177 research outputs found
Rateless codes-based secure communication employing transmit antenna selection and harvest-to-jam under joint effect of interference and hardware impairments
In this paper, we propose a rateless codes-based communication protocol to provide security for wireless systems. In the proposed protocol, a source uses the transmit antenna selection (TAS) technique to transmit Fountain-encoded packets to a destination in presence of an eavesdropper. Moreover, a cooperative jammer node harvests energy from radio frequency (RF) signals of the source and the interference sources to generate jamming noises on the eavesdropper. The data transmission terminates as soon as the destination can receive a sufficient number of the encoded packets for decoding the original data of the source. To obtain secure communication, the destination must receive sufficient encoded packets before the eavesdropper. The combination of the TAS and harvest-to-jam techniques obtains the security and efficient energy via reducing the number of the data transmission, increasing the quality of the data channel, decreasing the quality of the eavesdropping channel, and supporting the energy for the jammer. The main contribution of this paper is to derive exact closed-form expressions of outage probability (OP), probability of successful and secure communication (SS), intercept probability (IP) and average number of time slots used by the source over Rayleigh fading channel under the joint impact of co-channel interference and hardware impairments. Then, Monte Carlo simulations are presented to verify the theoretical results.Web of Science217art. no. 70
Improving Multi-task Learning via Seeking Task-based Flat Regions
Multi-Task Learning (MTL) is a widely-used and powerful learning paradigm for
training deep neural networks that allows learning more than one objective by a
single backbone. Compared to training tasks separately, MTL significantly
reduces computational costs, improves data efficiency, and potentially enhances
model performance by leveraging knowledge across tasks. Hence, it has been
adopted in a variety of applications, ranging from computer vision to natural
language processing and speech recognition. Among them, there is an emerging
line of work in MTL that focuses on manipulating the task gradient to derive an
ultimate gradient descent direction to benefit all tasks. Despite achieving
impressive results on many benchmarks, directly applying these approaches
without using appropriate regularization techniques might lead to suboptimal
solutions on real-world problems. In particular, standard training that
minimizes the empirical loss on the training data can easily suffer from
overfitting to low-resource tasks or be spoiled by noisy-labeled ones, which
can cause negative transfer between tasks and overall performance drop. To
alleviate such problems, we propose to leverage a recently introduced training
method, named Sharpness-aware Minimization, which can enhance model
generalization ability on single-task learning. Accordingly, we present a novel
MTL training methodology, encouraging the model to find task-based flat minima
for coherently improving its generalization capability on all tasks. Finally,
we conduct comprehensive experiments on a variety of applications to
demonstrate the merit of our proposed approach to existing gradient-based MTL
methods, as suggested by our developed theory.Comment: 29 pages, 11 figures, 6 table
Energy harvesting-based spectrum access with incremental cooperation, relay selection and hardware noises
In this paper, we propose an energy harvesting (EH)-based spectrum access model in cognitive radio (CR) network. In the proposed scheme, one of available secondary transmitters (STs) helps a primary transmitter (PT) forward primary signals to a primary receiver (PR). Via the cooperation, the selected ST finds opportunities to access licensed bands to transmit secondary signals to its intended secondary receiver (SR). Secondary users are assumed to be mobile, hence, optimization of energy consumption for these users is interested. The EH STs have to harvest energy from the PT's radio-frequency (RF) signals to serve the PTPR communication as well as to transmit their signals. The proposed scheme employs incremental relaying technique in which the PR only requires the assistance from the STs when the transmission between PT and PR is not successful. Moreover, we also investigate impact of hardware impairments on performance of the primary and secondary networks. For performance evaluation, we derive exact and lower-bound expressions of outage probability (OP) over Rayleigh fading channel. Monte-Carlo simulations are performed to verify the theoretical results. The results present that the outage performance of both networks can be enhanced by increasing the number of the ST-SR pairs. In addition, the outage performance of both primary and secondary networks is severely degraded with the increasing of hardware impairment level. It is also shown that fraction of time used for EH and positions of the secondary users significantly impact on the system performance.Web of Science26125024
