- Article
All Graphs with a Failed Zero Forcing Number of Two
- Luis Gomez,
- Karla Rubi,
- Jorden Terrazas and
- Darren A. Narayan
Given a graph G, the zero forcing number of G,
Given a graph G, the zero forcing number of G,
Given a graph G, the zero forcing number of G,
For a graph G, the zero forcing number of G,
For a given a graph G, the zero forcing number of G,
For an
In order to maximize the available data rate and spectrum utilization efficiency, a high-throughput satellite communication system adopts the full spectrum reuse scheme, which will cause serious co-frequency interference. In this paper, a forward lin...
Radio Frequency Fingerprint Identification (RFFI) is a promising device authentication technique that utilizes inherent hardware flaws in transmitters to achieve device identification, thus effectively maintaining the security of the Internet of Thin...
In this paper, the secrecy performance of the two-user simultaneous wireless information and power transfer (SWIPT) sensor networks is studied and a novel secure transmission scheme of cooperative zero-forcing (ZF) jamming is proposed. The two sensor...
The principle of a zero-compliance mechanism was used to develop a three-dimensional force measurement instrument. In each axis, the point of force is suspended by a zero-compliance mechanism. A vertical axis force estimation operation imitates the s...
Background: Recently, there has been a significant increase in the utilization of self-expandable metallic stents (SEMSs) for treating malignant colorectal obstructions through colorectal stenting. The mechanical properties of SEMSs are usually consi...
The cable-supported grid structure (CSGS) is a hybrid structure combined with rigidity and flexibility. Its formed state is closely related to the zero-stress state, construction process, and prestress distribution. The prestress self-equilibrium for...
To address the significant vibration and noise problems caused by the zero-order radial electromagnetic force (REF) in integer-slot permanent magnet synchronous motors (PMSMs), while simultaneously improving the motor’s overall electromagnetic...
In this paper we introduce a Gaussian approximation for the achievable downstream bit rate per user in modern broadband and ultra-broadband digital subscriber loop-based access systems. The considered formulation allows one to account for the main ch...
Domination in graphs has been extensively studied and adopted in many real life applications. The monitoring electrical power system is a variant of a domination problem called power domination problem. Another variant is the zero forcing problem. De...
Walking gait data acquired with force platforms may be used for person re-identification (re-ID) in various authentication, surveillance, and forensics applications. Current force platform-based re-ID systems classify a fixed set of identities (IDs),...
The six-degree-of-freedom (6-DoF) interaction forces/torque of the tool-end play an important role in the robotic tool manipulation using a gripper, which are usually indirectly measured by a robot wrist force/torque sensor. However, the real-time de...
This paper studies the secure transmission in the dual-hop cognitive wiretap networks, where the secondary transmitter (Alice) aims to transmit confidential information to the secondary receiver (Bob) in the face of a multi-antenna relay (Relay), whi...
We give an overview of the work done during the past ten years on the Casimir interaction in electronic topological materials, our focus being solids, which possess surface or bulk electronic band structures with nontrivial topologies, which can be e...
This article addresses a critical security challenge in Internet of Things (IoT) systems, which are vulnerable to traffic detection attacks due to their reliance on shared wireless communication channels. We propose a novel cooperative covert transmi...
In this paper, we design linear precoders for the downlink of a visible light communication (VLC) system that simultaneously serves multiple users. Instead of using phosphor-coated white light-emitting diodes (PWLEDs), we focus on Red-Green-Blue ligh...
In this paper, the scaling laws of scheduling gain and the feasibility of user scheduling for uplink massive multiple input–multiple output (MIMO) systems are investigated by analyzing the second moment of mutual information. We consider two we...
In this paper, a new receive antenna subset (RAS) selection scheme is proposed for precoding-aided spatial modulation (PSM). First, a lattice reduction (LR)-based precoder is employed instead of a conventional zero-forcing (ZF) precoder. It is analyt...
In this paper, we investigate the mode selection strategies for a new device-to-device (D2D) pair becoming active in a network with a number of existing D2D sensors or users coexisting with cellular users in a D2D-enabled heterogeneous network. Speci...
The future 6G mobile communication network will support an unprecedented amount of Internet of Things (IoT) devices, which will boost the demand for low cost terminals under the principle of green communication. One of the critical issues for low cos...
A system-level study was conducted that evaluated the system performance of various dense and sparse antenna array configurations for application in millimeter-wave multi-user multiple-input multiple-output base stations. The performance was evaluate...
This paper discusses the results of simulations relating to the performances of turbo codes, low density parity check (LDPC) codes, and polar codes over an additive white Gaussian noise (AWGN) channel in the presence of inter symbol interference, den...
This paper considers a downlink cellular network where multi-antenna base stations (BSs) simultaneously serve their associated multi-antenna users. Each BS is distributed according to a homogeneous Poisson point process and uses zero-forcing beamform...
