Search results for " Telecommunications"

showing 10 items of 980 documents

Energy Harvesting-Aware Backoff Algorithms for Distributed Device-to-Device Communication

2016

Due to limited energy capacity in mobile devices, energy harvesting is regarded as a promising technology for lifetime extension in device-to-device (D2D) communication. However, medium access control (MAC) protocols designed for D2D communication intrinsically do not consider the existence of harvested energy. In this paper we study four backoff (BO) algorithms, among which one algorithm is proposed to enhance the BO selection based on energy harvesting rate and residual energy of devices. Simulations are performed in order to assess how the proposed algorithm can extend the lifetime of a D2D communication network as well as to provide fair channel access opportunities among devices.

Engineeringbusiness.industryDevice to device05 social sciences050801 communication & media studies020206 networking & telecommunicationsAccess control02 engineering and technologyTelecommunications networkLifetime extension0508 media and communications0202 electrical engineering electronic engineering information engineeringbusinessAlgorithmMobile deviceEnergy harvestingEnergy (signal processing)Computer networkCommunication channel2016 IEEE 83rd Vehicular Technology Conference (VTC Spring)
researchProduct

Cadmium mass measurements between the neutron shell closures at N=50 and 82

2010

International audience; The mass values of the neutron-deficient cadmium isotopes 99−109Cd and of the neutronrich isotopes 114,120,122−124,126,128Cd have been measured using ISOLTRAP. The behavior of the separation energies of the cadmium isotopes from N = 50 to 82 is discussed.

CadmiumIsotopehigh-precision mass measurementsChemistryStable isotope ratioPenning trapRadiochemistrychemistry.chemical_element020206 networking & telecommunications02 engineering and technology[PHYS.NEXP]Physics [physics]/Nuclear Experiment [nucl-ex]ISOLTRAP7. Clean energyISOLTRAPcadmium massesIsotope separationlaw.inventionlawIsotopes of cadmium0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingNeutron21.10.Dr 21.30.Fe 27.60.+j 32.10.BiNucleon
researchProduct

Automata and forbidden words

1998

Abstract Let L ( M ) be the (factorial) language avoiding a given anti-factorial language M . We design an automaton accepting L ( M ) and built from the language M . The construction is effective if M is finite. If M is the set of minimal forbidden words of a single word ν, the automaton turns out to be the factor automaton of ν (the minimal automaton accepting the set of factors of ν). We also give an algorithm that builds the trie of M from the factor automaton of a single word. It yields a nontrivial upper bound on the number of minimal forbidden words of a word.

TheoryofComputation_COMPUTATIONBYABSTRACTDEVICES[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS]Büchi automaton0102 computer and information sciences02 engineering and technologyω-automaton01 natural sciencesTheoretical Computer ScienceCombinatoricsDeterministic automaton0202 electrical engineering electronic engineering information engineeringTwo-way deterministic finite automatonNondeterministic finite automatonMathematicsPowerset constructionLevenshtein automaton020206 networking & telecommunicationsComputer Science::Computation and Language (Computational Linguistics and Natural Language and Speech Processing)Nonlinear Sciences::Cellular Automata and Lattice GasesComputer Science ApplicationsTheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES010201 computation theory & mathematicsSignal ProcessingProbabilistic automatonComputer Science::Programming LanguagesComputer Science::Formal Languages and Automata TheoryInformation Systems
researchProduct

A Survey on Proxy Mobile IPv6 Handover

2016

[EN] As wireless technologies have been improving in recent years, a mobility management mechanism is required to provide seamless and ubiquitous mobility for end users who are roaming among points of attachment in wireless networks. Thus, Mobile IPv6 was developed by the Internet Engineering Task Force (IETF) to support the mobility service. However, Mobile IPv6 is unable to fulfill the requirements of real-time applications, such as video streaming service and voice over IP service, due to its high handover (HO) latency. To address this problem, Proxy Mobile IPv6 (PMIPv6) has been introduced by the IETF. In PMIPv6, which is a network-based approach, the serving network controls mobility m…

Fast localized Proxy Mobile IPv6 (PMIPv6) handover (HO) procedureEngineeringMobility modelComputer Networks and CommunicationsReactive mode0211 other engineering and technologiesMobile computing02 engineering and technologyPMIPv6 with partial bicastingPMIPv60202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringProxy Mobile IPv6Mobility management021103 operations researchbusiness.industryWireless networkComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPredictive modeHO in PMIPv6020206 networking & telecommunicationsINGENIERIA TELEMATICAComputer Science ApplicationsHandoverControl and Systems EngineeringMobile IPRoamingbusinessTelecommunicationsInformation SystemsComputer networkIEEE Systems Journal
researchProduct

Edge-Based Missing Data Imputation in Large-Scale Environments

2021

Smart cities leverage large amounts of data acquired in the urban environment in the context of decision support tools. These tools enable monitoring the environment to improve the quality of services offered to citizens. The increasing diffusion of personal Internet of things devices capable of sensing the physical environment allows for low-cost solutions to acquire a large amount of information within the urban environment. On the one hand, the use of mobile and intermittent sensors implies new scenarios of large-scale data analysis

