Search results for " computing"

showing 10 items of 2075 documents

Security in mobile agent systems

2007

business.industryComputer scienceNetwork Access ControlMobile computingbusinessMobile agent systemsComputer network
researchProduct

DTMC modeling for performance evaluation of DW-MAC in wireless sensor networks

2016

Synchronized duty cycling (DC) aligns sensor nodes to wake up at the same time in order to reduce idle listening for medium access control (MAC) in wireless sensor networks (WSNs). Demand wakeup MAC (DW-MAC) is a popular synchronous DC MAC protocol which allows nodes to compete and transmit multiple packets in one operational cycle. This multiple packet transmission (MPT) feature makes DW-MAC more energy efficient when comparing with other existing single time competition based protocols such as sensor MAC (S-MAC). In the literature, no analytical model exists to evaluate the performance of DW-MAC. In this paper, we develop two associated discrete time Markov chain (DTMC) models and incorpo…

business.industryComputer scienceNetwork packetComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS010401 analytical chemistryReal-time computing020206 networking & telecommunications02 engineering and technologyEnergy consumption01 natural sciencesSynchronization0104 chemical sciencesComputer Science::PerformanceKey distribution in wireless sensor networksComputer Science::Networking and Internet Architecture0202 electrical engineering electronic engineering information engineeringMobile wireless sensor networkMultiple Access with Collision Avoidance for WirelessbusinessWireless sensor networkComputer Science::Information TheoryEfficient energy useComputer network2016 IEEE Wireless Communications and Networking Conference
researchProduct

A simulation study of load balancing algorithms in cellular packet networks

2001

This paper provides a comparative performance evaluation of various load balancing schemes in cellular packet networks. With respect to traditional schemes, that measure each cell load in terms of number of admitted calls, our schemes use supplementary packet level information, expressed in terms of effective resource consumption of each individual call when retransmission mechanisms are employed. The simulation model adopted is based on a toroidal cellular network topology, to avoid border effects affecting the numerical results.

business.industryComputer scienceNetwork packetDistributed computingRetransmissionCellular networkLoad balancing (computing)Resource consumptionbusinessComputer network
researchProduct

A Self-Powered Long-range Wireless IoT Device based on LoRaWAN

2020

In this article, we propose a self-powered long-range wireless Internet-of-Things (IoT) device based on Long Range Wide Area Network (LoRaWAN) with various sensing capabilities. The nodes are designed based on ambient energy harvesting in such a way that these are self-sustainable throughout the components’ lifespan. Also, these nodes can be deployed on a large scale and are maintenance-free. In addition, these nodes can be deployed in remote places where the accessibility is limited, and maintenance is difficult. The wireless sensor nodes can be deployed both in indoor and outdoor environments with sufficient light levels for the solar panel, such as indoor lights in the indoor environment…

business.industryComputer scienceNode (networking)Range (aeronautics)Real-time computingWirelessbusinessInternet of ThingsEnergy harvestingAir quality indexWireless sensor networkPower (physics)2020 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS)
researchProduct

Face Processing on Low-Power Devices

2009

The research on embedded vision-based techniques is considered nowadays as one of the most interesting matters of computer vision. In this work we address the scenario in which a real-time face processing system is needed to monitor people walking through some locations. Some face detection (e.g., Viola-Jones face detector) and face recognition (e.g., eigenfaces) approaches have reached a certain level of maturity, so we focused on the development of such techniques on embedded systems taking into account both hardware and software constraints. Our goal is to detect the presence of some known individuals inside some sensitive areas producing a compact description of the observed people. Cap…

business.industryComputer scienceNode (networking)Real-time computingFacial recognition systemSoftwareEigenfaceEmbedded systemScalabilityResource allocation (computer)businessFace detectionWireless sensor networkface recognition embedded devices
researchProduct

SCARKER: A sensor capture resistance and key refreshing scheme for mobile WSNs

2011

How to discover a captured node and to resist node capture attack is a challenging task in Wireless Sensor Networks (WSNs). In this paper, we propose a node capture resistance and key refreshing scheme for mobile WSNs which is based on the Chinese remainder theorem. The scheme is able of providing forward secrecy, backward secrecy and collusion resistance for diminishing the effects of capture attacks. By implementing our scheme on a Sun SPOT based sensor network testbed, we demonstrate that the time for updating a new group key varies from 56 ms to 546 ms and the energy consumption is limited to 16.5–225 mJ, depending on the length of secret keys and the number of sensors in a group.

