We consider a finite state-action discounted constrained Markov decision process with uncertain running costs and known transition probabilities. We propose equivalent linear programming, second-order cone programming...
详细信息
We consider a finite state-action discounted constrained Markov decision process with uncertain running costs and known transition probabilities. We propose equivalent linear programming, second-order cone programming and semidefinite programming problems for the robust constrained Markov decision processes when the uncertain running cost vectors belong to polytopic, ellipsoidal, and semidefinite cone uncertainty sets, respectively. As an application, we study a variant of a machine replacement problem and perform numerical experiments on randomly generated instances of various sizes. (C) 2022 Elsevier B.V. All rights reserved.
In this paper, we develop a method for computing controlled invariant sets using semidefiniteprogramming. We apply our method to the controller design problem for switching affine systems with polytopic safe sets. Th...
详细信息
Low-complexity precoding design without iteration for multiple-input multiple-output channels with finite alphabet input is studied. Contrast to the iterative gradient method for finding the globally optimal precoder,...
详细信息
Low-complexity precoding design without iteration for multiple-input multiple-output channels with finite alphabet input is studied. Contrast to the iterative gradient method for finding the globally optimal precoder, which is time-consuming and computationally complicated, this work studies low-complexity precoding design with high performance. The problem of optimising the mutual information is identical to maximising the minimum Euclidean distance of the input vector at high total power. Hence, the precoding design can be formulated as semi-definite programmingproblem and thus can be optimally solved. Numerical examples show that the proposed scheme achieves good tradeoff between the computational complexity and high performance compared with the conventional counterparts.
Physical layer security has received considerable attentions in recent years. Moreover, cooperative communications using some nodes of network as relays make use of the benefit of multi-antenna systems such as increas...
详细信息
Physical layer security has received considerable attentions in recent years. Moreover, cooperative communications using some nodes of network as relays make use of the benefit of multi-antenna systems such as increasing the secrecy capacity. This study studies a communication network incorporating some multi-input-multi-output amplify and forward relays in the presence of some eavesdroppers. The objective persuaded in the current work is to find the beamforming matrices at the relays to maximise the achievable secrecy rate under either individual or total power constraint at these nodes. Accordingly, three main approaches including general rank beamforming (GRBF), rank-1 beamforming (RBF) and null-space beamforming (NSBF) are developed. For the NSBF under the total power constraint, a closed-form solution is obtained, while for the remaining scenarios the corresponding optimisation problem is expressed as a semi-definite programmingproblem. Numerical results indicate that the RBF and NSBF methods follow GRBF in some cases and degraded from GRBF in the others. However, it is shown that these two methods have much lower complexity than GRBF.
This study discusses the secrecy rate of two-hop relay-assisted cooperative wiretap channels, incorporating multi-antenna amplify and forward relaying in the middle of transmission. In this regard, under the Gaussian ...
详细信息
This study discusses the secrecy rate of two-hop relay-assisted cooperative wiretap channels, incorporating multi-antenna amplify and forward relaying in the middle of transmission. In this regard, under the Gaussian code book assumption, three main scenarios including null-space beamforming (NSBF), rank-1 beamforming (RBF), and the so-called general rank beamforming (GRBF) are proposed to be employed at the relay where their achievable secrecy rates are studied. Accordingly, for NSBF, a closed-form solution is derived, whereas the corresponding optimisation problems are formulated for the remaining cases as a standard semi-definite programmingproblem. Though GRBF ranks the first in terms of the achievable secrecy rate, RBF exhibits favourable results with a much lower complexity, as the corresponding optimisation problem runs over a reduced dimension. Moreover, NSBF has a much lower complexity, as it provides an analytical solution at the expense of a decrease in the secrecy rate, and interestingly, it performs quite well when the number of eavesdroppers is less than that of the relay antennas.
The authors present a beamforming scheme with opportunistic relaying (namely opportunistic beamforming) for wireless security under amplify-and-forward (AF) and decode-and-forward (DF) strategies. The relay selection ...
