• Title/Summary/Keyword: convex relaxation

Search Result 30, Processing Time 0.028 seconds

ENERGY DECAY FOR A VISCOELASTIC EQUATION WITH BALAKRISHNAN-TAYLOR DAMPING INVOLVING INFINITE MEMORY AND NONLINEAR TIME-VARYING DELAY TERMS IN DYNAMICAL BOUNDARY

  • Soufiane Benkouider;Abita Rahmoune
    • Communications of the Korean Mathematical Society
    • /
    • v.38 no.3
    • /
    • pp.943-966
    • /
    • 2023
  • In this paper, we study the initial-boundary value problem for viscoelastic wave equations of Kirchhoff type with Balakrishnan-Taylor damping terms in the presence of the infinite memory and external time-varying delay. For a certain class of relaxation functions and certain initial data, we prove that the decay rate of the solution energy is similar to that of relaxation function which is not necessarily of exponential or polynomial type. Also, we show another stability with g satisfying some general growth at infinity.

Secure Transmission Scheme Based on the Artificial Noise in D2D-Enabled Full-Duplex Cellular Networks

  • Chen, Yajun;Yi, Ming;Zhong, Zhou;Ma, Keming;Huang, Kaizhi;Ji, Xinsheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.10
    • /
    • pp.4923-4939
    • /
    • 2019
  • In this paper, a secure transmission scheme based on the artificial noise is proposed for D2D communications underlaying the full-duplex cellular network, and a secure power allocation scheme to maximize the overall secrecy rate of both the cellular user and D2D transmitter node is presented. Firstly, the full-duplex base station transmits the artificial noise to guarantee the secure communications when it receives signals of cellular uplinks. Under this secure framework, it is found that improving the transmission power of the cellular user or the D2D transmitter node will degrade the secrecy rate of the other, although will improve itself secrecy rate obviously. Hence, a secure power allocation scheme to maximize the overall secrecy rate is presented subject to the security requirement of the cellular user. However, the original power optimization problem is non-convex. To efficiently solve it, we recast the original problem into a convex program problem by utilizing the proper relaxation and the successive convex approximation algorithm. Simulation results evaluate the effectiveness of the proposed scheme.

Low Dimensional Multiuser Detection Exploiting Low User Activity

  • Lee, Junho;Lee, Seung-Hwan
    • Journal of Communications and Networks
    • /
    • v.15 no.3
    • /
    • pp.283-291
    • /
    • 2013
  • In this paper, we propose new multiuser detectors (MUDs) based on compressed sensing approaches for the large-scale multiple antenna systems equipped with dozens of low-power antennas. We consider the scenarios where the number of receiver antennas is smaller than the total number of users, but the number of active users is relatively small. This prior information motivates sparsity-embracing MUDs such as sparsity-embracing linear/nonlinear MUDs where the detection of active users and their symbol detection are employed. In addition, sparsity-embracing MUDs with maximum a posteriori probability criterion (MAP-MUDs) are presented. They jointly detect active users and their symbols by exploiting the probability of user activity, and it can be solved efficiently by introducing convex relaxing senses. Furthermore, it is shown that sparsity-embracing MUDs exploiting common users' activity across multiple symbols, i.e., frame-by-frame, can be considered to improve performance. Also, in multiple multiple-input and multiple-output networks with aggressive frequency reuse, we propose the interference cancellation strategy for the proposed sparsity-embracing MUDs. That first cancels out the interference induced by adjacent networks and then recovers the desired users' information by exploiting the low user activity. In simulation studies for binary phase shift keying modulation, numerical evidences establish the effectiveness of our proposed MUDs exploiting low user activity, as compared with the conventional MUD.

