Search results for " computing"
showing 10 items of 2075 documents
A new inter-cloud service-level guarantee protocol applied to space missions
2017
Nowadays, the term cloud computing often falsely assumes the availability of an unlimited pool of resources. On the contrary, if a cloud provider reaches its limits, it may pose the risk of breaking their service level agreement (SLA). Space agencies could start using the cloud computing model within their IT infrastructure with multiple ground control points around the world to reduce the cost. An inter-cloud communication protocol with a guarantee of the service level will significantly reduce the cost if each ground control segment is considered as a cloud provider. This paper outlines a new protocol that was developed to take into consideration the end-to-end service-level guarantee. Th…
A Hybrid Algorithm Based on WiFi for Robust and Effective Indoor Positioning
2019
Indoor positioning based on the Wireless Fidelity (WiFi) protocol and the Pedestrian Dead Reckoning (PDR) approach is widely exploited because of the existing WiFi infrastructure in buildings and the advancement of built-in smartphone sensors. In this work, a hybrid algorithm that combines WiFi fingerprinting and PDR to both exploit their advantages as well as limiting the impact of their disadvantages is proposed. Specifically, to build a probability map from noisy Received Signal Strength (RSS), a Gaussian Process (GP) regression is deployed to estimate and construct the RSS fingerprints with incomplete data. Mean and variance of generated points are used to estimate WiFi fingerprinting p…
Autonomy, Heterogeneity and Trust in Mobile P2P environments
2007
Mobile P2P environments are emerging as a result of rapid expansion of portable terminals that are able to establish direct wireless communication links among themselves. These kinds of terminals are under the control of persons and allowing interactions between their terminals is subject to trust between the individuals and their desire to preserve various aspects of autonomy against each other. In this paper we relate the concepts of node autonomy, heterogeneity and trust with each other, defining also numeric measures for them. We also investigate what kind of interactions (such as transactions, file exchanges) are possible at certain heterogeneity, autonomy and trust level between the t…
Energy Efficient Optimization for Solar-Powered UAV Communications System
2021
In this work, we explore the energy efficiency optimization for a solar-powered unmanned aerial vehicle (UAV) communications system. We consider a scenario where a number of ground users (GUs) connect with a solar-powered multi-antenna UAV over a wireless link. First, we are able to derive the relations between the uplink data rate and heading angle of UAV and transmission power of GUs. In addition, the harvested energy from solar light is also affected by UAV’s angle. Accordingly, with the objective to maximize the energy efficiency that is related to uplink data rate and energy consumption, we propose to dynamically adjust the UAV trajectory and gesture, by optimizing its velocity, accele…
Experimental Characterization of Mobile Fading Channels Aiming the Design of Non-Wearable Fall Detection Radio Systems at 5.9 GHz
2016
One of the major concerns for the independent living of elderlies is a fall incident. To decrease human interaction errors and user privacy concerns of existing fall detection systems, a new generation of fall detection systems is emerging. The new trend is to design non-wearable devices that can monitor the physical activities of the home user using radio waves reflected off the body. This paper reports an in-home radio measurement campaign at 5.9 GHz, which has been conducted to study the impacts of different physical activities of the user, including fall incidents, on the channel transfer function (CTF) and the power delay profile (PDP) of indoor mobile radio channels. The home is equip…
Mobile cloud computing educational tool for image/video processing algorithms
2011
This paper shows the importance and benefit of coupling cloud computing with mobile especially due to power limitations that mobile devices exhibit. Moreover, the work done shows that mobile computing can be applied for educational purposes, where a tool for students termed Mobi4Ed is presented. This educational tool aims at exploiting the concept of cloud computing in the context of image and video processing, where students can assess several algorithms in real-time. Two possible system architectures are detailed, where one uses the cellular channel and the other uses the data channel. Consequently, one of the approaches is adopted and a detailed simulation is done where an Android client…
Learning from Errors: Detecting ZigBee Interference in WiFi Networks
2014
In this work we show how to detect ZigBee interference on commodity WiFi cards by monitoring the reception errors, such as synchronization errors, invalid header formats, too long frames, etc., caused by ZigBee transmissions. Indeed, in presence of non-WiFi modulated signals, the occurrence of these types of errors follows statistics that can be easily recognized. Moreover, the duration of the error bursts depends on the transmission interval of the interference source, while the error spacing depends on the receiver implementation. On the basis of these considerations, we propose the adoption of hidden Markov chains for characterizing the behavior of WiFi receivers in presence of controlle…
Analysis of the Effect of Human Presence on a Wireless Sensor Network
2011
Wireless Sensor Networks (WSNs) are gaining an increasing industry wide adoption. However, there remain major challenges such as network dimensioning and node placement especially in Built Environment Networks (BENs). Decisions on the node placement, orientation, and the number of nodes to cover the area of interest are usually ad-hoc. Ray tracing tools are traditionally employed to predict RF signal propagation; however, such tools are primarily intended for outdoor environments. RF signal propagation varies greatly indoors due to building materials and infrastructure, obstacles, node placement, antenna orientation and human presence. Because of the complexity of signal prediction, these f…
An enhanced TCP congestion avoidance scheme and its performance evaluation in high speed satellite networks
2009
©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE." Article also available from publisher: http://dx.doi.org/10.1109/ICICS.2009.5397691 High speed satellite communication networks are emerging as part of the future global wireless communication systems. However, existing transmission control protocols for satellite networks do not provide satisfactory performance over high speed satellite links due to their ine…
Location-Aware Mobile Intrusion Detection with Enhanced Privacy in a 5G Context
2010
Published version of an article from the journal: Wireless Personal Communications. The original publication is available at Spingerlink. http://dx.doi.org/10.1007/s11277-010-0069-6 The paper proposes a location-aware mobile Intrusion Prevention System (mIPS) architecture with enhanced privacy that is integrated in Managed Security Service (MSS). The solution is envisaged in a future fifth generation telecommunications (5G) context with increased but varying bandwidth, a virtualised execution environment and infrastructure that allows threads, processes, virtual machines and storage to be migrated to cloud computing services on demand, to dynamically scale performance and save power. 5G mob…