80,792 research outputs found
Spectrum optimization in multi-user multi-carrier systems with iterative convex and nonconvex approximation methods
Several practical multi-user multi-carrier communication systems are
characterized by a multi-carrier interference channel system model where the
interference is treated as noise. For these systems, spectrum optimization is a
promising means to mitigate interference. This however corresponds to a
challenging nonconvex optimization problem. Existing iterative convex
approximation (ICA) methods consist in solving a series of improving convex
approximations and are typically implemented in a per-user iterative approach.
However they do not take this typical iterative implementation into account in
their design. This paper proposes a novel class of iterative approximation
methods that focuses explicitly on the per-user iterative implementation, which
allows to relax the problem significantly, dropping joint convexity and even
convexity requirements for the approximations. A systematic design framework is
proposed to construct instances of this novel class, where several new
iterative approximation methods are developed with improved per-user convex and
nonconvex approximations that are both tighter and simpler to solve (in
closed-form). As a result, these novel methods display a much faster
convergence speed and require a significantly lower computational cost.
Furthermore, a majority of the proposed methods can tackle the issue of getting
stuck in bad locally optimal solutions, and hence improve solution quality
compared to existing ICA methods.Comment: 33 pages, 7 figures. This work has been submitted for possible
publicatio
Joint Power Splitting and Secure Beamforming Design in the Wireless-powered Untrusted Relay Networks
In this work, we maximize the secrecy rate of the wireless-powered untrusted
relay network by jointly designing power splitting (PS) ratio and relay
beamforming with the proposed global optimal algorithm (GOA) and local optimal
algorithm (LOA). Different from the literature, artificial noise (AN) sent by
the destination not only degrades the channel condition of the eavesdropper to
improve the secrecy rate, but also becomes a new source of energy powering the
untrusted relay based on PS. Hence, it is of high economic benefits and
efficiency to take advantage of AN compared with the literature. Simulation
results show that LOA can achieve satisfactory secrecy rate performance
compared with that of GOA, but with less computation time.Comment: Submitted to GlobeCom201
Conic Optimization Theory: Convexification Techniques and Numerical Algorithms
Optimization is at the core of control theory and appears in several areas of
this field, such as optimal control, distributed control, system
identification, robust control, state estimation, model predictive control and
dynamic programming. The recent advances in various topics of modern
optimization have also been revamping the area of machine learning. Motivated
by the crucial role of optimization theory in the design, analysis, control and
operation of real-world systems, this tutorial paper offers a detailed overview
of some major advances in this area, namely conic optimization and its emerging
applications. First, we discuss the importance of conic optimization in
different areas. Then, we explain seminal results on the design of hierarchies
of convex relaxations for a wide range of nonconvex problems. Finally, we study
different numerical algorithms for large-scale conic optimization problems.Comment: 18 page
- …