Zum Hauptinhalt springen

Showing 1–11 of 11 results for author: Kurniawan, E

Searching in archive cs. Search in all archives.
.
  1. arXiv:2312.16064  [pdf, other

    cs.NI eess.SP

    Goal-Oriented Integration of Sensing, Communication, Computing, and Control for Mission-Critical Internet-of-Things

    Authors: Jie Cao, Ernest Kurniawan, Amnart Boonkajay, Sumei Sun, Petar Popovski, Xu Zhu

    Abstract: Driven by the development goal of network paradigm and demand for various functions in the sixth-generation (6G) mission-critical Internet-of-Things (MC-IoT), we foresee a goal-oriented integration of sensing, communication, computing, and control (GIS3C) in this paper. We first provide an overview of the tasks, requirements, and challenges of MC-IoT. Then we introduce an end-to-end GIS3C architec… ▽ More

    Submitted 1 January, 2024; v1 submitted 26 December, 2023; originally announced December 2023.

  2. arXiv:2312.15454  [pdf, other

    cs.IT eess.SY

    Risk-Aware and Energy-Efficient AoI Optimization for Multi-Connectivity WNCS with Short Packet Transmissions

    Authors: Jie Cao, Xu Zhu, Sumei Sun, Ernest Kurniawan, Amnart Boonkajay

    Abstract: Age of Information (AoI) has been proposed to quantify the freshness of information for emerging real-time applications such as remote monitoring and control in wireless networked control systems (WNCSs). Minimization of the average AoI and its outage probability can ensure timely and stable transmission. Energy efficiency (EE) also plays an important role in WNCSs, as many devices are featured by… ▽ More

    Submitted 1 January, 2024; v1 submitted 24 December, 2023; originally announced December 2023.

  3. arXiv:2205.10581  [pdf

    cs.LG eess.SP

    Evaluating Performance of Machine Learning Models for Diabetic Sensorimotor Polyneuropathy Severity Classification using Biomechanical Signals during Gait

    Authors: Fahmida Haque, Mamun Bin Ibne Reaz, Muhammad Enamul Hoque Chowdhury, Serkan Kiranyaz, Mohamed Abdelmoniem, Emadeddin Hussein, Mohammed Shaat, Sawal Hamid Md Ali, Ahmad Ashrif A Bakar, Geetika Srivastava, Mohammad Arif Sobhan Bhuiyan, Mohd Hadri Hafiz Mokhtar, Edi Kurniawan

    Abstract: Diabetic sensorimotor polyneuropathy (DSPN) is one of the prevalent forms of neuropathy affected by diabetic patients that involves alterations in biomechanical changes in human gait. In literature, for the last 50 years, researchers are trying to observe the biomechanical changes due to DSPN by studying muscle electromyography (EMG), and ground reaction forces (GRF). However, the literature is co… ▽ More

    Submitted 21 May, 2022; originally announced May 2022.

    Comments: 17 pages, 15 figures, 8 tables

  4. Performance Measurement of Security Academic Information System using Maturity Level

    Authors: Endang Kurniawan, Imam Riadi, Amin Irmawan, Arusani

    Abstract: This study aims to information security in academic information systems to provide recommendations for improvements in information security management by the expected maturity level based on ISO/IEC 27002:2013. By using a qualitative descriptive approach, data collection and validation techniques with triangulation techniques are interviews, observation, and documentation. The data were analyzed b… ▽ More

    Submitted 17 April, 2022; originally announced April 2022.

    Report number: 2204.09511

    Journal ref: 2022/04

  5. arXiv:1802.03613   

    cs.CY

    Security level analysis of academic information systems based on standard ISO 27002:2003 using SSE-CMM

    Authors: Endang Kurniawan, Imam Riadi

    Abstract: This research was conducted to find out the level of information security in an organization to give recommendations improvements in information security management at the organization. This research uses the ISO 27002 by involving the entire clause that exists in ISO 27002 check-lists. Based on the analysis results, 13 objective controls and 43 security controls were scattered in 3 clauses of ISO… ▽ More

    Submitted 30 May, 2018; v1 submitted 10 February, 2018; originally announced February 2018.