Secrecy performance enhancement for underlay cognitive radio networks employing cooperative multi-hop transmission with and without presence of hardware impairments
In this paper, we consider a cooperative multi-hop secured transmission protocol to underlay cognitive radio networks. In the proposed protocol, a secondary source attempts to transmit its data to a secondary destination with the assistance of multiple secondary relays. In addition, there exists a secondary eavesdropper who tries to overhear the source data. Under a maximum interference level required by a primary user, the secondary source and relay nodes must adjust their transmit power. We first formulate effective signal-to-interference-plus-noise ratio (SINR) as well as secrecy capacity under the constraints of the maximum transmit power, the interference threshold and the hardware impairment level. Furthermore, when the hardware impairment level is relaxed, we derive exact and asymptotic expressions of end-to-end secrecy outage probability over Rayleigh fading channels by using the recursive method. The derived expressions were verified by simulations, in which the proposed scheme outperformed the conventional multi-hop direct transmission protocol.Web of Science212art. no. 21
Persistence of eosinophilic asthma endotype and clinical outcomes : A real-world observational study
Acknowledgments Writing and editing support, including preparation of the draft manuscript under the direction and guidance of the authors, incorporating author feedback, and manuscript submission, was provided by Crystal Murcia, PhD (CiTRUS Healthcare Communications Group). This support was funded by AstraZeneca (Gaithersburg, Maryland). Funding This work was supported by AstraZeneca. A named author is an employee of AstraZeneca; therefore, AstraZeneca was involved in the study design; collection, analysis, and interpretation of data; and the development and review of the manuscript. The decision to submit the manuscript for publication was made by the authors.Peer reviewedPublisher PD
Healthcare resource use and costs of severe, uncontrolled eosinophilic asthma in the UK general population
Acknowledgments The authors thank Derek Skinner (Cambridge Research Support Ltd, Oakington, Cambridge, UK) for assistance with data extraction.Peer reviewedPublisher PD
Worldwide Characterization of Severe Asthma Patients Eligible for both anti–IL-5 and anti-IgE Biologic Therapy : data from the International Severe Asthma Registry (ISAR)
Funding: ISAR is conducted by OPC Global, and co-funded by OPC Global and AstraZeneca.Peer reviewedPostprin
Deep Transfer Learning: A Novel Collaborative Learning Model for Cyberattack Detection Systems in IoT Networks
Federated Learning (FL) has recently become an effective approach for
cyberattack detection systems, especially in Internet-of-Things (IoT) networks.
By distributing the learning process across IoT gateways, FL can improve
learning efficiency, reduce communication overheads and enhance privacy for
cyberattack detection systems. Challenges in implementation of FL in such
systems include unavailability of labeled data and dissimilarity of data
features in different IoT networks. In this paper, we propose a novel
collaborative learning framework that leverages Transfer Learning (TL) to
overcome these challenges. Particularly, we develop a novel collaborative
learning approach that enables a target network with unlabeled data to
effectively and quickly learn knowledge from a source network that possesses
abundant labeled data. It is important that the state-of-the-art studies
require the participated datasets of networks to have the same features, thus
limiting the efficiency, flexibility as well as scalability of intrusion
detection systems. However, our proposed framework can address these problems
by exchanging the learning knowledge among various deep learning models, even
when their datasets have different features. Extensive experiments on recent
real-world cybersecurity datasets show that the proposed framework can improve
more than 40% as compared to the state-of-the-art deep learning based
approaches.Comment: 12 page
Adverse outcomes from initiation of systemic corticosteroids for asthma : long-term observational study
This study was funded by AstraZeneca. We thank Aruni Seneviratna and Shreyasee Pradhan for their contributions to the project management for this study and Derek Skinner for his contributions to the data acquisition and handling. Writing and editorial support was provided by Elizabeth V. Hillyer, DVM, supported by the Observational and Pragmatic Research Institute Pte. Ltd (OPRI).Peer reviewedPublisher PD
- …