Last 7 days
Bookmark and Share    
Full Text
Peer Reviewed
See detailLast Man Standing: Battle Royale Games Through the Lens of Self-Determination Theory
Fernandez de Henestrosa, Martha UL; Billieux, Joël; Melzer, André UL

in Games and Culture (2022), 0(0), 1-22

The highly popular video game genre of Battle Royale (BR) games is characterized by survival and exploration elements that feature a last-man-standing gameplay, thus, motivating players to be the final ... [more ▼]

The highly popular video game genre of Battle Royale (BR) games is characterized by survival and exploration elements that feature a last-man-standing gameplay, thus, motivating players to be the final contestant in the game. Drawing on the Self-Determination Theory the present study investigated the role of personal values, psychological needs and well-being in a self-selected sample of 303 BR gamers recruited online. The association between players’ value orientation and well-being was found contingent on players’ BR gaming experience and their need for relatedness. Whereas frequent interaction with this game genre was associated with the basic psychological need satisfaction of autonomy and relatedness, player preference for BR games was related to their need of competence and autonomy. The present study supports the importance of exploring player motives and provides initial insights into the association between BR gaming and basic psychological needs. [less ▲]

Full Text
Peer Reviewed
See detailAging under the lens of culture - Universal and specific perspectives
Albert, Isabelle UL

in GeroPsych: Journal of Gerontopsychology and Geriatric Psychiatry (2022), 35(2), 51-53

Population aging is a phenomenon not restricted to Western societies but observed the world over. Currently, according to estimates by the United Nations, 727 million persons are aged 65 years or older ... [more ▼]

Population aging is a phenomenon not restricted to Western societies but observed the world over. Currently, according to estimates by the United Nations, 727 million persons are aged 65 years or older worldwide, and by 2050 these numbers will have increased to over 1.5 billion, so that by midcentury one in six persons will be 65 years or older (UN, 2020). Interestingly, while some European countries (such as Germany and Italy) and Japan were among the first to take note of their aging population, large increases in the share of older people in their populations are expected for many other countries around the globe in the coming years, especially in Eastern and Southeastern Asia (UN, 2020). Population aging is thus clearly a global trend, although high variability still exists regarding life expectancies and living conditions. What is not yet fully understood is how experiences of aging are similar or differ across cultures, as aging research draws still mostly on findings from North American and Western European cultures (Fung, 2013). Many societies are not only becoming older but also more culturally diverse, and at the same time, globalization is bringing people from different cultural contexts closer to formerly lesser-known realities. The need is therefore increasing to determine the universals of aging across cultures and societies and to explain culture-specific differences (Albert & Tesch-Römer, 2019). The focus on developmental tasks prevalent in most cultural contexts could shed light on the different ways people use to tackle specific challenges in older age according to the sociocultural contexts in their living environment (Fung & Jiang, 2016). Different developmental pathways could thus channel development over the whole lifespan, and culturally formed experiences could accumulate until later life (Greenfield et al., 2003; Valsiner, 1996). That is the starting point of the present special issue on the nexus of aging and culture. Central questions are: How is subjective well-being regulated within the context of cultural diversity? How are care and assistance negotiated in non-Western contexts and how can the notion of culture be conceptualized and applied empirically? [less ▲]

Full Text
See detailLes Luxembourg et le comté de Hainaut (milieu XIIIe-milieu XIVe siècle)
Pettiau, Hérold UL

Speeches/Talks (2022)

Cette conférence a pour objet de rouvrir et d’explorer plusieurs dossiers concernant les relations entretenues entre les membres de la dynastie comtale des Luxembourg et le comté de Hainaut dans une ... [more ▼]

