653 research outputs found

    Previous Messages Provide the Key to Achieve Shannon Capacity in a Wiretap Channel

    Full text link
    We consider a wiretap channel and use previously transmitted messages to generate a secret key which increases the secrecy capacity. This can be bootstrapped to increase the secrecy capacity to the Shannon capacity without using any feedback or extra channel while retaining the strong secrecy of the wiretap channel.Comment: Accepted for IEEE International Conference on Communications Workshop (ICC) 2013, Budapest, Hungary. arXiv admin note: text overlap with arXiv:1404.570

    Resource Allocation in a MAC with and without security via Game Theoretic Learning

    Full text link
    In this paper a KK-user fading multiple access channel with and without security constraints is studied. First we consider a F-MAC without the security constraints. Under the assumption of individual CSI of users, we propose the problem of power allocation as a stochastic game when the receiver sends an ACK or a NACK depending on whether it was able to decode the message or not. We have used Multiplicative weight no-regret algorithm to obtain a Coarse Correlated Equilibrium (CCE). Then we consider the case when the users can decode ACK/NACK of each other. In this scenario we provide an algorithm to maximize the weighted sum-utility of all the users and obtain a Pareto optimal point. PP is socially optimal but may be unfair to individual users. Next we consider the case where the users can cooperate with each other so as to disagree with the policy which will be unfair to individual user. We then obtain a Nash bargaining solution, which in addition to being Pareto optimal, is also fair to each user. Next we study a KK-user fading multiple access wiretap Channel with CSI of Eve available to the users. We use the previous algorithms to obtain a CCE, PP and a NBS. Next we consider the case where each user does not know the CSI of Eve but only its distribution. In that case we use secrecy outage as the criterion for the receiver to send an ACK or a NACK. Here also we use the previous algorithms to obtain a CCE, PP or a NBS. Finally we show that our algorithms can be extended to the case where a user can transmit at different rates. At the end we provide a few examples to compute different solutions and compare them under different CSI scenarios.Comment: 27 pages, 12 figures. Part of the paper was presented in 2016 IEEE Information theory and applicaitons (ITA) Workshop, San Diego, USA in Feb. 2016. Submitted to journa

    Impact of Play on Early Childhood

    Get PDF
    In this essay, the concept of play is explored within the context of early childhood education, emphasizing its definition, functions, and developmental significance. This study examines many theoretical viewpoints and their consequences as it explores the multidimensional character of play, drawing on the insights of scholars and researchers. It also looks at specific types of play, such as play in the outdoors, play for children with special needs, and play's relationship to education. This investigation emphasizes the critical role that play plays in early childhood and development, emphasizing the value of play in promoting learning experiences and holistic growth

    Enhancement of Map Function Image Processing System using DHRF Algorithm on Big Data in the Private Cloud Tool

    Get PDF
    Cloud computing is the concept of distributing a work and also processing the same work over the internet. Cloud computing is called as service on demand. It is always available on the internet in Pay and Use mode. Processing of the Big Data takes more time to compute MRI and DICOM data. The processing of hard tasks like this can be solved by using the concept of MapReduce. MapReduce function is a concept of Map and Reduce functions. Map is the process of splitting or dividing data. Reduce function is the process of integrating the output of the Map2019;s input to produce the result. The Map function does two various image processing techniques to process the input data. Java Advanced Imaging (JAI) is introduced in the map function in this proposed work. The processed intermediate data of the Map function is sent to the Reduce function for the further process. The Dynamic Handover Reduce Function (DHRF) algorithm is introduced in the reduce function in this work. This algorithm is implemented in the Reduce function to reduce the waiting time while processing the intermediate data. The DHRF algorithm gives the final output by processing the Reduce function. The enhanced MapReduce concept and proposed optimized algorithm is made to work on Euca2ool (a Cloud tool) to produce an effective and better output when compared with the previous work in the field of Cloud Computing and Big Data

    Life Testing Analysis of Failure Censored Generalized Exponentiated Data

    Get PDF
    A generalized exponential distribution is considered for analyzing lifetime data; such statistical models are applicable when the observations are available in an ordered manner. This study examines failure censored data, which consist of testing n items and terminating the experiment when a pre-assigned number of items, for example r ( \u3c n), have failed. Due to scale and shape parameters, both have flexibility for analyzing different types of lifetime data. This distribution has increasing, decreasing and a constant hazard rate depending on the shape parameter. This study provides maximum likelihood estimation and uniformly minimum variance unbiased techniques for the estimation of reliability of a component. Numerical computation was conducted on a data set and a comparison of the performance of two different techniques is presented
    corecore