Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (21)

Search Parameters:
Keywords = auxiliary message

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
10 pages, 1714 KiB  
Proceeding Paper
Efficient Detection of Galileo SAS Sequences Using E6-B Aiding
by Rafael Terris-Gallego, Ignacio Fernandez-Hernandez, José A. López-Salcedo and Gonzalo Seco-Granados
Eng. Proc. 2025, 88(1), 46; https://doi.org/10.3390/engproc2025088046 - 9 May 2025
Viewed by 215
Abstract
Galileo Signal Authentication Service (SAS) is an assisted signal authentication capability under development by Galileo, designed to enhance the robustness of the European Global Navigation Satellite System (GNSS) against malicious attacks like spoofing. It operates by providing information about some fragments of the [...] Read more.
Galileo Signal Authentication Service (SAS) is an assisted signal authentication capability under development by Galileo, designed to enhance the robustness of the European Global Navigation Satellite System (GNSS) against malicious attacks like spoofing. It operates by providing information about some fragments of the unknown spreading codes in the E6-C signal. Unlike other approaches, Galileo SAS uniquely employs Timed Efficient Stream Loss-tolerant Authentication (TESLA) keys provided by Open Service Navigation Message Authentication (OSNMA) in the E1-B signal for decryption, avoiding the need for key storage in potentially compromised receivers. The encrypted fragments are made available to the receivers before the broadcast of the E6-C signal, along with their broadcast time. However, if the receiver lacks an accurate time reference, searching for these fragments—which typically last for milliseconds and have periodicities extending to several seconds—can become impractical. In such cases, the probability of detection is severely diminished due to the excessively large search space that results. To mitigate this, initial estimates for the code phase delay and Doppler frequency can be obtained from the E1-B signal. Nevertheless, the alignment between E1-B and E6-C is not perfect, largely due to the intrinsic inter-frequency biases they exhibit. To mitigate this issue, we can leverage auxiliary signals like E6-B, processed by High Accuracy Service (HAS)-compatible receivers. This is a logical choice as E6-B shares the same carrier frequency as E6-C. This could help in obtaining more precise estimates of the location of the encrypted fragments and improving the probability of detection, resulting in enhanced robustness for the SAS authentication process. This paper presents a comparison of uncertainties associated with the use of the E1-B and E6-B signals, based on real data samples obtained with a custom-built Galileo SAS evaluation platform based on Software Defined Radio (SDR) boards. The results show the benefits of including E6-B in SAS processing, with minimal implementation cost. Full article
(This article belongs to the Proceedings of European Navigation Conference 2024)
Show Figures

Figure 1

25 pages, 5910 KiB  
Article
High-Capacity Reversible Data Hiding in Encrypted Images Based on Pixel Prediction and QuadTree Decomposition
by Muhannad Alqahtani and Atef Masmoudi
Appl. Sci. 2023, 13(23), 12706; https://doi.org/10.3390/app132312706 - 27 Nov 2023
Cited by 1 | Viewed by 1612
Abstract
Over the past few years, a considerable number of researchers have shown great interest in reversible data hiding for encrypted images (RDHEI). One popular category among various RDHEI methods is the reserving room before encryption (RRBE) approach, which leverages data redundancy in the [...] Read more.
Over the past few years, a considerable number of researchers have shown great interest in reversible data hiding for encrypted images (RDHEI). One popular category among various RDHEI methods is the reserving room before encryption (RRBE) approach, which leverages data redundancy in the original image before encryption to create space for data hiding and to achieve high embedding rates (ERs). This paper introduces an RRBE-based RDHEI method that employs pixel prediction, quadtree decomposition, and bit plane reordering to provide high embedding capacity and error-free reversibility. Initially, the content owner predicts the error image using a prediction method, followed by mapping it to a new error image with positive pixel values and a compressed binary label map is generated for overhead pixels. Subsequently, quadtree decomposition is applied to each bit plane of the mapped prediction error image to identify homogeneous blocks, which are then reordered to create room for data embedding. After generating the encrypted image with the encryption key, the data hider employs the data hiding key to embed the data based on the auxiliary information added to each embeddable bit plane’s beginning. Finally, the receiver is able to retrieve the secret message without any error, decrypt the image, and restore it without any loss or distortion. The experimental results demonstrate that the proposed RDHEI method achieves significantly higher ERs than previous competitors, with an average ER exceeding 3.6 bpp on the BOSSbase and BOWS-2 datasets. Full article
(This article belongs to the Topic Trends and Prospects in Security, Encryption and Encoding)
Show Figures

