10,426 research outputs found
Transmitter Optimization in MISO Broadcast Channel with Common and Secret Messages
In this paper, we consider transmitter optimization in multiple-input
single-output (MISO) broadcast channel with common and secret messages. The
secret message is intended for users and it is transmitted with perfect
secrecy with respect to eavesdroppers which are also assumed to be
legitimate users in the network. The common message is transmitted at a fixed
rate and it is intended for all users and eavesdroppers. The
source operates under a total power constraint. It also injects artificial
noise to improve the secrecy rate. We obtain the optimum covariance matrices
associated with the common message, secret message, and artificial noise, which
maximize the achievable secrecy rate and simultaneously meet the fixed rate
for the common message
Is That Twitter Hashtag Worth Reading
Online social media such as Twitter, Facebook, Wikis and Linkedin have made a
great impact on the way we consume information in our day to day life. Now it
has become increasingly important that we come across appropriate content from
the social media to avoid information explosion. In case of Twitter, popular
information can be tracked using hashtags. Studying the characteristics of
tweets containing hashtags becomes important for a number of tasks, such as
breaking news detection, personalized message recommendation, friends
recommendation, and sentiment analysis among others.
In this paper, we have analyzed Twitter data based on trending hashtags,
which is widely used nowadays. We have used event based hashtags to know users'
thoughts on those events and to decide whether the rest of the users might find
it interesting or not. We have used topic modeling, which reveals the hidden
thematic structure of the documents (tweets in this case) in addition to
sentiment analysis in exploring and summarizing the content of the documents. A
technique to find the interestingness of event based twitter hashtag and the
associated sentiment has been proposed. The proposed technique helps twitter
follower to read, relevant and interesting hashtag.Comment: 10 pages, 6 figures, Presented at the Third International Symposium
on Women in Computing and Informatics (WCI-2015
Power Allocation in MIMO Wiretap Channel with Statistical CSI and Finite-Alphabet Input
In this paper, we consider the problem of power allocation in MIMO wiretap
channel for secrecy in the presence of multiple eavesdroppers. Perfect
knowledge of the destination channel state information (CSI) and only the
statistical knowledge of the eavesdroppers CSI are assumed. We first consider
the MIMO wiretap channel with Gaussian input. Using Jensen's inequality, we
transform the secrecy rate max-min optimization problem to a single
maximization problem. We use generalized singular value decomposition and
transform the problem to a concave maximization problem which maximizes the sum
secrecy rate of scalar wiretap channels subject to linear constraints on the
transmit covariance matrix. We then consider the MIMO wiretap channel with
finite-alphabet input. We show that the transmit covariance matrix obtained for
the case of Gaussian input, when used in the MIMO wiretap channel with
finite-alphabet input, can lead to zero secrecy rate at high transmit powers.
We then propose a power allocation scheme with an additional power constraint
which alleviates this secrecy rate loss problem, and gives non-zero secrecy
rates at high transmit powers
Checkpoint-Dependent Regulation of Origin Firing and Replication Fork Movement in Response to DNA Damage in Fission Yeast
To elucidate the checkpoint mechanism responsible for slowing passage through S phase when fission yeast cells are treated with the DNA-damaging agent methyl methanesulfonate (MMS), we carried out two-dimensional gel analyses of replication intermediates in cells synchronized by cdc10 block (in G1) followed by release into synchronous S phase. The results indicated that under these conditions early-firing centromeric origins were partially delayed but late-firing telomeric origins were not delayed. Replication intermediates persisted in MMS-treated cells, suggesting that replication fork movement was inhibited. These effects were dependent on the Cds1 checkpoint kinase and were abolished in cells overexpressing the Cdc25 phosphatase, suggesting a role for the Cdc2 cyclin-dependent kinase. We conclude that both partial inhibition of the firing of a subset of origins and inhibition of replication fork movement contribute to the slowing of S phase in MMS-treated fission yeast cells
A Review of Models for Evaluating Quality in Open Source Software
Open source products/projects targeting the same or similar applications are common nowadays. This makes choosing a
tricky task. Quality is one factor that can be considered when choosing among similar open source solutions. In order to measure quality in software, quality models can be used. Open source quality models emerged due to the inability of
traditional quality models to measure unique features (such as community) of open source software. The aim of the paper
therefore is to examine the characteristic features, unique strengths, and limitations of existing open source quality
models. In addition, we compare the models based on some selected attributes
- …