84 research outputs found

    Riemannian Holonomy Groups of Statistical Manifolds

    Full text link
    Normal distribution manifolds play essential roles in the theory of information geometry, so do holonomy groups in classification of Riemannian manifolds. After some necessary preliminaries on information geometry and holonomy groups, it is presented that the corresponding Riemannian holonomy group of the dd-dimensional normal distribution is SO(d(d+3)2)SO\left(\frac{d\left(d+3\right)}{2}\right), for all dNd\in\mathbb{N}. As a generalization on exponential family, a list of holonomy groups follows.Comment: 11 page

    MU-MIMO Communications with MIMO Radar: From Co-existence to Joint Transmission

    Get PDF
    Beamforming techniques are proposed for a joint multi-input-multi-output (MIMO) radar-communication (RadCom) system, where a single device acts both as a radar and a communication base station (BS) by simultaneously communicating with downlink users and detecting radar targets. Two operational options are considered, where we first split the antennas into two groups, one for radar and the other for communication. Under this deployment, the radar signal is designed to fall into the null-space of the downlink channel. The communication beamformer is optimized such that the beampattern obtained matches the radar's beampattern while satisfying the communication performance requirements. To reduce the optimizations' constraints, we consider a second operational option, where all the antennas transmit a joint waveform that is shared by both radar and communications. In this case, we formulate an appropriate probing beampattern, while guaranteeing the performance of the downlink communications. By incorporating the SINR constraints into objective functions as penalty terms, we further simplify the original beamforming designs to weighted optimizations, and solve them by efficient manifold algorithms. Numerical results show that the shared deployment outperforms the separated case significantly, and the proposed weighted optimizations achieve a similar performance to the original optimizations, despite their significantly lower computational complexity.Comment: 15 pages, 15 figures. This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessibl

    Fibre Bundle Models and 3D Object Recognition

    Get PDF

    Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN

    Get PDF
    Abstract. The current packet based stream authentication schemes provide effective and efficient authentication over a group of packets transmitted on erasure channels. However, by fixing the packets in transmission, any packet manipulation will cause authentication failure. In p2p content delivery network where a proxy-in-the-middle is able to store, forward, transcode and transform the stream, previous schemes are simply unapplicable. To address the problem, we propose a flexible verification scheme that relies on special stream formats (i.e. Unequal Loss Protection ULP scheme [7]). We apply the so called Unequal Loss Verification ULV scheme into MPEG-4 framework. The encoding, packing, amortizing and verifying methods are elaborated in this paper. Our analysis shows that the scheme is secure and cost effective. The scheme is indeed content aware and ensures the verification rate intuitively reflecting a meaningful stream. Further on, we describe the general method of publishing and retrieving a stream in p2p CDN.

    Trust Establishment in Large Scale Grid Settings

    Get PDF
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)3251317-32
    corecore