    Comments: arXiv admin note: submission has been withdrawn by arXiv administrators due to inappropriate overlap with external sources

  6. arXiv:1512.05068  [pdf, ps, other

    cs.IT

    Principal Component Analysis (PCA)-based Massive-MIMO Channel Feedback

    Authors: Jingon Joung, Ernest Kurniawan, Sumei Sun

    Abstract: Channel-state-information (CSI) feedback methods are considered, especially for massive or very large-scale multiple-input multiple-output (MIMO) systems. To extract essential information from the CSI without redundancy that arises from the highly correlated antennas, a receiver transforms (sparsifies) a correlated CSI vector to an uncorrelated sparse CSI vector by using a Karhunen-Loeve transform… ▽ More

    Submitted 16 December, 2015; originally announced December 2015.

    Comments: 10 pages, 5 figures

  7. arXiv:1303.7034  [pdf, ps, other

    cs.IT

    Energy Efficient Cooperative Strategies for Relay-Assisted Downlink Cellular Systems Part II: Practical Design

    Authors: Stefano Riniy, Ernest Kurniawan, Levan Ghaghanidze, Andrea Goldsmith

    Abstract: In a companion paper [1], we present a general approach to evaluate the impact of cognition in a downlink cellular system in which multiple relays assist the transmission of the base station. This approach is based on a novel theoretical tool which produces transmission schemes involving rate-splitting, superposition coding and interference decoding for a network with any number of relays and rece… ▽ More

    Submitted 28 March, 2013; originally announced March 2013.

  8. arXiv:1204.2083  [pdf, other

    cs.IT

    Primary Rate-Splitting Achieves Capacity for the Gaussian Cognitive Interference Channel

    Authors: Stefano Rini, Ernest Kurniawan, Andrea Goldsmith

    Abstract: The cognitive interference channel models cognitive overlay radio systems, where cognitive radios overhear the transmission of neighboring nodes. Capacity for this channel is not known in general. For the Gaussian case capacity is known in three regimes, usually denoted as the "weak interference", "very strong interference" and "primary decodes cognitive". This paper provides a new capacity result… ▽ More

    Submitted 10 April, 2012; originally announced April 2012.

  9. arXiv:1203.4844   

    cs.IT

    Practical Coding Schemes for Cognitive Overlay Radios

    Authors: Ernest Kurniawan, Andrea Goldsmith, Stefano Rini

    Abstract: We develop practical coding schemes for the cognitive overlay radios as modeled by the cognitive interference channel, a variation of the classical two user interference channel where one of the transmitters has knowledge of both messages. Inspired by information theoretical results, we develop a coding strategy for each of the three parameter regimes where capacity is known. A key feature of the… ▽ More

    Submitted 8 June, 2012; v1 submitted 21 March, 2012; originally announced March 2012.

    Comments: Patent pending

  10. arXiv:1005.2443  [pdf, ps, other

    cs.IT

    Network Coded Transmission of Fountain Codes over Cooperative Relay Networks

    Authors: E. Kurniawan, S. Sun, K. Yen, K. F. E. Chong

    Abstract: In this paper, a transmission strategy of fountain codes over cooperative relay networks is proposed. When more than one relay nodes are available, we apply network coding to fountain-coded packets. By doing this, partial information is made available to the destination node about the upcoming message block. It is therefore able to reduce the required number of transmissions over erasure channels,… ▽ More

    Submitted 13 May, 2010; originally announced May 2010.

  11. arXiv:1001.1798  [pdf, ps, other

    cs.IT math.CO

    Fountain Codes with Varying Probability Distributions

    Authors: Kai Fong Ernest Chong, Ernest Kurniawan, Sumei Sun, Kai Yen

    Abstract: Fountain codes are rateless erasure-correcting codes, i.e., an essentially infinite stream of encoded packets can be generated from a finite set of data packets. Several fountain codes have been proposed recently to minimize overhead, many of which involve modifications of the Luby transform (LT) code. These fountain codes, like the LT code, have the implicit assumption that the probability distri… ▽ More

    Submitted 7 April, 2010; v1 submitted 12 January, 2010; originally announced January 2010.

    Comments: 5 pages, 1 figure. Changes, including a different simulation example in Section IV, are made to improve clarity. Theory remains unchanged. Resubmitted to the 6th International Symposium on Turbo Codes & Iterative Information Processing (ISTC 2010).

    MSC Class: 94B60; 06A06