Robust Relay Design for Two-Way Multi-Antenna Relay Systems with Imperfect CSI

  • Wang, Chenyuan;Dong, Xiaodai;Shi, Yi
    • Journal of Communications and Networks
    • /
    • v.16 no.1
    • /
    • pp.45-55
    • /
    • 2014
  • The paper investigates the problem of designing the multiple-antenna relay in a two-way relay network by taking into account the imperfect channel state information (CSI). The objective is to design the multiple-antenna relay based upon the CSI estimates, where the estimation errors are included to attain the robust design under the worst-case philosophy. In particular, the worst-case transmit power at the multiple-antenna relay is minimized while guaranteeing the worst-case quality of service requirements that the received signal-to-noise ratio (SNR) at both sources are above a prescribed threshold value. Since the worst-case received SNR expression is too complex for subsequent derivation and processing, its lower bound is explored instead by minimizing the numerator and maximizing the denominator of the worst-case SNR. The aforementioned problem is mathematically formulated and shown to be nonconvex. This motivates the pursuit of semidefinite relaxation coupled with a randomization technique to obtain computationally efficient high-quality approximate solutions. This paper has shown that the original optimization problem can be reformulated and then relaxed to a convex problem that can be solved by utilizing suitable randomization loop. Numerical results compare the proposed multiple-antenna relay with the existing nonrobust method, and therefore validate its robustness against the channel uncertainty. Finally, the feasibility of the proposed design and the associated influencing factors are discussed by means of extensive Monte Carlo simulations.

Semidefinite Spectral Clustering (준정부호 스펙트럼의 군집화)

  • Kim, Jae-Hwan;Choi, Seung-Jin
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.892-894
    • /
    • 2005
  • Graph partitioning provides an important tool for data clustering, but is an NP-hard combinatorial optimization problem. Spectral clustering where the clustering is performed by the eigen-decomposition of an affinity matrix [1,2]. This is a popular way of solving the graph partitioning problem. On the other hand, semidefinite relaxation, is an alternative way of relaxing combinatorial optimization. issuing to a convex optimization[4]. In this paper we present a semidefinite programming (SDP) approach to graph equi-partitioning for clustering and then we use eigen-decomposition to obtain an optimal partition set. Therefore, the method is referred to as semidefinite spectral clustering (SSC). Numerical experiments with several artificial and real data sets, demonstrate the useful behavior of our SSC. compared to existing spectral clustering methods.

  • PDF

An Algorithm for the Edge Coloring Problem (호의 색칠문제의 해법)

  • Park, Sung-Soo
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.18 no.2
    • /
    • pp.43-49
    • /
    • 1992
  • Edge coloring problem is to find a minimum cardinality coloring of the edges of a graph so that any pair of edges incident to a common node do not have the same colors. Edge coloring problem is NP-hard, hence it is unlikely that there exists a polynomial time algorithm. We formulate the problem as a covering of the edges by matchings and find valid inequalities for the convex hull of feasible solutions. We show that adding the valid inequalities to the linear programming relaxation is enough to determine the minimum coloring number(chromatic index). We also propose a method to use the valid inequalities as cutting planes and do the branch and bound search implicitly. An example is given to show how the method works.

  • PDF

K-Way Graph Partitioning: A Semidefinite Programming Approach (Semidefinite Programming을 통한 그래프의 동시 분할법)

  • Jaehwan, Kim;Seungjin, Choi;Sung-Yang, Bang
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.697-699
    • /
    • 2004
  • Despite many successful spectral clustering algorithm (based on the spectral decomposition of Laplacian(1) or stochastic matrix(2) ) there are several unsolved problems. Most spectral clustering Problems are based on the normalized of algorithm(3) . are close to the classical graph paritioning problem which is NP-hard problem. To get good solution in polynomial time. it needs to establish its convex form by using relaxation. In this paper, we apply a novel optimization technique. semidefinite programming(SDP). to the unsupervised clustering Problem. and present a new multiple Partitioning method. Experimental results confirm that the Proposed method improves the clustering performance. especially in the Problem of being mixed with non-compact clusters compared to the previous multiple spectral clustering methods.

