Search results for " Telecom"
showing 10 items of 1269 documents
Location-Aware MAC Scheduling in Industrial-Like Environment
2018
We consider an environment strongly affected by the presence of metallic objects, that can be considered representative of an indoor industrial environment with metal obstacles. This scenario is a very harsh environment where radio communication has notorious difficulties, as metallic objects create a strong blockage component and surfaces are highly reflective. In this environment, we investigate how to dynamically allocate MAC resources in time to static and mobile users based on context awareness extracted from a legacy WiFi positioning system. In order to address this problem, we integrate our WiFi ranging and positioning system in the WiSHFUL architecture and then define a hypothesis t…
Efficient Transport Protocol for Networked Haptics Applications
2008
The performance of haptic application is highly sensitive to communication delays and losses of data. It implies several constraints in developing networked haptic applications. This paper describes a new internet protocol called Efficient Transport Protocol (ETP), which aims at developing distributed interactive applications. TCP and UDP are transport protocols commonly used in any kind of networked communication, but they are not focused on real time application. This new protocol is focused on reducing roundtrip time (RTT) and interpacket gap (IPG). ETP is, therefore, optimized for interactive applications which are based on processes that are continuously exchanging data. ETP protocol i…
Graph-theoretical derivation of brain structural connectivity
2020
Brain connectivity at the single neuron level can provide fundamental insights into how information is integrated and propagated within and between brain regions. However, it is almost impossible to adequately study this problem experimentally and, despite intense efforts in the field, no mathematical description has been obtained so far. Here, we present a mathematical framework based on a graph-theoretical approach that, starting from experimental data obtained from a few small subsets of neurons, can quantitatively explain and predict the corresponding full network properties. This model also changes the paradigm with which large-scale model networks can be built, from using probabilisti…
Algebraic parameter estimation of a multi-sinusoidal waveform signal from noisy data
2013
International audience; In this paper, we apply an algebraic method to estimate the amplitudes, phases and frequencies of a biased and noisy sum of complex exponential sinusoidal signals. Let us stress that the obtained estimates are integrals of the noisy measured signal: these integrals act as time-varying filters. Compared to usual approaches, our algebraic method provides a more robust estimation of these parameters within a fraction of the signal's period. We provide some computer simulations to demonstrate the efficiency of our method.
Algebraic parameter estimation of a biased sinusoidal waveform signal from noisy data
2012
International audience; The amplitude, frequency and phase of a biased and noisy sum of two complex exponential sinusoidal signals are estimated via new algebraic techniques providing a robust estimation within a fraction of the signal period. The methods that are popular today do not seem able to achieve such performances. The efficiency of our approach is illustrated by several computer simulations.
Tolerating malicious monitors in detecting misbehaving robots
2008
This paper considers a multi–agent system and focuses on the detection of motion misbehavior. Previous work by the authors proposed a solution, where agents act as local monitors of their neighbors and use locally sensed information as well as data received from other monitors. In this work, we consider possible failure of monitors that may send incorrect information to their neighbors due to spontaneous or even malicious malfunctioning. In this context, we propose a distributed software architecture that is able to tolerate such failures. Effectiveness of the proposed solution is shown through preliminary simulation results.
Modeling Energy Demand Aggregators for Residential Consumers
2013
International audience; Energy demand aggregators are new actors in the energy scenario: they gather a group of energy consumers and implement a demand- response paradigm. When the energy provider needs to reduce the current energy demand on the grid, it can pay the energy demand aggregator to reduce the load by turning off some of its consumers loads or postponing their activation. Currently this operation involves only greedy energy consumers like industrial plants. In this paper we want to study the potential of aggregating a large number of small energy consumers like home users as it may happen in smart grids. In particular we want to address the feasibility of such approach by conside…
Opinion dynamics in social networks through mean field games
2016
Emulation, mimicry, and herding behaviors are phenomena that are observed when multiple social groups interact. To study such phenomena, we consider in this paper a large population of homogeneous social networks. Each such network is characterized by a vector state, a vector-valued controlled input, and a vector-valued exogenous disturbance. The controlled input of each network aims to align its state to the mean distribution of other networks' states in spite of the actions of the disturbance. One of the contributions of this paper is a detailed analysis of the resulting mean-field game for the cases of both polytopic and $mathcal L_2$ bounds on controls and disturbances. A second contrib…
Using Inverse Reinforcement Learning with Real Trajectories to Get More Trustworthy Pedestrian Simulations
2020
Reinforcement learning is one of the most promising machine learning techniques to get intelligent behaviors for embodied agents in simulations. The output of the classic Temporal Difference family of Reinforcement Learning algorithms adopts the form of a value function expressed as a numeric table or a function approximator. The learned behavior is then derived using a greedy policy with respect to this value function. Nevertheless, sometimes the learned policy does not meet expectations, and the task of authoring is difficult and unsafe because the modification of one value or parameter in the learned value function has unpredictable consequences in the space of the policies it represents…
Nonlinear statistical retrieval of surface emissivity from IASI data
2017
Emissivity is one of the most important parameters to improve the determination of the troposphere properties (thermodynamic properties, aerosols and trace gases concentration) and it is essential to estimate the radiative budget. With the second generation of infrared sounders, we can estimate emissivity spectra at high spectral resolution, which gives us a global view and long-term monitoring of continental surfaces. Statistically, this is an ill-posed retrieval problem, with as many output variables as inputs. We here propose nonlinear multi-output statistical regression based on kernel methods to estimate spectral emissivity given the radiances. Kernel methods can cope with high-dimensi…