SlideShare uma empresa Scribd logo
1 de 11
Baixar para ler offline
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013
DOI : 10.5121/ijcnc.2013.5507 83
EXACT NETWORK RECONSTRUCTION
FROM CONSENSUS SIGNALS AND ONE
EIGENVALUE
Enzo Fioriti1
, Stefano Chiesa1
, Fabio Fratichini1
1
ENEA, CR Casaccia, UTTEI-ROB, Roma, Italy
vincenzo.fioriti@enea.it
ABSTRACT
The basic inverse problem in spectral graph theory consists in determining the graph given its eigenvalue
spectrum. In this paper, we are interested in a network of technological agents whose graph is unknown,
communicating by means of a consensus protocol. Recently, the use of artificial noise added to consensus
signals has been proposed to reconstruct the unknown graph, although errors are possible. On the other
hand, some methodologies have been devised to estimate the eigenvalue spectrum, but noise could interfere
with the elaborations. We combine these two techniques in order to simplify calculations and avoid
topological reconstruction errors, using only one eigenvalue. Moreover, we use an high frequency noise to
reconstruct the network, thus it is easy to filter the control signals after the graph identification. Numerical
simulations of several topologies show an exact and robust reconstruction of the graphs.
KEYWORDS
Networks, Graph, Topology, Eigenvalue spectrum
1. INTRODUCTION
Given a network of interacting agents we describe a methodology able to reconstruct exactly the
graph from time series and one eigenvalue of the graph spectrum (the inverse problem for
technological networks), using recently developed signal analysis and algebraic graph theory
techniques. There are many reasons to be aware of the graph topology. For example, if the graph
is time-varying the knowledge of the topology is clearly of paramount relevance for the network
control, especially in the mobile sensor network case. The next generation of technological
networks will be equipped with topology discover methodologies.
Moreover, from a mathematical point of view, the knowledge of the adjacency or laplacian matrix
of the network allows a relatively easy calculation (at least for small-medium size graphs) of
fundamental parameters. To name only a few: the second largest laplacian eigenvalue (the Fiedler
or algebraic eigenvalue) and the maximum eigenvalue of the adjacency matrix are two well-
known parameters relevant to the connectivity, the information exchange and control.
bottlenecks are easily detected; most influential nodes can be identified.
However, a fundamental obstacle to the solution of this inverse problem is the absence of one-to-
one correspondence between graph and its spectrum: different graphs can have the same spectrum
[1]. Although Camellas [2] has recently obtained some useful results with combinatorial
optimization algorithms for the main topological parameters (diameter, average distance, degree
distribution, clustering), the complete graph identification remain unsolved. As a theoretical
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013
84
solution seems hard to find, we propose to take advantage of specific characteristics of
technological networks to reduce the complexity of the inverse problem. In particular, if the graph
variability is associated to the agent mobility, a common control
algorithm is the consensus protocol [4]. The consensus protocol is widely implemented because it
is a distributed calculation, i.e. each agent is required to communicate only with its closest
neighbours. In this paper, we consider the consensus as the main control tool of the network,
though many different situation are equally possible, and following [3], we use an artificial added
noise for a basic estimation of the topology. Moreover, we take advantage from the (approximate)
knowledge of one eigenvalue of the graph spectrum, let's say the maximum eigenvalue of the
laplacian matrix λN to eliminate the errors. Some distributed procedures are already available [8,
10] to estimate the eigenvalue spectrum, as explained in the following paragraphs. Nevertheless,
even the complete knowledge of the spectrum does not suffice to recover the graph, thus more
information are needed. These information may be provided by the consensus time-series in the
Ren's framework
In some cases these procedures are not mandatory, as the spectrum may be partially known in
advance, therefore here we consider λN derived by [8, 10] as a parameter of the problem affected
by error and will not include it in the simulations explicitly.
Finally, it should be noted that often the consensus protocol is necessary to the technological
networks, thus no further calculation encumbrance is imposed to the control system. Since also
the spectrum may be calculated locally, we have two distributed elaborations, while the final
calculation is a centralized one because it requires to collect data from all the nodes and send back
the results to every node.
2. METHODS
Recently, a method to recover the laplacian matrix L of the a network of dynamical coupled
systems has been given by Ren [3]. Starting from the general form of the i-th differential system:
xi’ = Fi( xi )
i = 1, ... N, and adding couplings and noise we have:
xi’ = Fi (xi) – c Σj Lij H(xj) + ηi (1)
i, j = 1, ... N , where c is the coupling coefficient (here c = 1), H the coupling functions, x the state
variables, η the white gaussian noise with strength σ2
, Lij are the entries of the laplacian matrix L
derived from the undirected graph of the systems. Vectors and matrices are in bold. The laplacian
matrix is defined as:
L = D – A
where D is a diagonal matrix formed by the node degrees and A is the adjacency matrix (1 if a
link i-j exists, 0 otherwise) of the graph. Therefore we are considering a graph whose nodes are
technological agents represented by a differential equations coupled to other nodes through
communication links (the edges of the graph) according to an unknown topology.
The very interesting point in (1) is that the artificial added noise enables the solution of the
inverse problem: given the time series, reconstruct the graph. We focus on the standard consensus
form of (1):
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013
85
xi’ = Σj aij(xj -xi) + ρi , j = 1, ... N (2)
where aij are the entries of the adjacency matrix A. Differently from [3] we consider a high
frequency (HF) noise ρ instead of the white noise η; moreover, the noise strength is decreased,
because in a real environment to transmit a signal requires energy.
It is known that for a connected network, the equilibrium point for (2) is globally exponentially
stable and the consensus value is equal to the average of the initial values, thus solutions do exist.
In compact form (2) is written:
x’ = - Lx + ρ
Expression (2) and similar are utilized to coordinate the states of the agents on a common
position/velocity agreement resilient to disturbs [6, 7, 9, 14, 15, 16].
Now we give the main points of the Ren's mathematical procedure to derive the expression of the
dynamical correlation matrix that solves the inverse problem. Details can be found in [3, 13]. Let
us consider an undirected graph of the dynamical system (1); using small perturbations and
substituting the original variables
x°i = xi + ξi , i= 1, 2, ... N
we obtain
ξ' = [ JF ( x°) − L^
⊗ JH ( x°)] ξ + ρ
where L^
is the laplacian coupling matrix, JH,F is the Jacobian matrix of coupling functions.
The dynamical correlation among the consensus signals is called
C^
= <ξ ξT
>
After some calculations we have
A^
C^
+ C^
A^T
= <ρ ξ T
> / 2 (3)
with A^
= − JF^( x° ) + L^
⊗ J H^ ( x° )
(3) can be simplified as
L^
C^
+ C ˆL^T
= Iσ2
/ 2
and therefore
C^
~ L+
(σ2
/2) (4)
where C^
is the dynamical correlation matrix among the time series between node i and node j, +
indicates the Moore - Penrose pseudoinverse, σ2
the noise power. Note that (3) requires the
knowledge of all time series to calculate C^
, hence the reconstruction is centralized. Authors of
[3] find a one - to - one correspondence between the correlation matrix of time series from nodes
and the laplacian matrix. This remarkable, counter intuitive finding actually allows to set a
threshold for the entries of C^
: below it, the entries are considered -1, above 0, thus the laplacian
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013
86
matrix and consequently the adjacency matrix, is reconstructed. The threshold procedure is not
immediate to implement, anyway in [3] it is claimed a very good success rate.
Albeit no physical explanation of the phenomenon is claimed simulations show good results,
nevertheless, some errors are reported to remain.
Note that the Ren' s algorithm is more accurate if the average degree is large, but the energy
saving needs of the signal transmission apparatus require the average degree (i.e. the number of
communication links) to be kept as low as possible. As a consequence, in a real environment the
C^
estimation could be not exact.
At the same time, the consensus signals are needed also to control the network and in this respect,
noise is a disturb to keep as small as possible. Therefore, bearing in mind these considerations, we
suggest a node to transmit the consensus signal added with HF, low power noise and to low-pass
the noisy signal received.
2.1 The Spectral Estimation
To reduce or eliminate the residual error in the graph reconstruction we need extra information.
To this end, a relevant help is the knowledge at least of some eigenvalues of the laplacian
spectrum. In other cases the graph is fixed and there is no need of topological variations, thus the
desired spectrum is known and only a periodic verification is required, but usually the graph
changes frequently and demands an on-line check.
The spectral reconstruction has been studied in [8, 10]. Franceschelli calculates a distributed Fast
Fourier Transform (FFT) of signals derived from a proper distributed protocol and received at a
node i
xi’ = zi + ∑j ( zi - zj )
zi’ = - xi - ∑j ( xi - xj )
with j ∈ Ni (neighbour nodes at one hop of distance from node i). Thus, the state trajectory is a
linear combination of sinusoids oscillating only at frequencies function of the eigenvalues of the
Laplacian matrix λj, and the amplitude of the peaks in the spectrogram are related to the
eigenvalues
|F (xi(t))| = 1/2∑j aij δ (f ±(1+ λj) / 2π )
|F (zi(t))| = 1/2∑j bij δ (f ±(1+ λj) / 2π )
This method has some drawbacks [11]: the multiplicities of the eigenvalues cannot be calculated
and the FFT suffers from the presence of noise. Remember that independently from the Ren’s
procedure, communications are always polluted by several sources of noise.
On the other hand, [10] provides an estimation of the laplacian spectrum based on matrix power
iteration, but this way only an approximate solution can be obtained. Thus we conclude that the
methodologies of [8, 10] and similar are not completely reliable.
Finally, it is worth noting that even if an exact spectrum reconstruction were available, today is
not clear if, even theoretically, it is possible to find a one-to-one relation with the adjacency
matrix [12]. Alternative combinatorial optimization techniques such as the tabu search or
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013
87
simulated annealing are not exact and some of them would anyway require a long computation
time.
2.2 Error Reduction
Now let us consider that the largest lapalacian eigenvalue λN is available by means of one of the
previously described methods. It is intuitive to use it as a simple cost function, instead of the
threshold procedure, to determine the non null entries of the adjacency matrix recovered by (3).
Therefore in our methodology the matrix C^
is calculated from noisy consensus time-series and
normalized. Then, starting from a convenient value, an initial adjacency matrix A is produced
using (4), its largest laplacian eigenvalue λ*
N is calculated and subtracted to the supposed actual
eigenvalue λN :
min g(λ) = | λN - λ*
N |
and when the cost function reaches the minimum
g(λN) = 0 (5)
the actual matrix A is reconstructed (best results have been obtained with the largest eigenvalue,
although other eigenvalus may be used). In Figures 1a, b, c it is shown how the zero estimation
error of the eigenvalue is reached jointly with the complete reconstruction of the adjacency
matrix. On the ordinate the reconstruction error of the eigenvalue and of the adjacency matrix:
when the two vertical lines coincide, the reconstruction is done.
Figure 1a: Small World graph, 100 nodes (abscissa: time steps, ordinate: errors). Black dotted curve: actual
