Sorry, you need to enable JavaScript to visit this website.

Communications and Networking

Distributed Multi-Sensor CPHD with Pairwise Gossiping

Paper Details

Authors:
Jun Ye Yu, Mark Coates, Michael Rabbat
Submitted On:
23 March 2016 - 5:38am
Short Link:
Type:
Event:
Presenter's Name:
Document Year:
Cite

Document Files

Jay- ICASSP Poster V4.pdf

(221 downloads)

Keywords

Subscribe

[1] Jun Ye Yu, Mark Coates, Michael Rabbat, "Distributed Multi-Sensor CPHD with Pairwise Gossiping", IEEE SigPort, 2016. [Online]. Available: http://sigport.org/987. Accessed: Dec. 18, 2017.
@article{987-16,
url = {http://sigport.org/987},
author = {Jun Ye Yu; Mark Coates; Michael Rabbat },
publisher = {IEEE SigPort},
title = {Distributed Multi-Sensor CPHD with Pairwise Gossiping},
year = {2016} }
TY - EJOUR
T1 - Distributed Multi-Sensor CPHD with Pairwise Gossiping
AU - Jun Ye Yu; Mark Coates; Michael Rabbat
PY - 2016
PB - IEEE SigPort
UR - http://sigport.org/987
ER -
Jun Ye Yu, Mark Coates, Michael Rabbat. (2016). Distributed Multi-Sensor CPHD with Pairwise Gossiping. IEEE SigPort. http://sigport.org/987
Jun Ye Yu, Mark Coates, Michael Rabbat, 2016. Distributed Multi-Sensor CPHD with Pairwise Gossiping. Available at: http://sigport.org/987.
Jun Ye Yu, Mark Coates, Michael Rabbat. (2016). "Distributed Multi-Sensor CPHD with Pairwise Gossiping." Web.
1. Jun Ye Yu, Mark Coates, Michael Rabbat. Distributed Multi-Sensor CPHD with Pairwise Gossiping [Internet]. IEEE SigPort; 2016. Available from : http://sigport.org/987

RSS-BASED SENSOR LOCALIZATION IN UNDERWATER ACOUSTIC SENSOR NETWORKS


UWA sensor networks

Since the global positioning system (GPS) is not applicable underwater, source localization using wireless sensor networks (WSNs) is gaining popularity in oceanographic applications. Unlike terrestrial WSNs (TWSNs) which use electromagnetic signaling, underwater WSNs (UWSNs) require underwater acoustic (UWA) signaling. Received signal strength (RSS)-based source localization is considered in this paper due to its practical simplicity and the constraint of low-cost sensor devices, but this area received little attention so far because of the complicated UWA transmission loss (TL) phenomena.

RSSmain.pdf

PDF icon RSSmain.pdf (291 downloads)

Paper Details

Authors:
Tao Xu, Yongchang Hu, Bingbing Zhang, Geert Leus
Submitted On:
20 March 2016 - 10:58pm
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

RSSmain.pdf

(291 downloads)

Keywords

Subscribe

[1] Tao Xu, Yongchang Hu, Bingbing Zhang, Geert Leus , "RSS-BASED SENSOR LOCALIZATION IN UNDERWATER ACOUSTIC SENSOR NETWORKS", IEEE SigPort, 2016. [Online]. Available: http://sigport.org/906. Accessed: Dec. 18, 2017.
@article{906-16,
url = {http://sigport.org/906},
author = {Tao Xu; Yongchang Hu; Bingbing Zhang; Geert Leus },
publisher = {IEEE SigPort},
title = {RSS-BASED SENSOR LOCALIZATION IN UNDERWATER ACOUSTIC SENSOR NETWORKS},
year = {2016} }
TY - EJOUR
T1 - RSS-BASED SENSOR LOCALIZATION IN UNDERWATER ACOUSTIC SENSOR NETWORKS
AU - Tao Xu; Yongchang Hu; Bingbing Zhang; Geert Leus
PY - 2016
PB - IEEE SigPort
UR - http://sigport.org/906
ER -
Tao Xu, Yongchang Hu, Bingbing Zhang, Geert Leus . (2016). RSS-BASED SENSOR LOCALIZATION IN UNDERWATER ACOUSTIC SENSOR NETWORKS. IEEE SigPort. http://sigport.org/906
Tao Xu, Yongchang Hu, Bingbing Zhang, Geert Leus , 2016. RSS-BASED SENSOR LOCALIZATION IN UNDERWATER ACOUSTIC SENSOR NETWORKS. Available at: http://sigport.org/906.
Tao Xu, Yongchang Hu, Bingbing Zhang, Geert Leus . (2016). "RSS-BASED SENSOR LOCALIZATION IN UNDERWATER ACOUSTIC SENSOR NETWORKS." Web.
1. Tao Xu, Yongchang Hu, Bingbing Zhang, Geert Leus . RSS-BASED SENSOR LOCALIZATION IN UNDERWATER ACOUSTIC SENSOR NETWORKS [Internet]. IEEE SigPort; 2016. Available from : http://sigport.org/906

