The information theoretic capacity is considered. In order to account for independent encoding and decoding and private (to the sender and receiver) hopping patterns, an interference channel model is adopted with K sender-receiver pairs with the ith receiver only interested in the message transmitted by the ith sender. Both synchronous and asynchronous hopping patterns are investigated. Although the channel exhibits memory in the latter case, it is possible to compute the capacity region. The asymptotic normalized sum capacity is also computed.< >
Traditional design rules, wherein cells are dimensioned in order to get an equal amount of demand in each cell are not directly applicable to CDMA networks where large cells can cause a lot of interference to adjacent small cells. In order to enable iterative cell placement we use a computationally efficient iterative process to calculate the inter-cell and intra-cell interferences as a function of pilot-signal power and base station location. These techniques enable us to improve the placement of cells in a CDMA network so as to enhance network capacity. We show examples of how networks using this design technique will provide higher capacity than ones designed using conventional techniques.
The paper investigates multichannel switching as a promising alternative to traditional single-channel switching where virtual paths established in a switch are between a single input channel and a single output channel. A particular non-blocking condition is derived for flip networks, which is exploited to realize a multichannel switching architecture that supports an arbitrary number of channel groups. The architecture is internally nonblocking and bufferless. Using one flip network recursively a number of times based on the number of channel groups, the resulting architecture becomes efficient in the sense that the cross point complexity is O(N log/sub 2/ N) for N inputs. Other distinguishing features are the abilities to provide multicasting, superrate switching (i.e., rates that exceed the capacity of a single channel are accommodated), multirate switching (i.e., bit pipes of different rates are supported simultaneously), multiple performance requirements (i.e., services with different performance requirements are treated accordingly), and fair access to all inputs (i.e., no input is systematically discriminated against). In multichannel switching, cells belonging to a single session can traverse multiple channels. Providing the cell sequencing integrity becomes a challenging issue. The architecture proposed in the paper accomplishes the task without employing any cell resequencing mechanism.< >
A simple, exact calculation is presented of the probability distribution of the number of hits in a block of n symbols in a frequency-hopped, spread-spectrum, multiple-access communication system. While the sequence of hits is not Markovian, there is an underlying Markovian structure that allows the probability distribution of the number of hits to be calculated in a recursive fashion. Knowing the probability distribution of the number of hits makes it possible to calculate the probability of error for a system employing error correcting codes for several different types of receivers, including receivers with both errors and erasures. The numerical results show that both the approximation obtained by assuming the actual sequence of hits is Markovian and the approximation obtained by assuming the hits are independent are very good. When the number of frequency slots is not too small (less than five), calculations show that assuming the independence of hits gives an error probability accurate to within 1% of the actual error probability. Assuming the hits are Markovian gives error probabilities which are accurate to within 0.001%.< >
Smart meters have ensured effective end-user energy consumption data management and helping the power companies towards network operation efficiency. However, recent studies highlighted that cyber adversaries may launch attacks on smart meters that can cause data availability, integrity, and confidentiality issues both at the consumer side or at a network operator’s end. Therefore, research on smart meter data security has been attributed as one of the top priorities to ensure the safety and reliability of the critical energy system infrastructure. Authentication is one of the basic building blocks of any secure system. Numerous authentication schemes have been proposed for the smart grid, but most of these methods are applicable for two party communication. In this article, we propose a distributed, dynamic multistage authenticated key agreement scheme for smart meter communication. The proposed scheme provides secure authentication between smart meter, NAN gateway, and SCADA energy center in a distributed manner. Through rigorous cryptanalysis we have proved that the proposed scheme resist replay attack, insider attack, impersonation attack and man-in-the-middle attack. Also, it provides perfect forward secrecy, device anonymity and data confidentiality. The proposed scheme security is formally proved in the CK—model and, using BAN logic, it is proved that the scheme creates a secure session between the communication participants. The proposed scheme is simulated using the AVISPA tool and verified the safety against all active attacks. Further, efficiency analysis of the scheme has been made by considering its computation, communication, and functional costs. The computed results are compared with other related schemes. From these analysis results, it is proved that the proposed scheme is robust and secure when compared to other schemes.
Cloud computing is an emerging technology in modern society. In recent years mobile users and cloud service providers are increased rapidly. In the cloud or any other distributed environment, if the users increased then security risks also increase parallelly. Many security problems are still unclear even after the advanced security measures have been taken. Security of stored data in the server is one of the most challenging issues in the cloud-based environment. Only authorized users should access the stored data of the server. Authentication plays a significant role in providing authorization. Therefore, in cloud computing, authentication is the primary measure to protect the data and the server from an unauthorized user. In this paper, an efficient authentication scheme using the smart card in the cloud environment is proposed. In the proposed scheme, with the help of a single private key, the user can access many cloud services. Also, the proposed scheme resists all security attacks. Through the simulation using the AVISPA tool, it is proved that the proposed scheme is robust and suitable for practical implementation.
This paper presents a novel approach for designing a call-admission control (CAC) algorithm for code-division multiple-access (CDMA) networks with arbitrary call-arrival rates. The design of the CAC algorithm uses global information; it incorporates the call-arrival rates and the user mobilities across the network and guarantees the users' quality of service (QoS) as well as prespecified blocking probabilities. On the other hand, its implementation in each cell uses local information; it only requires the number of calls currently active in that cell. We present several cases for a nontrivial network topology where our CAC algorithm guarantees QoS and blocking probabilities while achieving significantly higher throughput than that achieved by traditional techniques. We also calculate the network capacity, i.e., the maximum throughput for the entire network, for prespecified blocking probabilities and QoS requirements.
Despite tremendous progress in automatic summarization, state-of-the-art methods are predominantly trained to excel in summarizing short newswire articles, or documents with strong layout biases such as scientific articles or government reports. Efficient techniques to summarize financial documents, including facts and figures, have largely been unexplored, majorly due to the unavailability of suitable datasets. In this work, we present ECTSum, a new dataset with transcripts of earnings calls (ECTs), hosted by publicly traded companies, as documents, and short experts-written telegram-style bullet point summaries derived from corresponding Reuters articles. ECTs are long unstructured documents without any prescribed length limit or format. We benchmark our dataset with state-of-the-art summarizers across various metrics evaluating the content quality and factual consistency of the generated summaries. Finally, we present a simple-yet-effective approach, ECT-BPS, to generate a set of bullet points that precisely capture the important facts discussed in the calls.