Search results for " networking"

showing 10 items of 1264 documents

Virtual Environment for Implementation and Testing Private Wide Area Network Solutions

2013

In this paper the concept of virtual environment for implementation and testing private Wide Area Network (WAN) solutions is presented. The VMware vSphere virtualization platform is used. The paper presents the ability to reflect the structure of any given WAN topology using Vyatta software routers and VMware virtualization platform and verifies its reliability regarding data transfer. The paper includes a number of performance tests to verify the dependability of the proposed solution and provide a proof-of-concept for the network topology during the Design phase of the PPDIOO methodology, right before the Implementation phase.

Computer sciencebusiness.industryReliability (computer networking)Virtualizationcomputer.software_genreNetwork topologyWide area networkVirtual machineDependabilityEnterprise private networkbusinesscomputerVirtual networkComputer network
researchProduct

Autonomous Demand Side Management of Electric Vehicles in a Distribution Grid

2019

The electricity demand due to the increasing number of EVs presents new challenges for the operation of the electricity network, especially for the distribution grids. The existing grid infrastructure may not be sufficient to meet the new demands imposed by the integration of EVs. Thus, EV charging may possibly lead to reliability and stability issues, especially during the peak demand periods. Demand side management (DSM) is a potential and promising approach for mitigation of the resulting impacts. In this work, we developed an autonomous DSM strategy for optimal charging of EVs to minimize the charging cost and we conducted a simulation study to evaluate the impacts to the grid operation…

Computer sciencebusiness.industrySmart meter020209 energyReliability (computer networking)020208 electrical & electronic engineeringTopology (electrical circuits)02 engineering and technologyGridAutomotive engineeringBase load power plantPeak demand0202 electrical engineering electronic engineering information engineeringElectricitybusinessVoltage drop2019 7th International Youth Conference on Energy (IYCE)
researchProduct

Cooperative compressive power spectrum estimation in wireless fading channels

2017

This paper considers multiple wireless sensors that cooperatively estimate the power spectrum of the signals received from several sources. We extend our previous work on cooperative compressive power spectrum estimation to accommodate the scenario where the statistics of the fading channels experienced by different sensors are different. The signals received from the sources are assumed to be time-domain wide-sense stationary processes. Multiple sensors are organized into several groups, where each group estimates a different subset of lags of the temporal correlation. A fusion centre (FC) combines these estimates to obtain the power spectrum. As each sensor group computes correlation esti…

Computer sciencebusiness.industrycorrelation lagSub-Nyquist samplingEstimatorSpectral densityfading020206 networking & telecommunicationsmulticoset sampling02 engineering and technologypower spectrumSignalwide-sense stationarycooperative estimationComputer Science::Networking and Internet Architecture0202 electrical engineering electronic engineering information engineeringWireless020201 artificial intelligence & image processingFadingUniquenessNyquist ratebusinessAlgorithmWireless sensor network2017 International Conference on Electrical Engineering and Informatics (ICELTICs)
researchProduct

Does Wake-Up Radio Always Consume Lower Energy Than Duty-Cycled Protocols?

2017

Many recent studies anticipate that wake-up radio (WuR) will replace traditional duty-cycled (DC) protocols given its overwhelming performance superiority on energy consumption. Meanwhile, the question on whether WuR performs always better than DC protocols has not been answered explicitly. In this paper, we investigate in-depth the energy consumption performance of WuR by considering various levels of traffic load in a wireless sensor network. By comparing SCM-WuR with both synchronous MAC (S-MAC) and asynchronous MAC (X-MAC), we ascertain that SCM-WuR does consume orders of magnitude lowerenergythanDCprotocolswhentrafficloadislow.Howe ver, our numerical results reveal at the same time that …

Computer sciencebusiness.industrymedia_common.quotation_subject020208 electrical & electronic engineering020206 networking & telecommunications02 engineering and technologyEnergy consumptionWakeSynchronizationOrders of magnitude (bit rate)Asynchronous communicationRange (aeronautics)0202 electrical engineering electronic engineering information engineeringbusinessWireless sensor networkDutymedia_commonComputer network2017 IEEE 86th Vehicular Technology Conference (VTC-Fall)
researchProduct

Dynamic Flow-Adaptive Spectrum Leasing with Channel Aggregation in Cognitive Radio Networks.

