116 results
Search Results
2. Source coding with conditionally less noisy side information
- Abstract
We consider a lossless multi-terminal source coding problem with one transmitter, two receivers and side information. The achievable rate region of the problem is not well understood. In this paper, we characterise the rate region when the side information at one receiver is conditionally less noisy than the side information at the other, given this other receiver's desired source. The conditionally less noisy definition includes degraded side information and a common message as special cases, and it is motivated by the concept of less noisy broadcast channels. The key contribution of the paper is a new converse theorem employing a telescoping identity and the Csiszár sum identity., QC 20130219
- Published
- 2012
- Full Text
- View/download PDF
3. Source coding with conditionally less noisy side information
- Abstract
We consider a lossless multi-terminal source coding problem with one transmitter, two receivers and side information. The achievable rate region of the problem is not well understood. In this paper, we characterise the rate region when the side information at one receiver is conditionally less noisy than the side information at the other, given this other receiver's desired source. The conditionally less noisy definition includes degraded side information and a common message as special cases, and it is motivated by the concept of less noisy broadcast channels. The key contribution of the paper is a new converse theorem employing a telescoping identity and the Csiszár sum identity., QC 20130219
- Published
- 2012
- Full Text
- View/download PDF
4. Dynamic decode-and-forward relaying with rate-compatible LDPC convolutional codes
- Abstract
Dynamic decode-and-forward (DDF) is an improved decode-and-forward (DF) protocol under which the relay decides based on its received channel-state information (CSI) when to switch from listening mode to transmission mode without knowing the CSI of other links. In this paper we propose to apply rate-compatible LDPC convolutional (RC-LDPCC) codes to the DDF relay channel. The RC-LDPCC codes are constructed by successive graph extensions, and they have been proved analytically to be capacity achieving over the binary erasure channel. In this paper we show that the RC-LDPCC codes fit well with the DDF relaying, and the regularity of degree distributions simplifies the code optimization. Numerical results in terms of bit erasure rate and achievable rate are provided to evaluate the performance of the system. The results show that the RC-LDPCC codes are able to provide high achievable rates for the DDF relay channel., QC 20120831
- Published
- 2012
- Full Text
- View/download PDF
5. Source coding with conditionally less noisy side information
- Abstract
We consider a lossless multi-terminal source coding problem with one transmitter, two receivers and side information. The achievable rate region of the problem is not well understood. In this paper, we characterise the rate region when the side information at one receiver is conditionally less noisy than the side information at the other, given this other receiver's desired source. The conditionally less noisy definition includes degraded side information and a common message as special cases, and it is motivated by the concept of less noisy broadcast channels. The key contribution of the paper is a new converse theorem employing a telescoping identity and the Csiszár sum identity., QC 20130219
- Published
- 2012
- Full Text
- View/download PDF
6. Source coding with conditionally less noisy side information
- Abstract
We consider a lossless multi-terminal source coding problem with one transmitter, two receivers and side information. The achievable rate region of the problem is not well understood. In this paper, we characterise the rate region when the side information at one receiver is conditionally less noisy than the side information at the other, given this other receiver's desired source. The conditionally less noisy definition includes degraded side information and a common message as special cases, and it is motivated by the concept of less noisy broadcast channels. The key contribution of the paper is a new converse theorem employing a telescoping identity and the Csiszár sum identity., QC 20130219
- Published
- 2012
- Full Text
- View/download PDF
7. Source coding with conditionally less noisy side information
- Abstract
We consider a lossless multi-terminal source coding problem with one transmitter, two receivers and side information. The achievable rate region of the problem is not well understood. In this paper, we characterise the rate region when the side information at one receiver is conditionally less noisy than the side information at the other, given this other receiver's desired source. The conditionally less noisy definition includes degraded side information and a common message as special cases, and it is motivated by the concept of less noisy broadcast channels. The key contribution of the paper is a new converse theorem employing a telescoping identity and the Csiszár sum identity., QC 20130219
