95 results on '"Shih-Chun Lin"'
Search Results
2. Retracted articles in scientific literature: A bibliometric analysis from 2003 to 2022 using the Web of Science
- Author
-
Malcolm Koo and Shih-Chun Lin
- Subjects
Retractions ,Retraction of publication ,Scientific misconduct ,Publishing ,Bibliometric analysis ,Bibliometrix ,Science (General) ,Q1-390 ,Social sciences (General) ,H1-99 - Abstract
Retractions serve a crucial role in maintaining the integrity and accuracy of scientific literature. There has been growing interest in understanding the patterns behind retractions. This bibliometric study analyzed retracted articles published between 2003 and 2022, indexed by the Science Citation Index Expanded of the Web of Science Core Collection database. A total of 8466 retracted articles were identified, revealing an overall increase up to 2019, followed by a decline. A total of 109 countries contributed to the retracted articles, with China and the United States having the highest absolute numbers. In addition, the articles were published in 2347 different journals, with Tumor Biology recording the largest number of retracted articles. The top 10 most cited retracted articles indicated that data and image integrity issues were the main reasons for retraction. The primary reasons for retractions, identified by linking the retracted articles to the Retraction Watch Database, were data and results issues followed by plagiarism and duplication. In conclusion, the present bibliometric study offered an overview of the status of retracted articles indexed by the Web of Science Core Collection over the past two decades. These findings provide insight into areas where scientific integrity may be compromised and serve as a guide to foster a responsible research environment.
- Published
- 2024
- Full Text
- View/download PDF
3. Factors Associated with Evidence-Based Practice Competencies among Taiwanese Nurses: A Cross-Sectional Study
- Author
-
Li-Chuan Cheng, Chia-Jung Chen, Shih-Chun Lin, and Malcolm Koo
- Subjects
evidence-based practice ,cross-sectional survey ,nurses ,nurse practitioners ,Taiwan ,Medicine - Abstract
Evidence-based practice (EBP) is an essential component of healthcare practice that ensures the delivery of high-quality care by integrating the best available evidence. This study aimed to explore factors influencing EBP among nursing professionals in Taiwan. A cross-sectional survey study was conducted with 752 registered nurses and nurse practitioners recruited from a regional teaching hospital in southern Taiwan. EBP competency was evaluated using the Taipei Evidence-Based Practice Questionnaire (TEBPQ). The results showed that participation in evidence-based courses or training within the past year had the strongest association with EBP competencies (Std. B = 0.157, p < 0.001). Holding a graduate degree (Std. B = 0.151, p < 0.001), working in gynecology or pediatrics (Std. B = 0.126, p < 0.001), searching the literature in electronic databases (Std. B = 0.072, p = 0.039), and able to read academic articles in English (Std. B = 0.088, p = 0.005) were significantly associated with higher TEBPQ scores. Younger age (Std. B = −0.105, p = 0.005) and male gender (Std. B = 0.089, p = 0.010) were also identified as factors contributing to higher EBP competencies. The study highlights the importance of ongoing professional development, including EBP training and language proficiency, in enhancing EBP competencies among nursing professionals in Taiwan.
- Published
- 2024
- Full Text
- View/download PDF
4. Abstract 109: Endonasal Endoscopic Approach Associated Cerebral Vasospasm and Management: A Case Report
- Author
-
Nefize P. Turan, Matthew Bower, Abdullah Bin Zahid, Ryan P. Lee, Shih‐Chun Lin, Murugappan Ramanathan Jr, Adam Schiavi, and Justin M. Caplan
- Subjects
Neurology. Diseases of the nervous system ,RC346-429 ,Diseases of the circulatory (Cardiovascular) system ,RC666-701 - Abstract
Introduction Endoscopic endonasal approach(EEA) techniques have been increasingly utilized and have been associated with development of cerebrospinal fluid(CSF) leak, meningitis, diabetes insipidus post‐operatively. Cerebral vasospasm following EEA has rarely been described. Here, we describe the clinical course and management of a patient who underwent EEA for encephalocele repair whose course was complicated by postoperative subarachnoid hemorrhage(SAH) and cerebral vasospasm. Methods n/a Results Case Presentation: 40 year old female with past medical history significant for cerebral venous sinus stent on aspirin, CSF rhinorrhea secondary to right nasal encephalocele s/p endoscopic transnasal transethmoidal repair with nasoseptal flap reconstruction and lumbar drain placement eleven days prior presented with speech difficulties and right sided weakness. On exam, patient was noted to have mild right hemiparesis and expressive aphasia. MRI brain showed subacute infarcts in left greater than right frontal lobes, corpus collosum and right anterior perforated substance. MRA head demonstrated multifocal arterial stenosis. In light of postoperative CT head showing SAH in the basilar, perimesencephalic, prepontine cisterns, interhemispheric fissure and right frontal sulci as well as intraventricular hemorrhage in fourth ventricle, her presentation was thought to be secondary to cerebral vasospasm in the setting of postoperative SAH. She was treated with intravenous hydration, permissive hypertension with head of bed in flat position and transferred for further evaluation. On arrival, she continued have mild right hemiparesis and aphasia. Repeat CTA head/neck and CT perfusion showed severe stenosis of bilateral M1 segments and left greater than right A1 segments as well as ischemic penumbra in left ACA/MCA watershed territory. Diagnostic cerebral angiogram showed bilateral severe A1 stenosis and mild to moderate bilateral M1 and supraclinoid ICA stenosis which improved with intra‐arterial verapamil. She was started on nimodipine. Systolic blood pressure was augmented with vasopressors for goal of 150‐180mmHg. Daily TCDs were followed. She developed worsening right leg weakness following day, thus she was taken for repeat diagnostic cerebral angiogram during which time she was re‐administered intra‐arterial verapamil with improvement in vasospasm. After the second treatment, she had improvement in speech and motor strength. Systolic blood pressure goal was gradually normalized. She was noted to have incidental left internal jugular (IJ) vein thrombosis for which anticoagulation was held in the setting of recent neurosurgical procedure and SAH. Workup for vasculitis and hypercoagulability was unrevealing. Lumbar puncture demonstrated 13 WBC/cu mm with lymphocytic predominance(90%), 23 RBC/cu mm, glucose 89mg/dl, protein 30mg/dl. CSF cultures were negative. Pleocytosis in CSF was attributed to recent neurosurgical procedure. Her neurological exam improved to baseline on hospital day(HD) 9.On HD12, she was found to have left common femoral deep venous thrombus in addition to the left IJ thrombus. Anticoagulation with low dose heparin infusion was started which was transitioned to apixaban on discharge. She was discharged home on HD20. Conclusion We report a case of EEA associated with severe multifocal cerebral vasospasm secondary to postoperative SAH that was successfully treated with induced hypertension, oral nimodipine and intra‐arterial verapamil as an adjunct therapy with an excellent outcome.
- Published
- 2023
- Full Text
- View/download PDF
5. An analysis of reporting practices in the top 100 cited health and medicine-related bibliometric studies from 2019 to 2021 based on a proposed guidelines
- Author
-
Malcolm Koo and Shih-Chun Lin
- Subjects
Reporting guidelines ,Bibliometrics ,Scientometrics ,Scientific publications ,Science (General) ,Q1-390 ,Social sciences (General) ,H1-99 - Abstract
Bibliometric analysis has gained popularity as a quantitative research methodology to evaluate scholarly productivity and identify trends within specific research areas. However, there are currently no established reporting guidelines for bibliometric studies. The present study aimed to investigate the reporting practices of bibliometric research related to health and medicine based on a guidelines “Preferred Reporting Items for Bibliometric Analysis (PRIBA)” proposed in this study. The Science Citation Index, Expanded of the Web of Science was used to identify the top 100 articles with the highest normalized citation counts per year. The search was conducted on April 9, 2022, using the search topic “bibliometric” and including publications from 2019 to 2021. The results substantiated the need for a standardized reporting guideline for bibliometric research. Specifically, among the 25 proposed items in the PRIBA, only five were consistently reported across all articles examined. Further, 11 items were reported by at least 80% of the articles, while nine items were reported by less than 80% of the articles. In conclusion, our findings suggest that the reporting practices of bibliometric studies in the field of health and medicine are in need of improvement. Future research should be conducted to refine the PRIBA guidelines.
- Published
- 2023
- Full Text
- View/download PDF
6. GCN-CNVPS: Novel Method for Cooperative Neighboring Vehicle Positioning System Based on Graph Convolution Network
- Author
-
Chia-Hung Lin, Yo-Hui Fang, Hsin-Yuan Chang, Yu-Chien Lin, Wei-Ho Chung, Shih-Chun Lin, and Ta-Sung Lee
- Subjects
Cooperative vehicle localization ,data fusion ,deep neural network (DNN) ,graph convolution network (GCN) ,long short-term memory (LSTM) ,vehicle-to-vehicle (V2V) ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
To provide coordinate information for the use of intelligent transportation systems (ITSs) and autonomous vehicles (AVs), the global positioning system (GPS) is commonly used in vehicle localization as a cheap and easily accessible solution for global positioning. However, several factors contribute to GPS errors, decreasing the safety and precision of AV and ITS applications, respectively. Extensive research has been conducted to address this problem. More specifically, several optimization-based cooperative vehicle localization algorithms have been developed to improve the localization results by exchanging information with neighboring vehicles to acquire additional information. Nevertheless, existing optimization-based algorithms still suffer from an unacceptable performance and poor scalability. In this study, we investigated the development of deep learning (DL) based cooperative vehicle localization algorithms to provide GPS refinement solutions with low complexity, high performance, and flexibility. Specifically, we propose three DL models to address the problem of interest by emphasizing the temporal and spatial correlations of the extra given information. The simulation results confirm that the developed algorithms outperform existing optimization-based algorithms in terms of refined error statistics. Moreover, a comparison of the three proposed algorithms also demonstrates that the proposed graph convolution network-based cooperative vehicle localization algorithm can effectively utilize temporal and spatial correlations in the extra information, leading to a better performance and lower training overhead.
