In this paper, we consider the achievable sum secrecy rate in MISO (multiple-input-single-output) full-duplex wiretap channel in the presence of a passive eavesdropper and imperfect channel state information (CSI). We...
详细信息
ISBN:
(纸本)9781467395274
In this paper, we consider the achievable sum secrecy rate in MISO (multiple-input-single-output) full-duplex wiretap channel in the presence of a passive eavesdropper and imperfect channel state information (CSI). We assume that the users participating in full-duplex communication have multiple transmit antennas, and that the users and the eavesdropper have single receive antenna each. The users have individual transmit power constraints. They also transmit jamming signals to improve the secrecy rates. We obtain the achievable perfect secrecy rate region by maximizing the worst case sum secrecy rate. We also obtain the corresponding transmit covariance matrices associated with the message signals and the jamming signals. Numerical results that show the impact of imperfect CSI on the achievable secrecy rate region are presented.
We introduce a downlink robust optimization problem to minimize an objective function which is a combination of a cost characterizing the total transmit power at each multiple antenna base station (BS) and a penalty t...
详细信息
ISBN:
(纸本)9781479913510
We introduce a downlink robust optimization problem to minimize an objective function which is a combination of a cost characterizing the total transmit power at each multiple antenna base station (BS) and a penalty term due to the induced aggregate intercell interference power across the multicell network. This optimization is constrained to assure that a set of target signal-to-interference-plus-noise ratio (SINR) levels are maintained at the intracell user terminals with adjustable outage probabilities. The involved uncertainties are due to the errors incurred in estimating both direct downlink channels within each cell and the interfering channels between a BS and the remote user terminals in other cells. By introducing a slack variable, we reformulate the problem so that the probability of imperfection in the penalty term is confined within an adjustable outage. To maintain the tractability of the robust solutions, we derive an equivalent semidefinite programming (SDP) formulation that is convex under the standard rank relaxation. Our simulation results show that at fixed outage probabilities, the proposed scheme is considerably more sensitive to imperfection in direct downlink channels than the imperfection in the interfering channels at a given BS. This observation is due to the presence of the interfering channels within the penalty term that is minimized as a part of the proposed objective function.
This paper is devoted to the study of an embedding method for semidefinite programming problems using Extended Lagrange-Slater dual (ELSD) and its Lagrangian dual. A theorem proved by de Klerk et al. in 1996 is re...
详细信息
This paper is devoted to the study of an embedding method for semidefinite programming problems using Extended Lagrange-Slater dual (ELSD) and its Lagrangian dual. A theorem proved by de Klerk et al. in 1996 is revisited. A new proof is provided utilizing a result regarding the weak feasibility of a conic linear programming problem.
In the tutorial, we will introduce two kinds of problems for which validated results are computed via hybrid symbolic-numeric algorithms. These hybrid algorithms follow the basic principle pointed out by Siegfried M. ...
详细信息
ISBN:
(纸本)9781450325011
In the tutorial, we will introduce two kinds of problems for which validated results are computed via hybrid symbolic-numeric algorithms. These hybrid algorithms follow the basic principle pointed out by Siegfried M. Rump in [1] for computing validated results: First, a pure floating point algorithm is used to compute an approximate solution of good quality for a given problem. Second, a verification step using exact rational arithmetic or interval arithmetic is appended. If this step is successful, then certified lower bounds or verified error bounds are computed for the previously computed approximation.
Material supply network for emergency rescue of natural disasters is of vital importance in reducing casualties and protecting people's lives and property. This paper introduces a post-disaster rescue material sup...
详细信息
ISBN:
(数字)9798350387780
ISBN:
(纸本)9798350387797
Material supply network for emergency rescue of natural disasters is of vital importance in reducing casualties and protecting people's lives and property. This paper introduces a post-disaster rescue material supply network. Due to the strong uncertainty of material demand in disaster-stricken areas and the difficulty in obtaining probability distributions with sufficient accuracy, we propose a two-stage distribution robust optimization method. We construct the ambiguity set of material demand in the supply network based on statistics such as the first and second moments from historical data. Then, the optimization problem is formulated as a two-stage stochastic robust optimization model. Linear decision-making rules and duality theory are jointly applied to facilitate solving process of the proposed optimization model. Via a numerical experiment, the effectiveness of the proposed approach is validated.
Several man-made signals in communications and array processing, e.g., phase-modulated and frequency-modulated signals, exhibit the constant modulus (CM) property. This paper is concerned about the problem of directio...
