Search results for " networking"

showing 10 items of 1264 documents

Self-Localization of Distributed Microphone Arrays Using Directional Statistics with DoA Estimation Reliability

2019

This paper addresses the problem of self-localization of distributed microphone arrays from microphone recordings by following a two-step optimization procedure. In the first step, the relative geometry of the sources and arrays is inferred by the proposed maximum likelihood estimator. It is derived under the assumption that the acquired unit-norm vectors pointing towards the unknown source positions follow a von Mises-Fisher distribution in a D-dimensional space. In the second step, the absolute positions and synchronization offsets between the arrays are estimated from the inferred relative geometry by using the Least Squares procedure. To improve the accuracy of the method, we propose as…

MicrophoneComputer scienceDirectional statistics020206 networking & telecommunications02 engineering and technologySpace (mathematics)Least squaresMeasure (mathematics)SynchronizationDistribution (mathematics)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingAlgorithmReliability (statistics)2019 27th European Signal Processing Conference (EUSIPCO)
researchProduct

NFVMon: Enabling Multioperator Flow Monitoring in 5G Mobile Edge Computing

2018

With the advances of new-generation wireless and mobile communication systems such as the fifth-generation (5G) mobile networks and Internet of Things (IoT) networks, demanding applications such as Ultra-High-Definition video applications is becoming ever popular. These applications require real-time monitoring and processing to meet the mission-critical quality of service requirements and are expected to be supported by the emerging fog or edge computing paradigms. This paper presents NFVMon, a novel monitoring architecture to enable flow monitoring capabilities of network traffic in a 5G multioperator mobile edge computing environment. The proposed NFVMon is integrated with the management…

Mobile edge computingArticle SubjectComputer Networks and CommunicationsComputer sciencebusiness.industrylcsh:TQuality of serviceTestbed020206 networking & telecommunicationsCloud computing02 engineering and technologylcsh:Technologylcsh:Telecommunicationlcsh:TK5101-67200202 electrical engineering electronic engineering information engineeringWireless020201 artificial intelligence & image processingElectrical and Electronic EngineeringbusinessInternet of Things5GEdge computingInformation SystemsComputer networkWireless Communications and Mobile Computing
researchProduct

MCMIPv6: Multicast Configuration-based Mobile IPv6 protocol

2010

International audience; Mobile IPv6 (MIPv6) and its basic extension for network mobility NEMO were initially designed to manage the mobility of device users and networks respectively while maintaining a permanent IP address. Nevertheless, the different MIPv6's experiments have shown many lacks in case of high mobility of nodes such as in vehicular networks. To overcome these lacks, many solutions have been proposed by the research community. The most famous ones are HMIPv6 and FMIPv6 tackling each a specific issue. On the one hand, FMIPv6 introduces a solution to effectively minimize the L2/L3 latency and avoid the packets losses during the handover procedure. On the other hand, HMIPv6 is e…

Mobility modelVehicular ad hoc networkMulticastComputer sciencebusiness.industryNetwork packetComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSMobile computing020206 networking & telecommunications02 engineering and technology[SPI]Engineering Sciences [physics]Stateful firewallMobile IP0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinessMobility managementComputingMilieux_MISCELLANEOUSComputer network
researchProduct

Network Connectivity and Area Coverage for UAV Fleet Mobility Model with Energy Constraint

2016

International audience; Our main focus through the present paper is on developing an original distributed mobility model for autonomous fleet of interconnected UAVs (Unmanned Aerial Vehicles) performing an area exploration mission. The UAVs, equipped with wireless ad-hoc capabilities, are required to optimally explore an area while maintaining connectivity with their neighboring UAVs and the base station. Because energy is a scarce resource, especially for UAVs, its wise management is quite beneficial for the network lifetime and mission success. Hence, the proposed mobility model, compared to other models in the literature, is the first to ever include the remaining energy level as decisio…

Mobility modelWireless ad hoc networkComputer scienceDistributed computing[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]050801 communication & media studiesComputerApplications_COMPUTERSINOTHERSYSTEMS02 engineering and technologyBase station0508 media and communicationsResource (project management)DTN (Delay Tolerant Networks)0202 electrical engineering electronic engineering information engineeringWireless[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industryMobility Model05 social sciences020206 networking & telecommunicationsAdhoc NetworksAlgorithm designbusinessFocus (optics)UAVs (Unmanned Aerial Vehicles)Energy (signal processing)Computer network
researchProduct

Formal Analysis and Model Checking of a Group Authentication Protocol by Scyther

2016

Scyther [1] is designed to check the security and vulnerabilities of security protocols. In this paper, we use Scyther to analyze two discrete logarithm problem (DLP) based group authentication protocols proposed in [2]. These two protocols are claimed to satisfy several security requirements, but only part of them have been checked because of the properties and limitations of Scyther. Some positive results have been gained and show that the protocols provide mutual authentication and implicit key authentication and are secure against impersonation attack. An important innovation in this paper is that we have extended the expressing ability of Scyther by giving some reasonable assumption du…

Model checkingAuthenticationTheoretical computer scienceComputer sciencebusiness.industry020206 networking & telecommunicationsCryptography02 engineering and technologyMutual authenticationCryptographic protocolComputer securitycomputer.software_genreKey authenticationDiscrete logarithmAuthentication protocol0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinesscomputer2016 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP)
researchProduct