Figure 1

20 pages, 7056 KiB  
Article
Design of Power Amplifiers for BDS-3 Terminal Based on InGaP/GaAs HBT MMIC and LGA Technology
by Zhenbing Li, Junjie Huang, Jinrong Zhang, Shilin Jia, Haoyang Sun, Gang Li and Guangjun Wen
Micromachines 2023, 14(11), 1995; https://doi.org/10.3390/mi14111995 - 27 Oct 2023
Cited by 1 | Viewed by 2365
Abstract
With the development and popularization of the Beidou-3 navigation satellite system (BDS-3), to ensure its unique short message function, it is necessary to integrate a radio frequency (RF) transmitting circuit with high performance in the BDS-3 terminal. As the key device in an [...] Read more.
With the development and popularization of the Beidou-3 navigation satellite system (BDS-3), to ensure its unique short message function, it is necessary to integrate a radio frequency (RF) transmitting circuit with high performance in the BDS-3 terminal. As the key device in an RF transmitting circuit, the RF power amplifier (PA) largely determines the comprehensive performance of the circuit with its transmission power, efficiency, linearity, and integration. Therefore, in this paper, an L-band highly integrated PA chip compatible with 3 W and 5 W output power is designed in InGaP/GaAs heterojunction bipolar transistor (HBT) technology combined with temperature-insensitive adaptive bias technology, class-F harmonic suppression technology, analog pre-distortion technology, temperature-insensitive adaptive power detection technology, and land grid array (LGA) packaging technology. Additionally, three auxiliary platforms are proposed, dedicated to the simulation and optimization of the same type of PA designs. The simulation results show that at the supply voltage of 5 V and 3.5 V, the linear gain of the PA chip reaches 39.4 dB and 38.7 dB, respectively; the output power at 1 dB compression point (P1dB) reaches 37.5 dBm and 35.1 dBm, respectively; the saturated output power (Psat) reaches 38.2 dBm and 36.2 dBm, respectively; the power added efficiency (PAE) reaches 51.7% and 48.2%, respectively; and the higher harmonic suppression ratios are less than −62 dBc and −65 dBc, respectively. The size of the PA chip is only 6 × 4 × 1 mm3. The results also show that the PA chip has high gain, high efficiency, and high linearity under both output power conditions, which has obvious advantages over similar PA chip designs and can meet the short message function of the BDS-3 terminal in various application scenarios. Full article
(This article belongs to the Special Issue Advancements in Design and Fabrication of Miniature Devices)
Show Figures

Figure 1

16 pages, 5100 KiB  
Article
Improved Collaborative Recommendation Model: Integrating Knowledge Embedding and Graph Contrastive Learning
by Liwei Jiang, Guanghui Yan, Hao Luo and Wenwen Chang
Electronics 2023, 12(20), 4238; https://doi.org/10.3390/electronics12204238 - 13 Oct 2023
Cited by 5 | Viewed by 2000
Abstract
A recommendation algorithm combined with a knowledge graph enables auxiliary information on items to be obtained by using the knowledge graph to achieve better recommendations. However, the recommendation performance of existing methods relies heavily on the quality of the knowledge graph. Knowledge graphs [...] Read more.
A recommendation algorithm combined with a knowledge graph enables auxiliary information on items to be obtained by using the knowledge graph to achieve better recommendations. However, the recommendation performance of existing methods relies heavily on the quality of the knowledge graph. Knowledge graphs often contain noise and irrelevant connections between items and entities in the real world. This knowledge graph sparsity and noise significantly amplifies the noise effects and hinders the accurate representation of user preferences. In response to these problems, an improved collaborative recommendation model is proposed which integrates knowledge embedding and graph contrastive learning. Specifically, we propose a knowledge contrastive learning scheme to mitigate noise within the knowledge graph during information aggregation, thereby enhancing the embedding quality of items. Simultaneously, to tackle the issue of insufficient user-side information in the knowledge graph, graph convolutional neural networks are utilized to propagate knowledge graph information from the item side to the user side, thereby enhancing the personalization capability of the recommendation system. Additionally, to resolve the over-smoothing issue in graph convolutional networks, a residual structure is employed to establish the message propagation network between adjacent layers of the same node, which expands the information propagation path. Experimental results on the Amazon-book and Yelp2018 public datasets demonstrate that the proposed model outperforms the best baseline models by 11.4% and 11.6%, respectively, in terms of the Recall@20 evaluation metric. This highlights the method’s efficacy in improving the recommendation accuracy and effectiveness when incorporating knowledge graphs into the recommendation process. Full article
(This article belongs to the Section Artificial Intelligence)
Show Figures

