596 results on '"Blum, Rick S."'
Search Results
2. Data-Driven Dynamic State Estimation of Photovoltaic Systems via Sparse Regression Unscented Kalman Filter
- Author
-
Jamalinia, Elham, Zhang, Zhongtian, Khazaei, Javad, and Blum, Rick S.
- Subjects
Electrical Engineering and Systems Science - Systems and Control - Abstract
Dynamic state estimation (DSE) is vital in modern power systems with numerous inverter-based distributed energy resources including solar and wind, ensuring real-time accuracy for tracking system variables and optimizing grid stability. This paper proposes a data-driven DSE approach designed for photovoltaic (PV) energy conversion systems (single stage and two stage) that are subjected to both process and measurement noise. The proposed framework follows a two-phase methodology encompassing ``data-driven model identification" and ``state-estimation." In the initial model identification phase, state feedback is gathered to elucidate the dynamics of the photovoltaic systems using nonlinear sparse regression technique. Following the identification of the PV dynamics, the nonlinear data-driven model will be utilized to estimate the dynamics of the PV system for monitoring and protection purposes. To account for incomplete measurements, inherent uncertainties, and noise, we employ an ``unscented Kalman filter," which facilitates state estimation by processing the noisy output data. Ultimately, the paper substantiates the efficacy of the proposed sparse regression-based unscented Kalman filter through simulation results, providing a comparative analysis with a physics-based DSE.
- Published
- 2024
3. Incorporating Domain Differential Equations into Graph Convolutional Networks to Lower Generalization Discrepancy
- Author
-
Sun, Yue, Chen, Chao, Xu, Yuesheng, Xie, Sihong, Blum, Rick S., and Venkitasubramaniam, Parv
- Subjects
Computer Science - Machine Learning ,Computer Science - Artificial Intelligence - Abstract
Ensuring both accuracy and robustness in time series prediction is critical to many applications, ranging from urban planning to pandemic management. With sufficient training data where all spatiotemporal patterns are well-represented, existing deep-learning models can make reasonably accurate predictions. However, existing methods fail when the training data are drawn from different circumstances (e.g., traffic patterns on regular days) compared to test data (e.g., traffic patterns after a natural disaster). Such challenges are usually classified under domain generalization. In this work, we show that one way to address this challenge in the context of spatiotemporal prediction is by incorporating domain differential equations into Graph Convolutional Networks (GCNs). We theoretically derive conditions where GCNs incorporating such domain differential equations are robust to mismatched training and testing data compared to baseline domain agnostic models. To support our theory, we propose two domain-differential-equation-informed networks called Reaction-Diffusion Graph Convolutional Network (RDGCN), which incorporates differential equations for traffic speed evolution, and Susceptible-Infectious-Recovered Graph Convolutional Network (SIRGCN), which incorporates a disease propagation model. Both RDGCN and SIRGCN are based on reliable and interpretable domain differential equations that allow the models to generalize to unseen patterns. We experimentally show that RDGCN and SIRGCN are more robust with mismatched testing data than the state-of-the-art deep learning methods.
- Published
- 2024
4. Communication-Efficient {Federated} Learning Using Censored Heavy Ball Descent
- Author
-
Chen, Yicheng, Blum, Rick S., and Sadler, Brian M.
- Subjects
Computer Science - Machine Learning ,Computer Science - Artificial Intelligence - Abstract
Distributed machine learning enables scalability and computational offloading, but requires significant levels of communication. Consequently, communication efficiency in distributed learning settings is an important consideration, especially when the communications are wireless and battery-driven devices are employed. In this paper we develop a censoring-based heavy ball (CHB) method for distributed learning in a server-worker architecture. Each worker self-censors unless its local gradient is sufficiently different from the previously transmitted one. The significant practical advantages of the HB method for learning problems are well known, but the question of reducing communications has not been addressed. CHB takes advantage of the HB smoothing to eliminate reporting small changes, and provably achieves a linear convergence rate equivalent to that of the classical HB method for smooth and strongly convex objective functions. The convergence guarantee of CHB is theoretically justified for both convex and nonconvex cases. In addition we prove that, under some conditions, at least half of all communications can be eliminated without any impact on convergence rate. Extensive numerical results validate the communication efficiency of CHB on both synthetic and real datasets, for convex, nonconvex, and nondifferentiable cases. Given a target accuracy, CHB can significantly reduce the number of communications compared to existing algorithms, achieving the same accuracy without slowing down the optimization process.
- Published
- 2022
5. Route Discovery and Capacity of Ad hoc Networks
- Author
-
Perevalov, Eugene, Blum, Rick S., Chen, Xun, and Nigara, Anthony
- Subjects
Computer Science - Networking and Internet Architecture ,Electrical Engineering and Systems Science - Systems and Control - Abstract
Throughput capacity of large ad hoc networks has been shown to scale adversely with the size of network $n$. However the need for the nodes to find or repair routes has not been analyzed in this context. In this paper, we explicitly take route discovery into account and obtain the scaling law for the throughput capacity under general assumptions on the network environment, node behavior, and the quality of route discovery algorithms. We also discuss a number of possible scenarios and show that the need for route discovery may change the scaling for the throughput capacity dramatically., Comment: extended version, originally published in conference (IEEE GLOBECOM '05)
- Published
- 2022
6. Communication Efficient Federated Learning via Ordered ADMM in a Fully Decentralized Setting
- Author
-
Chen, Yicheng, Blum, Rick S., and Sadler, Brian M.
- Subjects
Computer Science - Machine Learning ,Computer Science - Artificial Intelligence - Abstract
The challenge of communication-efficient distributed optimization has attracted attention in recent years. In this paper, a communication efficient algorithm, called ordering-based alternating direction method of multipliers (OADMM) is devised in a general fully decentralized network setting where a worker can only exchange messages with neighbors. Compared to the classical ADMM, a key feature of OADMM is that transmissions are ordered among workers at each iteration such that a worker with the most informative data broadcasts its local variable to neighbors first, and neighbors who have not transmitted yet can update their local variables based on that received transmission. In OADMM, we prohibit workers from transmitting if their current local variables are not sufficiently different from their previously transmitted value. A variant of OADMM, called SOADMM, is proposed where transmissions are ordered but transmissions are never stopped for each node at each iteration. Numerical results demonstrate that given a targeted accuracy, OADMM can significantly reduce the number of communications compared to existing algorithms including ADMM. We also show numerically that SOADMM can accelerate convergence, resulting in communication savings compared to the classical ADMM.
