• Title/Summary/Keyword: bound approximation

Search Result 113, Processing Time 0.031 seconds

Maximum Kill Selection Algorithm for Weapon Target Assignment (WTA) Problem (무기 목표물 배정 문제의 최대 치사인원 선택 알고리즘)

  • Lee, Sang-Un
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.2
    • /
    • pp.221-227
    • /
    • 2019
  • It has long been known that weapon target assignment (WTA) problem is NP-hard. Nonetheless, an exact solution can be found using Brute-Force or branch-and bound method which utilize approximation. Many heuristic algorithms, genetic algorithm particle swarm optimization, etc., have been proposed which provide near-optimal solutions in polynomial time. This paper suggests polynomial time algorithm that can be obtain the optimal solution of WTA problem for the number of total weapons k, the number of weapon types m, and the number of targets n. This algorithm performs k times for O(mn) so the algorithm complexity is O(kmn). The proposed algorithm can be minimize the number of trials than brute-force method and can be obtain the optimal solution.

Transmitter Beamforming and Artificial Noise with Delayed Feedback: Secrecy Rate and Power Allocation

  • Yang, Yunchuan;Wang, Wenbo;Zhao, Hui;Zhao, Long
    • Journal of Communications and Networks
    • /
    • v.14 no.4
    • /
    • pp.374-384
    • /
    • 2012
  • Utilizing artificial noise (AN) is a good means to guarantee security against eavesdropping in a multi-inputmulti-output system, where the AN is designed to lie in the null space of the legitimate receiver's channel direction information (CDI). However, imperfect CDI will lead to noise leakage at the legitimate receiver and cause significant loss in the achievable secrecy rate. In this paper, we consider a delayed feedback system, and investigate the impact of delayed CDI on security by using a transmit beamforming and AN scheme. By exploiting the Gauss-Markov fading spectrum to model the feedback delay, we derive a closed-form expression of the upper bound on the secrecy rate loss, where $N_t$ = 2. For a moderate number of antennas where $N_t$ > 2, two special cases, based on the first-order statistics of the noise leakage and large number theory, are explored to approximate the respective upper bounds. In addition, to maintain a constant signal-to-interferenceplus-noise ratio degradation, we analyze the corresponding delay constraint. Furthermore, based on the obtained closed-form expression of the lower bound on the achievable secrecy rate, we investigate an optimal power allocation strategy between the information signal and the AN. The analytical and numerical results obtained based on first-order statistics can be regarded as a good approximation of the capacity that can be achieved at the legitimate receiver with a certain number of antennas, $N_t$. In addition, for a given delay, we show that optimal power allocation is not sensitive to the number of antennas in a high signal-to-noise ratio regime. The simulation results further indicate that the achievable secrecy rate with optimal power allocation can be improved significantly as compared to that with fixed power allocation. In addition, as the delay increases, the ratio of power allocated to the AN should be decreased to reduce the secrecy rate degradation.

Optimal Input Database Construction for 3D Dredging Quantification (3차원 준설물량 산출을 위한 최적의 입력DB 구축방안)

  • Gang, ByeungJu;Hwang, Bumsik;Park, Heonwoo;Cho, Wanjei
    • Journal of the Korean GEO-environmental Society
    • /
    • v.19 no.5
    • /
    • pp.23-31
    • /
    • 2018
  • The dredging project became more important with the recent construction of off shore structures and reclamation projects. Accordingly, more exact quantitative estimation of the dredged amount should be required. The sub-sea ground information can be obtained generally by the boring investigation and the dredged amount can be estimated based on the depth or the deeper bound of a ceratin layer via 3D visualization program. During the estimation process, the input DB should be constructed with 1D elevation information from boring investigation for the spatially approximated distribution of a deeper bound of each ground layer. The input DB can be varied with the application of the borings and the approximation targets. Therefore, the 3D visualized ground profile and dredged amounts are compared on the actively dredged sites, vicinity of Saemangeum area and outer port area in Gunsan with regard to the input DB construction methods. Conclusively, the input DB based on the spatially approximated depths show higher precision results and more reasonable 3D visualized ground profiles.

