Wireless rechargeable sensor networks (WRSNs) have emerged as a potential solution to solve the challenge of prolonging battery-powered sensor networks' lifetime. In a WRSN, a mobile charger moves around and charg...
详细信息
Wireless rechargeable sensor networks (WRSNs) have emerged as a potential solution to solve the challenge of prolonging battery-powered sensor networks' lifetime. In a WRSN, a mobile charger moves around and charges the rechargeable sensors when stopping at charging spots. This paper newly considers a joint optimization of the charging location and the charging time to avoid node failure in WRSNs. We formulate the optimization and propose a solution for that. The proposal includes an algorithm to find a list of potential charging locations and their associated optimal charging time. Moreover, the Q-learning technique is adopted to determine the optimal next charging location among the candidates. We implement the algorithm and conduct experiments to compare it to the related works. The results show that the proposed algorithm outperforms the others in terms of network lifetime. Specifically, the highest performance gap of our proposal to the best algorithm among the others is 8.29 times.
This article investigates legitimate eavesdropping and secure communication in a multicarrier interference network, where a suspicious link coexists with an unsuspicious link, in the presence of a full-duplex monitor....
详细信息
This article investigates legitimate eavesdropping and secure communication in a multicarrier interference network, where a suspicious link coexists with an unsuspicious link, in the presence of a full-duplex monitor. It is assumed that the unsuspicious users (UUs) are under illegal eavesdropping threat from the suspicious users (SUs), and the monitor can send jamming signals to interfere with the SUs. The UUs are required to cooperate with the monitor for reducing the secrecy outage probability of the UUs to be lower than that without the monitor's jamming. Under this secrecy outage constraint along with the transmit power constraints, the problem for maximizing the successful eavesdropping probability of the monitor by jointly allocating the transmit powers of the monitor and the UUs is investigated. The problem is solved with the Lagrange duality method by proving the time-sharing property holds, where two algorithms are proposed for obtaining the dual function based on the block coordinate descent method and the successive convex approximation method. Simulation results verify that the proposed algorithms are superior to the noncooperative strategy and the passive eavesdropping strategy, and achieve high successful eavesdropping probability and low secrecy outage probability simultaneously.
Cognitive radio networks (CRNs) are expected to be promising techniques for improving the spectrum efficiency of wireless network utility in the squeezed sub-6-GHz frequency bands. Nevertheless, frequency allocation a...
详细信息
Cognitive radio networks (CRNs) are expected to be promising techniques for improving the spectrum efficiency of wireless network utility in the squeezed sub-6-GHz frequency bands. Nevertheless, frequency allocation and transmission scheduling for secondary users (SUs) in CRNs suffer from no prior knowledge of other SUs' network behaviors or the distribution of the amount of data generated at each SU. As a countermeasure, this article develops a protocol for the joint channel selection and transmission scheduling such that SUs with heterogeneous data transmission demands could be served with limited spectrum resources. Then, we formulate the dynamic optimization of the protocol as mutually embedded Markov decision processes (MDPs). To address the intractable MDPs, Q-learning-based channel selection and transmission scheduling based on reinforcement learning with basis function approximation are, respectively, proposed. It is shown that compared with various baselines, the proposed channel selection algorithm enables each SU to select the best frequency-domain channel that does not interfere with other SUs. In particular, the proposed transmission scheduling algorithm outperforms algorithms based on off-the-shelf approaches, such as Q-learning and Lyapunov optimization, in terms of both energy efficiency and long-term accumulative amount of bits at each SU.
We study the k-median with discounts problem, wherein we are given clients with non negative discounts and seek to open at most k facilities. The goal is to minimize the sum of distances from each client to its neares...
详细信息
We study the k-median with discounts problem, wherein we are given clients with non negative discounts and seek to open at most k facilities. The goal is to minimize the sum of distances from each client to its nearest open facility which is discounted by its own discount value, with minimum contribution being zero. We obtain a bi-criteria constant factor approximation using an iterative LP rounding algorithm. Our result improves the previously best approximation guarantee for k-median with discounts (Ganesh et al. (2001) [9]). We also devise bi-criteria constant-factor approximation algorithms for the matroid and knapsack versions of median clustering with discounts. (c) 2022 Elsevier B.V. All rights reserved.
In the 0-Extension problem, we are given an edge-weighted graph G = (V, E, c), a set T ⊆ V of its vertices called terminals, and a semi-metric D over T, and the goal is to find an assignment f of each non-terminal ver...