error percentage of the adjacency matrix entries (not including diagonal and symmetric elements),
continuous blue curve: the eigenvalue absolute error | λN - λ*
N |. Vertical red and green (green line is not
visible because is coincident with the red one) lines: exact reconstruction according to the (4). The
minimum value of the continuous blue curve indicates the correct topology reconstruction, i.e. zero errors.
Figure 1b: In this case two entries are wrong and the minimum indicated by the largest eigenvalue (green
dotted line), is no more coincident with the actual zero reconstruction error (dotted red line), see Table 2
also.
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013
88
Figure 1c: Enlargement of the minimum area of Figure 3a.
If errors in the exact estimation of the maximum laplacian eigenvalue were present, the exact
reconstruction as in Figure 1a is still possible for a low – moderate amount of error, although the
acceptable error in the eigenvalue estimation increases quickly (see Table 2).
2.3 Noise Addition
For the methodology to work it is necessary the addition of noise to the consensus protocol. As
pointed out before, in a real environment it is already present a background of natural or artificial
noise, then the noise level is further increased. This does not undermine the methodology,
provided the strength of the added noise is large enough.
In order to save energy and allow the consensus signals to produce a proper control action, we
add a high frequency (HF), low amplitude, zero mean, unitary variance Gaussian noise to (1).
Noise strength in simulations is σ2
= 0.01, one order magnitude smaller with respect to [3]. In
Figure 2b is shown the HF noise and the signal power spectral density (psd) spectrum
(frequencies are normalized). In Figure 2b, c it is shown a noisy consensus signal and as it
appears after the low-pass filtering, once the signal has been received in a node. Aside the delay
due to the low-pass filter, the original signal is recovered (Figure 2c).
Figure 2a A consensus signal with HF noise in the time domain.
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013
89
.
Figure 2b Power spectral density (psd) of the artificial HF noise added; left, psd of the original consensus
signal with noise added.
Figure 2c Noisy consensus solutions for a Small-World topology (N = 24, average degree 4) before the
low-pass filtering. Left: consensus time series after the low-pass filtering. The red dotted curve is the
original (no noise) time series.
2.4. Numerical Simulations
Numerical simulations have been conducted to validate the methodology, results are shown in
Table 1. The task is to recovery exactly all of the significant (N2
– N) / 2 entries of the adjacency
matrix A of the graph.
Four types of topologies have been considered: Erdos-Renyi (random, p = 0.01), Small-World
(average degree: 4, p = 0.1), pipeline (average degree: 4), grid (average degree: 4), N = 24, see
Figure 3. All time series have a length of 150 simulation time-steps (1500 samples) for N = 24;
the first 30 samples have been discarded because the transitory impair the calculations. As the
size (in nodes) increases, longer time series are needed. As an example, when the node size of a
Small-World (SW) graph is 100, about 370 simulation steps are needed to recover the graph.
Note that an higher noise level reduces the steps, bur increases the energy dissipation. The trade-
off should be analysed on an ad hoc basis. In Table 2 are shown the results for a large and a
small SW graphs in presence of errors on the estimation of the maximum laplacian eigenvalue,
obtained by the methods of [10] or [8].
The acceptable error on the maximum eigenvalue estimation (meaning that the number of
mistaken entries of A is still zero) increases as N increases. For example for N = 100, the 3.22%
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013
90
estimation error means that the real value λN = 4.0375 is altered as much as: λN ± 0.13, but the
reconstruction of the matrix A remains exact. In the simulations, the centralized elaborations are
represented by the computation of the inverse correlation matrix C^
among all the time-series
received from the N nodes.
For each configuration a complete reconstruction (zero errors) has been achieved, see Table 1. In
particular, Small-World networks are very interesting as pointed out by [5], because of the high
consensus speed and connectedness properties, but the noise addition slows down the consensus
computations.
Table: 1 Simulation results
Graph
topology
Error Nodes Links Integration
steps
Erdos-Renyi 0 48 16 ~150
Small-World 0 24 48 ~150
Small-World 0 100 200 ~370
Pipeline 0 24 43 ~150
Grid 0 24 38 ~150
Grid 0 100 180 ~370
Since we have conducted the simulation with a high level language and a non optimized code, the
actual calculation time is not significant. In the real-world application a C or Java optimized
programming language or a Digital Signal Processor must be used, reducing the actual
calculation.
The small-world consensus scheme seems to be the fastest also for a low number of nodes. This is
interesting, because although it is known [5] that when a Small-World has a number of nodes N >
100 the convergence is very fast, for N = 24, as in our case, there is no previous guarantee.
Figure 3a Left to right graph topologies: regular grid, pipe-line. Each node is an agent, links are wireless
communication channels. The grid topology is the most regular, the SW is half-way between regularity and
randomness.
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013
91
Figure 3b Left to right graph topologies: Small-World and random. The grid topology is the most regular,
the SW is half-way between regularity and randomness. Note the some disconnected nodes of the ER
random topology.
Table 2: Stability of solutions for SW topology
Graph
topology
Mistaken
entries
Nodes Overall
Entries
of A
Acceptable error in the λN
estimation
SW 0 100 4950 3.22%
SW 2 100 4950 7%
SW 0 24 276 0.22%
SW 2 24 276 15.2%
2.5 Effects of Delays On The Reconstruction
[13] has extended the Ren’s method to the quasi-uniform delay case. While the integration of
stochastic delayed differential equations is not simple, from a theoretical point of view the
procedure is similar to the zero delay case. Therefore, it is conceivable that the framework
discussed here is suited also for the delayed case. It should be mentioned that also the threshold
effects [17] may influences delays and have to be considered carefully.
Apart form the theoretical considerations, our methodology finds application in a number of real-
world technologies, as submarine robot swarms and mobile ad hoc networks [18], especially if
connectivity is a major concern [19].
3. CONCLUSIONS
One of the most important and unsolved problem in graph theory is the reconstruction of the
topology of technological networks. In fact, position sensors are often inaccurate, unable to work
properly and the graph may change suddenly. At the cost of a semi - centralized elaboration of the
consensus time series, we have shown how it is possible to achieve a complete topology
reconstruction. The methodology envisages the reconstruction of the graph using the noisy
signals of the consensus protocol. When received, signals are correlated and the resulting
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013
92
correlation matrix is elaborated according to a simple relation to obtain the laplacian matrix.
Since the largest eigenvalue of the laplacian matrix can be estimated independently, although not
exactly, it is possible to calculate a cost function of the reconstruction. This information allows to
decide the adjacency matrix with zero or minimum error. The original consensus signals
necessary to the control are recovered by low-pass filtering, as noise is allocated in the relatively
high frequency band.
ACKNOWLEDGEMENTS
This work has been supported by the HARNESS Project, funded by the Italian Institute of
Technology (IIT).
REFERENCES
[1] Botti, P. Merris, R., (1993) “Almost all trees share a complete set of immanantal polynomials”,
Journal of graph theory, Vol. 17, p. 468.
[2] Comellas, F., Diaz-Lopez, J., (2012) “Spectral reconstruction of networks using combinatorial
optimization algorithms”, http://upcommons.upc.edu/e_prints/bitstream/2117/1037/1/CoDi07-
LapSpRecons.pdf.
[3] Ren, J., Wang, W.-X., Li, B., and Lai, Y.-C., (2010) “Noise Bridges Dynamical Correlation and
Topology in Coupled Oscillator Networks”, Phys. Rev. Lett., Vol. 104, pp. 058701.
[4] Olfati-Saber, R., and Murray, R. M., (2004) “Consensus Problem in Networks of Agents with
Switching Topology and Time-Delays”, IEEE Trans. Aut. Contr., Vol. 49, No. 9, pp. 1520-1531.
[5] Olfati_Saber, R., (2005) “Ultrafast Consensus”, Proceedings of the American Control Conference
IEEE, Los Alamitos, CA, pp. 2371-2378,.
[6] Olfati_Saber, R., Fax, J., Murray, R. M., (2007) “Consensus and Cooperation in Networked Multi-
Agent Systems”, Proceedings of IEEE, Vol. 95, No. 1.
[7] Dousse, O., Baccelli, F., and Thiran, P., (2005) “Impact of Interferences on Connectivity in Ad Hoc
Networks”, IEEE ACM Trans. Networking, Vol. 13, No. 2, pp. 425.
[8] Franceschelli, M., Gasparri, A., Giua, A., Seatzu, C., (2012) “Decentralized Estimation of Laplacian
Eigenvalues in Multi-gentSystems”, http://arxiv.org/pdf/1206.4509.pdf.
[9] Cucker, F. and Smale, S., (2007) “On the mathematics of the emergence, Jnp. J. Math., Vol. 2 No. 1,
pp. 197-227.
[10] Yang, P., Freeman, R. A., Gordon, G., Lynch, K., Srinivasa, S., and Sukthankar, R, (2008)
“Decentralized estimation and control of graph connectivity in mobile sensor networks”, American
Control Conference.
[11] Van Dam, E., and Haemers, W., (2003) “Which graphs are determined by their spectrum?”, Linear
Algebra and its Applications, Vol. 373, pp.241–272.
[12] Kibangou, A., Commault, C., (2012) Decentralize Laplacian Eigenvalues Estimation and
Collaborative Network Topology Identification, 3rd IFAC Workshop on Distributed Estimation and
Control in Networked Systems, NecSys '12, Santa Barbara.
[13] Wang, W. X., Ren, J., Lai, Y. C., Li. B., (2012) “Reverse engineering of complex dinamic networks
in the presence of time-delayed interaction based on time-series”, Chaos, Vol. 22, pp 033131.
[14] Traverso, F., Trucco, A. , Vernazza, G., (2012) Simulation of non-White and non-Gaussian
Underwater Ambient Noise, OCEANS’12 MTS/IEEE Yeosu Conference, Yeosu, South Korea.
[15] Bullo, F. Cortes, J., and Martınez, S. (2009) “Distributed Control of Robotic Networks”, Applied
Mathematics Series. Princeton University Press.
[16] Xi, J., Shi, Z., Zhong, Y., (2012), “Consensus and consensualization of high-order swarm systems
with time delays and external disturbances”, J. Dyn. Sys. Meas. , Vol. 134, No. 4.
[17] Dell’Isola, F. and Romano, A.. (1987) “A phenomenological approach to phase transition in classical
field theory”, International Journal of Engineering Science, Vol. 25 1469-1475.
[18] Meghanathan, N. and Terrel, M., (2012) “ A similation study on strong neighborhood stable
connected dominating set for mobile ad hoc networks”, International Journal of Computer Networks
& Communications, Vol.4, No.4, pp 1-19.
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013
93
[19] Mathews, E. and Mathew, C., (2012) “Deployment of mobile routers ensuring coverage and
connectivity ”, International Journal of Computer Networks & Communications, Vol.4, No.1, pp 175-
191.
AUTHORS
Enzo Fioriti graduated in Automatic Control Engineering at La Sapienza Rome University.
He has worked in the ICT private sector and as researcher in Complex Systems, Neural
Networks Critical Infrastructures, Graph Theory at the ENEA CR Casaccia. Currently he is
interested in underwater robot swarm.
Stefano Chiesa received his bachelor's and the master degree in Computer Science from
Roma 3 University, Rome, in 2006 and 2010 respectively. Currently he is working at ENEA
(Italian national agency for new technologies, energy and sustainable economic development)
as research fellow. His research interest include swarm robotics, formation control, computer
vision, visual odometry.
Fabio Fratichini graduated in Electronic Engineering at La Sapienza Rome University. He
has worked as a researcher at ENEA (National agency for new technologies, energy and
sustainable economic development) research center. He is working as researcher in
robotics, sensor data fusion, Kalman filter. Currently he is interested in localization of
underwater robot swarm within the HARNESS Project.