Cette conférence a pour objet de rouvrir et d’explorer plusieurs dossiers concernant les relations entretenues entre les membres de la dynastie comtale des Luxembourg et le comté de Hainaut dans une période d’environ un siècle qui fut cruciale pour les deux principautés. En effet elle vit d’une part les comtes de Luxembourg s’affirmer dans le cadre régional de l’ancienne Lotharingie puis, à partir de la première décennie du XIVe siècle, à un niveau européen, avec l’accession d’Henri VII au trône d’Allemagne (en 1308) puis à l’empire (en 1312) ainsi que celle de son fils Jean au trône de Bohême (à partir de 1310). Le comté de Hainaut quant à lui forme à partir de 1299 une principauté composite, réunissant les comtés de Hainaut, de Hollande et de Zélande sous l’autorité du comte Jean d’Avesnes. Ces relations entre les Luxembourg et les Avesnes sont d’ordre dynastique. En guise d’introduction, nous en retracerons les grandes lignes, initiées dans la première moitié du XIIIe siècle dans le double contexte de la rivalité entre les familles d’Avesnes et Dampierre et des prétentions des comtes luxembourgeois à l’héritage namurois d’Henri IV, et marquées à partir de 1264 par des unions entre d’une part le futur comte Henri VI de Luxembourg et Béatrice, fille de Baudouin d’Avesnes, et d’autre part entre Philippa, fille aînée d’Henri V de Luxembourg avec Jean, futur comte de Hainaut. Ces unions inaugureront des liens durables entre les deux familles. Dans un second temps, nous nous efforcerons d’étudier l’évolution de ces relations sous le règne d’Henri VII, né à Valenciennes, puis de son fils Jean, roi de Bohême et comte de Luxembourg à partir de 1310 († 1346) avec les comtes Jean d’Avesnes († 1304), et ses successeurs Guillaume Ier († 1337) et Guillaume II († 1345) ainsi qu’avec leur parent Jean de Hainaut, seigneur de Beaumont († 1356). Ceci sous un angle politique, particulièrement dans les années 1332-1334 dans le cadre de l’alliance qui unit les deux comtes avec d’autres princes lotharingiens contre le duc de Brabant mais aussi plus généralement dans le contexte de l’opposition croissante entre France et Angleterre. Cependant, l’on s’attardera surtout sur la dimension patrimoniale vu que ces relations impliquent la création d’un fief luxembourgeois en Hainaut qui subsistera jusqu’au moins 1372. Nous en retracerons les vicissitudes illustrées par les actes conservés dans chartes et cartulaires hainuyers et luxembourgeois. Enfin, nous allons nous concentrer sur la dimension économique et patrimoniale de ces possessions, documentée par une série de comptes, de recettes de revenus, pour la plupart inédits. Très riches, ces comptes constituent une véritable mine d’or dans une perspective d’histoire locale. Cependant, nous les aborderons sous un angle différent, celui de l’histoire documentaire et des (possibles) transferts culturels entre principautés, dans la mesure où de telles sources, abondantes en Hainaut, sont extrêmement rares avant le dernier quart du XIVe siècle dans le comté puis duché de Luxembourg. Leur étude complète celle des actes et nous renseigne aussi sur l’évolution des relations entre princes hainuyers et luxembourgeois. [less ▲]

Full Text
Peer Reviewed
See detailDriver’s Face Pose Estimation Using Fine-Grained Wi-Fi Signals for Next-Generation Internet of Vehicles
Akhtar, Zain ul Abidin; Rassol, Hafiz Faiz; Asif, Muhammad et al

in Wireless Communications and Mobile Computing (2022), 2022

Driver’s behavior and gesture recognition are most significant in the emerging next-generation vehicular technology. Driver’s face may provide important cues about his/her attention and fatigue behavior ... [more ▼]

Driver’s behavior and gesture recognition are most significant in the emerging next-generation vehicular technology. Driver’s face may provide important cues about his/her attention and fatigue behavior. Therefore, driver’s face pose is one of the key indicators to be considered for automatic driver monitoring system in next-generation Internet of Vehicles (IoV) technology. Driver behavior monitoring is most significant in order to reduce road accidents. This paper aims to address the problem of driver’s attentiveness monitoring using face pose estimation in a nonintrusive manner. The proposed system is based on wireless sensing, leveraging channel state information (CSI) of WiFi signals. In this paper, we present a novel classification algorithm that is based on the combination of support vector machine (SVM) and K nearest neighbor (KNN) to enhance the classification accuracy. Experimental results demonstrate that the proposed device-free wireless implementation can localize a driver’s face very accurately with an average recognition rate of 91:8%. [less ▲]

Full Text
Peer Reviewed
See detailA Cost-Effective Identity-Based Signature Scheme for Vehicular Ad Hoc Network Using Hyperelliptic Curve Cryptography
Iqbal, Asad; Ullah, Insaf; AlSanad, Abeer Abdulaziz et al

in Wireless Communications and Mobile Computing (2022)

