1 EZIO BIGLIERI (work done with Marco Lops) USC, September 20, 2006.

Slides:



Advertisements
Similar presentations
A Tutorial on Learning with Bayesian Networks
Advertisements

Probabilistic models Jouni Tuomisto THL. Outline Deterministic models with probabilistic parameters Hierarchical Bayesian models Bayesian belief nets.
Chapter 3. Noise Husheng Li The University of Tennessee.
Random Variables ECE460 Spring, 2012.
Week 11 Review: Statistical Model A statistical model for some data is a set of distributions, one of which corresponds to the true unknown distribution.
1 Multi-user Detection Gwo-Ruey Lee. Wireless Access Tech. Lab. CCU Wireless Access Tech. Lab. 2 Outlines Multiple Access Communication Synchronous CDMA.
LECTURE 11: BAYESIAN PARAMETER ESTIMATION
Fast Bayesian Matching Pursuit Presenter: Changchun Zhang ECE / CMR Tennessee Technological University November 12, 2010 Reading Group (Authors: Philip.
Dynamic Bayesian Networks (DBNs)
Visual Tracking CMPUT 615 Nilanjan Ray. What is Visual Tracking Following objects through image sequences or videos Sometimes we need to track a single.
Introduction of Probabilistic Reasoning and Bayesian Networks
1 Slides for the book: Probabilistic Robotics Authors: Sebastian Thrun Wolfram Burgard Dieter Fox Publisher: MIT Press, Web site for the book & more.
An Introduction to Markov Decision Processes Sarah Hickmott
CS 547: Sensing and Planning in Robotics Gaurav S. Sukhatme Computer Science Robotic Embedded Systems Laboratory University of Southern California
G. Cowan Lectures on Statistical Data Analysis Lecture 2 page 1 Statistical Data Analysis: Lecture 2 1Probability, Bayes’ theorem 2Random variables and.
Probabilistic Robotics Introduction Probabilities Bayes rule Bayes filters.
1 Department of Computer Science and Engineering, University of South Carolina Issues for Discussion and Work Jan 2007  Choose meeting time.
Using ranking and DCE data to value health states on the QALY scale using conventional and Bayesian methods Theresa Cain.
Review of Probability and Random Processes
Matched Filters By: Andy Wang.
Data Selection In Ad-Hoc Wireless Sensor Networks Olawoye Oyeyele 11/24/2003.
EE513 Audio Signals and Systems Statistical Pattern Classification Kevin D. Donohue Electrical and Computer Engineering University of Kentucky.
ECE 8443 – Pattern Recognition LECTURE 06: MAXIMUM LIKELIHOOD AND BAYESIAN ESTIMATION Objectives: Bias in ML Estimates Bayesian Estimation Example Resources:
Probability Review Thinh Nguyen. Probability Theory Review Sample space Bayes’ Rule Independence Expectation Distributions.
2.1 Random Variable Concept Given an experiment defined by a sample space S with elements s, we assign a real number to every s according to some rule.
SIS Sequential Importance Sampling Advanced Methods In Simulation Winter 2009 Presented by: Chen Bukay, Ella Pemov, Amit Dvash.
Estimating parameters in a statistical model Likelihood and Maximum likelihood estimation Bayesian point estimates Maximum a posteriori point.
Multiuser Detection (MUD) Combined with array signal processing in current wireless communication environments Wed. 박사 3학기 구 정 회.
Visibility Graph. Voronoi Diagram Control is easy: stay equidistant away from closest obstacles.
Jamal Saboune - CRV10 Tutorial Day 1 Bayesian state estimation and application to tracking Jamal Saboune VIVA Lab - SITE - University.
1 Robot Environment Interaction Environment perception provides information about the environment’s state, and it tends to increase the robot’s knowledge.
ECE 8443 – Pattern Recognition ECE 8423 – Adaptive Signal Processing Objectives: Deterministic vs. Random Maximum A Posteriori Maximum Likelihood Minimum.