详细信息
The authors present a beamforming scheme with opportunistic relaying (namely opportunistic beamforming) for wireless security under amplify-and-forward (AF) and decode-and-forward (DF) strategies. The relay selection is performed using the method of distributed timers, where all the relays use their timers to estimate own instantaneous channel gains and compete to access the wireless medium according to their own channel conditions. The performance of opportunistic beamforming scheme in terms of secure outage probability is analysed and the beamforming problem as a semidefinite programming problem with its optimisation framework is formulated. The results show that, in an opportunistic beamforming scheme, competition among cooperative relays offers diversity benefits in the direction of destination that enhances secrecy rate (i.e. minimises secure outage probability) and adhere to the opportunistic' cooperation rule giving priority to the best' available relay even when they are not chosen to transmit but rather chosen to cooperatively listen. Opportunistic beamforming scheme with DF strategy enhances secrecy rate than the beamforming with multiple DF relays while in the case of AF strategy, it provides significant improvement in the secrecy rate compared to the opportunistic relaying, the equal-power multiple-relay transmission and the single-relay transmission schemes.
Among other bilateral control systems, those of symmetric type have advantage of simple structure, force sensorless and readiness to stabilize. However, a symmetric type bilateral system is known to have poor haptic p...
详细信息
ISBN:
(纸本)9781479927050
Among other bilateral control systems, those of symmetric type have advantage of simple structure, force sensorless and readiness to stabilize. However, a symmetric type bilateral system is known to have poor haptic performance. In this paper, we propose a bilateral system design without force sensor, based on a generalized system structure of master slave systems. Force feedback and position tracking performance are taken into account by H2 performance at frequency range of the desired haptic transfer, and influence of the measurement noise is suppressed by H-infinity condition. Such a multi-objective controller is designed by solving a semidefinite programming problem. The derived controller tends to have large condition number;we truncate balanced realization of the controller to obtain feasible feedback systems. Effectiveness of the proposed approach is illustrated by numerical studies in time as well as frequency domains, and also experiments.
The linear semidefinite programming problem is examined. A primal interior point method is proposed to solve this problem. It extends the barrier-projection method used for linear programs. The basic properties of the...
详细信息
The linear semidefinite programming problem is examined. A primal interior point method is proposed to solve this problem. It extends the barrier-projection method used for linear programs. The basic properties of the proposed method are discussed, and its local convergence is proved.
Among other bilateral control systems, those of symmetric type have advantage of simple structure, force sensorless and readiness to stabilize. However, a symmetric type bilateral system is known to have poor haptic p...
详细信息
ISBN:
(纸本)9781479927067
Among other bilateral control systems, those of symmetric type have advantage of simple structure, force sensorless and readiness to stabilize. However, a symmetric type bilateral system is known to have poor haptic performance. In this paper, we propose a bilateral system design without force sensor, based on a generalized system structure of master slave systems. Force feedback and position tracking performance are taken into account by H2 performance at frequency range of the desired haptic transfer, and influence of the measurement noise is suppressed by H-infinity condition. Such a multi-objective controller is designed by solving a semidefinite programming problem. The derived controller tends to have large condition number;we truncate balanced realization of the controller to obtain feasible feedback systems. Effectiveness of the proposed approach is illustrated by numerical studies in time as well as frequency domains, and also experiments.
This study addresses the robust set-membership finite-horizon filtering problem for a class of discrete time-varying systems with missing measurement and polytopic uncertainties in the presence of unknown-but-bounded ...
详细信息
This study addresses the robust set-membership finite-horizon filtering problem for a class of discrete time-varying systems with missing measurement and polytopic uncertainties in the presence of unknown-but-bounded process and measurement noises. A robust set-membership filter is developed and a recursive algorithm is derived for computing the state estimate ellipsoid that is guaranteed to contain the true state. An optimal possible estimate set is computed recursively by solving the semi-definite programmingproblem. Simulation results are provided to demonstrate the effectiveness of the proposed method.
暂无评论