9,780 research outputs found

    Machine Learning and Location Verification in Vehicular Networks

    Full text link
    Location information will play a very important role in emerging wireless networks such as Intelligent Transportation Systems, 5G, and the Internet of Things. However, wrong location information can result in poor network outcomes. It is therefore critical to verify all location information before further utilization in any network operation. In recent years, a number of information-theoretic Location Verification Systems (LVSs) have been formulated in attempts to optimally verify the location information supplied by network users. Such LVSs, however, are somewhat limited since they rely on knowledge of a number of channel parameters for their operation. To overcome such limitations, in this work we introduce a Machine Learning based LVS (ML-LVS). This new form of LVS can adapt itself to changing environments without knowing the channel parameters. Here, for the first time, we use real-world data to show how our ML-LVS can outperform information-theoretic LVSs. We demonstrate this improved performance within the context of vehicular networks using Received Signal Strength (RSS) measurements at multiple verifying base stations. We also demonstrate the validity of the ML-LVS even in scenarios where a sophisticated adversary optimizes her attack location.Comment: 5 pages, 3 figure

    When Does Learning in Games Generate Convergence to Nash Equilibria? The Role of Supermodularity in an Experimental Setting

    Get PDF
    This study clarifies the conditions under which learning in games produces convergence to Nash equilibria in practice. Previous work has identified theoretical conditions under which various stylized learning processes achieve convergence. One technical condition is supermodularity, which is closely related to the more familiar concept of strategic complementarities. We experimentally investigate the role of supermodularity in achieving convergence through learning. Using a game from the literature on solutions to externalities, we systematically vary a free parameter below, close to, at and beyond the threshold of supermodularity to assess its effects on convergence. We find that supermodular and ¡°near-supermodular¡± games converge significantly better than those far below the threshold. From a little below the threshold to the threshold, the improvement is statistically insignificant. Within the class of supermodular games, increasing the parameter far beyond the threshold does not significantly improve convergence. Simulation shows that while most experimental results persist in the long run, some become more pronounced.learning, supermodular games

    Twist operators in higher dimensions

    Full text link
    We study twist operators in higher dimensional CFT's. In particular, we express their conformal dimension in terms of the energy density for the CFT in a particular thermal ensemble. We construct an expansion of the conformal dimension in power series around n=1, with n being replica parameter. We show that the coefficients in this expansion are determined by higher point correlations of the energy-momentum tensor. In particular, the first and second terms, i.e. the first and second derivatives of the scaling dimension, have a simple universal form. We test these results using holography and free field theory computations, finding agreement in both cases. We also consider the `operator product expansion' of spherical twist operators and finally, we examine the behaviour of correlators of twist operators with other operators in the limit n ->1.Comment: 44 pages, 2 figure

    Efficient Synthesis of Narrowly Dispersed Brush Polymers via Living Ring-Opening Metathesis Polymerization of Macromonomers

    Get PDF
    Various macromonomers (MMs) were efficiently synthesized through the copper-catalyzed “click” coupling of a norbornene moiety to the chain end of poly(methylacrylate), poly(t-butylacrylate), and polystyrene that were prepared using atom transfer radical polymerization. Ring-opening metathesis polymerization (ROMP) of these MMs was carried out using the highly active, fast-initiating ruthenium catalyst (H_2IMes)(pyr)_2(Cl)_2RuCHPh in THF at room temperature. ROMP of MMs was found to be living with almost quantitative conversions (>90%) of MMs, producing brush polymers with very low polydispersity indices of 1.01−1.07 and high Mn’s of 200−2600 kDa. The efficient ROMP of such MMs provides facile access to a variety of brush polymers and overcomes previous difficulties in the controlled polymerization of MMs. Atomic force microscopy of the brush polymer products revealed extended, wormlike shapes as a result of significant steric repulsion of densely grafted side chains

    Multi-Objective Optimization for Power Efficient Full-Duplex Wireless Communication Systems

    Full text link
    In this paper, we investigate power efficient resource allocation algorithm design for multiuser wireless communication systems employing a full-duplex (FD) radio base station for serving multiple half-duplex (HD) downlink and uplink users simultaneously. We propose a multi-objective optimization framework for achieving two conflicting yet desirable system design objectives, i.e., total downlink transmit power minimization and total uplink transmit power minimization, while guaranteeing the quality-of-service of all users. To this end, the weighted Tchebycheff method is adopted to formulate a multi-objective optimization problem (MOOP). Although the considered MOOP is non-convex, we solve it optimally by semidefinite programming relaxation. Simulation results not only unveil the trade-off between the total downlink and the total uplink transmit power, but also confirm that the proposed FD system provides substantial power savings over traditional HD systems.Comment: Accepted for presentation at the IEEE Globecom 2015, San Diego, CA, USA, Dec. 201

    Application of machine learning to short-term equity return prediction

    Get PDF
    Cooper showed how a filter method could be used to predict equity returns for the next week by using information about returns and volume for the two previous weeks. Cooper's method may be regarded as a crude method of Machine Learning. Over the last 20 years Machine Learning has been successfully applied to the modeling of large data sets, often containing a lot of noise, in many different fields. When applying the technique it is important to fit it to the specific problem under consideration. We have designed and applied to Cooper's problem a practical new method of Machine Learning, appropriate to the problem, that is based on a modification of the well-known kernel regression method. We call it the Prototype Kernel Regression method (PKR). In both the period 1978-1993 studied by Cooper, and the period 1994-2004, the PKR method leads to a clear profit improvement compared to Cooper's approach. In all of 48 different cases studied, the period pre-cost average return is larger for the PKR method than Cooper's method, on average 37% higher, and that margin would increase as costs were taken into account. Our method aims to minimize the danger of data snooping, and it could plausibly have been applied in 1994 or earlier. There may be a lesson here for proponents of the Efficient Market Hypothesis in the form that states that profitable prediction of equity returns is impossible except by chance. It is not enough for them to show that the profits from an anomaly-based trading scheme disappear after costs. The proponents should also consider what would have been plausible applications of more sophisticated Machine Learning techniques before dismissing evidence against the EMH.

    Power Efficient and Secure Full-Duplex Wireless Communication Systems

    Full text link
    In this paper, we study resource allocation for a full-duplex (FD) radio base station serving multiple half-duplex (HD) downlink and uplink users simultaneously. The considered resource allocation algorithm design is formulated as a non-convex optimization problem taking into account minimum required receive signal-to-interference-plus-noise ratios (SINRs) for downlink and uplink communication and maximum tolerable SINRs at potential eavesdroppers. The proposed optimization framework enables secure downlink and uplink communication via artificial noise generation in the downlink for interfering the potential eavesdroppers. We minimize the weighted sum of the total downlink and uplink transmit power by jointly optimizing the downlink beamformer, the artificial noise covariance matrix, and the uplink transmit power. We adopt a semidefinite programming (SDP) relaxation approach to obtain a tractable solution for the considered problem. The tightness of the SDP relaxation is revealed by examining a sufficient condition for the global optimality of the solution. Simulation results demonstrate the excellent performance achieved by the proposed scheme and the significant transmit power savings enabled optimization of the artificial noise covariance matrix.Comment: 6 pages, invited paper, IEEE Conference on Communications and Network Security (CNS) 2015 in Florence, Italy, on September 30, 201
    corecore