2020

Cognitive radio networks (CRNs), which allow secondary users (SUs) to dynamically access a network without affecting the primary users (PUs), have been widely regarded as an effective approach to mitigate the shortage of spectrum resources and the inefficiency of spectrum utilization. However, the SUs suffer from frequent spectrum handoffs and transmission limitations. In this paper, considering the quality of service (QoS) requirements of PUs and SUs, we propose a novel dynamic flow-adaptive spectrum leasing with channel aggregation. Specifically, we design an adaptive leasing algorithm, which adaptively adjusts the portion of leased channels based on the number of ongoing and buffered PU …

Computer sciencechannel aggregating02 engineering and technologyBlocking (statistics)lcsh:Chemical technologyBiochemistryArticleAnalytical Chemistry0203 mechanical engineeringflow-adaptive spectrum leasing0202 electrical engineering electronic engineering information engineeringlcsh:TP1-1185Electrical and Electronic EngineeringInstrumentationVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550business.industryQuality of serviceSpectrum (functional analysis)020302 automobile design & engineering020206 networking & telecommunicationsAtomic and Molecular Physics and OpticsCognitive radioTransmission (telecommunications)Flow (mathematics)cognitive radio networksbusinessCommunication channelComputer networkSensors (Basel, Switzerland)
researchProduct

Implementation and Deployment Evaluation of the DMAMAC Protocol for Wireless Sensor Actuator Networks

2016

Abstract The increased application of wireless technologies including Wireless Sensor Actuator Networks (WSAN) in industry has given rise to a plethora of protocol designs. These designs target metrics ranging from energy efficiency to real-time constraints. Protocol design typically starts with a requirements specification, and continues with analytic and model-based simulation analysis. State-of- the-art network simulators provide extensive physical environment emulation, but still have limitations due to model abstractions. Deployment testing on actual hardware is therefore vital in order to validate implementability and usability in the real environment. The contribution of this article…

Computer sciencecomputer.internet_protocolTime division multiple accessWireless Routing Protocol02 engineering and technologyPacket lossWireless sensor networks and applications0202 electrical engineering electronic engineering information engineeringWirelessSuperframeNetwork architecture and designProtocol (object-oriented programming)Communication protocols.General Environmental ScienceEmulationbusiness.industry020206 networking & telecommunicationsKey distribution in wireless sensor networksEmbedded systemInternetwork protocolGeneral Earth and Planetary Sciences020201 artificial intelligence & image processingCommunications protocolbusinesscomputerReverse Address Resolution ProtocolEfficient energy useProcedia Computer Science
researchProduct

Efficient Hybrid Emergency Aware MAC Protocol for Wireless Body Sensor Networks

2018

International audience; In Body Sensor Networks (BSNs), two types of events should be addressed: periodic and emergency events. Traffic rate is usually low during periodic observation, and becomes very high upon emergency. One of the main and challenging requirements of BSNs is to design Medium Access Control (MAC) protocols that guarantee immediate and reliable transmission of data in emergency situations, while maintaining high energy efficiency in non-emergency conditions. In this paper, we propose a new emergency aware hybrid DTDMA/DS-CDMA protocol that can accommodate BSN traffic variations by addressing emergency and periodic traffic requirements. It takes advantage of the high delay …

Computer sciencedelayAccess control02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]DTDMAlcsh:Chemical technology01 natural sciencesBiochemistryArticleAnalytical Chemistry[INFO.INFO-IU]Computer Science [cs]/Ubiquitous ComputingBSN[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]energy consumption0202 electrical engineering electronic engineering information engineeringWirelesslcsh:TP1-1185Electrical and Electronic EngineeringInstrumentationMACbusiness.industryNetwork packet010401 analytical chemistryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunicationsEnergy consumption[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationAtomic and Molecular Physics and Optics0104 chemical sciences[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]packet drop[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessWireless sensor networkEfficient energy useComputer networkDS-CDMAOPNETSensors
researchProduct

Knowledge-based verification of concatenative programming patterns inspired by natural language for resource-constrained embedded devices