Multicarrier techniques have made it possible to wirelessly transmit data at higher rates for underwater acoustic (UWA) communication. Several multicarrier techniques have been explored in the past for wireless data transmission. OFDM is known to fig...
In recent high-throughput satellite communication (SatCom) systems, the use of reconfigurable intelligent surfaces (RISs) has emerged as a promising solution to improve spectral efficiency and extend coverage in areas with limited terrestrial network...
This paper presents a power-aware Reconfigurable Parameterizable Pseudorandom Pattern Generator (RP-PRPG) for a number of applications, including built in self-testing (BIST) and cryptography. Linear Feedback Shift Registers (LFSRs) are broadly utili...
For the receiver of multiple-input multiple-output (MIMO) systems, linear detectors are an interesting option due to their good performance and low complexity. Nevertheless, MIMO systems lose diversity in exchange for eliminating interference when li...
Assuming incomplete knowledge of the channel state information (CSI), we investigate two scenarios involving millimeter wave (mmWave) relaying to support outdoor-to-indoor communications. We proceed to derive the average signal-to-noise ratio (SNR) e...
This study proposes a design approach and the development of a low-power planar biped robot named YU-Bibot. The kinematic structure of the robot consists of six independently driven axes, and it weighs approximately 20 kg. Based on biomimetics, the r...
The objective of the current study is to develop a practical, deterministic approach to the prediction of the in-plane formability of two third generation advanced high-strength steels (AHSS) of 980 and 1180 MPa ultimate tensile strength using only q...
Ultra dense networks (UDN) are identified as one of the key enablers for 5G, since they can provide an ultra high spectral reuse factor exploiting proximal transmissions. By densifying the network infrastructure equipment, it is highly possible that...
Beaufort scale of wind force monitoring is the basic content of meteorological monitoring, which is an important means to ensure the safety of production and life by timely warning of natural disasters. As there is a limited battery life for sensors,...
Zero-Defect Manufacturing (ZDM) is a promising strategy for reducing errors in industrial processes, aligned with Industry 4.0 and digitalization, aiming to carry out processes correctly the first time. ZDM relies on digital tools, notably Artificial...
In this study, we show that automata theory is also a suitable tool for analyzing a more complex type of the k-forcing process. First, the definition of k-forcing automata is presented according to the definition of k-forcing for graphs. Moreover, we...
In the present study, the interaction of variable fluid properties with electrokinetically regulated peristaltic transportation of a reactive nanofluid embedded in a porous space is studied. The nanofluid saturates the porous space/medium with inhomo...
We consider the problem of the efficient transmit antenna subset (TAS) selection for maximizing the signal-to-interference-plus-noise ratio (SINR) of multiuser space–time line code (MU–STLC) systems. The exhaustive search for optimal TAS selection is...
Driven by its agile maneuverability and deployment, the unmanned aerial vehicle (UAV) becomes a potential enabler of the terrestrial networks. In this paper, we consider downlink communications in a UAV-assisted wireless communication network, where...
Co(II) complexes have shown promising applications as single-molecule magnets (SMMs) in quantum computing and structural biology. Deciphering the Co(II) complexes may facilitate the development of SMM materials. Structural optimizations and calculati...
The exploiting of hybrid beamforming (HBF) in massive multiple-input multiple-output (MIMO) systems can enhance the system’s sum rate while reducing power consumption and hardware costs. However, designing an effective hybrid beamformer is chal...
Exposure to whole-body vibration (WBV) has been shown to result in lower-back pain, sciatica, and other forms of discomfort for operators of heavy equipment. While WBV is defined to be between 0.5 and 80 Hz, humans are most sensitive to vertical vibr...
The presence of dominant interatomic dispersion forces on the nanoscale holds the promise for breakthrough applications in key areas of quantum sensing, such as accelerometry, as well as nano-manipulation and energy storage. In order to do work, nano...
This paper studies sum rate maximization of a cognitive radio network, where a full-duplex relay (FDR) is considered to assist data transmission. An FDR equipped with multiple transmit/receive antennas is introduced to harvest energy from the radio f...
The Lamb shift, one of the most fundamental interactions in atomic physics, arises from the interaction of H atoms with the electromagnetic fluctuations of the quantum vacuum. The energy shift has been computed in a variety of ways. The energy shift,...
Multi-User (MU) Multiple-Input-Multiple-Output (MIMO) systems have been extensively investigated over the last few years from both theoretical and practical perspectives. The low complexity Linear Precoding (LP) schemes for MU-MIMO are already deploy...
The open nature of radio propagation enables ubiquitous wireless communication. This allows for seamless data transmission. However, unauthorized users may pose a threat to the security of the data being transmitted to authorized users. This gives ri...
In this paper, a coordinated multipoint joint transmission (CoMP-JT) framework at mmWave for a cyclic prefix (CP)-free multiuser OFDM wireless communication system is developed and analyzed. The aim is to provide high-quality service to cell-edge use...
of 18