Virtual Private LAN Services are becoming popular for securely connecting geographically dispersed devices to a common protected LAN network isolated from the rest of the Internet. Traditional IP routing protocols can...
详细信息
The omega-k synthetic aperture radar (SAR) algorithm is a computationally efficient algorithm for near-field 3-D monostatic SAR imaging in nondestructive testing (NDT) applications. However, bistatic measurements are ...
详细信息
The omega-k synthetic aperture radar (SAR) algorithm is a computationally efficient algorithm for near-field 3-D monostatic SAR imaging in nondestructive testing (NDT) applications. However, bistatic measurements are preferred in order to obtain high dynamic range, in particular when real-time imaging arrays are used. This article investigates the image distortion caused by using an equivalent monostatic imaging algorithm for bistatic measurements. Simulations and measurements at millimeter-wave frequencies in the Ka-band (26.5-40 GHz) are used to investigate the resultant image distortion. Furthermore, the image distortion is quantified through the root-mean-square (rms) error, which is calculated as a function of the bistatic transmitterreceiver separation distance, range, and noise power. Simulations and measurements are conducted for imaging using the raster scanning of a pair of antennas and for nonuniform imaging arrays. In addition, an approximate method for phase compensation is introduced to improve the image error from the monostatic approximation of bistatic measurement.
Emerging reconfigurable optical communication technologies enable demand-aware networks: networks whose static topology can be enhanced with demand-aware links optimized towards the traffic pattern the network serves....
详细信息
We study the approximability of four scheduling problems on identical parallel machines. In the late work minimization problem, the jobs have arbitrary processing times and a common due date, and the objective is to m...
详细信息
We study the approximability of four scheduling problems on identical parallel machines. In the late work minimization problem, the jobs have arbitrary processing times and a common due date, and the objective is to minimize the late work, defined as the sum of the portion of the jobs done after the due date. A related problem is the maximization of the early work, defined as the sum of the portion of the jobs done before the due date. We describe a polynomial time approximation scheme for the early work maximization problem, and we extended it to the late work minimization problem after shifting the objective function by a positive value that depends on the problem data. We also prove an inapproximability result for the latter problem if the objective function is shifted by a constant which does not depend on the input. These results remain valid even if the number of the jobs assigned to the same machine is bounded. This leads to an extension of our approximation scheme to two variants of the resource leveling problem with unit time jobs, for which no approximation algorithm is known. (C) 2020 Elsevier B.V. All rights reserved.
In resource allocation, we often require that the output allocation of an algorithm is stable against input perturbation because frequent reallocation is costly and untrustworthy. Varma and Yoshida (SODA'21) forma...
详细信息
Following the paper of Alekhnovich, Ben-Sasson, Razborov, Wigderson [2] we call a pseudorandom generator F : {0, 1}n → {0, 1}m hard for a propositional proof system P if P cannot efficiently prove the (properly encod...
详细信息
The Industry 4.0 and smart city solutions are impossible to be implemented without using IoT devices. There can be several problems in acquiring data from these IoT devices, problems that can lead to missing values. W...
详细信息
The Industry 4.0 and smart city solutions are impossible to be implemented without using IoT devices. There can be several problems in acquiring data from these IoT devices, problems that can lead to missing values. Without a complete set of data, the automation of processes is not possible or is not satisfying enough. The aim of this paper is to introduce a new algorithm that can be used to fill in the missing values of signals sent by IoT devices. In order to do that, we introduce Shepard local approximation operators in Riesz MV-algebras for one variable function and we structure the set of possible values of the IoT devices signals as Riesz MV-algebra. Based on these local approximation operators we define a new algorithm and we test it to prove that it can be used to fill in the missing values of signals sent by IoT devices.
We investigate the adversarial robustness of streaming algorithms. In this context, an algorithm is considered robust if its performance guarantees hold even if the stream is chosen adaptively by an adversary that obs...
详细信息
Several gaps and errors in "Precoding and Artificial Noise Design for Cognitive MIMOME Wiretap Channels" by Fang et al. are identified and corrected. While accommodating these corrections, a rigours proof is...
详细信息
Several gaps and errors in "Precoding and Artificial Noise Design for Cognitive MIMOME Wiretap Channels" by Fang et al. are identified and corrected. While accommodating these corrections, a rigours proof is given that the successive convex approximation algorithm of Fang et al. for secrecy rate maximization (SRM) does generate an increasing and bounded sequence of true secrecy rates and hence converges. It is further shown that its convergence point is a KKT point of the original SRM problem and, if the original problem is convex, this convergence point is globally-optimal, which is not necessarily the case in general. An interlacing property of the sequences of the true and approximate secrecy rates is established.
We investigate the problem of preselecting a subset of buyers (also called agents) participating in a market so as to optimize the performance of stable outcomes. We consider four scenarios arising from the combinatio...
详细信息
暂无评论