371 research outputs found

    Rateless codes-based secure communication employing transmit antenna selection and harvest-to-jam under joint effect of interference and hardware impairments

    Get PDF
    In this paper, we propose a rateless codes-based communication protocol to provide security for wireless systems. In the proposed protocol, a source uses the transmit antenna selection (TAS) technique to transmit Fountain-encoded packets to a destination in presence of an eavesdropper. Moreover, a cooperative jammer node harvests energy from radio frequency (RF) signals of the source and the interference sources to generate jamming noises on the eavesdropper. The data transmission terminates as soon as the destination can receive a sufficient number of the encoded packets for decoding the original data of the source. To obtain secure communication, the destination must receive sufficient encoded packets before the eavesdropper. The combination of the TAS and harvest-to-jam techniques obtains the security and efficient energy via reducing the number of the data transmission, increasing the quality of the data channel, decreasing the quality of the eavesdropping channel, and supporting the energy for the jammer. The main contribution of this paper is to derive exact closed-form expressions of outage probability (OP), probability of successful and secure communication (SS), intercept probability (IP) and average number of time slots used by the source over Rayleigh fading channel under the joint impact of co-channel interference and hardware impairments. Then, Monte Carlo simulations are presented to verify the theoretical results.Web of Science217art. no. 70

    Healthcare resource use and costs of severe, uncontrolled eosinophilic asthma in the UK general population

    Get PDF
    Acknowledgments The authors thank Derek Skinner (Cambridge Research Support Ltd, Oakington, Cambridge, UK) for assistance with data extraction.Peer reviewedPublisher PD

    Energy harvesting-based spectrum access with incremental cooperation, relay selection and hardware noises

    Get PDF
    In this paper, we propose an energy harvesting (EH)-based spectrum access model in cognitive radio (CR) network. In the proposed scheme, one of available secondary transmitters (STs) helps a primary transmitter (PT) forward primary signals to a primary receiver (PR). Via the cooperation, the selected ST finds opportunities to access licensed bands to transmit secondary signals to its intended secondary receiver (SR). Secondary users are assumed to be mobile, hence, optimization of energy consumption for these users is interested. The EH STs have to harvest energy from the PT's radio-frequency (RF) signals to serve the PTPR communication as well as to transmit their signals. The proposed scheme employs incremental relaying technique in which the PR only requires the assistance from the STs when the transmission between PT and PR is not successful. Moreover, we also investigate impact of hardware impairments on performance of the primary and secondary networks. For performance evaluation, we derive exact and lower-bound expressions of outage probability (OP) over Rayleigh fading channel. Monte-Carlo simulations are performed to verify the theoretical results. The results present that the outage performance of both networks can be enhanced by increasing the number of the ST-SR pairs. In addition, the outage performance of both primary and secondary networks is severely degraded with the increasing of hardware impairment level. It is also shown that fraction of time used for EH and positions of the secondary users significantly impact on the system performance.Web of Science26125024

    Secrecy performance enhancement for underlay cognitive radio networks employing cooperative multi-hop transmission with and without presence of hardware impairments

    Get PDF
    In this paper, we consider a cooperative multi-hop secured transmission protocol to underlay cognitive radio networks. In the proposed protocol, a secondary source attempts to transmit its data to a secondary destination with the assistance of multiple secondary relays. In addition, there exists a secondary eavesdropper who tries to overhear the source data. Under a maximum interference level required by a primary user, the secondary source and relay nodes must adjust their transmit power. We first formulate effective signal-to-interference-plus-noise ratio (SINR) as well as secrecy capacity under the constraints of the maximum transmit power, the interference threshold and the hardware impairment level. Furthermore, when the hardware impairment level is relaxed, we derive exact and asymptotic expressions of end-to-end secrecy outage probability over Rayleigh fading channels by using the recursive method. The derived expressions were verified by simulations, in which the proposed scheme outperformed the conventional multi-hop direct transmission protocol.Web of Science212art. no. 21

    The Current State of Climate Change Perceptions and Policies in Vietnam: 2014 Report