- Published
- 2022
7. Distributed Learning With Sparsified Gradient Differences
- Author
-
Chen, Yicheng, Blum, Rick S., Takac, Martin, and Sadler, Brian M.
- Subjects
Computer Science - Machine Learning ,Computer Science - Artificial Intelligence - Abstract
A very large number of communications are typically required to solve distributed learning tasks, and this critically limits scalability and convergence speed in wireless communications applications. In this paper, we devise a Gradient Descent method with Sparsification and Error Correction (GD-SEC) to improve the communications efficiency in a general worker-server architecture. Motivated by a variety of wireless communications learning scenarios, GD-SEC reduces the number of bits per communication from worker to server with no degradation in the order of the convergence rate. This enables larger-scale model learning without sacrificing convergence or accuracy. At each iteration of GD-SEC, instead of directly transmitting the entire gradient vector, each worker computes the difference between its current gradient and a linear combination of its previously transmitted gradients, and then transmits the sparsified gradient difference to the server. A key feature of GD-SEC is that any given component of the gradient difference vector will not be transmitted if its magnitude is not sufficiently large. An error correction technique is used at each worker to compensate for the error resulting from sparsification. We prove that GD-SEC is guaranteed to converge for strongly convex, convex, and nonconvex optimization problems with the same order of convergence rate as GD. Furthermore, if the objective function is strongly convex, GD-SEC has a fast linear convergence rate. Numerical results not only validate the convergence rate of GD-SEC but also explore the communication bit savings it provides. Given a target accuracy, GD-SEC can significantly reduce the communications load compared to the best existing algorithms without slowing down the optimization process.
- Published
- 2022
8. Training Robust Graph Neural Networks with Topology Adaptive Edge Dropping
- Author
-
Gao, Zhan, Bhattacharya, Subhrajit, Zhang, Leiming, Blum, Rick S., Ribeiro, Alejandro, and Sadler, Brian M.
- Subjects
Computer Science - Machine Learning ,Electrical Engineering and Systems Science - Signal Processing - Abstract
Graph neural networks (GNNs) are processing architectures that exploit graph structural information to model representations from network data. Despite their success, GNNs suffer from sub-optimal generalization performance given limited training data, referred to as over-fitting. This paper proposes Topology Adaptive Edge Dropping (TADropEdge) method as an adaptive data augmentation technique to improve generalization performance and learn robust GNN models. We start by explicitly analyzing how random edge dropping increases the data diversity during training, while indicating i.i.d. edge dropping does not account for graph structural information and could result in noisy augmented data degrading performance. To overcome this issue, we consider graph connectivity as the key property that captures graph topology. TADropEdge incorporates this factor into random edge dropping such that the edge-dropped subgraphs maintain similar topology as the underlying graph, yielding more satisfactory data augmentation. In particular, TADropEdge first leverages the graph spectrum to assign proper weights to graph edges, which represent their criticality for establishing the graph connectivity. It then normalizes the edge weights and drops graph edges adaptively based on their normalized weights. Besides improving generalization performance, TADropEdge reduces variance for efficient training and can be applied as a generic method modular to different GNN models. Intensive experiments on real-life and synthetic datasets corroborate theory and verify the effectiveness of the proposed method.
- Published
- 2021
9. Fundamental Limits for ISAC—Radar Perspective
- Author
-
Wang, Zhen, He, Qian, Blum, Rick S., Liu, Fan, editor, Masouros, Christos, editor, and Eldar, Yonina C., editor
- Published
- 2023
- Full Text
- View/download PDF
10. Inter-cluster Transmission Control Using Graph Modal Barriers
- Author
-
Zhang, Leiming, Sadler, Brian M., Blum, Rick S., and Bhattacharya, Subhrajit
- Subjects
Computer Science - Social and Information Networks - Abstract
In this paper we consider the problem of transmission across a graph and how to effectively control/restrict it with limited resources. Transmission can represent information transfer across a social network, spread of a malicious virus across a computer network, or spread of an infectious disease across communities. The key insight is to assign proper weights to bottleneck edges of the graph based on their role in reducing the connection between two or more strongly-connected clusters within the graph. Selectively reducing the weights (implying reduced transmission rate) on the critical edges helps limit the transmission from one cluster to another. We refer to these as barrier weights and their computation is based on the eigenvectors of the graph Laplacian. Unlike other work on graph partitioning and clustering, we completely circumvent the associated computational complexities by assigning weights to edges instead of performing discrete graph cuts. This allows us to provide strong theoretical results on our proposed methods. We also develop approximations that allow low complexity distributed computation of the barrier weights using only neighborhood communication on the graph., Comment: 16 pages
- Published
- 2020
11. Ordering for Communication-Efficient Quickest Change Detection in a Decomposable Graphical Model
- Author
-
Chen, Yicheng, Blum, Rick S., and Sadler, Brian M.
- Subjects
Electrical Engineering and Systems Science - Signal Processing - Abstract
A quickest change detection problem is considered in a sensor network with observations whose statistical dependency structure across the sensors before and after the change is described by a decomposable graphical model (DGM). Distributed computation methods for this problem are proposed that are capable of producing the optimum centralized test statistic. The DGM leads to the proper way to collect nodes into local groups equivalent to cliques in the graph, such that a clique statistic which summarizes all the clique sensor data can be computed within each clique. The clique statistics are transmitted to a decision maker to produce the optimum centralized test statistic. In order to further improve communication efficiency, an ordered transmission approach is proposed where transmissions of the clique statistics to the fusion center are ordered and then adaptively halted when sufficient information is accumulated. This procedure is always guaranteed to provide the optimal change detection performance, despite not transmitting all the statistics from all the cliques. A lower bound on the average number of transmissions saved by ordered transmissions is provided and for the case where the change seldom occurs the lower bound approaches approximately half the number of cliques provided a well behaved distance measure between the distributions of the sensor observations before and after the change is sufficiently large. We also extend the approach to the case when the graph structure is different under each hypothesis. Numerical results show significant savings using the ordered transmission approach and validate the theoretical findings.
- Published
- 2020
- Full Text
- View/download PDF
12. A Statistical Learning-Based Algorithm for Topology Verification in Natural Gas Networks Based on Noisy Sensor Measurements
- Author
-
Wang, Zisheng and Blum, Rick S.
