With the development of large-scale sensor networks, there is an increasing interest for high dimensional distributed decision fusion problem in statistical decision, machine learning, control theory, etc. In this art...
详细信息
With the development of large-scale sensor networks, there is an increasing interest for high dimensional distributed decision fusion problem in statistical decision, machine learning, control theory, etc. In this article, we investigate the optimal sensor quantized rules of the distributed decision under a given fusion rule for conditionally dependent and high dimensional sensor observations. We provide a Monte Carlo importance sampling method to reduce the computational complexity of the distributed decision fusion. For the K-out-of-L rule, we derive a group of analytic sensor rules based on the necessary and sufficient condition of the optimal sensor rules. In term of efficiency, it is significantly better than the traditional iterative search algorithms, such as the Riemann sum approximation iteration algorithm. The analytic solution is also a general result since it does not rely on the specific K value of the K-out-of-L rule, the specific conditional probability density function and the dimension of sensor observations. Thus, it can be applied to multisensor decision fusion problems with high dimensional dependent sensor observations. For the general fusion rules rather than the K-out-of-L rule, the Monte Carlo Gauss-Seidel algorithm is also provided. The numerical examples demonstrate the effectiveness of the analytic solution and the Monte Carlo Gauss-Seidel algorithm.
The omega-k synthetic aperture radar (SAR) algorithm is a computationally efficient algorithm for near-field 3-D monostatic SAR imaging in nondestructive testing (NDT) applications. However, bistatic measurements are ...
详细信息
The omega-k synthetic aperture radar (SAR) algorithm is a computationally efficient algorithm for near-field 3-D monostatic SAR imaging in nondestructive testing (NDT) applications. However, bistatic measurements are preferred in order to obtain high dynamic range, in particular when real-time imaging arrays are used. This article investigates the image distortion caused by using an equivalent monostatic imaging algorithm for bistatic measurements. Simulations and measurements at millimeter-wave frequencies in the Ka-band (26.5-40 GHz) are used to investigate the resultant image distortion. Furthermore, the image distortion is quantified through the root-mean-square (rms) error, which is calculated as a function of the bistatic transmitterreceiver separation distance, range, and noise power. Simulations and measurements are conducted for imaging using the raster scanning of a pair of antennas and for nonuniform imaging arrays. In addition, an approximate method for phase compensation is introduced to improve the image error from the monostatic approximation of bistatic measurement.
This letter proposes a robust beamforming (BF) scheme to enhance physical layer security (PLS) of the downlink of a multibeam satellite system in the presence of either uncoordinated or coordinated eavesdroppers (Eves...
详细信息
This letter proposes a robust beamforming (BF) scheme to enhance physical layer security (PLS) of the downlink of a multibeam satellite system in the presence of either uncoordinated or coordinated eavesdroppers (Eves). Specifically, with knowing only the approximate locations of the Eves, we aim at maximizing the worst-case achievable secrecy rate (ASR) of the legitimate user (LU), subject to the constraints of per-antenna transmit power and quality of service (QoS) requirement of the LU. Since the optimization problem is non-convex, we first adopt the discretization method to deal with the unknown regions of the Eves and then exploit the log-sum-exp function to approximate the objective function. Afterwards, a BF method joint alternating direction method of multipliers (ADMM) with Dinkelbach iteration is presented to solve this non-convex problem. Finally, simulation results verify that our robust BF algorithm can effectively improve the security of multibeam satellite systems.
In this letter, secure beamforming in a multiple intelligent reflecting surfaces (IRSs)-aided millimeter-wave (mmWave) system is investigated. In this system, the secrecy rate is maximized by controlling the on-off st...
详细信息
In this letter, secure beamforming in a multiple intelligent reflecting surfaces (IRSs)-aided millimeter-wave (mmWave) system is investigated. In this system, the secrecy rate is maximized by controlling the on-off status of each IRS as well as optimizing the phase shift matrix of the IRSs. This problem is posed as a joint optimization problem of transmit beamforming and IRS control, whose goal is to maximize the secrecy rate under the total transmission power and unit-modulus constraints. The problem is difficult to solve optimally due to the nonconvexity of constraint conditions and coupled variables. To deal with this problem, we propose an alternating optimization (AO)-based algorithm based on successive convex approximation (SCA) and manifold optimization (MO) technologies. Numerical simulations show that the proposed AO-based algorithm can effectively improve the secrecy rate and outperforms traditional single IRS-aided scheme.
it is common knowledge that partial differential equations are becoming increasingly relevant in modern research and that the solutions to these equations are essential for addressing a wide variety of real-world appl...
详细信息
In this study, we consider a new customer choice model which we call the single transition choice model. In this model, there is a universe of products and customers arrive at each product with a certain probability. ...
详细信息
In this study, we consider a new customer choice model which we call the single transition choice model. In this model, there is a universe of products and customers arrive at each product with a certain probability. If the arrived product is unavailable, then the seller can recommend a subset of available products and the customer will purchase one of the recommended products or choose not to purchase with certain transition probabilities. The distinguishing features of the model are that the seller can control which products to recommend depending on the arrived product, and each customer either purchases a product or leaves the market after one transition. We study the assortment optimization problem under this model. Particularly, we show that it is NP-Hard even if the customer can transition from each product to at most two products. Despite the computational complexity, we provide polynomial time algorithms or approximation algorithms for several special cases, such as when the customer can only transition from each product to at most a given number of products and the size of each recommended set is bounded. Our approximation algorithms are developed by invoking the submodularity arguments, or connecting the problem with maximum constraint satisfaction problem and applying randomized rounding techniques to its semidefinite programming relaxation. We also provide a tight worst-case performance bound for revenue-ordered assortments. In addition, we propose a compact mixed-integer program formulation, which is efficient for moderate size problems. Finally, we conduct numerical experiments to demonstrate the effectiveness of the proposed algorithms.
For the problem of delivering a package from a source node to a destination node in a graph using a set of drones, we study the setting where the movements of each drone are restricted to a certain subgraph of the giv...
详细信息
Motivated by practical applications, recent works have considered maximization of sums of a submodular function g and a linear function . Almost all such works, to date, studied only the special case of this problem i...
详细信息
In resource allocation, we often require that the output allocation of an algorithm is stable against input perturbation because frequent reallocation is costly and untrustworthy. Varma and Yoshida (SODA'21) forma...
详细信息
Most of the literature on spanners focuses on building the graph from scratch. This article instead focuses on adding edges to improve an existing graph. A major open problem in this field is: Given a graph embedded i...
详细信息
暂无评论