  • PDF

Joint Beamforming and Power Splitting Design for Physical Layer Security in Cognitive SWIPT Decode-and-Forward Relay Networks

  • Xu, Xiaorong;Hu, Andi;Yao, Yingbiao;Feng, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.1-19
    • /
    • 2020
  • In an underlay cognitive simultaneous wireless information and power transfer (SWIPT) network, communication from secondary user (SU) to secondary destination (SD) is accomplished with decode-and-forward (DF) relays. Multiple energy-constrained relays are assumed to harvest energy from SU via power splitting (PS) protocol and complete SU secure information transmission with beamforming. Hence, physical layer security (PLS) is investigated in cognitive SWIPT network. In order to interfere with eavesdropper and improve relay's energy efficiency, a destination-assisted jamming scheme is proposed. Namely, SD transmits artificial noise (AN) to interfere with eavesdropping, while jamming signal can also provide harvested energy to relays. Beamforming vector and power splitting ratio are jointly optimized with the objective of SU secrecy capacity maximization. We solve this non-convex optimization problem via a general two-stage procedure. Firstly, we obtain the optimal beamforming vector through semi-definite relaxation (SDR) method with a fixed power splitting ratio. Secondly, the best power splitting ratio can be obtained by one-dimensional search. We provide simulation results to verify the proposed solution. Simulation results show that the scheme achieves the maximum SD secrecy rate with appropriate selection of power splitting ratio, and the proposed scheme guarantees security in cognitive SWIPT networks.

Room Temperature Preparation of Electrolytic Silicon Thin Film as an Anode in Rechargeable Lithium Battery (실리콘 상온 전해 도금 박막 제조 및 전기화학적 특성 평가)

  • Kim, Eun-Ji;Shin, Heon-Cheol
    • Korean Journal of Materials Research
    • /
    • v.22 no.1
    • /
    • pp.8-15
    • /
    • 2012
  • Silicon-based thin film was prepared at room temperature by an electrochemical deposition method and a feasibility study was conducted for its use as an anode material in a rechargeable lithium battery. The growth of the electrodeposits was mainly concentrated on the surface defects of the Cu substrate while that growth was trivial on the defect-free surface region. Intentional formation of random defects on the substrate by chemical etching led to uniform formation of deposits throughout the surface. The morphology of the electrodeposits reflected first the roughened surface of the substrate, but it became flattened as the deposition time increased, due primarily to the concentration of reduction current on the convex region of the deposits. The electrodeposits proved to be amorphous and to contain chlorine and carbon, together with silicon, indicating that the electrolyte is captured in the deposits during the fabrication process. The silicon in the deposits readily reacted with lithium, but thick deposits resulted in significant reaction overvoltage. The charge efficiency of oxidation (lithiation) to reduction (delithiation) was higher in the relatively thick deposit. This abnormal behavior needs to clarified in view of the thickness dependence of the internal residual stress and the relaxation tendency of the reaction-induced stress due to the porous structure of the deposits and the deposit components other than silicon.

Velocity Field Measurement of Flow Around a Surface-Mounted Vertical Fence Using the Two-Frame PTV System (2-프레임 PTV를 이용한 수직벽 주위 유동장 해석)

  • Baek, Seung-Jo;Lee, Sang-Joon
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.23 no.10
    • /
    • pp.1340-1346
    • /
    • 1999
  • The turbulent shear flow around a surface-mounted vertical fence was investigated using the two-frame PTV system. The Reynolds number based on the fence height(H) was 2950. From this study, it is revealed that at least 400 instantaneous velocity field data are required for ensemble average to get reliable turbulence statistics, but only 100 field data are sufficient for the time-averaged mean velocity information. Various turbulence statistics such as turbulent intensities, turbulence kinetic energy and Reynolds shear stress were calculated from 700 instantaneous velocity vector fields. The fence flow has an unsteady recirculation region behind the fence, followed by a slow relaxation to the flat-plate boundary layer flow. The time-averaged reattachment length estimated from the streamline distribution is about 11.2H. There exists a region of negative Reynolds shear stress near the fence top due to the highly convex (stabilizing) streamline-curvature of the upstream flow. The large eddy structure in the separated shear layer seems to have significant influence on the development of the separated shear layer and the reattachment process.