• Title/Summary/Keyword: semidefinite relaxation

Search Result 19, Processing Time 0.027 seconds

Reduced-order controller design via an iterative LMI method (반복 선형행렬부등식을 이용한 축소차수 제어기 설계)

  • Kim, Seog-Joo;Kwon, Soon-Man;Lee, Jong-Moo;Kim, Chun-Kyung;Cheon, Jong-Min
    • Proceedings of the KIEE Conference
    • /
    • 2004.07d
    • /
    • pp.2242-2244
    • /
    • 2004
  • This paper deals with the design of a reduced-order stabilizing controller for the linear system. The coupled lineal matrix inequality (LMI) problem subject to a rank condition is solved by a sequential semidefinite programming (SDP) approach. The nonconvex rank constraint is incorporated into a strictly linear penalty function, and the computation of the gradient and Hessian function for the Newton method is not required. The penalty factor and related term are updated iteratively. Therefore the overall procedure leads to a successive LMI relaxation method. Extensive numerical experiments illustrate the proposed algorithm.

  • PDF

Greedy Learning of Sparse Eigenfaces for Face Recognition and Tracking

  • Kim, Minyoung
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.14 no.3
    • /
    • pp.162-170
    • /
    • 2014
  • Appearance-based subspace models such as eigenfaces have been widely recognized as one of the most successful approaches to face recognition and tracking. The success of eigenfaces mainly has its origins in the benefits offered by principal component analysis (PCA), the representational power of the underlying generative process for high-dimensional noisy facial image data. The sparse extension of PCA (SPCA) has recently received significant attention in the research community. SPCA functions by imposing sparseness constraints on the eigenvectors, a technique that has been shown to yield more robust solutions in many applications. However, when SPCA is applied to facial images, the time and space complexity of PCA learning becomes a critical issue (e.g., real-time tracking). In this paper, we propose a very fast and scalable greedy forward selection algorithm for SPCA. Unlike a recent semidefinite program-relaxation method that suffers from complex optimization, our approach can process several thousands of data dimensions in reasonable time with little accuracy loss. The effectiveness of our proposed method was demonstrated on real-world face recognition and tracking datasets.

Achievable Rate Region Bounds and Resource Allocation for Wireless Powered Two Way Relay Networks

  • Di, Xiaofei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.565-581
    • /
    • 2019
  • This paper investigates the wireless powered two way relay network (WPTWRN), where two single-antenna users and one single-antenna relay firstly harvest energy from signals emitted by a multi-antenna power beacon (PB) and then two users exchange information with the help of the relay by using their harvested energies. In order to improve the energy transfer efficiency, energy beamforming at the PB is deployed. For such a network, to explore the performance limit of the presented WPTWRN, an optimization problem is formulated to obtain the achievable rate region bounds by jointly optimizing the time allocation and energy beamforming design. As the optimization problem is non-convex, it is first transformed to be a convex problem by using variable substitutions and semidefinite relaxation (SDR) and then solve it efficiently. It is proved that the proposed method achieves the global optimum. Simulation results show that the achievable rate region of the presented WPTWRN architecture outperforms that of wireless powered one way relay network architecture. Results also show that the relay location has significant impact on achievable rate region of the WPTWRN.

A Physical-layer Security Scheme Based on Cross-layer Cooperation in Dense Heterogeneous Networks

  • Zhang, Bo;Huang, Kai-zhi;Chen, Ya-jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2595-2618
    • /
    • 2018
  • In this paper, we investigate secure communication with the presence of multiple eavesdroppers (Eves) in a two-tier downlink dense heterogeneous network, wherein there is a macrocell base station (MBS) and multiple femtocell base stations (FBSs). Each base station (BS) has multiple users. And Eves attempt to wiretap a macrocell user (MU). To keep Eves ignorant of the confidential message, we propose a physical-layer security scheme based on cross-layer cooperation to exploit interference in the considered network. Under the constraints on the quality of service (QoS) of other legitimate users and transmit power, the secrecy rate of system can be maximized through jointly optimizing the beamforming vectors of MBS and cooperative FBSs. We explore the problem of maximizing secrecy rate in both non-colluding and colluding Eves scenarios, respectively. Firstly, in non-colluding Eves scenario, we approximate the original non-convex problem into a few semi-definite programs (SDPs) by employing the semi-definite relaxation (SDR) technique and conservative convex approximation under perfect channel state information (CSI) case. Furthermore, we extend the frame to imperfect CSI case and use the Lagrangian dual theory to cope with uncertain constraints on CSI. Secondly, in colluding Eves scenario, we transform the original problem into a two-tier optimization problem equivalently. Among them, the outer layer problem is a single variable optimization problem and can be solved by one-dimensional linear search. While the inner-layer optimization problem is transformed into a convex SDP problem with SDR technique and Charnes-Cooper transformation. In the perfect CSI case of both non-colluding and colluding Eves scenarios, we prove that the relaxation of SDR is tight and analyze the complexity of proposed algorithms. Finally, simulation results validate the effectiveness and robustness of proposed scheme.