ON THE SUFFICIENT CONDITION FOR THE LINEARIZED APPROXIMATION OF THE B$\"{E}$NARD CONVECTION PROBLEM

  • Song, Jong-Chul;Jeon, Chang-Ho
    • Bulletin of the Korean Mathematical Society
    • /
    • v.29 no.1
    • /
    • pp.125-135
    • /
    • 1992
  • In various viscus flow problems it has been the custom to replace the convective derivative by the ordinary partial derivative in problems for which the data are small. In this paper we consider the Benard Convection problem with small data and compare the solution of this problem (assumed to exist) with that of the linearized system resulting from dropping the nonlinear terms in the expression for the convective derivative. The objective of the present work is to derive an estimate for the error introduced in neglecting the convective inertia terms. In fact, we derive an explicit bound for the L$_{2}$ error. Indeed, if the initial data are O(.epsilon.) where .epsilon. << 1, and the Rayleigh number is sufficiently small, we show that this error is bounded by the product of a term of O(.epsilon.$^{2}$) times a decaying exponential in time. The results of the present paper then give a justification for linearizing the Benard Convection problem. We remark that although our results are derived for classical solutions, extensions to appropriately defined weak solutions are obvious. Throughout this paper we will make use of a comma to denote partial differentiation and adopt the summation convention of summing over repeated indices (in a term of an expression) from one to three. As reference to work of continuous dependence on modelling and initial data, we mention the papers of Payne and Sather [8], Ames [2] Adelson [1], Bennett [3], Payne et al. [9], and Song [11,12,13,14]. Also, a similar analysis of a micropolar fluid problem backward in time (an ill-posed problem) was given by Payne and Straughan [10] and Payne [7].

  • PDF

Resonant Formation Rates of Muonic Molecular ion in Muon-Catalyzed Fusion (뮤온 촉매 핵융합에서 뮤온 분자 이온의 공명 형성율)

  • Im, Ki-Hak;Hong, Sang-Hee
    • Nuclear Engineering and Technology
    • /
    • v.24 no.1
    • /
    • pp.63-74
    • /
    • 1992
  • The resonant formation rates of muonic molecular ion dtr in the muon-catalyzed fusion are calculated in various fuel temperatures and densities. The elastic scattering cross sections between t$\mu$ and deuterons are obtained by making use of the partial wave method. The transition property of the excited compound molecule [(dt$\mu$)dee]* derived by the impulse approximation in the form of a bound-state form factor. The radiative, Auger, and collisional deexcitations are considered as the deexcitation mechanisms of the excited dt$\mu$, and each deexcitation width is calculated as well as back decay width. The resultant reaction widths are used to calculate the formation cross sections of resonant dt$\mu$. The resonant formation rates for dt$\mu$-d and dt$\mu$-t collisions are computed as functions of fuel temperature and density. The calculations show that the resonant formation rates increase with fuel densities and have the maximum values at the particular temperatures where the relative collision energies are equal to the resonant ones.

  • PDF

Performance and Operating Characteristics Analysis of the 16-APSK Modulation over Nonlinear Channels (16-APSK 변조 방식의 성능 및 비선형 채널에서의 동작 특성 분석)

  • Kang, Seok-Heon;Kim, Sang-Tae;Sung, Won-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.4C
    • /
    • pp.362-369
    • /
    • 2007
  • APSK (Amplitude Phase Shift Keying) digital modulation is characterized by the circular positioning of the transmission symbols in the constellation diagram. Due to such structural characteristics, the peak-to-average power ratio of the APSK modulation is lower than that of the QAM (Quadrature Amplitude Modulation), and the amount of performance degradation over nonlinear channels can be mitigated. The APSK modulation scheme has recently been adopted as satellite communication system standards including the DVB-S2 (Digital Video Broadcasting - Satellite, Version 2). In this paper, a BER (Bit Error Rate) upper bound approximation formula is derived using the channel model with the output power saturation characteristics, and its accuracy is demonstrated. Using the derived formula, the input power level that minimizes the BER is determined. The optimized performance based on the radii ratio of the 16APSK constellation and the channel saturation level is also presented.

Sharing Error Allowances for the Analysis of Approximation Schemes (근사접근법 분석을 위한 오차허용치의 분배방법)

  • Kim, Joon-Mo;Goo, Eun-Hee
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.5
    • /
    • pp.1-7
    • /
    • 2009
  • When constructing various mobile networks including sensor networks, the problem of finding the layout or graph to interconnect the terminals or nodes of the network may come up. Providing a common scheme that can be applied to the kind of problems, and formulating the bounds of the run time and the result of the algorithm from the scheme, one may evaluate precisely the plan of constructing analogous network systems. This paper, dealing with EMST(Euclidean Minimum Spanning Tree) that represents such problems, provides the scheme for constructing EMST by parallel processing over distributed environments, and the ground for determining the maximum difference of the layout or the graph produced from the scheme: the difference from EMST. In addition, it provides the upper bound of the run time of the algorithm from the scheme.