详细信息
We present algorithms for the computation of Ε-coresets for k-median clustering of point sequences in Rd under the p-dynamic time warping (DTW) distance. Coresets under DTW have not been investigated before, and the ...
详细信息
Matrices with low numerical rank are omnipresent in many signal processing and data analysis applications. The pivoted QLP (p-QLP) algorithm constructs a highly accurate approximation to an input low-rank matrix. Howe...
详细信息
Matrices with low numerical rank are omnipresent in many signal processing and data analysis applications. The pivoted QLP (p-QLP) algorithm constructs a highly accurate approximation to an input low-rank matrix. However, it is computationally prohibitive for large matrices. In this paper, we introduce a new algorithm termed Projection-based Partial QLP (PbP-QLP) that efficiently approximates the p-QLP with high accuracy. Fundamental in our work is the exploitation of randomization and in contrast to the p-QLP, PbP-QLP does not use the pivoting strategy. As such, PbP-QLP can harness modern computer architectures, even better than competing randomized algorithms. The efficiency and effectiveness of our proposed PbP-QLP algorithm are investigated through various classes of synthetic and real-world data matrices.
作者:
Zhao, JingangWeifang Univ
Sch Machinery & Automat Weifang 261061 Shandong Peoples R China Weifang Univ
Inst Intelligent Percept & Control Complex Syst Weifang 261061 Shandong Peoples R China
In this paper, we present a new adaptive dynamic programming (ADP) scheme to solve the optimal control problem of multi-player systems with unknown dynamics from the perspective of nonzero-sum (NZS) games. In the pres...
详细信息
In this paper, we present a new adaptive dynamic programming (ADP) scheme to solve the optimal control problem of multi-player systems with unknown dynamics from the perspective of nonzero-sum (NZS) games. In the presented scheme, a new iterative equation is given. On the basis of the given iterative equation, the control policy and corresponding value function for each player can be learned by using the state and input data, which does not need to identify the system dynamics. To overcome the difficulty of unknown system dynamics, neural network (NN)-based function approximation techniques are employed in the implementation. Based on the given iterative equation and NN-based function approximation techniques, a new non-model-based ADP algorithm is developed. The convergence of the developed non-model-based ADP algorithm is rigorously analyzed and proved. Finally, two numerical simulation examples are provided to demonstrate the performance of the developed non-model-based ADP algorithm.
Graph burning is a process to determine the spreading of information in a graph. If a sequence of vertices burns all the vertices of a graph by following the graph burning process, then such a sequence is known as a b...
详细信息
Graph burning is a process to determine the spreading of information in a graph. If a sequence of vertices burns all the vertices of a graph by following the graph burning process, then such a sequence is known as a burning sequence. The graph burning problem consists in finding a minimum length burning sequence for a given graph. The solution to this NP-hard combinatorial optimization problem helps quantify a graph's vulnerability to contagion. This paper introduces a simple farthest-first traversal-based approximation algorithm for this problem over arbitrary graphs. We refer to this proposal as the Burning Farthest-First (BFF) algorithm. BFF runs in O(n(3)) steps and has a tight approximation factor of 3 - 2/b(G), where b(G) is the size of an optimal solution. The main attribute of BFF is that it has a better approximation factor than the state-of-the-art approximation algorithms for arbitrary graphs, which report an approximation factor of 3. Despite being simple, BFF proved practical when tested over some benchmark datasets.
Network function virtualization (NFV) is a promising technology that decouples network functions from hardware. Connecting virtual network functions (VNFs) in series to form a service function chain (SFC) can flexibly...
详细信息
Network function virtualization (NFV) is a promising technology that decouples network functions from hardware. Connecting virtual network functions (VNFs) in series to form a service function chain (SFC) can flexibly orchestrate and expand network functions. However, there are higher availability requirements for SFCs. This paper aims to solve the SFC placement problem under availability and resource constraints. This paper proposes the sideway cross (SC) backup model, which considers the availability of both VNFs and physical machines (PMs) in a data center. The SC model cross-arranges the backup instances of VNFs to guarantee availability and optimize resource consumption. Then, this paper proposes the heuristic meteor shower optimization (MSO) algorithm to place SFCs. Compared to traditional heuristic algorithms, MSO can improve the execution time by approximately 200%. Combined with the SC backup model, MSO can effectively improve the availability and resource overhead. The evaluation results show that the proposed approach can guarantee higher availability and consumes fewer resources. The proposed approach only needs 75% of the resources to achieve the same availability as the state-of-the-art models.
暂无评论