- Subjects
Electrical Engineering and Systems Science - Signal Processing - Abstract
Accurate knowledge of natural gas network topology is critical for the proper operation of natural gas networks. Failures, physical attacks, and cyber attacks can cause the actual natural gas network topology to differ from what the operator believes to be present. Incorrect topology information misleads the operator to apply inappropriate control causing damage and lack of gas supply. Several methods for verifying the topology have been suggested in the literature for electrical power distribution networks, but we are not aware of any publications for natural gas networks. In this paper, we develop a useful topology verification algorithm for natural gas networks based on modifying a general known statistics-based approach to eliminate serious limitations for this application while maintaining good performance. We prove that the new algorithm is equivalent to the original statistics-based approach for a sufficiently large number of sensor observations. We provide new closed-form expressions for the asymptotic performance that are shown to be accurate for the typical number of sensor observations required to achieve reliable performance.
- Published
- 2020
13. Robust Clock Skew and Offset Estimation for IEEE 1588 in the Presence of Unexpected Deterministic Path Delay Asymmetries
- Author
-
Karthik, Anantha K. and Blum, Rick S.
- Subjects
Electrical Engineering and Systems Science - Signal Processing - Abstract
IEEE 1588, built on the classical two-way message exchange scheme, is a popular clock synchronization protocol for packet-switched networks. Due to the presence of random queuing delays in a packet-switched network, the joint recovery of the clock skew and offset from the timestamps of the exchanged synchronization packets can be treated as a statistical estimation problem. In this paper, we address the problem of clock skew and offset estimation for IEEE 1588 in the presence of possible unknown asymmetries between the {\color{black} deterministic path delays} of the forward master-to-slave path and reverse slave-to-master path, which can result from incorrect modeling or cyber-attacks. First, we develop lower bounds on the mean square estimation error for a clock skew and offset estimation scheme for IEEE 1588 assuming the availability of multiple master-slave communication paths and complete knowledge of the probability density functions (pdf) describing the random queuing delays. Approximating the pdf of the random queuing delays by a mixture of Gaussian random variables, we then present a robust iterative clock skew and offset estimation scheme that employs the space alternating generalized expectation-maximization (SAGE) algorithm for learning all the unknown parameters. Numerical results indicate that the developed robust scheme exhibits a mean square estimation error close to the lower bounds., Comment: 6 Figures
- Published
- 2020
14. Testing the Structure of a Gaussian Graphical Model with Reduced Transmissions in a Distributed Setting
- Author
-
Chen, Yicheng, Blum, Rick S., Sadler, Brian M., and Zhang, Jiangfan
- Subjects
Electrical Engineering and Systems Science - Signal Processing - Abstract
Testing a covariance matrix following a Gaussian graphical model (GGM) is considered in this paper based on observations made at a set of distributed sensors grouped into clusters. Ordered transmissions are proposed to achieve the same Bayes risk as the optimum centralized energy unconstrained approach but with fewer transmissions and a completely distributed approach. In this approach, we represent the Bayes optimum test statistic as a sum of local test statistics which can be calculated by only utilizing the observations available at one cluster. We select one sensor to be the cluster head (CH) to collect and summarize the observed data in each cluster and intercluster communications are assumed to be inexpensive. The CHs with more informative observations transmit their data to the fusion center (FC) first. By halting before all transmissions have taken place, transmissions can be saved without performance loss. It is shown that this ordering approach can guarantee a lower bound on the average number of transmissions saved for any given GGM and the lower bound can approach approximately half the number of clusters when the minimum eigenvalue of the covariance matrix under the alternative hypothesis in each cluster becomes sufficiently large.
- Published
- 2019
- Full Text
- View/download PDF
15. Sensor Placement for Outage Identifiability in Power Distribution Networks
- Author
-
Samudrala, Ananth Narayan, Amini, M. Hadi, Kar, Soummya, and Blum, Rick S.
- Subjects
Computer Science - Systems and Control - Abstract
Accurate topology information is critical for effective operation of power distribution networks. Line outages change the operational topology of a distribution network. Hence, outage detection is an important task. Power distribution networks are operated as radial trees and are recently adopting the integration of advanced sensors to monitor the network in real time. In this paper, a dynamic-programming-based minimum cost sensor placement solution is proposed for outage identifiability. We propose a novel formulation of the sensor placement as a cost optimization problem involving binary placement decisions, and then provide an algorithm based on dynamic programming to solve it in polynomial time. The advantage of the proposed placement strategy is that it incorporates various types of sensors, is independent of time varying load statistics, has a polynomial execution time and is cost effective. Numerical results illustrating the proposed sensor placement solution are presented for multiple feeder models including standard IEEE test feeders., Comment: arXiv admin note: text overlap with arXiv:1901.11104
- Published
- 2019
16. Minimax Optimum Clock Skew and Offset Estimators for IEEE 1588
- Author
-
Karthik, Anantha K. and Blum, Rick S.
- Subjects
Electrical Engineering and Systems Science - Signal Processing - Abstract
This paper addresses the problem of clock skew and offset estimation for the IEEE 1588 precision time protocol. Built on the classical two-way message exchange scheme, IEEE 1588 is a prominent synchronization protocol for packet switched networks. It is employed in various applications including cellular base station synchronization in 4G long-term evaluation backhaul networks, substation synchronization in electrical grid networks and industrial control. Due to the presence of random queuing delays in a packet switched network, the recovery of clock skew and offset from the received packet timestamps can be viewed as a statistical estimation problem. Recently, assuming perfect clock skew information, minimax optimum clock offset estimators were developed for IEEE 1588. Building on this work, we develop minimax optimum clock skew and offset estimators for IEEE 1588 in this paper. Simulation results indicate the proposed minimax estimators exhibit a lower mean square estimation error than the estimators available in the literature for various network scenarios.
- Published
- 2018
17. On the Impact of Unknown Signals in Passive Radar with Direct Path and Reflected Path Observations
- Author
-
Chen, Yicheng and Blum, Rick S.
- Subjects
Electrical Engineering and Systems Science - Signal Processing - Abstract
We derive the closed form Cramer-Rao bound (CRB) expressions for joint estimation of time delay and Doppler shift with unknown signals with possibly known structure. The results are especially useful for passive radar where direct path and reflected path signals are present. Time delay and Doppler shift estimation is an important fundamental tool in signal processing which has received extensive study for cases with known transmitted signals, but little study for unknown transmitted signals. The presented results generalize previous results for known transmitted signals and show how many looks from the direct path and the reflected path we need to derive an accurate joint estimation of time delay and Doppler shift. After analysis under a simple common signal-to-clutter-plus-noise ratio (SCNR) model with separated direct and reflected path signals, white clutter-plus-noise and line of sight propagation, extensions to cases with different direct and reflected path SCNRs, correlated clutter-plus-noise, nonseparated direct and reflected path signals and multipath propagation are discussed to support the utility of the CRB with unknown signals.
