Search results for " computing"

showing 10 items of 2075 documents

A survey on data center network topologies

2018

Data centers are the infrastructures that support the cloud computing services. So, their topologies have an important role on controlling the performance of these services. Designing an efficient topology with a high scalability and a good network performance is one of the most important challenges in data centers. This paper surveys recent research advances linked to data center network topologies. We review some representative topologies and discuss their proprieties in details. We compare them in terms of average path length, network fault tolerance, scalability and connection pattern techniques. Springer Nature Switzerland AG 2018. Acknowledgment. This publication was made possible by …

Computer sciencebusiness.industryCloud computing servicesData center topologyFault toleranceCloud computingTopology (electrical circuits)Network topologyAverage path lengthNetwork performanceScalabilityNetwork performanceData centerbusinessSurveyComputer network
researchProduct

Kalman filter estimation of the contention dynamics in error-prone IEEE 802.11 networks

2008

In the last years, several strategies for maximizing the throughput performance of IEEE 802.11 networks have been proposed in literature. Specifically, it has been shown that optimizations are possible both at the medium access control (MAC) layer, and at the physical (PHY) layer. In fact, at the MAC layer, it is possible to minimize the channel wastes due to collisions and backoff expiration times, by tuning the minimum contention window as a function of the number n of competing stations. At the PHY layer, it is possible to improve the transmission robustness, by selecting a suitable modulation/coding scheme as a function of the channel quality perceived by the stations. However, the feas…

Computer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSReal-time computingPhysical layerEstimatorKalman filterNetwork allocation vectorExtended Kalman filterWLANIEEE 802.11Robustness (computer science)PHYComputer Science::Networking and Internet Architecturekalman filterbusinessComputer network
researchProduct

Localization and Activity Classification of Unmanned Aerial Vehicle Using mmWave FMCW Radars

2021

In this article, we present a novel localization and activity classification method for aerial vehicle using mmWave frequency modulated continuous wave (FMCW) Radar. The localization and activity classification for aerial vehicle enables the utilization of mmWave Radars in security surveillance and privacy monitoring applications. In the proposed method, Radar’s antennas are oriented vertically to measure the elevation angle of arrival of the aerial vehicle from ground station. The height of the aerial vehicle and horizontal distance of the aerial vehicle from Radar station on ground are estimated using the measured radial range and the elevation angle of arrival. The aerial vehicle’s activ…

Computer sciencebusiness.industryComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONComputerApplications_COMPUTERSINOTHERSYSTEMSConvolutional neural networklaw.inventionSupport vector machinelawActivity classificationChirpRange (statistics)Computer visionGradient boostingArtificial intelligenceElectrical and Electronic EngineeringRadarbusinessInstrumentationEdge computingIEEE Sensors Journal
researchProduct

Robust Hand Gestures Recognition Using a Deep CNN and Thermal Images

2021

Medical systems and assistive technologies, human-computer interaction, human-robot interaction, industrial automation, virtual environment control, sign language translation, crisis and disaster management, entertainment and computer games, and so on all use RGB cameras for hand gesture recognition. However, their performance is limited especially in low-light conditions. In this paper, we propose a robust hand gesture recognition system based on high-resolution thermal imaging that is light-independent. A dataset of 14,400 thermal hand gestures is constructed, separated into two color tones. We also propose using a deep CNN to classify high-resolution hand gestures accurately. The propose…

Computer sciencebusiness.industryComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONSign languagecomputer.software_genreAutomationVirtual machineGesture recognitionBenchmark (computing)RGB color modelComputer visionArtificial intelligenceElectrical and Electronic EngineeringbusinessInstrumentationcomputerEdge computingGestureIEEE Sensors Journal
researchProduct

C<sup>2</sup>SMA/CA: Enabling co-channel concurrency in WLANs using positional information

2013

An attractive approach to overcome capacity limitations in a densely deployed WLAN environment is to enable transmission concurrency. In this paper, we propose a co-channel concurrent transmission scheme, referred to as C2SMA/CA, which determines whether to allow multiple concurrent transmissions based on interference estimation using positional information. A distributed multi-link concurrency scheduling algorithm is implemented, and its performance is evaluated through extensive simulations.