详细信息
ISBN:
(数字)9798350375909
ISBN:
(纸本)9798350375916
Several man-made signals in communications and array processing, e.g., phase-modulated and frequency-modulated signals, exhibit the constant modulus (CM) property. This paper is concerned about the problem of direction-of-arrival (DOA) estimation for CM source signals using linear arrays. Existing methods either rely on nonconvex optimization suffering from convergence or optimality issues or cannot fully use the CM property of signals or the array manifold due to great challenges brought by the highly nonconvex CM constraints. In this paper, we propose a convex optimization approach for CM DOA estimation based on atomic norm minimization. Our main contributions are summarized below. 1) To use the CM property, we define a CM atomic norm and formulate the CM DOA estimation problem as an ANM problem. 2) We propose a semidefinite programming, by introducing a series of positive-semidefinite structured matrices, to characterize the CM atomic norm and enable computations of the CM ANM problem. 3) Simulations are carried out that validate the advantageous performance of the proposed approach.
The aim of this paper is to propose a novel frame-work to infer the sheaf Laplacian, including the topology of a graph and the restriction maps, from a set of data observed over the nodes of a graph. The proposed meth...
详细信息
ISBN:
(数字)9798350354058
ISBN:
(纸本)9798350354065
The aim of this paper is to propose a novel frame-work to infer the sheaf Laplacian, including the topology of a graph and the restriction maps, from a set of data observed over the nodes of a graph. The proposed method is based on sheaf theory, which represents an important generalization of graph signal processing. The learning problem aims to find the sheaf Laplacian that minimizes the total variation of the observed data, where the variation over each edge is also locally minimized by optimizing the associated restriction maps. Compared to alternative methods based on semidefinite programming, our solution is significantly more numerically efficient, as all its fundamental steps are resolved in closed form. The method is numerically tested on data consisting of vectors defined over subspaces of varying dimensions at each node. We demonstrate how the resulting graph is influenced by two key factors: the cross-correlation and the dimensionality difference of the data residing on the graph's nodes.
This paper addresses the problem of strong intercell interference on cell-edge users in conventional cellular networks by deploying cognitive cells within the vicinity of primary cell borders. The cognitive base stati...
详细信息
ISBN:
(纸本)9781467362337
This paper addresses the problem of strong intercell interference on cell-edge users in conventional cellular networks by deploying cognitive cells within the vicinity of primary cell borders. The cognitive base stations serve primary cell-edge users within the cognitive cells. In return, the cognitive base stations are rewarded by the same spectrum allocated to the primary base stations to serve secondary users. We propose a strategy that is formulated as an optimization problem for the cognitive cell to minimize the total transmit power of the cognitive base station. This optimization problem is subjected to maintain a controlled level of interference at the primary outer-cell users falling outside of the cognitive cell and to assure required levels of signal-to-noise-plus-interference-ratio (SINR) at all primary celledge and secondary users within the cognitive cell. Simulation results confirm that the beamforming scheme in conjunction with the proposed cognitive structure lead to a significant reduction in overall power transmitted in the network.
We study the problem of sampling a bandlimited graph signal in the presence of noise, where the objective is to select a node subset of prescribed cardinality that minimizes the signal reconstruction mean squared erro...
详细信息
ISBN:
(纸本)9781538646595
We study the problem of sampling a bandlimited graph signal in the presence of noise, where the objective is to select a node subset of prescribed cardinality that minimizes the signal reconstruction mean squared error (MSE). To that end, we formulate the task at hand as the minimization of MSE subject to binary constraints, and approximate the resulting NP-hard problem via semidefinite programming (SDP) relaxation. Moreover, we provide an alternative formulation based on maximizing a monotone weak submodular function and propose a randomized-greedy algorithm to find a sub-optimal subset. We then derive a worst-case performance guarantee on the MSE returned by the randomized greedy algorithm for general non-stationary graph signals. The efficacy of the proposed methods is illustrated through numerical simulations on synthetic and realworld graphs. Notably, the randomized greedy algorithm yields an order-of-magnitude speedup over state-of-the-art greedy sampling schemes, while incurring only a marginal MSE performance loss.
In this article, a detection strategy based on variable neighborhood search (VNS) and semidefinite relaxation of the multiuser model maximum likelihood (ML) is investigated. The VNS method provides a good method for s...
详细信息
In this article, a detection strategy based on variable neighborhood search (VNS) and semidefinite relaxation of the multiuser model maximum likelihood (ML) is investigated. The VNS method provides a good method for solving the ML problem while keeping the integer constraints. A SDP relaxation is used as an efficient way to generate an initial solution in a limited amount of time, in particular using early termination. The SDP resolution tool used is the spectral bundle method developed by Helmberg. We show that using VNS can result in a better error rate, but at a cost of calculation time. (C) 2009 Wiley Periodicals, Inc. NETWORKS, Vol. 55(3), 187-193 2010
暂无评论