Search results for " networking"
showing 10 items of 1264 documents
A Framework for Activity Monitoring and Fall Detection Based on the Characteristics of Indoor Channels
2018
Author´s accepted manuscript © 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. This paper concerns the Doppler power spectrum of three-dimensional non-stationary indoor fixed-to- fixed channels with moving people. In this paper, we model each moving person as a moving scatterer with time-variant (TV) speed, TV vertical angles of motion, and TV horizontal angles o…
Modelling, Analysis, and Simulation of the Micro-Doppler Effect in Wideband Indoor Channels with Confirmation Through Pendulum Experiments
2020
This paper is about designing a 3D no n-stationary wideband indoor channel model for radio-frequency sensing. The proposed channel model allows for simulating the time-variant (TV) characteristics of the received signal of indoor channel in the presence of a moving object. The moving object is modelled by a point scatterer which travels along a trajectory. The trajectory is described by the object&rsquo
Machine Learning Techniques for Intrusion Detection: A Comparative Analysis
2016
International audience; With the growth of internet world has transformed into a global market with all monetary and business exercises being carried online. Being the most imperative resource of the developing scene, it is the vulnerable object and hence needs to be secured from the users with dangerous personality set. Since the Internet does not have focal surveillance component, assailants once in a while, utilizing varied and advancing hacking topologies discover a path to bypass framework " s security and one such collection of assaults is Intrusion. An intrusion is a movement of breaking into the framework by compromising the security arrangements of the framework set up. The techniq…
A Non-Stationary Channel Model for the Development of Non-Wearable Radio Fall Detection Systems
2018
The emerging non-wearable fall detection systems rely on processing radio waves reflected off the body of the home user who has no active interaction with the system, increasing the user privacy and acceptability. This paper proposes a nonstationary channel model that is important for the development of such systems. A three-dimensional stochastic trajectory model is designed to capture targeted mobility patterns of the home user. The model is featured with a forward fall mechanism, which is actuated at a random point along the path. A transmitter emits radio waves throughout an indoor propagation environment, while a receiver collects fingerprints of the scattering objects on the emitted w…
Modelling and Analysis of Non-Stationary Multipath Fading Channels with Time-Variant Angles of Arrival
2017
In mobile radio channel modelling, it is generally assumed that the angles of arrival (AOAs) are independent of time. This assumption does in general not agree with real-world channels in which the AOAs vary with the position of a moving receiver. In this paper, we first present a mathematical model for the time-variant AOAs. This model serves as the basis for the development of two non-stationary multipath fading channels models. The statistical properties of both channel models are analysed with emphasis on the time-dependent autocorrelation function (ACF), time-dependent mean Doppler shift, time-dependent Doppler spread, and the Wigner-Ville spectrum. It is shown that these characteristi…
Efficient linear fusion of partial estimators
2018
Abstract Many signal processing applications require performing statistical inference on large datasets, where computational and/or memory restrictions become an issue. In this big data setting, computing an exact global centralized estimator is often either unfeasible or impractical. Hence, several authors have considered distributed inference approaches, where the data are divided among multiple workers (cores, machines or a combination of both). The computations are then performed in parallel and the resulting partial estimators are finally combined to approximate the intractable global estimator. In this paper, we focus on the scenario where no communication exists among the workers, de…
Adaptive Importance Sampling: The past, the present, and the future
2017
A fundamental problem in signal processing is the estimation of unknown parameters or functions from noisy observations. Important examples include localization of objects in wireless sensor networks [1] and the Internet of Things [2]; multiple source reconstruction from electroencephalograms [3]; estimation of power spectral density for speech enhancement [4]; or inference in genomic signal processing [5]. Within the Bayesian signal processing framework, these problems are addressed by constructing posterior probability distributions of the unknowns. The posteriors combine optimally all of the information about the unknowns in the observations with the information that is present in their …
The Possibilities of Using BCI Technology in Biomedical Engineering
2018
The paper presents capabilities of building devices dedicated for persons with heavy mobility dysfunction and indicates the role of interfaces connecting brain with computer (Brain Computer Interface, BCI). Impulses coming from closing eyes, clenching teeth, and tongue movement were proposed as optimal in controlling the applications that manage executable systems. A group of electrodes giving a strong electric signal characteristic for the activity were designated and on the basis of conducted research a proposition of a scientific project concerning building of supporting devices for persons with heavy mobility dysfunction was presented.
Logical Key Hierarchy for Group Management in Distributed Online Social Networks
2016
Distributed Online Social Networks (DOSNs) have recently been proposed to shift the control over user data from a unique entity to the users of the DOSN themselves. In this paper, we focus our attention on the problem of privacy preserving content sharing to a large group of users of the DOSNs. Several solutions, based on cryptographic techniques, have been recently proposed. The main challenge here is the definition of a scalable and decentralized approach that: i) minimizes the re-encryption of the contents published in a group when the composition of the group changes and ii) enables a fast distribution of the cryptographic keys to all the members (n) of a group, each time a new user is …
Outage Probability Analysis of User-Centric SBS-Based HCNets Under Hybrid Rician/Rayleigh Fading
2020
To model dense user equipment (UE) distribution in heterogeneous cellular networks (HCNets), the Poisson cluster process (PCP) has emerged as a promising tool. In user-centric HCNets where UEs are distributed according to a PCP around a small base station (SBS), the network performance has been commonly studied in literature under a Rayleigh fading environment assumption. However, such an assumption may not hold in user-centric HCNets given the possible existence of a strong line-of-sight (LOS) link between UEs and BSs due to a relatively short transmission distance. This letter analyzes the performance of user-centric SBS based HCNets by considering that the desired LOS link experiences Ri…