- Published
- 2021
- Full Text
- View/download PDF
7. Factors associated with nonadherence to antihypertensive medication among middle-aged adults with hypertension: findings from the Taiwan National Health Interview Survey
- Author
-
Chia-Pei Chou, Chun-Yu Chen, Kun-Siang Huang, Shih-Chun Lin, Chih-Fang Huang, and Malcolm Koo
- Subjects
Medicine (General) ,R5-920 - Abstract
Objective We aimed to investigate factors associated with nonadherence to antihypertensive medication among middle-aged Taiwanese adults with hypertension. Methods We used data from the 2009 Taiwan National Health Interview Survey (NHIS) to identify adults age 40 to 65 years with hypertension. We used logistic regression analyses to investigate factors associated with nonadherence to antihypertensive medication. Results A total 1,256 respondents with hypertension taking antihypertensive medication were included in this study. Multiple logistic regression analyses revealed that six factors were significantly and independently associated with nonadherence to medication: younger age (odds ratio, [OR] = 1.85), mean monthly personal income
- Published
- 2020
- Full Text
- View/download PDF
8. Consulting with a folk deity before making decisions: spiritual practices in parents facing end-of-life decisions for their child on life support with brain stem dysfunction
- Author
-
Shih-Chun Lin and Mei-Chih Huang
- Subjects
spiritual practices ,parents ,end-of-life ,decision making ,brain stem dysfunction ,qualitative ,Medicine (General) ,R5-920 - Abstract
Background Adolescents with brain stem dysfunction may undergo many invasive treatments, and parents are often faced with making the decision to withdraw treatment. However, in the face of their child’s death, the spiritual practices of parents dealing with end-of-life decision-making remain under investigated. Purpose This study explores the spiritual practices in parents making end-of-life decisions for adolescents on life support with brain stem dysfunction. Method A descriptive phenomenological study was conducted through in-depth interviews with three parents of two adolescents in Taiwan. Data were analysed using Colaizzi’s seven-step protocol. Results Three main themes emerged: (1) faith during decision-making, (2) struggles during decision-making, (3) transformation during decision-making. The findings indicate that “transforming the nature of hope” is the essence of the experience. Conclusion Family-centred care, gaining insight into parental spiritual practices, and developing culturally-appropriate care are recommended.
- Published
- 2020
- Full Text
- View/download PDF
9. Correlates of depressive symptoms in late middle-aged Taiwanese women: findings from the 2009 Taiwan National Health Interview Survey
- Author
-
Kun-Wei Tsai, Shih-Chun Lin, and Malcolm Koo
- Subjects
Menopausal symptoms ,Climacteric symptoms ,Depressive disorder ,Middle-aged ,Health surveys ,Gynecology and obstetrics ,RG1-991 ,Public aspects of medicine ,RA1-1270 - Abstract
Abstract Background Previous studies have shown that depressive symptoms in middle-aged women were associated with a number of factors such as climacteric symptoms. Nevertheless, studies based on population-based data with a wide range of potential correlates are still scarce. Therefore, the aim of this study was to investigate the correlates of depressive symptoms in late middle-aged Taiwanese women using data from a nationally-representative, population-based survey. Methods Women aged 50.0–65.0 years were identified from the dataset of the 2009 Taiwan National Health Interview Survey. The outcome measure was depressive symptoms in the past week, evaluated using the Center for Epidemiologic Studies Short Depression Scale (CES-D 10) with a cut-off score of 10 or greater. Univariate and multiple logistic regression analyses were used to evaluate the correlates of depressive symptoms. Results The mean age of the 533 respondents was 56.7 years. Depressive symptoms were present in 53 respondents (9.9%). Multiple logistic regression analysis revealed that an education level of elementary school or below (adjusted odds ratio [AOR] = 3.19, P = 0.003), nulliparity (AOR = 8.10, P = 0.001), living alone (AOR = 5.47, P = 0.003), never having worked (AOR = 4.14, P = 0.008), lack of regular exercise (AOR = 3.01, P = 0.003), a perceived health status of fair or bad (AOR = 4.34, P
- Published
- 2017
- Full Text
- View/download PDF
10. Association between Helicobacter pylori Infection and Risk of Osteoporosis in Elderly Taiwanese Women with Upper Gastrointestinal Diseases: A Retrospective Patient Record Review
- Author
-
Shih-Chun Lin, Malcolm Koo, and Kun-Wei Tsai
- Subjects
Diseases of the digestive system. Gastroenterology ,RC799-869 - Abstract
Introduction. Helicobacter pylori (H. pylori) infection could lead to chronic local and systemic immune response. The resulting increase in proinflammatory cytokines could affect bone resorption and might increase the risk of osteoporosis. This study aimed to investigate the association between H. pylori infection and osteoporosis in elderly female patients with upper gastrointestinal diseases. Methods. A retrospective patient record review study was conducted in a regional teaching hospital in south Taiwan. Relevant information on female patients aged 65 and over who were diagnosed with diseases of esophagus, gastric ulcer, or duodenal ulcer during January 2008 to December 2010 were abstracted. Association between H. pylori infection and osteoporosis was evaluated using multivariate logistic regression analysis. Results. Of the 365 patients with a mean age of 77.3 years, 77 (21.1%) had H. pylori infection and 101 (27.7%) had been diagnosed with osteoporosis. Multivariate logistic regression analysis revealed that osteoporosis was significantly associated with H. pylori infection (adjusted odds ratio = 2.03, 95% confidence interval = 1.14–3.62) after adjusting for age group, body mass index group, and use of proton pump inhibitor. Conclusion. Osteoporosis was found to be associated with H. pylori infection in Taiwanese female patients with upper gastrointestinal diseases. Further studies with information on potential confounders are needed to confirm the association.
- Published
- 2014
- Full Text
- View/download PDF
11. Towards Resilient Access Equality for 6G Serverless p-LEO Satellite Networks
- Author
-
Shih-Chun, Lin, Chia-Hung, Lin, C., Chu Liang, and Shao-Yu, Lien
- Subjects
Computer Science - Networking and Internet Architecture - Abstract
Low earth orbit (LEO) mega-constellations, integrating government space systems and commercial practices, have emerged as enabling technologies for the sixth generation (6G) networks due to their good merits of global coverage and ubiquitous services for military and civilian use cases. However, convergent LEO-based satellite networking infrastructures still lack leveraging the synergy of space and terrestrial systems. This paper, therefore, extends conventional serverless cloud platforms with serverless edge learning architectures for 6G proliferated LEO (p-LEO) satellite ecosystems and provides a new distributed training design from a networking perspective. The proposed design dynamically orchestrates communications and computation functionalities and resources among heterogeneous physical units to efficiently fulfill multi-agent deep reinforcement learning for service-level agreements. Innovative ecosystem enhancements, including ultrabroadband access, anti-jammed transmissions, resilient networking, and related open challenges, are also investigated for end-to-end connectivity, communications, and learning performance., Comment: Submitted for possible publication to the IEEE Communication magazine
- Published
- 2022
12. A C-V2X Platform Using Transportation Data and Spectrum-Aware Sidelink Access
- Author
-
Chia-Hung, Lin, Shih-Chun, Lin, Chien-Yuan, Wang, and Thomas, Chase
- Subjects
Electrical Engineering and Systems Science - Signal Processing - Abstract
Intelligent transportation systems and autonomous vehicles are expected to bring new experiences with enhanced efficiency and safety to road users in the near future. However, an efficient and robust vehicular communication system should act as a strong backbone to offer the needed infrastructure connectivity. Deep learning (DL)-based algorithms are widely adopted recently in various vehicular communication applications due to their achieved low latency and fast reconfiguration properties. Yet, collecting actual and sufficient transportation data to train DL-based vehicular communication models is costly and complex. This paper introduces a cellular vehicle-to-everything (C-V2X) verification platform based on an actual traffic simulator and spectrum-aware access. This integrated platform can generate realistic transportation and communication data, benefiting the development and adaptivity of DL-based solutions. Accordingly, vehicular spectrum recognition and management are further investigated to demonstrate the potentials of dynamic slidelink access. Numerical results show that our platform can effectively train and realize DL-based C-V2X algorithms. The developed slidelink communication can adopt different operating bands with remarkable spectrum detection performance, validating its practicality in real-world vehicular environments.
- Published
- 2021
13. Privacy-Preserving Serverless Edge Learning with Decentralized Small Data
- Author
-
Shih-Chun Lin, Chia-Hung Lin, and Myungjin Lee
- Subjects
Computer Networks and Communications ,Hardware and Architecture ,Software ,Information Systems - Published
- 2023
14. Random Linear Streaming Codes in the Finite Memory Length and Decoding Deadline Regime—Part I: Exact Analysis
- Author
-
Pin-Wen Su, Yu-Chih Huang, Shih-Chun Lin, I-Hsiang Wang, and Chih-Chun Wang
- Subjects
Library and Information Sciences ,Computer Science Applications ,Information Systems - Published
- 2022
15. Connected autonomous vehicles: State of practice
- Author
-
Muhammad Mobaidul Islam, Abdullah Al Redwan Newaz, Li Song, Benjamin Lartey, Shih‐Chun Lin, Wei Fan, Ali Hajbabaie, Mubbashar Altaf Khan, Alireza Partovi, Tienake Phuapaiboon, Abdollah Homaifar, and Ali Karimoddini
- Subjects
Modeling and Simulation ,Management Science and Operations Research ,General Business, Management and Accounting - Published
- 2023
16. Universal Feedback Gain for Modulo-Sum Computation Over the Erasure MAC
- Author
-
I-Hsiang Wang, Yu-Chih Huang, and Shih-Chun Lin
- Subjects
Library and Information Sciences ,Computer Science Applications ,Information Systems - Published
- 2022
17. SDVEC: Software-Defined Vehicular Edge Computing with Ultra-Low Latency
- Author
-
Shih-Chun Lin, Kwang-Cheng Chen, and Ali Karimoddini
- Subjects
Computer Networks and Communications ,Electrical and Electronic Engineering ,Computer Science Applications - Published
- 2021
18. Capacity of Broadcast Packet Erasure Channels With Single-User Delayed CSI
- Author
-
Alireza Vahid, Shih-Chun Lin, and I-Hsiang Wang
- Subjects
Computer science ,business.industry ,Retransmission ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Transmitter ,Data_CODINGANDINFORMATIONTHEORY ,Library and Information Sciences ,Binary erasure channel ,Precoding ,Computer Science Applications ,Channel state information ,Linear network coding ,Erasure ,business ,Computer Science::Information Theory ,Information Systems ,Communication channel ,Computer network - Abstract
We characterize the capacity region of the two-user broadcast packet erasure channel (PEC) with single-user delayed channel state information (CSI). More precisely, we assume one receiver does not provide its channel state to the other two nodes (the other receiver and the transmitter), while the other receiver reveals its state globally with unit delay. This is a hybrid CSI at the transmitter (CSIT) setting where the transmitter has the delayed CSI of one user but not the other. Previous results developed opportunistic network coding schemes for this setting, which strictly enlarge the achievable rate region compared to the no-CSIT baseline. Characterization of the capacity region with single-user delayed CSI, however, remained open. In this work, we develop an improved achievability strategy and show that the capacity region, surprisingly, matches that of the broadcast PEC with global delayed CSI of both users. The key to such improvement over previous results is a new precoding strategy for the retransmission phase of the opportunistic network coding scheme. It harnesses the single-user delayed CSI in the retransmission phase, so that interference from the feedback receiver can be aligned at the other receiver. Besides the broadcast PEC with two private messages, an extension to a model with an additional common message is also provided and the corresponding capacity region with single-user CSI also matches that with global delayed CSI. Finally, further extensions to three-user cases are also provided.