Computer sciencebusiness.industryDistributed computingConcurrencyComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSSMA*businessComputer networkScheduling (computing)2013 IEEE Wireless Communications and Networking Conference (WCNC)
researchProduct

MSS: A Multi-Level Data Placement Scheme for Data Survival in Wireless Sensor Networks

2009

In recently popularized unattended wireless sensor networks, sensed data are stored locally or some designated nodes for a long term and retrieved sometime by collectors on demand. Such data may be delete or modified as sensor nodes are always exposed to risks such as random failure and mobile adversary. To maximize the data survival, we propose a secure and efficient scheme - MSS. MSS makes use of hopbounded computational secret sharing to achieve fault tolerance and compromise resilience, and takes advantages of multi-level secret sharing to mitigate communication overhead and improve overall security. MSS has the most advantages in terms of security and efficiency among presented schemes…

Computer sciencebusiness.industryDistributed computingDistributed data storeOverhead (computing)Fault toleranceAdversarybusinessResilience (network)Wireless sensor networkSecret sharingComputer networkTerm (time)2009 5th International Conference on Wireless Communications, Networking and Mobile Computing
researchProduct

Comparative Analysis of Different Types of Micro-grid Architectures and Controls

2018

An innovative and smart micro-grid model is an essentialfor the integration of distributed energy resources into the electrical power distribution network. There are various types of micro-grid architectures that have been designed and implemented in the last few years. These micro-grid architectures have their key advantages and limitations. This paper has been prepared with the objective to identify and address, key challenges and solutions for integration of micro-grid into the distribution network. It reviewsdifferent micro-grid architectures and control strategies which can help to address various challenges i.e. voltage imbalance, power quality, demand side management, smooth islandin…

Computer sciencebusiness.industryDistributed computingDistributed generationControl (management)Key (cryptography)IslandingMicro gridPower qualityElectric powerbusinessVoltage2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN)
researchProduct

M-GRASP: A GRASP With Memory for Latency-Aware Partitioning Methods in DVE Systems

2009

A necessary condition for providing quality of service to distributed virtual environments (DVEs) is to provide a system response below a maximum threshold to the client computers. In this sense, latency-aware partitioning methods try to provide response times below the threshold to the maximum number of client computers as possible. These partitioning methods should find an assignment of clients to servers that optimizes system throughput, system latency, and partitioning efficiency. In this paper, we present a new algorithm based on greedy randomized adaptive search procedure with memory for finding the best solutions as possible to this problem. We take into account several different alt…

Computer sciencebusiness.industryDistributed computingGRASPComputer Science ApplicationsHuman-Computer InteractionControl and Systems EngineeringServerLocal search (optimization)Electrical and Electronic EngineeringGreedy algorithmbusinessMetaheuristicSoftwareGreedy randomized adaptive search procedureIEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans
researchProduct

Energy-Efficient M2M Communications in for Industrial Automation

2020

M2M communication with autonomous data acquisition and exchange plays a key role in realizing the “control”-oriented tactile Internet (TI) applications such as industrial automation. In this chapter, we develop a two-stage access control and resource allocation algorithm. In the first stage, we introduce a contract-based incentive mechanism to motivate some delay-tolerant machine-type communication (MTC) devices to postpone their access demands in exchange for higher access opportunities. In the second stage, a long-term cross-layer online resource allocation approach is based on Lyapunov optimization, which jointly optimizes rate control, power allocation, and channel selection without pri…

Computer sciencebusiness.industryDistributed computingKey (cryptography)Resource allocationAccess controlLyapunov optimizationThe InternetbusinessAutomationCommunication channelEfficient energy use
researchProduct

PTNet: A parameterizable data center network

2016

This paper presents PTNet, a new data center topology that is specifically designed to offer a high and parameterized scalability with just one layer architecture. Furthermore, despite its high scalability, PTNet grants a reduced latency and a high performance in terms of capacity and fault tolerance. Consequently, compared to widely known data center networks, our new topology shows better capacity, robustness, cost-effectiveness and less power consumption. Conducted experiments and theoretical analyses illustrate the performance of the novel system. 2016 IEEE. Scopus

Computer sciencebusiness.industryDistributed computingLogical topologypower consumption020206 networking & telecommunicationsFault tolerance02 engineering and technologyNetwork topologynetwork topologyRobustness (computer science)020204 information systemsServercostScalability0202 electrical engineering electronic engineering information engineeringData centerData centerfault tolerancebusinesslatencyscalability2016 IEEE Wireless Communications and Networking Conference
researchProduct