805 research outputs found

    The Private Key Capacity of a Cooperative Pairwise-Independent Network

    Full text link
    This paper studies the private key generation of a cooperative pairwise-independent network (PIN) with M+2 terminals (Alice, Bob and M relays), M >= 2. In this PIN, the correlated sources observed by every pair of terminals are independent of those sources observed by any other pair of terminal. All the terminals can communicate with each other over a public channel which is also observed by Eve noiselessly. The objective is to generate a private key between Alice and Bob under the help of the M relays; such a private key needs to be protected not only from Eve but also from individual relays simultaneously. The private key capacity of this PIN model is established, whose lower bound is obtained by proposing a novel random binning (RB) based key generation algorithm, and the upper bound is obtained based on the construction of M enhanced source models. The two bounds are shown to be exactly the same. Then, we consider a cooperative wireless network and use the estimates of fading channels to generate private keys. It has been shown that the proposed RB-based algorithm can achieve a multiplexing gain M-1, an improvement in comparison with the existing XOR- based algorithm whose achievable multiplexing gain is about [M]/2.Comment: 5 pages, 3 figures, IEEE ISIT 2015 (to appear

    Effectiveness and chemical pest control of Bt-cotton in the Yangtze River Valley, China

    Get PDF
    The sustainability of Bt-cotton in China, at least along Yellow River Valley, has been questioned, so this paper examines its effectiveness along Yangtze River Valley, where Bt-cotton is also widely sown, to determine what might be the factors beneath the limited or reduced effectiveness being observed. The analysis is based on the data collected for several years from many locations in the Yangtze River Valley Varietal Experiment Network to provide information on the varieties and their agronomic performance, on the control of their GM characteristic, on the expression of the Bt-gene and on chemical control practices against cotton pests.All varieties declared to be Bt-cotton were confirmed to have the Bt-gene, the expression of which was assessed in three ways: through the analysis of Bt-protein production and through indoor and outdoor bioassays. Gene expression varied substantially between varieties and between years for the few varieties which were tested in two subsequent years.The Bt-cotton varieties being sown cannot control bollworms totally even early in the growing season, so surviving larvae could inevitably be observed, and this led farmers (or professionals in charge of supplying technical assistance to farmers) to spray chemicals regardless of the real infestation level. This demonstrates behaviour aimed at eradication of the pests as bollworms seem to be treated chemically more often than is required and far earlier than necessary on the first two generations of H. armigera. The chemical control of the Bt-cotton in Yangtze River Valley hence is not optimal, thus farmers are paying high prices for varieties which are not totally resistant to bollworms and pest control costs are not reduced to the extent that they might expect, lowering the profitability of cotton production. Also chemical protection costs are not decreasing as those pests unaffected by the Bt-gene, mainly but not exclusively sucking ones are requiring more control. This is illustrative of a phenomenon of pest complex shift which deserves more attention in following up the Bt-cotton use.China; Bt; cotton; gene expression; chemical control; effectiveness

    Unipolar Resistance Switching in Amorphous High-k dielectrics Based on Correlated Barrier Hopping Theory

    Full text link
    We have proposed a kind of nonvolatile resistive switching memory based on amorphous LaLuO3, which has already been established as a promising candidate of high-k gate dielectric employed in transistors. Well-developed unipolar switching behaviors in amorphous LaLuO3 make it suited for not only logic but memory applications using the conventional semiconductor or the emerging nano/CMOS architectures. The conduction transition between high- and low- resistance states is attributed to the change in the separation between oxygen vacancy sites in the light of the correlated barrier hopping theory. The mean migration distances of vacancies responsible for the resistive switching are demonstrated in nanoscale, which could account for the ultrafast programming speed of 6 ns. The origin of the distributions in switching parameters in oxides can be well understood according to the switching principle. Furthermore, an approach has also been developed to make the operation voltages predictable for the practical applications of resistive memories.Comment: 18 pages, 6 figure

    Exploiting Rich Syntactic Information for Semantic Parsing with Graph-to-Sequence Model

    Full text link
    Existing neural semantic parsers mainly utilize a sequence encoder, i.e., a sequential LSTM, to extract word order features while neglecting other valuable syntactic information such as dependency graph or constituent trees. In this paper, we first propose to use the \textit{syntactic graph} to represent three types of syntactic information, i.e., word order, dependency and constituency features. We further employ a graph-to-sequence model to encode the syntactic graph and decode a logical form. Experimental results on benchmark datasets show that our model is comparable to the state-of-the-art on Jobs640, ATIS and Geo880. Experimental results on adversarial examples demonstrate the robustness of the model is also improved by encoding more syntactic information.Comment: EMNLP'1
    • …
    corecore