Filters








36,237 Hits in 5.5 sec

Quasi-concave optimization of secrecy redundancy rate in HARQ-CC system

Yue Wu, Shishu Yin, Jian Zhou, Pei Yang, Hongwen Yang
2020 Science China Information Sciences  
with chase combining (HARQ-CC) system, we analyze physical layer secure performance and determine the secrecy redundancy rate by proposed quasi-concave optimization methods with effective secrecy throughput  ...  rate for improved security.  ...  This metric can be applied to evaluate secure performance more comprehensively and adapt the transmission rate or secrecy redundancy rate to enhance the performance.  ... 
doi:10.1007/s11432-019-2660-3 fatcat:n5fjkrrptvanzk6qsgj3kgpwda

Research on Security Assessment Index System for Operating Reserve in Large Interconnected Power Grid

Mingsong Liu, Huadong Sun, Jian He, Hengxu Zhang, Jun Yi, Jian Zhang
2013 Energy and Power Engineering  
Thirdly, optimization model, deterministic and probabilistic optimization methods for quasi-steady state operating reserve are explored.  ...  Optimization and placement of spinning reserve is an important issue in power system planning and operation. Systematic way for security assessment of operating reserve needs to study.  ...  Optimization of quasi-steady state operating reserve is a problem of optimal power flow with several constraints, as shown in (1) .     min =0 . .  ... 
doi:10.4236/epe.2013.54b151 fatcat:lts4fcvymjhy5kcqbssn6n3ui4

Joint 3D Maneuver and Power Adaptation for Secure UAV Communication with CoMP Reception [article]

Jianping Yao, Jie Xu
2019 arXiv   pre-print
First, we consider the quasi-stationary UAV scenario, where we jointly optimize the UAV's 3D placement and transmit power control to maximize the secrecy rate.  ...  Under this setup, we exploit the UAV's maneuver in three dimensional (3D) space together with transmit power adaptation for optimizing the secrecy communication performance.  ...  power adaptation, to facilitate the secure UAV communication.  ... 
arXiv:2001.00481v1 fatcat:rwghaqhg6rgsxjugr5tmoyjp4a

Adaptive Secure Transmission Strategy for Industrial Wireless Edge-Enabled CPS

Huanhuan Song, Hong Wen, Qicong Yang, Jie Tang, Yi Chen, Tengyue Zhang, Feiyi Xie, Songlin Chen
2021 IEEE Access  
According to changes in the communication environment, the proposed scheme adaptively obtains the corresponding optimal power allocations and wiretap code rates.  ...  The optimal power allocation for minimizing the SOP is derived through the efficient alternating optimization algorithm with numerical methods.  ...  It is observed that the security performance of the proposed adaptive security scheme coincides well with that of the secure scheme P2 which only focuses on secure transmission.  ... 
doi:10.1109/access.2021.3058603 fatcat:2btthl6r4vdjln5dhdz5iuzxhu

Rethinking the Secrecy Outage Formulation: A Secure Transmission Design Perspective

Xiangyun Zhou, Matthew R. McKay, Behrouz Maham, Are Hjorungnes
2011 IEEE Communications Letters  
This letter studies information-theoretic security without knowing the eavesdropper's channel fading state.  ...  Using this formulation, we design two transmission schemes that satisfy the given security requirement while achieving good throughput performance.  ...  Non-Adaptive Encoder with On-Off Transmission Now we consider the transmission design with a nonadaptive encoder in which the rate of the codewords, , is constant over time (but needs to be optimally chosen  ... 
doi:10.1109/lcomm.2011.011811.102433 fatcat:uskclyatcnhira7mickm6sqara

Secure On-Off Transmission Design With Channel Estimation Errors

Biao He, Xiangyun Zhou
2013 IEEE Transactions on Information Forensics and Security  
When the encoding rates are controllable parameters to design, we further derive both a non-adaptive and an adaptive rate transmission schemes by jointly optimizing the encoding rates and the on-off transmission  ...  For systems with given and fixed encoding rates, we show how the optimal onoff transmission thresholds and the achievable throughput vary with the amount of knowledge on the eavesdropper's channel.  ...  For systems with encoding rates controllable, we derived both non-adaptive and adaptive rate transmission schemes which jointly optimize the rate parameters and the on-off thresholds.  ... 
doi:10.1109/tifs.2013.2284754 fatcat:v3duop4kuzeanmne5tbkqwcl7e

Secure On-Off Transmission Design with Channel Estimation Errors [article]

Biao He, Xiangyun Zhou
2013 arXiv   pre-print
When the encoding rates are controllable parameters to design, we further derive both a non-adaptive and an adaptive rate transmission schemes by jointly optimizing the encoding rates and the on-off transmission  ...  For systems with given and fixed encoding rates, we show how the optimal on-off transmission thresholds and the achievable throughput vary with the amount of knowledge on the eavesdropper's channel.  ...  For systems with encoding rates controllable, we derived both non-adaptive and adaptive rate transmission schemes which jointly optimize the rate parameters and the on-off thresholds.  ... 
arXiv:1304.6485v2 fatcat:3dmlhmwf25b73adfk7yvzgvc2y