Figure 1

19 pages, 4021 KiB  
Article
Drug Repositioning Based on the Enhanced Message Passing and Hypergraph Convolutional Networks
by Weihong Huang, Zhong Li, Yanlei Kang, Xinghuo Ye and Wenming Feng
Biomolecules 2022, 12(11), 1666; https://doi.org/10.3390/biom12111666 - 10 Nov 2022
Cited by 6 | Viewed by 2685
Abstract
Drug repositioning, an important method of drug development, is utilized to discover investigational drugs beyond the originally approved indications, expand the application scope of drugs, and reduce the cost of drug development. With the emergence of increasingly drug-disease-related biological networks, the challenge still [...] Read more.
Drug repositioning, an important method of drug development, is utilized to discover investigational drugs beyond the originally approved indications, expand the application scope of drugs, and reduce the cost of drug development. With the emergence of increasingly drug-disease-related biological networks, the challenge still remains to effectively fuse biological entity data and accurately achieve drug-disease repositioning. This paper proposes a new drug repositioning method named EMPHCN based on enhanced message passing and hypergraph convolutional networks (HGCN). It firstly constructs the homogeneous multi-view information with multiple drug similarity features and then extracts the intra-domain embedding of drugs through the combination of HGCN and channel attention mechanism. Secondly, inter-domain information of known drug-disease associations is extracted by graph convolutional networks combining node and edge embedding (NEEGCN), and a heterogeneous network composed of drugs, proteins and diseases is built as an important auxiliary to enhance the inter-domain message passing of drugs and diseases. Besides, the intra-domain embedding of diseases is also extracted through HGCN. Ultimately, intra-domain and inter-domain embeddings of drugs and diseases are integrated as the final embedding for calculating the drug-disease correlation matrix. Through 10-fold cross-validation on some benchmark datasets, we find that the AUPR of EMPHCN reaches 0.593 (T1) and 0.526 (T2), respectively, and the AUC achieves 0.887 (T1) and 0.961 (T2) respectively, which shows that EMPHCN has an advantage over other state-of-the-art prediction methods. Concerning the new disease association prediction, the AUC of EMPHCN through the five-fold cross-validation reaches 0.806 (T1) and 0.845 (T2), which are 4.3% (T1) and 4.0% (T2) higher than the second best existing methods, respectively. In the case study, EMPHCN also achieves satisfactory results in real drug repositioning for breast carcinoma and Parkinson’s disease. Full article
(This article belongs to the Special Issue Computer Aided Drug Discovery)
Show Figures