- Published
- 2018
18. Improved Detection Performance of Passive Radars Exploiting Known Communication Signal Form
- Author
-
Karthik, Anantha K. and Blum, Rick S.
- Subjects
Electrical Engineering and Systems Science - Signal Processing - Abstract
In this paper, we address the problem of target detection in passive multiple-input-multiple-output (MIMO) radar networks. A generalized likelihood ratio test is derived, assuming prior knowledge of the signal format used in the non-cooperative transmit stations. We consider scenarios in which the unknown transmitted signal uses either a linear digital modulation scheme or the Orthogonal Frequency-Division Multiplexing (OFDM) modulation scheme. These digital modulation schemes are used in popular standards including Code-Division Multiple Access (CDMA), Digital Video Broadcasting-Terrestrial (DVB-T) and Long Term Evaluation (LTE). The performance of the generalized likelihood ratio test in the known signal format case is often significantly more favorable when compared to the case that does not exploit this information. Further, the performance improves with increasing number of samples per symbol and, for a sufficiently large number of samples per symbol, the performance closely approximates that of an active radar with a known transmitted signal., Comment: 10 pages, 12 figures
- Published
- 2018
- Full Text
- View/download PDF
19. Multi-snapshot Newtonized Orthogonal Matching Pursuit for Line Spectrum Estimation with Multiple Measurement Vectors
- Author
-
Zhu, Jiang, Han, Lin, Blum, Rick S., and Xu, Zhiwei
- Subjects
Computer Science - Information Theory - Abstract
In this paper, multi-snapshot Newtonized orthogonal matching pursuit (MNOMP) algorithm is proposed to deal with the line spectrum estimation with multiple measurement vectors (MMVs). MNOMP has the low computation complexity and state-of-the-art performance advantage of NOMP, and also includes two key steps: Detecting a new sinusoid on an oversampled discrete Fourier transform (DFT) grid and refining the parameters of already detected sinusoids to avoid the problem of basis mismatch. We provide a stopping criterion based on the overestimating probability of the model order. In addition, the convergence of the proposed algorithm is also proved. Finally, numerical results are conducted to show that the performance of MNOMP benefits from MMVs, and the effectiveness of MNOMP when compared against the state-of-the-art algorithms in terms of frequency estimation accuracy and computation complexity.
- Published
- 2018
20. An Overview of Cybersecurity for Natural Gas Networks: Attacks, Attack Assessment, and Attack Detection
- Author
-
Wang, Zisheng, Zhao, Bining, Blum, Rick S., Kacprzyk, Janusz, Series Editor, Awad, Ali Ismail, editor, Furnell, Steven, editor, Paprzycki, Marcin, editor, and Sharma, Sudhir Kumar, editor
- Published
- 2021
- Full Text
- View/download PDF
21. Signal Amplitude Estimation and Detection from Unlabeled Binary Quantized Samples
- Author
-
Wang, Guanyu, Zhu, Jiang, Blum, Rick S., Willett, Peter, Marano, Stefano, Matta, Vincenzo, and Braca, Paolo
- Subjects
Computer Science - Information Theory - Abstract
Signal amplitude estimation and detection from unlabeled quantized binary samples are studied, assuming that the order of the time indexes is completely unknown. First, maximum likelihood (ML) estimators are utilized to estimate both the permutation matrix and unknown signal amplitude under arbitrary, but known signal shape and quantizer thresholds. Sufficient conditions are provided under which an ML estimator can be found in polynomial time and an alternating maximization algorithm is proposed to solve the general problem via good initial estimates. In addition, the statistical identifiability of the model is studied. Furthermore, the generalized likelihood ratio test (GLRT) detector is adopted to detect the presence of signal. In addition, an accurate approximation to the probability of successful permutation matrix recovery is derived, and explicit expressions are provided to reveal the relationship between the number of signal samples and the number of quantizers. Finally, numerical simulations are performed to verify the theoretical results.
- Published
- 2017
- Full Text
- View/download PDF
22. Attack Detection in Sensor Network Target Localization Systems with Quantized Data
- Author
-
Zhang, Jiangfan, Wang, Xiaodong, Blum, Rick S., and Kaplan, Lance M.
- Subjects
Computer Science - Information Theory - Abstract
We consider a sensor network focused on target localization, where sensors measure the signal strength emitted from the target. Each measurement is quantized to one bit and sent to the fusion center. A general attack is considered at some sensors that attempts to cause the fusion center to produce an inaccurate estimation of the target location with a large mean-square-error. The attack is a combination of man-in-the-middle, hacking, and spoofing attacks that can effectively change both signals going into and coming out of the sensor nodes in a realistic manner. We show that the essential effect of attacks is to alter the estimated distance between the target and each attacked sensor to a different extent, giving rise to a geometric inconsistency among the attacked and unattacked sensors. Hence, with the help of two secure sensors, a class of detectors are proposed to detect the attacked sensors by scrutinizing the existence of the geometric inconsistency. We show that the false alarm and miss probabilities of the proposed detectors decrease exponentially as the number of measurement samples increases, which implies that for sufficiently large number of samples, the proposed detectors can identify the attacked and unattacked sensors with any required accuracy.
- Published
- 2017
- Full Text
- View/download PDF
23. Sparse Representation based Multi-sensor Image Fusion: A Review
- Author
-
Zhang, Qiang, Liu, Yi, Blum, Rick S., Han, Jungong, and Tao, Dacheng
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
As a result of several successful applications in computer vision and image processing, sparse representation (SR) has attracted significant attention in multi-sensor image fusion. Unlike the traditional multiscale transforms (MSTs) that presume the basis functions, SR learns an over-complete dictionary from a set of training images for image fusion, and it achieves more stable and meaningful representations of the source images. By doing so, the SR-based fusion methods generally outperform the traditional MST-based image fusion methods in both subjective and objective tests. In addition, they are less susceptible to mis-registration among the source images, thus facilitating the practical applications. This survey paper proposes a systematic review of the SR-based multi-sensor image fusion literature, highlighting the pros and cons of each category of approaches. Specifically, we start by performing a theoretical investigation of the entire system from three key algorithmic aspects, (1) sparse representation models; (2) dictionary learning methods; and (3) activity levels and fusion rules. Subsequently, we show how the existing works address these scientific problems and design the appropriate fusion rules for each application, such as multi-focus image fusion and multi-modality (e.g., infrared and visible) image fusion. At last, we carry out some experiments to evaluate the impact of these three algorithmic components on the fusion performance when dealing with different applications. This article is expected to serve as a tutorial and source of reference for researchers preparing to enter the field or who desire to employ the sparse representation theory in other fields., Comment: 19 pages
- Published
- 2017
24. Suboptimum Low Complexity Joint Multi-target Detection and Localization for Noncoherent MIMO Radar with Widely Separated Antennas
- Author
-
Yi, Wei, Zhou, Tao, Xie, Mingchi, Ai, Yue, and Blum, Rick S.