- Published
- 2021
19. Impact of palliative care on end-of-life care and place of death in children, adolescents, and young adults with life-limiting conditions: A systematic review
- Author
-
Huey Lan Wuu, Mei Chih Huang, Shih Chun Lin, and Deni Yasmara
- Subjects
medicine.medical_specialty ,Palliative care ,Adolescent ,Population ,MEDLINE ,CINAHL ,Cochrane Library ,Young Adult ,03 medical and health sciences ,0302 clinical medicine ,030225 pediatrics ,Intensive care ,Humans ,Medicine ,Prospective Studies ,Child ,education ,General Nursing ,Terminal Care ,education.field_of_study ,business.industry ,Palliative Care ,General Medicine ,Psychiatry and Mental health ,Clinical Psychology ,Hospice Care ,030220 oncology & carcinogenesis ,Family medicine ,Hospice and Palliative Care Nursing ,business ,End-of-life care ,Cohort study - Abstract
ObjectiveTo determine the impact of palliative care (PC) on end-of-life (EoL) care and the place of death (PoD) in children, adolescents, and young adults with life-limiting conditions.MethodEight online databases (PubMed, Medline, EMBASE, Cochrane Library, CINAHL, Airiti, GARUDA Garba Rujukan Digital, and OpenGrey) from 2010 to February 5, 2020 were searched for studies investigating EoL care and the PoD for pediatric patients receiving and not receiving PC.ResultsOf the 6,468 citations identified, 14 cohort studies and one case series were included. An evidence base of mainly adequate- and strong-quality studies shows that inpatient hospital PC, either with or without the provision of home and community PC, was found to be associated with a decrease in intensive care use and high-intensity EoL care. Conflicting evidence was found for the association between PC and hospital admissions, length of stay in hospital, resuscitation at the time of death, and the proportion of hospital and home deaths.Significance of resultsCurrent evidence suggests that specialist, multidisciplinary involvement, and continuity of PC are required to reduce the intensity of EoL care. Careful attention should be paid to the need for a longer length of stay in a medical setting late in life, and earlier EoL care discussion should take place with patients/caregivers, especially in regard to attempting resuscitation in toddlers, adolescents, and the young adult population. A lack of robust evidence has identified a gap in rigorous multisite prospective studies utilizing data collection.
- Published
- 2021
20. GCN-CNVPS: Novel Method for Cooperative Neighboring Vehicle Positioning System Based on Graph Convolution Network
- Author
-
Shih-Chun Lin, Yu-Chien Lin, Yo-Hui Fang, Ta-Sung Lee, Hsin-Yuan Chang, Chia-Hung Lin, and Wei-Ho Chung
- Subjects
data fusion ,Vehicle positioning ,General Computer Science ,Computer science ,long short-term memory (LSTM) ,vehicle-to-vehicle (V2V) ,General Engineering ,Cooperative vehicle localization ,graph convolution network (GCN) ,TK1-9971 ,Convolution ,deep neural network (DNN) ,Graph (abstract data type) ,General Materials Science ,Electrical engineering. Electronics. Nuclear engineering ,Algorithm - Abstract
To provide coordinate information for the use of intelligent transportation systems (ITSs) and autonomous vehicles (AVs), the global positioning system (GPS) is commonly used in vehicle localization as a cheap and easily accessible solution for global positioning. However, several factors contribute to GPS errors, decreasing the safety and precision of AV and ITS applications, respectively. Extensive research has been conducted to address this problem. More specifically, several optimization-based cooperative vehicle localization algorithms have been developed to improve the localization results by exchanging information with neighboring vehicles to acquire additional information. Nevertheless, existing optimization-based algorithms still suffer from an unacceptable performance and poor scalability. In this study, we investigated the development of deep learning (DL) based cooperative vehicle localization algorithms to provide GPS refinement solutions with low complexity, high performance, and flexibility. Specifically, we propose three DL models to address the problem of interest by emphasizing the temporal and spatial correlations of the extra given information. The simulation results confirm that the developed algorithms outperform existing optimization-based algorithms in terms of refined error statistics. Moreover, a comparison of the three proposed algorithms also demonstrates that the proposed graph convolution network-based cooperative vehicle localization algorithm can effectively utilize temporal and spatial correlations in the extra information, leading to a better performance and lower training overhead.
- Published
- 2021
21. Transmission Energy Minimization for Heterogeneous Low-Latency NOMA Downlink
- Author
-
Chao Shen, Shih-Chun Lin, Gang Zhu, Tsung-Hui Chang, Yanqing Xu, and Yajun Zhao
- Subjects
FOS: Computer and information sciences ,Mathematical optimization ,Computer science ,Computer Science - Information Theory ,Information Theory (cs.IT) ,Applied Mathematics ,Time division multiple access ,020206 networking & telecommunications ,02 engineering and technology ,medicine.disease ,Interference (wave propagation) ,Computer Science Applications ,Noma ,Channel capacity ,Single antenna interference cancellation ,Telecommunications link ,0202 electrical engineering, electronic engineering, information engineering ,medicine ,Electrical and Electronic Engineering ,Computer Science::Information Theory ,Communication channel - Abstract
This paper investigates the transmission energy minimization problem for the two-user downlink with strictly heterogeneous latency constraints. To cope with the latency constraints and to explicitly specify the trade-off between blocklength (latency) and reliability the normal approximation of the capacity of finite blocklength codes (FBCs) is adopted, in contrast to the classical Shannon capacity formula. We first consider the non-orthogonal multiple access (NOMA) based transmission scheme. However, due to heterogeneous latency constraints and channel conditions at receivers, the conventional successive interference cancellation may be infeasible. We thus study the problem by considering heterogeneous receiver conditions under different interference mitigation schemes and solve the corresponding NOMA design problems. It is shown that, though the energy function is not convex and does not have closed form expression, the studied NOMA problems can be globally solved semi-analytically and with low complexity. Moreover, we propose a hybrid transmission scheme that combines the time division multiple access (TDMA) and NOMA. Specifically, the hybrid scheme can judiciously perform bit and time allocation and take TDMA and NOMA as two special instances. To handle the more challenging hybrid design problem, we propose a concave approximation of the FBC rate/capacity formula, by which we obtain computationally efficient and high-quality solutions. Simulation results show that the hybrid scheme can achieve considerable transmission energy saving compared with both pure NOMA and TDMA schemes., Comment: 15 pages, 10 figures, IEEE Transactions on Wireless Communications
- Published
- 2020
22. New bipolar host materials for high power efficiency green thermally activated delayed fluorescence OLEDs
- Author
-
Chia-Hsun Chen, Shih-Chun Lin, Bo-Yen Lin, Che-Yu Li, Yu-Cheng Kong, Yi-Sheng Chen, Shao-Cheng Fang, Ching-Huang Chiu, Jiun-Haw Lee, Ken-Tsung Wong, Chi-Feng Lin, Wen-Yi Hung, and Tien-Lung Chiu
- Subjects
General Chemical Engineering ,Environmental Chemistry ,General Chemistry ,Industrial and Manufacturing Engineering - Published
- 2022
23. Towards Optimal Network Planning for Software-Defined Networks
- Author
-
Ian F. Akyildiz, Pu Wang, Min Luo, and Shih-Chun Lin
- Subjects
Dynamic network analysis ,Computer Networks and Communications ,business.industry ,Computer science ,Distributed computing ,020206 networking & telecommunications ,Throughput ,02 engineering and technology ,In-band control ,Network topology ,Network planning and design ,Nonlinear system ,Traffic engineering ,Control theory ,Control system ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Electrical and Electronic Engineering ,Robust control ,business ,Software-defined networking ,Software - Abstract
Supporting on-line and adaptive traffic engineering in software-defined networks entails the fast, robust control message forwarding from software-defined switches to the controller(s). In-band control using the existing infrastructure is cost-efficient, but imposes a substantial barrier to timely transmissions of control messages. Also, due to the limited computational capability of a single controller, only the use of multiple controllers is practically viable for large-scaled networks. Therefore, in this paper, the optimal software-defined network planning is investigated with multi-controllers. First, the network planning problem is formulated as a nonlinear multi-objective optimization, which aims to simultaneously minimize the number of controllers and the control traffic delay for each switch. This planning problem is then partitioned into two sub-problems, i.e., multi-controller placement and control traffic balancing, which are respectively solved by the proposed fast-convergent algorithms. Furthermore, an adaptive feedback control mechanism is proposed to iteratively work out the two sub-problems and enable the dynamic network replanning, subject to the time-varying traffic volume and network topology. Simulations validate the adaptivity of our control scheme, which significantly reduces delay with maximum throughput for control flows, brings minimal impact to normal data flows, and requires the minimum controllers.
