Ad hoc network users are resource constrained: Before transmitting data, they have to take into account the energy expenditure involved. Even if a user is, in principle, willing to spend energy to improve network conn...
详细信息
Ad hoc network users are resource constrained: Before transmitting data, they have to take into account the energy expenditure involved. Even if a user is, in principle, willing to spend energy to improve network connectivity, his actual decision will be heavily influenced by the decisions of his neighboring users, since they act as relay nodes for him. Moreover, some of the neighbors may not be as benign as he is; in fact, they could be outright malicious. We are abstracting the tradeoff between spending energy and increasing connectivity by modeling the interaction of a user with his one-hop neighbors in a game theoretic fashion. Two types of users exist: Good users willingly trade energy for connectivity, but only if they expect their neighbors to do the same; Bad users try to destroy connectivity, but also lure the Good users to waste energy. Within our model for user behavior and sophistication, we explore outcomes that can arise in this graphical game.
A novel underwater thruster was designed to provide quantized level of thrusts for underwater vehicle maneuvering with a minimal effect on the drag profile of the vehicle. The design was inspired by the efficient and ...
详细信息
ISBN:
(纸本)9783902823199
A novel underwater thruster was designed to provide quantized level of thrusts for underwater vehicle maneuvering with a minimal effect on the drag profile of the vehicle. The design was inspired by the efficient and agile locomotion mechanism in squid and jellyfish, which is characterized by formation of vortex rings from pulsatile jets. There have been several successful implementations of the device on a series of autonomous underwater vehicles in our group. In this paper, a robust adaptive control algorithm is formulated for future vehicles with new, more compact thrusters of this type. Control strategy for motion in 6 degrees of freedom, together with corresponding force allocation method is developed and is tested in simulation, where an asymptotic position and velocity tracking result is obtained.
In this paper, we identify the security and privacy issues specific to wireless health monitoring devices and describe solutions for protecting wireless communications against side channel attacks and in particular tr...
详细信息
In this paper, we identify the security and privacy issues specific to wireless health monitoring devices and describe solutions for protecting wireless communications against side channel attacks and in particular traffic analysis attacks. This process takes place by means of data obfuscation and modifications of communication protocol architectures in order to limit exposed information of system architecture to potential attackers. Initial network simulations of the proposed methods show the feasibility of these methods.
In this work, we study the inverse problem of identifying complex flocking dynamics in a domain cluttered with obstacles. We get inspiration from animal flocks moving in complex ways with capabilities far beyond what ...
In this work, we study the inverse problem of identifying complex flocking dynamics in a domain cluttered with obstacles. We get inspiration from animal flocks moving in complex ways with capabilities far beyond what current robots can do. Owing to the difficulty of observing and recovering the trajectories of the agents, we focus on the dynamics of their probability densities, which are governed by partial differential equations (PDEs), namely compressible Euler equations subject to non-local forces. We formulate the inverse problem of learning interactions as a PDE-constrained optimization problem of minimizing the squared Hellinger distance between the histogram of the flock and the distribution associated to our PDEs. The numerical methods used to efficiently solve the PDE-constrained optimization problem are described. Realistic flocking data are simulated using the Boids model of flocking agents, which differs in nature from the reconstruction models used in our PDEs. Our analysis and simulated experiments show that the behavior of cohesive flocks can be recovered accurately with approximate PDE solutions.
The capacity region of an asynchronous system with two sources and two receivers is analyzed. The capacity region is first derived for a general discrete memoryless channel. The result is then applied to a random acce...
详细信息
ISBN:
(纸本)142440505X
The capacity region of an asynchronous system with two sources and two receivers is analyzed. The capacity region is first derived for a general discrete memoryless channel. The result is then applied to a random access system in which sources may either transmit information-bearing symbols or idle (empty) symbols in each time slot. The capacity region for this random access system is compared to the corresponding queueing stability region and it is demonstrated that the two regions do not coincide. This comparison is the primary contribution of our work; our result is a deviation from all previous results on the relation between information-theoretic capacity and queueing stability for random access systems
This paper compares the performance of parametric and non-parametric sequential change detection algorithms for detecting in-band wormholes in wireless ad hoc networks. The algorithms considered are the non-parametric...