2020

We propose a methodology to verify applications developed following programming patterns inspired by natural language that interact with physical environments and run on resource-constrained interconnected devices. Natural language patterns allow for the reduction of intermediate abstraction layers to map physical domain concepts into executable code avoiding the recourse to ontologies, which would need to be shared, kept up to date, and synchronized across a set of devices. Moreover, the computational paradigm we use for effective distributed execution of symbolic code on resource-constrained devices encourages the adoption of such patterns. The methodology is supported by a rule-based sys…

Computer scienceinternet of thing02 engineering and technologycomputer.software_genrelcsh:Chemical technologyBiochemistryOracleArticleAnalytical ChemistryDomain (software engineering)Softwarewireless sensor network0202 electrical engineering electronic engineering information engineeringlcsh:TP1-1185Electrical and Electronic Engineeringdistributed programmingwireless sensor networksEmbedded systemInstrumentationAbstraction (linguistics)concatenative languagessymbolic programmingSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniSymbolic programmingProgramming languagebusiness.industryRuntime verification020206 networking & telecommunications020207 software engineeringcomputer.file_formatforthinternet of thingsAtomic and Molecular Physics and Opticsconcatenative languageProgramming patternsembedded systemsExecutablebusinesscomputerNatural language
researchProduct

Evaluation of Ensemble Machine Learning Methods in Mobile Threat Detection

2017

The rapid growing trend of mobile devices continues to soar causing massive increase in cyber security threats. Most pervasive threats include ransom-ware, banking malware, premium SMS fraud. The solitary hackers use tailored techniques to avoid detection by the traditional antivirus. The emerging need is to detect these threats by any flow-based network solution. Therefore, we propose and evaluate a network based model which uses ensemble Machine Learning (ML) methods in order to identify the mobile threats, by analyzing the network flows of the malware communication. The ensemble ML methods not only protect over-fitting of the model but also cope with the issues related to the changing be…

Computer scienceintrusion detection0211 other engineering and technologiesDecision tree02 engineering and technologycomputer.software_genreComputer securitymobiililaitteet0202 electrical engineering electronic engineering information engineeringsupervised machine learningSoarAndroid (operating system)tietoturvata113021110 strategic defence & security studiesta213business.industrymobile threatsensemble methods020206 networking & telecommunicationsFlow networkEnsemble learninganomaly detectionmachine learningkoneoppiminenMalwareThe InternetbusinesscomputerMobile device
researchProduct

Assessment of Deep Learning Methodology for Self-Organizing 5G Networks

2019

In this paper, we present an auto-encoder-based machine learning framework for self organizing networks (SON). Traditional machine learning approaches, for example, K Nearest Neighbor, lack the ability to be precisely predictive. Therefore, they can not be extended for sequential data in the true sense because they require a batch of data to be trained on. In this work, we explore artificial neural network-based approaches like the autoencoders (AE) and propose a framework. The proposed framework provides an advantage over traditional machine learning approaches in terms of accuracy and the capability to be extended with other methods. The paper provides an assessment of the application of …

Computer scienceintrusion detection5G-tekniikka02 engineering and technologyIntrusion detection systemself-organizing networks (SON)Machine learningcomputer.software_genrelcsh:Technologyk-nearest neighbors algorithmself-organizing networkslcsh:Chemistryautoencoder (AE)deep learning (DL)mobility load balancing0202 electrical engineering electronic engineering information engineeringGeneral Materials ScienceInstrumentationlcsh:QH301-705.5Fluid Flow and Transfer ProcessesautoencoderArtificial neural networkbusiness.industrylcsh:Tmobility load balancing (MLB)Process Chemistry and TechnologyDeep learningGeneral Engineeringdeep learning020206 networking & telecommunicationsSelf-organizing networkLoad balancing (computing)021001 nanoscience & nanotechnologyAutoencoderlcsh:QC1-999Computer Science Applicationscell outage detectionlcsh:Biology (General)lcsh:QD1-999lcsh:TA1-2040Cellular networkArtificial intelligence0210 nano-technologybusinesslcsh:Engineering (General). Civil engineering (General)computerlcsh:Physics5G
researchProduct