- Subjects
Computer Science - Information Theory - Abstract
In this paper, the problems of simultaneously detecting and localizing multiple targets are considered for noncoherent multiple-input multiple-output (MIMO) radar with widely separated antennas. By assuming a prior knowledge of target number, an optimal solution to this problem is presented first. It is essentially a maximum-likelihood (ML) estimator searching parameters of interest in a high dimensional space. However, the complexity of this method increases exponentially with the number G of targets.Besides, without the prior information of the number of targets, a multi-hypothesis testing strategy to determine the number of targets is required, which further complicates this method. Therefore, we split the joint maximization into G disjoint optimization problems by clearing the interference from previously declared targets. In this way, we derive two fast and robust suboptimal solutions which allow trading performance for a much lower implementation complexity which is almost independent of the number of targets. In addition, the multi-hypothesis testing is no longer required when target number is unknown. Simulation results show the proposed algorithms can correctly detect and accurately localize multiple targets even when targets share common range bins in some paths.
- Published
- 2017
25. On the generalization discrepancy of spatiotemporal dynamics-informed graph convolutional networks.
- Author
-
Yue Sun, Chao Chen, Yuesheng Xu, Sihong Xie, Blum, Rick S., and Venkitasubramaniam, Parv
- Subjects
GRAPH neural networks ,TRAFFIC patterns ,TRAFFIC speed ,DIFFERENTIAL equations ,REACTION-diffusion equations - Abstract
Graph neural networks (GNNs) have gained significant attention in diverse domains, ranging from urban planning to pandemic management. Ensuring both accuracy and robustness in GNNs remains a challenge due to insufficient quality data that contains sufficient features. With sufficient training data where all spatiotemporal patterns are well-represented, existing GNN models can make reasonably accurate predictions. However, existing methods fail when the training data are drawn from different circumstances (e.g., traffic patterns on regular days) than test data (e.g., traffic patterns after a natural disaster). Such challenges are usually classified under domain generalization. In this work, we show that one way to address this challenge in the context of spatiotemporal prediction is by incorporating domain differential equations into graph convolutional networks (GCNs). We theoretically derive conditions where GCNs incorporating such domain differential equations are robust to mismatched training and testing data compared to baseline domain agnostic models. To support our theory, we propose two domain-differential-equationinformed networks: Reaction-Diffusion Graph Convolutional Network (RDGCN), which incorporates differential equations for traffic speed evolution, and the Susceptible-Infectious-Recovered Graph Convolutional Network (SIRGCN), which incorporates a disease propagation model. Both RDGCN and SIRGCN are based on reliable and interpretable domain differential equations that allow the models to generalize to unseen patterns. We experimentally show that RDGCN and SIRGCN are more robust with mismatched testing data than state-of-the-art deep learning methods. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
26. Estimation Theory Based Robust Phase Offset Estimation in the Presence of Delay Attacks
- Author
-
Karthik, Anantha K. and Blum, Rick S.
- Subjects
Statistics - Applications ,Computer Science - Information Theory - Abstract
This paper addresses the problem of robust clock phase offset estimation for the IEEE 1588 precision time protocol (PTP) in the presence of delay attacks. Delay attacks are one of the most effective cyber attacks in PTP, as they cannot be mitigated using typical security measures. In this paper, we consider the case where the slave node can exchange synchronization messages with multiple master nodes synchronized to the same clock. We first provide lower bounds on the best achievable performance for any phase offset estimation scheme in the presence of delay attacks. We then present a novel phase offset estimation scheme that employs the Expectation-Maximization algorithm for detecting which of the master-slave communication links have been subject to delay attacks. After discarding information from the links identified as attacked, which we show to be optimal, the optimal vector location parameter estimator is employed to estimate the phase offset of the slave node. Simulation results are presented to show that the proposed phase offset estimation scheme exhibits performance close to the lower bounds in a wide variety of scenarios., Comment: 30 pages, 4 figures, Journal paper
- Published
- 2016
27. Low-Rank Tensor Decomposition-Aided Channel Estimation for Millimeter Wave MIMO-OFDM Systems
- Author
-
Zhou, Zhou, Fang, Jun, Yang, Linxiao, Li, Hongbin, Chen, Zhi, and Blum, Rick S.
- Subjects
Computer Science - Information Theory - Abstract
We consider the problem of downlink channel estimation for millimeter wave (mmWave) MIMO-OFDM systems, where both the base station (BS) and the mobile station (MS) employ large antenna arrays for directional precoding/beamforming. Hybrid analog and digital beamforming structures are employed in order to offer a compromise between hardware complexity and system performance. Different from most existing studies that are concerned with narrowband channels, we consider estimation of wideband mmWave channels with frequency selectivity, which is more appropriate for mmWave MIMO-OFDM systems. By exploiting the sparse scattering nature of mmWave channels, we propose a CANDECOMP/PARAFAC (CP) decomposition-based method for channel parameter estimation (including angles of arrival/departure, time delays, and fading coefficients). In our proposed method, the received signal at the BS is expressed as a third-order tensor. We show that the tensor has the form of a low-rank CP decomposition, and the channel parameters can be estimated from the associated factor matrices. Our analysis reveals that the uniqueness of the CP decomposition can be guaranteed even when the size of the tensor is small. Hence the proposed method has the potential to achieve substantial training overhead reduction. We also develop Cramer-Rao bound (CRB) results for channel parameters, and compare our proposed method with a compressed sensing-based method. Simulation results show that the proposed method attains mean square errors that are very close to their associated CRBs, and presents a clear advantage over the compressed sensing-based method in terms of both estimation accuracy and computational complexity., Comment: arXiv admin note: text overlap with arXiv:1602.07955
- Published
- 2016
28. A coordinated scheme of electricity-gas systems and impacts of a gas system FDI attacks on electricity system
- Author
-
Zhao, Bining, Lamadrid, Alberto J., Blum, Rick S., and Kishore, Shalinee
- Published
- 2021
- Full Text
- View/download PDF
29. Performance Analysis of Target Parameters Estimation Using Multiple Widely Separated Antenna Arrays
- Author
-
Khomchuk, Peter, Bilik, Igal, and Blum, Rick S.