Figure 1

7 pages, 304 KiB  
Commentary
Obligation Is Not a Compulsion—The Quality of the Law and the Effectiveness and Safety of Vaccination against COVID-19
by Kamila Kocańda and Dorota Zarębska-Michaluk
Int. J. Environ. Res. Public Health 2022, 19(21), 14003; https://doi.org/10.3390/ijerph192114003 - 27 Oct 2022
Cited by 1 | Viewed by 1475
Abstract
In December 2021, the Minister of Health in Poland announced via Twitter that vaccination was not compulsory. Such a message from a public authority, who was to a significant extent responsible for organising the process of preventing and combating the infections caused by [...] Read more.
In December 2021, the Minister of Health in Poland announced via Twitter that vaccination was not compulsory. Such a message from a public authority, who was to a significant extent responsible for organising the process of preventing and combating the infections caused by the SARS-CoV-2 pandemic, appeared to have a negative impact on the public perception of the role of vaccination in combating this disease. The impossibility of directly enforcing vaccination, in the sense that there is no legal basis for its compulsory administration, should not weaken the sense of obligation towards a socially necessary attitude of vaccination as a means of protecting the population against the disease; this should be promoted by public authorities. An auxiliary role in shaping this type of message should be played by the law of appropriate quality, regulating the rules related to vaccination in a way that encourages citizens’ trust in the state and the law. Full article
16 pages, 518 KiB  
Article
SATFuzz: A Stateful Network Protocol Fuzzing Framework from a Novel Perspective
by Zulie Pan, Liqun Zhang, Zhihao Hu, Yang Li and Yuanchao Chen
Appl. Sci. 2022, 12(15), 7459; https://doi.org/10.3390/app12157459 - 25 Jul 2022
Cited by 3 | Viewed by 3320
Abstract
Stateful network protocol fuzzing is one of the essential means for ensuring network communication security. However, the existing methods have problems, including frequent auxiliary message interaction, no in-depth state-space exploration, and high shares of invalid interaction time. To this end, we propose SATFuzz, [...] Read more.
Stateful network protocol fuzzing is one of the essential means for ensuring network communication security. However, the existing methods have problems, including frequent auxiliary message interaction, no in-depth state-space exploration, and high shares of invalid interaction time. To this end, we propose SATFuzz, a stateful network protocol fuzzing framework. SATFuzz first prioritizes the states identified by the status codes in response messages, then randomly selects a state to test among the high-priority states, and determines its corresponding optimal test sequence, which is composed of the minimum pre-lead sequence, the test case, and the fittest post-end sequence. Finally, SATFuzz uses a quasi-recurrent neural network (QRNN) to filter the test cases before performing interaction, and only the optimal test sequence, including the valid test case, can be fed to the protocol entity. To verify the proposed framework, we conduct extensive experiments with the state-of-the-art fuzzer on two popular protocols. The results show that the vulnerability discovery efficiency of the proposed approach increases by at least 1.48 times (at most by 3.06 times), making it superior to the rival methods. This not only confirms the effectiveness of SATFuzz in terms of improving the vulnerability discovery efficiency but also shows that SATFuzz has significant advantages. Full article
(This article belongs to the Special Issue Data-Driven Cybersecurity and Privacy Analysis)
Show Figures

Figure 1

32 pages, 4929 KiB  
Article
A Seed-Guided Latent Dirichlet Allocation Approach to Predict the Personality of Online Users Using the PEN Model
by Saravanan Sagadevan, Nurul Hashimah Ahamed Hassain Malim and Mohd Heikal Husin
Algorithms 2022, 15(3), 87; https://doi.org/10.3390/a15030087 - 8 Mar 2022
Cited by 6 | Viewed by 3654
Abstract
There is a growing interest in topic modeling to decipher the valuable information embedded in natural texts. However, there are no studies training an unsupervised model to automatically categorize the social networks (SN) messages according to personality traits. Most of the existing literature [...] Read more.
There is a growing interest in topic modeling to decipher the valuable information embedded in natural texts. However, there are no studies training an unsupervised model to automatically categorize the social networks (SN) messages according to personality traits. Most of the existing literature relied on the Big 5 framework and psychological reports to recognize the personality of users. Furthermore, collecting datasets for other personality themes is an inherent problem that requires unprecedented time and human efforts, and it is bounded with privacy constraints. Alternatively, this study hypothesized that a small set of seed words is enough to decipher the psycholinguistics states encoded in texts, and the auxiliary knowledge could synergize the unsupervised model to categorize the messages according to human traits. Therefore, this study devised a dataless model called Seed-guided Latent Dirichlet Allocation (SLDA) to categorize the SN messages according to the PEN model that comprised Psychoticism, Extraversion, and Neuroticism traits. The intrinsic evaluations were conducted to determine the performance and disclose the nature of texts generated by SLDA, especially in the context of Psychoticism. The extrinsic evaluations were conducted using several machine learning classifiers to posit how well the topic model has identified latent semantic structure that persists over time in the training documents. The findings have shown that SLDA outperformed other models by attaining a coherence score up to 0.78, whereas the machine learning classifiers can achieve precision up to 0.993. We also will be shared the corpus generated by SLDA for further empirical studies. Full article
(This article belongs to the Special Issue Ensemble Algorithms and/or Explainability)
Show Figures