详细信息
This paper compares the performance of parametric and non-parametric sequential change detection algorithms for detecting in-band wormholes in wireless ad hoc networks. The algorithms considered are the non-parametric cumulative sum (NP-CUSUM) and the repeated sequential probability ratio test (R-SPRT). Theoretical performance of the two is compared using metrics that take into account the algorithms' repeated nature, and the advantage of the parametric method is illustrated. On the other hand, connections between the parametric and non-parametric methods are made in the proposed worst case adversary model, where the non-parametric method is shown to be more robust to attack strategy changes. Experimental evaluation of wormhole detection schemes based on the two algorithms is presented. This work has implications for both the theoretical understanding and practical design of wormhole detection schemes based on parametric and nonparametric change detection algorithms.
In this paper, we consider a two-step decentralized control problem with two agents which are not co-located. The first agent is located at the source of a disturbance, it can measure the disturbance with high accurac...
详细信息
ISBN:
(纸本)1424401704;9781424401703
In this paper, we consider a two-step decentralized control problem with two agents which are not co-located. The first agent is located at the source of a disturbance, it can measure the disturbance with high accuracy and it can perform local actuation, while communicating with the second agent via a Gaussian channel with a prescribed signal to noise ratio. What remains of the disturbance, after the control action of the first agent, will hit the second agent after a fixed delay. The second agent has noisy measurements as well as the information conveyed through the communication channel to decide on the best strategy to reduce the effects of the remaining disturbance. The control design paradigm is to minimize a quadratic cost combining the control power of the first agent and the final effect of the disturbance at the second agent. Such a framework can be viewed as an extension of the well known Witsenhausen's counter-example which did not include a communication channel. In the absence of a channel, Hans Witsenhausen has shown, by means of an example, that nonlinear strategies outperform the best linear strategy. This result is not obvious because the framework is linear and Gaussian, and the cost is quadratic. In this paper, we give an example illustrating that Witsenhausen's conclusion holds for our framework where a communication channel is present. We provide numerical results showing that, for a large range of the signal to noise ratio at the channel, nonlinear strategies strongly out-perform the best linear strategies
Learning performance data (e.g., quiz scores and attempts) is significant for understanding learner engagement and knowledge mastery level. However, the learning performance data collected from Intelligent Tutoring Sy...
详细信息
Situational awareness requires maintaining a reasonable level of communication connectivity in networks of autonomous vehicles. It is difficult to overcome deep fading from time-varying wireless channels in a dynamic ...
详细信息
Situational awareness requires maintaining a reasonable level of communication connectivity in networks of autonomous vehicles. It is difficult to overcome deep fading from time-varying wireless channels in a dynamic and resource constrained environment. Moreover, other system constraints such as the energy consumption and total operation time make the design of communication protocols for such systems more challenging. In this paper, we consider the problem of efficient communications between a group of autonomous vehicles with energy consumption and total operation time constraints in an adversarial environment. We show that the policy of continuously attempting to communicate reliably over the course of the mission may lead to considerable system degradation. We propose an adaptive algorithm to make communication attempts opportunistically, based on the qualities of the wireless channels as the vehicles move throughout the terrain. We compare the proposed algorithm with a non-opportunistic algorithm in which the vehicles blindly attempt to communicate regularly throughout the course of the mission. We show that the proposed algorithm significantly improves the system performance, both in terms of operation time when the agents transmit only situational information and data throughput when additional data transmission is necessary.
The detection of voices or the rumble of engines is a desirable function in many different devices from toys to smart homes to military applications. Typical approaches involving frequency-domain computation are quite...
详细信息
The detection of voices or the rumble of engines is a desirable function in many different devices from toys to smart homes to military applications. Typical approaches involving frequency-domain computation are quite computationally intensive and require a significant power and computational budget. In an effort to construct a very low-power detector capable of acting as a wake-up signal for other systems, we have designed a simple, low-power (1.5 /spl mu/W) analog VLSI circuit that detects periodicity in the time-domain envelope of the acoustic signal. The circuit was fabricated in a commercially 1.5 /spl mu/m available CMOS process.
暂无评论