- Subjects
Computer Science - Information Theory - Abstract
Target parameter estimation performance is investigated for a radar employing a set of widely separated transmitting and receiving antenna arrays. Cases with multiple extended targets are considered under two signal model assumptions: stochastic and deterministic. The general expressions for the corresponding Cramer-Rao lower bound (CRLB) and the asymptotic properties of the maximum-likelihood (ML) estimator are derived for a radar with $M_t$ arrays of $L_t$ transmitting elements and $M_r$ arrays of $L_r$ receiving elements for both types of signal models. It is shown that for an infinitely large product $M_tM_r$, and a finite $L_r$, the ML estimator is consistent and efficient under the stochastic model, while the deterministic model requires $M_tM_r$ to be finite and $L_r$ to be infinitely large in order to guarantee consistency and efficiency. Monte Carlo simulations further investigate the estimation performance of the proposed radar configuration in practical scenarios with finite $M_tM_r$ and $L_r$, and a fixed total number of available receiving antenna elements, $M_r L_r$. The numerical results demonstrate that grouping receiving elements into properly sized arrays reduces the mean squared error (MSE) and decreases the threshold SNR. In the numerical examples considered, the preferred configurations employ $M_t M_r > 1$. In fact, when $M_t M_r$ becomes too small, due to the loss of the geometric gain, the estimation performance becomes strongly dependent on the particular scenario and can degrade significantly, while the CRLB may become a poor prediction of the MSE even for high SNR. This suggests it may be advantageous to employ approaches where neither $M_tM_r$ nor $L_r$ are too small.
- Published
- 2016
- Full Text
- View/download PDF
30. A Fundamental Limitation on Maximum Parameter Dimension for Accurate Estimation with Quantized Data
- Author
-
Zhang, Jiangfan, Blum, Rick S., Kaplan, Lance, and Lu, Xuanxuan
- Subjects
Mathematics - Statistics Theory - Abstract
It is revealed that there is a link between the quantization approach employed and the dimension of the vector parameter which can be accurately estimated by a quantized estimation system. A critical quantity called inestimable dimension for quantized data (IDQD) is introduced, which doesn't depend on the quantization regions and the statistical models of the observations but instead depends only on the number of sensors and on the precision of the vector quantizers employed by the system. It is shown that the IDQD describes a quantization induced fundamental limitation on the estimation capabilities of the system. To be specific, if the dimension of the desired vector parameter is larger than the IDQD of the quantized estimation system, then the Fisher information matrix for estimating the desired vector parameter is singular, and moreover, there exist infinitely many nonidentifiable vector parameter points in the vector parameter space. Furthermore, it is shown that under some common assumptions on the statistical models of the observations and the quantization system, a smaller IDQD can be obtained, which can specify an even more limiting quantization induced fundamental limitation on the estimation capabilities of the system.
- Published
- 2016
31. Functional Forms of Optimum Spoofing Attacks for Vector Parameter Estimation in Quantized Sensor Networks
- Author
-
Zhang, Jiangfan, Blum, Rick S., Kaplan, Lance, and Lu, Xuanxuan
- Subjects
Computer Science - Information Theory ,Computer Science - Cryptography and Security ,Statistics - Applications - Abstract
Estimation of an unknown deterministic vector from quantized sensor data is considered in the presence of spoofing attacks which alter the data presented to several sensors. Contrary to previous work, a generalized attack model is employed which manipulates the data using transformations with arbitrary functional forms determined by some attack parameters whose values are unknown to the attacked system. For the first time, necessary and sufficient conditions are provided under which the transformations provide a guaranteed attack performance in terms of Cramer-Rao Bound (CRB) regardless of the processing the estimation system employs, thus defining a highly desirable attack. Interestingly, these conditions imply that, for any such attack when the attacked sensors can be perfectly identified by the estimation system, either the Fisher Information Matrix (FIM) for jointly estimating the desired and attack parameters is singular or that the attacked system is unable to improve the CRB for the desired vector parameter through this joint estimation even though the joint FIM is nonsingular. It is shown that it is always possible to construct such a highly desirable attack by properly employing a sufficiently large dimension attack vector parameter relative to the number of quantization levels employed, which was not observed previously. To illustrate the theory in a concrete way, we also provide some numerical results which corroborate that under the highly desirable attack, attacked data is not useful in reducing the CRB.
- Published
- 2016
- Full Text
- View/download PDF
32. Wireless-Powered Cooperative Communications: Power-Splitting Relaying with Energy Accumulation
- Author
-
Zhou, Zheng, Peng, Mugen, Zhao, Zhongyuan, Wang, Wenbo, and Blum, Rick S.
