Search results for " computing"

showing 10 items of 2075 documents

A new inter-cloud service-level guarantee protocol applied to space missions

2017

Nowadays, the term cloud computing often falsely assumes the availability of an unlimited pool of resources. On the contrary, if a cloud provider reaches its limits, it may pose the risk of breaking their service level agreement (SLA). Space agencies could start using the cloud computing model within their IT infrastructure with multiple ground control points around the world to reduce the cost. An inter-cloud communication protocol with a guarantee of the service level will significantly reduce the cost if each ground control segment is considered as a cloud provider. This paper outlines a new protocol that was developed to take into consideration the end-to-end service-level guarantee. Th…

business.industryComputer scienceQuality of serviceDistributed computingApplied MathematicsCloud computing02 engineering and technology01 natural sciencesComputer Science ApplicationsManagement Information SystemsService-level agreement020204 information systemsService level0103 physical sciencesScalability0202 electrical engineering electronic engineering information engineeringSpace industrybusinessCommunications protocol010303 astronomy & astrophysicsProtocol (object-oriented programming)Computer networkInternational Journal of Grid and Utility Computing
researchProduct

A Hybrid Algorithm Based on WiFi for Robust and Effective Indoor Positioning

2019

Indoor positioning based on the Wireless Fidelity (WiFi) protocol and the Pedestrian Dead Reckoning (PDR) approach is widely exploited because of the existing WiFi infrastructure in buildings and the advancement of built-in smartphone sensors. In this work, a hybrid algorithm that combines WiFi fingerprinting and PDR to both exploit their advantages as well as limiting the impact of their disadvantages is proposed. Specifically, to build a probability map from noisy Received Signal Strength (RSS), a Gaussian Process (GP) regression is deployed to estimate and construct the RSS fingerprints with incomplete data. Mean and variance of generated points are used to estimate WiFi fingerprinting p…

business.industryComputer scienceRSSReal-time computingComputingMilieux_LEGALASPECTSOFCOMPUTING020206 networking & telecommunications02 engineering and technologycomputer.file_formatHybrid algorithmData setsymbols.namesakeInertial measurement unitDead reckoning0202 electrical engineering electronic engineering information engineeringsymbolsWireless020201 artificial intelligence & image processingbusinessParticle filterVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Gaussian processcomputer2019 19th International Symposium on Communications and Information Technologies (ISCIT)
researchProduct

Autonomy, Heterogeneity and Trust in Mobile P2P environments

2007

Mobile P2P environments are emerging as a result of rapid expansion of portable terminals that are able to establish direct wireless communication links among themselves. These kinds of terminals are under the control of persons and allowing interactions between their terminals is subject to trust between the individuals and their desire to preserve various aspects of autonomy against each other. In this paper we relate the concepts of node autonomy, heterogeneity and trust with each other, defining also numeric measures for them. We also investigate what kind of interactions (such as transactions, file exchanges) are possible at certain heterogeneity, autonomy and trust level between the t…

business.industryComputer scienceRapid expansionmedia_common.quotation_subjectNode (networking)Control (management)Mobile computingComputer securitycomputer.software_genreTrust levelPeer to peer computingWirelessbusinesscomputerAutonomymedia_common2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07)
researchProduct

Energy Efficient Optimization for Solar-Powered UAV Communications System

2021

In this work, we explore the energy efficiency optimization for a solar-powered unmanned aerial vehicle (UAV) communications system. We consider a scenario where a number of ground users (GUs) connect with a solar-powered multi-antenna UAV over a wireless link. First, we are able to derive the relations between the uplink data rate and heading angle of UAV and transmission power of GUs. In addition, the harvested energy from solar light is also affected by UAV’s angle. Accordingly, with the objective to maximize the energy efficiency that is related to uplink data rate and energy consumption, we propose to dynamically adjust the UAV trajectory and gesture, by optimizing its velocity, accele…

business.industryComputer scienceReal-time computingComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONComputerApplications_COMPUTERSINOTHERSYSTEMSEnergy consumptionCommunications systemComputer Science::Multiagent SystemsComputer Science::RoboticsTransmission (telecommunications)Computer Science::Systems and ControlTelecommunications linkTrajectoryWirelessComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMSbusinessEnergy (signal processing)Efficient energy use2021 IEEE International Conference on Communications Workshops (ICC Workshops)
researchProduct

Experimental Characterization of Mobile Fading Channels Aiming the Design of Non-Wearable Fall Detection Radio Systems at 5.9 GHz

2016

One of the major concerns for the independent living of elderlies is a fall incident. To decrease human interaction errors and user privacy concerns of existing fall detection systems, a new generation of fall detection systems is emerging. The new trend is to design non-wearable devices that can monitor the physical activities of the home user using radio waves reflected off the body. This paper reports an in-home radio measurement campaign at 5.9 GHz, which has been conducted to study the impacts of different physical activities of the user, including fall incidents, on the channel transfer function (CTF) and the power delay profile (PDP) of indoor mobile radio channels. The home is equip…

business.industryComputer scienceReal-time computingElectrical engineeringWearable computer020206 networking & telecommunicationsDifferential (mechanical device)02 engineering and technology0202 electrical engineering electronic engineering information engineeringKey (cryptography)020201 artificial intelligence & image processingFadingbusinessPower delay profileRadio waveCommunication channel
researchProduct