Towards a Formal Analysis of MQtt Protocol in the Context of Communicating Vehicles

2017

International audience; The paper presents a formal approach to model, analyze, and verify a variant of Message Queue Telemetry Transport protocol (MQtt), dedicated to communicating vehicles (MQtt-CV) that send collected data to automotive infrastructures(subscribers). Our formal approach is based on Promela language and its system verification tool, the model checker SPIN. We propose a slight modification of MQtt protocol to reduce the big volume of data collected and sent by vehicles to infrastructures. Indeed, in the original version of MQtt protocol, when a broker receives data from publishers, it sends them directly to its subscribers without any filtration. As consequence, subscribers…

Model checkingComputer scienceDistributed computingAutomotive industryContext (language use)02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE][INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]0202 electrical engineering electronic engineering information engineeringProtocol (object-oriented programming)computer.programming_languageMQTTbusiness.industryVolume (computing)020206 networking & telecommunications020207 software engineering[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationPromela[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA][INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessMessage queuecomputerComputer network
researchProduct

Survey of Formal Verification Methods for Smart Contracts on Blockchain

2019

Due to the immutable nature of distributed ledger technology such as blockchain, it is of utter importance that a smart contract works as intended before employment outside test network. This is since any bugs or errors will become permanent once published to the live network, and could lead to substantial economic losses; as manifested in the infamous DAO smart contract exploit hack in 2016. In order to avoid this, formal verification methods can be used to ensure that the contract behaves according to given specifications. This paper presents a survey of the state of the art of formal verification of smart contracts. Being a relatively new research area, a standard or best practice for fo…

Model checkingSmart contractExploitComputer science020206 networking & telecommunications02 engineering and technologyFormal methodsComputer securitycomputer.software_genreSyntax (logic)Automated theorem provingOrder (business)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingFormal verificationcomputer2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)
researchProduct

Predictive analysis of Cardiac Resynchronization Therapy response by means of the ECG

2016

Aims: Cardiac Resynchronization Therapy (CRT) is an effective treatment for heart failure patients with moderate to severe symptoms. Unfortunately, a significant proportion of patients (up to 35%) do not respond to CRT (patients called "non-responders"). This results in a large cost-effectiveness relation for heart failure treatment. This study aims to assess the prediction response to CRT by means of analysing the ECG. Methods: We retrospectively analysed the surface ECG and QRS previous to CRT implantation in 45 consecutive patients with dilated (27) or ischemic (18) cardiomyopathy. We extracted the QRS and then processed a measure of energy of a discrete version of the Stockwell Transfor…

Moderate to severemedicine.medical_specialtybusiness.industrymedicine.medical_treatmentCardiac resynchronization therapyCardiomyopathy020206 networking & telecommunications02 engineering and technology030204 cardiovascular system & hematologyEnergy measuremedicine.disease03 medical and health sciencesQRS complex0302 clinical medicineInternal medicineHeart failure0202 electrical engineering electronic engineering information engineeringCardiologyPhysical therapycardiovascular systemMedicineEffective treatmentIn patientcardiovascular diseasesbusiness
researchProduct

Bɪ-CомDᴇт: Community Detection in Bipartite Networks

2019

Abstract Extracting hidden communities from bipartite networks witnessed a determined effort. In this respect, different streams of research relied on bipartite networks to unveil communities. In this paper, we introduce a new approach, called Bi-Comdet, that aims to an efficient community detection in bipartite networks. The main trust of the introduced approach is that it stresses on the importance of grouping two types of nodes in communities having a full connection between its nodes. The quality of the unveiled communities, is assessed through some metrics borrowed from the FCA community, to wit modularity, overlapping and stability. These metrics are then aggregated through the use of…

Modularity (networks)Theoretical computer scienceComputer sciencemedia_common.quotation_subjectStability (learning theory)Conductance020206 networking & telecommunications02 engineering and technologyModularity0202 electrical engineering electronic engineering information engineeringBipartite graphGeneral Earth and Planetary Sciences020201 artificial intelligence & image processingQuality (business)General Environmental Sciencemedia_commonProcedia Computer Science
researchProduct

Health Applications Based on Molecular Communications: A Brief Review

2019

This work analyses significant cases in which applications of molecular communication systems to nano/bio-hybrid medical field represent an ideal solution for medical therapies (e.g., for the treatment of diseases such as cancer). A review of the literature reveals that biocompatibility jointly with nanocommunication can be exploited to provide effective treatment of diseases and reduce side effects considerably when compared to conventional therapy. Biocompatibility avoids the immune response rejecting drugs and does not stimulate nerves, whereas nanocommunication is a promising technology that allows accessing small and delicate body sites non-invasively. Refereed/Peer-reviewed

Molecular communicationBiocompatibilityComputer sciencemolecular communication020206 networking & telecommunicationsDNA02 engineering and technology021001 nanoscience & nanotechnologybiological communicationRisk analysis (engineering)gene expressionnanocommunication0202 electrical engineering electronic engineering information engineeringEffective treatment0210 nano-technology2019 IEEE International Conference on E-health Networking, Application & Services (HealthCom)
researchProduct