AFRL-OSR-VA-TR

Similar documents
Information, Decision, & Complex Networks AFOSR/RTC Overview

COMPUTATIONAL FLUID DYNAMICS (CFD) ANALYSIS AND DEVELOPMENT OF HALON- REPLACEMENT FIRE EXTINGUISHING SYSTEMS (PHASE II)

Multi-Modal Communication

Using Model-Theoretic Invariants for Semantic Integration. Michael Gruninger NIST / Institute for Systems Research University of Maryland

DISTRIBUTION A: Distribution approved for public release.

DoD Common Access Card Information Brief. Smart Card Project Managers Group

4. Lessons Learned in Introducing MBSE: 2009 to 2012

Accuracy of Computed Water Surface Profiles

Dynamic Information Management and Exchange for Command and Control Applications

Service Level Agreements: An Approach to Software Lifecycle Management. CDR Leonard Gaines Naval Supply Systems Command 29 January 2003

Dana Sinno MIT Lincoln Laboratory 244 Wood Street Lexington, MA phone:

Empirically Based Analysis: The DDoS Case

HEC-FFA Flood Frequency Analysis

Vision Protection Army Technology Objective (ATO) Overview for GVSET VIP Day. Sensors from Laser Weapons Date: 17 Jul 09 UNCLASSIFIED

A Review of the 2007 Air Force Inaugural Sustainability Report

FUDSChem. Brian Jordan With the assistance of Deb Walker. Formerly Used Defense Site Chemistry Database. USACE-Albuquerque District.

Afcft.^n fc5( Form Approved OMB No

DEVELOPMENT OF A NOVEL MICROWAVE RADAR SYSTEM USING ANGULAR CORRELATION FOR THE DETECTION OF BURIED OBJECTS IN SANDY SOILS

73rd MORSS CD Cover Page UNCLASSIFIED DISCLOSURE FORM CD Presentation

Edwards Air Force Base Accelerates Flight Test Data Analysis Using MATLAB and Math Works. John Bourgeois EDWARDS AFB, CA. PRESENTED ON: 10 June 2010

Automation Middleware and Algorithms for Robotic Underwater Sensor Networks

Advanced Numerical Methods for Numerical Weather Prediction

LARGE AREA, REAL TIME INSPECTION OF ROCKET MOTORS USING A NOVEL HANDHELD ULTRASOUND CAMERA

Concept of Operations Discussion Summary

A Distributed Parallel Processing System for Command and Control Imagery

Better Contextual Suggestions in ClueWeb12 Using Domain Knowledge Inferred from The Open Web

Kathleen Fisher Program Manager, Information Innovation Office

Exploring the Query Expansion Methods for Concept Based Representation

UMass at TREC 2006: Enterprise Track

Application of Hydrodynamics and Dynamics Models for Efficient Operation of Modular Mini-AUVs in Shallow and Very-Shallow Waters

73rd MORSS CD Cover Page UNCLASSIFIED DISCLOSURE FORM CD Presentation

Introducing I 3 CON. The Information Interpretation and Integration Conference

SNUMedinfo at TREC CDS track 2014: Medical case-based retrieval task

Radar Tomography of Moving Targets

An Update on CORBA Performance for HPEC Algorithms. Bill Beckwith Objective Interface Systems, Inc.

Space and Missile Systems Center

AFRL-ML-WP-TM

Topology Control from Bottom to Top

Uniform Tests of File Converters Using Unit Cubes

ARINC653 AADL Annex Update

Advanced Numerical Methods for Numerical Weather Prediction

C2-Simulation Interoperability in NATO

2013 US State of Cybercrime Survey

ENVIRONMENTAL MANAGEMENT SYSTEM WEB SITE (EMSWeb)

75th Air Base Wing. Effective Data Stewarding Measures in Support of EESOH-MIS

Running CyberCIEGE on Linux without Windows

Shallow Ocean Bottom BRDF Prediction, Modeling, and Inversion via Simulation with Surface/Volume Data Derived from X-Ray Tomography