- Published
- 2018
24. Content Delivery over Broadcast Erasure Channels with Distributed Random Cache
- Author
-
Alireza Vahid, Shih-Chun Lin, I-Hsiang Wang, and Yi-Chun Lai
- Subjects
FOS: Computer and information sciences ,Cover (telecommunications) ,Computer science ,business.industry ,Information Theory (cs.IT) ,Computer Science - Information Theory ,Transmitter ,Data_CODINGANDINFORMATIONTHEORY ,Channel state information ,Range (statistics) ,Erasure ,Cache ,State (computer science) ,business ,Communication channel ,Computer network - Abstract
We study the content delivery problem between a transmitter and two receivers through erasure links, when each receiver has access to some random side-information about the files requested by the other user. The random side-information is cached at the receiver via the decentralized content placement. The distributed nature of the receiving terminals may also make it harder for the transmitter to learn the erasure state of the two links and indices of the cached files. We thus investigate the capacity gain due to various levels of availability of channel state and cache index information at the transmitter. More precisely, we cover a wide range of settings from global delayed channel state knowledge and a non-blind transmitter (i.e., one that knows the exact cache index information at each receiver) all the way to no channel state information and a blind transmitter (i.e., one that only statistically knows cache index information at the receivers). We derive new inner and outer bounds for the problem under various settings and provide the conditions under which the two match and the capacity region is characterized. Surprisingly, for some interesting cases, the capacity region remains unchanged even with only single-user channel state or single-user cache index information at the transmitter.
- Published
- 2021
25. TULVCAN: Terahertz Ultra-broadband Learning Vehicular Channel-Aware Networking
- Author
-
Chia-Hung Lin, Erik Blasch, and Shih-Chun Lin
- Subjects
Networking and Internet Architecture (cs.NI) ,FOS: Computer and information sciences ,Computer science ,business.industry ,Deep learning ,Spectrum management ,Computer Science - Networking and Internet Architecture ,Compressed sensing ,Broadband ,Electronic engineering ,Wireless ,Artificial intelligence ,Wideband ,business ,Wireless sensor network ,Communication channel - Abstract
Due to spectrum scarcity and increasing wireless capacity demands, terahertz (THz) communications at 0.1-10THz and the corresponding spectrum characterization have emerged to meet diverse service requirements in future 5G and 6G wireless systems. However, conventional compressed sensing techniques to reconstruct the original wideband spectrum with under-sampled measurements become inefficient as local spectral correlation is deliberately omitted. Recent works extend communication methods with deep learning-based algorithms but lack strong ties to THz channel properties. This paper introduces novel THz channel-aware spectrum learning solutions that fully disclose the uniqueness of THz channels when performing such ultra-broadband sensing in vehicular environments. Specifically, a joint design of spectrum compression and reconstruction is proposed through a structured sensing matrix and two-phase reconstruction based on high spreading loss and molecular absorption at THz frequencies. An end-to-end learning framework, namely compression and reconstruction network (CRNet), is further developed with the mean-square-error loss function to improve sensing accuracy while significantly reducing computational complexity. Numerical results show that the CRNet solutions outperform the latest generative adversarial network (GAN) realization with a much higher cosine and structure similarity measures, smaller learning errors, and 56% less required training overheads. This THz Ultra-broadband Learning Vehicular Channel-Aware Networking (TULVCAN) work successfully achieves effective THz spectrum learning and hence allows frequency-agile access., This paper was already accepted by the IEEE 2021 INFOCOM Workshop
- Published
- 2021
26. A C-V2X Platform Using Transportation Data and Spectrum-Aware Sidelink Access
- Author
-
Chia-Hung Lin, Shih-Chun Lin, Chien-Yuan Wang, and Thomas Chase
- Subjects
Signal Processing (eess.SP) ,FOS: Electrical engineering, electronic engineering, information engineering ,Electrical Engineering and Systems Science - Signal Processing - Abstract
Intelligent transportation systems and autonomous vehicles are expected to bring new experiences with enhanced efficiency and safety to road users in the near future. However, an efficient and robust vehicular communication system should act as a strong backbone to offer the needed infrastructure connectivity. Deep learning (DL)-based algorithms are widely adopted recently in various vehicular communication applications due to their achieved low latency and fast reconfiguration properties. Yet, collecting actual and sufficient transportation data to train DL-based vehicular communication models is costly and complex. This paper introduces a cellular vehicle-to-everything (C-V2X) verification platform based on an actual traffic simulator and spectrum-aware access. This integrated platform can generate realistic transportation and communication data, benefiting the development and adaptivity of DL-based solutions. Accordingly, vehicular spectrum recognition and management are further investigated to demonstrate the potentials of dynamic slidelink access. Numerical results show that our platform can effectively train and realize DL-based C-V2X algorithms. The developed slidelink communication can adopt different operating bands with remarkable spectrum detection performance, validating its practicality in real-world vehicular environments.
- Published
- 2021
- Full Text
- View/download PDF
27. Eco-Vehicular Edge Networks for Connected Transportation: A Distributed Multi-Agent Reinforcement Learning Approach
- Author
-
Shih-Chun Lin and Ferdous Pervej
- Subjects
Computer science ,Distributed computing ,Reliability (computer networking) ,020302 automobile design & engineering ,020206 networking & telecommunications ,02 engineering and technology ,0203 mechanical engineering ,Control theory ,Telecommunications link ,0202 electrical engineering, electronic engineering, information engineering ,Resource allocation ,Reinforcement learning ,Resource management ,Enhanced Data Rates for GSM Evolution ,Time complexity - Abstract
This paper introduces an energy-efficient, software-defined vehicular edge network for the growing intelligent connected transportation system. A joint user-centric virtual cell formation and resource allocation problem is investigated to bring eco-solutions at the edge. This joint problem aims to combat against the power-hungry edge nodes while maintaining assured reliability and data rate. More specifically, by prioritizing the downlink communication of dynamic eco-routing, highly mobile autonomous vehicles are served with multiple low-powered access points (APs) simultaneously for ubiquitous connectivity and guaranteed reliability of the network. The formulated optimization is exceptionally troublesome to solve within a polynomial time, due to its complicated combinatorial structure. Hence, a distributed multi-agent reinforcement learning (D-MARL) algorithm is proposed for eco-vehicular edges, where multiple agents cooperatively learn to receive the best reward. First, the algorithm segments the centralized action space into multiple smaller groups. Based on the model-free distributed Q learner, each edge agent takes its actions from the respective group. Also, in each learning state, a software-defined controller chooses the global best action from individual bests of the distributed agents. Numerical results validate that our learning solution achieves near-optimal performances within a small number of training episodes as compared with existing baselines.
- Published
- 2020
28. Factors associated with nonadherence to antihypertensive medication among middle-aged adults with hypertension: findings from the Taiwan National Health Interview Survey
- Author
-
Chun-Yu Chen, Kun-Siang Huang, Shih-Chun Lin, Chia-Pei Chou, Malcolm Koo, and Chih-Fang Huang
- Subjects
medicine.medical_specialty ,Medicine (General) ,antihypertensive medication ,business.industry ,Biochemistry (medical) ,Taiwan ,Medication adherence ,Cell Biology ,General Medicine ,030204 cardiovascular system & hematology ,Biochemistry ,03 medical and health sciences ,0302 clinical medicine ,R5-920 ,Family medicine ,Hypertension ,medication adherence ,medicine ,National Health Interview Survey ,030212 general & internal medicine ,business ,middle-aged ,modified risk factors ,Antihypertensive medication ,Retrospective Clinical Research Report - Abstract
Objective We aimed to investigate factors associated with nonadherence to antihypertensive medication among middle-aged Taiwanese adults with hypertension. Methods We used data from the 2009 Taiwan National Health Interview Survey (NHIS) to identify adults age 40 to 65 years with hypertension. We used logistic regression analyses to investigate factors associated with nonadherence to antihypertensive medication. Results A total 1,256 respondents with hypertension taking antihypertensive medication were included in this study. Multiple logistic regression analyses revealed that six factors were significantly and independently associated with nonadherence to medication: younger age (odds ratio, [OR] = 1.85), mean monthly personal income Conclusions This secondary data analysis of the population-based NHIS identified six factors associated with nonadherence to antihypertensive medication. These factors should be considered when planning and implementing blood pressure control interventions among middle-aged adults with hypertension.
- Published
- 2020
29. Dynamic Power Allocation and Virtual Cell Formation for Throughput-Optimal Vehicular Edge Networks in Highway Transportation
- Author
-
Ferdous Pervej and Shih-Chun Lin
- Subjects
Vehicular ad hoc network ,Computer science ,Reliability (computer networking) ,Distributed computing ,05 social sciences ,050801 communication & media studies ,Throughput ,Spectral efficiency ,0508 media and communications ,Server ,0502 economics and business ,Dynamic demand ,050211 marketing ,Enhanced Data Rates for GSM Evolution ,Transmission time - Abstract
This paper investigates highly mobile vehicular networks from users' perspectives in highway transportation. Particularly, a centralized software-defined architecture is introduced in which centralized resources can be assigned, programmed, and controlled using the anchor nodes (ANs) of the edge servers. Unlike the legacy networks, where a typical user is served from only one access point (AP), in the proposed system model, a vehicle user is served from multiple APs simultaneously. While this increases the reliability and the spectral efficiency of the assisted users, it also necessitates an accurate power allocation in all transmission time slots. As such, a joint user association and power allocation problem is formulated to achieve enhanced reliability and weighted user sum rate. However, the formulated problem is a complex combinatorial problem, remarkably hard to solve. Therefore, fine-grained machine learning algorithms are used to efficiently optimize joint user associations and power allocations of the APs in a highly mobile vehicular network. Furthermore, a distributed single-agent reinforcement learning algorithm, namely SARL-MARL, is proposed which obtains nearly identical genie-aided optimal solutions within a nominal number of training episodes than the baseline solution. Simulation results validate that our solution outperforms existing schemes and can attain genie-aided optimal performances.
