Search results for " networking"

showing 10 items of 1264 documents

Fast 3D Ray Tracing for Indoor Coverage Solutions

2016

Optimal wireless indoor network planning requires huge number of iterations and evaluations of indoor coverage for each antenna location until an optimal solution is reached. Consequently, accurate and scalable calculation of power strength for indoor scenarios becomes necessary. The contribution in this paper is to reduce the complexity of 3D ray tracing for deterministic indoor power prediction. In order to achieve that while preserving the accuracy, image theory with feasible reflection volume as preprocessing approach is introduced. This proposed algorithm stores the image, its feasible reflection volume and valid area of receiving points. Significant complexity reduction is achieved by…

business.industry020206 networking & telecommunications020302 automobile design & engineering02 engineering and technologyTracingNetwork planning and designReduction (complexity)0203 mechanical engineeringScalability0202 electrical engineering electronic engineering information engineeringElectronic engineeringWirelessPreprocessorRay tracing (graphics)Preprocessing algorithmbusinessAlgorithmMathematics2016 IEEE 84th Vehicular Technology Conference (VTC-Fall)
researchProduct

Learning-based multiresolution transforms with application to image compression

2013

In Harten's framework, multiresolution transforms are defined by predicting finer resolution levels of information from coarser ones using an operator, called prediction operator, and defining details (or wavelet coefficients) that are the difference between the exact and predicted values. In this paper we use tools of statistical learning in order to design a more accurate prediction operator in this framework based on a training sample, resulting in multiresolution decompositions with enhanced sparsity. In the case of images, we incorporate edge detection techniques in the design of the prediction operator in order to avoid Gibbs phenomenon. Numerical tests are presented showing that the …

business.industry020206 networking & telecommunicationsPattern recognition02 engineering and technologySample (graphics)Edge detectionGibbs phenomenonsymbols.namesakeWaveletOperator (computer programming)Control and Systems EngineeringCompression (functional analysis)Statistical learning theorySignal Processing0202 electrical engineering electronic engineering information engineeringsymbols020201 artificial intelligence & image processingComputer Vision and Pattern RecognitionArtificial intelligenceElectrical and Electronic EngineeringbusinessSoftwareImage compressionMathematicsSignal Processing
researchProduct

Perceptual image quality assessment using a normalized Laplacian pyramid

2016

business.industryComputer science0202 electrical engineering electronic engineering information engineeringLaplacian pyramid020206 networking & telecommunications020201 artificial intelligence & image processingPerceptual image qualityComputer vision02 engineering and technologyArtificial intelligencebusinessElectronic Imaging
researchProduct

Localization-Free Power Cartography

2018

Author's accepted manuscript (postprint). © 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. Spectrum cartography constructs maps of metrics such as channel gain or received signal power across a geographic area of interest using measurements of spatially distributed sensors. Applications of these maps include network planning, interference coordination, power con…

business.industryComputer science020206 networking & telecommunications02 engineering and technologySignalNetwork planning and designCognitive radioInterference (communication)0202 electrical engineering electronic engineering information engineeringGlobal Positioning SystembusinessCartographyMultipath propagationPower control
researchProduct

Facilitating IP deployment in a MARTE-based MDE methodology using IP-XACT: a XILINX EDK case study

2012

International audience; In this paper we present framework for the deployment of hardware IPs at high-levels of abstraction. It is based in a model- driven approach that aims at the automatic generation of Dynamic Partial Reconfiguration designs created in Xilinx Platform Studio (XPS). Contrary to previous approaches, we make use of the IP-XACT standard to facilitate the deployment of hardware IPs, their parameterization and subsequent integration. We propose an extension to the MARTE profile for IP deployment, and we introduce the necessary model transformations to obtain a high- level representation from an IP-XACT component library. These models are then used to create a platform in MART…

business.industryComputer science020208 electrical & electronic engineeringHardware description languageControl reconfiguration020206 networking & telecommunications02 engineering and technology[INFO.INFO-ES] Computer Science [cs]/Embedded SystemsUnified Modeling LanguageSoftware deploymentEmbedded systemComponent (UML)IP-XACT0202 electrical engineering electronic engineering information engineeringSystem integration[INFO.INFO-ES]Computer Science [cs]/Embedded Systems[ INFO.INFO-ES ] Computer Science [cs]/Embedded SystemsbusinesscomputerImplementationcomputer.programming_language
researchProduct

Design and implementation of a long-range low-power wake-up radio and customized DC-MAC protocol for LoRaWAN