Figure 1

11 pages, 1493 KiB  
Article
Accurate Physical Property Predictions via Deep Learning
by Yuanyuan Hou, Shiyu Wang, Bing Bai, H. C. Stephen Chan and Shuguang Yuan
Molecules 2022, 27(5), 1668; https://doi.org/10.3390/molecules27051668 - 3 Mar 2022
Cited by 24 | Viewed by 5357
Abstract
Neural networks and deep learning have been successfully applied to tackle problems in drug discovery with increasing accuracy over time. There are still many challenges and opportunities to improve molecular property predictions with satisfactory accuracy even further. Here, we proposed a deep-learning architecture [...] Read more.
Neural networks and deep learning have been successfully applied to tackle problems in drug discovery with increasing accuracy over time. There are still many challenges and opportunities to improve molecular property predictions with satisfactory accuracy even further. Here, we proposed a deep-learning architecture model, namely Bidirectional long short-term memory with Channel and Spatial Attention network (BCSA), of which the training process is fully data-driven and end to end. It is based on data augmentation and SMILES tokenization technology without relying on auxiliary knowledge, such as complex spatial structure. In addition, our model takes the advantages of the long- and short-term memory network (LSTM) in sequence processing. The embedded channel and spatial attention modules in turn specifically identify the prime factors in the SMILES sequence for predicting properties. The model was further improved by Bayesian optimization. In this work, we demonstrate that the trained BSCA model is capable of predicting aqueous solubility. Furthermore, our proposed method shows noticeable superiorities and competitiveness in predicting oil–water partition coefficient, when compared with state-of-the-art graphs models, including graph convoluted network (GCN), message-passing neural network (MPNN), and AttentiveFP. Full article
Show Figures

Figure 1

19 pages, 755 KiB  
Article
Efficient LDPC Encoder Design for IoT-Type Devices
by Jakub Hyla, Wojciech Sułek, Weronika Izydorczyk, Leszek Dziczkowski and Wojciech Filipowski
Appl. Sci. 2022, 12(5), 2558; https://doi.org/10.3390/app12052558 - 28 Feb 2022
Cited by 9 | Viewed by 4974
Abstract
Low-density parity-check (LDPC) codes are known to be one of the best error-correction coding (ECC) schemes in terms of correction performance. They have been utilized in many advanced data communication standards for which the codecs are typically implemented in custom integrated circuits (ICs). [...] Read more.
Low-density parity-check (LDPC) codes are known to be one of the best error-correction coding (ECC) schemes in terms of correction performance. They have been utilized in many advanced data communication standards for which the codecs are typically implemented in custom integrated circuits (ICs). In this paper, we present a research work that shows that the LDPC coding scheme can also be applied in a system characterized by highly limited computational resources. We present a microcontroller-based application of an efficient LDPC encoding algorithm with efficient usage of memory resources for the code-parity-check matrix and the storage of the results of auxiliary computations. The developed implementation is intended for an IoT-type system, in which a low-complexity network node device encodes messages transmitted to a gateway. We present how the classic Richardson–Urbanke algorithm can be decomposed for the QC-LDPC subclass into cyclic shifts and GF(2) additions, directly corresponding to the CPU instructions. The experimental results show a significant gain in terms of memory usage and decoding timing of the proposed method in comparison with encoding with the direct parity check matrix representation. We also provide experimental comparisons with other known block codes (RS and BCH) showing that the memory requirements are not greater than for standard block codes, while the encoding time is reduced, which enables the energy consumption reduction. At the same time, the error-correction performance gain of LDPC codes is greater than for the mentioned standard block codes. Full article
Show Figures