Mobile Beamforming & Spatially Controlled Relay Communications


We consider stochastic motion planning in single-source single-destination robotic relay networks, under a cooperative beamforming framework. Assuming that the communication medium constitutes a spatiotemporal stochastic field, we propose a

Paper Details

Authors:
Dionysios S. Kalogerias, Athina P. Petropulu
Submitted On:
19 March 2016 - 3:27pm
Short Link:
Type:
Event:
Presenter's Name:
Document Year:
Cite

Document Files

Mobile_Beamforming_ICASSP_2016.pdf

(267 downloads)

Keywords

Subscribe

[1] Dionysios S. Kalogerias, Athina P. Petropulu, "Mobile Beamforming & Spatially Controlled Relay Communications", IEEE SigPort, 2016. [Online]. Available: http://sigport.org/831. Accessed: Dec. 18, 2017.
@article{831-16,
url = {http://sigport.org/831},
author = {Dionysios S. Kalogerias; Athina P. Petropulu },
publisher = {IEEE SigPort},
title = {Mobile Beamforming & Spatially Controlled Relay Communications},
year = {2016} }
TY - EJOUR
T1 - Mobile Beamforming & Spatially Controlled Relay Communications
AU - Dionysios S. Kalogerias; Athina P. Petropulu
PY - 2016
PB - IEEE SigPort
UR - http://sigport.org/831
ER -
Dionysios S. Kalogerias, Athina P. Petropulu. (2016). Mobile Beamforming & Spatially Controlled Relay Communications. IEEE SigPort. http://sigport.org/831
Dionysios S. Kalogerias, Athina P. Petropulu, 2016. Mobile Beamforming & Spatially Controlled Relay Communications. Available at: http://sigport.org/831.
Dionysios S. Kalogerias, Athina P. Petropulu. (2016). "Mobile Beamforming & Spatially Controlled Relay Communications." Web.
1. Dionysios S. Kalogerias, Athina P. Petropulu. Mobile Beamforming & Spatially Controlled Relay Communications [Internet]. IEEE SigPort; 2016. Available from : http://sigport.org/831

Robust CDMA Receiver Design under Disguised Jamming

Paper Details

Authors:
Kai Zhou, Tianlong Song, Jian Ren, Tongtong Li
Submitted On:
15 March 2016 - 10:47am
Short Link:
Type:
Event:
Presenter's Name:
Document Year:
Cite

Document Files

ICASSP2016 - Slides.pdf

(232 downloads)

Keywords

Subscribe

[1] Kai Zhou, Tianlong Song, Jian Ren, Tongtong Li, "Robust CDMA Receiver Design under Disguised Jamming", IEEE SigPort, 2016. [Online]. Available: http://sigport.org/690. Accessed: Dec. 18, 2017.
@article{690-16,
url = {http://sigport.org/690},
author = {Kai Zhou; Tianlong Song; Jian Ren; Tongtong Li },
publisher = {IEEE SigPort},
title = {Robust CDMA Receiver Design under Disguised Jamming},
year = {2016} }
TY - EJOUR
T1 - Robust CDMA Receiver Design under Disguised Jamming
AU - Kai Zhou; Tianlong Song; Jian Ren; Tongtong Li
PY - 2016
PB - IEEE SigPort
UR - http://sigport.org/690
ER -
Kai Zhou, Tianlong Song, Jian Ren, Tongtong Li. (2016). Robust CDMA Receiver Design under Disguised Jamming. IEEE SigPort. http://sigport.org/690
Kai Zhou, Tianlong Song, Jian Ren, Tongtong Li, 2016. Robust CDMA Receiver Design under Disguised Jamming. Available at: http://sigport.org/690.
Kai Zhou, Tianlong Song, Jian Ren, Tongtong Li. (2016). "Robust CDMA Receiver Design under Disguised Jamming." Web.
1. Kai Zhou, Tianlong Song, Jian Ren, Tongtong Li. Robust CDMA Receiver Design under Disguised Jamming [Internet]. IEEE SigPort; 2016. Available from : http://sigport.org/690