- Published
- 2020
30. Correction to: Edge Computing – EDGE 2020
- Author
-
Shih-Chun Lin, Liang-Jie Zhang, Jinpeng Wei, Shuhui Yang, and Ajay K. Katangur
- Subjects
Physics ,Geometry ,Edge (geometry) ,Edge computing - Published
- 2020
31. Gaussian Broadcast Channels With Intermittent Connectivity and Hybrid State Information at the Transmitter
- Author
-
I.-Hsiang Wang and Shih-Chun Lin
- Subjects
Wireless network ,Computer science ,Gaussian ,Transmitter ,020206 networking & telecommunications ,02 engineering and technology ,Library and Information Sciences ,Topology ,Computer Science Applications ,Computer Science::Performance ,symbols.namesake ,Signal-to-noise ratio ,Channel state information ,Burstiness ,Linear network coding ,0202 electrical engineering, electronic engineering, information engineering ,symbols ,Erasure ,Computer Science::Information Theory ,Information Systems ,Communication channel - Abstract
In wireless networks, the link connectivity may be intermittent due to shadowing, burstiness of data arrival, or uncoordinated resource allocation. In this paper, we model the intermittence of links as Bernoulli distributed random channel states, termed intermittence channel states , and study the impact of the corresponding channel state information at the transmitter (CSIT) in a two-user Gaussian broadcast channel (BC). Moreover, due to the heterogeneous timeliness of intermittence channel states, the CSIT considered in this paper is hybrid . More specifically, the CSIT of each link can be perfectly (causally or non-causally) available, delayed, or not available. When the links are connected, we adopt a general setting that the received signal-to-noise ratios can be different. Our contribution is the characterization of the capacity regions of intermittent Gaussian BC to within bounded gaps for all combinations of hybrid CSIT, except for scenario DN (delayed CSIT of receiver 1, no CSIT of receiver 2). For scenario DN, we propose an opportunistic physical layer network coding scheme that achieves a strictly larger degree-of-freedom (DoF) region than the no-CSIT DoF region. As a corollary, single-user CSIT is able to increase the sum DoF for intermittent Gaussian BC (also the capacity region for the erasure BC, as a by-product). This result is in sharp contrast to the recent negative result by Davoodi and Jafar, where it is shown that for fast-fading multiple-input single-output BC with continuous channel states, single-user CSIT does not help at all in terms of sum DoF.
- Published
- 2018
32. QoS-Based Linear Transceiver Optimization for Full-Duplex Multiuser Communications
- Author
-
Tsung-Hui Chang, Ya-Feng Liu, and Shih-Chun Lin
- Subjects
Beamforming ,business.industry ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Real-time computing ,Duplex (telecommunications) ,020206 networking & telecommunications ,020302 automobile design & engineering ,02 engineering and technology ,Topology ,Interference (wave propagation) ,Base station ,0203 mechanical engineering ,Transmission (telecommunications) ,Signal Processing ,Telecommunications link ,Computer Science::Networking and Internet Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Wireless ,Electrical and Electronic Engineering ,Transceiver ,business ,Computer Science::Information Theory ,Communication channel - Abstract
In this paper, we consider a multiuser wireless system with one full duplex (FD) base station (BS) serving a set of half duplex (HD) mobile users. To cope with the in-band self-interference (SI) and co-channel interference, we formulate a quality-of-service (QoS) based linear transceiver design problem. The problem jointly optimizes the downlink (DL) and uplink (UL) beamforming vectors of the BS and the transmission powers of UL users so as to provide both the DL and UL users with guaranteed signal-to-interference-plus-noise ratio performance, using a minimum UL and DL transmission sum power. The considered system model not only takes into account noise caused by nonideal RF circuits, analog/digital SI cancellation but also constrains the average signal power at the input of the analog-to-digital converter (ADC) for avoiding signal distortion due to finite ADC precision. The formulated design problem is not convex and challenging to solve in general. We first show that for a special case with a worst case SI channel estimation error, the QoS-based linear transceiver design problem is globally solvable by a polynomial time bisection algorithm. For the general case, we propose a suboptimal algorithm based on alternating optimization (AO). The AO algorithm is guaranteed to converge to a Karush–Kuhn–Tucker solution. To improve the computational efficiency of the AO algorithm, we further develop a fixed-point method by extending the classical uplink–downlink duality in HD systems to the FD system. Simulation results are presented to demonstrate the performance of the proposed algorithms and the comparison with HD systems.
- Published
- 2018
33. Magnetic Induction-Based Localization in Randomly Deployed Wireless Underground Sensor Networks
- Author
-
Abdallah A. Alshehri, Pu Wang, Ian F. Akyildiz, and Shih-Chun Lin
- Subjects
Computer Networks and Communications ,Computer science ,Real-time computing ,02 engineering and technology ,Electromagnetic radiation ,symbols.namesake ,0203 mechanical engineering ,0202 electrical engineering, electronic engineering, information engineering ,Wireless ,business.industry ,Noise (signal processing) ,020206 networking & telecommunications ,020302 automobile design & engineering ,Computer Science Applications ,Key distribution in wireless sensor networks ,Additive white Gaussian noise ,Hardware and Architecture ,Signal Processing ,symbols ,Algorithm design ,business ,Wireless sensor network ,Multipath propagation ,Information Systems ,Computer network ,Communication channel - Abstract
Wireless underground sensor networks enable many applications, such as mine and tunnel disaster prevention, oil upstream monitoring, earthquake prediction and landslide detection, and intelligent farming and irrigation among many others. Most applications are location-dependent, so they require precise sensor positions. However, classical localization solutions based on the propagation properties of electromagnetic waves do not function well in underground environments. This paper proposes a magnetic induction (MI)-based localization that accurately and efficiently locates randomly deployed sensors in underground environments by leveraging the multipath fading free nature of MI signals. Specifically, the MI-based localization framework is first proposed based on underground MI channel modeling with additive white Gaussian noise, the designated error function, and semidefinite programming relaxation. Next, this paper proposes a two-step positioning mechanism for obtaining fast and accurate localization results by: first, developing the fast-initial positioning through an alternating direction augmented Lagrangian method for rough sensor locations within a short processing time, and then proposing fine-grained positioning for performing powerful search for optimal location estimations via the conjugate gradient algorithm. Simulations confirm that our solution yields accurate sensor locations with both low and high noise and reveals the fundamental impact of underground environments on the localization performance.
- Published
- 2017
34. Asymptotic Optimality in Byzantine Distributed Quickest Change Detection
- Author
-
Yu-Chih Huang, Shih-Chun Lin, and Yu-Jui Huang
- Subjects
FOS: Computer and information sciences ,Computer science ,Information Theory (cs.IT) ,Computer Science - Information Theory ,Bandwidth (signal processing) ,Binary number ,Mathematics - Statistics Theory ,Statistics Theory (math.ST) ,Library and Information Sciences ,Sensor fusion ,Topology ,Computer Science Applications ,Asymptotically optimal algorithm ,Converse ,FOS: Mathematics ,False alarm ,Fusion center ,Information Systems ,Event (probability theory) - Abstract
The Byzantine distributed quickest change detection (BDQCD) is studied, where a fusion center monitors the occurrence of an abrupt event through a bunch of distributed sensors that may be compromised. We first consider the binary hypothesis case where there is only one post-change hypothesis and prove a novel converse to the first-order asymptotic detection delay in the large mean time to a false alarm regime. This converse is tight in that it coincides with the currently best achievability shown by Fellouris et al.; hence, the optimal asymptotic performance of binary BDQCD is characterized. An important implication of this result is that, even with compromised sensors, a 1-bit link between each sensor and the fusion center suffices to achieve asymptotic optimality. To accommodate multiple post-change hypotheses, we then formulate the multi-hypothesis BDQCD problem and again investigate the optimal first-order performance under different bandwidth constraints. A converse is first obtained by extending our converse from binary to multi-hypothesis BDQCD. Two families of stopping rules, namely the simultaneous $d$-th alarm and the multi-shot $d$-th alarm, are then proposed. Under sufficient link bandwidth, the simultaneous $d$-th alarm, with $d$ being set to the number of honest sensors, can achieve the asymptotic performance that coincides with the derived converse bound; hence, the asymptotically optimal performance of multi-hypothesis BDQCD is again characterized. Moreover, although being shown to be asymptotically optimal only for some special cases, the multi-shot $d$-th alarm is much more bandwidth-efficient and energy-efficient than the simultaneous $d$-th alarm. Built upon the above success in characterizing the asymptotic optimality of the BDQCD, a corresponding leader-follower Stackelberg game is formulated and its solution is found., 47pages, 3 figures. Part of the results have been presented at the IEEE ISIT 2019
- Published
- 2019
35. Software-Defined architecture for QoS-Aware IoT deployments in 5G systems
- Author
-
Shih-Chun Lin, Luis Tello-Oquendo, Vicent Pla, and Ian F. Akyildiz
- Subjects
Information transfer ,business.product_category ,Computer Networks and Communications ,Computer science ,Millimeter-wave ,02 engineering and technology ,01 natural sciences ,Internet of things (IoT) ,0202 electrical engineering, electronic engineering, information engineering ,Internet access ,Forwarding plane ,Wireless ,Software-defined gateway ,Ubiquitous network ,Routing control plane ,business.industry ,010401 analytical chemistry ,020206 networking & telecommunications ,INGENIERIA TELEMATICA ,5G Cellular systems ,0104 chemical sciences ,Hardware and Architecture ,Scalability ,Systems architecture ,The Internet ,business ,Software-defined networking (SDN) ,Software ,5G ,Computer network - Abstract
[EN] Internet of Things (IoT), a ubiquitous network of interconnected objects, harvests information from the environments, interacts with the physical world, and uses the existing Internet infrastructure to provide services for information transfer and emerging applications. However, the scalability and Internet access fundamentally challenge the realization of a wide range of IoT applications. Based on recent developments of 5G system architecture, namely SoftAir, this paper introduces a new software-defined platform that enables dynamic and flexible infrastructure for 5G IoT communication. A corresponding sum-rate analysis is also carried out via an optimization approach for efficient data transmissions. First, the SoftAir decouples control plane and data plane for a software-defined wireless architecture and enables effective coordination among remote radio heads (RRHs), equipped with millimeter-wave (mmWave) frontend, for IoT access. Next, by introducing an innovative design of software-defined gateways (SD-GWs) as local IoT controllers in SoftAir, the wide diversity of IoT applications and the heterogeneity of IoT devices are easily accommodated. These SD-GWs aggregate the traffic from heterogeneous IoT devices and perform protocol conversions between IoT networks and radio access networks. Moreover, a cross-domain optimization framework is proposed in this extended SoftAir architecture concerning both upstream and downstream communication, where the respective sum-rates are maximized and system-level constraints are guaranteed, including (i) quality-of-service requirements of IoT transmissions, (ii) total power limit of mmWave RRHs, and (iii) fronthaul network capacities. Simulation results validate the efficacy of our solutions, where the extended SoftAir solution surpasses existing IoT schemes in spectral efficiency and achieves optimal data rates for next-generation IoT communication. (C) 2019 Elsevier B.V. All rights reserved., This work was supported by the US National Science Foundation (NSF) under Grant No. 1547353. A part of this work was supported by the Harry C. Kelly Memorial Fund, AC21 Special Project Fund (SPF), NC State 2019-2020 Internationalization Seed Grants and 2019 Faculty Research and Professional Development (FRPD) Program. The work of V. Pla was supported by Grant PGC2018-094151-B-I00 (MCIU/AEI/FEDER, UE).