WAITING ON MORE THAN 64 HANDLES

Monte Carlo Techniques for Estimating Power in Aircraft T&E Tests. Todd Remund Dr. William Kitto EDWARDS AFB, CA. July 2011

Defense Hotline Allegations Concerning Contractor-Invoiced Travel for U.S. Army Corps of Engineers' Contracts W912DY-10-D-0014 and W912DY-10-D-0024

The C2 Workstation and Data Replication over Disadvantaged Tactical Communication Links

High-Assurance Security/Safety on HPEC Systems: an Oxymoron?

VICTORY VALIDATION AN INTRODUCTION AND TECHNICAL OVERVIEW

Detection, Classification, & Identification of Objects in Cluttered Images

Ross Lazarus MB,BS MPH

A Methodology for End-to-End Evaluation of Arabic Document Image Processing Software

Headquarters U.S. Air Force. EMS Play-by-Play: Using Air Force Playbooks to Standardize EMS

Technological Advances In Emergency Management

Using Templates to Support Crisis Action Mission Planning

Secure FAST: Security Enhancement in the NATO Time Sensitive Targeting Tool

CENTER FOR ADVANCED ENERGY SYSTEM Rutgers University. Field Management for Industrial Assessment Centers Appointed By USDOE

Towards a Formal Pedigree Ontology for Level-One Sensor Fusion

Web Site update. 21st HCAT Program Review Toronto, September 26, Keith Legg

BUPT at TREC 2009: Entity Track

Apparel Research Network Upgrade Special Measurement Electronic Order File Final Technical Report September 27, 2004

NEW FINITE ELEMENT / MULTIBODY SYSTEM ALGORITHM FOR MODELING FLEXIBLE TRACKED VEHICLES

Enhanced Predictability Through Lagrangian Observations and Analysis

Current Threat Environment

Distributed Real-Time Embedded Video Processing

The Last Word on TLE. James Brownlow AIR FORCE TEST CENTER EDWARDS AFB, CA May, Approved for public release ; distribution is unlimited.

Title: An Integrated Design Environment to Evaluate Power/Performance Tradeoffs for Sensor Network Applications 1

SURVIVABILITY ENHANCED RUN-FLAT

SCIENTIFIC VISUALIZATION OF SOIL LIQUEFACTION

MODELING AND SIMULATION OF LIQUID MOLDING PROCESSES. Pavel Simacek Center for Composite Materials University of Delaware

Data Reorganization Interface

Balancing Transport and Physical Layers in Wireless Ad Hoc Networks: Jointly Optimal Congestion Control and Power Control

Shallow Ocean Bottom BRDF Prediction, Modeling, and Inversion via Simulation with Surface/Volume Data Derived from X-ray Tomography

Lessons Learned in Adapting a Software System to a Micro Computer

Use of the Polarized Radiance Distribution Camera System in the RADYO Program

TARGET IMPACT DETECTION ALGORITHM USING COMPUTER-AIDED DESIGN (CAD) MODEL GEOMETRY

Directed Energy Using High-Power Microwave Technology

Wireless Connectivity of Swarms in Presence of Obstacles

Basing a Modeling Environment on a General Purpose Theorem Prover

ASPECTS OF USE OF CFD FOR UAV CONFIGURATION DESIGN

ATCCIS Replication Mechanism (ARM)

ASSESSMENT OF A BAYESIAN MODEL AND TEST VALIDATION METHOD

Chemical, Biological, Radiological & Nuclear Defense Information Analysis Center CBRNIAC

Setting the Standard for Real-Time Digital Signal Processing Pentek Seminar Series. Digital IF Standardization

Architecting for Resiliency Army s Common Operating Environment (COE) SERC

Dr. Stuart Dickinson Dr. Donald H. Steinbrecher Naval Undersea Warfare Center, Newport, RI May 10, 2011

