32,358 research outputs found

    Local spatiotemporal modeling of house prices: a mixed model approach

    Get PDF
    The real estate market has long provided an active application area for spatial–temporal modeling and analysis and it is well known that house prices tend to be not only spatially but also temporally correlated. In the spatial dimension, nearby properties tend to have similar values because they share similar characteristics, but house prices tend to vary over space due to differences in these characteristics. In the temporal dimension, current house prices tend to be based on property values from previous years and in the spatial–temporal dimension, the properties on which current prices are based tend to be in close spatial proximity. To date, however, most research on house prices has adopted either a spatial perspective or a temporal one; relatively little effort has been devoted to situations where both spatial and temporal effects coexist. Using ten years of house price data in Fife, Scotland (2003–2012), this research applies a mixed model approach, semiparametric geographically weighted regression (GWR), to explore, model, and analyze the spatiotemporal variations in the relationships between house prices and associated determinants. The study demonstrates that the mixed modeling technique provides better results than standard approaches to predicting house prices by accounting for spatiotemporal relationships at both global and local scales

    Robust Secure Transmission in MISO Channels Based on Worst-Case Optimization

    Full text link
    This paper studies robust transmission schemes for multiple-input single-output (MISO) wiretap channels. Both the cases of direct transmission and cooperative jamming with a helper are investigated with imperfect channel state information (CSI) for the eavesdropper links. Robust transmit covariance matrices are obtained based on worst-case secrecy rate maximization, under both individual and global power constraints. For the case of an individual power constraint, we show that the non-convex maximin optimization problem can be transformed into a quasiconvex problem that can be efficiently solved with existing methods. For a global power constraint, the joint optimization of the transmit covariance matrices and power allocation between the source and the helper is studied via geometric programming. We also study the robust wiretap transmission problem for the case with a quality-of-service constraint at the legitimate receiver. Numerical results show the advantage of the proposed robust design. In particular, for the global power constraint scenario, although cooperative jamming is not necessary for optimal transmission with perfect eavesdropper's CSI, we show that robust jamming support can increase the worst-case secrecy rate and lower the signal to interference-plus-noise ratio at Eve in the presence of channel mismatches between the transmitters and the eavesdropper.Comment: 28 pages, 5 figure

    Eigenstates of Paraparticle Creation Operators

    Get PDF
    Eigenstates of the parabose and parafermi creation operators are constructed. In the Dirac contour representation, the parabose eigenstates correspond to the dual vectors of the parabose coherent states. In order p=2p=2, conserved-charge parabose creation operator eigenstates are also constructed. The contour forms of the associated resolutions of unity are obtained.Comment: 14 pages, LaTex file, no macros, no figure

    Integrable Systems in n-dimensional Riemannian Geometry

    Full text link
    In this paper we show that if one writes down the structure equations for the evolution of a curve embedded in an (n)-dimensional Riemannian manifold with constant curvature this leads to a symplectic, a Hamiltonian and an hereditary operator. This gives us a natural connection between finite dimensional geometry, infinite dimensional geometry and integrable systems. Moreover one finds a Lax pair in (\orth{n+1}) with the vector modified Korteweg-De Vries equation (vmKDV) \vk{t}= \vk{xxx}+\fr32 ||\vk{}||^2 \vk{x} as integrability condition. We indicate that other integrable vector evolution equations can be found by using a different Ansatz on the form of the Lax pair. We obtain these results by using the {\em natural} or {\em parallel} frame and we show how this can be gauged by a generalized Hasimoto transformation to the (usual) {\em Fren{\^e}t} frame. If one chooses the curvature to be zero, as is usual in the context of integrable systems, then one loses information unless one works in the natural frame

    Cooperative Jamming for Secure Communications in MIMO Relay Networks

    Full text link
    Secure communications can be impeded by eavesdroppers in conventional relay systems. This paper proposes cooperative jamming strategies for two-hop relay networks where the eavesdropper can wiretap the relay channels in both hops. In these approaches, the normally inactive nodes in the relay network can be used as cooperative jamming sources to confuse the eavesdropper. Linear precoding schemes are investigated for two scenarios where single or multiple data streams are transmitted via a decode-and-forward (DF) relay, under the assumption that global channel state information (CSI) is available. For the case of single data stream transmission, we derive closed-form jamming beamformers and the corresponding optimal power allocation. Generalized singular value decomposition (GSVD)-based secure relaying schemes are proposed for the transmission of multiple data streams. The optimal power allocation is found for the GSVD relaying scheme via geometric programming. Based on this result, a GSVD-based cooperative jamming scheme is proposed that shows significant improvement in terms of secrecy rate compared to the approach without jamming. Furthermore, the case involving an eavesdropper with unknown CSI is also investigated in this paper. Simulation results show that the secrecy rate is dramatically increased when inactive nodes in the relay network participate in cooperative jamming.Comment: 30 pages, 7 figures, to appear in IEEE Transactions on Signal Processin

    Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

    Full text link
    This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical-layer message authentication is also introduced briefly. The survey concludes with observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials, 201

    Confinement induced by fermion damping in three-dimensional QED

    Full text link
    The three-dimensional non-compact QED is known to exhibit weak confinement when fermions acquire a finite mass via the mechanism of dynamical chiral symmetry breaking. In this paper, we study the effect of fermion damping caused by elastic scattering on the classical potential between fermions. By calculating the vacuum polarization function that incorporates the fermion damping effect, we show that fermion damping can induce a weak confinement even when the fermions are massless and the chiral symmetry is not broken.Comment: 4 pages, no figur

    An effective criterion for Eulerian multizeta values in positive characteristic

    Full text link
    Characteristic p multizeta values were initially studied by Thakur, who defined them as analogues of classical multiple zeta values of Euler. In the present paper we establish an effective criterion for Eulerian multizeta values, which characterizes when a multizeta value is a rational multiple of a power of the Carlitz period. The resulting "t-motivic" algorithm can tell whether any given multizeta value is Eulerian or not. We also prove that if zeta_A(s_1,...,s_r) is Eulerian, then zeta_A(s_2,...,s_r) has to be Eulerian. When r=2, this was conjectured (and later on conjectured for arbitrary r) by Lara Rodriguez and Thakur for the zeta-like case from numerical data. Our methods apply equally well to values of Carlitz multiple polylogarithms at algebraic points and zeta-like multizeta values.Comment: 32 page
    • …
    corecore