- Published
- 2012
- Full Text
- View/download PDF
8. Encoder-controller design for control over the binary-input Gaussian channel
- Abstract
In this paper, we consider the problem of the joint optimization of encoder-controller for closed-loop control with state feedback over a binary-input Gaussian channel (BGC). The objective is to minimize the expected linear quadratic cost over a finite horizon. Thisencoder-controller optimization problem is hard in general, mostly because of the curse of dimensionality. The result of this paper is a synthesis technique for a computationally feasible suboptimal controller which exploits both the soft and hard information of thechannel outputs. The proposed controller is efficient in the sense that it embraces measurement quantization, error protection and control over a finite-input infinite-output noisy channel. How to effectively implement this controller is also addressed in the paper. In particular, this is done by using Hadamard techniques. Numerical experiments are carried out to verify the promising gain offered by the combined controller, in comparison to the hard-information-based controller., QC 20120124
- Published
- 2010
- Full Text
- View/download PDF
9. Privacy-Preserving Energy Flow Control in Smart Grids
- Abstract
In this paper, an energy flow control strategy to reduce the smart meter privacy leakage is studied. The considered smart grid is equipped with an energy storage device. The privacy leakage is modeled as optimal Bayesian detections on the behaviors of the consumer made by an authorized adversary. To evaluate the privacy risk, a Bayesian detection-operational privacy leakage metric is proposed. The design of an optimal privacy-preserving energy control strategy can be formulated as a belief state MDP problem. Therefore, standard methods and algorithms can be utilized to obtain or to approximate the optimal control strategy. A simplified problem to design an instantaneous optimal privacy-preserving control strategy is also considered. It is shown that the problem of the instantaneous optimal control strategy design can be formulated as a set of linear programmings., QC 20160401
- Published
- 2016
- Full Text
- View/download PDF
10. Privacy-Preserving Energy Flow Control in Smart Grids
- Abstract
In this paper, an energy flow control strategy to reduce the smart meter privacy leakage is studied. The considered smart grid is equipped with an energy storage device. The privacy leakage is modeled as optimal Bayesian detections on the behaviors of the consumer made by an authorized adversary. To evaluate the privacy risk, a Bayesian detection-operational privacy leakage metric is proposed. The design of an optimal privacy-preserving energy control strategy can be formulated as a belief state MDP problem. Therefore, standard methods and algorithms can be utilized to obtain or to approximate the optimal control strategy. A simplified problem to design an instantaneous optimal privacy-preserving control strategy is also considered. It is shown that the problem of the instantaneous optimal control strategy design can be formulated as a set of linear programmings., QC 20160401
- Published
- 2016
- Full Text
- View/download PDF
11. Privacy-Preserving Energy Flow Control in Smart Grids
- Abstract
In this paper, an energy flow control strategy to reduce the smart meter privacy leakage is studied. The considered smart grid is equipped with an energy storage device. The privacy leakage is modeled as optimal Bayesian detections on the behaviors of the consumer made by an authorized adversary. To evaluate the privacy risk, a Bayesian detection-operational privacy leakage metric is proposed. The design of an optimal privacy-preserving energy control strategy can be formulated as a belief state MDP problem. Therefore, standard methods and algorithms can be utilized to obtain or to approximate the optimal control strategy. A simplified problem to design an instantaneous optimal privacy-preserving control strategy is also considered. It is shown that the problem of the instantaneous optimal control strategy design can be formulated as a set of linear programmings., QC 20160401
- Published
- 2016
- Full Text
- View/download PDF
12. Privacy-Preserving Energy Flow Control in Smart Grids
- Abstract