Directional Maximum Likelihood Self-Estimation of the Path-Loss Exponent


Directional Self-Estimation of the Path-Loss Exponent

The path-loss exponent (PLE) is a key parameter in wireless propagation channels. Therefore, obtaining the knowledge of the PLE is rather significant for assisting wireless communications and networking to achieve a better performance. Most existing methods for estimating the PLE not only require nodes with known locations but also assume an omni-directional PLE. However, the location information might be unavailable or unreliable and, in practice, the PLE might change with the direction.

main.pdf

PDF icon main.pdf (458 downloads)

Paper Details

Authors:
Geert Leus
Submitted On:
11 March 2016 - 6:03pm
Short Link:
Type:
Event:
Presenter's Name:
Document Year:
Cite

Document Files

main.pdf

(458 downloads)

Keywords

Additional Categories

Subscribe

[1] Geert Leus, "Directional Maximum Likelihood Self-Estimation of the Path-Loss Exponent", IEEE SigPort, 2016. [Online]. Available: http://sigport.org/613. Accessed: Dec. 18, 2017.
@article{613-16,
url = {http://sigport.org/613},
author = {Geert Leus },
publisher = {IEEE SigPort},
title = {Directional Maximum Likelihood Self-Estimation of the Path-Loss Exponent},
year = {2016} }
TY - EJOUR
T1 - Directional Maximum Likelihood Self-Estimation of the Path-Loss Exponent
AU - Geert Leus
PY - 2016
PB - IEEE SigPort
UR - http://sigport.org/613
ER -
Geert Leus. (2016). Directional Maximum Likelihood Self-Estimation of the Path-Loss Exponent. IEEE SigPort. http://sigport.org/613
Geert Leus, 2016. Directional Maximum Likelihood Self-Estimation of the Path-Loss Exponent. Available at: http://sigport.org/613.
Geert Leus. (2016). "Directional Maximum Likelihood Self-Estimation of the Path-Loss Exponent." Web.
1. Geert Leus. Directional Maximum Likelihood Self-Estimation of the Path-Loss Exponent [Internet]. IEEE SigPort; 2016. Available from : http://sigport.org/613

Time-Reversal Tunneling Effects for Cloud Radio Access Network

Paper Details

Authors:
Beibei Wang
Submitted On:
23 February 2016 - 1:44pm
Short Link:
Type:
Document Year:
Cite

Document Files

CRAN_final.pdf

(338 downloads)

Keywords

Subscribe

[1] Beibei Wang, "Time-Reversal Tunneling Effects for Cloud Radio Access Network", IEEE SigPort, 2015. [Online]. Available: http://sigport.org/571. Accessed: Dec. 18, 2017.
@article{571-15,
url = {http://sigport.org/571},
author = {Beibei Wang },
publisher = {IEEE SigPort},
title = {Time-Reversal Tunneling Effects for Cloud Radio Access Network},
year = {2015} }
TY - EJOUR
T1 - Time-Reversal Tunneling Effects for Cloud Radio Access Network
AU - Beibei Wang
PY - 2015
PB - IEEE SigPort
UR - http://sigport.org/571
ER -
Beibei Wang. (2015). Time-Reversal Tunneling Effects for Cloud Radio Access Network. IEEE SigPort. http://sigport.org/571
Beibei Wang, 2015. Time-Reversal Tunneling Effects for Cloud Radio Access Network. Available at: http://sigport.org/571.
Beibei Wang. (2015). "Time-Reversal Tunneling Effects for Cloud Radio Access Network." Web.
1. Beibei Wang. Time-Reversal Tunneling Effects for Cloud Radio Access Network [Internet]. IEEE SigPort; 2015. Available from : http://sigport.org/571