Mais conteúdo relacionado

Mais procurados

Adaptive Channel Equalization for Nonlinear Channels using Signed Regressor F...
Adaptive Channel Equalization for Nonlinear Channels using Signed Regressor F...Adaptive Channel Equalization for Nonlinear Channels using Signed Regressor F...
Adaptive Channel Equalization for Nonlinear Channels using Signed Regressor F...IDES Editor
 
Implementation and Impact of LNS MAC Units in Digital Filter Application
Implementation and Impact of LNS MAC Units in Digital Filter ApplicationImplementation and Impact of LNS MAC Units in Digital Filter Application
Implementation and Impact of LNS MAC Units in Digital Filter ApplicationIJTET Journal
 
Stochastic Computing Correlation Utilization in Convolutional Neural Network ...
Stochastic Computing Correlation Utilization in Convolutional Neural Network ...Stochastic Computing Correlation Utilization in Convolutional Neural Network ...
Stochastic Computing Correlation Utilization in Convolutional Neural Network ...TELKOMNIKA JOURNAL
 
A novel architecture of rns based
A novel architecture of rns basedA novel architecture of rns based
A novel architecture of rns basedVLSICS Design
 
Discrete-wavelet-transform recursive inverse algorithm using second-order est...
Discrete-wavelet-transform recursive inverse algorithm using second-order est...Discrete-wavelet-transform recursive inverse algorithm using second-order est...
Discrete-wavelet-transform recursive inverse algorithm using second-order est...TELKOMNIKA JOURNAL
 
A New Approach to Linear Estimation Problem in Multiuser Massive MIMO Systems
A New Approach to Linear Estimation Problem in Multiuser Massive MIMO SystemsA New Approach to Linear Estimation Problem in Multiuser Massive MIMO Systems
A New Approach to Linear Estimation Problem in Multiuser Massive MIMO SystemsRadita Apriana
 
COMPARISON OF VOLUME AND DISTANCE CONSTRAINT ON HYPERSPECTRAL UNMIXING
COMPARISON OF VOLUME AND DISTANCE CONSTRAINT ON HYPERSPECTRAL UNMIXINGCOMPARISON OF VOLUME AND DISTANCE CONSTRAINT ON HYPERSPECTRAL UNMIXING
COMPARISON OF VOLUME AND DISTANCE CONSTRAINT ON HYPERSPECTRAL UNMIXINGcsandit
 
A Unifying Probabilistic Perspective for Spectral Dimensionality Reduction:
A Unifying Probabilistic Perspective for Spectral Dimensionality Reduction:A Unifying Probabilistic Perspective for Spectral Dimensionality Reduction:
A Unifying Probabilistic Perspective for Spectral Dimensionality Reduction:Sean Golliher
 
Seminar Report (Final)
Seminar Report (Final)Seminar Report (Final)
Seminar Report (Final)Aruneel Das
 
PERFORMANCE EVALUATION OF DIFFERENT TECHNIQUES FOR TEXTURE CLASSIFICATION
PERFORMANCE EVALUATION OF DIFFERENT TECHNIQUES FOR TEXTURE CLASSIFICATION PERFORMANCE EVALUATION OF DIFFERENT TECHNIQUES FOR TEXTURE CLASSIFICATION
PERFORMANCE EVALUATION OF DIFFERENT TECHNIQUES FOR TEXTURE CLASSIFICATION cscpconf
 
circuit_modes_v5
circuit_modes_v5circuit_modes_v5
circuit_modes_v5Olivier Buu
 
cis98010
cis98010cis98010
cis98010perfj
 
Further results on the joint time delay and frequency estimation without eige...
Further results on the joint time delay and frequency estimation without eige...Further results on the joint time delay and frequency estimation without eige...
Further results on the joint time delay and frequency estimation without eige...IJCNCJournal
 
3 - A critical review on the usual DCT Implementations (presented in a Malays...
3 - A critical review on the usual DCT Implementations (presented in a Malays...3 - A critical review on the usual DCT Implementations (presented in a Malays...
3 - A critical review on the usual DCT Implementations (presented in a Malays...Youness Lahdili
 
Massive parallelism with gpus for centrality ranking in complex networks
Massive parallelism with gpus for centrality ranking in complex networksMassive parallelism with gpus for centrality ranking in complex networks
Massive parallelism with gpus for centrality ranking in complex networksijcsit
 
JAVA BASED VISUALIZATION AND ANIMATION FOR TEACHING THE DIJKSTRA SHORTEST PAT...
JAVA BASED VISUALIZATION AND ANIMATION FOR TEACHING THE DIJKSTRA SHORTEST PAT...JAVA BASED VISUALIZATION AND ANIMATION FOR TEACHING THE DIJKSTRA SHORTEST PAT...
JAVA BASED VISUALIZATION AND ANIMATION FOR TEACHING THE DIJKSTRA SHORTEST PAT...ijseajournal
 
Paper id 26201482
Paper id 26201482Paper id 26201482
Paper id 26201482IJRAT
 

Mais procurados (20)

Adaptive Channel Equalization for Nonlinear Channels using Signed Regressor F...
Adaptive Channel Equalization for Nonlinear Channels using Signed Regressor F...Adaptive Channel Equalization for Nonlinear Channels using Signed Regressor F...
Adaptive Channel Equalization for Nonlinear Channels using Signed Regressor F...
 