    Get PDF
    This report was constructed to assess the current perceptions and policies regarding climate change in Vietnam. The report comprises a country report, outlining current policies relating to climate change, stakeholder mapping regarding climate change locally and nationally, and results from two stakeholder perception surveys conducted locally and nationally in Vietnam. A total of 50 stakeholders were interviewed, 25 locally and 25 nationally. The stakeholders in the survey represented government offices, universities, research institutions, NGOs, and farmers’ groups. Concerns about climate change impacts included drought, flooding, rainfall variation, and salinity intrusion. These concerns, as well as the methods in which stakeholders would like to receive climate information, varied between local and national stakeholders as well as by the type of institution that the stakeholder represented. This emphasizes a need for location- and user-specific responses to climate change

    Improving Multi-task Learning via Seeking Task-based Flat Regions

    Full text link
    Multi-Task Learning (MTL) is a widely-used and powerful learning paradigm for training deep neural networks that allows learning more than one objective by a single backbone. Compared to training tasks separately, MTL significantly reduces computational costs, improves data efficiency, and potentially enhances model performance by leveraging knowledge across tasks. Hence, it has been adopted in a variety of applications, ranging from computer vision to natural language processing and speech recognition. Among them, there is an emerging line of work in MTL that focuses on manipulating the task gradient to derive an ultimate gradient descent direction to benefit all tasks. Despite achieving impressive results on many benchmarks, directly applying these approaches without using appropriate regularization techniques might lead to suboptimal solutions on real-world problems. In particular, standard training that minimizes the empirical loss on the training data can easily suffer from overfitting to low-resource tasks or be spoiled by noisy-labeled ones, which can cause negative transfer between tasks and overall performance drop. To alleviate such problems, we propose to leverage a recently introduced training method, named Sharpness-aware Minimization, which can enhance model generalization ability on single-task learning. Accordingly, we present a novel MTL training methodology, encouraging the model to find task-based flat minima for coherently improving its generalization capability on all tasks. Finally, we conduct comprehensive experiments on a variety of applications to demonstrate the merit of our proposed approach to existing gradient-based MTL methods, as suggested by our developed theory.Comment: 29 pages, 11 figures, 6 table

    Persistence of eosinophilic asthma endotype and clinical outcomes : A real-world observational study

    Get PDF
    Acknowledgments Writing and editing support, including preparation of the draft manuscript under the direction and guidance of the authors, incorporating author feedback, and manuscript submission, was provided by Crystal Murcia, PhD (CiTRUS Healthcare Communications Group). This support was funded by AstraZeneca (Gaithersburg, Maryland). Funding This work was supported by AstraZeneca. A named author is an employee of AstraZeneca; therefore, AstraZeneca was involved in the study design; collection, analysis, and interpretation of data; and the development and review of the manuscript. The decision to submit the manuscript for publication was made by the authors.Peer reviewedPublisher PD

    Gender Differences in Climate Change Perception and Adaptation Strategies: The Case of Three Provinces in Vietnam’s Mekong River Delta

    Get PDF
    The Policy Information and Response Platform on Climate Change and Rice in ASEAN and its Member Countries Project (PIRCCA) is one of the trial projects funded under Flagship 4. PIRCCA has an overarching goal to enable policymakers in ASEAN countries to make informed decisions on (1) food security policies focusing on the supply and availability of rice, (2) climate change adaptation policies, and (3) gender action plans

    Efficient Palm-Line Segmentation with U-Net Context Fusion Module

    Full text link
    Many cultures around the world believe that palm reading can be used to predict the future life of a person. Palmistry uses features of the hand such as palm lines, hand shape, or fingertip position. However, the research on palm-line detection is still scarce, many of them applied traditional image processing techniques. In most real-world scenarios, images usually are not in well-conditioned, causing these methods to severely under-perform. In this paper, we propose an algorithm to extract principle palm lines from an image of a person's hand. Our method applies deep learning networks (DNNs) to improve performance. Another challenge of this problem is the lack of training data. To deal with this issue, we handcrafted a dataset from scratch. From this dataset, we compare the performance of readily available methods with ours. Furthermore, based on the UNet segmentation neural network architecture and the knowledge of attention mechanism, we propose a highly efficient architecture to detect palm-lines. We proposed the Context Fusion Module to capture the most important context feature, which aims to improve segmentation accuracy. The experimental results show that it outperforms the other methods with the highest F1 Score about 99.42% and mIoU is 0.584 for the same dataset.Comment: Published in 2020 International Conference on Advanced Computing and Applications (ACOMP
    corecore