Forward-Scan Sonar Tomographic Reconstruction PHD Filter Multiple Target Tracking Bayesian Multiple Target Tracking in Forward Scan Sonar.
Computer Vision Group Prof. Daniel Cremers Autonomous Navigation for Flying Robots Lecture 6.1: Bayes Filter Jürgen Sturm Technische Universität München.
SCALABLE INFORMATION-DRIVEN SENSOR QUERYING AND ROUTING FOR AD HOC HETEROGENEOUS SENSOR NETWORKS Paper By: Maurice Chu, Horst Haussecker, Feng Zhao Presented.
Lecture V Probability theory. Lecture questions Classical definition of probability Frequency probability Discrete variable and probability distribution.
CHAPTER 5 SIGNAL SPACE ANALYSIS
Statistical Decision Theory Bayes’ theorem: For discrete events For probability density functions.
Computer Vision Group Prof. Daniel Cremers Autonomous Navigation for Flying Robots Lecture 5.3: Reasoning with Bayes Law Jürgen Sturm Technische Universität.
SCALABLE INFORMATION-DRIVEN SENSOR QUERYING AND ROUTING FOR AD HOC HETEROGENEOUS SENSOR NETWORKS Paper By: Maurice Chu, Horst Haussecker, Feng Zhao Presented.
ECE 8443 – Pattern Recognition ECE 8527 – Introduction to Machine Learning and Pattern Recognition Objectives: Elements of a Discrete Model Evaluation.
Probabilistic Robotics Introduction.  Robotics is the science of perceiving and manipulating the physical world through computer-controlled devices.
Spectrum Sensing In Cognitive Radio Networks
Random Variables. Numerical Outcomes Consider associating a numerical value with each sample point in a sample space. (1,1) (1,2) (1,3) (1,4) (1,5) (1,6)
Baseband Receiver Receiver Design: Demodulation Matched Filter Correlator Receiver Detection Max. Likelihood Detector Probability of Error.
1 Chapter 17 2 nd Part Making Complex Decisions --- Decision-theoretic Agent Design Xin Lu 11/04/2002.
1 On the Channel Capacity of Wireless Fading Channels C. D. Charalambous and S. Z. Denic School of Information Technology and Engineering, University of.
Probabilistic Robotics Introduction Probabilities Bayes rule Bayes filters.
1 Review of Probability and Random Processes. 2 Importance of Random Processes Random variables and processes talk about quantities and signals which.
Probabilistic Robotics Introduction. SA-1 2 Introduction  Robotics is the science of perceiving and manipulating the physical world through computer-controlled.
Probabilistic Robotics Probability Theory Basics Error Propagation Slides from Autonomous Robots (Siegwart and Nourbaksh), Chapter 5 Probabilistic Robotics.
Matching ® ® ® Global Map Local Map … … … obstacle Where am I on the global map?                                   
Lecture 1.31 Criteria for optimal reception of radio signals.
12. Principles of Parameter Estimation
Appendix A: Probability Theory
Ch3: Model Building through Regression
Markov ó Kalman Filter Localization
State Estimation Probability, Bayes Filtering
Game Theory in Wireless and Communication Networks: Theory, Models, and Applications Lecture 2 Bayesian Games Zhu Han, Dusit Niyato, Walid Saad, Tamer.
CSE-490DF Robotics Capstone
LECTURE 07: BAYESIAN ESTIMATION
11. Conditional Density Functions and Conditional Expected Values
11. Conditional Density Functions and Conditional Expected Values
12. Principles of Parameter Estimation
Further Topics on Random Variables: Derived Distributions
Further Topics on Random Variables: Derived Distributions
Experiments, Outcomes, Events and Random Variables: A Revisit
Berlin Chen Department of Computer Science & Information Engineering
Further Topics on Random Variables: Derived Distributions
Sets and Probabilistic Models
Presentation transcript:

1 EZIO BIGLIERI (work done with Marco Lops) USC, September 20, 2006

2 Introduction and motivation Introduction and motivation

3 mobility & wireless (“La vie electrique,” ALBERT ROBIDA, French illustrator, 1892).

4 environment: static, deterministic

5 environment: static, random

6 environment: dynamic, random

7 Static, random channel, 3 users: Classic ML vs. joint ML detection of data and # of interferers

8 Static, random channel, 3 users: Joint ML detection of data and # of interferes vs. MAP

9 MUD receivers must know the number of interferers, otherwise performance is impaired. Introducing a priori information about the number of active users improves MUD performance and robustness. A priori information may include activity factor. A priori information may also include a model of users’ motion. lesson learned

10 Previous work (Mitra, Poor, Halford, Brandt-Pierce,…) focused on activity detection, addition of a single user. It was recognized that certain detectors suffer from catastrophic error if a new user enter the system. Wu, Chen (1998) advocate a two-step detection algorithm:  MUSIC algorithm estimates active users  MUD is used on estimated number of users previous work

11 We advocate a single-step algorithm, based on random-set theory. We develop Bayes recursions to model the evolution of the a posteriori pdf of users’ set. in our work…

12 Random set theory Random set theory

13 Description of multiuser systems A multiuser system is described by the random set where k is the number of active interferers, and x i are the state vectors of the individual interferers (k=0 corresponds to no interferer) random sets

14 Description of multiuser systems Multiuser detection in a dynamic environment needs the densities of the interferers’ set given the observations. “Standard” probability theory cannot provide these. random sets

15 Random Set Theory RST is a probability theory of finite sets that exhibit randomness not only in each element, but also in the number of elements Active users and their parameters are elements of a finite random set, thus RST provides a natural approach to MUD in a dynamic environment enter random set theory

16 Random Set Theory RST unifies in a single step two steps that would be taken separately without it: Detection of active users Estimation of user parameters random set theory

17 What random sets can do for you Random-set theory can be applied with only minimal (yet, nonzero) consideration of its theoretical foundations. random set theory

18 Random Set Theory Recall definition of a random variable: A real RV is a map between the sample space and the real line probability theory

19 Random Set Theory A probability measure on  induces a probability measure on the real line: probability theory A E

20 Random Set Theory We define a density of X such that The Radon-Nikodym derivative of with respect to the Lebesgue measure yields the density : probability theory

21 Random Set Theory random set theory Consider first a finite set: A random set defined on U is a map Collection of all subsets of U (“power set”)

22 Random Set Theory random set theory More generally, given a set, a random set defined on is a map Collection of closed subsets of

23 Belief function (not a “measure”): this is defined as where C is a subset of an ordinary multiuser state space: random set theory

24 “Belief density” of a belief function This is defined as the “set derivative” of the belief function (“generalized Radon-Nikodym derivative”). Computation of set derivatives from its definition is impractical. A “toolbox” is available. Can be used as MAP density in ordinary detection/estimation theory. random set theory

25 Example (finite sets) random set theory Assume belief function:

26 Example (continued) Set derivatives are given by the Moebius formula: random set theory

27 Example (continued) For example: random set theory

28 Connections with Dempster-Shafer theory random set theory The belief of a set V is the probability that X is contained in V : (assign zero belief to the empty set: thus, D-S theory is a special case of RST)

29 The plausibility of a set V is the probability that X intersects V : random set theory Connections with Dempster-Shafer theory

30 belief plausibility 01 based on supporting evidence based on refuting evidence plausible --- either supported by evidence, or unknown uncertainty interval random set theory Connections with Dempster-Shafer theory

31 Shafer: “Bayesian theory cannot distinguish between lack of belief and disbelief. It does not allow one to withhold belief from a proposition without according that belief to the negation of the proposition.” random set theory Connections with Dempster-Shafer theory

32 random set theory debate between followers and detractors of RST

33 Finite random sets Finite random sets

34 Random finite set We examine in particular the “finite random sets” finite subset of a hybrid space with U finite finite random sets

35 Hybrid spaces Example: a c b finite random sets

36 Hybrid spaces Why hybrid spaces? In multiuser application, each user state is described by d real numbers and one discrete parameter (user signature, user data). The number of users may be 0, 1, 2,…,K finite random sets

37 Application: cdma Application: cdma

38 multiuser channel model random set: users at time t

39 Ingredients Description of measurement process (the “channel”) modeling the channel

40 Ingredients Evolution of random set with time (Markovian assumption) modeling the environment

41 Bayes filtering equations Integrals are “set integrals” (the inverses of set derivatives) Closed form in the finite-set case Otherwise, use “particle filtering”

42 MAP estimate of random set (causal estimator)

43 users surviving from time t-1 new users random set: users at time t multiuser dynamics all potential users new users surviving users users at time t-1

44 C B  = probability of persistence surviving users

45 C B  = activity factor new users

46 surviving users + new users Derive the belief density of through the “generalized convolution”

47

48 detection and estimation In addition to detecting the number of active users and their data, one may want to estimate their parameters (e.g., their power) A Markov model of power evolution is needed

49 effect of fading

50 effect of motion

51 joint effects

52 pdf of  for Rayleigh fading

53 Application: neighbor discovery Application: neighbor discovery

54 In wireless networks, neighbor discovery (ND) is the detection of all neighbors with which a given reference node may communicate directly. ND may be the first algorithm run in a network, and the basis of medium access, clustering, and routing algorithms. neighbor discovery

55 #1 #2 #3 #4 receive interval of reference user transmit interval of neighboring users TDTD T neighbor discovery Structure of a discovery session

56 neighbor discovery Signal collected from all potential neighbors during receiving slot t : signature of user k amplitude of user k =1 if user k is transmitting at t