- Subjects
Computer Science - Information Theory - Abstract
A harvest-use-store power splitting (PS) relaying strategy with distributed beamforming is proposed for wirelesspowered multi-relay cooperative networks in this paper. Different from the conventional battery-free PS relaying strategy, harvested energy is prioritized to power information relaying while the remainder is accumulated and stored for future usage with the help of a battery in the proposed strategy, which supports an efficient utilization of harvested energy. However, PS affects throughput at subsequent time slots due to the battery operations including the charging and discharging. To this end, PS and battery operations are coupled with distributed beamforming. A throughput optimization problem to incorporate these coupled operations is formulated though it is intractable. To address the intractability of the optimization,a layered optimization method is proposed to achieve the optimal joint PS and battery operation design with non-causal channel state information (CSI), in which the PS and the battery operation can be analyzed in a decomposed manner. Then, a general case with causal CSI is considered, where the proposed layered optimization method is extended by utilizing the statistical properties of CSI. To reach a better tradeoff between performance and complexity, a greedy method that requires no information about subsequent time slots is proposed. Simulation results reveal the upper and lower bound on performance of the proposed strategy, which are reached by the layered optimization method with non-causal CSI and the greedy method, respectively. Moreover, the proposed strategy outperforms the conventional PS-based relaying without energy accumulation and time switching-based relaying strategy., Comment: 15 pages, 7 figures. Manuscript received Apr. 15, 2015 by IEEE Journal on Selected Areas in Communications, revised Sep. 5, 2015, accepted Dec. 11, 2015
- Published
- 2016
- Full Text
- View/download PDF
33. Generalized Cramer-Rao Bound for Joint Estimation of Target Position and Velocity for Active and Passive Radar Networks
- Author
-
He, Qian, Hu, Jianbin, Blum, Rick S., and Wu, Yonggang
- Subjects
Mathematics - Statistics Theory ,Computer Science - Information Theory - Abstract
In this paper, we derive the Cramer-Rao bound (CRB) for joint target position and velocity estimation using an active or passive distributed radar network under more general, and practically occurring, conditions than assumed in previous work. In particular, the presented results allow nonorthogonal signals, spatially dependent Gaussian reflection coefficients, and spatially dependent Gaussian clutter-plus-noise. These bounds allow designers to compare the performance of their developed approaches, which are deemed to be of acceptable complexity, to the best achievable performance. If their developed approaches lead to performance close to the bounds, these developed approaches can be deemed "good enough". A particular recent study where algorithms have been developed for a practical radar application which must involve nonorthogonal signals, for which the best performance is unknown, is a great example. The presented results in our paper do not make any assumptions about the approximate location of the target being known from previous target detection signal processing. In addition, for situations in which we do not know some parameters accurately, we also derive the mismatched CRB. Numerical investigations of the mean squared error of the maximum likelihood estimation are employed to support the validity of the CRBs. In order to demonstrate the utility of the provided results to a topic of great current interest, the numerical results focus on a passive radar system using the Global System for Mobile communication (GSM) cellar system.
- Published
- 2015
- Full Text
- View/download PDF
34. An Electrical Structure-Based Approach to PMU Placement in the Electric Power Grid
- Author
-
Nagananda, K. G., Kishore, Shalinee, and Blum, Rick S.
- Subjects
Computer Science - Systems and Control - Abstract
The phasor measurement unit (PMU) placement problem is revisited by taking into account a stronger characterization of the electrical connectedness between various buses in the grid. To facilitate this study, the placement problem is approached from the perspective of the \emph{electrical structure} which, unlike previous work on PMU placement, accounts for the sensitivity between power injections and nodal phase angle differences between various buses in the power network. The problem is formulated as a binary integer program with the objective to minimize the number of PMUs for complete network observability in the absence of zero injection measurements. The implication of the proposed approach on static state estimation and fault detection algorithms incorporating PMU measurements is analyzed. Results show a significant improvement in the performance of estimation and detection schemes by employing the electrical structure-based PMU placement compared to its topological counterpart. In light of recent advances in the electrical structure of the grid, our study provides a more realistic perspective of PMU placement in the electric power grid., Comment: 8 pages, submitted to IEEE Transactions on Smart Grid. arXiv admin note: text overlap with arXiv:1309.1300
- Published
- 2015
35. Colocated MIMO Radar Waveform Design for Transmit Beampattern Formation
- Author
-
Xu, Haisheng, Blum, Rick S., Wang, Jian, and Yuan, Jian
- Subjects
Computer Science - Information Theory - Abstract
In this paper, colocated MIMO radar waveform design is considered by minimizing the integrated side-lobe level to obtain beam patterns with lower side-lobe levels than competing methods. First, a quadratic programming problem is formulated to design beam patterns by using the criteria for a minimal integrated side-lobe level. A theorem is derived that provides a closed-form analytical optimal solution that appears to be an extension of the Rayleigh quotient minimization for a possibly singular matrix in quadratic form. Such singularities are shown to occur in the problem of interest, but proofs for the optimum solution in these singular matrix cases could not be found in the literature. Next, an additional constraint is added to obtain beam patterns with desired 3 dB beamwidths, resulting in a nonconvex quadratically constrained quadratic program which is NP-hard. A semidefinite program and a Gaussian randomized semidefinite relaxation are used to determine feasible solutions arbitrarily close to the solution to the original problem. Theoretical and numerical analyses illustrate the impacts of changing the number of transmitters and orthogonal waveforms employed in the designs. Numerical comparisons are conducted to evaluate the proposed design approaches., Comment: 22 pages, 6 figures, Accepted by IEEE Transactions on Aerospace and Electronic Systems
- Published
- 2015
- Full Text
- View/download PDF
36. Minimax Optimum Estimators for Phase Synchronization in IEEE 1588
- Author
-
Guruswamy, Anand, Blum, Rick S., Kishore, Shalinee, and Bordogna, Mark
- Subjects
Statistics - Applications ,Computer Science - Information Theory - Abstract
The IEEE 1588 protocol has received recent interest as a means of delivering sub-microsecond level clock phase synchronization over packet-switched mobile backhaul networks. Due to the randomness of the end-to-end delays in packet networks, the recovery of clock phase from packet timestamps in IEEE 1588 must be treated as a statistical estimation problem. A number of estimators for this problem have been suggested in the literature, but little is known about the best achievable performance. In this paper, we describe new minimax estimators for this problem, that are optimum in terms of minimizing the maximum mean squared error over all possible values of the unknown parameters. Minimax estimators that utilize information from past timestamps to improve accuracy are also introduced. Simulation results indicate that significant performance gains over conventional estimators can be obtained via such optimum processing techniques. These minimax estimators also provide fundamental limits on the performance of phase offset estimation schemes., Comment: 11 pages, 19 figures
- Published
- 2015
37. Super-Resolution Compressed Sensing: A Generalized Iterative Reweighted L2 Approach
- Author
-
Fang, Jun, Duan, Huiping, Li, Jing, Li, Hongbin, and Blum, Rick S.