- Published
- 2019
- Full Text
- View/download PDF
36. Predictors of Internet use for health information among male and female Internet users: Findings from the 2009 Taiwan National Health Interview Survey
- Author
-
Malcolm Koo, Shih-Chun Lin, and Ming-Chi Lu
- Subjects
Adult ,Male ,020205 medical informatics ,Information Seeking Behavior ,Population ,Taiwan ,Health Informatics ,02 engineering and technology ,Logistic regression ,Young Adult ,03 medical and health sciences ,0302 clinical medicine ,0202 electrical engineering, electronic engineering, information engineering ,Humans ,National Health Interview Survey ,Medicine ,030212 general & internal medicine ,education ,Health communication ,Aged ,Internet ,education.field_of_study ,Consumer Health Information ,business.industry ,Secondary data ,Odds ratio ,Middle Aged ,Health Surveys ,Management ,Respondent ,Female ,The Internet ,business ,Demography - Abstract
The Internet is an increasingly important source of health information for the general population. Both preventive health behavior and Internet use are known to be different between men and women. However, few studies have compared predictors of Internet use for health information between the sexes.To investigate the prevalence and predictors of Internet use for health information among male and female adult Internet users using data from a population-based survey in Taiwan.Respondents between the ages of 20-65 years were identified from the dataset of the 2009 Taiwan National Health Interview Survey. The outcome variable of the study, the utilization of the Internet for health information, was ascertained by asking whether the respondent had ever used the Internet to search for health information or obtain health services. Univariate and multivariate logistic regression analyses were conducted separately for men and women to evaluate factors associated with the use of Internet for health information.Of the 2741 adults aged 20-65 years who had ever used the Internet, 1766 (64.4%) of them had used it for health information or services. Multivariate logistic regression analyses showed that a higher educational level (adjusted odds ratio [AOR]=3.60, P0.001), living alone (AOR=1.77, P=0.019), had exercised in the past two weeks (AOR=2.41, P0.001), residing in city or urban district (AOR=1.28, P=0.049), with a perceived health status of extremely good, very good, or good (AOR=1.34, P=0.022), and had used Western medicine services in the past month (AOR=1.51, P=0.005) were significantly associated with health information use in male Internet users. On the other hand, age between 20-44.9 years (AOR=1.87, P0.001), a higher educational level (AOR=3.57, P0.001), being married (AOR=1.68, P=0.001), had exercised in the past two weeks (AOR=1.56, P0.001), and had a mean monthly personal income of NT$ 20,000 and above were significant factors in female Internet users.This secondary data analysis of a representative sample of Taiwan population revealed that a similar but not identical set of independent factors was associated with the use of Internet for health information between male and female Internet users.
- Published
- 2016
37. Subcarrier Pairing and Power Allocation With Interference Management in Cognitive Relay Networks Based on Genetic Algorithms
- Author
-
Shih-Chun Lin, Hung-Sheng Lang, and Wen-Hsien Fang
- Subjects
Mathematical optimization ,Computer Networks and Communications ,Computer science ,Orthogonal frequency-division multiplexing ,String (computer science) ,Crossover ,Aerospace Engineering ,020302 automobile design & engineering ,020206 networking & telecommunications ,02 engineering and technology ,Multiplexing ,Subcarrier ,Cognitive radio ,0203 mechanical engineering ,Automotive Engineering ,Convex optimization ,Genetic algorithm ,0202 electrical engineering, electronic engineering, information engineering ,Resource allocation ,Electrical and Electronic Engineering ,Integer programming - Abstract
This paper considers the resource allocation for an orthogonal-frequency-division-multiplexing (OFDM)-based cognitive decode-and-forward (DF) relay network. Our objective is to maximize the sum rate (over subcarriers) of the cognitive-radio user with the interference introduced to the primary users (PUs) being managed. The optimization is over subcarrier pairing and power allocation, which leads to a mixed-integer programming (MIP) problem. To resolve this complicated MIP problem at a reasonable cost, we adopt the heterogeneous genetic algorithm (HGA) framework. The main motivation for the HGA framework comes from the idea that it can reduce the impact of extra assumptions made in previous works to simplify the problem. In our HGA, the chromosome is divided into an integer string for subcarrier pairing and a real-number string for power allocation. Two new initialization methods of these chromosomes, which are motivated by the convex optimization theory, are proposed. New crossover and mutation schemes are also devised to accommodate these new chromosomes, as well as to manage the interference to the PUs. Furthermore, we also propose a two-stage low-complexity genetic algorithm, which separately determines the proper subcarrier pairs and power allocations. Our simulations show that our HGAs and the two-stage algorithm provide competing performance, compared with similar state-of-the-art works.
- Published
- 2016
38. SoftWater: Software-defined networking for next-generation underwater communication systems
- Author
-
Shih-Chun Lin, Ian F. Akyildiz, and Pu Wang
- Subjects
Network architecture ,Computer Networks and Communications ,business.industry ,Computer science ,010401 analytical chemistry ,Network virtualization ,020206 networking & telecommunications ,02 engineering and technology ,Virtualization ,computer.software_genre ,01 natural sciences ,0104 chemical sciences ,Network management ,Hardware and Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Underwater ,Software-defined networking ,business ,computer ,Mobility management ,Software ,Underwater acoustic communication ,Computer network ,Efficient energy use - Abstract
Underwater communication systems have drawn the attention of the research community in the last 15 years. This growing interest can largely be attributed to new civil and military applications enabled by large-scale networks of underwater devices (e.g., underwater static sensors, unmanned autonomous vehicles (AUVs), and autonomous robots), which can retrieve information from the aquatic and marine environment, perform in-network processing on the extracted data, and transmit the collected information to remote locations. Currently underwater communication systems are inherently hardware-based and rely on closed and inflexible architectural design. This imposes significant challenges into adopting new underwater communication and networking technologies, prevent the provision of truly-differentiated services to highly diverse underwater applications, and induce great barriers to integrate heterogeneous underwater devices. Software-defined networking (SDN), recognized as the next-generation networking paradigm, relies on the highly flexible, programmable, and virtualizable network architecture to dramatically improve network resource utilization, simplify network management, reduce operating cost, and promote innovation and evolution. In this paper, a software-defined architecture, namely SoftWater, is first introduced to facilitate the development of the next-generation underwater communication systems. More specifically, by exploiting the network function virtualization (NFV) and network virtualization concepts, SoftWater architecture can easily incorporate new underwater communication solutions, accordingly maximize the network capacity, can achieve the network robustness and energy efficiency, as well as can provide truly differentiated and scalable networking services. Consequently, the SoftWater architecture can simultaneously support a variety of different underwater applications, and can enable the interoperability of underwater devices from different manufacturers that operate on different underwater communication technologies based on acoustic, optical, or radio waves. Moreover, the essential network management tools of SoftWater are discussed, including reconfigurable multi-controller placement, hybrid in-band and out-of-band control traffic balancing, and utility-optimal network virtualization. Furthermore, the major benefits of SoftWater architecture are demonstrated by introducing software-defined underwater networking solutions, including the throughput-optimal underwater routing, SDN-enhanced fault recovery, and software-defined underwater mobility management. The research challenges to realize the SoftWater are also discussed in detail.
- Published
- 2016
39. Residual-Quantization Based Code Design for Compressing Noisy Sources With Arbitrary Decoder Side Information
- Author
-
Yi-Peng Wei, Song-Jheng Lin, H. Vincent Poor, Shih-Chun Lin, and Hsuan-Jung Su
- Subjects
Source code ,Theoretical computer science ,media_common.quotation_subject ,Quantization (signal processing) ,Variable-length code ,Distributed source coding ,020206 networking & telecommunications ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,01 natural sciences ,Shannon–Fano coding ,0103 physical sciences ,0202 electrical engineering, electronic engineering, information engineering ,Forward error correction ,Electrical and Electronic Engineering ,Low-density parity-check code ,010306 general physics ,Algorithm ,Decoding methods ,Computer Science::Information Theory ,media_common ,Mathematics - Abstract
This paper considers noisy Wyner–Ziv coding (WZC), in which a remote noisy source is compressed with side information at the decoder only. The decoder side information is not limited to being Gaussian, thus this noisy WZC problem cannot be transformed into the conventional one tailored for noiseless sources. A new coding structure, named the residual-quantization (RQ) based noisy WZC, is proposed to solve the problem. This scheme explicitly constructs the theoretical auxiliary random variable to facilitate optimal reconstruction of the noisy source. In this two-stage encoder, the noisy source is quantized twice and the quantization error (residue) of the first stage is the input of the second stage. By sending only the quantization index of the second stage to the decoder, the corresponding code rate can theoretically approach the noisy WZC bound. Moreover, the RQ-based noisy WZC is implemented using graph-based codes. The main challenge is that it is necessary to design a codebook that is simultaneously good for source and channel coding for the first stage quantization, since this quantization code also acts as a channel code at the decoder. This problem is solved by constructing a low-density parity check (LDPC) code with edge degrees optimized for channel coding, and enhancing its performance for source coding by using a modified reinforced belief-propagation quantization algorithm. Simulation results show that the noisy Wyner-Ziv bounds can be practically approached by our implementation. In addition, the proposed implementation offers more flexibility in the code rates compared with the existing practical designs, making it more suitable for emerging applications such as fronthaul compression.
