Search results for " computing"

showing 10 items of 2075 documents

Enabling Real-Time Computation of Psycho-Acoustic Parameters in Acoustic Sensors Using Convolutional Neural Networks

2020

Sensor networks have become an extremely useful tool for monitoring and analysing many aspects of our daily lives. Noise pollution levels are very important today, especially in cities where the number of inhabitants and disturbing sounds are constantly increasing. Psycho-acoustic parameters are a fundamental tool for assessing the degree of discomfort produced by different sounds and, combined with wireless acoustic sensor networks (WASNs), could enable, for example, the efficient implementation of acoustic discomfort maps within smart cities. However, the continuous monitoring of psycho-acoustic parameters to create time-dependent discomfort maps requires a high computational demand that …

Audio signalComputer scienceNoise pollutionbusiness.industryComputation010401 analytical chemistryReal-time computing01 natural sciencesConvolutional neural network0104 chemical sciencesWirelessElectrical and Electronic EngineeringbusinessInstrumentationWireless sensor networkIEEE Sensors Journal
researchProduct

On the Design of Probe Signals in Wireless Acoustic Sensor Networks Self-Positioning Algorithms

2018

A wireless acoustic sensor network comprises a distributed group of devices equipped with audio transducers. Typically, these devices can interoperate with each other using wireless links and perform collaborative audio signal processing. Ranging and self-positioning of the network nodes are examples of tasks that can be carried out collaboratively using acoustic signals. However, the environmental conditions can distort the emitted signals and complicate the ranging process. In this context, the selection of proper acoustic signals can facilitate the attainment of this goal and improve the localization accuracy. This letter deals with the design and evaluation of acoustic probe signals all…

Audio signalComputer sciencebusiness.industryApplied Mathematics020208 electrical & electronic engineeringReal-time computingBandwidth (signal processing)020206 networking & telecommunicationsRanging02 engineering and technologycomputer.software_genreTransducerSignal Processing0202 electrical engineering electronic engineering information engineeringChirpWirelessElectrical and Electronic EngineeringAudio signal processingbusinessFrequency modulationcomputerIEEE Signal Processing Letters
researchProduct

Auditory distance perception in an acoustic pipe

2008

In a study of auditory distance perception, we investigated the effects of exaggeration the acoustic cue of reverberation where the intensity of sound did not vary noticeably. The set of stimuli was obtained by moving a sound source inside a 10.2-m long pipe having a 0.3-m diameter. Twelve subjects were asked to listen to a speech sound while keeping their head inside the pipe and then to estimate the egocentric distance from the sound source using a magnitude production procedure. The procedure was repeated eighteen times using six different positions of the sound source. Results show that the point at which perceived distance equals physical distance is located approximately 3.5 m away fr…

Auditory displayReverberationRange (music)Critical distanceSound and Music ComputingGeneral Computer SciencePerformanceSpeech recognitionmedia_common.quotation_subjectExperimental and Cognitive PsychologySound and Music Computing; Auditory display; Distance perceptionTheoretical Computer ScienceLoudnessPerceptionExperimentationSound (geography)media_commonMathematicsExperimentation; Measurement; Performance; Acoustic pipe; Auditory display; Distance perceptionMeasurementgeographygeography.geographical_feature_categorySettore INF/01 - InformaticaAuditory displaySound intensityAcoustic pipeAcoustic pipe; auditory display; distance perceptionDistance perceptionACM Transactions on Applied Perception
researchProduct

Fingerprint Quality Evaluation in a Novel Embedded Authentication System for Mobile Users

2015

The way people access resources, data and services, is radically changing using modern mobile technologies. In this scenario, biometry is a good solution for security issues even if its performance is influenced by the acquired data quality. In this paper, a novel embedded automatic fingerprint authentication system (AFAS) for mobile users is described. The goal of the proposed system is to improve the performance of a standard embedded AFAS in order to enable its employment in mobile devices architectures. The system is focused on the quality evaluation of the raw acquired fingerprint, identifying areas of poor quality. Using this approach, no image enhancement process is needed after the …

AuthenticationArticle SubjectComputer Networks and CommunicationsComputer sciencebusiness.industrymedia_common.quotation_subjectFingerprint (computing)Real-time computingFingerprint Verification CompetitionComputer Science Applications1707 Computer Vision and Pattern RecognitionTK5101-6720Fingerprint recognitionComputer Science ApplicationsComputer Networks and CommunicationEmbedded systemData qualityTelecommunicationMobile technologyQuality (business)businessMobile devicemedia_commonMobile Information Systems
researchProduct

Analyzing the security of Windows 7 and Linux for cloud computing

2013

We review and analyze the major security features and concerns in deploying modern commodity operating systems such as Windows 7 and Linux 2.6.38 in a cloud computing environment. We identify the security weaknesses and open challenges of these two operating systems when deployed in the cloud environment. In particular, we examine and compare various operating system security features which are critical in providing a secure cloud. These security features include authentication, authorization and access control, physical memory protection, privacy and encryption of stored data, network access and firewalling capabilities, and virtual memory.

