Exploring and Enhancing the Spectral and Energy-Efficiency of Non-Orthogonal Multiple Access in Next Generation IoT Networks

The proliferation of technologies like Internet of Things (IoT) and Industrial IoT (IIoT) has led to rapid growth in the number of connected devices and the volume of data associated with IoT applications. It is expected that more than 125 billion IoT devices will be connected to the Internet by 2030. With the plethora of wireless IoT devices, we are moving towards the connected world which is the guiding principle for the IoT. The next generation of IoT network should be capable of interconnecting heterogeneous IoT sensor or devices for effective Device-to-Device (D2D), Machine-to-Machine (M2M) communications as well as facilitating various IoT services and applications. Therefore, the next generation of IoT networks is expected to meet the capacity demand of such a network of billions of IoT devices. The current underlying wireless network is based on Orthogonal Multiple Access (OMA) ...

Rauniyar, Ashish — University of Oslo, Norway


IMPROVED INDOOR LOCALIZATION WITH MACHINE LEARNING TECHNIQUES FOR IOT APPLICATIONS

With the rapid development of the internet of things (IoT) and the popularization of mobile internet applications, the location-based service (LBS) has attracted much attention due to its commercial, military, and social applications. The global positioning system (GPS) is the prominent and most widely used technology that provides localization and navigation services for outdoor location information. However, the GPS cannot be used well in indoor environments due to weak signal reception, radio multi-path effect, signal scattering, and attenuation. Therefore, localization-based systems for indoor environments have been designed using various wireless communication technologies such as Wi-Fi, ZigBee, Bluetooth, UWB, etc., depending on the context and application scenarios. Received signal strength indicator (RSSI) technology has been extensively used in indoor localization technology due to it provides accuracy, high feasibility, simplicity, and deployment practicability features. Various machine learning algorithms have been employed to ...

Madduma Wellalage Pasan Maduranga — IIC University of Technology


Direction of Arrival Estimation and Localization Exploiting Sparse and One-Bit Sampling

Data acquisition is a necessary first step in digital signal processing applications such as radar, wireless communications and array processing. Traditionally, this process is performed by uniformly sampling signals at a frequency above the Nyquist rate and converting the resulting samples into digital numeric values through high-resolution amplitude quantization. While the traditional approach to data acquisition is straightforward and extremely well-proven, it may be either impractical or impossible in many modern applications due to the existing fundamental trade-off between sampling rate, amplitude quantization precision, implementation costs, and usage of physical resources, e.g. bandwidth and power consumption. Motivated by this fact, system designers have recently proposed exploiting sparse and few-bit quantized sampling instead of the traditional way of data acquisition in order to reduce implementation costs and usage of physical resources in such applications. However, before transition from the tradition data ...

Saeid Sedighi — University of Luxembourg


Bayesian data fusion for distributed learning

This dissertation explores the intersection of data fusion, federated learning, and Bayesian methods, with a focus on their applications in indoor localization, GNSS, and image processing. Data fusion involves integrating data and knowledge from multiple sources. It becomes essential when data is only available in a distributed fashion or when different sensors are used to infer a quantity of interest. Data fusion typically includes raw data fusion, feature fusion, and decision fusion. In this thesis, we will concentrate on feature fusion. Distributed data fusion involves merging sensor data from different sources to estimate an unknown process. Bayesian framework is often used because it can provide an optimal and explainable feature by preserving the full distribution of the unknown given the data, called posterior, over the estimated process at each agent. This allows for easy and recursive merging of sensor data ...

Peng Wu — Northeastern University


Towards 6G-Enabled Internet of Things with IRS-Empowered Backscatter-Assisted WPCNs

While 5G wireless systems offer significant enhancements to their 4G counterparts in terms of bandwidth, connectivity, latency, etc. they are unable to meet the requirements of the applications envisioned for the next decade. The demands of applications such as super-smart city, autonomous vehicles, smart health-care, etc. are much greater than what 5G systems can afford. This means that we cannot yet expect the widespread realization of IoT/IoE and have to wait for 6G to finally fulfill this long-awaited promise. As an enabler and a key player for the success of IoT/IoE, WPCN has been the center of attention in the past decade and attracted a large number of journal and conference publications. Despite the extensive efforts in this area, WPCN still lacks the required performance for being seamlessly fitted into the next generation IoT/IoE environments. The main objective of this ...

