2,782 research outputs found

    Finite-Block-Length Analysis in Classical and Quantum Information Theory

    Full text link
    Coding technology is used in several information processing tasks. In particular, when noise during transmission disturbs communications, coding technology is employed to protect the information. However, there are two types of coding technology: coding in classical information theory and coding in quantum information theory. Although the physical media used to transmit information ultimately obey quantum mechanics, we need to choose the type of coding depending on the kind of information device, classical or quantum, that is being used. In both branches of information theory, there are many elegant theoretical results under the ideal assumption that an infinitely large system is available. In a realistic situation, we need to account for finite size effects. The present paper reviews finite size effects in classical and quantum information theory with respect to various topics, including applied aspects

    Microgrid protection and control through reliable smart grid communication systems

    Full text link
    © 2016 IEEE. Due to dramatically rising energy demand worldwide power system is often run near the operational and technical limits, where unexpected trivial disturbances can cause possibly massive blackouts. Cyber attacks on smart grid communication networks are one of the impending threats to cause large-scale cascading outage. In contrast to the traditional cyber attack protection techniques, this paper presents a recursive systematic convolutional code based defending technique from the signal processing perspective. This code introduces redundancy in the system for protecting the grid information. Furthermore, an optimal control law is designed to stabilize the power network. Specifically, the performance index for control is converted to a convex semidefinite programming problem. The proposed controller can work well for any initial values. The efficacy of the developed approach is verified through numerical simulations. Results show that the proposed strategy has stronger attack protection performance and the controller can stabilize the grid in a fairly short time. This approach provides a fundamental framework for the design of the smart grid energy management system and reliable communication infrastructure scheme with renewable integration applications
    • …
    corecore