Implementation and Impact of LNS MAC Units in Digital Filter Application
Implementation and Impact of LNS MAC Units in Digital Filter ApplicationImplementation and Impact of LNS MAC Units in Digital Filter Application
Implementation and Impact of LNS MAC Units in Digital Filter Application
 
iscas07
iscas07iscas07
iscas07
 
Stochastic Computing Correlation Utilization in Convolutional Neural Network ...
Stochastic Computing Correlation Utilization in Convolutional Neural Network ...Stochastic Computing Correlation Utilization in Convolutional Neural Network ...
Stochastic Computing Correlation Utilization in Convolutional Neural Network ...
 
A novel architecture of rns based
A novel architecture of rns basedA novel architecture of rns based
A novel architecture of rns based
 
Fuzzy c-means
Fuzzy c-meansFuzzy c-means
Fuzzy c-means
 
Discrete-wavelet-transform recursive inverse algorithm using second-order est...
Discrete-wavelet-transform recursive inverse algorithm using second-order est...Discrete-wavelet-transform recursive inverse algorithm using second-order est...
Discrete-wavelet-transform recursive inverse algorithm using second-order est...
 
A New Approach to Linear Estimation Problem in Multiuser Massive MIMO Systems
A New Approach to Linear Estimation Problem in Multiuser Massive MIMO SystemsA New Approach to Linear Estimation Problem in Multiuser Massive MIMO Systems
A New Approach to Linear Estimation Problem in Multiuser Massive MIMO Systems
 
COMPARISON OF VOLUME AND DISTANCE CONSTRAINT ON HYPERSPECTRAL UNMIXING
COMPARISON OF VOLUME AND DISTANCE CONSTRAINT ON HYPERSPECTRAL UNMIXINGCOMPARISON OF VOLUME AND DISTANCE CONSTRAINT ON HYPERSPECTRAL UNMIXING
COMPARISON OF VOLUME AND DISTANCE CONSTRAINT ON HYPERSPECTRAL UNMIXING
 
A Unifying Probabilistic Perspective for Spectral Dimensionality Reduction:
A Unifying Probabilistic Perspective for Spectral Dimensionality Reduction:A Unifying Probabilistic Perspective for Spectral Dimensionality Reduction:
A Unifying Probabilistic Perspective for Spectral Dimensionality Reduction:
 
Seminar Report (Final)
Seminar Report (Final)Seminar Report (Final)
Seminar Report (Final)
 
PERFORMANCE EVALUATION OF DIFFERENT TECHNIQUES FOR TEXTURE CLASSIFICATION
PERFORMANCE EVALUATION OF DIFFERENT TECHNIQUES FOR TEXTURE CLASSIFICATION PERFORMANCE EVALUATION OF DIFFERENT TECHNIQUES FOR TEXTURE CLASSIFICATION
PERFORMANCE EVALUATION OF DIFFERENT TECHNIQUES FOR TEXTURE CLASSIFICATION
 
circuit_modes_v5
circuit_modes_v5circuit_modes_v5
circuit_modes_v5
 
cis98010
cis98010cis98010
cis98010
 
Further results on the joint time delay and frequency estimation without eige...
Further results on the joint time delay and frequency estimation without eige...Further results on the joint time delay and frequency estimation without eige...
Further results on the joint time delay and frequency estimation without eige...
 
3 - A critical review on the usual DCT Implementations (presented in a Malays...
3 - A critical review on the usual DCT Implementations (presented in a Malays...3 - A critical review on the usual DCT Implementations (presented in a Malays...
3 - A critical review on the usual DCT Implementations (presented in a Malays...
 
23
2323
23
 
Massive parallelism with gpus for centrality ranking in complex networks
Massive parallelism with gpus for centrality ranking in complex networksMassive parallelism with gpus for centrality ranking in complex networks
Massive parallelism with gpus for centrality ranking in complex networks
 
JAVA BASED VISUALIZATION AND ANIMATION FOR TEACHING THE DIJKSTRA SHORTEST PAT...
JAVA BASED VISUALIZATION AND ANIMATION FOR TEACHING THE DIJKSTRA SHORTEST PAT...JAVA BASED VISUALIZATION AND ANIMATION FOR TEACHING THE DIJKSTRA SHORTEST PAT...
JAVA BASED VISUALIZATION AND ANIMATION FOR TEACHING THE DIJKSTRA SHORTEST PAT...
 
Paper id 26201482
Paper id 26201482Paper id 26201482
Paper id 26201482
 

Destaque

A preliminary evaluation of bandwidth allocation model dynamic switching
A preliminary evaluation of bandwidth allocation model dynamic switchingA preliminary evaluation of bandwidth allocation model dynamic switching
A preliminary evaluation of bandwidth allocation model dynamic switchingIJCNCJournal
 
HONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROID
HONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROIDHONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROID
HONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROIDIJCNCJournal
 
ON THE OPTIMIZATION OF BITTORRENT-LIKE PROTOCOLS FOR INTERACTIVE ON-DEMAND ST...
ON THE OPTIMIZATION OF BITTORRENT-LIKE PROTOCOLS FOR INTERACTIVE ON-DEMAND ST...ON THE OPTIMIZATION OF BITTORRENT-LIKE PROTOCOLS FOR INTERACTIVE ON-DEMAND ST...
ON THE OPTIMIZATION OF BITTORRENT-LIKE PROTOCOLS FOR INTERACTIVE ON-DEMAND ST...IJCNCJournal
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
 
In network aggregation using efficient routing techniques for event driven se...
In network aggregation using efficient routing techniques for event driven se...In network aggregation using efficient routing techniques for event driven se...
In network aggregation using efficient routing techniques for event driven se...IJCNCJournal
 
Healthy Nutrition Under Asp-Prolog
Healthy Nutrition Under Asp-PrologHealthy Nutrition Under Asp-Prolog
Healthy Nutrition Under Asp-PrologIJCNCJournal
 
AN EFFICIENT SPECTRUM SHARING METHOD BASED ON GENETIC ALGORITHM IN HETEROGENE...
AN EFFICIENT SPECTRUM SHARING METHOD BASED ON GENETIC ALGORITHM IN HETEROGENE...AN EFFICIENT SPECTRUM SHARING METHOD BASED ON GENETIC ALGORITHM IN HETEROGENE...
AN EFFICIENT SPECTRUM SHARING METHOD BASED ON GENETIC ALGORITHM IN HETEROGENE...IJCNCJournal
 
Peak detection using wavelet transform
Peak detection using wavelet transformPeak detection using wavelet transform
Peak detection using wavelet transformIJCNCJournal
 
Comparative analyisis on some possible partnership schemes of global ip excha...
Comparative analyisis on some possible partnership schemes of global ip excha...Comparative analyisis on some possible partnership schemes of global ip excha...
Comparative analyisis on some possible partnership schemes of global ip excha...IJCNCJournal
 
AN ADAPTIVE PSEUDORANDOM STEGO-CRYPTO TECHNIQUE FOR DATA COMMUNICATION
AN ADAPTIVE PSEUDORANDOM STEGO-CRYPTO TECHNIQUE FOR DATA COMMUNICATIONAN ADAPTIVE PSEUDORANDOM STEGO-CRYPTO TECHNIQUE FOR DATA COMMUNICATION
AN ADAPTIVE PSEUDORANDOM STEGO-CRYPTO TECHNIQUE FOR DATA COMMUNICATIONIJCNCJournal
 
Performance comparison of mobile ad hoc network routing protocols
Performance comparison of mobile ad hoc network routing protocolsPerformance comparison of mobile ad hoc network routing protocols
Performance comparison of mobile ad hoc network routing protocolsIJCNCJournal
 
Comparative performance analysis of different modulation techniques for papr ...
Comparative performance analysis of different modulation techniques for papr ...Comparative performance analysis of different modulation techniques for papr ...
Comparative performance analysis of different modulation techniques for papr ...IJCNCJournal
 
Analysis of wifi and wimax and wireless network coexistence
Analysis of wifi and wimax and wireless network coexistenceAnalysis of wifi and wimax and wireless network coexistence
Analysis of wifi and wimax and wireless network coexistenceIJCNCJournal
 
Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...IJCNCJournal
 
EFFECTS OF FILTERS ON DVB-T RECEIVER PERFORMANCE UNDER AWGN, RAYLEIGH, AND RI...
EFFECTS OF FILTERS ON DVB-T RECEIVER PERFORMANCE UNDER AWGN, RAYLEIGH, AND RI...EFFECTS OF FILTERS ON DVB-T RECEIVER PERFORMANCE UNDER AWGN, RAYLEIGH, AND RI...
EFFECTS OF FILTERS ON DVB-T RECEIVER PERFORMANCE UNDER AWGN, RAYLEIGH, AND RI...IJCNCJournal
 

Destaque (19)

A preliminary evaluation of bandwidth allocation model dynamic switching
A preliminary evaluation of bandwidth allocation model dynamic switchingA preliminary evaluation of bandwidth allocation model dynamic switching
A preliminary evaluation of bandwidth allocation model dynamic switching
 
HONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROID
HONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROIDHONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROID
HONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROID
 
Ijcnc050202
Ijcnc050202Ijcnc050202
Ijcnc050202
 
ON THE OPTIMIZATION OF BITTORRENT-LIKE PROTOCOLS FOR INTERACTIVE ON-DEMAND ST...
ON THE OPTIMIZATION OF BITTORRENT-LIKE PROTOCOLS FOR INTERACTIVE ON-DEMAND ST...ON THE OPTIMIZATION OF BITTORRENT-LIKE PROTOCOLS FOR INTERACTIVE ON-DEMAND ST...
ON THE OPTIMIZATION OF BITTORRENT-LIKE PROTOCOLS FOR INTERACTIVE ON-DEMAND ST...
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and Steganography
 
In network aggregation using efficient routing techniques for event driven se...
In network aggregation using efficient routing techniques for event driven se...In network aggregation using efficient routing techniques for event driven se...
In network aggregation using efficient routing techniques for event driven se...
 