Ramezani, Parisa — The University of Sydney


Enabling Technologies and Cyber-Physical Systems for Mission-Critical Scenarios

Reliable transport systems, defense, public safety and quality assurance in the Industry 4.0 are essential in a modern society. In a mission-critical scenario, a mission failure would jeopardize human lives and put at risk some other assets whose impairment or loss would significantly harm society or business results. Even small degradations of the communications supporting the mission could have large and possibly dire consequences. On the one hand, mission-critical organizations wish to utilize the most modern, disruptive and innovative communication systems and technologies, and yet, on the other hand, need to comply with strict requirements, which are very different to those of non critical scenarios. The aim of this thesis is to assess the feasibility of applying emerging technologies like Internet of Things (IoT), Cyber-Physical Systems (CPS) and 4G broadband communications in mission-critical scenarios along three key critical infrastructure sectors: ...

Fraga-Lamas, Paula — University of A Coruña


Decentralized Estimation Under Communication Constraints

In this thesis, we consider the problem of decentralized estimation under communication constraints in the context of Collaborative Signal and Information Processing. Motivated by sensor network applications, a high volume of data collected at distinct locations and possibly in diverse modalities together with the spatially distributed nature and the resource limitations of the underlying system are of concern. Designing processing schemes which match the constraints imposed by the system while providing a reasonable accuracy has been a major challenge in which we are particularly interested in the tradeoff between the estimation performance and the utilization of communications subject to energy and bandwidth constraints. One remarkable approach for decentralized inference in sensor networks is to exploit graphical models together with message passing algorithms. In this framework, after the so-called information graph of the problem is constructed, it is mapped onto the ...

Uney, Murat — Middle East Technical University


Representation Learning in Distributed Networks

The effectiveness of machine learning (ML) in today's applications largely depends on the goodness of the representation of data used within the ML algorithms. While the massiveness in dimension of modern day data often requires lower-dimensional data representations in many applications for efficient use of available computational resources, the use of uncorrelated features is also known to enhance the performance of ML algorithms. Thus, an efficient representation learning solution should focus on dimension reduction as well as uncorrelated feature extraction. Even though Principal Component Analysis (PCA) and linear autoencoders are fundamental data preprocessing tools that are largely used for dimension reduction, when engineered properly they can also be used to extract uncorrelated features. At the same time, factors like ever-increasing volume of data or inherently distributed data generation impede the use of existing centralized solutions for representation learning that require ...

Gang, Arpita — Rutgers University-New Brunswick


Advanced Signal Processing Concepts for Multi-Dimensional Communication Systems

The widespread use of mobile internet and smart applications has led to an explosive growth in mobile data traffic. With the rise of smart homes, smart buildings, and smart cities, this demand is ever growing since future communication systems will require the integration of multiple networks serving diverse sectors, domains and applications, such as multimedia, virtual or augmented reality, machine-to-machine (M2M) communication / the Internet of things (IoT), automotive applications, and many more. Therefore, in the future, the communication systems will not only be required to provide Gbps wireless connectivity but also fulfill other requirements such as low latency and massive machine type connectivity while ensuring the quality of service. Without significant technological advances to increase the system capacity, the existing telecommunications infrastructure will be unable to support these multi-dimensional requirements. This poses an important demand for suitable waveforms with ...

Cheema, Sher Ali — Technische Universität Ilmenau


Stochastic Schemes for Dynamic Network Resource Allocation

Wireless networks and power distribution grids are experiencing increasing demands on their efficiency and reliability. Judicious methods for allocating scarce resources such as power and bandwidth are of paramount importance. As a result, nonlinear optimization and signal processing tools have been incorporated into the design of contemporary networks. This thesis develops schemes for efficient resource allocation (RA) in such dynamic networks, with an emphasis in stochasticity, which is accounted for in the problem formulation as well as in the algorithms and schemes to solve those problems. Stochastic optimization and decomposition techniques are investigated to develop low-complexity algorithms with specific applications in cross-layer design of wireless communications, cognitive radio (CR) networks and smart power distribution systems. The costs and constraints on the availability of network resources, together with diverse quality of service (QoS) requirements, render network design, management, and operation challenging ...

