## About

304

Publications

47,486

Reads

**How we measure 'reads'**

A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more

5,283

Citations

Introduction

**Skills and Expertise**

## Publications

Publications (304)

The material in this book is presented to graduate students in Information and Communication theory. The idea is that we give an introduction to particular applications of information theory and coding in digital communications. The goal is to bring understanding of the underlying concepts, both in theory as well as in practice. We mainly concentra...

Cloud management solutions provide full real-time visibility into modern software-defined data centers (SDDC) of high complexity and sophistication through measuring millions of indicators with increasingly high sampling rate. This high frequency monitoring of metrics allows capturing the expected ever-growing dynamism of business-critical applicat...

Background:
Tackling childhood obesity is complex and requires a community-based approach implemented in multiple environments. It is known from literature that knowledgeable and skilled professionals are essential to implement such an approach successfully. The aim of the present study was to assess the need for training and support among a globa...

Efficiently storing storms of data to preserve their utility is a challenging data science problem in many technology applications such as management of cloud computing infrastructures. The problem is information-theoretic in nature. We consider various compression approaches (which are based on Machine Learning) to time series (metric) data measur...

The main source and asset for making smart systems is data, which our information age made easily accessible. The next main challenge we face is to effectively and efficiently extract knowledge from huge amounts of data from heterogeneous sources to make the systems self-contained and autonomous.

Please refer to Example.m on how to use my function correctly.

In this paper, it is shown how a power line can be used to conductively carry and re-radiate 2.45GHz Wi-Fi signals over a distance. This can be useful when a conventional RF links' line-of-sight operation at 2.45GHz is obscured for example in multiple story buildings where Wi-Fi has difficulty penetrating. Commercial Wi-Fi modems were used to trans...

This chapter discusses the single carrier modulation techniques which have been proposed and used in first generation narrowband PLC systems. It emphasizes the recent insight and research focusing first on frequency/phase shift keying combined with permutation coding. The chapter covers multicarrier modulation which is at the heart of latest narrow...

This article gives an overview of noise modeling of the two most problematic types of noise in powerline communications (PLC), namely, impulse noise (broadband noise) and frequency disturbers (narrow-band interference (NBI)). The models for these two types of noise are studied for orthogonal frequency-division multiplexing (OFDM) systems. The first...

We consider a multi-channel power line communication (PLC) system, where channel coefficients follow non-identical log-normal distributions. We assume that statistical characteristics of each channel are time-variant, or in other words, channels are non-stationary. In such scenario, we formulate a channel selection problem, where a transmitter, pro...

The mercury vapor lamp is the oldest high intensity discharge technology lamp that uses an electric arc, and comes in different shapes and designs. It creates a very bright light by using an arc through vaporized mercury in a high pressure tube. This lamp can cause unwanted interference to the smart-grid network or power line communications channel...

This article gives an overview of impulse noise and its models, and points out some important and interesting facts about the study of impulse noise which are sometimes overlooked or not well understood. We discuss the different impulse noise models in the literature, focusing on their similarities and differences when applied in communications sys...

The high pressure sodium lamp is a high energy outdoor light source that belongs to the high intensity discharge lamp family. It comes in different shapes and requires a ballast to start it. The high pressure sodium lamp is a source of interference to the power line communications channel as it injects noise when connected to the 220V mains. This p...

The effect of periodic impulsive (short duration) noise on OFDM is investigated. We present results on the nature of periodic impulsive noise, showing that the PDF of periodic impulsive noise is not exactly Gaussian. We also present results showing that periodic impulsive noise can be more devastating to OFDM compared to random impulsive noise. Thi...

This book provides a conceptual and empirical framework for comparative public health policy analysis and evaluation. At a time of European integration and ever rising costs of health care it is important to take stock of national health systems checking their communalities and individual structural identities. With regard to the cost factor and th...

Wyner, in his well-known paper on the wiretap channel, studied the problem on how to transmit the confidential messages to the legitimate receiver via a degraded broadcast channel, while keeping the wiretapper as ignorant of the messages as possible. In this paper, the model of wiretap channel has been reconsidered for the case that the main channe...

In this paper, we review a new method for the universal design of a check digit system over an abelian group of arbitrary order. Furthermore, we challenge the current standards by comparing this system with several well-known and widely used systems such as ISBN, MEID, ISAN and the system over alphanumeric characters. We show that this novel design...

