Search results for " Telecommunications"
showing 10 items of 980 documents
An over-the-distance wireless battery charger based on RF energy harvesting
2017
An RF powered receiver silicon IC (integrated circuit) for RF energy harvesting is presented as wireless battery charger. This includes an RF-to-DC energy converter specifically designed with a sensitivity of -18.8 dBm and an energy conversion efficiency of â¼45% at 900 MHz with a transmitting power of 0.5 W in free space. Experimental results concerned with remotely battery charging using a complete prototype working in realistic scenarios will be shown.
A privacy enhanced device access protocol for an IoT context
2013
In this paper, we present the case for a device authentication protocol that authenticates a device/service class rather than an individual device. The devices in question are providing services available to the public. The proposed protocol is an online protocol, and it uses a pseudo-random temporary identity scheme to provide user privacy. This allows the Internet-of-Things device to have full assurance of the user, with respect to the request service, while permitting the user to remain anonymous with respect to the device. The user can then enjoy identity and location privacy in addition to untraceability with respect to device access. Copyright © 2013 John Wiley & Sons, Ltd.
Graph recursive least squares filter for topology inference in causal data processes
2017
In this paper, we introduce the concept of recursive least squares graph filters for online topology inference in data networks that are modelled as Causal Graph Processes (CGP). A Causal Graph Process (CGP) is an auto regressive process in the time series associated to different variables, and whose coefficients are the so-called graph filters, which are matrix polynomials with different orders of the graph adjacency matrix. Given the time series of data at different variables, the goal is to estimate these graph filters, hence the associated underlying adjacency matrix. Previously proposed algorithms have focused on a batch approach, assuming implicitly stationarity of the CGP. We propose…
On achieving intelligent traffic-aware consolidation of virtual machines in a data center using Learning Automata
2018
Unlike the computational mechanisms of the past many decades, that involved individual (extremely powerful) computers or clusters of machines, cloud computing (CC) is becoming increasingly pertinent and popular. Computing resources such as CPU and storage are becoming cheaper, and the servers themselves are becoming more powerful. This enables clouds to host more virtual machines (VMs). A natural consequence ofthis is that many modern-day data centers experience very high internaltraffic within the data centers themselves. This is, of course, due to the occurrence of servers that belong to the same tenant, communicating between themselves. The problem is accentuated when the VM deployment t…
Towards Efficient Control of Mobile Network-Enabled UAVs
2019
| openaire: EC/H2020/815191/EU//PriMO-5G The efficient control of mobile network-enabled unmanned aerial vehicles (UAVs) is targeted in this paper. In particular, a downlink scenario is considered, in which control messages are sent to UAVs via cellular base stations (BSs). Unlike terrestrial user equipment (UEs), UAVs perceive a large number of BSs, which can lead to increased interference causing poor or even unacceptable throughput. This paper proposes a framework for efficient control of UAVs. First, a communication model is introduced for flying UAVs taking into account interference, path loss and fast fading. The characteristics of UAVs make such model different compared to traditiona…
Gray code for permutations with a fixed number of cycles
2007
AbstractWe give the first Gray code for the set of n-length permutations with a given number of cycles. In this code, each permutation is transformed into its successor by a product with a cycle of length three, which is optimal. If we represent each permutation by its transposition array then the obtained list still remains a Gray code and this allows us to construct a constant amortized time (CAT) algorithm for generating these codes. Also, Gray code and generating algorithm for n-length permutations with fixed number of left-to-right minima are discussed.
Improving the stability bound for the PPH nonlinear subdivision scheme for data coming from strictly convex functions
2021
Abstract Subdivision schemes are widely used in the generation of curves and surfaces, and therefore they are applied in a variety of interesting applications from geological reconstructions of unaccessible regions to cartoon film productions or car and ship manufacturing. In most cases dealing with a convexity preserving subdivision scheme is needed to accurately reproduce the required surfaces. Stability respect to the initial input data is also crucial in applications. The so called PPH nonlinear subdivision scheme is proven to be both convexity preserving and stable. The tighter the stability bound the better controlled is the final output error. In this article a more accurate stabilit…
An attribute based access control scheme for secure sharing of electronic health records
2016
Electronic health records (EHRs) play a vital role in modern health industry, allowing the possibility of flexible sharing of health information in the quest of provisioning advanced and efficient healthcare services for the users. Although sharing of EHRs has significant benefits, given that such records contain lot of sensitive information, secure sharing of EHRs is of paramount importance. Thus, there is a need for the realization of sophisticated access control mechanisms for secure sharing of EHRs, which has attracted significant interest from the research community. The most prominent access control schemes for sharing of EHRs found in literature are role based and such solutions have…
Adaptive consensus-based distributed detection in WSN with unreliable links
2016
Event detection is a crucial tasks in wireless sensor networks. The importance of a fast response makes distributed strategies, where nodes exchange information just with their one-hop neighbors to reach local decisions, more adequate than schemes where all nodes send observations to a central entity. Distributed detectors are usually based on average consensus, where all nodes iteratively communicate to asymptotically agree on a final result. In a realistic scenario, communications are subject to random failures, which impacts the performance of the consensus. We propose an alternative detector, which adapts to the statistical properties of the consensus and compensate deviations from the …
Performance evaluation of different techniques to estimate subjective quality in live video streaming applications over LTE-Advance mobile networks
2018
Abstract Current mobile service providers are offering Gigabit Internet access over LTE-Advanced networks. Traditional services, such as live video streaming, over wired networks are feasible on these networks. However different aspects should be taken into account due to the fast changing network conditions as well as the constrained resources of the mobile phones, in order to provide a good subjective video quality in terms of Mean Opinion Score (MOS). Our goal is to estimate and predict this subjective metric without information or reference from the original video, known as Non Reference approach. This approach is important for the Service Provider from a practical point of view, becaus…