4,669 research outputs found

    Piggybacking Codes for Network Coding: The High/Low SNR Regime

    Full text link
    We propose a piggybacking scheme for network coding where strong source inputs piggyback the weaker ones, a scheme necessary and sufficient to achieve the cut-set upper bound at high/low-snr regime, a new asymptotically optimal operational regime for the multihop Amplify and Forward (AF) networks

    Accountability and Moral Competence Promote Ethical Leadership

    Get PDF
    Accountability and moral competence are two factors that may have a positive effect on ethical leadership in organizations. This study utilized a survey methodology to investigate the relationship among accountability, moral competence and ethical leadership in a sample of 103 leaders from a variety of industries and different countries. Accountability was found to be a significant positive predictor of ethical leadership. Moral competence was also found to moderate this relationship such that increases in moral competence enhanced the positive effects of accountability on ethical leadership. The results of the study suggest that organizations can increase ethical leadership throughout the company via accountability (especially self-accountability) and moral competence by training their leaders to use self-monitoring behaviors and increasing moral education

    Network Coding: Connections Between Information Theory And Estimation Theory

    Full text link
    In this paper, we prove the existence of fundamental relations between information theory and estimation theory for network-coded flows. When the network is represented by a directed graph G=(V, E) and under the assumption of uncorrelated noise over information flows between the directed links connecting transmitters, switches (relays), and receivers. We unveil that there yet exist closed-form relations for the gradient of the mutual information with respect to different components of the system matrix M. On the one hand, this result opens a new class of problems casting further insights into effects of the network topology, topological changes when nodes are mobile, and the impact of errors and delays in certain links into the network capacity which can be further studied in scenarios where one source multi-sinks multicasts and multi-source multicast where the invertibility and the rank of matrix M plays a significant role in the decoding process and therefore, on the network capacity. On the other hand, it opens further research questions of finding precoding solutions adapted to the network level.Comment: IEEE Wireless Communications and Networking Conference (WCNC), April, 201

    Energy Efficient Adaptive Network Coding Schemes for Satellite Communications

    Full text link
    In this paper, we propose novel energy efficient adaptive network coding and modulation schemes for time variant channels. We evaluate such schemes under a realistic channel model for open area environments and Geostationary Earth Orbit (GEO) satellites. Compared to non-adaptive network coding and adaptive rate efficient network-coded schemes for time variant channels, we show that our proposed schemes, through physical layer awareness can be designed to transmit only if a target quality of service (QoS) is achieved. As a result, such schemes can provide remarkable energy savings.Comment: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 24 March 201

    Network Coding Channel Virtualization Schemes for Satellite Multicast Communications

    Full text link
    In this paper, we propose two novel schemes to solve the problem of finding a quasi-optimal number of coded packets to multicast to a set of independent wireless receivers suffering different channel conditions. In particular, we propose two network channel virtualization schemes that allow for representing the set of intended receivers in a multicast group to be virtualized as one receiver. Such approach allows for a transmission scheme not only adapted to per-receiver channel variation over time, but to the network-virtualized channel representing all receivers in the multicast group. The first scheme capitalizes on a maximum erasure criterion introduced via the creation of a virtual worst per receiver per slot reference channel of the network. The second scheme capitalizes on a maximum completion time criterion by the use of the worst performing receiver channel as a virtual reference to the network. We apply such schemes to a GEO satellite scenario. We demonstrate the benefits of the proposed schemes comparing them to a per-receiver point-to-point adaptive strategy

    Support Vector Machine for Network Intrusion and Cyber-Attack Detection

    Get PDF
    The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Cyber-security threats are a growing concern in networked environments. The development of Intrusion Detection Systems (IDSs) is fundamental in order to provide extra level of security. We have developed an unsupervised anomaly-based IDS that uses statistical techniques to conduct the detection process. Despite providing many advantages, anomaly-based IDSs tend to generate a high number of false alarms. Machine Learning (ML) techniques have gained wide interest in tasks of intrusion detection. In this work, Support Vector Machine (SVM) is deemed as an ML technique that could complement the performance of our IDS, providing a second line of detection to reduce the number of false alarms, or as an alternative detection technique. We assess the performance of our IDS against one-class and two-class SVMs, using linear and non-linear forms. The results that we present show that linear two-class SVM generates highly accurate results, and the accuracy of the linear one-class SVM is very comparable, and it does not need training datasets associated with malicious data. Similarly, the results evidence that our IDS could benefit from the use of ML techniques to increase its accuracy when analysing datasets comprising of non-homogeneous features
    corecore