In this paper, an energy flow control strategy to reduce the smart meter privacy leakage is studied. The considered smart grid is equipped with an energy storage device. The privacy leakage is modeled as optimal Bayesian detections on the behaviors of the consumer made by an authorized adversary. To evaluate the privacy risk, a Bayesian detection-operational privacy leakage metric is proposed. The design of an optimal privacy-preserving energy control strategy can be formulated as a belief state MDP problem. Therefore, standard methods and algorithms can be utilized to obtain or to approximate the optimal control strategy. A simplified problem to design an instantaneous optimal privacy-preserving control strategy is also considered. It is shown that the problem of the instantaneous optimal control strategy design can be formulated as a set of linear programmings., QC 20160401
- Published
- 2016
- Full Text
- View/download PDF
13. Privacy-Preserving Energy Flow Control in Smart Grids
- Abstract
In this paper, an energy flow control strategy to reduce the smart meter privacy leakage is studied. The considered smart grid is equipped with an energy storage device. The privacy leakage is modeled as optimal Bayesian detections on the behaviors of the consumer made by an authorized adversary. To evaluate the privacy risk, a Bayesian detection-operational privacy leakage metric is proposed. The design of an optimal privacy-preserving energy control strategy can be formulated as a belief state MDP problem. Therefore, standard methods and algorithms can be utilized to obtain or to approximate the optimal control strategy. A simplified problem to design an instantaneous optimal privacy-preserving control strategy is also considered. It is shown that the problem of the instantaneous optimal control strategy design can be formulated as a set of linear programmings., QC 20160401
- Published
- 2016
- Full Text
- View/download PDF
14. Privacy on Hypothesis Testing in Smart Grids
- Abstract
In this paper, we study the problem of privacy information leakage in a smart grid. The privacy risk is assumed to be caused by an unauthorized binary hypothesis testing of the consumer's behaviour based on the smart meter readings of energy supplies from the energy provider. Another energy supplies are produced by an alternative energy source. A controller equipped with an energy storage device manages the energy inflows to satisfy the energy demand of the consumer. We study the optimal energy control strategy which minimizes the asymptotic exponential decay rate of the minimum Type II error probability in the unauthorized hypothesis testing to suppress the privacy risk. Our study shows that the cardinality of the energy supplies from the energy provider for the optimal control strategy is no more than two. This result implies a simple objective of the optimal energy control strategy. When additional side information is available for the adversary, the optimal control strategy and privacy risk are compared with the case of leaking smart meter readings to the adversary only., QC 20160121
- Published
- 2015
- Full Text
- View/download PDF
15. Privacy on Hypothesis Testing in Smart Grids
- Abstract
In this paper, we study the problem of privacy information leakage in a smart grid. The privacy risk is assumed to be caused by an unauthorized binary hypothesis testing of the consumer's behaviour based on the smart meter readings of energy supplies from the energy provider. Another energy supplies are produced by an alternative energy source. A controller equipped with an energy storage device manages the energy inflows to satisfy the energy demand of the consumer. We study the optimal energy control strategy which minimizes the asymptotic exponential decay rate of the minimum Type II error probability in the unauthorized hypothesis testing to suppress the privacy risk. Our study shows that the cardinality of the energy supplies from the energy provider for the optimal control strategy is no more than two. This result implies a simple objective of the optimal energy control strategy. When additional side information is available for the adversary, the optimal control strategy and privacy risk are compared with the case of leaking smart meter readings to the adversary only., QC 20160121
- Published
- 2015
- Full Text
- View/download PDF
16. Privacy on Hypothesis Testing in Smart Grids
- Abstract
In this paper, we study the problem of privacy information leakage in a smart grid. The privacy risk is assumed to be caused by an unauthorized binary hypothesis testing of the consumer's behaviour based on the smart meter readings of energy supplies from the energy provider. Another energy supplies are produced by an alternative energy source. A controller equipped with an energy storage device manages the energy inflows to satisfy the energy demand of the consumer. We study the optimal energy control strategy which minimizes the asymptotic exponential decay rate of the minimum Type II error probability in the unauthorized hypothesis testing to suppress the privacy risk. Our study shows that the cardinality of the energy supplies from the energy provider for the optimal control strategy is no more than two. This result implies a simple objective of the optimal energy control strategy. When additional side information is available for the adversary, the optimal control strategy and privacy risk are compared with the case of leaking smart meter readings to the adversary only., QC 20160121
