Article
Mathematics, Applied
Huilian Zhu, Jin Li, Shixin Zhu
Summary: This paper investigates the dimensions and minimum distances of negacyclic BCH codes, providing lower bounds for these two classes of codes.
JOURNAL OF APPLIED MATHEMATICS AND COMPUTING
(2023)
Article
Chemistry, Analytical
Waleed Aldosari
Summary: In this study, a neural network-based model is proposed to detect and localize location spoofing attacks in the Internet of Things (IoT). By leveraging feature extraction technique and a single access point, the presence and time of arrival of a spoofed unmanned aerial vehicle (UAV) are successfully detected. Additionally, a centralized approach to data collection and localization is introduced.
Article
Computer Science, Information Systems
Mengyuan Fan, Chengju Li, Cunsheng Ding
Summary: As a special subclass of cyclic codes, BCH codes are among the best cyclic codes and are widely used in communication, storage systems, and consumer electronics. This paper aims to derive a necessary and sufficient condition for two classes of narrow-sense BCH codes to be Hermitian dually-BCH codes and improve the lower bounds on the minimum distances of their Hermitian dual codes.
IEEE TRANSACTIONS ON INFORMATION THEORY
(2023)
Article
Computer Science, Information Systems
Binkai Gong, Cunsheng Ding, Chengju Li
Summary: This paper investigates the symmetry problem of BCH codes, provides the symmetry conditions for primitive narrow-sense BCH codes and projective narrow-sense ternary BCH codes, and studies their dual codes. For binary primitive narrow-sense BCH codes, improved bounds on the minimum distances of the dual codes are obtained, and the question of which subclasses of cyclic codes are BCH codes is answered to some extent.
IEEE TRANSACTIONS ON INFORMATION THEORY
(2022)
Article
Computer Science, Information Systems
Maaz Salman, Javad Bolboli, Wan-Young Chung
Summary: This paper proposes a BCH-coded underwater wireless optical communication system to improve the communication performance. The system is evaluated by emulating the effects of multiple factors on optical signals in underwater environments. The experimental results demonstrate that the BCH code can significantly enhance the reliability of the system under suitable conditions.
Article
Environmental Sciences
Xiucheng Wang, Lianhao Fu, Nan Cheng, Ruijin Sun, Tom Luan, Wei Quan, Khalid Aldubaikhy
Summary: This paper proposes a graph neural network (GNN)-based approach to jointly optimize the locations of UAVs and relay paths in UAV-relayed IoT networks. The approach trains a relay GNN (RGNN) and a location GNN (LGNN) to optimize the relay paths and UAV locations, respectively. Simulation results demonstrate that the proposed approach achieves comparable performance to brute-force search with much lower time complexity, and it is highly scalable and adaptable to dynamic environments.
Article
Quantum Science & Technology
Yuena Ma, Yang Liu, Liangdong Lu, Guanmin Guo
Summary: Two families of asymmetric quantum codes with better parameters than existing ones are constructed in this paper. By analyzing the properties of q(2)-ary cyclotomic cosets modulo n, Hermitian dual-containing conditions for a family of primitive narrow-sense BCH codes are presented. As a result, a series of asymmetric quantum BCH codes are constructed using CSS-like construction and pairs of nested BCH codes, which have larger real Z-distance than dmax+1.
QUANTUM INFORMATION PROCESSING
(2023)
Article
Mathematics
Yanhui Zhang, Li Liu, Xianhong Xie
Summary: BCH codes, an important class of cyclic codes, have broad applications in communication and storage systems. Determining the parameters of BCH codes is challenging, with only a few known cases. This paper mainly focuses on three classes of BCH codes with n = qm -1, qq2s+1-1, qm-1 q-1. We provide the parameters for C(n,q,& delta;,1) and its dual code in some instances and establish sufficient and necessary conditions for C(n,q,& delta;,2) to be a dually-BCH code.
DISCRETE MATHEMATICS
(2023)
Article
Computer Science, Hardware & Architecture
Juan Pablo Garcia-Martin, Antonio Torralba
Summary: This paper presents a comprehensive power consumption model for battery lifetime estimation in narrowband IoT (NB-IoT). The model is based on the user equipment (UE) state diagram and considers the extended discontinuous reception (eDRX) and power saving mode (PSM) mechanisms. Simulation results show that the selection of link parameters is crucial in achieving a battery lifetime of more than a decade.
Article
Telecommunications
Huang-Chang Lee
Summary: In this work, a BCH code decoder based on the Meggitt algorithm is implemented for WBAN applications. The proposed decoder has the additional capability of checking the syndrome for the decoding result, detecting more failed decoding results without adding complexity. Furthermore, a test pattern reduction technique is proposed for the Chase-2 decoder based on comparisons of corrected bits and flipping bits indices, without sacrificing error-rate performance.
