41 resultados para context-aware access control


Relevância:

30.00% 30.00%

Publicador:

Resumo:

We consider the problem of distributed joint source-channel coding of correlated Gaussian sources over a Gaussian Multiple Access Channel (MAC). There may be side information at the encoders and/or at the decoder. First we specialize a general result in [16] to obtain sufficient conditions for reliable transmission over a Gaussian MAC. This system does not satisfy the source channel separation. Thus, next we study and compare three joint source channel coding schemes available in literature.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Opportunistic selection is a practically appealing technique that is used in multi-node wireless systems to maximize throughput, implement proportional fairness, etc. However, selection is challenging since the information about a node's channel gains is often available only locally at each node and not centrally. We propose a novel multiple access-based distributed selection scheme that generalizes the best features of the timer scheme, which requires minimal feedback but does not always guarantee successful selection, and the fast splitting scheme, which requires more feedback but guarantees successful selection. The proposed scheme's design explicitly accounts for feedback time overheads unlike the conventional splitting scheme and guarantees selection of the user with the highest metric unlike the timer scheme. We analyze and minimize the average time including feedback required by the scheme to select. With feedback overheads, the proposed scheme is scalable and considerably faster than several schemes proposed in the literature. Furthermore, the gains increase as the feedback overhead increases.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We provide new analytical results concerning the spread of information or influence under the linear threshold social network model introduced by Kempe et al. in, in the information dissemination context. The seeder starts by providing the message to a set of initial nodes and is interested in maximizing the number of nodes that will receive the message ultimately. A node's decision to forward the message depends on the set of nodes from which it has received the message. Under the linear threshold model, the decision to forward the information depends on the comparison of the total influence of the nodes from which a node has received the packet with its own threshold of influence. We derive analytical expressions for the expected number of nodes that receive the message ultimately, as a function of the initial set of nodes, for a generic network. We show that the problem can be recast in the framework of Markov chains. We then use the analytical expression to gain insights into information dissemination in some simple network topologies such as the star, ring, mesh and on acyclic graphs. We also derive the optimal initial set in the above networks, and also hint at general heuristics for picking a good initial set.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Our ability to regulate behavior based on past experience has thus far been examined using single movements. However, natural behavior typically involves a sequence of movements. Here, we examined the effect of previous trial type on the concurrent planning of sequential saccades using a unique paradigm. The task consisted of two trial types: no-shift trials, which implicitly encouraged the concurrent preparation of the second saccade in a subsequent trial; and target-shift trials, which implicitly discouraged the same in the next trial. Using the intersaccadic interval as an index of concurrent planning, we found evidence for context-based preparation of sequential saccades. We also used functional MRI-guided, single-pulse, transcranial magnetic stimulation on human subjects to test the role of the supplementary eye field (SEF) in the proactive control of sequential eye movements. Results showed that (i) stimulating the SEF in the previous trial disrupted the previous trial type-based preparation of the second saccade in the nonstimulated current trial, (ii) stimulating the SEF in the current trial rectified the disruptive effect caused by stimulation in the previous trial, and (iii) stimulating the SEF facilitated the preparation of second saccades based on previous trial type even when the previous trial was not stimulated. Taken together, we show how the human SEF is causally involved in proactive preparation of sequential saccades.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The rapid development of communication and networking has lessened geographical boundaries among actors in social networks. In social networks, actors often want to access databases depending upon their access rights, privacy, context, privileges, etc. Managing and handling knowledge based access of actors is complex and hard for which broad range of technologies need to be called. Access based on dynamic access rights and circumstances of actors impose major tasks on access systems. In this paper, we present an Access Mechanism for Social Networks (AMSN) to render access to actors over databases taking privacy and status of actors into consideration. The designed AMSN model is tested over an Agriculture Social Network (ASN) which utilises distinct access rights and privileges of actors related to the agriculture occupation, and provides access to actors over databases.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper presents the design and implementation of a reorientable scanning probe that is capable of two-axis force sensing and control in the 2-D scanning (X-Z) plane. The probe is comprised of three major components, namely a compliant manipulator, laser measurement system, and magnetic actuation system. Control of the position and orientation of the probe tip is realized by means of magnetic actuation combined with a novel structural design. The design of the manipulator's compliance and that of the optical path of the laser measurement system together enable achieving sensitivity to lateral (X) forces that is nearly identical to that of normal (Z) forces. The achieved sensitivity ratio, of about 0.6, is significantly higher than that of conventional scanning probe systems. The theoretical bases for the structural design and the sensitivity of the two-axis force sensing system are presented. Subsequently, fabrication of the manipulator is described and the result of experimental evaluation of the scanning probe's features is discussed. The scanning probe is used to access the vertical and re-entrant features on the two sides of a cylindrical micropipette, which are subsequently scanned by regulating the lateral force of tip-sample interaction.