59,729 research outputs found
Constraint Design Rewriting
We propose an algebraic approach to the design and transformation of constraint networks, inspired by Architectural Design Rewriting. The approach can be understood as (i) an extension of ADR with constraints, and (ii) an application of ADR to the design of reconfigurable constraint networks. The main idea is to consider classes of constraint networks as algebras whose operators are used to denote constraint networks with terms. Constraint network transformations such as constraint propagations are specified with rewrite rules exploiting the network’s structure provided by terms
Outage Constrained Robust Secure Transmission for MISO Wiretap Channels
In this paper we consider the robust secure beamformer design for MISO
wiretap channels. Assume that the eavesdroppers' channels are only partially
available at the transmitter, we seek to maximize the secrecy rate under the
transmit power and secrecy rate outage probability constraint. The outage
probability constraint requires that the secrecy rate exceeds certain threshold
with high probability. Therefore including such constraint in the design
naturally ensures the desired robustness. Unfortunately, the presence of the
probabilistic constraints makes the problem non-convex and hence difficult to
solve. In this paper, we investigate the outage probability constrained secrecy
rate maximization problem using a novel two-step approach. Under a wide range
of uncertainty models, our developed algorithms can obtain high-quality
solutions, sometimes even exact global solutions, for the robust secure
beamformer design problem. Simulation results are presented to verify the
effectiveness and robustness of the proposed algorithms
Spectrum Sharing in Wireless Networks via QoS-Aware Secondary Multicast Beamforming
Secondary spectrum usage has the potential to considerably increase spectrum utilization. In this paper, quality-of-service (QoS)-aware spectrum underlay of a secondary multicast network is considered. A multiantenna secondary access point (AP) is used for multicast (common information) transmission to a number of secondary single-antenna receivers. The idea is that beamforming can be used to steer power towards the secondary receivers while limiting sidelobes that cause interference to primary receivers. Various optimal formulations of beamforming are proposed, motivated by different ldquocohabitationrdquo scenarios, including robust designs that are applicable with inaccurate or limited channel state information at the secondary AP. These formulations are NP-hard computational problems; yet it is shown how convex approximation-based multicast beamforming tools (originally developed without regard to primary interference constraints) can be adapted to work in a spectrum underlay context. Extensive simulation results demonstrate the effectiveness of the proposed approaches and provide insights on the tradeoffs between different design criteria
Spatially Selective Artificial-Noise Aided Transmit Optimization for MISO Multi-Eves Secrecy Rate Maximization
Consider an MISO channel overheard by multiple eavesdroppers. Our goal is to
design an artificial noise (AN)-aided transmit strategy, such that the
achievable secrecy rate is maximized subject to the sum power constraint.
AN-aided secure transmission has recently been found to be a promising approach
for blocking eavesdropping attempts. In many existing studies, the confidential
information transmit covariance and the AN covariance are not simultaneously
optimized. In particular, for design convenience, it is common to prefix the AN
covariance as a specific kind of spatially isotropic covariance. This paper
considers joint optimization of the transmit and AN covariances for secrecy
rate maximization (SRM), with a design flexibility that the AN can take any
spatial pattern. Hence, the proposed design has potential in jamming the
eavesdroppers more effectively, based upon the channel state information (CSI).
We derive an optimization approach to the SRM problem through both analysis and
convex conic optimization machinery. We show that the SRM problem can be recast
as a single-variable optimization problem, and that resultant problem can be
efficiently handled by solving a sequence of semidefinite programs. Our
framework deals with a general setup of multiple multi-antenna eavesdroppers,
and can cater for additional constraints arising from specific application
scenarios, such as interference temperature constraints in interference
networks. We also generalize the framework to an imperfect CSI case where a
worst-case robust SRM formulation is considered. A suboptimal but safe solution
to the outage-constrained robust SRM design is also investigated. Simulation
results show that the proposed AN-aided SRM design yields significant secrecy
rate gains over an optimal no-AN design and the isotropic AN design, especially
when there are more eavesdroppers.Comment: To appear in IEEE Trans. Signal Process., 201
Lift-and-project ranks of the stable set polytope of joined a-perfect graphs
In this paper we study lift-and-project polyhedral operators defined by
Lov?asz and Schrijver and Balas, Ceria and Cornu?ejols on the clique relaxation
of the stable set polytope of web graphs. We compute the disjunctive rank of
all webs and consequently of antiweb graphs. We also obtain the disjunctive
rank of the antiweb constraints for which the complexity of the separation
problem is still unknown. Finally, we use our results to provide bounds of the
disjunctive rank of larger classes of graphs as joined a-perfect graphs, where
near-bipartite graphs belong
Resource Allocation for Secure Communication in Systems with Wireless Information and Power Transfer
This paper considers secure communication in a multiuser multiple-input
single-output (MISO) downlink system with simultaneous wireless information and
power transfer. We study the design of resource allocation algorithms
minimizing the total transmit power for the case when the receivers are able to
harvest energy from the radio frequency. In particular, the algorithm design is
formulated as a non-convex optimization problem which takes into account
artificial noise generation to combat potential eavesdroppers, a minimum
required signal-to-interference-plus-noise ratio (SINR) at the desired
receiver, maximum tolerable SINRs at the potential eavesdroppers, and a minimum
required power delivered to the receivers. We adopt a semidefinite programming
(SDP) relaxation approach to obtain an upper bound solution for the considered
problem. The tightness of the upper bound is revealed by examining a sufficient
condition for the global optimal solution. Inspired by the sufficient
condition, we propose two suboptimal resource allocation schemes enhancing
secure communication and facilitating efficient energy harvesting. Simulation
results demonstrate a close-to-optimal performance achieved by the proposed
suboptimal schemes and significant transmit power savings by optimization of
the artificial noise generation.Comment: 7 pages, 5 figures, and 1 table. Submitted for possible conference
publicatio
- …