A Vehicular Ad Hoc Network (VANET) is a subset of the Mobile Ad Hoc Network (MANET) that allows vehicles to communicate with each other and with roadside stations to offer efficient and safe ... [more ▼]

A Vehicular Ad Hoc Network (VANET) is a subset of the Mobile Ad Hoc Network (MANET) that allows vehicles to communicate with each other and with roadside stations to offer efficient and safe transportation. Furthermore, when VANET is used in connection with the Internet of Things (IoT) devices and sensors, it can help with traffic management and road safety by allowing vehicles to interact with one another at any time and from any location. Since VANET’s event-driven communications are carried out via an open wireless channel, there are significant security concerns. In this paper, we use Hyperelliptic Curve Cryptography (HECC) to offer a cost-effective identity-based signature for secure communication over VANET. The proposed scheme does not need certificate management, and we found that it is more secure against a variety of cryptographic threats after conducting a thorough security analysis. In addition, comparisons of communication and computational costs are made, demonstrating that the proposed scheme is more efficient in both respects than existing schemes. [less ▲]

Peer Reviewed
See detailA Collaborative System of Flying and Ground Robots with Universal Physical Coupling Interface (PCI), and the Potential Interactive Applications
Wang, Ziming UL; Hu, Ziyi; Man, Yemao et al

Poster (2022, April 28)

Flying and ground robots complement each other in terms of their advantages and disadvantages. We propose a collaborative system combining flying and ground robots, using a universal physical coupling ... [more ▼]

Flying and ground robots complement each other in terms of their advantages and disadvantages. We propose a collaborative system combining flying and ground robots, using a universal physical coupling interface (PCI) that allows for momentary connections and disconnections between multiple robots/devices. The proposed system may better utilize the complementary advantages of both flying and ground robots. We also describe various potential scenarios where such a system could be of benefit to interact with humans - namely, remote field works and rescue missions, transportation, healthcare, and education. Finally, we discuss the opportunities and challenges of such systems and consider deeper questions which should be studied in future work. [less ▲]

Full Text
Peer Reviewed
See detailSecuring Industrial Internet of Things Against Botnet Attacks Using Hybrid Deep Learning Approach
Hasan, Tooba; Malik, Jahanzaib; Bibi, Iram et al

in IEEE Transactions on Network Science and Engineering (2022)

Industrial Internet of Things (IIoT) formation of richer ecosystem of intelligent interconnected devices while enabling new levels of digital innovation has essentially transformed and revolutionized ... [more ▼]

Industrial Internet of Things (IIoT) formation of richer ecosystem of intelligent interconnected devices while enabling new levels of digital innovation has essentially transformed and revolutionized global manufacturing and industry 4.0. Conversely, the prevalent distributed nature of IIoT, Industrial 5G, underlying IoT sensing devices, IT/OT convergence, Edge Computing, and Time Sensitive Networking makes it an impressive and potential target for cyber-attackers. Multi-variant persistent and sophisticated bot attacks are considered catastrophic for connects IIoTs. Besides, botnet attack detection is extremely complex and decisive. Thus, efficient and timely detection of IIoT botnets is a dire need of the day. We propose a hybrid intelligent Deep Learning (DL)-enabled mechanism to secure IIoT infrastructure from lethal and sophisticated multi-variant botnet attacks. The proposed mechanism has been rigorously evaluated with latest available dataset, standard and extended performance evaluation metrics, and current DL benchmark algorithms. Besides,cross validation of our results are also performed to clearly show overall performance. The proposed mechanisms outperforms in identifying accurately multi-variant sophisticated bot attacks. Besides, our proposed technique also show promising results in terms of speed efficiency. [less ▲]

Full Text
Peer Reviewed
See detailJoint optimization for secure ambient backscatter communication in NOMA-enabled IoT networks
Khan, Wali Ullah UL; Jameel, Furqan; Ihsan, Asim et al

in Digital Communications and Networks (2022)

Non-Orthogonal Multiple Access (NOMA) has emerged as a novel air interface technology for massive connectivity in sixth-generation (6G) era. The recent integration of NOMA in Backscatter Communication (BC ... [more ▼]