Detection of False Data Injection Attacks in Smart Grid Communication Systems


The transformation of traditional energy networks to smart grids can assist in revolutionizing the energy industry
in terms of reliability, performance and manageability. However, increased connectivity of power grid assets for bidirectional communications presents severe security vulnerabilities. In this paper, we investigate Chi-square detector and cosine similarity matching approaches for attack detection in smart grids where Kalman filter estimation is used to measure any deviation from actual measurements. The cosine similarity matching approach is

Paper Details

Authors:
Chandra Bajracharya
Submitted On:
23 February 2016 - 1:44pm
Short Link:
Type:
Event:
Presenter's Name:
Document Year:
Cite

Document Files

Attack Detection in Smart Grid @ GlobalSIP 2015.pdf

(320 downloads)

Keywords

Subscribe

[1] Chandra Bajracharya, "Detection of False Data Injection Attacks in Smart Grid Communication Systems", IEEE SigPort, 2015. [Online]. Available: http://sigport.org/538. Accessed: Dec. 18, 2017.
@article{538-15,
url = {http://sigport.org/538},
author = {Chandra Bajracharya },
publisher = {IEEE SigPort},
title = {Detection of False Data Injection Attacks in Smart Grid Communication Systems},
year = {2015} }
TY - EJOUR
T1 - Detection of False Data Injection Attacks in Smart Grid Communication Systems
AU - Chandra Bajracharya
PY - 2015
PB - IEEE SigPort
UR - http://sigport.org/538
ER -
Chandra Bajracharya. (2015). Detection of False Data Injection Attacks in Smart Grid Communication Systems. IEEE SigPort. http://sigport.org/538
Chandra Bajracharya, 2015. Detection of False Data Injection Attacks in Smart Grid Communication Systems. Available at: http://sigport.org/538.
Chandra Bajracharya. (2015). "Detection of False Data Injection Attacks in Smart Grid Communication Systems." Web.
1. Chandra Bajracharya. Detection of False Data Injection Attacks in Smart Grid Communication Systems [Internet]. IEEE SigPort; 2015. Available from : http://sigport.org/538

Detection of False Data Injection Attacks in Smart Grid Communication Systems


The transformation of traditional energy networks to smart grids can assist in revolutionizing the energy industry in terms of reliability, performance and manageability. However, increased connectivity of power grid assets for bidirectional communications presents severe security vulnerabilities. In this paper, we investigate Chi-square detector and cosine similarity matching approaches for attack detection in smart grids where Kalman filter estimation is used to measure any deviation from actual measurements.

Paper Details

Authors:
Chandra Bajracharya
Submitted On:
23 February 2016 - 1:44pm
Short Link:
Type:
Event:
Document Year:
Cite

Document Files

Attack Detection in Smart Grid @ GlobalSIP 2015.pdf

(323 downloads)

Keywords

Subscribe

[1] Chandra Bajracharya, "Detection of False Data Injection Attacks in Smart Grid Communication Systems", IEEE SigPort, 2015. [Online]. Available: http://sigport.org/529. Accessed: Dec. 18, 2017.
@article{529-15,
url = {http://sigport.org/529},
author = {Chandra Bajracharya },
publisher = {IEEE SigPort},
title = {Detection of False Data Injection Attacks in Smart Grid Communication Systems},
year = {2015} }
TY - EJOUR
T1 - Detection of False Data Injection Attacks in Smart Grid Communication Systems
AU - Chandra Bajracharya
PY - 2015
PB - IEEE SigPort
UR - http://sigport.org/529
ER -
Chandra Bajracharya. (2015). Detection of False Data Injection Attacks in Smart Grid Communication Systems. IEEE SigPort. http://sigport.org/529
Chandra Bajracharya, 2015. Detection of False Data Injection Attacks in Smart Grid Communication Systems. Available at: http://sigport.org/529.
Chandra Bajracharya. (2015). "Detection of False Data Injection Attacks in Smart Grid Communication Systems." Web.
1. Chandra Bajracharya. Detection of False Data Injection Attacks in Smart Grid Communication Systems [Internet]. IEEE SigPort; 2015. Available from : http://sigport.org/529

On the Energy Efficiency of Opportunistic Access in Wireless Home Networks


In this paper, we evaluate the energy efficiency of opportunistic channel access when used in wireless home networking applications. The main idea is to prioritize the access rights of the wireless home applications sharing a given IEEE 802.11 channel. A low priority network can opportunistically access the channel during the inactive periods of a high priority network.

