MASSIMO FRANCESCHETTI University of California at Berkeley Phase transitions an engineering perspective.

Slides:



Advertisements
Similar presentations
TARGET DETECTION AND TRACKING IN A WIRELESS SENSOR NETWORK Clement Kam, William Hodgkiss, Dept. of Electrical and Computer Engineering, University of California,
Advertisements

Spreading random connection functions Massimo Franceschetti Newton Institute for Mathematical Sciences April, 7, 2010 joint work with Mathew Penrose and.
A journey through data rate theorems for communication and control Massimo Franceschetti.
Some additional Topics. Distributions of functions of Random Variables Gamma distribution,  2 distribution, Exponential distribution.
Algorithmic and Economic Aspects of Networks Nicole Immorlica.
Information Theory EE322 Al-Sanie.
1 12. Principles of Parameter Estimation The purpose of this lecture is to illustrate the usefulness of the various concepts introduced and studied in.
MASSIMO FRANCESCHETTI University of California at Berkeley Wireless sensor networks with noisy links.
Size of giant component in Random Geometric Graphs
Uncertainty Representation. Gaussian Distribution variance Standard deviation.
Kalman’s Beautiful Filter (an introduction) George Kantor presented to Sensor Based Planning Lab Carnegie Mellon University December 8, 2000.
Conceptual issues in scaling sensor networks Massimo Franceschetti, UC Berkeley.
Jie Gao Joint work with Amitabh Basu*, Joseph Mitchell, Girishkumar Stony Brook Distributed Localization using Noisy Distance and Angle Information.
Problem Statement Given a control system where components, i.e. plant, sensors, controllers, actuators, are connected via a communication network, design.
Towards a theory of large scale networks Massimo Franceschetti.
Dimensional reduction, PCA
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Theory of Data Flow and Random Placement.
MASSIMO FRANCESCHETTI University of California at Berkeley Ad-hoc wireless networks with noisy links Lorna Booth, Matt Cook, Shuki Bruck, Ronald Meester.
Zoë Abrams, Ashish Goel, Serge Plotkin Stanford University Set K-Cover Algorithms for Energy Efficient Monitoring in Wireless Sensor Networks.
Chess Review May 11, 2005 Berkeley, CA Closing the loop around Sensor Networks Bruno Sinopoli Shankar Sastry Dept of Electrical Engineering, UC Berkeley.
Kalman Filtering Jur van den Berg. Kalman Filtering (Optimal) estimation of the (hidden) state of a linear dynamic process of which we obtain noisy (partial)
Estimation and the Kalman Filter David Johnson. The Mean of a Discrete Distribution “I have more legs than average”
1 University of Denver Department of Mathematics Department of Computer Science.
MASSIMO FRANCESCHETTI University of California at Berkeley Phase transitions an engineering perspective.
MASSIMO FRANCESCHETTI University of California at Berkeley Percolation of Wireless Networks.
Kalman Filtering Pieter Abbeel UC Berkeley EECS Many slides adapted from Thrun, Burgard and Fox, Probabilistic Robotics TexPoint fonts used in EMF. Read.
STOCHASTIC GEOMETRY AND RANDOM GRAPHS FOR THE ANALYSIS AND DESIGN OF WIRELESS NETWORKS Haenggi et al EE 360 : 19 th February 2014.
Modern Navigation Thomas Herring
Principles of the Global Positioning System Lecture 10 Prof. Thomas Herring Room A;
The Complex Braid of Communication and Control Massimo Franceschetti.
Final Exam Review II Chapters 5-7, 9 Objectives and Examples.
C&O 355 Mathematical Programming Fall 2010 Lecture 1 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA A A.
Fundamental Lower Bound for Node Buffer Size in Intermittently Connected Wireless Networks Yuanzhong Xu, Xinbing Wang Shanghai Jiao Tong University, China.
Functions of Random Variables. Methods for determining the distribution of functions of Random Variables 1.Distribution function method 2.Moment generating.
Percolation in self-similar networks Dmitri Krioukov CAIDA/UCSD M. Á. Serrano, M. Boguñá UNT, March 2011.
Message-Passing for Wireless Scheduling: an Experimental Study Paolo Giaccone (Politecnico di Torino) Devavrat Shah (MIT) ICCCN 2010 – Zurich August 2.
ECE 8443 – Pattern Recognition ECE 8423 – Adaptive Signal Processing Objectives: Deterministic vs. Random Maximum A Posteriori Maximum Likelihood Minimum.
SUPA Advanced Data Analysis Course, Jan 6th – 7th 2009 Advanced Data Analysis for the Physical Sciences Dr Martin Hendry Dept of Physics and Astronomy.
Probabilistic Coverage in Wireless Sensor Networks Authors : Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha Presenter : Hyeon, Seung-Il.
PROBABILITY AND STATISTICS FOR ENGINEERING Hossein Sameti Department of Computer Engineering Sharif University of Technology Principles of Parameter Estimation.
Computing with Defects
Percolation Processes Rajmohan Rajaraman Northeastern University, Boston May 2012 Chennai Network Optimization WorkshopPercolation Processes1.
Mohamed Hefeeda 1 School of Computing Science Simon Fraser University, Canada Efficient k-Coverage Algorithms for Wireless Sensor Networks Mohamed Hefeeda.
0 Patrick Thiran - Ne X tworking’03 - Chania, Crete, Greece, June 23-25,2003 The First COST-IST(EU)-NSF(USA) Workshop on EXCHANGES & TRENDS IN NETWORKING.
Geology 5670/6670 Inverse Theory 21 Jan 2015 © A.R. Lowry 2015 Read for Fri 23 Jan: Menke Ch 3 (39-68) Last time: Ordinary Least Squares Inversion Ordinary.
1 8. One Function of Two Random Variables Given two random variables X and Y and a function g(x,y), we form a new random variable Z as Given the joint.
CS Statistical Machine learning Lecture 24
Application of statistical physics to random graph models of networks Sameet Sreenivasan Advisor: H. Eugene Stanley.
Lecture 2: Statistical learning primer for biologists
An Introduction To The Kalman Filter By, Santhosh Kumar.
ECE 8443 – Pattern Recognition Objectives: Jensen’s Inequality (Special Case) EM Theorem Proof EM Example – Missing Data Intro to Hidden Markov Models.
By: Aaron Dyreson Supervising Professor: Dr. Ioannis Schizas
Joint Moments and Joint Characteristic Functions.
September 28, 2000 Improved Simultaneous Data Reconciliation, Bias Detection and Identification Using Mixed Integer Optimization Methods Presented by:
1 On the Channel Capacity of Wireless Fading Channels C. D. Charalambous and S. Z. Denic School of Information Technology and Engineering, University of.
One Function of Two Random Variables
Raptor Codes Amin Shokrollahi EPFL. BEC(p 1 ) BEC(p 2 ) BEC(p 3 ) BEC(p 4 ) BEC(p 5 ) BEC(p 6 ) Communication on Multiple Unknown Channels.
CS Statistical Machine learning Lecture 25 Yuan (Alan) Qi Purdue CS Nov
Conditional Expectation
Percolation of Clustered Wireless Networks
Pattern Recognition PhD Course.
Lecture 10: Observers and Kalman Filters
Chi Zhang, Yang Song and Yuguang Fang
Bayes and Kalman Filter
Midterm Exam Closed book, notes, computer Similar to test 1 in format:
Biointelligence Laboratory, Seoul National University
11. Conditional Density Functions and Conditional Expected Values
8. One Function of Two Random Variables
11. Conditional Density Functions and Conditional Expected Values
8. One Function of Two Random Variables
Presentation transcript:

MASSIMO FRANCESCHETTI University of California at Berkeley Phase transitions an engineering perspective

when small changes in certain parameters of a system result in dramatic shifts in some globally observed behavior of the system. Phase transition effect

Can we mathematically explain these naturally observed effects? Phase transition effect

Example 1 percolation theory, Broadbent and Hammersley (1957)

Example 1 Broadbent and Hammersley (1957) H. Kesten (1980) pcpc 0 p P 1

if graphs with p(n) edges are selected uniformly at random from the set of n-vertex graphs, there is a threshold function, f(n) such that if p(n) f(n), such a graph is very unlikely to have property Q. Example 2 Random graphs, Erdös and Rényi (1959)

Uniform random distribution of points of density λ One disc per point Studies the formation of an unbounded connected component Example 3 Continuum percolation, Gilbert (1961)

Example 3 Continuum percolation, Gilbert (1961) The first paper in ad hoc wireless networks ! A B

 0.3  0.4 c  …[Quintanilla, Torquato, Ziff, J. Physics A, 2000] Example 3

Gilbert (1961) Mathematics Physics Percolation theory Random graphs Random Coverage Processes Continuum Percolation Wireless Networks (more recently) Gupta and Kumar (1998) Dousse, Thiran, Baccelli (2003) Booth, Bruck, Franceschetti, Meester (2003) Models of the internet Impurity Conduction Ferromagnetism… Universality, Ken Wilson Nobel prize Grimmett (1989) Bollobas (1985) Hall (1985) Meester and Roy (1996) Broadbent and Hammersley (1957) Erdös and Rényi (1959) Phase transitions in graphs

Not only graphs…

Example 4 Shannon channel coding theorem (1948) C H(x) H(x|y) Attainable region H(x|y)=H(x)-C noise source codingdecodingdestination