2019

In this paper, we present the design and implementation of a long-rage wake-up radio (WuR) and customized duty cycled (DC) MAC protocol for wireless IoT devices. The WuRx achieves a sensivity of −70 dBm by consuming just 0.032 mA, thereby optimizing the energy consumption of battery powered long-range wireless IoT devices. Reducing the power consumption of these devices minimizes the overall costs when deployed in large scale.

business.industryComputer science05 social sciencesBattery (vacuum tube)050801 communication & media studies020206 networking & telecommunications02 engineering and technologyEnergy consumptionPower (physics)0508 media and communicationsPower consumptionEmbedded systemRange (aeronautics)0202 electrical engineering electronic engineering information engineeringWirelessbusinessInternet of ThingsProtocol (object-oriented programming)2019 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)
researchProduct

WiHAR : From Wi-Fi Channel State Information to Unobtrusive Human Activity Recognition

2020

A robust and unobtrusive human activity recognition system is essential to a multitude of applications, such as health care, active assisted living, robotics, sports, and tele-immersion. Existing well-performing activity recognition methods are either vision- or wearable sensor-based. However, they are not fully passive. In this paper, we develop WiHAR—an unobtrusive Wi-Fi-based activity recognition system. WiHAR uses the Wi-Fi network interface card to capture the channel state information (CSI) data. These CSI data are effectively processed, and then amplitude and phase information is used to obtain the spectrogram. In the subsequent step, the time-variant mean Doppler shift (MDS) caused …

business.industryComputer science05 social sciencesDecision treeWearable computer050801 communication & media studies020206 networking & telecommunicationsComputingMilieux_LEGALASPECTSOFCOMPUTING02 engineering and technologyLinear discriminant analysisActivity recognitionSupport vector machine0508 media and communicationsChannel state information0202 electrical engineering electronic engineering information engineeringSpectrogramComputer visionArtificial intelligencebusinessVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550
researchProduct

Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets

2021

International audience; With the Internet's unprecedented growth and nations' reliance on computer networks, new cyber‐attacks are created every day as means for achieving financial gain, imposing political agendas, and developing cyberwarfare arsenals. Network security is thus acquiring increasing attention among researchers, practitioners, network architects, policy makers, and others. To defend organizations' networks from existing, foreseen, and future threats, intrusion detection systems (IDSs) are becoming a must. Existing surveys on anomaly‐based IDS (AIDS) focus on specific components such as detection mechanisms and lack many others. In contrast to existing surveys, this article co…

business.industryComputer scienceAnomaly (natural sciences)020206 networking & telecommunications02 engineering and technologyIntrusion detection system[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]Computer securitycomputer.software_genre[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR][INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingThe Internet[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Electrical and Electronic Engineering[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businesscomputer
researchProduct

Ontological Analysis and Modularization of CIDOC-CRM

2020

Conference cancelled due to COVID19; International audience; The CIDOC-CRM ontology is a standard for cultural heritage data modeling. Despite its large exploitation, the ontology is primarily maintained in a semi-formal notation, which makes it difficult to homogeneously exploit it in digital environments. In addition, the ontology consists of several classes and relations, whereas one sometimes wishes to reuse it but only partially. The purpose of the paper is to contribute to the use of CIDOC by strengthening its foundations. On the basis of formal ontology theories, we propose a first analysis of the ontology to enhance its conceptual structure. We also present a preliminary modularizat…

business.industryComputer scienceCIDOC-CRM0202 electrical engineering electronic engineering information engineering020206 networking & telecommunications020201 artificial intelligence & image processing02 engineering and technologySoftware engineeringbusinessOntological AnalysisModularization[INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI]
researchProduct

Lightweight Relay Selection in Multi-Hop Wake-Up Radio Enabled IoT Networks

2018

Wake-up Radios (WuRs) are becoming more popular in Internet of Things (IoT) networks owing to their overwhelming advantages such as low latency, high energy saving, and on-demand communication. In a multi-hop WuR-IoT network, route establishment between source and destination prior to actual data communications consumes a significant portion of energy. To reduce energy consumption and protocol overhead for route establishment, we propose a lightweight relay (LR) selection scheme, referred to as LR-WuR, where a lookup table and acknowledgment are used for next hop relay selection. We develop an analytical model to evaluate the performance of LR-WuR. Extensive simulations are performed to val…

business.industryComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020208 electrical & electronic engineering020206 networking & telecommunications02 engineering and technologyEnergy consumptionWakelaw.inventionHop (networking)Protocol overheadRelaylaw0202 electrical engineering electronic engineering information engineeringbusinessInternet of ThingsComputer network2018 IEEE Global Communications Conference (GLOBECOM)
researchProduct