- Published
- 2016
40. To avoid or not to avoid CSI leakage in physical layer secret communication systems
- Author
-
Y.-W. Peter Hong, Pin-Hsun Lin, Shih-Chun Lin, Ta-Yuan Liu, and Eduard A. Jorswieck
- Subjects
Signal processing ,Channel code ,Computer Networks and Communications ,Computer science ,business.industry ,Transmitter ,Physical layer ,Data_CODINGANDINFORMATIONTHEORY ,Communications system ,Backward compatibility ,Computer Science Applications ,Electronic engineering ,Electrical and Electronic Engineering ,business ,Computer Science::Cryptography and Security ,Computer Science::Information Theory ,Channel use ,Leakage (electronics) ,Computer network - Abstract
Physical layer secrecy has attracted much attention in recent years due to its ability to ensure communication secrecy with the use of channel coding and signal processing techniques (and without the explicit use of secret keys) in the physical layer. It serves as a promising technique for highly dynamic or ad hoc systems such as device-to-device and machine-type communication systems. However, the achievable secrecy performance depends highly on the level of CSI at the transmitter, the receiver, and the eavesdropper. In this article, we discuss how different levels of CSI resulting from conventional and unconventional ways of performing training and channel feedback may affect the confidentiality in terms of the information-theoretic (perfect) secrecy rate. The conventional approach refers to the emission of pilot signals from the transmitter and explicit channel feedback from the receiver. This approach is backward compatible with existing systems and allows the receiver to obtain accurate knowledge of the CSI, but may suffer from CSI leakage toward the eavesdropper. Unconventional approaches capitalize on reverse training to prevent CSI leakage and are shown to achieve significant improvements over conventional schemes in certain cases. For example, in a system with four transmit antennas and a single antenna at both the receiver and the eavesdropper, a secrecy rate gain of approximately 0.8 b/channel use at transmit SNR of 16 dB is observed over the full CSI case by providing CSI only to the transmitter (but not the receiver and the eavesdropper).
- Published
- 2015
41. Wireless software-defined networks (W-SDNs) and network function virtualization (NFV) for 5G cellular systems: An overview and qualitative evaluation
- Author
-
Ian F. Akyildiz, Pu Wang, and Shih-Chun Lin
- Subjects
Computer Networks and Communications ,Computer science ,business.industry ,Wireless network ,Distributed computing ,Provisioning ,Wireless WAN ,Cloud computing ,Forwarding plane ,Cellular network ,Wireless ,The Internet ,Routing control plane ,business ,Software-defined networking ,Heterogeneous network ,Computer network - Abstract
Cellular network technologies have evolved to support the ever-increasing wireless data traffic, which results from the rapidly-evolving Internet and widely-adopted cloud applications over wireless networks. However, hardware-based designs, which rely on closed and inflexible architectures of current cellular systems, make a typical 10-year cycle for a new generation of wireless networks to be standardized and deployed. To overcome this limitation, the concept of software-defined networking (SDN) has been proposed to efficiently create centralized network abstraction with the provisioning of programmability over the entire network. Moreover, the complementary concept of network function virtualization (NFV) has been further proposed to effectively separate the abstraction of functionalities from the hardware by decoupling the data forwarding plane from the control plane. These two concepts provide cellular networks with the needed flexibility to evolve and adapt according to the ever-changing network context and introduce wireless software-defined networks (W-SDNs) for 5G cellular systems. Thus, there is an urgent need to study the fundamental architectural principles underlying a new generation of software-defined cellular network as well as the enabling technologies that supports and manages such emerging architecture. In this paper, first, the state-of-the-art W-SDNs solutions along with their associated NFV techniques are surveyed. Then, the key differences among these W-SDN solutions as well as their limitations are highlighted. To counter those limitations, SoftAir, a new SDN architecture for 5G cellular systems, is introduced.
- Published
- 2015
42. SDN-Based Architecture for Providing Reliable Internet of Things Connectivity in 5G Systems
- Author
-
Luis Tello-Oquendo, Shih-Chun Lin, Ian F. Akyildiz, Vicent Pla, School of Electrical and Computer Engineering - Georgia Insitute of Technology (ECE GeorgiaTech), Georgia Institute of Technology [Atlanta], Universitat Politècnica de València (UPV), North Carolina State University [Raleigh] (NC State), University of North Carolina System (UNC), Luigi Paura, Sergio Palazzo, TC 6, WG 6.8, and Turner, Joe
- Subjects
business.industry ,Computer science ,020302 automobile design & engineering ,020206 networking & telecommunications ,Throughput ,02 engineering and technology ,[INFO] Computer Science [cs] ,0203 mechanical engineering ,0202 electrical engineering, electronic engineering, information engineering ,Wireless ,[INFO]Computer Science [cs] ,Architecture ,Radio access ,Internet of Things ,business ,Wireless sensor network ,5G ,Energy (signal processing) ,Computer network - Abstract
Session F: Service provision; International audience; —Sheer number of devices in Internet of Things (IoTs) fundamentally challenge the ubiquitous information transmissions through the backbone networks, such as cellular systems. The heterogeneity of IoT devices and the hardware-based, inflexible cellular architectures impose even greater challenges to enable efficient communication. To address these challenges, this paper introduces the so-called SoftAir architecture on wireless software-defined networking and proposes software-defined gateways (SD-GWs) that jointly optimize cross-layer communication function-alities between heterogeneous IoT devices and cellular systems. First, the SoftAir architecture is proposed to support a unified software-defined platform for quality-of-service aware IoT systems and software-defined radio access networks (SD-RANs) with millimeter-wave transmissions. Next, the SD-GWs are designed in SoftAir to explore the interactions between two-types of networks (i.e., IoTs and SD-RANs) and enable cross-layer solutions that simultaneously achieve optimal energy savings and throughput gain in IoTs and maximum sum-rates in SD-RANs. Simulation results validate that our SoftAir solutions surpass classical IoT schemes by jointly optimizing communication functionalities for both IoTs and SD-RANs and bring significant system synergies for reliable 5G IoT communication.
- Published
- 2018
43. Energy-Efficient Non-Orthogonal Transmission under Reliability and Finite Blocklength Constraints
- Author
-
Gang Zhu, Yajun Zhao, Yanqing Xu, Chao Shen, Shih-Chun Lin, and Tsung-Hui Chang
- Subjects
FOS: Computer and information sciences ,Mathematical optimization ,Computer science ,Information Theory (cs.IT) ,Computer Science - Information Theory ,Time division multiple access ,020206 networking & telecommunications ,020302 automobile design & engineering ,02 engineering and technology ,Non orthogonal ,Channel capacity ,0203 mechanical engineering ,Single antenna interference cancellation ,Telecommunications link ,0202 electrical engineering, electronic engineering, information engineering ,Communication channel ,Efficient energy use ,Computer Science::Information Theory - Abstract
This paper investigates an energy-efficient non-orthogonal transmission design problem for two downlink receivers that have strict reliability and finite blocklength (latency) constraints. The Shannon capacity formula widely used in traditional designs needs the assumption of infinite blocklength and thus is no longer appropriate. We adopt the newly finite blocklength coding capacity formula for explicitly specifying the trade-off between reliability and code blocklength. However, conventional successive interference cancellation (SIC) may become infeasible due to heterogeneous blocklengths. We thus consider several scenarios with different channel conditions and with/without SIC. By carefully examining the problem structure, we present in closed-form the optimal power and code blocklength for energy-efficient transmissions. Simulation results provide interesting insights into conditions for which non-orthogonal transmission is more energy efficient than the orthogonal transmission such as TDMA., accepted by IEEE GlobeCom workshop on URLLC, 2017
- Published
- 2017
44. Distributed Cross-Layer Protocol Design for Magnetic Induction Communication in Wireless Underground Sensor Networks
- Author
-
Zhi Sun, Ian F. Akyildiz, Pu Wang, and Shih-Chun Lin
- Subjects
business.industry ,Computer science ,Applied Mathematics ,Quality of service ,Throughput ,Cross-layer optimization ,Computer Science Applications ,Wireless ,Upstream (networking) ,Electrical and Electronic Engineering ,business ,Wireless sensor network ,Protocol (object-oriented programming) ,Communication channel ,Computer network - Abstract
Wireless underground sensor networks (WUSNs) enable many applications such as underground pipeline monitoring, power grid maintenance, mine disaster prevention, and oil upstream monitoring among many others. While the classical electromagnetic waves do not work well in WUSNs, the magnetic induction (MI) propagation technique provides constant channel conditions via small size of antenna coils in the underground environments. In this paper, instead of adopting currently layered protocols approach, a distributed cross-layer protocol design is proposed for MI-based WUSNs. First, a detailed overview is given for different communication functionalities from physical to network layers as well as the QoS requirements of applications. Utilizing the interactions of different layer functionalities, a distributed environment-aware protocol, called DEAP, is then developed to satisfy statistical QoS guarantees and achieve both optimal energy savings and throughput gain concurrently. Simulations confirm that the proposed cross-layer protocol achieves significant energy savings, high throughput efficiency and dependable MI communication for WUSNs.
- Published
- 2015
45. Secure Degrees of Freedom of MIMO Rayleigh Block Fading Wiretap Channels With No CSI Anywhere
- Author
-
Y.-W. Peter Hong, Pritam Mukherjee, Sennur Ulukus, Ta-Yuan Liu, and Shih-Chun Lin
- Subjects
Discrete mathematics ,Wiretap channels ,Applied Mathematics ,MIMO ,Transmitter ,Computer Science Applications ,symbols.namesake ,Control theory ,Channel state information ,symbols ,Coherence (signal processing) ,Fading ,Electrical and Electronic Engineering ,Rayleigh scattering ,Mathematics ,Rayleigh fading - Abstract
We consider the block Rayleigh fading multiple-input multiple-output (MIMO) wiretap channel with no prior channel state information (CSI) available at any of the terminals. The channel gains remain constant within a coherence interval of $T$ symbols, and then change to another independent realization in the next coherence interval. The transmitter, the legitimate receiver, and the eavesdropper have $n_{t}$ , $n_{r}$ , and $n_{e} $ antennas, respectively. We determine the exact secure degrees of freedom (s.d.o.f.) of this system when $T\geq 2\min(n_{t},n_{r} )$ . We show that, in this case, the s.d.o.f. is exactly equal to $(\min(n_{t},n_{r})-n_{e})^{+}(T-\min(n_{t},n_{r} ))/T$ . The first term in this expression can be interpreted as the eavesdropper with $n_{e}$ antennas taking away $n_{e} $ antennas from both the transmitter and the legitimate receiver. The second term can be interpreted as a fraction of the s.d.o.f. being lost due to the lack of CSI at the legitimate receiver. In particular, the fraction loss, $\min(n_{t},n_{r} ) /T$ , can be interpreted as the fraction of channel uses dedicated to training the legitimate receiver for it to learn its own CSI. We prove that this s.d.o.f. can be achieved by employing a constant norm channel input, which can be viewed as a generalization of discrete signalling to multiple dimensions.