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Tumor-suppressor protein p53, the `guardian of the genome', is critical in maintaining cellular homeostasis and genomic stability. Earlier, we have reported the discovery of internal ribosome entry sites (IRESs) within the p53 mRNA that regulate the translation of the full length and its N-terminal-truncated isoform, Delta N-p53. Polypyrimidine tract-binding protein (PTB) is an IRES trans-acting factor that positively regulates the IRES activities of both p53 isoforms by relocating from nucleus to the cytoplasm during stress conditions. Here we have demonstrated the putative contact points of PTB on the p53 IRES RNA. Studies on mutations that occur naturally in the 5' untranslated region (5' UTR) in p53 mRNA were lacking. We have investigated a naturally occurring C-to-T single-nucleotide polymorphism (SNP) first reported in human melanoma tumors. This SNP is at position 119 in the 5' UTR of p53 mRNA and we demonstrate that it has consequences on the translational control of p53. Introduction of this SNP has led to decrease in cap-independent translation from p53 5' UTR in bicistronic reporter assay. Further, the effects of this SNP on cap-independent translation have been studied in the context of p53 cDNA as well. Interestingly, the 5' UTR with this SNP has shown reduced binding to PTB that can be corroborated to its weaker IRES activity. Previously, it has been shown that G2-M checkpoint, DNA-damaging stress and oncogenic insult favor IRES-mediated translation. Under similar conditions, we demonstrate that this SNP interferes with the enhancement of the IRES activity of the 5' UTR. Taken together, the results demonstrate for the first time that SNP in the 5' UTR of the p53 mRNA might have a role in translational control of this critical tumor-suppressor gene.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We consider the problem of joint routing, scheduling and power control in a multihop wireless network when the nodes have multiple antennas. We focus on exploiting the multiple degrees-of-freedom available at each transmitter and receiver due to multiple antennas. Specifically we use multiple antennas at each node to form multiple access and broadcast links in the network rather than just point to point links. We show that such a generic transmission model improves the system performance significantly. Since the complexity of the resulting optimization problem is very high, we also develop efficient suboptimal solutions for joint routing, scheduling and power control in this setup.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We consider a two user fading Multiple Access Channel with a wire-tapper (MAC-WT) where the transmitter has the channel state information (CSI) to the intended receiver but not to the eavesdropper (eve). We provide an achievable secrecy sum-rate with optimal power control. We next provide a secrecy sum-rate with optimal power control and cooperative jamming (CJ). We then study an achievable secrecy sum rate by employing an ON/OFF power control scheme which is more easily computable. We also employ CJ over this power control scheme. Results show that CJ boosts the secrecy sum-rate significantly even if we do not know the CSI of the eve's channel. At high SNR, the secrecy sum-rate (with CJ) without CSI of the eve exceeds the secrecy sum-rate (without CJ) with full CSI of the eve.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Terminal impact angle control is crucial for enhancement of warhead effectiveness. In the literature, this problem has been addressed in the context of targets with lower speeds than the interceptor. However, in the current defence scenario, targets of much higher speed than the interceptor is a reality. This paper presents a generic proportional navigation (PN) based guidance law, that uses the standard PN and novel Retro-PN guidance laws based on the initial engagement geometry and terminal engagement requirements, for three dimensional engagement scenario against higher speed nonmaneuvering targets to control terminal impact angle. Results are obtained on the set of achievable impact angles and conditions on the navigation constant to achieve them. Simulation results are given to support the theoretical findings.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

An abundance of spectrum access and sensing algorithms are available in the dynamic spectrum access (DSA) and cognitive radio (CR) literature. Often, however, the functionality and performance of such algorithms are validated against theoretical calculations using only simulations. Both the theoretical calculations and simulations come with their attendant sets of assumptions. For instance, designers of dynamic spectrum access algorithms often take spectrum sensing and rendezvous mechanisms between transmitter-receiver pairs for granted. Test bed designers, on the other hand, either customize so much of their design that it becomes difficult to replicate using commercial off the shelf (COTS) components or restrict themselves to simulation, emulation /hardware-in-Ioop (HIL), or pure hardware but not all three. Implementation studies on test beds sophisticated enough to combine the three aforementioned aspects, but at the same time can also be put together using COTS hardware and software packages are rare. In this paper we describe i) the implementation of a hybrid test bed using a previously proposed hardware agnostic system architecture ii) the implementation of DSA on this test bed, and iii) the realistic hardware and software-constrained performance of DSA. Snapshot energy detector (ED) and Cumulative Summation (CUSUM), a sequential change detection algorithm, are available for spectrum sensing and a two-way handshake mechanism in a dedicated control channel facilitates transmitter-receiver rendezvous.