Search results for " networking"
showing 10 items of 1264 documents
Self-Localization of Distributed Microphone Arrays Using Directional Statistics with DoA Estimation Reliability
2019
This paper addresses the problem of self-localization of distributed microphone arrays from microphone recordings by following a two-step optimization procedure. In the first step, the relative geometry of the sources and arrays is inferred by the proposed maximum likelihood estimator. It is derived under the assumption that the acquired unit-norm vectors pointing towards the unknown source positions follow a von Mises-Fisher distribution in a D-dimensional space. In the second step, the absolute positions and synchronization offsets between the arrays are estimated from the inferred relative geometry by using the Least Squares procedure. To improve the accuracy of the method, we propose as…
NFVMon: Enabling Multioperator Flow Monitoring in 5G Mobile Edge Computing
2018
With the advances of new-generation wireless and mobile communication systems such as the fifth-generation (5G) mobile networks and Internet of Things (IoT) networks, demanding applications such as Ultra-High-Definition video applications is becoming ever popular. These applications require real-time monitoring and processing to meet the mission-critical quality of service requirements and are expected to be supported by the emerging fog or edge computing paradigms. This paper presents NFVMon, a novel monitoring architecture to enable flow monitoring capabilities of network traffic in a 5G multioperator mobile edge computing environment. The proposed NFVMon is integrated with the management…
MCMIPv6: Multicast Configuration-based Mobile IPv6 protocol
2010
International audience; Mobile IPv6 (MIPv6) and its basic extension for network mobility NEMO were initially designed to manage the mobility of device users and networks respectively while maintaining a permanent IP address. Nevertheless, the different MIPv6's experiments have shown many lacks in case of high mobility of nodes such as in vehicular networks. To overcome these lacks, many solutions have been proposed by the research community. The most famous ones are HMIPv6 and FMIPv6 tackling each a specific issue. On the one hand, FMIPv6 introduces a solution to effectively minimize the L2/L3 latency and avoid the packets losses during the handover procedure. On the other hand, HMIPv6 is e…
Network Connectivity and Area Coverage for UAV Fleet Mobility Model with Energy Constraint
2016
International audience; Our main focus through the present paper is on developing an original distributed mobility model for autonomous fleet of interconnected UAVs (Unmanned Aerial Vehicles) performing an area exploration mission. The UAVs, equipped with wireless ad-hoc capabilities, are required to optimally explore an area while maintaining connectivity with their neighboring UAVs and the base station. Because energy is a scarce resource, especially for UAVs, its wise management is quite beneficial for the network lifetime and mission success. Hence, the proposed mobility model, compared to other models in the literature, is the first to ever include the remaining energy level as decisio…
Formal Analysis and Model Checking of a Group Authentication Protocol by Scyther
2016
Scyther [1] is designed to check the security and vulnerabilities of security protocols. In this paper, we use Scyther to analyze two discrete logarithm problem (DLP) based group authentication protocols proposed in [2]. These two protocols are claimed to satisfy several security requirements, but only part of them have been checked because of the properties and limitations of Scyther. Some positive results have been gained and show that the protocols provide mutual authentication and implicit key authentication and are secure against impersonation attack. An important innovation in this paper is that we have extended the expressing ability of Scyther by giving some reasonable assumption du…
Towards a Formal Analysis of MQtt Protocol in the Context of Communicating Vehicles
2017
International audience; The paper presents a formal approach to model, analyze, and verify a variant of Message Queue Telemetry Transport protocol (MQtt), dedicated to communicating vehicles (MQtt-CV) that send collected data to automotive infrastructures(subscribers). Our formal approach is based on Promela language and its system verification tool, the model checker SPIN. We propose a slight modification of MQtt protocol to reduce the big volume of data collected and sent by vehicles to infrastructures. Indeed, in the original version of MQtt protocol, when a broker receives data from publishers, it sends them directly to its subscribers without any filtration. As consequence, subscribers…
Survey of Formal Verification Methods for Smart Contracts on Blockchain
2019
Due to the immutable nature of distributed ledger technology such as blockchain, it is of utter importance that a smart contract works as intended before employment outside test network. This is since any bugs or errors will become permanent once published to the live network, and could lead to substantial economic losses; as manifested in the infamous DAO smart contract exploit hack in 2016. In order to avoid this, formal verification methods can be used to ensure that the contract behaves according to given specifications. This paper presents a survey of the state of the art of formal verification of smart contracts. Being a relatively new research area, a standard or best practice for fo…
Predictive analysis of Cardiac Resynchronization Therapy response by means of the ECG
2016
Aims: Cardiac Resynchronization Therapy (CRT) is an effective treatment for heart failure patients with moderate to severe symptoms. Unfortunately, a significant proportion of patients (up to 35%) do not respond to CRT (patients called "non-responders"). This results in a large cost-effectiveness relation for heart failure treatment. This study aims to assess the prediction response to CRT by means of analysing the ECG. Methods: We retrospectively analysed the surface ECG and QRS previous to CRT implantation in 45 consecutive patients with dilated (27) or ischemic (18) cardiomyopathy. We extracted the QRS and then processed a measure of energy of a discrete version of the Stockwell Transfor…
Bɪ-CомDᴇт: Community Detection in Bipartite Networks
2019
Abstract Extracting hidden communities from bipartite networks witnessed a determined effort. In this respect, different streams of research relied on bipartite networks to unveil communities. In this paper, we introduce a new approach, called Bi-Comdet, that aims to an efficient community detection in bipartite networks. The main trust of the introduced approach is that it stresses on the importance of grouping two types of nodes in communities having a full connection between its nodes. The quality of the unveiled communities, is assessed through some metrics borrowed from the FCA community, to wit modularity, overlapping and stability. These metrics are then aggregated through the use of…
Health Applications Based on Molecular Communications: A Brief Review
2019
This work analyses significant cases in which applications of molecular communication systems to nano/bio-hybrid medical field represent an ideal solution for medical therapies (e.g., for the treatment of diseases such as cancer). A review of the literature reveals that biocompatibility jointly with nanocommunication can be exploited to provide effective treatment of diseases and reduce side effects considerably when compared to conventional therapy. Biocompatibility avoids the immune response rejecting drugs and does not stimulate nerves, whereas nanocommunication is a promising technology that allows accessing small and delicate body sites non-invasively. Refereed/Peer-reviewed