AuthenticationCloud computing securityGeneral Computer ScienceComputer sciencebusiness.industryAuthorizationData securityAccess controlCloud computingInformation securityComputer security modelAsset (computer security)EncryptionInternet securityComputer securitycomputer.software_genreSecurity and safety features new to Windows VistaSecurity information and event managementSecurity serviceNetwork Access ControlSecurity through obscuritybusinessLawcomputerComputers & Security
researchProduct

Using continuous user authentication to detect masqueraders

2003

Nowadays computer and network intrusions have become more common and more complicated, challenging the intrusion detection systems. Also, network traffic has been constantly increasing. As a consequence, the amount of data to be processed by an intrusion detection system has been growing, making it difficult to efficiently detect intrusions online. Proposes an approach for continuous user authentication based on the user’s behaviour, aiming at development of an efficient and portable anomaly intrusion detection system. A prototype of a host‐based intrusion detection system was built. It detects masqueraders by comparing the current user behaviour with his/her stored behavioural model. The m…

AuthenticationUser profileComputer scienceAnomaly-based intrusion detection systemReal-time computingIntrusion detection systemLibrary and Information SciencesManagement Science and Operations ResearchComputer securitycomputer.software_genreManagement Information SystemsInformation protection policyHost-based intrusion detection systemSystems architectureBusiness and International ManagementHost (network)computerInformation Management & Computer Security
researchProduct

Application of Radio Environment Map Reconstruction Techniques to Platoon-based Cellular V2X Communications

2020

Vehicle platoons involve groups of vehicles travelling together at a constant inter-vehicle distance, with different common benefits such as increasing road efficiency and fuel saving. Vehicle platooning requires highly reliable wireless communications to keep the group structure and carry out coordinated maneuvers in a safe manner. Focusing on infrastructure-assisted cellular vehicle to anything (V2X) communications, the amount of control information to be exchanged between each platoon vehicle and the base station is a critical factor affecting the communication latency. This paper exploits the particular structure and characteristics of platooning to decrease the control information exch…

Automobile DrivingComputer scienceReal-time computingvehicular communications02 engineering and technologylcsh:Chemical technologyradio environment mapsBiochemistryArticleAnalytical ChemistryElectrònica0202 electrical engineering electronic engineering information engineeringlcsh:TP1-1185Electrical and Electronic EngineeringInstrumentationIntelligent transportation systemComunicació i tecnologiaSpatial AnalysisCommunicationintelligent transportation systems020206 networking & telecommunicationsModels Theoreticalchannel acquisitionAtomic and Molecular Physics and OpticsKrigingVehicle platooning020201 artificial intelligence & image processingPlatoonspatial interpolation5GReflection mapping5GSensors
researchProduct

Efficient techniques for energy saving in data center networks

2018

Data centers are constructed with a huge number of network devices to support the expanding cloud based services. These devices are used to achieve the highest performance in case of full utilization of the network. However, the peak capacity of the network is rarely reached. Consequently, many devices are set into idle state and cause a huge energy waste leading to a non-proportionality between the network load and the energy consumed. In this paper, we propose a new approach to improve the efficiency of data centers in terms of energy consumption. Our approach exploits the correlation in time of the inter-node communication traffic and some topological features to maximize energy saving w…

Average path lengthNetwork topologyComputer Networks and Communicationsbusiness.industryComputer scienceScalability020206 networking & telecommunicationsCloud computingData center network02 engineering and technologyEnergy consumptionData center network Network topology Average path length Energy consumption ScalabilityNetwork topologyAverage path lengthNetworking hardware020202 computer hardware & architectureEnergy consumptionScalability0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]Data centerbusinessEnergy (signal processing)Computer networkComputer Communications
researchProduct

Construction of Disjoint Virtual Backbones for Wireless Sensor Networks

2020

A wireless sensor network is a wireless network of sensors aimed at monitoring physical events. It has ingratiated itself into almost all areas of human endeavors. Data dissemination in these networks is quite challenging and is generally accomplished by flooding. But flooding introduces broadcast storm problem due from implosion and overlap. To overcome this, topology management can prescribe a virtual backbone network to which routing is confined. In this paper we propose an algorithm that constructs multiple disjoint virtual backbone networks, using only nodes' locations. The disjointedness makes routing more robust and the network exploitation energy efficient. Simulations show our algo…

Backbone networkWireless networkbusiness.industryComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS05 social sciences030204 cardiovascular system & hematologyConnected dominating setFlooding (computer networking)03 medical and health sciences[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0302 clinical medicine0502 economics and business050211 marketingRouting (electronic design automation)[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]Broadcast radiationbusinessWireless sensor networkDisseminationComputingMilieux_MISCELLANEOUSComputer network
researchProduct

RoadMic: Road Surface Monitoring Using Vehicular Sensor Networks with Microphones

2010

Road surface analysis including pothole reports is an important problem for road maintainers and drivers. In this paper we propose a methodology for pothole detection using mobile vehicles equipped with off the shelf microphone and global positioning devices attached to an on-board computer. The approach is generic enough to be extended for other kind of event detection using different sensors as well. The vehicles are driving on public streets and measuring pothole induced sound signals. Our approach was tested and evaluated by real world experiments in a road segment for which we had established the ground truth beforehand. The results show pothole detection with high accuracy despite the…

Background noiseComputer scienceMicrophonebusiness.industryComputerSystemsOrganization_MISCELLANEOUSElectro-optical sensorRoad surfaceReal-time computingGlobal Positioning SystemMobile wireless sensor networkPotholebusinessWireless sensor network
researchProduct