business.industryComputer scienceNode (networking)TestbedMobile computingEnergy consumptionSun SPOTKey distribution in wireless sensor networksForward secrecyMobile telephonybusinessWireless sensor networkComputer networkGroup key2011 IEEE 36th Conference on Local Computer Networks
researchProduct

AI-enabled adaptive learning systems: A systematic mapping of the literature

2021

Abstract Mobile internet, cloud computing, big data technologies, and significant breakthroughs in Artificial Intelligence (AI) have all transformed education. In recent years, there has been an emergence of more advanced AI-enabled learning systems, which are gaining traction due to their ability to deliver learning content and adapt to the individual needs of students. Yet, even though these contemporary learning systems are useful educational platforms that meet students’ needs, there is still a low number of implemented systems designed to address the concerns and problems faced by many students. Based on this perspective, a systematic mapping of the literature on AI-enabled adaptive le…

business.industryComputer sciencePerspective (graphical)Big dataPsychological interventionCloud computingQA75.5-76.95Data scienceComputer Science ApplicationsEducationVisualizationIdentification (information)Artificial IntelligenceAIElectronic computers. Computer scienceAI-Enabled learning systemsAdaptive learningSystematic mappingbusinessAdaptive learning systemsVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550
researchProduct

Probabilistic Transition-Based Approach for Detecting Application-Layer DDoS Attacks in Encrypted Software-Defined Networks

2017

With the emergence of cloud computing, many attacks, including Distributed Denial-of-Service (DDoS) attacks, have changed their direction towards cloud environment. In particular, DDoS attacks have changed in scale, methods, and targets and become more complex by using advantages provided by cloud computing. Modern cloud computing environments can benefit from moving towards Software-Defined Networking (SDN) technology, which allows network engineers and administrators to respond quickly to the changing business requirements. In this paper, we propose an approach for detecting application-layer DDoS attacks in cloud environment with SDN. The algorithm is applied to statistics extracted from…

business.industryComputer scienceProbabilistic logic020206 networking & telecommunicationsDenial-of-service attackCloud computing02 engineering and technologyEncryptionApplication layeranomaly detectionDDoS attackSDNprobabilistic model0202 electrical engineering electronic engineering information engineeringbehavior pattern020201 artificial intelligence & image processingAnomaly detectionCluster analysisbusinessSoftware-defined networkingComputer networkclustering
researchProduct

123D Catch: efficiency, accuracy, constraints and limitations in architectural heritage field

2013

Today, the accurate and detailed reconstruction of geometric models of real objects has become a common process. The diffusion of Image-based 3D modeling techniques, through image-based free, low cost and open source software, have increased drastically in the past few years, especially in the sector of Cultural Heritage (Architecture, Archeology, Urban planning). Nevertheless, web based software (ARC3D, 123D Catch, Hyp3D, my3Dscanner) offer another opportunity respect the desktop systems: they use the power of cloud computing to carry out a semi-automatic data processing. In this way is overcome the considerably slowing-down of the computer of hardware-heavy approaches. Our research inves…

business.industryComputer scienceProcess (engineering)Cloud computingImage-based modeling 3D reconstruction Photogrammetry Computer Vision Architectural Heritage3D modelingIndustrial engineeringField (computer science)Cultural heritagePhotogrammetryUrban planningImage-based modelingSettore ICAR/17 - DisegnoArchitecturebusinessSimulation
researchProduct

Temporal Fairness Provisioning in Multi-Rate Contention-Based 802.11e WLANs

2005

The IEEE 802.11e extensions for QoS support in WLAN define the transmission opportunity (TXOP) concept, in order to limit the channel holding times of the contending stations in the presence of delay-sensitive traffic. We evaluate the use of TXOP for a different purpose: "temporal fairness" provisioning among stations employing different data rates. We show that the equalization of the channel access times allows each station to obtain its throughput basically (1) proportional to its transmission rate, and (2) independent of the transmitted frame length. This also improves the aggregate throughput of the overall WLAN. For a given TXOP limit, i.e., a granted channel access time, a station is…

business.industryComputer scienceQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSReal-time computingFrame (networking)ComputingMilieux_PERSONALCOMPUTINGWireless local area networks (WLAN)ProvisioningThroughputThroughputIEEE 802.11e-2005Limit (mathematics)businessadaptation schemeAccess timeCommunication channelComputer networkSixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks
researchProduct