Non-Orthogonal Multiple Access (NOMA) has emerged as a novel air interface technology for massive connectivity in sixth-generation (6G) era. The recent integration of NOMA in Backscatter Communication (BC) has triggered significant research interest due to its applications in low-powered Internet of Things (IoT) networks. However, the link security aspect of these networks has not been well investigated. This article provides a new optimization framework for improving the physical layer security of the NOMA ambient BC system. Our system model takes into account the simultaneous operation of NOMA IoT users and the Backscatter Node (BN) in the presence of multiple EavesDroppers (EDs). The EDs in the surrounding area can overhear the communication of Base Station (BS) and BN due to the wireless broadcast transmission. Thus, the chief aim is to enhance link security by optimizing the BN reflection coefficient and BS transmit power. To gauge the performance of the proposed scheme, we also present the suboptimal NOMA and conventional orthogonal multiple access as benchmark schemes. Monte Carlo simulation results demonstrate the superiority of the NOMA BC scheme over the pure NOMA scheme without the BC and conventional orthogonal multiple access schemes in terms of system secrecy rate. [less ▲]

Full Text
Peer Reviewed
See detailNOMA-Enabled Backscatter Communications for Green Transportation in Automotive-Industry 5.0
Khan, Wali Ullah UL; Ihsan, Asim; Nguyen, Tu N. et al

in IEEE Transactions on Industrial Informatics (2022)

Automotive-Industry 5.0 will use emerging 6G communications to provide robust, computationally intelligent, and energy-efficient data sharing among various onboard sensors, vehicles, and other intelligent ... [more ▼]

Automotive-Industry 5.0 will use emerging 6G communications to provide robust, computationally intelligent, and energy-efficient data sharing among various onboard sensors, vehicles, and other intelligent transportation system entities. Nonorthogonal multiple access (NOMA) and backscatter communications are two key techniques of 6G communications for enhanced spectrum and energy efficiency. In this article, we provide an introduction to green transportation and also discuss the advantages of using backscatter communications and NOMA in Automotive Industry 5.0. We also briefly review the recent work in the area of NOMA empowered backscatter communications. We discuss different use cases of backscatter communications in NOMA-enabled 6G vehicular networks. We also propose a multicell optimization framework to maximize the energy efficiency of the backscatter-enabled NOMA vehicular network. In particular, we jointly optimize the transmit power of the roadside unit and the reflection coefficient of the backscatter device in each cell, where several practical constraints are also taken into account. The problem of energy efficiency is formulated as nonconvex, which is hard to solve directly. Thus, first, we adopt the Dinkelbach method to transform the objective function into a subtractive one, then we decouple the problem into two subproblems. Second, we employ dual theory and KKT conditions to obtain efficient solutions. Finally, we highlight some open issues and future research opportunities related to NOMA-enabled backscatter communications in 6G vehicular networks. [less ▲]

See detailAktives Altern und soziales Engagement in Zeiten der Pandemie
Albert, Isabelle UL

Conference given outside the academic context (2022)

Full Text
Peer Reviewed
See detailRL/DRL Meets Vehicular Task Offloading Using Edge and Vehicular Cloudlet: A Survey
Liu, Jinshi; Ahmed, Manzoor; Mirza, Muhammad Ayzed et al

in IEEE Internet of Things Journal (2022)

The last two decades have seen a clear trend toward crafting intelligent vehicles based on the significant advances in communication and computing paradigms, which provide a safer, stress-free, and more ... [more ▼]

The last two decades have seen a clear trend toward crafting intelligent vehicles based on the significant advances in communication and computing paradigms, which provide a safer, stress-free, and more enjoyable driving experience. Moreover, emerging applications and services necessitate massive volumes of data, real-time data processing, and ultrareliable and low-latency communication (URLLC). However, the computing capability of current intelligent vehicles is minimal, making it challenging to meet the delay-sensitive and computation-intensive demand of such applications. In this situation, vehicular task/computation offloading toward the edge cloud (EC) and vehicular cloudlet (VC) seems to be a promising solution to improve the network’s performance and applications’ Quality of Service (QoS). At the same time, artificial intelligence (AI) has dramatically changed people’s lives. Especially for vehicular task offloading applications, AI achieves state-of-the-art performance in various vehicular environments. Motivated by the outstanding performance of integrating reinforcement learning (RL)/deep RL (DRL) to the vehicular task offloading systems, we present a survey on various RL/DRL techniques applied to vehicular task offloading. Precisely, we classify the vehicular task offloading works into two main categories: 1) RL/ DRL solutions leveraging EC and 2) RL/DRL solutions using VC computing. Moreover, the EC section-based RL/DRL solutions are further subcategorized into multiaccess edge computing (MEC) server, nearby vehicles, and hybrid MEC (HMEC). To the best of our knowledge, we are the first to cover RL/DRL-based vehicular task offloading. Also, we provide lessons learned and open research challenges in this field and discuss the possible trend for future research. [less ▲]