- Published
- 2015
- Full Text
- View/download PDF
17. Privacy on Hypothesis Testing in Smart Grids
- Abstract
In this paper, we study the problem of privacy information leakage in a smart grid. The privacy risk is assumed to be caused by an unauthorized binary hypothesis testing of the consumer's behaviour based on the smart meter readings of energy supplies from the energy provider. Another energy supplies are produced by an alternative energy source. A controller equipped with an energy storage device manages the energy inflows to satisfy the energy demand of the consumer. We study the optimal energy control strategy which minimizes the asymptotic exponential decay rate of the minimum Type II error probability in the unauthorized hypothesis testing to suppress the privacy risk. Our study shows that the cardinality of the energy supplies from the energy provider for the optimal control strategy is no more than two. This result implies a simple objective of the optimal energy control strategy. When additional side information is available for the adversary, the optimal control strategy and privacy risk are compared with the case of leaking smart meter readings to the adversary only., QC 20160121
- Published
- 2015
- Full Text
- View/download PDF
18. Privacy on Hypothesis Testing in Smart Grids
- Abstract
In this paper, we study the problem of privacy information leakage in a smart grid. The privacy risk is assumed to be caused by an unauthorized binary hypothesis testing of the consumer's behaviour based on the smart meter readings of energy supplies from the energy provider. Another energy supplies are produced by an alternative energy source. A controller equipped with an energy storage device manages the energy inflows to satisfy the energy demand of the consumer. We study the optimal energy control strategy which minimizes the asymptotic exponential decay rate of the minimum Type II error probability in the unauthorized hypothesis testing to suppress the privacy risk. Our study shows that the cardinality of the energy supplies from the energy provider for the optimal control strategy is no more than two. This result implies a simple objective of the optimal energy control strategy. When additional side information is available for the adversary, the optimal control strategy and privacy risk are compared with the case of leaking smart meter readings to the adversary only., QC 20160121
- Published
- 2015
- Full Text
- View/download PDF
19. Secure Successive Refinement with Degraded Side Information
- Abstract
In this paper, we investigate the problem of successive refinement with side information (SI) under secrecy constraint. In particular, under classical successive refinement coding scheme, there are degraded SI sequences Y-n and Z(n) at two decoders and E-n at the eavesdropper. Based on the status of two switches, three different cases are investigated. In case 1 and 3, the eavesdropper only observes output of encoder 1 and 2, respectively, while in case 2, the eavesdropper observes outputs of both encoder 1 and 2. The Markov chain X - Y - (Z, E) holds in all cases. The equivocation is measured by the normalized entropy of source sequence conditioned on the observation of eavesdropper. We completely characterize the rate-distortion-equivocation regions for all three cases, and show that layered coding is optimal. Finally, a binary source example is given., QC 20150227
- Published
- 2014
- Full Text
- View/download PDF
20. Test-Bed Implementation of Iterative Interference Alignment and Power Control for Wireless MIMO Interference Networks
- Abstract
This paper presents for the first time the testbed implementation of an iterative interference alignment and power control algorithm for downlink transmission in a multiple-input multiple-output (MIMO) cellular network. The network is composed of three cells where within each cell one base station (BS) communicates with one mobile station (MS). Each terminal is equipped with two antennas. All the BSs transmit at the same time and the same frequency band. Transmitter beamforming vectors and receiver filtering vectors are computed according to the interference alignment concept, and power control is performed to guarantee successful communication of each BS-MS pair at a desired fixed rate. The indoor measurements performed on an universal software radio peripheral (USRP) based test-bed, show that the power can be reduced by at least 4 dB, 90% of the time, while at the same time reducing the bit-error-rate (BER)., QC 20150227
- Published
- 2014
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.