation and experimental testing on high performance actuators and on an omnidirectional mobile base.
△ Less
Submitted 12 January, 2015;
originally announced January 2015.
-
Designing pricing schemes based on progressive tariff and consumer grouping in migration to a future smart grid
Authors:
Kyeong Soo Kim
Abstract:
We study the design of pricing schemes for a group of consumers with smart meters (e.g., in a Greenfield area) who are connected through a gateway to a traditional electricity greed with a progressive tariff. Because the progressive tariff cannot take into account the time aspect of electricity demands, we apply it to consumers in both an individual and a group basis over a shorter time period, wh…
▽ More
We study the design of pricing schemes for a group of consumers with smart meters (e.g., in a Greenfield area) who are connected through a gateway to a traditional electricity greed with a progressive tariff. Because the progressive tariff cannot take into account the time aspect of electricity demands, we apply it to consumers in both an individual and a group basis over a shorter time period, which can flatten the overall demand over time and thereby reduce peak load. This scenario for the coexistence of traditional and smart girds and the pricing schemes under this scenario can enable smooth migration to a future smart grid.
△ Less
Submitted 30 December, 2014; v1 submitted 26 December, 2014;
originally announced December 2014.
-
Toward Fully-Shared Access: Designing ISP Service Plans Leveraging Excess Bandwidth Allocation
Authors:
Kyeong Soo Kim
Abstract:
Shaping subscriber traffic based on token bucket filter (TBF) by Internet service providers (ISPs) results in waste of network resources in shared access when there are few active subscribers, because it cannot allocate excess bandwidth in the long term. New traffic control schemes have been recently proposed to allocate excess bandwidth among active subscribers proportional to their token generat…
▽ More
Shaping subscriber traffic based on token bucket filter (TBF) by Internet service providers (ISPs) results in waste of network resources in shared access when there are few active subscribers, because it cannot allocate excess bandwidth in the long term. New traffic control schemes have been recently proposed to allocate excess bandwidth among active subscribers proportional to their token generation rates. In this paper we report the current status of our research on designing flexible yet practical service plans exploiting excess bandwidth allocation enabled by the new traffic control schemes in shared access networks, which are attractive to both ISP and its subscribers in terms of revenue and quality of service (QoS) and serve as a stepping stone to fully-shared access in the future.
△ Less
Submitted 16 September, 2014;
originally announced September 2014.
-
On The Evolution of PON-Based FTTH Solutions
Authors:
Kyeong Soo Kim
Abstract:
Passive Optical Network (PON)-based Fiber-To-The-Home (FTTH) are promising solutions that can break through the economic barrier of traditional point-to-point solutions. Once fibers are deployed with PON-based FTTH solutions, it becomes critical how to migrate to Wavelength Division Multiplexing (WDM)-PON because Time Division Multiplexing (TDM) used in current PON solutions cannot exploit the hug…
▽ More
Passive Optical Network (PON)-based Fiber-To-The-Home (FTTH) are promising solutions that can break through the economic barrier of traditional point-to-point solutions. Once fibers are deployed with PON-based FTTH solutions, it becomes critical how to migrate to Wavelength Division Multiplexing (WDM)-PON because Time Division Multiplexing (TDM) used in current PON solutions cannot exploit the huge bandwidth of the optical fibers and therefore will not be able to meet ever-increasing demands for higher bandwidth by future network applications. In this paper we review and compare the current PON-based FTTH solutions, ATM-PON (APON) and Ethernet PON (EPON), and provide a possible evolution scenario to future WDM-PON.
△ Less
Submitted 9 April, 2014;
originally announced April 2014.
-
A New Dynamic Bandwidth Allocation Protocol with Quality of Service in Ethernet-based Passive Optical Networks
Authors:
Fu-Tai An,
Yu-Li Hsueh,
Kyeong Soo Kim,
Ian M. White,
Leonid G. Kazovsky
Abstract:
Ethernet-based Passive optical network (E-PON) is the key for next generation access networks. It must have the property of high efficiency, low cost, and support quality of service (QoS). We present a novel media access control (MAC) protocol that maximizes network efficiency by using dynamic bandwidth allocation (DBA) algorithm suitable for E-PON. This protocol minimizes packet delay and delay v…
▽ More
Ethernet-based Passive optical network (E-PON) is the key for next generation access networks. It must have the property of high efficiency, low cost, and support quality of service (QoS). We present a novel media access control (MAC) protocol that maximizes network efficiency by using dynamic bandwidth allocation (DBA) algorithm suitable for E-PON. This protocol minimizes packet delay and delay variation for high priority traffic to ensure QoS. Simulation results show excellent network throughput. Simulation results also show low packet delay and packet delay variation for high priority traffic compare with traditional MAC protocol of E-PON. When the network performs ranging, this protocol ensures zero interruption of high priority traffic, such as audio or video applications.
△ Less
Submitted 9 April, 2014;
originally announced April 2014.
-
Comments on "IEEE 1588 Clock Synchronization using Dual Slave Clocks in a Slave"
Authors:
Kyeong Soo Kim
Abstract:
In the above letter, Chin and Chen proposed an IEEE 1588 clock synchronization method based on dual slave clocks, where they claim that multiple unknown parameters --- i.e., clock offset, clock skew, and master-to-slave delay --- can be estimated with only one-way time transfers using more equations than usual. This comment investigates Chin and Chen's dual clock scheme with detailed models for a…
▽ More
In the above letter, Chin and Chen proposed an IEEE 1588 clock synchronization method based on dual slave clocks, where they claim that multiple unknown parameters --- i.e., clock offset, clock skew, and master-to-slave delay --- can be estimated with only one-way time transfers using more equations than usual. This comment investigates Chin and Chen's dual clock scheme with detailed models for a master and dual slave clocks and shows that the formulation of multi-parameter estimation is invalid, which affirms that it is impossible to distinguish the effect of delay from that of clock offset at a slave even with dual slave clocks.
△ Less
Submitted 31 January, 2016; v1 submitted 25 March, 2014;
originally announced April 2014.