The Elusive Present: Hidden Past and Future Dependency and Why We Build Models
Authors:
Pooneh M. Ara,
Ryan G. James,
James P. Crutchfield
Abstract:
Modeling a temporal process as if it is Markovian assumes the present encodes all of the process's history. When this occurs, the present captures all of the dependency between past and future. We recently showed that if one randomly samples in the space of structured processes, this is almost never the case. So, how does the Markov failure come about? That is, how do individual measurements fail…
▽ More
Modeling a temporal process as if it is Markovian assumes the present encodes all of the process's history. When this occurs, the present captures all of the dependency between past and future. We recently showed that if one randomly samples in the space of structured processes, this is almost never the case. So, how does the Markov failure come about? That is, how do individual measurements fail to encode the past? And, how many are needed to capture dependencies between the past and future? Here, we investigate how much information can be shared between the past and future, but not be reflected in the present. We quantify this elusive information, give explicit calculational methods, and draw out the consequences. The most important of which is that when the present hides past-future dependency we must move beyond sequence-based statistics and build state-based models.
△ Less
Submitted 2 July, 2015;
originally announced July 2015.
Secure Data Transmission in Cooperative Modes: Relay and MAC
Authors:
Samah A. M. Ghanem,
Munnujahan Ara
Abstract:
Cooperation in clouds provides a promising technique for 5G wireless networks, supporting higher data rates. Security of data transmission over wireless clouds could put constraints on devices; whether to cooperate or not. Therefore, our aim is to provide analytical framework for the security on the physical layer of such setup and to define the constraints embodied with cooperation in small size…
▽ More
Cooperation in clouds provides a promising technique for 5G wireless networks, supporting higher data rates. Security of data transmission over wireless clouds could put constraints on devices; whether to cooperate or not. Therefore, our aim is to provide analytical framework for the security on the physical layer of such setup and to define the constraints embodied with cooperation in small size wireless clouds. In this paper, two legitimate transmitters Alice and John cooperate to increase the reliable transmission rate received by their common legitimate receiver Bob, where one eavesdropper, Eve exists. We provide the achievable secure data transmission rates with cooperative relaying and when no cooperation exists creating a Multiple Access Channel (MAC). The paper considers the analysis of different cooperative scenarios: a cooperative scenario with two relaying devices, a cooperative scenario without relaying, a non-cooperative scenario, and cooperation from one side. We derive analytical expressions for the optimal power allocation that maximizes the achievable secrecy rates for the different set of scenarios where the implication of cooperation on the achievable secrecy rates was analyzed. We propose a distributed algorithm that allows the devices to select whether to cooperate or not and to choose their optimal power allocation based on the cooperation framework selected. Moreover, we defined distance constraints to enforce the benefits of cooperation between devices in a wireless cloud.
△ Less
Submitted 14 May, 2014;
originally announced May 2014.