Results 51 to 60 of about 9,856 (164)
Secure Transmission in ISAC Systems Aided by Active STAR‐RIS
This paper investigates the secure transmission problem in an active simultaneous transmitting and reflecting intelligent reflecting surfaces (STAR‐RIS)‐aided integrated sensing and communication downlink system. Our objective is to maximize the sum secrecy rate by jointly optimizing the base station beamforming vectors, the sensing signal covariance ...
Baofeng Ji, Xinhao Guo, Shahid Mumtaz
wiley +1 more source
Modified Interior-Point Method for Large-and-Sparse Low-Rank Semidefinite Programs
Semidefinite programs (SDPs) are powerful theoretical tools that have been studied for over two decades, but their practical use remains limited due to computational difficulties in solving large-scale, realistic-sized problems.
Lavaei, Javad, Zhang, Richard Y.
core +1 more source
Single‐Shot Initial Mutual Localization for Micro Aerial Swarms
ABSTRACT Initial mutual localization of micro aerial swarms remains a challenging problem and is essential for establishing a common reference frame before coordinated flight. This task is difficult due to the limited scene overlap between nonadjacent drones, as well as sparse and low‐quality feature correspondences in environments with insufficient ...
Xiangyong Wen +4 more
wiley +1 more source
Collaborative Beamforming for Multi‐Target Localization Using Passive Anchors
A joint collaborative beamforming strategy for passive sensor network is proposed active sensors generate collaborative beam to power up the passive sensors and attain accurate self‐localization. ABSTRACT Using wireless passive sensor nodes as anchors is a cost‐effective way for localization system.
Xingjun Lai +3 more
wiley +1 more source
Robust Beamforming for ISAC Systems via Probability of Detection Optimisation
We propose a two‐step robust beamforming design for ISAC that maximises multi‐target detection probability while satisfying multi‐user SINR and per‐antenna power constraints. A sensing‐only Riemannian optimisation on the oblique manifold shapes the transmit covariance, followed by SDR‐based reconstruction to enforce communication guarantees ...
Yong Wang, Xianren Kong
wiley +1 more source
Strong duality in conic linear programming: facial reduction and extended duals
The facial reduction algorithm of Borwein and Wolkowicz and the extended dual of Ramana provide a strong dual for the conic linear program $$ (P) \sup { | Ax \leq_K b} $$ in the absence of any constraint qualification.
A. Ben-Tal +24 more
core +1 more source
A Voronoi Diagram‐Based Approach for AC Optimal Power Flow
This paper presents a new approach for AC optimal power flow. The proposed approach begins by constructing a Voronoi diagram using a set of initial sample points that represent candidate solutions distributed across the search space. It then iteratively adds new sample points, including: (i) a tentative optimal point obtained via the continuous ...
Mohammed N. Khamees, Kai Sun
wiley +1 more source
An Iterative Method for Moving Target Localization Using TDOA and FDOA Measurements
For moving targets localization, incorporating frequency-difference-of-arrival (FDOA) measurements in the commonly used time-difference-of-arrival (TDOA) positioning systems will improve performance.
Yanbin Zou, Huaping Liu, Qun Wan
doaj +1 more source
Formation control of multi‐autonomous underwater vehicle (AUV) systems is essential for collaborative ocean tasks such as environmental monitoring and resource exploration, but it is hindered by challenges like limited flexibility in formation transformation, model uncertainties, and unknown ocean current disturbances.
Fan Luan +3 more
wiley +1 more source