Background
Multilevel approaches involving environmental strategies are considered to be good practice to help reduce the prevalence of childhood overweight.Objectives
The objective of this study was to evaluate the effects of VIASANO, a community-based programme using the EPODE methodology, on the prevalence of overweight in two pilot towns in Bel...

In our previous work we introduced a method for avoiding/excluding some symbols in Reed-Solomon (RS) codes, called symbol avoidance. In this paper, we apply the symbol avoidance method to make synchronization of RS encoded data more effective. We avoid symbols in a RS code and then perform conventional frame synchronization on RS encoded data by ap...

The general wiretap channel with noiseless feedback is first investigated by Ahlswede and Cai, where lower and upper bounds on the secrecy capacity are provided in their work. The upper bound is met with equality only in some special cases. In this paper, we study a special case of the general wiretap channel with noiseless feedback (called non-deg...

Correlated sources are present in communication systems where protocols ensure that there is some predetermined information for sources. Here, we investigate two correlated sources across the wiretap channel II and their effect on the information leakage when some channel information and some source data symbols (the predetermined information) have...

Using outdated channel state information (CSI) in an opportunistic relaying system (ORS) leads to wrong selection of the best relay, which substantially deteriorates its performance. In this paper, therefore, we propose a robust cooperative scheme coined opportunistic space-time coding (OSTC) to deal with the outdated CSI. A predefined number (i.e....

In practice, sequences with long period but lightweight generation are always welcome in the applications of communication systems; however, the generation is not easy. From a certain angle of very high probability, this paper presents a solution, which is performed using cyclic difference sequences. As an application, the generated sequences can b...

We study the secrecy capacity of the Gaussian wiretap channel with binary input under either soft or hard decision decoding. A closed-form expression of the secrecy capacity is derived by assuming that the eavesdropper uses the same decoding method as the legitimate receiver. An upper bound of the loss of secrecy capacity is provided whilst a smart...

Introduction
Specific actions to promote physical activity (PA) and healthy food (HF) are taken in a community-based program (CBP) named VIASANO, aimed at reducing overweight prevalence in Belgian children. A cross sectional study has been undertaken to assess the outcome of this CBP by comparing the trends of overweight prevalence in two participa...

Relative dimension/length profile (RDLP), inverse relative dimension/length profile (IRDLP) and relative length/dimension profile (RLDP) are equivalent sequences of a linear code and a subcode. The concepts were applied to protect messages from an adversary in the wiretap channel of type II with illegitimate parties. The equivocation to the adversa...

Background
While it is acknowledged that child obesity interventions should cover multiple ecological levels (downstream, midstream and upstream) to maximize their effectiveness, there is a lack of evaluation data to guide the development and implementation of such efforts. To commence addressing this knowledge gap, the present study provides proce...

DG SanCO; Ferrero; Mars; Orangina-Schweppes; Danone

We call the Häring-iterative scheme with the clipping-nulling scheme as the preprocessing impulsive noise (IN) mitigation scheme: Mengi-Häring (MH)-iterative scheme. In this paper, we report two ideas that can significantly improve its performance. The first idea is to use the replacement-nulling scheme as the preprocessing IN mitigation scheme. Th...

In this paper, we concentrate on WOM coding for writing equal-bit information twice (WOM2E). We studied the definition and coding solution of WOM2E. We encoded information via a codeword table and found that WOM2E achieved a better WOM-rate. However, the codeword table for large WOM2E cells is difficult to determine. We also introduced the coding s...

In the smart grid, the G3-PLC solution is in direct competition with other IP-based communications technologies such as GPRS or DSL. In this paper, we present the devolo's 500 kHz G3-PLC access technology and it's analysis based on smart grid field trials in Germany. The focus of the analysis in this paper is concentrated on the following parameter...

In this paper, we analyze the capacity of a multiple input multiple output (MIMO) channel with impulsive noise interference. The Middleton class A model of electromagnetic interference has been employed to model the power line communication (PLC) channel. PLC can utilize MIMO to increase data rate and performance gain. However, an expression for th...

A Reed-Solomon code construction that avoids or excludes particular symbols in a linear Reed-Solomon code is presented. The resulting code, from our symbol avoidance construction, has the same or better error-correcting capabilities compared to the original Reed-Solomon code, but with reduced efficiency in terms of rate. The codebook of the new cod...