Space and Missile Systems Center

Energy Security: A Global Challenge

Corrosion Prevention and Control Database. Bob Barbin 07 February 2011 ASETSDefense 2011

Compliant Baffle for Large Telescope Daylight Imaging. Stacie Williams Air Force Research Laboratory ABSTRACT

REPORT DOCUMENTATION PAGE

DoD M&S Project: Standardized Documentation for Verification, Validation, and Accreditation

SCICEX Data Stewardship: FY2012 Report

INTEGRATING LOCAL AND GLOBAL NAVIGATION IN UNMANNED GROUND VEHICLES

NATO-IST-124 Experimentation Instructions

An Efficient Architecture for Ultra Long FFTs in FPGAs and ASICs

Transcription:

AFRL-OSR-VA-TR-2013-0130 COMPRESSIVE SENSING AND CODING FOR COMPLEX NETWORKS Olgica Milenkovic, Angelia Nedich University of Illinois March 2013 Final Report DISTRIBUTION A: Approved for public release. AIR FORCE RESEARCH LABORATORY AF OFFICE OF SCIENTIFIC RESEARCH (AFOSR) ARLINGTON, VIRGINIA 22203 AIR FORCE MATERIEL COMMAND

REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing the burden, to the Department of Defense, Executive Services and Communications Directorate (0704-0188). Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ORGANIZATION. 1. REPORT DATE (DD-MM-YYYY) 2. REPORT TYPE 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSOR/MONITOR'S ACRONYM(S) 11. SPONSOR/MONITOR'S REPORT NUMBER(S) 12. DISTRIBUTION/AVAILABILITY STATEMENT 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: a. REPORT b. ABSTRACT c. THIS PAGE 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON 19b. TELEPHONE NUMBER (Include area code) Standard Form 298 (Rev. 8/98) Prescribed by ANSI Std. Z39.18

COMPRESSIVE SENSING AND CODING FOR COMPLEX NETWORKS 1. Final Report Summary: The focus of the research project was on developing an interdisciplinary, analytical approach to dimensionality reduction, information dissemination, aggregation and monitoring over complex networks. In the course of the project's development, the following system solutions were proposed, analyzed and implemented: a. A novel approach to combating physical and network layer communication errors through the novel framework of network coding, termed Hybrid Network Coding. b. An algorithmic solution for compressive sensing with side information, termed Sparsely Corrupted Information Bottleneck. c. A family of distributed vote (ordinal data) aggregation methods over networks, with applications in social choice theory and bioinformatics. 2. Accomplishments/New Findings: Describe research highlights, their significance to the field, their relationship to the original goals, their relevance to the AF's mission, and their potential applications to AF and civilian technology challenges. 3. Personnel Supported: Professional personnel included a. Faculty: Olgica Milenkovic and Angelia Nedich b. Post-Docs: Vitaly Skachek and Behrouz Touri. c. Students: Amin Emad and Farzad Farnoud 4. Publications: All publications are available online, as submitted to the arxive or published in corresponding journal. Conference papers are not listed. 1) A. Emad and O. Milenkovic, Semi-Quantitative Group Testing: a General Paradigm with Applications in Genotyping, submitted, 2012 (preliminary papers ITW 2011, ISIT 2012). 2) F. Farnoud, Behrouz Touri, and O. Milenkovic, A Novel Distance-Based Approach to Constrained Rank Aggregation, submitted, 2012 (preliminary papers: CDC 2012, SPCOM 2012). 3) F. Farnoud, V. Skachek and O. Milenkovic, Error-Correction in Flash Memories via Codes in the Ulam Metric, to appear, IEEE Transactions on Inform. Theory, 2013. 33. V. Skachek, O. Milenkovic and A. Nedich, Hybrid Noncoherent Network Coding, to appear, IEEE Transactions on Inform. Theory, 2013. 4) W. Dai, O. Milenkovic, and H. V. Pham, Structured Sublinear Compressive Sensing via Belief Propagation, Physical Communication, Special Issue on compressive sensing in communications, vol. 5, no. 2, pp. 76-90, November 2011 (online), June 2012. 5) F. Farnoud and O.Milenkovic, Sorting Permutations by Cost-Constrained Transpositions, IEEE Transactions on Information Theory, 58(1): 3-23, 2012. 6) W. Dai, E. Kerman, and O. Milenkovic, A Geometric Approach to Low-Rank Matrix Completion, IEEE Transactions on Information Theory, 58(1): 237-247, 2012. 7) W. Dai, O. Milenkovic, and E. Kerman, Subspace Evolution and Transfer (SET) for Low-Rank Matrix Completion, IEEE Transactions on Signal Processing, 59(7): 3120-3132, 2011.