Healthy Nutrition Under Asp-Prolog
Healthy Nutrition Under Asp-PrologHealthy Nutrition Under Asp-Prolog
Healthy Nutrition Under Asp-Prolog
 
AN EFFICIENT SPECTRUM SHARING METHOD BASED ON GENETIC ALGORITHM IN HETEROGENE...
AN EFFICIENT SPECTRUM SHARING METHOD BASED ON GENETIC ALGORITHM IN HETEROGENE...AN EFFICIENT SPECTRUM SHARING METHOD BASED ON GENETIC ALGORITHM IN HETEROGENE...
AN EFFICIENT SPECTRUM SHARING METHOD BASED ON GENETIC ALGORITHM IN HETEROGENE...
 
Ijcnc050212
Ijcnc050212Ijcnc050212
Ijcnc050212
 
Peak detection using wavelet transform
Peak detection using wavelet transformPeak detection using wavelet transform
Peak detection using wavelet transform
 
Comparative analyisis on some possible partnership schemes of global ip excha...
Comparative analyisis on some possible partnership schemes of global ip excha...Comparative analyisis on some possible partnership schemes of global ip excha...
Comparative analyisis on some possible partnership schemes of global ip excha...
 
AN ADAPTIVE PSEUDORANDOM STEGO-CRYPTO TECHNIQUE FOR DATA COMMUNICATION
AN ADAPTIVE PSEUDORANDOM STEGO-CRYPTO TECHNIQUE FOR DATA COMMUNICATIONAN ADAPTIVE PSEUDORANDOM STEGO-CRYPTO TECHNIQUE FOR DATA COMMUNICATION
AN ADAPTIVE PSEUDORANDOM STEGO-CRYPTO TECHNIQUE FOR DATA COMMUNICATION
 
Performance comparison of mobile ad hoc network routing protocols
Performance comparison of mobile ad hoc network routing protocolsPerformance comparison of mobile ad hoc network routing protocols
Performance comparison of mobile ad hoc network routing protocols
 
Comparative performance analysis of different modulation techniques for papr ...
Comparative performance analysis of different modulation techniques for papr ...Comparative performance analysis of different modulation techniques for papr ...
Comparative performance analysis of different modulation techniques for papr ...
 
Analysis of wifi and wimax and wireless network coexistence
Analysis of wifi and wimax and wireless network coexistenceAnalysis of wifi and wimax and wireless network coexistence
Analysis of wifi and wimax and wireless network coexistence
 
Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...
 
Ijcnc050210
Ijcnc050210Ijcnc050210
Ijcnc050210
 
Ijcnc050215
Ijcnc050215Ijcnc050215
Ijcnc050215
 
EFFECTS OF FILTERS ON DVB-T RECEIVER PERFORMANCE UNDER AWGN, RAYLEIGH, AND RI...
EFFECTS OF FILTERS ON DVB-T RECEIVER PERFORMANCE UNDER AWGN, RAYLEIGH, AND RI...EFFECTS OF FILTERS ON DVB-T RECEIVER PERFORMANCE UNDER AWGN, RAYLEIGH, AND RI...
EFFECTS OF FILTERS ON DVB-T RECEIVER PERFORMANCE UNDER AWGN, RAYLEIGH, AND RI...
 

Semelhante a Exact network reconstruction from consensus signals and one eigen value

MODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTION
MODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTIONMODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTION
MODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTIONijwmn
 
Performance of Matching Algorithmsfor Signal Approximation
Performance of Matching Algorithmsfor Signal ApproximationPerformance of Matching Algorithmsfor Signal Approximation
Performance of Matching Algorithmsfor Signal Approximationiosrjce
 
Iaetsd a novel scheduling algorithms for mimo based wireless networks
Iaetsd a novel scheduling algorithms for mimo based wireless networksIaetsd a novel scheduling algorithms for mimo based wireless networks
Iaetsd a novel scheduling algorithms for mimo based wireless networksIaetsd Iaetsd
 
Fault Tolerant Matrix Pencil Method for Direction of Arrival Estimation
Fault Tolerant Matrix Pencil Method for Direction of Arrival EstimationFault Tolerant Matrix Pencil Method for Direction of Arrival Estimation
Fault Tolerant Matrix Pencil Method for Direction of Arrival Estimationsipij
 
Drobics, m. 2001: datamining using synergiesbetween self-organising maps and...
Drobics, m. 2001:  datamining using synergiesbetween self-organising maps and...Drobics, m. 2001:  datamining using synergiesbetween self-organising maps and...
Drobics, m. 2001: datamining using synergiesbetween self-organising maps and...ArchiLab 7
 
Discrete wavelet transform-based RI adaptive algorithm for system identification
Discrete wavelet transform-based RI adaptive algorithm for system identificationDiscrete wavelet transform-based RI adaptive algorithm for system identification
Discrete wavelet transform-based RI adaptive algorithm for system identificationIJECEIAES
 
Ill-posedness formulation of the emission source localization in the radio- d...
Ill-posedness formulation of the emission source localization in the radio- d...Ill-posedness formulation of the emission source localization in the radio- d...
Ill-posedness formulation of the emission source localization in the radio- d...Ahmed Ammar Rebai PhD
 
PERFORMANCE EVALUATION OF ADAPTIVE ARRAY ANTENNAS IN COGNITIVE RELAY NETWORK
PERFORMANCE EVALUATION OF ADAPTIVE ARRAY ANTENNAS IN COGNITIVE RELAY NETWORKPERFORMANCE EVALUATION OF ADAPTIVE ARRAY ANTENNAS IN COGNITIVE RELAY NETWORK
PERFORMANCE EVALUATION OF ADAPTIVE ARRAY ANTENNAS IN COGNITIVE RELAY NETWORKcsijjournal
 
Paper id 24201464
Paper id 24201464Paper id 24201464
Paper id 24201464IJRAT
 
EBDSS Max Research Report - Final
EBDSS  Max  Research Report - FinalEBDSS  Max  Research Report - Final
EBDSS Max Research Report - FinalMax Robertson
 
Energy Efficient Power Failure Diagonisis For Wireless Network Using Random G...
Energy Efficient Power Failure Diagonisis For Wireless Network Using Random G...Energy Efficient Power Failure Diagonisis For Wireless Network Using Random G...
Energy Efficient Power Failure Diagonisis For Wireless Network Using Random G...idescitation
 
DCE: A NOVEL DELAY CORRELATION MEASUREMENT FOR TOMOGRAPHY WITH PASSIVE REAL...
DCE: A NOVEL DELAY CORRELATION  MEASUREMENT FOR TOMOGRAPHY WITH PASSIVE  REAL...DCE: A NOVEL DELAY CORRELATION  MEASUREMENT FOR TOMOGRAPHY WITH PASSIVE  REAL...
DCE: A NOVEL DELAY CORRELATION MEASUREMENT FOR TOMOGRAPHY WITH PASSIVE REAL...ijdpsjournal
 
Performance Evaluation of Adaptive Array Antennas in Cognitive Relay Network
Performance Evaluation of Adaptive Array Antennas in Cognitive Relay NetworkPerformance Evaluation of Adaptive Array Antennas in Cognitive Relay Network
Performance Evaluation of Adaptive Array Antennas in Cognitive Relay Networkcsijjournal
 
PERFORMANCE EVALUATION OF ADAPTIVE ARRAY ANTENNAS IN COGNITIVE RELAY NETWORK
PERFORMANCE EVALUATION OF ADAPTIVE ARRAY ANTENNAS IN COGNITIVE RELAY NETWORK PERFORMANCE EVALUATION OF ADAPTIVE ARRAY ANTENNAS IN COGNITIVE RELAY NETWORK
PERFORMANCE EVALUATION OF ADAPTIVE ARRAY ANTENNAS IN COGNITIVE RELAY NETWORK csijjournal
 
Performance Evaluation Of Adaptive Array Antennas In Cognitive Relay Network
Performance Evaluation Of Adaptive Array Antennas In Cognitive Relay NetworkPerformance Evaluation Of Adaptive Array Antennas In Cognitive Relay Network
Performance Evaluation Of Adaptive Array Antennas In Cognitive Relay Networkcsijjournal
 
FPGA Design & Simulation Modeling of Baseband Data Transmission System
FPGA Design & Simulation Modeling of Baseband Data Transmission SystemFPGA Design & Simulation Modeling of Baseband Data Transmission System
FPGA Design & Simulation Modeling of Baseband Data Transmission SystemIOSR Journals
 
Dce a novel delay correlation
Dce a novel delay correlationDce a novel delay correlation
Dce a novel delay correlationijdpsjournal
 

Semelhante a Exact network reconstruction from consensus signals and one eigen value (20)

MODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTION
MODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTIONMODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTION
MODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTION
 
L010628894
L010628894L010628894
L010628894
 
Performance of Matching Algorithmsfor Signal Approximation
Performance of Matching Algorithmsfor Signal ApproximationPerformance of Matching Algorithmsfor Signal Approximation
Performance of Matching Algorithmsfor Signal Approximation
 
Iaetsd a novel scheduling algorithms for mimo based wireless networks
Iaetsd a novel scheduling algorithms for mimo based wireless networksIaetsd a novel scheduling algorithms for mimo based wireless networks
Iaetsd a novel scheduling algorithms for mimo based wireless networks
 
Fault Tolerant Matrix Pencil Method for Direction of Arrival Estimation
Fault Tolerant Matrix Pencil Method for Direction of Arrival EstimationFault Tolerant Matrix Pencil Method for Direction of Arrival Estimation
Fault Tolerant Matrix Pencil Method for Direction of Arrival Estimation
 
Drobics, m. 2001: datamining using synergiesbetween self-organising maps and...
Drobics, m. 2001:  datamining using synergiesbetween self-organising maps and...Drobics, m. 2001:  datamining using synergiesbetween self-organising maps and...
Drobics, m. 2001: datamining using synergiesbetween self-organising maps and...
 