In this paper, we study a check digit system which is based on the use of elementary abelian p-groups of order pk. This paper is inspired by a recently introduced check digit system for hexadecimal numbers. By interpreting its check equation in terminology of matrix algebra, we generalize the idea to build systems over a group of order pk, while ke...

In this paper, we study a check digit system over an abelian group of an arbitrary order. The work is a generalization of a recently introduced check digit system which is based on the use of elementary abelian p-group of order pk. Furthermore, we challenge the current standards by comparing our system with several well-known and widely used system...

In our previous work we introduced a method for avoiding/excluding some symbols in Reed-Solomon (RS) codes, called symbol avoidance. In this paper, we apply the symbol avoidance method in sync-word based synchronization of RS encoded data. With the symbol avoidance method we reduce the probability of the RS encoded data being mistaken for the sync-...

This paper addresses the additive impulsive noise mitigation for the uncoded OFDM based digital communication. Due to the noise spreading effect of the Fourier transformation, impulsive noise with large amplitude and short duration degrades the performance of OFDM transmission drastically. In this paper, we first review the simple iterative impulsi...

Obesity is a global epidemic: it is estimated that the majority of the world's adults will be overweight or obese by 2030. It is therefore important to reverse trends towards increasing childhood obesity by interventions at the community level. Ensemble Prévenons l'obésité Des Enfants (EPODE, Together Let's Prevent Childhood Obesity) is a large-sca...

A brief introduction to MIMO-PLC as well as the special case of SIMO-PLC is provided. It is shown that in MIMO-PLC channels, a spatial correlation is inevitable and channels are not spatially independent. A physical as well as a mathematical description of the spatial correlation in MIMO-PLC is provided. Furthermore, two reception diversity techniq...

We discuss the transmission over a power line channel that consists of two links. We determine the obtainable rates for time-, and frequency sharing with the “water-filling” argument. Then we show that the two link channel is equivalent to a degraded broadcast channel for which the capacity region is known. Power- and bandwidth constraints determin...

LED (Light Emitting Diode) lamps have recently come on to the market as energy efficient alternatives to incandescent light bulbs. Although energy effective, they inject conductive noise into the power-line system. This can have a detrimental effect on the power-line communications channel. This paper investigates these effects when LED lamps are s...

Three functional blocks of the PRIME and PLC G3 technologies (encoder/decoder, interleaver, and modulator) are studied in detail, for a PLC channel with narrow-band interference (NBI). The study reveals that these three blocks can be used together effectively so as to improve the performance of the overall system in the presence of NBI. We therefor...

A narrow-band interference (NBI) model for the powerline communications channel is presented. We give frequency domain details and analysis of the NBI model specifically for OFDM systems; it can easily be adapted to model NBI for other communications systems. We also show that by making the same assumptions as in the Middleton class A model, our NB...

Impulsive noise mitigation for Orthogonal Frequency Division Multiplexing (OFDM) can be done with a clipping-nulling scheme using two thresholds. We introduce a new combined impulsive noise mitigation scheme, called clipping-replacement-nulling scheme, in which there are three considered thresholds: the clipping threshold Tclip, the replacement thr...

A number of measurements show the results of the harmonics and conducted emissions from “Energy-Savings” Compact Fluorescent Lamps (CFL) when connected to the power-line communications channel. Different CFL's from different manufacturers were investigated. The paper covers the CENELEC band, as well as the broadband communications channel: 150kHz-3...

In this paper, we study a new bus communication model, where two transmitters wish to send their corresponding private messages and a common message to a destination, while they also wish to send the common message to another receiver connected to the same wire. From an information-theoretical point of view, we first study a general case of this ne...

In this paper, we investigate the model of wiretap channel with action-dependent channel state information. Given the message to be communicated, the transmitter chooses an action sequence that affects the formation of the channel states, and then generates the channel input sequence based on the state sequence and the message. The main channel and...

We investigate the wiretap channel in the presence of action-dependent states and noiseless feedback. Given the message to be communicated, the transmitter chooses an action sequence that affects the formation of the channel states and then generates the channel input sequence based on the state sequence, the message, and the noiseless feedback, wh...

