10,165 research outputs found

    Transmitter Optimization in MISO Broadcast Channel with Common and Secret Messages

    Full text link
    In this paper, we consider transmitter optimization in multiple-input single-output (MISO) broadcast channel with common and secret messages. The secret message is intended for KK users and it is transmitted with perfect secrecy with respect to JJ eavesdroppers which are also assumed to be legitimate users in the network. The common message is transmitted at a fixed rate R0R_{0} and it is intended for all KK users and JJ eavesdroppers. The source operates under a total power constraint. It also injects artificial noise to improve the secrecy rate. We obtain the optimum covariance matrices associated with the common message, secret message, and artificial noise, which maximize the achievable secrecy rate and simultaneously meet the fixed rate R0R_{0} for the common message

    Is That Twitter Hashtag Worth Reading

    Full text link
    Online social media such as Twitter, Facebook, Wikis and Linkedin have made a great impact on the way we consume information in our day to day life. Now it has become increasingly important that we come across appropriate content from the social media to avoid information explosion. In case of Twitter, popular information can be tracked using hashtags. Studying the characteristics of tweets containing hashtags becomes important for a number of tasks, such as breaking news detection, personalized message recommendation, friends recommendation, and sentiment analysis among others. In this paper, we have analyzed Twitter data based on trending hashtags, which is widely used nowadays. We have used event based hashtags to know users' thoughts on those events and to decide whether the rest of the users might find it interesting or not. We have used topic modeling, which reveals the hidden thematic structure of the documents (tweets in this case) in addition to sentiment analysis in exploring and summarizing the content of the documents. A technique to find the interestingness of event based twitter hashtag and the associated sentiment has been proposed. The proposed technique helps twitter follower to read, relevant and interesting hashtag.Comment: 10 pages, 6 figures, Presented at the Third International Symposium on Women in Computing and Informatics (WCI-2015

    Power Allocation in MIMO Wiretap Channel with Statistical CSI and Finite-Alphabet Input

    Full text link
    In this paper, we consider the problem of power allocation in MIMO wiretap channel for secrecy in the presence of multiple eavesdroppers. Perfect knowledge of the destination channel state information (CSI) and only the statistical knowledge of the eavesdroppers CSI are assumed. We first consider the MIMO wiretap channel with Gaussian input. Using Jensen's inequality, we transform the secrecy rate max-min optimization problem to a single maximization problem. We use generalized singular value decomposition and transform the problem to a concave maximization problem which maximizes the sum secrecy rate of scalar wiretap channels subject to linear constraints on the transmit covariance matrix. We then consider the MIMO wiretap channel with finite-alphabet input. We show that the transmit covariance matrix obtained for the case of Gaussian input, when used in the MIMO wiretap channel with finite-alphabet input, can lead to zero secrecy rate at high transmit powers. We then propose a power allocation scheme with an additional power constraint which alleviates this secrecy rate loss problem, and gives non-zero secrecy rates at high transmit powers

    Checkpoint-Dependent Regulation of Origin Firing and Replication Fork Movement in Response to DNA Damage in Fission Yeast

    Get PDF
    To elucidate the checkpoint mechanism responsible for slowing passage through S phase when fission yeast cells are treated with the DNA-damaging agent methyl methanesulfonate (MMS), we carried out two-dimensional gel analyses of replication intermediates in cells synchronized by cdc10 block (in G1) followed by release into synchronous S phase. The results indicated that under these conditions early-firing centromeric origins were partially delayed but late-firing telomeric origins were not delayed. Replication intermediates persisted in MMS-treated cells, suggesting that replication fork movement was inhibited. These effects were dependent on the Cds1 checkpoint kinase and were abolished in cells overexpressing the Cdc25 phosphatase, suggesting a role for the Cdc2 cyclin-dependent kinase. We conclude that both partial inhibition of the firing of a subset of origins and inhibition of replication fork movement contribute to the slowing of S phase in MMS-treated fission yeast cells

    A Review of Models for Evaluating Quality in Open Source Software

    Get PDF
    Open source products/projects targeting the same or similar applications are common nowadays. This makes choosing a tricky task. Quality is one factor that can be considered when choosing among similar open source solutions. In order to measure quality in software, quality models can be used. Open source quality models emerged due to the inability of traditional quality models to measure unique features (such as community) of open source software. The aim of the paper therefore is to examine the characteristic features, unique strengths, and limitations of existing open source quality models. In addition, we compare the models based on some selected attributes
    corecore