- Subjects
Computer Science - Information Theory - Abstract
Conventional compressed sensing theory assumes signals have sparse representations in a known, finite dictionary. Nevertheless, in many practical applications such as direction-of-arrival (DOA) estimation and line spectral estimation, the sparsifying dictionary is usually characterized by a set of unknown parameters in a continuous domain. To apply the conventional compressed sensing technique to such applications, the continuous parameter space has to be discretized to a finite set of grid points, based on which a "presumed dictionary" is constructed for sparse signal recovery. Discretization, however, inevitably incurs errors since the true parameters do not necessarily lie on the discretized grid. This error, also referred to as grid mismatch, may lead to deteriorated recovery performance or even recovery failure. To address this issue, in this paper, we propose a generalized iterative reweighted L2 method which jointly estimates the sparse signals and the unknown parameters associated with the true dictionary. The proposed algorithm is developed by iteratively decreasing a surrogate function majorizing a given objective function, resulting in a gradual and interweaved iterative process to refine the unknown parameters and the sparse signal. A simple yet effective scheme is developed for adaptively updating the regularization parameter that controls the tradeoff between the sparsity of the solution and the data fitting error. Extension of the proposed algorithm to the multiple measurement vector scenario is also considered. Numerical results show that the proposed algorithm achieves a super-resolution accuracy and presents superiority over other existing methods., Comment: arXiv admin note: text overlap with arXiv:1401.4312
- Published
- 2014
38. A trilevel model against false gas-supply information attacks in electricity systems
- Author
-
Zhao, Bining, Lamadrid, Alberto J., Blum, Rick S., and Kishore, Shalinee
- Published
- 2020
- Full Text
- View/download PDF
39. Passive MIMO radar detection exploiting known format of the communication signal observed in colored noise with unknown covariance matrix
- Author
-
Liu, Yongjun, Blum, Rick S., Liao, Guisheng, and Zhu, Shengqi
- Published
- 2020
- Full Text
- View/download PDF
40. Bayesian Topology Learning and noise removal from network data
- Author
-
Ramezani Mayiami, Mahmoud, Hajimirsadeghi, Mohammad, Skretting, Karl, Dong, Xiaowen, Blum, Rick S., and Poor, H. Vincent
- Published
- 2021
- Full Text
- View/download PDF
41. Correction to: Bayesian Topology Learning and noise removal from network data
- Author
-
Ramezani-Mayiami, Mahmoud, Hajimirsadeghi, Mohammad, Skretting, Karl, Dong, Xiaowen, Blum, Rick S., and Poor, H. Vincent
- Published
- 2021
- Full Text
- View/download PDF
42. A PMU Scheduling Scheme for Transmission of Synchrophasor Data in Electric Power Systems
- Author
-
Nagananda, K. G., Kishore, Shalinee, and Blum, Rick S.
- Subjects
Computer Science - Information Theory - Abstract
With the proposition to install a large number of phasor measurement units (PMUs) in the future power grid, it is essential to provide robust communications infrastructure for phasor data across the network. We make progress in this direction by devising a simple time division multiplexing scheme for transmitting phasor data from the PMUs to a central server: Time is divided into frames and the PMUs take turns to transmit to the control center within the time frame. The main contribution of this work is a scheduling policy based on which PMU transmissions are ordered during a time frame. The scheduling scheme is independent of the approach taken to solve the PMU placement problem, and unlike strategies devised for conventional communications, it is intended for the power network since it is fully governed by the measure of electrical connectedness between buses in the grid. To quantify the performance of the scheduling scheme, we couple it with a fault detection algorithm used to detect changes in the susceptance parameters in the grid. Results demonstrate that scheduling the PMU transmissions leads to an improved performance of the fault detection scheme compared to PMUs transmitting at random., Comment: 9 pages, 6 figures; an extra figure included in the published version. appears in IEEE Transactions on Smart Grid, Special Issue on Cyber Physical Systems and Security for Smart Grid, 2015
- Published
- 2014
- Full Text
- View/download PDF
43. Multi-snapshot Newtonized orthogonal matching pursuit for line spectrum estimation with multiple measurement vectors
- Author
-
Zhu, Jiang, Han, Lin, Blum, Rick S., and Xu, Zhiwei
- Published
- 2019
- Full Text
- View/download PDF
44. An Overview of Cybersecurity for Natural Gas Networks: Attacks, Attack Assessment, and Attack Detection
- Author
-
Wang, Zisheng, primary, Zhao, Bining, additional, and Blum, Rick S., additional
- Published
- 2021
- Full Text
- View/download PDF
45. Robust sparse representation based multi-focus image fusion with dictionary construction and local spatial consistency
- Author
-
Zhang, Qiang, Shi, Tao, Wang, Fan, Blum, Rick S., and Han, Jungong
- Published
- 2018
- Full Text
- View/download PDF
46. Target Velocity Estimation for Quantization-Based Cooperative MIMO Radar and Communications System
- Author
-
Wang, Zhen, primary, Yan, Xuedan, additional, He, Qian, additional, and Blum, Rick S., additional
- Published
- 2023
- Full Text
- View/download PDF
47. Target Localization Accuracy Gain in MIMO Radar Based Systems
- Author
-
Godrich, Hana, Haimovich, Alexander M., and Blum, Rick S.
- Subjects
Computer Science - Information Theory - Abstract
This paper presents an analysis of target localization accuracy, attainable by the use of MIMO (Multiple-Input Multiple-Output) radar systems, configured with multiple transmit and receive sensors, widely distributed over a given area. The Cramer-Rao lower bound (CRLB) for target localization accuracy is developed for both coherent and non-coherent processing. Coherent processing requires a common phase reference for all transmit and receive sensors. The CRLB is shown to be inversely proportional to the signal effective bandwidth in the non-coherent case, but is approximately inversely proportional to the carrier frequency in the coherent case. We further prove that optimization over the sensors' positions lowers the CRLB by a factor equal to the product of the number of transmitting and receiving sensors. The best linear unbiased estimator (BLUE) is derived for the MIMO target localization problem. The BLUE's utility is in providing a closed form localization estimate that facilitates the analysis of the relations between sensors locations, target location, and localization accuracy. Geometric dilution of precision (GDOP) contours are used to map the relative performance accuracy for a given layout of radars over a given geographic area., Comment: 36 pages, 5 figures, submitted to IEEE Transaction on Information Theory
- Published
- 2008
- Full Text
- View/download PDF
48. Fusing synergistic information from multi-sensor images: An overview from implementation to performance assessment
- Author
-
Liu, Zheng, Blasch, Erik, Bhatnagar, Gaurav, John, Vijay, Wu, Wei, and Blum, Rick S.
- Published
- 2018
- Full Text
- View/download PDF
49. Sparse representation based multi-sensor image fusion for multi-focus and multi-modality images: A review
- Author
-
Zhang, Qiang, Liu, Yi, Blum, Rick S., Han, Jungong, and Tao, Dacheng
- Published
- 2018
- Full Text
- View/download PDF
50. Joint estimation of location and signal parameters for an LFM emitter
- Author
-
Yi, Wei, Chen, Zhenhua, Hoseinnezhad, Reza, and Blum, Rick S.
- Published
- 2017
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.