Obesity is a global epidemic: it is estimated that the majority of the world's adults will be overweight or obese by 2030. It is therefore important to reverse trends toward increasing childhood obesity by interventions at the community level. Ensemble Prévenons l'Obésité Des Enfants (EPODE, Together Let's Prevent Childhood Obesity) is a large-scal...

In this paper, the model of wiretap channel has been reconsidered for the case that the main channel is controlled by channel state information (side information), and it is available at the transmitter in a causal manner. Inner and outer bounds are derived on the capacity-equivocation region for this new model, and the secrecy capacity is describe...

Several security models of multiple-access channel (MAC) are investigated.
First, we study the degraded MAC with confidential messages, where two users
transmit their confidential messages (no common message) to a destination, and
each user obtains a degraded version of the output of the MAC. Each user views
the other user as a eavesdropper, and wi...

In this paper, we consider check digit systems which are based on the use of elementary abelian p-groups of order pk. The work is inspired by a recently introduced check digit system for hexadecimal numbers. By interpreting its check equation in terminology of matrix algebra, we generalize the idea to build systems over a group of order pk, while k...

The detriment arising from strong and frequently occurring impulses over an Orthogonal Frequency Division Multiplexing system is paramount because signals on sub-carriers appear to be corrupted simultaneously. To overcome this obstacle, clipping has been reported as an effective approach. Unlike previous works, this work derived the clipping thresh...

An algorithm for estimating the entropy, which is based on the representation of the entropy function as the sum of two polynomial terms, called the polynomial approximation function and the remainder, is proposed. We construct an accurate and unbiased estimate of the value of the polynomial approximation function and use the known Bayesian approac...

The non-degraded wiretap channel with noiseless feedback is first investigated by R. Ahlswede and N. Cai, where lower and upper bounds on the secrecy capacity are provided in their work. However, the capacity-equivocation region has not been determined yet. In this paper, the capacity-equivocation region is determined for the non-degraded wiretap c...

We propose an authentication scheme where the verifier makes the decision based on the value of the metric function, which is assigned depending on the type of the vector stored in the database at the enrollment stage. The scheme has a better performance than the maximum likelihood verification algorithm even for binary symmetric channels.

Estimating entropy from empirical samples of finite size is of central importance for information theory as well as the analysis of complex statistical systems. Yet, this delicate task is marred by intrinsic statistical bias. Here we decompose the entropy function into a polynomial approximation function and a remainder function. The approximation...

Clinical Psychology; Health-Promotion

Data communication over power line networks has a number of similarities with communication using wireless transmission. This (probably) goes back to fact that neither power lines nor wireless channels were designed for carrying communication signals. As a result, a number of techniques successfully used in wireless communications have found their...

To combat the impairments caused by frequency disturbances in the power line communications (PLC), a modified conventional QPSK-OFDM transmission scheme is presented. The idea of this scheme is to first group the N OFDM subcarriers into groups of M and then transmit data by selecting a subset of the subcarriers in the group. Real and imaginary part...

In this paper, first, we investigate the model of degraded broadcast channel
with side information and confidential messages. This work is from Steinberg's
work on the degraded broadcast channel with causal and noncausal side
information, and Csisz$\acute{a}$r-K\"{o}rner's work on broadcast channel with
confidential messages. Inner and outer bounds...

We study verification algorithms designed to accept or to reject identity of a user on the basis of his biometric measurements. The verification schemes are oriented to the protection against a non-authorized use of a certain resource by an attacker. We show that the problem of constructing the verification algorithms can be viewed as a problem of...

We consider the verification problem when the verifier receives a pair of binary vectors (a, b) and makes the acceptance or the rejection decision. The acceptance decision has to be made if the vector b is the result of transmission of the vector a over a known memoryless channel. An attacker substitutes a vector b generated by a stationary Bernoul...

The relative generalized Hamming weight (RGHW) of a linear code and a linear subcode, a two-code extension of generalized Hamming weight (GHW), has been applied to the wiretap channel of type II. The concept has also been extended in the wiretap network II for the secrecy control of linear network coding. In trellis-based decoding algorithms, a giv...

For a linear code and a linear subcode, the relative dimension/length profile (RDLP), inverse relative dimension/ length profile (IRDLP) and relative length/dimension profile (RLDP) are three character sequences, which have been applied to the wiretap channel of type II with illegitimate parties and extended in the wiretap network II for the secrec...