Network topology identification from corrupt data streams

Venkat Ram Subramanian, Andrew Lamperski, Murti V. Salapaka

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

Abstract

The interconnectivity structure of many complex systems can be modeled as a network of dynamically interacting processes. Identification of mutual dependencies amongst the agents is of primary importance in many application domains that include internet-of-things, neuroscience and econometrics. Moreover, in many such systems it is not possible to deliberately affect the system and thus passive methods are of particular relevance. However, for an effective framework that identifies influence pathways from dynamically related data streams originating at different sources it is essential to address the uncertainty of data caused by possibly unknown time-origins of different streams and other corrupting influences including packet drops and noise. In this article, a method of reconstructing the network topology from corrupt data streams is provided with emphasis on the characterization of the effects of data corruption on the reconstructed network. The structure of the network is identified by observing the sparsity pattern in the joint power spectrum of the measurements.

Original languageEnglish (US)
Title of host publication2017 IEEE 56th Annual Conference on Decision and Control, CDC 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1695-1700
Number of pages6
ISBN (Electronic)9781509028733
DOIs
StatePublished - Jun 28 2017
Event56th IEEE Annual Conference on Decision and Control, CDC 2017 - Melbourne, Australia
Duration: Dec 12 2017Dec 15 2017

Publication series

Name2017 IEEE 56th Annual Conference on Decision and Control, CDC 2017
Volume2018-January

Other

Other56th IEEE Annual Conference on Decision and Control, CDC 2017
Country/TerritoryAustralia
CityMelbourne
Period12/12/1712/15/17

Bibliographical note

Publisher Copyright:
© 2017 IEEE.

Fingerprint

Dive into the research topics of 'Network topology identification from corrupt data streams'. Together they form a unique fingerprint.

Cite this