Adaptive Fuzzy Sliding Mode Control for Nonlinear Systems without Parameter Projection Method (파라미터 투영 기법이 필요 없는 비선형 시스템의 적응 퍼지 슬라이딩 모드 제어)

  • Seo, Sam-Jun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.21 no.4
    • /
    • pp.499-505
    • /
    • 2011
  • In this paper, we proposed an adaptive fuzzy sliding mode control for nonlinear systems without parameter projection method. By modifying the controller structure, the parameters of the estimated input gain function are guaranteed not being identically zero and it is shown that the control scheme will not cause any implementation problem even if the estimated value of input gain function is zero at any moment during on-line operations. Except for the input gain function which an approximate estimate for its lower bound is needed, the proposed control scheme does not assume a priori the exact values of the bounding parameters. Based on Lyapunov synthesis methods, the overall control system guarantees that the tracking error asymptotically converges to zero and that all signals involved in controller are uniformly bounded. This can be illustrated by the simulation results for an inverted pendulum system.

Tight Bounds and Invertible Average Error Probability Expressions over Composite Fading Channels

  • Wang, Qian;Lin, Hai;Kam, Pooi-Yuen
    • Journal of Communications and Networks
    • /
    • v.18 no.2
    • /
    • pp.182-189
    • /
    • 2016
  • The focus in this paper is on obtaining tight, simple algebraic-form bounds and invertible expressions for the average symbol error probability (ASEP) of M-ary phase shift keying (MPSK) in a class of composite fading channels. We employ the mixture gamma (MG) distribution to approximate the signal-to-noise ratio (SNR) distributions of fading models, which include Nakagami-m, Generalized-K ($K_G$), and Nakagami-lognormal fading as specific examples. Our approach involves using the tight upper and lower bounds that we recently derived on the Gaussian Q-function, which can easily be averaged over the general MG distribution. First, algebraic-form upper bounds are derived on the ASEP of MPSK for M > 2, based on the union upper bound on the symbol error probability (SEP) of MPSK in additive white Gaussian noise (AWGN) given by a single Gaussian Q-function. By comparison with the exact ASEP results obtained by numerical integration, we show that these upper bounds are extremely tight for all SNR values of practical interest. These bounds can be employed as accurate approximations that are invertible for high SNR. For the special case of binary phase shift keying (BPSK) (M = 2), where the exact SEP in the AWGN channel is given as one Gaussian Q-function, upper and lower bounds on the exact ASEP are obtained. The bounds can be made arbitrarily tight by adjusting the parameters in our Gaussian bounds. The average of the upper and lower bounds gives a very accurate approximation of the exact ASEP. Moreover, the arbitrarily accurate approximations for all three of the fading models we consider become invertible for reasonably high SNR.

Some Calculated (p,α) Cross-Sections Using the Alpha Particle Knock-On and Triton Pick-Up Reaction Mechanisms: An Optimisation of the Single-Step Feshbache-Kermane-Koonin (FKK) Theory

  • Olise, Felix S.;Ajala, Afis;Olaniyi, Hezekiah B.
    • Nuclear Engineering and Technology
    • /
    • v.48 no.2
    • /
    • pp.482-494
    • /
    • 2016
  • The Feshbache-Kermane-Koonin (FKK) multi-step direct (MSD) theory of pre-equilibrium reactions has been used to compute the single-step cross-sections for some (p,${\alpha}$) reactions using the knock-on and pick-up reaction mechanisms at two incident proton energies. For the knock-on mechanism, the reaction was assumed to have taken place by the direct ejection of a preformed alpha cluster in a shell-model state of the target. But the reaction was assumed to have taken place by the pick-up of a preformed triton cluster (also bound in a shell-model state of the target core) by the incident proton for the pick-up mechanism. The Yukawa forms of potential were used for the proton-alpha (for the knock-on process) and proton-triton (for the pick-up process) interaction and several parameter sets for the proton and alpha-particle optical potentials. The calculated cross-sections for both mechanisms gave satisfactory fits to the experimental data. Furthermore, it has been shown that some combinations of the calculated distorted wave Born approximation cross-sections for the two reaction mechanisms in the FKK MSD theory are able to give better fits to the experimental data, especially in terms of range of agreement. In addition, the theory has been observed to be valid over a wider range of energy.