- Published
- 2015
46. Correlates of depressive symptoms in late middle-aged Taiwanese women: findings from the 2009 Taiwan National Health Interview Survey
- Author
-
Malcolm Koo, Kun-Wei Tsai, and Shih-Chun Lin
- Subjects
Adult ,medicine.medical_specialty ,Health surveys ,Health Status ,Population ,Middle-aged ,Health Behavior ,Reproductive medicine ,Taiwan ,Logistic regression ,lcsh:Gynecology and obstetrics ,Climacteric symptoms ,03 medical and health sciences ,0302 clinical medicine ,Risk Factors ,Secondary analysis ,Surveys and Questionnaires ,Odds Ratio ,Medicine ,National Health Interview Survey ,Humans ,030212 general & internal medicine ,Psychiatry ,education ,Depressive symptoms ,lcsh:RG1-991 ,Psychiatric Status Rating Scales ,education.field_of_study ,Menopausal symptoms ,business.industry ,Depressive disorder ,Depression ,lcsh:Public aspects of medicine ,Obstetrics and Gynecology ,lcsh:RA1-1270 ,General Medicine ,Odds ratio ,Middle Aged ,Reproductive Medicine ,Socioeconomic Factors ,Female ,Menopause ,Climacteric ,business ,030217 neurology & neurosurgery ,Stress, Psychological ,Demography ,Research Article - Abstract
Background Previous studies have shown that depressive symptoms in middle-aged women were associated with a number of factors such as climacteric symptoms. Nevertheless, studies based on population-based data with a wide range of potential correlates are still scarce. Therefore, the aim of this study was to investigate the correlates of depressive symptoms in late middle-aged Taiwanese women using data from a nationally-representative, population-based survey. Methods Women aged 50.0–65.0 years were identified from the dataset of the 2009 Taiwan National Health Interview Survey. The outcome measure was depressive symptoms in the past week, evaluated using the Center for Epidemiologic Studies Short Depression Scale (CES-D 10) with a cut-off score of 10 or greater. Univariate and multiple logistic regression analyses were used to evaluate the correlates of depressive symptoms. Results The mean age of the 533 respondents was 56.7 years. Depressive symptoms were present in 53 respondents (9.9%). Multiple logistic regression analysis revealed that an education level of elementary school or below (adjusted odds ratio [AOR] = 3.19, P = 0.003), nulliparity (AOR = 8.10, P = 0.001), living alone (AOR = 5.47, P = 0.003), never having worked (AOR = 4.14, P = 0.008), lack of regular exercise (AOR = 3.01, P = 0.003), a perceived health status of fair or bad (AOR = 4.34, P
- Published
- 2017
47. High Immunoreactivity of DUOX2 Is Associated With Poor Response to Preoperative Chemoradiation Therapy and Worse Prognosis in Rectal Cancers
- Author
-
Pei-Ling Hsieh, Yu-Feng Tian, Ching-Chieh Yang, Shih-Chun Lin, Ding-Ping Sun, Hong-Lin He, Ching-Yih Lin, Ming-Jen Sheu, Li-Ching Lin, and I-Wei Chang
- Subjects
0301 basic medicine ,Oncology ,medicine.medical_specialty ,Colorectal cancer ,medicine.disease_cause ,dual oxidase 2 ,chemoradiotherapy ,03 medical and health sciences ,0302 clinical medicine ,Internal medicine ,medicine ,rectal cancer ,CCRT ,DUOX2 ,Univariate analysis ,business.industry ,Hazard ratio ,Cancer ,medicine.disease ,Confidence interval ,030104 developmental biology ,Tumor progression ,030220 oncology & carcinogenesis ,Carcinogenesis ,business ,Chemoradiotherapy ,Research Paper - Abstract
Purpose: Colorectal cancer is the third most common cancer and also the fourth most common cause of cancer mortality worldwide. For rectal cancer, neoadjuvant concurrent chemoradiotherapy (CCRT) followed by radical proctectomy is gold standard treatment for patients with stage II/III rectal cancer. By data mining a documented database of rectal cancer transcriptome (GSE35452) from Gene Expression Omnibus, National Center of Biotechnology Information, we recognized that DUOX2 was the most significantly up-regulated transcript among those related to cytokine and chemokine mediated signaling pathway (GO:0019221). Hence, the aim of this study was to assess the DUOX2 expression level and its clinicopathological correlation and prognostic significance in patients of rectal cancer. Materials and Methods: DUOX2 immunostain was performed in 172 rectal adenocarcinomas treated with preoperative CCRT followed by radical proctectomy, which were divided into high- and low-expression subgroups. Furthermore, statistical analyses were examined to correlate the relationship between DUOX2 immunoreactivity and important clinical and pathological characteristics, as well as three survival indices: disease-specific survival (DSS), local recurrence-free survival (LRFS) and metastasis-free survival (MeFS). Results: DUOX2 overexpression was linked to post-CCRT tumor advancement, pre- and post-CCRT nodal metastasis and poor response to CCRT (all P ≤ 0.021). Furthermore, DUOX2 high expression was significantly associated with inferior DSS, LRFS and MeFS in univariate analysis (P ≤ 0.0097) and also served as an independent prognosticator indicating shorter DSS and LRFS interval in multivariate analysis (hazard ratio (HR) = 3.413, 95% confidence interval (CI): 1.349-8.633; HR = 4.533, 95% CI: 1.499-13.708, respectively). Conclusion: DUOX2 may play a pivotal role in carcinogenesis, tumor progression and response to neoadjuvant CCRT in rectal cancers, and serve as a novel prognostic biomarker. Additional researches to clarify the molecular and biochemical pathways are essential for developing promising DUOX2-targeted therapies for patients with rectal cancers.
- Published
- 2017
48. Implementation of a High-Throughput Modified Merge Sort in MIMO Detection Systems
- Author
-
Hou-Ming Chen, Hung-Lieh Chen, Robert Chen-Hao Chang, Yu-Ya Gao, Ming-Fan Wei, Shih-Chun Lin, and Kuang-Hao Lin
- Subjects
3G MIMO ,Sorting algorithm ,Computer science ,business.industry ,MIMO ,Real-time computing ,Chip ,WiMAX ,Wireless ,Electrical and Electronic Engineering ,Merge sort ,business ,Throughput (business) ,Computer hardware - Abstract
Wireless communication technology continues to advance at a rapid pace, and researchers have made tremendous progress in extending single-input single-output (SISO) systems to multiple-input multiple-output (MIMO) systems such as IEEE 802.11n, WiMAX, and LTE. However, a MIMO system requires a detector circuit to separate received data. To reduce the number of comparators required, the method of modified merge sort is proposed, and the results are compared with those of five sorting algorithms. This modified merge sort requires approximately 56% fewer comparators than a bitonic merge sort and approximately 46% fewer comparators than an odd-even merge sort. When implemented in a TSMC 0.18-μm process, the proposed chip demonstrates a throughput of up to 1200 Mbps at an operating frequency of 150 MHz.
- Published
- 2014
49. Multiuser Lattice Coding for the Multiple-Access Relay Channel
- Author
-
H. Vincent Poor, Shih-Chun Lin, Hsuan-Jung Su, and Chung Pi Lee
- Subjects
Theoretical computer science ,Computer science ,Applied Mathematics ,Physics::Medical Physics ,Codebook ,Data_CODINGANDINFORMATIONTHEORY ,Computer Science Applications ,law.invention ,Computer engineering ,Relay ,law ,Lattice (order) ,Coset ,Electrical and Electronic Engineering ,Decoding methods ,Relay channel ,Computer Science::Information Theory ,Coding (social sciences) ,Communication channel - Abstract
This paper considers the multiantenna multiple-access relay channel (MARC), in which multiple users transmit messages to a common destination with the assistance of a relay. In a variety of MARC settings, the dynamic decode-and-forward (DDF) protocol is very useful due to its outstanding rate performance. However, the lack of good structured codebooks so far hinders practical applications of DDF for MARC. In this work, two classes of structured MARC codes are proposed: 1) one-to-one relay-mapper-aided multiuser lattice coding (O-MLC); and 2) modulo-sum relay-mapper-aided multiuser lattice coding (MS-MLC). The former enjoys better rate performance, whereas the latter provides more flexibility to tradeoff between the complexity of the relay mapper and the rate performance. It is shown that, in order to approach the rate performance achievable by an unstructured codebook with maximum-likelihood decoding, it is crucial to use a new K-stage coset decoder for structured O-MLC instead of the one-stage decoder proposed in previous works. However, if O-MLC is decoded with the one-stage decoder only, it can still achieve the optimal DDF diversity-multiplexing gain tradeoff in the high signal-to-noise ratio regime. As for MS-MLC, its rate performance can approach that of the O-MLC by increasing the complexity of the modulo-sum relay-mapper. Finally, for practical implementations of both O-MLC and MS-MLC, practical short-length lattice codes with linear mappers are designed, which facilitate efficient lattice decoding. Simulation results show that the proposed coding schemes outperform existing schemes in terms of outage probabilities in a variety of channel settings, especially when the users-to-relay links are better than the other channel links.
- Published
- 2014
50. Spectrum-Map-Empowered Opportunistic Routing for Cognitive Radio Ad Hoc Networks
- Author
-
Kwang-Cheng Chen and Shih-Chun Lin
- Subjects
Routing protocol ,Transmission delay ,Computer Networks and Communications ,Computer science ,Network packet ,business.industry ,Wireless ad hoc network ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Aerospace Engineering ,Spectral efficiency ,law.invention ,Cognitive radio ,Relay ,law ,Automotive Engineering ,Overhead (computing) ,Electrical and Electronic Engineering ,business ,Multipath propagation ,Computer network - Abstract
Cognitive radio (CR) has emerged as a key technology for enhancing spectrum efficiency by creating opportunistic transmission links. Supporting the routing function on top of opportunistic links is a must for transporting packets in a CR ad hoc network (CRAHN) consisting of cooperative relay multi-radio systems. However, there lacks a thorough understanding of these highly dynamic opportunistic links and a reliable end-to-end transportation mechanism over the network. Aspiring to meet this need, with innovative establishment of the spectrum map from local sensing information, we first provide a mathematical analysis to deal with transmission delay over such opportunistic links. Benefitting from the theoretical derivations, we then propose spectrum-map-empowered opportunistic routing protocols for regular and large-scale CRAHNs with wireless fading channels, employing a cooperative networking scheme to enable multipath transmissions. Simulations confirm that our solutions enjoy significant reduction of end-to-end delay and achieve dependable communications for CRAHNs, without commonly needed feedback information from nodes in a CRAHN to significantly save the communication overhead at the same time.
- Published
- 2014
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.