Example 5 “The uncertainty threshold principle, some fundamental limitations of optimal decision making under dynamic uncertainty” Athans, Ku, and Gershwin (1977) 1  T...2,1,''min 0         tuRuxQx T EJ ttt t t u t 1    xy BuAxx tt tttttt  An optimal solution for exists  T  /1|)(|max  A i i

Our work Kalman filtering over a lossy network Joint work with B. Sinopoli L. Schenato K. Poolla M. Jordan S. Sastry Two new percolation models Joint work with L. Booth J. Bruck M. Cook R. Meester

Clustered wireless networks Extending Gilbert’s continuum percolation model

Contribution Random point process Algorithm Connectivity Algorithm: each point is covered by at least a disc and each disc covers at least a point. Algorithmic Extension

A Basic Theorem 0 λ P λ2λ2 λ1λ1 1 if for any covering algorithm, with probability one., then for high λ, percolation occurs P = Prob(exists unbounded connected component)

A Basic Theorem 0 λ P 1 P = Prob(exists unbounded connected component) if some covering algorithm may avoid percolation for any value of λ

Percolation any algorithm One disc per point Note: Percolation Gilbert (1961) Need Only Interpretation

Counter-intuitive For any covering of the points covering discs will be close to each other and will form bonds

A counter-example Draw circles of radii {3kr, k } many finite annuliobtain no Poisson point falls on the boundaries of the annuli cover the points without touching the boundaries 2r

Each cluster resides into a single annulus Cluster, whatever A counter-example 2r

counterexample can be made shift invariant (with a lot more work) A counter-example

cannot cover the points with red discs without blue discs touching the boundaries of the annuli Counter-example does not work

Proof by lack of counter-example?

Coupling proof Let R > 2r R/2 r disc small enough, such that Define red disc intersects the discblue disc fully covers it 

Coupling proof Let R > 2r choose  c (  ), then cover points with red discs disc small enough, such that Define red disc intersects the discblue disc fully covers it

Coupling proof every  disc is intersected by a red disc therefore all  discs are covered by blue discs

Coupling proof every  disc is intersected by a red disc therefore all  discs are covered by blue discs blue discs percolate!

some algorithms may avoid percolation Bottom line even algorithms placing discs on a grid may avoid percolation Be careful in the design! any algorithm percolates, for high

Which classes of algorithms, for  form an unbounded connected component, a.s., when is high?

Classes of Algorithms Grid Flat Shift invariant Finite horizon Optimal Recall Ronald’s lecture (… or see paper)

Another extension of percolation Sensor networks with noisy links

Prob(correct reception) Experiment

1 Connection probability d Continuum percolation 2r Our model Our model d 1 Connection probability Connectivity model

Connection probability 1 x A first order question How does the percolation threshold c change?

Squishing and Squashing Connection probability x

Theorem For all “longer links are trading off for the unreliability of the connection” “it is easier to reach connectivity in an unreliable network”

Shifting and Squeezing Connection probability x

Example Connection probability x 1

Mixture of short and long edges Edges are made all longer Do long edges help percolation?

Conjecture For all

Theorem Consider annuli shapes A(r) of inner radius r, unit area, and critical density For all, there exists a finite, such that A(r*) percolates, for all It is possible to decrease the percolation threshold by taking a sufficiently large shift !

CNP Squishing and squashing Shifting and squeezing What have we proven?

CNP Among all convex shapes the hardest to percolate is centrally symmetric Jonasson (2001), Annals of Probability. Is the disc the hardest shape to percolate overall? What about non-circular shapes?

CNP To the engineer: above 4.51 we are fine! To the theoretician: can we prove “disc is hardest” conjecture? can we exploit long links for routing? Bottom line

Not only graphs…

Kalman filter with intermittent observation Bruno Sinopoli M. Franceschetti S.SastryM. Jordan K. Poolla L. Schenato

A pursuit evasion game

Goal: given observations find the best estimate (minimum variance) for the state But may not arrive at each time step when traveling over a sensor network Intermittent observations Problem formulation

System Kalman Filter M z -1 utut etet xtxt M K x t+1 y t+1

Discrete time LTI system and are Gaussian random variables with zero mean and covariance matrices Q and R positive definite. Loss of observation

Discrete time LTI system Let it have a “huge variance” when the observation does not arrive Loss of observation

The arrival of the observation at time t is a binary random variable Redefine the noise as: Kalman Filter with losses Derive Kalman equations using a “dummy” observation when then take the limit for  t =0

Derive Kalman equations using a dummy observation Then take the limit for –A recursive linear minimum variance estimator. –Assuming linear system and Gaussian noise, Kalman filter is the optimal estimator. –It gives an estimate of the state with bounded covariance error, which converges to a steady state value Kalman Filter Estimator

Results on mean error covariance P t

Special cases C is invertible, or A has a single unstable eigenvalue

Conclusion Phase transitions are a fundamental effect in engineering systems with randomness There is plenty of work for mathematicians