Discrete wavelet transform-based RI adaptive algorithm for system identification
Discrete wavelet transform-based RI adaptive algorithm for system identificationDiscrete wavelet transform-based RI adaptive algorithm for system identification
Discrete wavelet transform-based RI adaptive algorithm for system identification
 
Ill-posedness formulation of the emission source localization in the radio- d...
Ill-posedness formulation of the emission source localization in the radio- d...Ill-posedness formulation of the emission source localization in the radio- d...
Ill-posedness formulation of the emission source localization in the radio- d...
 
PERFORMANCE EVALUATION OF ADAPTIVE ARRAY ANTENNAS IN COGNITIVE RELAY NETWORK
PERFORMANCE EVALUATION OF ADAPTIVE ARRAY ANTENNAS IN COGNITIVE RELAY NETWORKPERFORMANCE EVALUATION OF ADAPTIVE ARRAY ANTENNAS IN COGNITIVE RELAY NETWORK
PERFORMANCE EVALUATION OF ADAPTIVE ARRAY ANTENNAS IN COGNITIVE RELAY NETWORK
 
Paper id 24201464
Paper id 24201464Paper id 24201464
Paper id 24201464
 
EBDSS Max Research Report - Final
EBDSS  Max  Research Report - FinalEBDSS  Max  Research Report - Final
EBDSS Max Research Report - Final
 
190 195
190 195190 195
190 195
 
Energy Efficient Power Failure Diagonisis For Wireless Network Using Random G...
Energy Efficient Power Failure Diagonisis For Wireless Network Using Random G...Energy Efficient Power Failure Diagonisis For Wireless Network Using Random G...
Energy Efficient Power Failure Diagonisis For Wireless Network Using Random G...
 
DCE: A NOVEL DELAY CORRELATION MEASUREMENT FOR TOMOGRAPHY WITH PASSIVE REAL...
DCE: A NOVEL DELAY CORRELATION  MEASUREMENT FOR TOMOGRAPHY WITH PASSIVE  REAL...DCE: A NOVEL DELAY CORRELATION  MEASUREMENT FOR TOMOGRAPHY WITH PASSIVE  REAL...
DCE: A NOVEL DELAY CORRELATION MEASUREMENT FOR TOMOGRAPHY WITH PASSIVE REAL...
 
Performance Evaluation of Adaptive Array Antennas in Cognitive Relay Network
Performance Evaluation of Adaptive Array Antennas in Cognitive Relay NetworkPerformance Evaluation of Adaptive Array Antennas in Cognitive Relay Network
Performance Evaluation of Adaptive Array Antennas in Cognitive Relay Network
 
PERFORMANCE EVALUATION OF ADAPTIVE ARRAY ANTENNAS IN COGNITIVE RELAY NETWORK
PERFORMANCE EVALUATION OF ADAPTIVE ARRAY ANTENNAS IN COGNITIVE RELAY NETWORK PERFORMANCE EVALUATION OF ADAPTIVE ARRAY ANTENNAS IN COGNITIVE RELAY NETWORK
PERFORMANCE EVALUATION OF ADAPTIVE ARRAY ANTENNAS IN COGNITIVE RELAY NETWORK
 
Performance Evaluation Of Adaptive Array Antennas In Cognitive Relay Network
Performance Evaluation Of Adaptive Array Antennas In Cognitive Relay NetworkPerformance Evaluation Of Adaptive Array Antennas In Cognitive Relay Network
Performance Evaluation Of Adaptive Array Antennas In Cognitive Relay Network
 
FPGA Design & Simulation Modeling of Baseband Data Transmission System
FPGA Design & Simulation Modeling of Baseband Data Transmission SystemFPGA Design & Simulation Modeling of Baseband Data Transmission System
FPGA Design & Simulation Modeling of Baseband Data Transmission System
 
Ieee 2013 matlab abstracts part b
Ieee 2013 matlab abstracts part bIeee 2013 matlab abstracts part b
Ieee 2013 matlab abstracts part b
 
Dce a novel delay correlation
Dce a novel delay correlationDce a novel delay correlation
Dce a novel delay correlation
 

Mais de IJCNCJournal

High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...IJCNCJournal
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...IJCNCJournal
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemIJCNCJournal
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSIJCNCJournal
 
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdfFebruary_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
 
Q-Learning Model for Blockchain Security in Internet of Medical Things Networks
Q-Learning Model for Blockchain Security in Internet of Medical Things NetworksQ-Learning Model for Blockchain Security in Internet of Medical Things Networks
Q-Learning Model for Blockchain Security in Internet of Medical Things NetworksIJCNCJournal
 

Mais de IJCNCJournal (20)

High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & Communications
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDS
 
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdfFebruary_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
 
Q-Learning Model for Blockchain Security in Internet of Medical Things Networks
Q-Learning Model for Blockchain Security in Internet of Medical Things NetworksQ-Learning Model for Blockchain Security in Internet of Medical Things Networks
Q-Learning Model for Blockchain Security in Internet of Medical Things Networks
 

Último

What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 

Último (20)