Figure 1

33 pages, 760 KiB  
Article
Investigating the Efficient Use of Word Embedding with Neural-Topic Models for Interpretable Topics from Short Texts
by Riki Murakami and Basabi Chakraborty
Sensors 2022, 22(3), 852; https://doi.org/10.3390/s22030852 - 23 Jan 2022
Cited by 18 | Viewed by 5111
Abstract
With the rapid proliferation of social networking sites (SNS), automatic topic extraction from various text messages posted on SNS are becoming an important source of information for understanding current social trends or needs. Latent Dirichlet Allocation (LDA), a probabilistic generative model, is one [...] Read more.
With the rapid proliferation of social networking sites (SNS), automatic topic extraction from various text messages posted on SNS are becoming an important source of information for understanding current social trends or needs. Latent Dirichlet Allocation (LDA), a probabilistic generative model, is one of the popular topic models in the area of Natural Language Processing (NLP) and has been widely used in information retrieval, topic extraction, and document analysis. Unlike long texts from formal documents, messages on SNS are generally short. Traditional topic models such as LDA or pLSA (probabilistic latent semantic analysis) suffer performance degradation for short-text analysis due to a lack of word co-occurrence information in each short text. To cope with this problem, various techniques are evolving for interpretable topic modeling for short texts, pretrained word embedding with an external corpus combined with topic models is one of them. Due to recent developments of deep neural networks (DNN) and deep generative models, neural-topic models (NTM) are emerging to achieve flexibility and high performance in topic modeling. However, there are very few research works on neural-topic models with pretrained word embedding for generating high-quality topics from short texts. In this work, in addition to pretrained word embedding, a fine-tuning stage with an original corpus is proposed for training neural-topic models in order to generate semantically coherent, corpus-specific topics. An extensive study with eight neural-topic models has been completed to check the effectiveness of additional fine-tuning and pretrained word embedding in generating interpretable topics by simulation experiments with several benchmark datasets. The extracted topics are evaluated by different metrics of topic coherence and topic diversity. We have also studied the performance of the models in classification and clustering tasks. Our study concludes that though auxiliary word embedding with a large external corpus improves the topic coherency of short texts, an additional fine-tuning stage is needed for generating more corpus-specific topics from short-text data. Full article
(This article belongs to the Special Issue Sensor Networks: Physical and Social Sensing in the IoT)
Show Figures

Figure 1

25 pages, 5098 KiB  
Article
Effects of Pope Francis’ Religious Authority and Media Coverage on Twitter User’s Attitudes toward COVID-19 Vaccination
by Arkadiusz Gaweł, Marzena Mańdziuk, Marek Żmudziński, Małgorzata Gosek, Marlena Krawczyk-Suszek, Mariusz Pisarski, Andrzej Adamski and Weronika Cyganik
Vaccines 2021, 9(12), 1487; https://doi.org/10.3390/vaccines9121487 - 16 Dec 2021
Cited by 10 | Viewed by 4723
Abstract
This paper is interdisciplinary and combines the research perspective of medical studies with that of media and social communication studies and theological studies. The main goal of this article is to determine [from arguments on all sides of the issue] whether, and to [...] Read more.
This paper is interdisciplinary and combines the research perspective of medical studies with that of media and social communication studies and theological studies. The main goal of this article is to determine [from arguments on all sides of the issue] whether, and to what extent, statements issued by a religious authority can be used as an argument in the COVID-19 vaccination campaign. The authors also want to find answers to the questions of how the pope’s comments affect public opinion when they concern the sphere of secular and everyday life, including issues related to health care. The main method used in this study is desktop research and the analysis of the Roman Catholic Church’s teaching on vaccination and on the types and significance of the pope’s statements on various topics. The auxiliary methods are sentiment analysis and network analysis made in the open source software Gephi. The authors are strongly interested in the communication and media aspect of the analyzed situation. Pope Francis’ voice on the COVID-19 vaccination has certainly been noticed and registered worldwide, but the effectiveness of his message and direct impact on Catholics’ decisions to accept or refuse the COVID-19 vaccination is quite questionable and would require further precise research. Comparing this to the regularities known from political marketing, one would think that the pope’s statement would not convince the firm opponents of vaccination. Full article
Show Figures

Figure 1

19 pages, 443 KiB  
Article
On the Achievable Rate Region of the K-Receiver Broadcast Channels via Exhaustive Message Splitting
by Rui Tang, Songjie Xie and Youlong Wu
Entropy 2021, 23(11), 1408; https://doi.org/10.3390/e23111408 - 26 Oct 2021
Cited by 4 | Viewed by 2746
Abstract
This paper focuses on K-receiver discrete-time memoryless broadcast channels (DM-BCs) with private messages, where the transmitter wishes to convey K private messages to K receivers. A general inner bound on the capacity region is proposed based on an exhaustive message splitting and [...] Read more.
This paper focuses on K-receiver discrete-time memoryless broadcast channels (DM-BCs) with private messages, where the transmitter wishes to convey K private messages to K receivers. A general inner bound on the capacity region is proposed based on an exhaustive message splitting and a K-level modified Marton’s coding. The key idea is to split every message into j=1KKj1 submessages each corresponding to a set of users who are assigned to recover them, and then send these submessages via codewords chosen from a K-level structure codebooks. To guarantee the joint typicality among all transmitted codewords, a sufficient condition on the subcodebooks’ sizes is derived through a newly establishing hierarchical covering lemma, which extends the 2-level multivariate covering lemma to the K-level case with more intricate dependences. As the number of auxiliary random variables and rate conditions both increase exponentially with K, the standard Fourier–Motzkin elimination procedure becomes infeasible when K is large. To tackle this problem, we obtain a closed form of achievable rate region with a special observation of disjoint unions of sets that constitute the power set of {1,,K}. The proposed achievable rate region allows arbitrary input probability mass functions and improves over previously known achievable (closed form) rate regions for K-receiver (K3) BCs. Full article
(This article belongs to the Section Information Theory, Probability and Statistics)
Show Figures

