Suggested Topics within your search.
Suggested Topics within your search.
-
1781
Secure transmission for NOMA downlink based on short packet communication
Published 2021-02-01“…For the low-latency requirements of Internet of things (IoT) business, short packet communication (SPC) and non-orthogonal multiple access (NOMA) were combined to study the problem of secure transmission in the multi-user NOMA system with eavesdroppers.With the maximizing the secure throughput of weak uses as the objective, considering the user decoding error probability constraint, total power constraint and power allocation constraint, a low-complexity power allocation algorithm was proposed to realize secure transmission.In order to solve the problem caused by complex objective function formula and unreliable serial interference cancellation (SIC) technology, the proof that the compactness of the constraints was necessary to find the optimal solution.Under the constraint of maximum decoding error probability, the power constraint was transformed and calculated to obtain the strict limit of transmitting power for strong users, and the transmit power search set from base station to strong user was derived.Then, the one-dimensional search algorithm was used to allocate power resources to maximize the throughput of weak users.Simulation results prove that the proposed algorithm can effectively improve the security throughput of weak users in the system.…”
Get full text
Article -
1782
Design of a Logistics Nonlinear System for a Complex, Multiechelon, Supply Chain Network with Uncertain Demands
Published 2018-01-01“…The objective function and nonlinear constraints are reformulated as linear formulations, transforming the original nonlinear problem into a mixed integer linear programming model. …”
Get full text
Article -
1783
Deep Reinforcement Learning for RIS-Assisted Multi-UAV MU-MISO Communication Networks: Sum-Rate and Energy Efficiency Maximization
Published 2025-01-01“…We formulate separate optimization problems for sum-rate and energy efficiency, and address them using deep reinforcement learning (DRL) algorithms, namely proximal policy optimization (PPO) and deep deterministic policy gradient (DDPG). …”
Get full text
Article -
1784
Software Design for Inventory Management Improvement in a Peruvian National University
Published 2024-12-01“… The purpose of this study was to design a software to optimize inventory management in the Office of Information Technology and Communications (OTIC) of the Faculty of Industrial Engineering and Systems of the Universidad Nacional del Callao, Peru. …”
Get full text
Article -
1785
Integrated Train Rescheduling and Rerouting during Multidisturbances under a Quasi-Moving Block System
Published 2021-01-01“…In order to adjust the train speed and find the best routes for trains, the set of alternative arcs and alternative arrival/departure paths are considered in the constraints, respectively. Due to this complex NP-hard problem, a two-step algorithm with three scheduling rules based on a commercial optimizer is applied to solve the problem efficiently in a real-word case, and the efficiency, validity, and feasibility of this method are demonstrated by a series of experimental tests. …”
Get full text
Article -
1786
Prioritized Multi-task Motion Coordination of Physically Constrained Quadruped Manipulators
Published 2025-01-01“…To solve this redundant problem, we propose a novel motion coordination framework based on multi-task prioritization and null-space projection. …”
Get full text
Article -
1787
Proactive Distributed Emergency Response With Heterogeneous Tasks Allocation
Published 2025-01-01“…This study develops a new proactive framework based on the distributed constraint optimization problem (DCOP) to address the above limitations, overcoming conventional TIM models that cannot accommodate the dependencies in the TIM problem. …”
Get full text
Article -
1788
Study of the probabilistic and temporal characteristics of wireless networks using the CSMA/CA access method
Published 2024-04-01“…The research involved varying the number of workstations and the intensity of packet flows entering the network nodes under the time constraint on packet transmission. The application of the developed mathematical models will be useful in creating and optimizing wireless networks such as Wi-Fi networks, networks based on the IEEE 802.11 standard, and other data transmission systems using the CSMA/CA access method. …”
Get full text
Article -
1789
Performance Analysis of Cognitive Radio System Based on Outage Probability of Cognitive Transmission