Full Text
Peer Reviewed
See detailOn Reliable Key Performance Indicators in Cognitive Radio Networks
Khan, Abd Ullah; Abbas, Ghulam; Abbas, Ziaul Haq et al

in IEEE Networking Letters (2022)

Network serveability (NS), which considers both channel availability (CA) and service retainability (SR), is a key indicator to concisely express the performance of cognitive radio networks (CRNs ... [more ▼]

Network serveability (NS), which considers both channel availability (CA) and service retainability (SR), is a key indicator to concisely express the performance of cognitive radio networks (CRNs). However, CA cannot guarantee connection setup if receiver’s accessibility ( RxA ) is neglected. Likewise, SR yields imperfect results if RxA is ignored. As such, the two rather incomplete performance indicators misrepresent NS and lead to an overestimated satisfaction level of users. Aiming at reliable and concise analysis of CRNs’ performance, this letter introduces the concept of connection availability (CoA), which encompasses both CA and RxA for a user. Besides, it introduces service maintainability (SM), which incorporates the impact of RxA into SR. Consequently, the performance is represented more concisely through network serviceability (NeS), a concept we introduce to consider both CA and SM. We show that CoA, SM, and NeS diverge with various proportions from CA, SR, and NS, respectively, under variable traffic loads and channel failure rates. This indicates the degree of performance difference RxA introduces, and provides network designers the basis for dependable CRN budgeting. [less ▲]

Full Text
Peer Reviewed
See detailPreventing active re-identification attacks on social graphs via sybil subgraph obfuscation
Mauw, Sjouke UL; Ramirez Cruz, Yunior UL; Trujillo Rasua, Rolando UL

in Knowledge and Information Systems (2022), 64

Active re-identification attacks constitute a serious threat to privacy-preserving social graph publication, because of the ability of active adversaries to leverage fake accounts, a.k.a. sybil nodes, to ... [more ▼]

Active re-identification attacks constitute a serious threat to privacy-preserving social graph publication, because of the ability of active adversaries to leverage fake accounts, a.k.a. sybil nodes, to enforce structural patterns that can be used to re-identify their victims on anonymised graphs. Several formal privacy properties have been enunciated with the purpose of characterising the resistance of a graph against active attacks. However, anonymisation methods devised on the basis of these properties have so far been able to address only restricted special cases, where the adversaries are assumed to leverage a very small number of sybil nodes. In this paper, we present a new probabilistic interpretation of active re-identification attacks on social graphs. Unlike the aforementioned privacy properties, which model the protection from active adversaries as the task of making victim nodes indistinguishable in terms of their fingerprints with respect to all potential attackers, our new formulation introduces a more complete view, where the attack is countered by jointly preventing the attacker from retrieving the set of sybil nodes, and from using these sybil nodes for re-identifying the victims. Under the new formulation, we show that k-symmetry, a privacy property introduced in the context of passive attacks, provides a sufficient condition for the protection against active re-identification attacks leveraging an arbitrary number of sybil nodes. Moreover, we show that the algorithm K-Match, originally devised for efficiently enforcing the related notion of k-automorphism, also guarantees k-symmetry. Empirical results on real-life and synthetic graphs demonstrate that our formulation allows, for the first time, to publish anonymised social graphs (with formal privacy guarantees) that effectively resist the strongest active re-identification attack reported in the literature, even when it leverages a large number of sybil nodes. [less ▲]

Full Text
See detailTHE EVOLUTION OF THERMAL DISTORTION AND STRESSES AT MACRO SCALE FOR METAL ADDITIVELY MANUFACTURED PART
Mashhood, Muhammad UL; Zilian, Andreas UL; Peters, Bernhard UL et al

Scientific Conference (2022, February 05)