What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 

Exact network reconstruction from consensus signals and one eigen value

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013 DOI : 10.5121/ijcnc.2013.5507 83 EXACT NETWORK RECONSTRUCTION FROM CONSENSUS SIGNALS AND ONE EIGENVALUE Enzo Fioriti1 , Stefano Chiesa1 , Fabio Fratichini1 1 ENEA, CR Casaccia, UTTEI-ROB, Roma, Italy vincenzo.fioriti@enea.it ABSTRACT The basic inverse problem in spectral graph theory consists in determining the graph given its eigenvalue spectrum. In this paper, we are interested in a network of technological agents whose graph is unknown, communicating by means of a consensus protocol. Recently, the use of artificial noise added to consensus signals has been proposed to reconstruct the unknown graph, although errors are possible. On the other hand, some methodologies have been devised to estimate the eigenvalue spectrum, but noise could interfere with the elaborations. We combine these two techniques in order to simplify calculations and avoid topological reconstruction errors, using only one eigenvalue. Moreover, we use an high frequency noise to reconstruct the network, thus it is easy to filter the control signals after the graph identification. Numerical simulations of several topologies show an exact and robust reconstruction of the graphs. KEYWORDS Networks, Graph, Topology, Eigenvalue spectrum 1. INTRODUCTION Given a network of interacting agents we describe a methodology able to reconstruct exactly the graph from time series and one eigenvalue of the graph spectrum (the inverse problem for technological networks), using recently developed signal analysis and algebraic graph theory techniques. There are many reasons to be aware of the graph topology. For example, if the graph is time-varying the knowledge of the topology is clearly of paramount relevance for the network control, especially in the mobile sensor network case. The next generation of technological networks will be equipped with topology discover methodologies. Moreover, from a mathematical point of view, the knowledge of the adjacency or laplacian matrix of the network allows a relatively easy calculation (at least for small-medium size graphs) of fundamental parameters. To name only a few: the second largest laplacian eigenvalue (the Fiedler or algebraic eigenvalue) and the maximum eigenvalue of the adjacency matrix are two well- known parameters relevant to the connectivity, the information exchange and control. bottlenecks are easily detected; most influential nodes can be identified. However, a fundamental obstacle to the solution of this inverse problem is the absence of one-to- one correspondence between graph and its spectrum: different graphs can have the same spectrum [1]. Although Camellas [2] has recently obtained some useful results with combinatorial optimization algorithms for the main topological parameters (diameter, average distance, degree distribution, clustering), the complete graph identification remain unsolved. As a theoretical
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013 84 solution seems hard to find, we propose to take advantage of specific characteristics of technological networks to reduce the complexity of the inverse problem. In particular, if the graph variability is associated to the agent mobility, a common control algorithm is the consensus protocol [4]. The consensus protocol is widely implemented because it is a distributed calculation, i.e. each agent is required to communicate only with its closest neighbours. In this paper, we consider the consensus as the main control tool of the network, though many different situation are equally possible, and following [3], we use an artificial added noise for a basic estimation of the topology. Moreover, we take advantage from the (approximate) knowledge of one eigenvalue of the graph spectrum, let's say the maximum eigenvalue of the laplacian matrix λN to eliminate the errors. Some distributed procedures are already available [8, 10] to estimate the eigenvalue spectrum, as explained in the following paragraphs. Nevertheless, even the complete knowledge of the spectrum does not suffice to recover the graph, thus more information are needed. These information may be provided by the consensus time-series in the Ren's framework In some cases these procedures are not mandatory, as the spectrum may be partially known in advance, therefore here we consider λN derived by [8, 10] as a parameter of the problem affected by error and will not include it in the simulations explicitly. Finally, it should be noted that often the consensus protocol is necessary to the technological networks, thus no further calculation encumbrance is imposed to the control system. Since also the spectrum may be calculated locally, we have two distributed elaborations, while the final calculation is a centralized one because it requires to collect data from all the nodes and send back the results to every node. 2. METHODS Recently, a method to recover the laplacian matrix L of the a network of dynamical coupled systems has been given by Ren [3]. Starting from the general form of the i-th differential system: xi’ = Fi( xi ) i = 1, ... N, and adding couplings and noise we have: xi’ = Fi (xi) – c Σj Lij H(xj) + ηi (1) i, j = 1, ... N , where c is the coupling coefficient (here c = 1), H the coupling functions, x the state variables, η the white gaussian noise with strength σ2 , Lij are the entries of the laplacian matrix L derived from the undirected graph of the systems. Vectors and matrices are in bold. The laplacian matrix is defined as: L = D – A where D is a diagonal matrix formed by the node degrees and A is the adjacency matrix (1 if a link i-j exists, 0 otherwise) of the graph. Therefore we are considering a graph whose nodes are technological agents represented by a differential equations coupled to other nodes through communication links (the edges of the graph) according to an unknown topology. The very interesting point in (1) is that the artificial added noise enables the solution of the inverse problem: given the time series, reconstruct the graph. We focus on the standard consensus form of (1):
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013 85 xi’ = Σj aij(xj -xi) + ρi , j = 1, ... N (2) where aij are the entries of the adjacency matrix A. Differently from [3] we consider a high frequency (HF) noise ρ instead of the white noise η; moreover, the noise strength is decreased, because in a real environment to transmit a signal requires energy. It is known that for a connected network, the equilibrium point for (2) is globally exponentially stable and the consensus value is equal to the average of the initial values, thus solutions do exist. In compact form (2) is written: x’ = - Lx + ρ Expression (2) and similar are utilized to coordinate the states of the agents on a common position/velocity agreement resilient to disturbs [6, 7, 9, 14, 15, 16]. Now we give the main points of the Ren's mathematical procedure to derive the expression of the dynamical correlation matrix that solves the inverse problem. Details can be found in [3, 13]. Let us consider an undirected graph of the dynamical system (1); using small perturbations and substituting the original variables x°i = xi + ξi , i= 1, 2, ... N we obtain ξ' = [ JF ( x°) − L^ ⊗ JH ( x°)] ξ + ρ where L^ is the laplacian coupling matrix, JH,F is the Jacobian matrix of coupling functions. The dynamical correlation among the consensus signals is called C^ = <ξ ξT > After some calculations we have A^ C^ + C^ A^T = <ρ ξ T > / 2 (3) with A^ = − JF^( x° ) + L^ ⊗ J H^ ( x° ) (3) can be simplified as L^ C^ + C ˆL^T = Iσ2 / 2 and therefore C^ ~ L+ (σ2 /2) (4) where C^ is the dynamical correlation matrix among the time series between node i and node j, + indicates the Moore - Penrose pseudoinverse, σ2 the noise power. Note that (3) requires the knowledge of all time series to calculate C^ , hence the reconstruction is centralized. Authors of [3] find a one - to - one correspondence between the correlation matrix of time series from nodes and the laplacian matrix. This remarkable, counter intuitive finding actually allows to set a threshold for the entries of C^ : below it, the entries are considered -1, above 0, thus the laplacian
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013 86 matrix and consequently the adjacency matrix, is reconstructed. The threshold procedure is not immediate to implement, anyway in [3] it is claimed a very good success rate. Albeit no physical explanation of the phenomenon is claimed simulations show good results, nevertheless, some errors are reported to remain. Note that the Ren' s algorithm is more accurate if the average degree is large, but the energy saving needs of the signal transmission apparatus require the average degree (i.e. the number of communication links) to be kept as low as possible. As a consequence, in a real environment the C^ estimation could be not exact. At the same time, the consensus signals are needed also to control the network and in this respect, noise is a disturb to keep as small as possible. Therefore, bearing in mind these considerations, we suggest a node to transmit the consensus signal added with HF, low power noise and to low-pass the noisy signal received. 2.1 The Spectral Estimation To reduce or eliminate the residual error in the graph reconstruction we need extra information. To this end, a relevant help is the knowledge at least of some eigenvalues of the laplacian spectrum. In other cases the graph is fixed and there is no need of topological variations, thus the desired spectrum is known and only a periodic verification is required, but usually the graph changes frequently and demands an on-line check. The spectral reconstruction has been studied in [8, 10]. Franceschelli calculates a distributed Fast Fourier Transform (FFT) of signals derived from a proper distributed protocol and received at a node i xi’ = zi + ∑j ( zi - zj ) zi’ = - xi - ∑j ( xi - xj ) with j ∈ Ni (neighbour nodes at one hop of distance from node i). Thus, the state trajectory is a linear combination of sinusoids oscillating only at frequencies function of the eigenvalues of the Laplacian matrix λj, and the amplitude of the peaks in the spectrogram are related to the eigenvalues |F (xi(t))| = 1/2∑j aij δ (f ±(1+ λj) / 2π ) |F (zi(t))| = 1/2∑j bij δ (f ±(1+ λj) / 2π ) This method has some drawbacks [11]: the multiplicities of the eigenvalues cannot be calculated and the FFT suffers from the presence of noise. Remember that independently from the Ren’s procedure, communications are always polluted by several sources of noise. On the other hand, [10] provides an estimation of the laplacian spectrum based on matrix power iteration, but this way only an approximate solution can be obtained. Thus we conclude that the methodologies of [8, 10] and similar are not completely reliable. Finally, it is worth noting that even if an exact spectrum reconstruction were available, today is not clear if, even theoretically, it is possible to find a one-to-one relation with the adjacency matrix [12]. Alternative combinatorial optimization techniques such as the tabu search or
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013 87 simulated annealing are not exact and some of them would anyway require a long computation time. 2.2 Error Reduction Now let us consider that the largest lapalacian eigenvalue λN is available by means of one of the previously described methods. It is intuitive to use it as a simple cost function, instead of the threshold procedure, to determine the non null entries of the adjacency matrix recovered by (3). Therefore in our methodology the matrix C^ is calculated from noisy consensus time-series and normalized. Then, starting from a convenient value, an initial adjacency matrix A is produced using (4), its largest laplacian eigenvalue λ* N is calculated and subtracted to the supposed actual eigenvalue λN : min g(λ) = | λN - λ* N | and when the cost function reaches the minimum g(λN) = 0 (5) the actual matrix A is reconstructed (best results have been obtained with the largest eigenvalue, although other eigenvalus may be used). In Figures 1a, b, c it is shown how the zero estimation error of the eigenvalue is reached jointly with the complete reconstruction of the adjacency matrix. On the ordinate the reconstruction error of the eigenvalue and of the adjacency matrix: when the two vertical lines coincide, the reconstruction is done. Figure 1a: Small World graph, 100 nodes (abscissa: time steps, ordinate: errors). Black dotted curve: actual error percentage of the adjacency matrix entries (not including diagonal and symmetric elements), continuous blue curve: the eigenvalue absolute error | λN - λ* N |. Vertical red and green (green line is not visible because is coincident with the red one) lines: exact reconstruction according to the (4). The minimum value of the continuous blue curve indicates the correct topology reconstruction, i.e. zero errors. Figure 1b: In this case two entries are wrong and the minimum indicated by the largest eigenvalue (green dotted line), is no more coincident with the actual zero reconstruction error (dotted red line), see Table 2 also.