Figure 1

16 pages, 18505 KiB  
Article
A Sentinel-2 Image-Based Irrigation Advisory Service: Cases for Tea Plantations
by Yi-Ping Wang, Chien-Teh Chen, Yao-Chuan Tsai and Yuan Shen
Water 2021, 13(9), 1305; https://doi.org/10.3390/w13091305 - 7 May 2021
Cited by 6 | Viewed by 3264
Abstract
In this study, we aim to develop an inexpensive site-specific irrigation advisory service for resolving disadvantages related to using immobile soil moisture sensors and to the differences in irrigation needs of different tea plantations affected by variabilities in cultivars, plant ages, soil heterogeneity, [...] Read more.
In this study, we aim to develop an inexpensive site-specific irrigation advisory service for resolving disadvantages related to using immobile soil moisture sensors and to the differences in irrigation needs of different tea plantations affected by variabilities in cultivars, plant ages, soil heterogeneity, and management practices. In the paper, we present methodologies to retrieve two biophysical variables, surface soil water content and canopy water content of tea trees from Sentinel-2 (S2) (European Space Agency, Paris, France) images and consider their association with crop water availability status to be used for making decisions to send an alert level. Precipitation records are used as auxiliary information to assist in determining or modifying the alert level. Once the site-specific alert level for each target plantation is determined, it is sent to the corresponding farmer through text messaging. All the processes that make up the service, from downloading an S2 image from the web to alert level text messaging, are automated and can be completed before 7:30 a.m. the next day after an S2 image was taken. Therefore, the service is operated cyclically, and corresponds to the five-day revisit period of S2, but one day behind the S2 image acquisition date. However, it should be noted that the amount of irrigation water required for each site-specific plantation has not yet been estimated because of the complexities involved. Instead, a single irrigation rate (300 t ha−1) per irrigation event is recommended. The service is now available to over 20 tea plantations in the Mingjian Township, the largest tea producing region in Taiwan, free of charge since September 2020. This operational application is expected to save expenditures on buying irrigation water and induce deeper root systems by decreasing the frequency of insufficient irrigation commonly employed by local farmers. Full article
(This article belongs to the Special Issue Contributions of Remote Sensing to Hydrologic Flux Quantification)
Show Figures

Figure 1

32 pages, 542 KiB  
Article
Multi-Class Cost-Constrained Random Coding for Correlated Sources over the Multiple-Access Channel
by Arezou Rezazadeh, Josep Font-Segura, Alfonso Martinez and Albert Guillén i Fàbregas
Entropy 2021, 23(5), 569; https://doi.org/10.3390/e23050569 - 3 May 2021
Viewed by 2220
Abstract
This paper studies a generalized version of multi-class cost-constrained random-coding ensemble with multiple auxiliary costs for the transmission of N correlated sources over an N-user multiple-access channel. For each user, the set of messages is partitioned into classes and codebooks are generated [...] Read more.
This paper studies a generalized version of multi-class cost-constrained random-coding ensemble with multiple auxiliary costs for the transmission of N correlated sources over an N-user multiple-access channel. For each user, the set of messages is partitioned into classes and codebooks are generated according to a distribution depending on the class index of the source message and under the constraint that the codewords satisfy a set of cost functions. Proper choices of the cost functions recover different coding schemes including message-dependent and message-independent versions of independent and identically distributed, independent conditionally distributed, constant-composition and conditional constant composition ensembles. The transmissibility region of the scheme is related to the Cover-El Gamal-Salehi region. A related family of correlated-source Gallager source exponent functions is also studied. The achievable exponents are compared for correlated and independent sources, both numerically and analytically. Full article
(This article belongs to the Special Issue Finite-Length Information Theory)
Show Figures

Figure 1

Back to TopTop