[1] R.K. Ganeriwala, M. Strantza, W.E. King, B. Clausen, T.Q. Phan, L.E. Levine, D.W. Brown, N.E. Hodge, Evaluation of a thermomechanical modelfor prediction of residual stress during laser powder bed ... [more ▼]

[1] R.K. Ganeriwala, M. Strantza, W.E. King, B. Clausen, T.Q. Phan, L.E. Levine, D.W. Brown, N.E. Hodge, Evaluation of a thermomechanical modelfor prediction of residual stress during laser powder bed fusion of Ti-6Al- 4V, Additive Manufacturing(2019), Vol. 27., 489–502. [2] M. S. Alnaes, J. Blechta, J. Hake, A. Johansson, B. Kehlet, A. Logg, C. Richardson, J. Ring, M. E. Rognes and G. N. Wells, The FEniCS Project Version 1.5, Archive of Numerical Software(2015), Vol. 3., 100:9–23. [less ▲]

Full Text
Peer Reviewed
See detailDYT6 mutated THAP1 is a cell type dependent regulator of the SP1 family.
Cheng, Fubo; Zheng, Wenxu; Barbuti, Peter Antony et al

in Brain : a journal of neurology (2022), 145(11), 3968-3984

DYT6 dystonia is caused by mutations in the transcription factor THAP1. THAP1 knock-out or knock-in mouse models revealed complex gene expression changes, which are potentially responsible for the ... [more ▼]

DYT6 dystonia is caused by mutations in the transcription factor THAP1. THAP1 knock-out or knock-in mouse models revealed complex gene expression changes, which are potentially responsible for the pathogenesis of DYT6 dystonia. However, how THAP1 mutations lead to these gene expression alterations and whether the gene expression changes are also reflected in the brain of THAP1 patients are still unclear. In this study we used epigenetic and transcriptomic approaches combined with multiple model systems [THAP1 patients' frontal cortex, THAP1 patients' induced pluripotent stem cell (iPSC)-derived midbrain dopaminergic neurons, THAP1 heterozygous knock-out rat model, and THAP1 heterozygous knock-out SH-SY5Y cell lines] to uncover a novel function of THAP1 and the potential pathogenesis of DYT6 dystonia. We observed that THAP1 targeted only a minority of differentially expressed genes caused by its mutation. THAP1 mutations lead to dysregulation of genes mainly through regulation of SP1 family members, SP1 and SP4, in a cell type dependent manner. Comparing global differentially expressed genes detected in THAP1 patients' iPSC-derived midbrain dopaminergic neurons and THAP1 heterozygous knock-out rat striatum, we observed many common dysregulated genes and 61 of them were involved in dystonic syndrome-related pathways, like synaptic transmission, nervous system development, and locomotor behaviour. Further behavioural and electrophysiological studies confirmed the involvement of these pathways in THAP1 knock-out rats. Taken together, our study characterized the function of THAP1 and contributes to the understanding of the pathogenesis of primary dystonia in humans and rats. As SP1 family members were dysregulated in some neurodegenerative diseases, our data may link THAP1 dystonia to multiple neurological diseases and may thus provide common treatment targets. [less ▲]

See detailSocial media use of adolescents: an introductory presentation
van Duin, Claire UL

Conference given outside the academic context (2022)

Full Text
Peer Reviewed
See detailFair power allocation in cooperative cognitive systems under NOMA transmission for future IoT networks
Ali, Zain; Khan, Wali Ullah UL; Sardar Sidhu, Guftaar Ahmad et al

in Alexandria Engineering Journal (2022)

To support the massive connectivity in Internet of Things (IoT), several promising techniques like cognitive radio (CR) and non-orthogonal multiple access (NOMA) enables the user to share spectrum ... [more ▼]

To support the massive connectivity in Internet of Things (IoT), several promising techniques like cognitive radio (CR) and non-orthogonal multiple access (NOMA) enables the user to share spectrum resources. This work aims to achieve fairness among secondary users (SUs) in IoT cooperative NOMA-based CR transmission. We design a power allocation algorithm, an independent battery constraint at each node is considered, and power gap among transmissions of two NOMA users is applied for successive interference cancellation. The simulation results show that the proposed framework provides excellent performance and for sufficient available transmission power perfect fairness is achieved. [less ▲]