Paper Details

Authors:
Submitted On:
23 February 2016 - 1:44pm
Short Link:
Type:
Event:
Presenter's Name:
Document Year:
Cite

Document Files

GlobalSIP_2015_khattab.pdf

(310 downloads)

Keywords

Subscribe

[1] , "On the Energy Efficiency of Opportunistic Access in Wireless Home Networks", IEEE SigPort, 2015. [Online]. Available: http://sigport.org/523. Accessed: Dec. 18, 2017.
@article{523-15,
url = {http://sigport.org/523},
author = { },
publisher = {IEEE SigPort},
title = {On the Energy Efficiency of Opportunistic Access in Wireless Home Networks},
year = {2015} }
TY - EJOUR
T1 - On the Energy Efficiency of Opportunistic Access in Wireless Home Networks
AU -
PY - 2015
PB - IEEE SigPort
UR - http://sigport.org/523
ER -
. (2015). On the Energy Efficiency of Opportunistic Access in Wireless Home Networks. IEEE SigPort. http://sigport.org/523
, 2015. On the Energy Efficiency of Opportunistic Access in Wireless Home Networks. Available at: http://sigport.org/523.
. (2015). "On the Energy Efficiency of Opportunistic Access in Wireless Home Networks." Web.
1. . On the Energy Efficiency of Opportunistic Access in Wireless Home Networks [Internet]. IEEE SigPort; 2015. Available from : http://sigport.org/523

Foresighted Resource Scheduling in Software-Defined Radio Access Networks

Paper Details

Authors:
Zhu Han, Honggang Zhang, Mehdi Bennis, Tao Chen
Submitted On:
23 February 2016 - 1:38pm
Short Link:
Type:
Event:
Presenter's Name:
Document Year:
Cite

Document Files

conference-ornate-20min.en_.pdf

(305 downloads)

Keywords

Subscribe

[1] Zhu Han, Honggang Zhang, Mehdi Bennis, Tao Chen, "Foresighted Resource Scheduling in Software-Defined Radio Access Networks", IEEE SigPort, 2015. [Online]. Available: http://sigport.org/502. Accessed: Dec. 18, 2017.
@article{502-15,
url = {http://sigport.org/502},
author = {Zhu Han; Honggang Zhang; Mehdi Bennis; Tao Chen },
publisher = {IEEE SigPort},
title = {Foresighted Resource Scheduling in Software-Defined Radio Access Networks},
year = {2015} }
TY - EJOUR
T1 - Foresighted Resource Scheduling in Software-Defined Radio Access Networks
AU - Zhu Han; Honggang Zhang; Mehdi Bennis; Tao Chen
PY - 2015
PB - IEEE SigPort
UR - http://sigport.org/502
ER -
Zhu Han, Honggang Zhang, Mehdi Bennis, Tao Chen. (2015). Foresighted Resource Scheduling in Software-Defined Radio Access Networks. IEEE SigPort. http://sigport.org/502
Zhu Han, Honggang Zhang, Mehdi Bennis, Tao Chen, 2015. Foresighted Resource Scheduling in Software-Defined Radio Access Networks. Available at: http://sigport.org/502.
Zhu Han, Honggang Zhang, Mehdi Bennis, Tao Chen. (2015). "Foresighted Resource Scheduling in Software-Defined Radio Access Networks." Web.
1. Zhu Han, Honggang Zhang, Mehdi Bennis, Tao Chen. Foresighted Resource Scheduling in Software-Defined Radio Access Networks [Internet]. IEEE SigPort; 2015. Available from : http://sigport.org/502

Pages