609 research outputs found

    Secret message capacity of a line network

    Full text link
    We investigate the problem of information theoretically secure communication in a line network with erasure channels and state feedback. We consider a spectrum of cases for the private randomness that intermediate nodes can generate, ranging from having intermediate nodes generate unlimited private randomness, to having intermediate nodes generate no private randomness, and all cases in between. We characterize the secret message capacity when either only one of the channels is eavesdropped or all of the channels are eavesdropped, and we develop polynomial time algorithms that achieve these capacities. We also give an outer bound for the case where an arbitrary number of channels is eavesdropped. Our work is the first to characterize the secrecy capacity of a network of arbitrary size, with imperfect channels and feedback. As a side result, we derive the secret key and secret message capacity of an one-hop network, when the source has limited randomness

    Corruption: Democracy, Autocracy, and Political Stability

    Get PDF
    The recent empirical literature on corruption has identified a long list of variables that correlate significantly with corruption but only five were distinguished by Leamer’s Extreme Bounds Analysis as robust to various samples, measures of corruption, and regression specifications. Among these five factors that were found to reduce corruption are decades-long tradition of democracy and political stability. In today’s world, however, there are many countries that combine one of these two robust determinants of corruption with the opposite of the other: politically stable autocracies or newly formed and unstable democracies. The central question raised in this paper is: Is it worth, in terms of corruption, for a country to trade stability with autocratic rule for political freedoms but with transitional instability? We find that the answer to this question is in the affirmative - the level of corruption is indeed lower in unstable democracies than in stable dictatorships. Our results are robust to various measures of corruption, alternative regressor indices, and regression specifications.corruption, democracy, autocracy, dictatorship, political stability

    Intellectual Property Protection and Innovation

    Get PDF
    Well-designed and enforceable intellectual property rights (IPRs) provide economic incentives for research and development (R&D). Despite the apparent benefits to the existence of strong IPRs, many countries have a poor record in IPR protection. This paper develops a game-theoretic model of heterogeneous producers and endogenous innovators to analyze the causes and consequences of IPR infringement. Analytical results show that IPR infringement affects pricing and welfare in the market. The optimal IPR protection for the government depends not only on the pricing decision of the innovator, but also on its country size and its conjecture about the policy of other governments. A government can only use IPR protection as a strategic trade policy tool if the innovator can price discriminate.Research and Development/Tech Change/Emerging Technologies,

    LP formulations for secrecy over erasure networks with feedback

    Full text link
    We design polynomial time schemes for secure message transmission over arbitrary networks, in the presence of an eavesdropper, and where each edge corresponds to an erasure channel with public feedback. Our schemes are described through linear programming (LP) formulations, that explicitly select (possibly different) sets of paths for key-generation and message sending. Although our LPs are not always capacity-achieving, they outperform the best known alternatives in the literature, and extend to incorporate several interesting scenaria

    Tensile force measurement by image processing

    Get PDF
    The Sometimes unexpected overloads start up in multi sheave friction drives which could cause the breakage of the wire rope.To analyze the breakage and the overload process a 7 sheaves examiner machine was developed and built. Since the visual measuringprocess provides several good advantages in this machine a spring is used instead of wire rope. At the beginning the distance of threadsand pixels (in the picture) were measured manually. The aim of this paper is to show the automation method of the visual measuringprocess by the Matlab software in the Image Processing Toolbox

    Secret Communication over Broadcast Erasure Channels with State-feedback

    Full text link
    We consider a 1-to-KK communication scenario, where a source transmits private messages to KK receivers through a broadcast erasure channel, and the receivers feed back strictly causally and publicly their channel states after each transmission. We explore the achievable rate region when we require that the message to each receiver remains secret - in the information theoretical sense - from all the other receivers. We characterize the capacity of secure communication in all the cases where the capacity of the 1-to-KK communication scenario without the requirement of security is known. As a special case, we characterize the secret-message capacity of a single receiver point-to-point erasure channel with public state-feedback in the presence of a passive eavesdropper. We find that in all cases where we have an exact characterization, we can achieve the capacity by using linear complexity two-phase schemes: in the first phase we create appropriate secret keys, and in the second phase we use them to encrypt each message. We find that the amount of key we need is smaller than the size of the message, and equal to the amount of encrypted message the potential eavesdroppers jointly collect. Moreover, we prove that a dishonest receiver that provides deceptive feedback cannot diminish the rate experienced by the honest receivers. We also develop a converse proof which reflects the two-phase structure of our achievability scheme. As a side result, our technique leads to a new outer bound proof for the non-secure communication problem

    On the Strong Parity Chromatic Number

    Get PDF
    International audienceA vertex colouring of a 2-connected plane graph G is a strong parity vertex colouring if for every face f and each colour c, the number of vertices incident with f coloured by c is either zero or odd. Czap et al. [Discrete Math. 311 (2011) 512-520] proved that every 2-connected plane graph has a proper strong parity vertex colouring with at most 118 colours. In this paper we improve this upper bound for some classes of plane graphs

    Parity vertex colouring of plane graphs

    Get PDF
    AbstractA proper vertex colouring of a 2-connected plane graph G is a parity vertex colouring if for each face f and each colour c, either no vertex or an odd number of vertices incident with f is coloured with c. The minimum number of colours used in such a colouring of G is denoted by χp(G).In this paper, we prove that χp(G)≤118 for every 2-connected plane graph G
    corecore