32,475 research outputs found
Local spatiotemporal modeling of house prices: a mixed model approach
The real estate market has long provided an active application area for spatial–temporal modeling and analysis and it is well known that house prices tend to be not only spatially but also temporally correlated. In the spatial dimension, nearby properties tend to have similar values because they share similar characteristics, but house prices tend to vary over space due to differences in these characteristics. In the temporal dimension, current house prices tend to be based on property values from previous years and in the spatial–temporal dimension, the properties on which current prices are based tend to be in close spatial proximity. To date, however, most research on house prices has adopted either a spatial perspective or a temporal one; relatively little effort has been devoted to situations where both spatial and temporal effects coexist. Using ten years of house price data in Fife, Scotland (2003–2012), this research applies a mixed model approach, semiparametric geographically weighted regression (GWR), to explore, model, and analyze the spatiotemporal variations in the relationships between house prices and associated determinants. The study demonstrates that the mixed modeling technique provides better results than standard approaches to predicting house prices by accounting for spatiotemporal relationships at both global and local scales
Robust Secure Transmission in MISO Channels Based on Worst-Case Optimization
This paper studies robust transmission schemes for multiple-input
single-output (MISO) wiretap channels. Both the cases of direct transmission
and cooperative jamming with a helper are investigated with imperfect channel
state information (CSI) for the eavesdropper links. Robust transmit covariance
matrices are obtained based on worst-case secrecy rate maximization, under both
individual and global power constraints. For the case of an individual power
constraint, we show that the non-convex maximin optimization problem can be
transformed into a quasiconvex problem that can be efficiently solved with
existing methods. For a global power constraint, the joint optimization of the
transmit covariance matrices and power allocation between the source and the
helper is studied via geometric programming. We also study the robust wiretap
transmission problem for the case with a quality-of-service constraint at the
legitimate receiver. Numerical results show the advantage of the proposed
robust design. In particular, for the global power constraint scenario,
although cooperative jamming is not necessary for optimal transmission with
perfect eavesdropper's CSI, we show that robust jamming support can increase
the worst-case secrecy rate and lower the signal to interference-plus-noise
ratio at Eve in the presence of channel mismatches between the transmitters and
the eavesdropper.Comment: 28 pages, 5 figure
Eigenstates of Paraparticle Creation Operators
Eigenstates of the parabose and parafermi creation operators are constructed.
In the Dirac contour representation, the parabose eigenstates correspond to the
dual vectors of the parabose coherent states. In order , conserved-charge
parabose creation operator eigenstates are also constructed. The contour forms
of the associated resolutions of unity are obtained.Comment: 14 pages, LaTex file, no macros, no figure
Integrable Systems in n-dimensional Riemannian Geometry
In this paper we show that if one writes down the structure equations for the
evolution of a curve embedded in an (n)-dimensional Riemannian manifold with
constant curvature this leads to a symplectic, a Hamiltonian and an hereditary
operator. This gives us a natural connection between finite dimensional
geometry, infinite dimensional geometry and integrable systems. Moreover one
finds a Lax pair in (\orth{n+1}) with the vector modified Korteweg-De Vries
equation (vmKDV) \vk{t}=
\vk{xxx}+\fr32 ||\vk{}||^2 \vk{x} as integrability condition. We indicate
that other integrable vector evolution equations can be found by using a
different Ansatz on the form of the Lax pair. We obtain these results by using
the {\em natural} or {\em parallel} frame and we show how this can be gauged by
a generalized Hasimoto transformation to the (usual) {\em Fren{\^e}t} frame. If
one chooses the curvature to be zero, as is usual in the context of integrable
systems, then one loses information unless one works in the natural frame
Cooperative Jamming for Secure Communications in MIMO Relay Networks
Secure communications can be impeded by eavesdroppers in conventional relay
systems. This paper proposes cooperative jamming strategies for two-hop relay
networks where the eavesdropper can wiretap the relay channels in both hops. In
these approaches, the normally inactive nodes in the relay network can be used
as cooperative jamming sources to confuse the eavesdropper. Linear precoding
schemes are investigated for two scenarios where single or multiple data
streams are transmitted via a decode-and-forward (DF) relay, under the
assumption that global channel state information (CSI) is available. For the
case of single data stream transmission, we derive closed-form jamming
beamformers and the corresponding optimal power allocation. Generalized
singular value decomposition (GSVD)-based secure relaying schemes are proposed
for the transmission of multiple data streams. The optimal power allocation is
found for the GSVD relaying scheme via geometric programming. Based on this
result, a GSVD-based cooperative jamming scheme is proposed that shows
significant improvement in terms of secrecy rate compared to the approach
without jamming. Furthermore, the case involving an eavesdropper with unknown
CSI is also investigated in this paper. Simulation results show that the
secrecy rate is dramatically increased when inactive nodes in the relay network
participate in cooperative jamming.Comment: 30 pages, 7 figures, to appear in IEEE Transactions on Signal
Processin
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
Confinement induced by fermion damping in three-dimensional QED
The three-dimensional non-compact QED is known to exhibit weak confinement
when fermions acquire a finite mass via the mechanism of dynamical chiral
symmetry breaking. In this paper, we study the effect of fermion damping caused
by elastic scattering on the classical potential between fermions. By
calculating the vacuum polarization function that incorporates the fermion
damping effect, we show that fermion damping can induce a weak confinement even
when the fermions are massless and the chiral symmetry is not broken.Comment: 4 pages, no figur
An effective criterion for Eulerian multizeta values in positive characteristic
Characteristic p multizeta values were initially studied by Thakur, who
defined them as analogues of classical multiple zeta values of Euler. In the
present paper we establish an effective criterion for Eulerian multizeta
values, which characterizes when a multizeta value is a rational multiple of a
power of the Carlitz period. The resulting "t-motivic" algorithm can tell
whether any given multizeta value is Eulerian or not. We also prove that if
zeta_A(s_1,...,s_r) is Eulerian, then zeta_A(s_2,...,s_r) has to be Eulerian.
When r=2, this was conjectured (and later on conjectured for arbitrary r) by
Lara Rodriguez and Thakur for the zeta-like case from numerical data. Our
methods apply equally well to values of Carlitz multiple polylogarithms at
algebraic points and zeta-like multizeta values.Comment: 32 page
- …