Published 2013-10-01“…It is an important part to design an optimal spectrum sensing and transmission framework in cognitive radio network.Considering that cognitive data transmission outage had effect on the performance of cognitive radio system,a novel spectrum sensing and transmission model based on the outage probability of cognitive transmission was proposed and the two phases of spectrum sensing and data transmission were jointly optimized.The model was formulated as a nonconvex optimization problem under the constraint of interference to primary user,which maximized the average achievable throughput by the joint optimization of sensing time and data transmission rate and simulated by means of the numerical method.The numerical analysis shows that a better tradeoff can be achieved among the protection of primary user,the throughput of cognitive system and transmission delay when the outage probability is cited and the constraint is satisfied.…”
Get full text
Article -
1790
Stability and Selective Harvesting of a Phytoplankton-Zooplankton System
Published 2014-01-01“…The problem of determining the optimal harvest policy is solved by using Pontryagin's maximum principle subject to the state equations and the control constraints, and the impact of tax is also discussed. …”
Get full text
Article -
1791
Design and experiment of key components of a insertion vegetable grafting machine with six plants synchronous
Published 2025-05-01“…The rectangular hand claw is embedded with EVA flexible material (maximum clamping pressure of the clamping mechanism: rootstock 266.35 Pa and scion 158.92 Pa), to overcome the fragile seedling damage control problems; Optimization of rootstock dynamics modeling with the V-shaped gathering block opening angle of 90° to achieve adaptive positioning of heterogeneous stems; The dual cutting system of positive-cutting and rotary-cutting matches the different cutting requirements of rootstock and scion. …”
Get full text
Article -
1792
Analyzing greedy vaccine allocation algorithms for metapopulation disease models.
Published 2025-07-01“…The allocation of vaccines can be modeled as a discrete optimization problem that prior research has shown to be computationally difficult (i.e., NP-hard) to solve even approximately. …”
Get full text
Article -
1793
An Explainable Deep Semantic Coding for Binary-Classification- Oriented Communication
Published 2025-04-01“…From an information-theoretic perspective, we formulate a semantic coding problem that jointly optimizes data compression rate and classification accuracy subject to distortion constraints. …”
Get full text
Article -
1794
Clustering-based energy-aware virtual network embedding
Published 2017-08-01“…Virtual network embedding has received a lot of attention from researchers. In this problem, it needs to map a sequence of virtual networks onto the physical network. …”
Get full text
Article -
1795
Cache Assignment for a Flexible Mobile User in Wireless Heterogeneous Networks
Published 2025-03-01“…Because of the complexity of the problem, finding the optimal solution is NP-hard. …”
Get full text
Article -
1796
Deep reinforcement learning applications and prospects in industrial scenarios
Published 2025-04-01“…Case studies across sectors such as energy management, manufacturing, and process optimization illustrate the versatility and effectiveness of DRL in solving diverse industrial problems. …”
Get full text
Article -
1797
Unsupervised Learning for Distributed Downlink Power Allocation in Cell-Free mMIMO Networks
Published 2025-01-01“…This paper aims to introduce a novel unsupervised learning framework for the downlink (DL) power allocation problem in CF-mMIMO networks, utilizing only large-scale fading (LSF) coefficients as input, rather than the hard-to-obtain exact user location or channel state information (CSI). …”
Get full text
Article -
1798
RETRACTED ARTICLE: Eco-reliable operation based on clean environmental condition for the grid-connected renewable energy hubs with heat pump and hydrogen, thermal and compressed ai...
Published 2025-01-01“…Subject to the operating model and reliability restrictions of these networks, the suggested strategy seeks to reduce the overall estimated costs of energy procurement, dependability, and emissions within the designated networks. Additional constraints of the problem encompass the operational model of sources and storages, conceptualized as an energy hub. …”
Get full text
Article -
1799
Improving IoRT Networks: Cross-Tier Resource Allocation for Multi-Antenna UAV Relays in SAGIN
Published 2024-01-01“…The optimization problem aims to minimize the weighted sum of the number of gateways and the total UAV power consumption by jointly optimizing UAV deployment, UAV power allocation, gateway selection, and channel allocation. …”
Get full text
Article -
1800
Inspection of railway catenary systems using machine learning with domain knowledge integration
Published 2025-08-01“…The application of machine learning methods to this problem is non-trivial, due to various constraints, including the cost of data acquisition. …”
Get full text
Article