IEEE COMMUNICATIONS LETTERS
(2021)
Article
Mathematics, Applied
Tingfang Chen, Cunsheng Ding, Chengju Li, Zhonghua Sun
Summary: This paper aims to construct and analyze several infinite families of ternary cyclic codes with efficient encoding and decoding algorithms, which have wide applications in communication and storage systems. The research results show that the duals of these codes have specific parameters.
FINITE FIELDS AND THEIR APPLICATIONS
(2023)
Review
Computer Science, Information Systems
Grzegorz Czeczot, Izabela Rojek, Dariusz Mikolajewski
Summary: This article aims to assess the current state and experience of LoRaWAN-based networks, identify the main risks and directions for further development, in order to improve the cyber security situation.
Article
Computer Science, Information Systems
Omer Melih Gul, Aydan Muserref Erkmen, Burak Kantarci
Summary: Energy-aware data collection is crucial for robotic and wireless sensor networks. UAV-aided approaches can reduce energy consumption, but the battery capacity of the UAV needs to be considered.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Theory & Methods
Xiaoqiang Wang, Zhonghua Sun, Cunsheng Ding
Summary: This paper focuses on studying the parameters of negacyclic BCH codes with specific lengths over the finite field GF(q), and finds that these codes generally have good parameters and contain many optimal linear codes. Compared to cyclic codes with the same dimension and length, the negacyclic BCH codes presented in this paper have a larger minimum distance in some cases.
DESIGNS CODES AND CRYPTOGRAPHY
(2023)
Article
Computer Science, Information Systems
Ling Lyu, Yanpeng Dai, Nan Cheng, Shanying Zhu, Xinping Guan, Bin Lin, Xuemin Shen
Summary: In this article, the Age of Information (AoI) is introduced to mathematically characterize the impacts of packet loss and transmission delay on the state estimation error. The relationship between the state estimation error and the AoI of sensory data is explored, and a mother ship (MS)-assisted cooperative transmission scheme is proposed to optimize the state estimation performance by minimizing mean-square error. Simulation results demonstrate the proposed scheme's advantages in reducing estimation error and power consumption.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Biochemical Research Methods
Yixin Wang, Md. Noor-A-Rahim, Erry Gunawan, Yong L. Guan, Chueh L. Poh
Summary: Using DNA as a medium for information storage is a promising solution for long-term data storage. This study investigates the error characteristics in the storage process and proposes a new concept called sequence corruption to analyze the channel. The results provide a comprehensive channel model and shed light on the data recovery issue in DNA data storage.
IEEE-ACM TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS
(2023)
Article
Chemistry, Analytical
Md. Noor-A-Rahim, Jobish John, Fadhil Firyaguna, Hafiz Husnain Raza Sherazi, Sergii Kushch, Aswathi Vijayan, Eoin O'Connell, Dirk Pesch, Brendan O'Flynn, William O'Brien, Martin Hayes, Eddie Armstrong
Summary: Smart manufacturing is a vision and major driver for change in today's industry. The goal of smart manufacturing is to optimize manufacturing processes through constantly monitoring, controlling, and adapting processes towards more efficient and personalised manufacturing. This paper provides an extensive review of wireless communication protocols currently applied in manufacturing environments, their use cases, and their expected impact on the future of smart manufacturing.
Article
Chemistry, Analytical
Patikiri Arachchige Don Shehan Nilmantha Wijesekara, Kalupahana Liyanage Kushan Sudheera, Gammana Guruge Nadeesha Sandamali, Peter Han Joo Chong
Summary: A Software Defined Vehicular Network (SDVN) is a new paradigm that enhances programmability and flexibility in Vehicular Adhoc Networks (VANETs). We propose a novel data collection methodology for the hybrid SDVN architecture by modeling it as an Integer Quadratic Programming (IQP) problem. Our optimization model for data collection in the hybrid SDVN architecture yields significant improvements in terms of communication cost, latency, and data collection efficiency compared to the centralized SDVN architecture.
Article
Computer Science, Theory & Methods
Sahraoui Dhelim, Liming Chen, Sajal K. Das, Huansheng Ning, Chris Nugent, Gerard Leavey, Dirk Pesch, Eleanor Bantry-White, Devin Burns
Summary: This article surveys the literature on social media analysis for detecting mental distress, with a focus on studies published since the COVID-19 outbreak. The authors propose new approaches to organizing and classifying the large amount of research in this emerging field, providing fresh insights and knowledge for interested communities. The article also discusses future research directions and niche areas in detecting mental health problems using social media data, as well as the technical, privacy, and ethical challenges in this rapidly growing field.
ACM COMPUTING SURVEYS
(2023)
Article
Computer Science, Hardware & Architecture
Mingqian Liu, Hongyi Zhang, Zilong Liu, Nan Zhao
Summary: This article investigates the unique advantages and security risks of deep learning in spectrum sensing in cognitive radio-based Internet of Things networks. By combining traditional interference methods with data poisoning attacks, a new adversarial attack method is proposed to reduce sensing accuracy, while introducing a novel design of jamming waveform to enhance interference capability.