General equilibrium pricing with information asymmetry

Yuzhong Zhang, Fangfei Dong
2015 Frontiers in Applied Mathematics and Statistics  
Our model shows that in a so-called quasi-complete market, agents with differential information can reach an agreement on an universal equilibrium price.  ...  We propose a general equilibrium model for asset pricing that incorporates asymmetric information as the key element determining security prices.  ...  Security Prices The security price at time t is denoted by S(t) = (S 1 (t), ..., S m (t)). (S(t)) is adapted to F.  ... 
doi:10.3389/fams.2015.00008 fatcat:2w526fpegbg2pa2gfn4tuvly2y

Optimization of the Investment Portfolio in the Environment of Table Processor MS Excel

Oksana Hordei, Bohdan Patsai, Viktoriya Hurochkina, Oksana Ovdiienko, Rafael Mishchenko
2021 Estudios de Economía Aplicada  
As a result, the investment portfolio's direct and inverse optimization problems were solved using the quasi-Sharpe model.  ...  Also, a significant part of these tasks is associated with optimization, and therefore the use of information technology is essential.  ...  stage of development of the stock market of Ukraine, when optimizing the securities portfolio, you can use the Quasi-Sharp model. non-risky rate.  ... 
doi:10.25115/eea.v39i5.4983 fatcat:4hh4ljjnxbdjpjo4ufzvg5wuoa

Special issue of the Euromicro Conference on Real-Time Systems (ECRTS)

Rolf Ernst
2016 Real-time systems  
Out of the 114 submissions with authors from 25 countries, the program committee selected 27 papers for presentation.  ...  Out of these papers, 4 top rated papers were selected and invited to submit an extended paper to this special Issue.  ...  It assumes a system of tasks with mixed security levels where higher security tasks should be guarded against tasks with a lower security level which shall not be trusted.  ... 
doi:10.1007/s11241-016-9249-0 fatcat:x73bjks4m5azvpg5khasmdwbcq

Wireless Information-Theoretic Security - Part II: Practical Implementation [article]

Matthieu Bloch, Joao Barros, Miguel R. D. Rodrigues, Steven W. McLaughlin
2006 arXiv   pre-print
Finally, we develop new metrics for assessing average secure key generation rates and show that our protocol is effective in secure key renewal.  ...  capacity with perfect and imperfect channel state information.  ...  In fact it only represents Alice's targeted secure communication rate, which might be different from the true secure communication rate.  ... 
arXiv:cs/0611121v1 fatcat:2gwzchjtoza77hcva3txd7wqye

A Secure Crypto based ECG Data Communication using Modified SPHIT and Modified Quasigroup Encryption

S. Sujatha, R. Govindaraju
2013 International Journal of Computer Applications  
Modified quasi group encryption which uses genetic algorithm for optimization is used in this approach for improving the Quasigroup performance.  ...  The optimization based approach provides the optimized Quasigroup for encryption which gives better security for the ECG data.  ...  The two rate unequal error protection is used for saving energy in this security scheme.  ... 
doi:10.5120/13494-1217 fatcat:qoc3fxci3bajtdwyxo3ihhd7em

Table of contents

2019 IEEE Transactions on Communications  
Wang, and L.Hanzo 2260 Artificial-Noise-Aided Nonlinear Secure Transmission for Multiuser Multi-Antenna Systems With Finite-Rate Feedback ...............................................................  ...  Debbah 1894 Two Constructions of Asymptotically Optimal Quasi-Complementary Sequence Sets ..................................... .........................................................................  ... 
doi:10.1109/tcomm.2019.2897183 fatcat:lzbqxlv4srhzpdrrltonxno5oi

Filtration of UAV Movement Parameters Based on the Received Signal Strength Measurement Sensor Networks in the Presence of Anomalous Measurements of Unknown Power at the Transmitter

Igor Olegovych Tovkach, Serhii Yakovych Zhuk
2021 Journal of Aerospace Technology and Management  
The quasi-optimal adaptive filtering algorithm detects the appearance of anomalous measurements with probabilities close to unity and allows one to eliminate their influence on the accuracy of UAV movement  ...  The optimum and quasi-optimal adaptive algorithms of UAV movement parameters filtration based on the RSS-measurement sensor networks in the presence of anomalous measurements at the unknown power of the  ...  This allows to obtain a quasi-optimal device with a number of channels equal to two.  ... 
doi:10.1590/jatm.v13.1191 fatcat:4lvdr52g6jhujjdel6qvkcypt4

A Learnable Anomaly Detection System using Attributional Rules

Abdurrahman A. Nasr, Mohamed M. Ezz, Mohamed Z. Abdulmaged
2016 International Journal of Computer Network and Information Security  
Such technique makes use of the Algorithm Quasi-optimal (AQ) which is based on attributional calculus.  ...  Here, an Algorithm Quasi-optimal for Intrusion Detection System (AQ4IDS) is exploited and implemented using attributional rules to discriminate between normal and anomalous network traffic.  ...  Algorithm quasi-optimal (AQ) [4] , is a natural rule induction algorithm based on attributional rules.  ... 
doi:10.5815/ijcnis.2016.11.07 fatcat:l5kpbp4gjfbixc2khknadau654
« Previous Showing results 1 — 15 out of 36,237 results