122 research outputs found

    Three essays on financial intermediation

    Get PDF
    Financial intermediation plays a central role in connecting capital demanders, i. e. firms, and capital suppliers, i. e. investors. My essays focus on two types of financial intermediaries, namely investment banks, who provide a variety of services for firms and institutional investors, and sell-side security analysts, who analyze and provide information about firms, mainly, to institutional investors. The first essay studies security analysts’ cognitive biases in issuing earnings forecasts; the second essay studies analysts’ capital expenditure forecasts; and, the third essay studies the underwriting relationship value between investment banks and their client firms

    Identification of machining defects by Small Displacement Torsor and form parameterization method

    Get PDF
    In the context of product quality, the methods that can be used to estimate machining defects and predict causes of these defects are one of the important factors of a manufacturing process. The two approaches that are presented in this article are used to determine the machining defects. The first approach uses the Small Displacement Torsor (SDT) concept [BM] to determine displacement dispersions (translations and rotations) of machined surfaces. The second one, which takes into account form errors of machined surface (i.e. twist, comber, undulation), uses a geometrical model based on the modal shape's properties, namely the form parameterization method [FS1]. A case study is then carried out to analyze the machining defects of a batch of machined parts

    CSI-based versus RSS-based Secret-Key Generation under Correlated Eavesdropping

    Full text link
    Physical-layer security (PLS) has the potential to strongly enhance the overall system security as an alternative to or in combination with conventional cryptographic primitives usually implemented at higher network layers. Secret-key generation relying on wireless channel reciprocity is an interesting solution as it can be efficiently implemented at the physical layer of emerging wireless communication networks, while providing information-theoretic security guarantees. In this paper, we investigate and compare the secret-key capacity based on the sampling of the entire complex channel state information (CSI) or only its envelope, the received signal strength (RSS). Moreover, as opposed to previous works, we take into account the fact that the eavesdropper's observations might be correlated and we consider the high signal-to-noise ratio (SNR) regime where we can find simple analytical expressions for the secret-key capacity. As already found in previous works, we find that RSS-based secret-key generation is heavily penalized as compared to CSI-based systems. At high SNR, we are able to precisely and simply quantify this penalty: a halved pre-log factor and a constant penalty of about 0.69 bit, which disappears as Eve's channel gets highly correlated

    Construction des codes temps-espace en treillis équilibré pour nT antennes et modulation 4-PSK

    Get PDF
    National audienceCet article propose une nouvelle famille des codes temps-espace en treillis (STTC) pour plusieurs antennes d'émission et une modulation 4-PSK. On les appelle codes "équilibrés" car ils utilisent les points de la constellation MIMO d'une façon équiprobable. En comparant avec les autres codes publiés, on remarque que cette famille de codes fournit les meilleurs codes STTC. On peut alors limiter la recherche systématique des meilleurs codes seulement à cette famille de codes. L'article présente une méthode originale de construction des codes STTC équilibrés. Une liste complète des meilleurs codes à 4 états pour 2 antennes et plusieurs codes équilibrés à 16 états pour 2 et 3 antennes sont aussi donnés

    4-PSK Balanced STTC with Two Transmit Antennas

    Get PDF
    International audienceIn this paper we introduce a new class of space-time trellis codes (STTC). We call them Balanced STTC (B-STTC) because the points of the constellation are used with the same probability. Comparing to known codes, the balanced codes offer the best performance. Therefore, the systematic search for good codes can be reduced to this class. We present here the design of the 4-PSK balanced STTC with 2 transmit antennas. A complete list of the best 4-state and several 16-state good balanced codes are also given

    4-PSK Balanced STTC with Two Transmit Antennas

    Get PDF
    International audienceIn this paper we introduce a new class of space-time trellis codes (STTC). We call them Balanced STTC (B-STTC) because the points of the constellation are used with the same probability. Comparing to known codes, the balanced codes offer the best performance. Therefore, the systematic search for good codes can be reduced to this class. We present here the design of the 4-PSK balanced STTC with 2 transmit antennas. A complete list of the best 4-state and several 16-state good balanced codes are also given

    A New Class of Balanced 4-PSK STTC for Two and Three Transmit Antennas

    Get PDF
    International audienceA new class of 4-PSK Space Time Trellis Codes (STTC) for 2 and 3 transmit antennas is proposed in this paper. We call these codes Balanced STTC because they use the points of the constellation with the same probability. Comparing to known codes, these codes offer the best performance. Therefore, the systematic search for good codes can be reduced to this class. It is shown that all the best published codes are balanced. The paper presents the design of these balanced STTC and gives a complete list of the best 4-state codes. Several 16-state balanced codes for 2 and 3 transmit antennas are also given

    QPSK Balanced Space Time Trellis Codes

    Get PDF
    International audienceAll the best known space-time trellis codes (STTCs) belong to the Balanced STTCs class. The first method to design balanced STTCs is proposed in this letter. The exhaustive code search of optimal codes can then be reduced to this class. Finally, the proposed method is used to construct new QPSK codes for 3 and 4 transmit antennas which outperform the best previously published codes of the same complexity
    corecore