IEEE TRANSACTIONS ON RELIABILITY
(2023)
Article
Engineering, Electrical & Electronic
Hieu T. T. Nguyen, Md. Noor-A-Rahim, Yong Liang Guan, Dirk Pesch
Summary: This paper analyzes the impact of big vehicle shadowing on V2V communications and proposes a beamforming-based signal reception technique to mitigate packet collisions caused by hidden nodes. Three relaying schemes are also proposed to improve the V2V message dissemination performance.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2023)
Article
Chemistry, Analytical
Lopamudra Hota, Biraja Prasad Nayak, Bibhudatta Sahoo, Peter H. J. Chong, Arun Kumar
Summary: Globally, the increase in vehicle numbers, traffic congestion, and road accidents are serious problems. Vehicle platooning, which reduces the safety distance between vehicles, provides an efficient solution to traffic flow management and accident prevention. This paper proposes an adaptive traffic flow and collision avoidance approach for vehicular platoons based on cooperative adaptive cruise control (CACC) systems, which significantly improves traffic flow, minimizes travel time, and avoids collisions.
Article
Telecommunications
Han Wang, Hui Li, Qiongwei Ye, Ping Lu, Yong Yang, Peter Han Joo Chong, Xiaoli Chu, Qi Lv, Abla Smahi
Summary: Blockchain systems, as decentralized cryptocurrency systems, face the challenge of the CAP Trilemma. To address this issue in consortium blockchains, a topological construction method based on multi-dimensional hypercubes is proposed, optimizing the physical layer to enhance partition tolerance. The hypercube topology proves to have superior partition tolerance compared to regular rooted tree and ring lattice topologies, and it effectively supports upper-layer protocols for consensus and network layers.
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES
(2023)
Article
Engineering, Electrical & Electronic
Qu Luo, Zilong Liu, Gaojie Chen, Pei Xiao, Yi Ma, Amine Maaref
Summary: This paragraph mentions various concepts and technologies in the field of communication, such as Sparse Code Multiple Access (SCMA), Golden Angle Modulation (GAM), and Internet-of-Things (IoT). It also involves low complexity detection and applications in Rician channels.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
(2023)
Article
Computer Science, Artificial Intelligence
Mingxing Zhang, Zhengchun Zhou, Lanping Li, Zilong Liu, Meng Yang, Yanghe Feng
Summary: This article proposes a novel method, called HpGAN, to algorithmically search desired sequences using generative adversarial networks (GANs). HpGAN trains a generative model based on the concept of zero-sum game to generate sequences with characteristics similar to the training set. Compared to traditional algebraic tools, HpGAN is suitable for complex problems that cannot be solved through mathematical analysis. The author demonstrates the search capabilities of HpGAN in two applications.
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS
(2023)
Article
Computer Science, Information Systems
Hafiz Ahmad Awais Chaudhary, Ivan Guevara, Amandeep Singh, Alexander Schieweck, Jobish John, Tiziana Margaria, Dirk Pesch
Summary: The software development cycles for IoT applications involve integration of different technological layers and complex technical challenges. Adopting model-driven technologies can simplify the construction of high-quality IoT applications, increasing reusability and reducing costs.
Article
Computer Science, Information Systems
Duaa Zuhair Al-Hamid, Pejman A. Karegar, Peter Han Joo Chong
Summary: This paper presents a testbed-based, software-defined wireless sensor network (SDWSN) for IoT applications, focusing on monitoring and repairing any network failures through virtual network testing and analysis prior to physical network implementation. The physical network implementation is designed based on virtual WSN clustering, and the evaluation of node connection capability is discussed. The results show that the performance of the virtual and physical networks is comparable.
Article
Computer Science, Information Systems
Malik Muhammad Qirtas, Eleanor Bantry White, Evi Zafeiridi, Dirk Pesch
Summary: Loneliness among college students is a prevalent issue, and there is a need for improvement in technology-based detection methods due to insufficient attention to individual behavioral differences. This paper introduces a novel approach using passive sensing data from mobile phones to detect loneliness. Utilizing unsupervised clustering, subgroups of students with similar behavioral patterns were identified, enabling more accurate and personalized detection of loneliness. Group-based prediction models showed significant improvement in accuracy compared to generalized models, highlighting the potential for tailored loneliness detection methods.
Article
Computer Science, Hardware & Architecture
Yerkezhan Sartayeva, Henry C. B. Chan, Yik Him Ho, Peter H. J. Chong
Summary: Indoor positioning has a wide range of applications and is important, but there is no one-size-fits-all solution. This paper introduces a systemic survey framework based on a six-layer model to comprehensively survey indoor positioning systems.