Mobile cloud computing educational tool for image/video processing algorithms

2011

This paper shows the importance and benefit of coupling cloud computing with mobile especially due to power limitations that mobile devices exhibit. Moreover, the work done shows that mobile computing can be applied for educational purposes, where a tool for students termed Mobi4Ed is presented. This educational tool aims at exploiting the concept of cloud computing in the context of image and video processing, where students can assess several algorithms in real-time. Two possible system architectures are detailed, where one uses the cellular channel and the other uses the data channel. Consequently, one of the approaches is adopted and a detailed simulation is done where an Android client…

business.industryComputer scienceServerSystems architectureMobile computingCloud computingMobile telephonyVideo processingbusinessAlgorithmMobile deviceMobile cloud computing2011 Digital Signal Processing and Signal Processing Education Meeting (DSP/SPE)
researchProduct

Learning from Errors: Detecting ZigBee Interference in WiFi Networks

2014

In this work we show how to detect ZigBee interference on commodity WiFi cards by monitoring the reception errors, such as synchronization errors, invalid header formats, too long frames, etc., caused by ZigBee transmissions. Indeed, in presence of non-WiFi modulated signals, the occurrence of these types of errors follows statistics that can be easily recognized. Moreover, the duration of the error bursts depends on the transmission interval of the interference source, while the error spacing depends on the receiver implementation. On the basis of these considerations, we propose the adoption of hidden Markov chains for characterizing the behavior of WiFi receivers in presence of controlle…

business.industryComputer scienceSettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSReal-time computingwlan 802.11 802.15.4 frame error detection wireless coexistenceInterval (mathematics)Interference (wave propagation)SynchronizationLearning from errorsTransmission (telecommunications)HeaderbusinessHidden Markov modelComputer networkNeuRFon
researchProduct

Analysis of the Effect of Human Presence on a Wireless Sensor Network

2011

Wireless Sensor Networks (WSNs) are gaining an increasing industry wide adoption. However, there remain major challenges such as network dimensioning and node placement especially in Built Environment Networks (BENs). Decisions on the node placement, orientation, and the number of nodes to cover the area of interest are usually ad-hoc. Ray tracing tools are traditionally employed to predict RF signal propagation; however, such tools are primarily intended for outdoor environments. RF signal propagation varies greatly indoors due to building materials and infrastructure, obstacles, node placement, antenna orientation and human presence. Because of the complexity of signal prediction, these f…

business.industryComputer scienceSettore ING-INF/03 - TelecomunicazioniRSSReal-time computingcomputer.file_formatRadio propagationKey distribution in wireless sensor networksBuilt Environment Networks (BENs) Human Presence Node Placement Radiation Patterns Wireless Sensor Networks (WSNs)Ray tracing (graphics)Radio frequencyTransceiverbusinessWireless sensor networkcomputerDimensioningSoftwareComputer network
researchProduct

An enhanced TCP congestion avoidance scheme and its performance evaluation in high speed satellite networks

2009

©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE." Article also available from publisher: http://dx.doi.org/10.1109/ICICS.2009.5397691 High speed satellite communication networks are emerging as part of the future global wireless communication systems. However, existing transmission control protocols for satellite networks do not provide satisfactory performance over high speed satellite links due to their ine…

business.industryComputer scienceTransmission Control ProtocolComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSReal-time computingTCP tuningScalable TCPVDP::Technology: 500::Information and communication technology: 550ThroughputH-TCPNetwork congestionComputer Science::Networking and Internet ArchitectureCommunications satellitebusinessBIC TCPComputer network2009 7th International Conference on Information, Communications and Signal Processing (ICICS)
researchProduct

Location-Aware Mobile Intrusion Detection with Enhanced Privacy in a 5G Context

2010

Published version of an article from the journal: Wireless Personal Communications. The original publication is available at Spingerlink. http://dx.doi.org/10.1007/s11277-010-0069-6 The paper proposes a location-aware mobile Intrusion Prevention System (mIPS) architecture with enhanced privacy that is integrated in Managed Security Service (MSS). The solution is envisaged in a future fifth generation telecommunications (5G) context with increased but varying bandwidth, a virtualised execution environment and infrastructure that allows threads, processes, virtual machines and storage to be migrated to cloud computing services on demand, to dynamically scale performance and save power. 5G mob…

business.industryComputer scienceVDP::Technology: 500::Information and communication technology: 550Context (language use)Cloud computingIntrusion detection systemManaged security servicecomputer.software_genreComputer securityComputer Science ApplicationsInformation sensitivityVirtual machineMalwareElectrical and Electronic EngineeringIntrusion prevention systembusinesscomputerMobile deviceComputer networkWireless Personal Communications
researchProduct