5. Interactions/Transitions: COMPRESSIVE SENSING AND CODING FOR COMPLEX NETWORKS! Participation/presentations at meetings, conferences, seminars. Both PI actively participated in a number of meeting and conferences, to name a few - ISIT (2009-2012), CDC (2009-2012), ITW (2009-2010) etc. Furthermore, PI Milenkovic is currently serving as TPC Chair for the ISIT 2014 Symposium. Throughout the duration of the grant, she also served as Guest Editor in Chief of the Transactions on Information Theory, and Associate Editor of the Transactions on Communications, Transactions on Signal Processing and Transactions on Information Theory. 6. Honors/Awards: PI Milenkovic was elected Senior Member of the IEEE in 2012/2013, and Center for Advanced Studies Associate at University of Illinois in 2012. She is also a co-recipient of the best paper award at the International Symposium on Information Theory, ISIT 2010. Both PI Milenkovic and PI Nedich were recently named Willett scholars at the University of Illinois. 7. New discoveries: The discoveries fall into three main categories -- a) Compressive sensing and low-rank matrix completion: We developed three novel methods for dimensionality reduction based on codes on graphs and optimization techniques over Grassman manifolds. In particular, we developed the Subspace Evolution and Transfer (SET) algorithm which operates with high accuracy in the highly subsampled observation domain. b) Network Coding: We developed a generalization of Kotter-Kschischang subspace codes for non-coherent networks, suitable for use when the network introduces both dimension and symbol errors. We showed that when the network introduces a large number of symbol errors, the new family of codes outperforms their subspace code counterparts. Two upper bounds on the size of the proposed codes were derived. These bounds represent a variation of Singleton and of a sphere-packing bounds, respectively. The PIs also showed that a simple concatenated scheme that represents a combination of subspace codes and Reed-Solomon codes, is asymptotically optimal with respect to the Singleton bound. In addition, the PIs also derived two efficient decoding algorithms for concatenated subspace codes. The hybrid network coding scheme was shown to have strong duality relationships with the problem of matrix rank minimization. c) Social Choice Theory and Social Networks: We revisited a classical problem in choice theory vote aggregation using novel distance measures between permutations that arise in several practical applications. The distance measures were derived through an axiomatic approach, taking into account various issues arising in voting with side constraints. The side constraints of interest include non-uniform relevance of the top and the bottom of rankings (or equivalently, eliminating negative outliers in votes) and similarities between candidates (or equivalently, introducing diversity in the voting process). The proposed distance functions may be seen as weighted versions of the Kendall distance and weighted versions of the Cayley distance. In addition to proposing the distance measures and providing the theoretical underpinnings for their applications, we also considered algorithmic aspects associated with distance-based aggregation processes. We focused on two methods. One method was based on approximating weighted distance measures by a generalized version of Spearmanʼs footrule distance, and it was shown to have

COMPRESSIVE SENSING AND CODING FOR COMPLEX NETWORKS provable constant approximation guarantees. The second class of algorithms was based on a non-uniform Markov chain method inspired by PageRank, for which currently only heuristic guarantees are known. We extended these results to voting scenarios where one has to take into account the dynamic and volatility of a social network, distributed information choices, and potential changes in votes induced by factors external to the network.