584 research outputs found

    Polar Coding for Secret-Key Generation

    Full text link
    Practical implementations of secret-key generation are often based on sequential strategies, which handle reliability and secrecy in two successive steps, called reconciliation and privacy amplification. In this paper, we propose an alternative approach based on polar codes that jointly deals with reliability and secrecy. Specifically, we propose secret-key capacity-achieving polar coding schemes for the following models: (i) the degraded binary memoryless source (DBMS) model with rate-unlimited public communication, (ii) the DBMS model with one-way rate-limited public communication, (iii) the 1-to-m broadcast model and (iv) the Markov tree model with uniform marginals. For models (i) and (ii) our coding schemes remain valid for non-degraded sources, although they may not achieve the secret-key capacity. For models (i), (ii) and (iii), our schemes rely on pre-shared secret seed of negligible rate; however, we provide special cases of these models for which no seed is required. Finally, we show an application of our results to secrecy and privacy for biometric systems. We thus provide the first examples of low-complexity secret-key capacity-achieving schemes that are able to handle vector quantization for model (ii), or multiterminal communication for models (iii) and (iv).Comment: 26 pages, 9 figures, accepted to IEEE Transactions on Information Theory; parts of the results were presented at the 2013 IEEE Information Theory Worksho

    Malleable coding for updatable cloud caching

    Full text link
    In software-as-a-service applications provisioned through cloud computing, locally cached data are often modified with updates from new versions. In some cases, with each edit, one may want to preserve both the original and new versions. In this paper, we focus on cases in which only the latest version must be preserved. Furthermore, it is desirable for the data to not only be compressed but to also be easily modified during updates, since representing information and modifying the representation both incur cost. We examine whether it is possible to have both compression efficiency and ease of alteration, in order to promote codeword reuse. In other words, we study the feasibility of a malleable and efficient coding scheme. The tradeoff between compression efficiency and malleability cost-the difficulty of synchronizing compressed versions-is measured as the length of a reused prefix portion. The region of achievable rates and malleability is found. Drawing from prior work on common information problems, we show that efficient data compression may not be the best engineering design principle when storing software-as-a-service data. In the general case, goals of efficiency and malleability are fundamentally in conflict.This work was supported in part by an NSF Graduate Research Fellowship (LRV), Grant CCR-0325774, and Grant CCF-0729069. This work was presented at the 2011 IEEE International Symposium on Information Theory [1] and the 2014 IEEE International Conference on Cloud Engineering [2]. The associate editor coordinating the review of this paper and approving it for publication was R. Thobaben. (CCR-0325774 - NSF Graduate Research Fellowship; CCF-0729069 - NSF Graduate Research Fellowship)Accepted manuscrip

    Control of multi-terminal HVDC networks towards wind power integration: A review

    Get PDF
    © 2015 Elsevier Ltd. More interconnections among countries and synchronous areas are foreseen in order to fulfil the EU 2050 target on the renewable generation share. One proposal to accomplish this challenging objective is the development of the so-called European SuperGrid. Multi-terminal HVDC networks are emerging as the most promising technologies to develop such a concept. Moreover, multi-terminal HVDC grids are based on highly controllable devices, which may allow not only transmitting power, but also supporting the AC grids to ensure a secure and stable operation. This paper aims to present an overview of different control schemes for multi-terminal HVDC grids, including the control of the power converters and the controls for power sharing and the provision of ancillary services. This paper also analyses the proposed modifications of the existing control schemes to manage high participation shares of wind power generation in multi-terminal grids.Postprint (author's final draft

    Malleable Coding with Fixed Reuse

    Full text link
    In cloud computing, storage area networks, remote backup storage, and similar settings, stored data is modified with updates from new versions. Representing information and modifying the representation are both expensive. Therefore it is desirable for the data to not only be compressed but to also be easily modified during updates. A malleable coding scheme considers both compression efficiency and ease of alteration, promoting codeword reuse. We examine the trade-off between compression efficiency and malleability cost-the difficulty of synchronizing compressed versions-measured as the length of a reused prefix portion. Through a coding theorem, the region of achievable rates and malleability is expressed as a single-letter optimization. Relationships to common information problems are also described

    On the Reliability Function of Distributed Hypothesis Testing Under Optimal Detection

    Full text link
    The distributed hypothesis testing problem with full side-information is studied. The trade-off (reliability function) between the two types of error exponents under limited rate is studied in the following way. First, the problem is reduced to the problem of determining the reliability function of channel codes designed for detection (in analogy to a similar result which connects the reliability function of distributed lossless compression and ordinary channel codes). Second, a single-letter random-coding bound based on a hierarchical ensemble, as well as a single-letter expurgated bound, are derived for the reliability of channel-detection codes. Both bounds are derived for a system which employs the optimal detection rule. We conjecture that the resulting random-coding bound is ensemble-tight, and consequently optimal within the class of quantization-and-binning schemes

    Security in the economic operation of power systems

    Get PDF
    Imperial Users onl

    Fuzzy-based cooperative interaction between stand-alone microgrids interconnected through VSC-based multiterminal converter

    Get PDF
    © 2023 Elsevier. This manuscript version is made available under the CC-BY-NC-ND 4.0 license http://creativecommons.org/licenses/by-nc-nd/4.0/This paper proposes a cooperative strategy for the flexible integration of stand-alone AC microgrids using an intermediate multiterminal DC link based on voltage source converters. The strategy manages cooperative power exchange between microgrids through a knowledge-based fuzzy inference system that relies on the current operating conditions of the microgrids. By determining the amount of power to be exchanged between microgrids to improve global reliability, the cooperative strategy achieves an overall reduction in load loss and an increase in the use of available renewable energy. Additionally, the multiterminal DC link provides complete isolation between microgrids, allowing for independent AC bus voltage regulation and management. The effectiveness and expandability of the proposed cooperative energy exchange strategy for enhancing the overall operation of multiple integrated microgrids have been fully verified by simulation and experimental validation.Peer ReviewedPostprint (published version
    • …
    corecore