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013 88 Figure 1c: Enlargement of the minimum area of Figure 3a. If errors in the exact estimation of the maximum laplacian eigenvalue were present, the exact reconstruction as in Figure 1a is still possible for a low – moderate amount of error, although the acceptable error in the eigenvalue estimation increases quickly (see Table 2). 2.3 Noise Addition For the methodology to work it is necessary the addition of noise to the consensus protocol. As pointed out before, in a real environment it is already present a background of natural or artificial noise, then the noise level is further increased. This does not undermine the methodology, provided the strength of the added noise is large enough. In order to save energy and allow the consensus signals to produce a proper control action, we add a high frequency (HF), low amplitude, zero mean, unitary variance Gaussian noise to (1). Noise strength in simulations is σ2 = 0.01, one order magnitude smaller with respect to [3]. In Figure 2b is shown the HF noise and the signal power spectral density (psd) spectrum (frequencies are normalized). In Figure 2b, c it is shown a noisy consensus signal and as it appears after the low-pass filtering, once the signal has been received in a node. Aside the delay due to the low-pass filter, the original signal is recovered (Figure 2c). Figure 2a A consensus signal with HF noise in the time domain.
  • 7. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013 89 . Figure 2b Power spectral density (psd) of the artificial HF noise added; left, psd of the original consensus signal with noise added. Figure 2c Noisy consensus solutions for a Small-World topology (N = 24, average degree 4) before the low-pass filtering. Left: consensus time series after the low-pass filtering. The red dotted curve is the original (no noise) time series. 2.4. Numerical Simulations Numerical simulations have been conducted to validate the methodology, results are shown in Table 1. The task is to recovery exactly all of the significant (N2 – N) / 2 entries of the adjacency matrix A of the graph. Four types of topologies have been considered: Erdos-Renyi (random, p = 0.01), Small-World (average degree: 4, p = 0.1), pipeline (average degree: 4), grid (average degree: 4), N = 24, see Figure 3. All time series have a length of 150 simulation time-steps (1500 samples) for N = 24; the first 30 samples have been discarded because the transitory impair the calculations. As the size (in nodes) increases, longer time series are needed. As an example, when the node size of a Small-World (SW) graph is 100, about 370 simulation steps are needed to recover the graph. Note that an higher noise level reduces the steps, bur increases the energy dissipation. The trade- off should be analysed on an ad hoc basis. In Table 2 are shown the results for a large and a small SW graphs in presence of errors on the estimation of the maximum laplacian eigenvalue, obtained by the methods of [10] or [8]. The acceptable error on the maximum eigenvalue estimation (meaning that the number of mistaken entries of A is still zero) increases as N increases. For example for N = 100, the 3.22%
  • 8. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013 90 estimation error means that the real value λN = 4.0375 is altered as much as: λN ± 0.13, but the reconstruction of the matrix A remains exact. In the simulations, the centralized elaborations are represented by the computation of the inverse correlation matrix C^ among all the time-series received from the N nodes. For each configuration a complete reconstruction (zero errors) has been achieved, see Table 1. In particular, Small-World networks are very interesting as pointed out by [5], because of the high consensus speed and connectedness properties, but the noise addition slows down the consensus computations. Table: 1 Simulation results Graph topology Error Nodes Links Integration steps Erdos-Renyi 0 48 16 ~150 Small-World 0 24 48 ~150 Small-World 0 100 200 ~370 Pipeline 0 24 43 ~150 Grid 0 24 38 ~150 Grid 0 100 180 ~370 Since we have conducted the simulation with a high level language and a non optimized code, the actual calculation time is not significant. In the real-world application a C or Java optimized programming language or a Digital Signal Processor must be used, reducing the actual calculation. The small-world consensus scheme seems to be the fastest also for a low number of nodes. This is interesting, because although it is known [5] that when a Small-World has a number of nodes N > 100 the convergence is very fast, for N = 24, as in our case, there is no previous guarantee. Figure 3a Left to right graph topologies: regular grid, pipe-line. Each node is an agent, links are wireless communication channels. The grid topology is the most regular, the SW is half-way between regularity and randomness.
  • 9. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013 91 Figure 3b Left to right graph topologies: Small-World and random. The grid topology is the most regular, the SW is half-way between regularity and randomness. Note the some disconnected nodes of the ER random topology. Table 2: Stability of solutions for SW topology Graph topology Mistaken entries Nodes Overall Entries of A Acceptable error in the λN estimation SW 0 100 4950 3.22% SW 2 100 4950 7% SW 0 24 276 0.22% SW 2 24 276 15.2% 2.5 Effects of Delays On The Reconstruction [13] has extended the Ren’s method to the quasi-uniform delay case. While the integration of stochastic delayed differential equations is not simple, from a theoretical point of view the procedure is similar to the zero delay case. Therefore, it is conceivable that the framework discussed here is suited also for the delayed case. It should be mentioned that also the threshold effects [17] may influences delays and have to be considered carefully. Apart form the theoretical considerations, our methodology finds application in a number of real- world technologies, as submarine robot swarms and mobile ad hoc networks [18], especially if connectivity is a major concern [19]. 3. CONCLUSIONS One of the most important and unsolved problem in graph theory is the reconstruction of the topology of technological networks. In fact, position sensors are often inaccurate, unable to work properly and the graph may change suddenly. At the cost of a semi - centralized elaboration of the consensus time series, we have shown how it is possible to achieve a complete topology reconstruction. The methodology envisages the reconstruction of the graph using the noisy signals of the consensus protocol. When received, signals are correlated and the resulting
  • 10. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013 92 correlation matrix is elaborated according to a simple relation to obtain the laplacian matrix. Since the largest eigenvalue of the laplacian matrix can be estimated independently, although not exactly, it is possible to calculate a cost function of the reconstruction. This information allows to decide the adjacency matrix with zero or minimum error. The original consensus signals necessary to the control are recovered by low-pass filtering, as noise is allocated in the relatively high frequency band. ACKNOWLEDGEMENTS This work has been supported by the HARNESS Project, funded by the Italian Institute of Technology (IIT). REFERENCES [1] Botti, P. Merris, R., (1993) “Almost all trees share a complete set of immanantal polynomials”, Journal of graph theory, Vol. 17, p. 468. [2] Comellas, F., Diaz-Lopez, J., (2012) “Spectral reconstruction of networks using combinatorial optimization algorithms”, http://upcommons.upc.edu/e_prints/bitstream/2117/1037/1/CoDi07- LapSpRecons.pdf. [3] Ren, J., Wang, W.-X., Li, B., and Lai, Y.-C., (2010) “Noise Bridges Dynamical Correlation and Topology in Coupled Oscillator Networks”, Phys. Rev. Lett., Vol. 104, pp. 058701. [4] Olfati-Saber, R., and Murray, R. M., (2004) “Consensus Problem in Networks of Agents with Switching Topology and Time-Delays”, IEEE Trans. Aut. Contr., Vol. 49, No. 9, pp. 1520-1531. [5] Olfati_Saber, R., (2005) “Ultrafast Consensus”, Proceedings of the American Control Conference IEEE, Los Alamitos, CA, pp. 2371-2378,. [6] Olfati_Saber, R., Fax, J., Murray, R. M., (2007) “Consensus and Cooperation in Networked Multi- Agent Systems”, Proceedings of IEEE, Vol. 95, No. 1. [7] Dousse, O., Baccelli, F., and Thiran, P., (2005) “Impact of Interferences on Connectivity in Ad Hoc Networks”, IEEE ACM Trans. Networking, Vol. 13, No. 2, pp. 425. [8] Franceschelli, M., Gasparri, A., Giua, A., Seatzu, C., (2012) “Decentralized Estimation of Laplacian Eigenvalues in Multi-gentSystems”, http://arxiv.org/pdf/1206.4509.pdf. [9] Cucker, F. and Smale, S., (2007) “On the mathematics of the emergence, Jnp. J. Math., Vol. 2 No. 1, pp. 197-227. [10] Yang, P., Freeman, R. A., Gordon, G., Lynch, K., Srinivasa, S., and Sukthankar, R, (2008) “Decentralized estimation and control of graph connectivity in mobile sensor networks”, American Control Conference. [11] Van Dam, E., and Haemers, W., (2003) “Which graphs are determined by their spectrum?”, Linear Algebra and its Applications, Vol. 373, pp.241–272. [12] Kibangou, A., Commault, C., (2012) Decentralize Laplacian Eigenvalues Estimation and Collaborative Network Topology Identification, 3rd IFAC Workshop on Distributed Estimation and Control in Networked Systems, NecSys '12, Santa Barbara. [13] Wang, W. X., Ren, J., Lai, Y. C., Li. B., (2012) “Reverse engineering of complex dinamic networks in the presence of time-delayed interaction based on time-series”, Chaos, Vol. 22, pp 033131. [14] Traverso, F., Trucco, A. , Vernazza, G., (2012) Simulation of non-White and non-Gaussian Underwater Ambient Noise, OCEANS’12 MTS/IEEE Yeosu Conference, Yeosu, South Korea. [15] Bullo, F. Cortes, J., and Martınez, S. (2009) “Distributed Control of Robotic Networks”, Applied Mathematics Series. Princeton University Press. [16] Xi, J., Shi, Z., Zhong, Y., (2012), “Consensus and consensualization of high-order swarm systems with time delays and external disturbances”, J. Dyn. Sys. Meas. , Vol. 134, No. 4. [17] Dell’Isola, F. and Romano, A.. (1987) “A phenomenological approach to phase transition in classical field theory”, International Journal of Engineering Science, Vol. 25 1469-1475. [18] Meghanathan, N. and Terrel, M., (2012) “ A similation study on strong neighborhood stable connected dominating set for mobile ad hoc networks”, International Journal of Computer Networks & Communications, Vol.4, No.4, pp 1-19.
  • 11. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013 93 [19] Mathews, E. and Mathew, C., (2012) “Deployment of mobile routers ensuring coverage and connectivity ”, International Journal of Computer Networks & Communications, Vol.4, No.1, pp 175- 191. AUTHORS Enzo Fioriti graduated in Automatic Control Engineering at La Sapienza Rome University. He has worked in the ICT private sector and as researcher in Complex Systems, Neural Networks Critical Infrastructures, Graph Theory at the ENEA CR Casaccia. Currently he is interested in underwater robot swarm. Stefano Chiesa received his bachelor's and the master degree in Computer Science from Roma 3 University, Rome, in 2006 and 2010 respectively. Currently he is working at ENEA (Italian national agency for new technologies, energy and sustainable economic development) as research fellow. His research interest include swarm robotics, formation control, computer vision, visual odometry. Fabio Fratichini graduated in Electronic Engineering at La Sapienza Rome University. He has worked as a researcher at ENEA (National agency for new technologies, energy and sustainable economic development) research center. He is working as researcher in robotics, sensor data fusion, Kalman filter. Currently he is interested in localization of underwater robot swarm within the HARNESS Project.