Abstract:In this paper, a single Unmanned-Aerial-Vehicle (UAV)-aided localization algorithm which uses both Doppler and Time of Arrival (ToA) measurements is presented. In contrast to Doppler-based localization algorithms which are based on non-convex functions, exploiting ToA measurements in a Least-Square (LS) Doppler-based cost function, leads to a quadratic convex function whose minimizer lies on a line. Utilizing the ToA measurements in addition to the linear equation of minimizer, a closed form solution is obtained for the emitter location using a constrained LS optimization. In addition, a trajectory design of the UAV is provided which has also closed-form solution. Simulation experiments demonstrate the effectiveness of the proposed algorithm in comparison to some others in the literature.
Abstract:This letter proposes superposing two Generalized Quadratic Noise Modulators (GQNM) by simply adding their outputs. It creates a 16-ary noise modulator that resembles QAM modulators in classical communication. It modulates the information bits on four different means and four different variances. It could also be applied to reach higher-order modulations than 16-ary schemes by adding the outputs of more than two modulators, which is not discussed in detail in this letter and left for future work. By selecting the parameters necessary for satisfying the theoretical distinguishability conditions provided in the paper, we can reach better performances in comparison to the Kirchhoff-Law Johnson Noise (KLJN) modulator and the GQNM modulator, which is verified by the simulations. The better result in terms of smaller Bit Error Probability (BEP) is achieved by increasing the complexity in the modulator, the transmitter, and the detectors in the receiver.
Abstract:This paper presents a novel three-dimensional (3D) 8-ary noise modulation scheme that introduces a new dimension: the mixture probability of a Mixture of Gaussian (MoG) distribution. This proposed approach utilizes the dimensions of mean and variance, in addition to the new probability dimension. Within this framework, each transmitted symbol carries three bits, each corresponding to a distinct sub-channel. For detection, a combination of specialized detectors is employed: a simple threshold based detector for the first sub-channel bit (modulated by the mean), a Maximum-Likelihood (ML) detector for the second sub-channel bit (modulated by the variance), a Kurtosis-based, Jarque-Bera (JB) test, and Bayesian Hypothesis (BHT)-based detectors for the third bit (modulated by the MoG probability). The Kurtosis- and JB-based detectors specifically distinguish between Gaussian (or near-Gaussian) and non-Gaussian MoG distributions by leveraging higher-order statistical measures. The Bit Error Probabilities (BEPs) are derived for the threshold-, Kurtosis-, and BHT-based detectors. The optimum threshold for the Kurtosis-based detector is also derived in a tractable manner. Simulation results demonstrate that a comparably low BEP is achieved for the third sub-channel bit relative to existing two-dimensional (2D) schemes. Simultaneously, the proposed scheme increases the data rate by a factor of 1.5 and 3 compared to the Generalized Quadratic noise modulator and the classical binary KLJN noise modulator, respectively. Furthermore, the Kurtosis-based detector offers a low-complexity solution, achieving an acceptable BEP of approximately 0.06.
Abstract:In this letter, we propose a secure blind Graph Signal Recovery (GSR) algorithm that can detect adversary nodes. Some unknown adversaries are assumed to be injecting false data at their respective nodes in the graph. The number and location of adversaries are not known in advance and the goal is to recover the graph signal in the presence of measurement noise and False Data Injection (FDI) caused by the adversaries. Consequently, the proposed algorithm would be a perfect candidate to solve this challenging problem. Moreover, due to the presence of malicious nodes, the proposed method serves as a secure GSR algorithm. For adversary detection, a statistical measure based on differential smoothness is used. Specifically, the difference between the current observed smoothness and the average smoothness excluding the corresponding node. This genuine statistical approach leads to an effective and low-complexity adversary detector. In addition, following malicious node detection, the GSR is performed using a variant of smoothness maximization, which is solved efficiently as a fractional optimization problem using a Dinkelbach's algorithm. Analysis of the detector, which determines the optimum threshold of the detector is also presented. Simulation results show a significant improvement of the proposed method in signal recovery compared to the median GSR algorithm and other competing methods.