Wide Beam Design of a Fully Digital Active Array Radar Using Convex Optimization with Only Phase Control (위상 조정 Convex 최적화 알고리즘을 이용한 완전 디지털 능동배열레이다의 광역빔 설계)

  • Yang, Woo-Yong;Lee, Hyun-Seok;Yang, Sung-Jun
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.30 no.6
    • /
    • pp.479-486
    • /
    • 2019
  • The fully digital active array radar uses a wide beam for effective mission performance within a limited time. This paper presents a convex optimization algorithm that adjusts only the phase of an array element. First, the algorithm applies a semidefinite relaxation technique to relax the constraint and convert it to a convex set. Then, the constraint is set so that the amplitude is fixed to some extent and the phase is variable. Finally, the optimization is performed to minimize the sum of the eigenvalues obtained through eigenvalue decomposition. Compared to the application results of the existing genetic algorithm, the proposed algorithm is more effective in wide beam design for a fully digital active array radar.

Secure Beamforming with Artificial Noise for Two-way Relay Networks

  • Li, Dandan;Xiong, Ke;Du, Guanyao;Qiu, Zhengding
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.6
    • /
    • pp.1418-1432
    • /
    • 2013
  • This paper studies the problem of secure information exchange between two sources via multiple relays in the presence of an eavesdropper. To this end, we propose a relay beamforming scheme, i.e., relay beamforming with artificial noise (RBwA), where the relay beamforming vector and the artificial noise vector are jointly designed to maintain the received signal-to-interference-ratio (SINR) at the two sources over a predefined Quality of Service (QoS) threshold while limiting the received SINR at the eavesdropper under a predefined secure threshold. For comparison, the relay beamforming without artificial noise (RBoA) is also considered. We formulate two optimization problems for the two schemes, where our goal is to seek the optimal beamforming vector to minimize the total power consumed by relay nodes such that the secrecy of the information exchange between the two sources can be protected. Since both optimization problems are nonconvex, we solve them by semidefinite program (SDP) relaxation theory. Simulation results show that, via beamforming design, physical layer secrecy of two-way relay networks can be greatly improved and our proposed RBwA outperforms the RBoA in terms of both low power consumption and low infeasibility rate.

Weighted TR prefilter for Minimum ISI in indoor wireless Communication System (실내 무선 통신 환경에서 심볼 간 간섭 최소화를 위해 가중치를 적용한 시역전 필터)

  • Yoon, Mi-Sun;Lee, Chung-Yong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.49 no.8
    • /
    • pp.52-57
    • /
    • 2012
  • We propose a weighted time-reversal prefilter for indoor wireless communication systems. In the indoor wireless communication environments, the bit error rate (BER) performance is significantly degraded by the delay spread. The conventional schemes have complex receivers to recover deterioration of the BER. The proposed time-reversal prefilter simplifies the structure of receivers, minimizes the inter-symbol interference (ISI) and maintains the peak power level of the received signal. The simulation results show that the weighted time-reversal prefilter improves the BER performance in comparison with the conventional time-reversal prefilter.

Double TR Prefilter for High Data Rate and Minimum ISI in Multi-user Indoor Communication System (다중 사용자 실내 통신 시스템에서의 데이터 고속 전송 및 심볼 간 간섭 최소화를 위한 이중 시역전 전처리 필터)

  • Yoon, Mi-Sun;Lee, Chung-Yong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.49 no.8
    • /
    • pp.58-64
    • /
    • 2012
  • We propose a double time reversal (TR) prefilter for high data rate and minimum interference in multi-user indoor communication system. A conventional TR prefilter degrades bit error rate (BER) performance significantly because it cannot remove the interference perfectly. As the symbol duration is close, the BER performance is deteriorated. Since the proposed scheme aims to minimize interference, high data rate is realized without the performance degradation and the complexity of receiver is reduced through an additional prefilter design. Simulation results show that the performance of the proposed scheme is improved as the number of users is increased or the data rate becomes high.

Probabilistic Constrained Approach for Distributed Robust Beamforming Design in Cognitive Two-way Relay Networks

  • Chen, Xueyan;Guo, Li;Dong, Chao;Lin, Jiaru;Li, Xingwang;Cavalcante, Charles Casimiro
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.1
    • /
    • pp.21-40
    • /
    • 2018
  • In this paper, we propose the distributed robust beamforming design scheme in cognitive two-way amplify-and-forward (AF) relay networks with imperfect channel state information (CSI). Assuming the CSI errors follow a complex Gaussian distribution, the objective of this paper is to design the robust beamformer which minimizes the total transmit power of the collaborative relays. This design will guarantee the outage probability of signal-to-interference-plus-noise ratio (SINR) beyond a target level at each secondary user (SU), and satisfies the outage probability of interference generated on the primary user (PU) above the predetermined maximum tolerable interference power. Due to the multiple CSI uncertainties in the two-way transmission, the probabilistic constrained optimization problem is intractable and difficult to obtain a closed-form solution. To deal with this, we reformulate the problem to the standard form through a series of matrix transformations. We then accomplish the problem by using the probabilistic approach based on two sorts of Bernstein-type inequalities and the worst-case approach based on S-Procedure. The simulation results indicate that the robust beamforming designs based on the probabilistic method and the worst-case method are both robust to the CSI errors. Meanwhile, the probabilistic method can provide higher feasibility rate and consumes less power.