010504 meteorology & atmospheric sciencesComputer scienceDistributed computingUrban sensingMobile sensingContext (language use)Information technology02 engineering and technology01 natural sciences[INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI]Smart cityEdge intelligence11. Sustainability0202 electrical engineering electronic engineering information engineeringLeverage (statistics)Edge computingVoronoi tessellation0105 earth and related environmental sciencesSmart cityOut-of-order executionSettore INF/01 - InformaticaMulti-agent systemMissing data imputation020206 networking & telecommunicationsT58.5-58.64Variety (cybernetics)Multi-agent system[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Mobile deviceInformation Systems
researchProduct

Comprehensive Experimental Analysis of Handcrafted Descriptors for Face Recognition

2018

Over the past few decades, LBP descriptor, which shown its high robustness in extracting discriminative features from an image, has been successfully applied in diverse challenging computer vision applications including face recognition. The efficiency and usability of the LBP operator and its success in various real world applications has inspired the development of much new powerful LBP variants. Indeed, after the appearance of the LBP operator, several renowned extensions and modifications of LBP have been proposed in the literature to the point that it can be difficult to recognize their respective LBP-related strategies, strengths and weaknesses according to a given application, and th…

Computer sciencebusiness.industryFeature extractionComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION020206 networking & telecommunicationsUsability02 engineering and technologyMachine learningcomputer.software_genreFacial recognition systemDiscriminative modelRobustness (computer science)0202 electrical engineering electronic engineering information engineeringTask analysis020201 artificial intelligence & image processingArtificial intelligencebusinesscomputerFERETStrengths and weaknesses2018 International Symposium on Advanced Electrical and Communication Technologies (ISAECT)
researchProduct

Energy Efficient Optimization for Computation Offloading in Fog Computing System

2017

In this paper, we investigate the energy efficient computation offloading scheme in a multi-user fog computing system. We consider the users need to make the decision on whether to offload the tasks to the fog node nearby, based on the energy consumption and delay constraint. In particular, we utilize queuing theory to bring a thorough study on the energy consumption and execution delay of the offloading process. Two queuing models are applied respectively to model the execution processes at the mobile device (MD) and fog node. Based on the theoretical analysis, an energy efficient optimization problem is formulated with the objective to minimize the energy consumption subjects to execution…

020203 distributed computingOptimization problemComputer sciencebusiness.industryNode (networking)Distributed computing020206 networking & telecommunicationsCloud computing02 engineering and technologyEnergy consumptionDistributed algorithm0202 electrical engineering electronic engineering information engineeringComputation offloadingbusinessMobile deviceEdge computingEfficient energy useGLOBECOM 2017 - 2017 IEEE Global Communications Conference
researchProduct

Energy-Efficient Resource Optimization with Wireless Power Transfer for Secure NOMA Systems

2018

In this paper, we investigate resource allocation algorithm design for secure non-orthogonal multiple access (NOMA) systems empowered by wireless power transfer. With the consideration of an existing eavesdropper, the objective is to obtain secure and energy efficient transmission among multiple users by optimizing time, power and subchannel allocation. Moreover, we also take into consideration for the practical case that the statistics of the channel state information of the eavesdropper is not available. In order to address the optimization problem and its high computational complexity, we propose an iterative algorithm with guaranteed convergence to deliver a suboptimal solution for gene…

Mathematical optimizationOptimization problemIterative methodComputer sciencewireless power transfer02 engineering and technologysecuritylangaton tiedonsiirto0203 mechanical engineeringoptimointi0202 electrical engineering electronic engineering information engineeringWirelessResource managementresource managementreceiversta213business.industryturvallisuusNOMA020206 networking & telecommunications020302 automobile design & engineeringwireless communicationChannel state informationlangaton viestintäResource allocationbusinessoptimizationEfficient energy use
researchProduct

Kernel-Based Inference of Functions Over Graphs

2018

Abstract The study of networks has witnessed an explosive growth over the past decades with several ground-breaking methods introduced. A particularly interesting—and prevalent in several fields of study—problem is that of inferring a function defined over the nodes of a network. This work presents a versatile kernel-based framework for tackling this inference problem that naturally subsumes and generalizes the reconstruction approaches put forth recently for the signal processing by the community studying graphs. Both the static and the dynamic settings are considered along with effective modeling approaches for addressing real-world problems. The analytical discussion herein is complement…

Graph kernelTheoretical computer scienceComputer sciencebusiness.industryInference020206 networking & telecommunicationsPattern recognition02 engineering and technology01 natural sciencesGraph010104 statistics & probabilityKernel (linear algebra)Kernel methodPolynomial kernelString kernelKernel embedding of distributionsKernel (statistics)Radial basis function kernel0202 electrical engineering electronic engineering information engineeringArtificial intelligence0101 mathematicsTree kernelbusiness
researchProduct

Integration of WiFi ToF Positioning System in the Open, Flexible and Adaptive WiSHFUL Architecture

2017

We integrate a prototypeWiFi Time-of-Flight (ToF) ranging and positioning system in the WiSHFUL software platforms and hardware radios for experimental prototyping. Users have access to ToF measurements as well as computed positions through unified programming interfaces that make possible to investigate innovative positioning and networking solutions. TRUE pub

Positioning systembusiness.industryComputer scienceSettore ING-INF/03 - TelecomunicazioniTime of flight indoor positioning network control radio control020206 networking & telecommunications020302 automobile design & engineeringRanging02 engineering and technologySoftware0203 mechanical engineeringEmbedded system0202 electrical engineering electronic engineering information engineeringArchitecturebusiness
researchProduct