Lopez Ramos, Luis Miguel — King Juan Carlos University


Advanced Grassmannian Constellation Designs for Noncoherent MIMO Communications

In multiple-input multiple-output (MIMO) communications systems, the channel state information (CSI) is typically estimated at the receiver side by sending a few known pilots and then used for decoding at the receiver and/or for precoding at the transmitter. These are known as coherent schemes. However, in scenarios dominated by fast fading or massive MIMO systems dedicated to ultra-reliable low-latency communications (URLLC), getting an accurate channel estimate would require pilots to occupy a disproportionate fraction of communication resources. This becomes also a problem in machine-to-machine (M2M) communications that arise in the so-called Internet of Things (IoT). The advent of 5G and beyond (B5G) systems has introduced these novel scenarios that underscore the need for noncoherent communications schemes in which neither the transmitter nor the receiver has any knowledge about the instantaneous CSI. The Grassmannian and Stiefel manifolds play a significant role ...

Cuevas, Diego — Universidad de Cantabria


Stochastic Optimization in Target Positioning and Location-based Applications

Position information is important for various applications, including location-aware communications, autonomous driving, industrial internet of things (IoT). Geometry-based techniques such as time-of-arrival (TOA), time-difference-of-arrival (TDOA), and angle-of-arrival (AOA) are widely used and can be formed as optimization problems. In order to solve these optimization problems efficiently, stochastic optimization methods are discussed in this work in solving target positioning problems and tackling key issues in location-based applications. Firstly, the direction of arrival (DOA) estimation problem is studied in this work. Grid search is useful in the algorithms such as maximum likelihood estimator (MLE), MUltiple SIgnal Classification (MUSIC), etc. However, the computational cost is the main drawback. To speed up the search procedure, we implement random ferns to extract the features from the beampatterns of different DOAs and use these features to identify potential angle candidates. Then, we propose an ultrasonic air-writing ...

Chen, Hui — King Abdullah University of Science and Technology


Robust and multiresolution video delivery : From H.26x to Matching pursuit based technologies

With the joint development of networking and digital coding technologies multimedia and more particularly video services are clearly becoming one of the major consumers of the new information networks. The rapid growth of the Internet and computer industry however results in a very heterogeneous infrastructure commonly overloaded. Video service providers have nevertheless to oer to their clients the best possible quality according to their respective capabilities and communication channel status. The Quality of Service is not only inuenced by the compression artifacts, but also by unavoidable packet losses. Hence, the packet video stream has clearly to fulll possibly contradictory requirements, that are coding eciency and robustness to data loss. The rst contribution of this thesis is the complete modeling of the video Quality of Service (QoS) in standard and more particularly MPEG-2 applications. The performance of Forward Error Control (FEC) ...

Frossard, Pascal — Swiss Federal Institute of Technology


Toward sparse and geometry adapted video approximations

Video signals are sequences of natural images, where images are often modeled as piecewise-smooth signals. Hence, video can be seen as a 3D piecewise-smooth signal made of piecewise-smooth regions that move through time. Based on the piecewise-smooth model and on related theoretical work on rate-distortion performance of wavelet and oracle based coding schemes, one can better analyze the appropriate coding strategies that adaptive video codecs need to implement in order to be efficient. Efficient video representations for coding purposes require the use of adaptive signal decompositions able to capture appropriately the structure and redundancy appearing in video signals. Adaptivity needs to be such that it allows for proper modeling of signals in order to represent these with the lowest possible coding cost. Video is a very structured signal with high geometric content. This includes temporal geometry (normally represented by motion ...

Divorra Escoda, Oscar — EPFL / Signal Processing Institute


Privacy Protecting Biometric Authentication Systems

As biometrics gains popularity and proliferates into the daily life, there is an increased concern over the loss of privacy and potential misuse of biometric data held in central repositories. The major concerns are about i) the use of biometrics to track people, ii) non-revocability of biometrics (eg. if a fingerprint is compromised it can not be canceled or reissued), and iii) disclosure of sensitive information such as race, gender and health problems which may be revealed by biometric traits. The straightforward suggestion of keeping the biometric data in a user owned token (eg. smart cards) does not completely solve the problem, since malicious users can claim that their token is broken to avoid biometric verification altogether. Put together, these concerns brought the need for privacy preserving biometric authentication methods in the recent years. In this dissertation, we survey existing ...

Kholmatov, Alisher — Sabanci University

The current layout is optimized for mobile phones. Page previews, thumbnails, and full abstracts will remain hidden until the browser window grows in width.

The current layout is optimized for tablet devices. Page previews and some thumbnails will remain hidden until the browser window grows in width.