Search results for " networking"

showing 10 items of 1264 documents

Occupational Exposure to Extremely Low-Frequency Magnetic Fields and Risk of Amyotrophic Lateral Sclerosis : Results of a Feasibility Study for a Poo…

2021

Bioelectromagnetics 42(4), 271-283 (2021). doi:10.1002/bem.22335

Riskmedicine.medical_specialtyPhysiologyPooling610 MedizinBiophysics02 engineering and technology030218 nuclear medicine & medical imaging03 medical and health sciencesElectromagnetic Fields0302 clinical medicine610 Medical sciencesOccupational ExposureEnvironmental healthEpidemiology0202 electrical engineering electronic engineering information engineeringmedicineHumansRadiology Nuclear Medicine and imagingSocioeconomic statusExposure assessmentbusiness.industryAmyotrophic Lateral SclerosisConfounding020206 networking & telecommunicationsGeneral MedicineMagnetic FieldsRelative riskEtiologyFeasibility StudiesPopulation studybusiness
researchProduct

A vision-based fully automated approach to robust image cropping detection

2020

Abstract The definition of valid and robust methodologies for assessing the authenticity of digital information is nowadays critical to contrast social manipulation through the media. A key research topic in multimedia forensics is the development of methods for detecting tampered content in large image collections without any human intervention. This paper introduces AMARCORD (Automatic Manhattan-scene AsymmetRically CrOpped imageRy Detector), a fully automated detector for exposing evidences of asymmetrical image cropping on Manhattan-World scenes. The proposed solution estimates and exploits the camera principal point, i.e., a physical feature extracted directly from the image content th…

Robust computer visionExploitComputer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONRobust statisticsImage processing02 engineering and technologyCropping detectionMultimedia forensicRobustness (computer science)0202 electrical engineering electronic engineering information engineeringMultimedia Forensics Robust Computer Vision Cropping Detection Image Content AnalysisComputer visionElectrical and Electronic EngineeringSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniSettore INF/01 - InformaticaVision basedbusiness.industryDetectorImage content analysi020206 networking & telecommunicationsFully automatedSignal Processing020201 artificial intelligence & image processingComputer Vision and Pattern RecognitionArtificial intelligencebusinessCroppingSoftwareSignal Processing: Image Communication
researchProduct

DECENTRALIZED SUBSPACE PROJECTION IN LARGE NETWORKS

2018

A great number of applications in wireless sensor networks involve projecting a vector of observations onto a subspace dictated by prior information. Accomplishing such a task in a centralized fashion entails great power consumption, congestion at certain nodes, and suffers from robustness issues. A sensible alternative is to compute such projections in a decentralized fashion. To this end, recent works proposed schemes based on graph filters, which compute projections exactly with a finite number of local exchanges among sensor nodes. However, existing methods to obtain these filters are confined to reduced families of projection matrices or small networks. This paper proposes a method tha…

Robustness (computer science)Large networksComputer scienceDistributed computing0202 electrical engineering electronic engineering information engineeringGraph (abstract data type)020206 networking & telecommunications02 engineering and technologyWireless sensor networkFinite setPrior informationSubspace topology2018 IEEE Global Conference on Signal and Information Processing (GlobalSIP)
researchProduct

Algorithmic Complexity Vulnerability Analysis of a Stateful Firewall

2016

Algorithmic complexity vulnerabilities are an opportunity for an ad-versary to conduct a sophisticated kind of attack i.e. on network infrastructure services. Such attacks take advantage of worst case time or space complexity of algorithms implemented on devices in their software. In this paper we address potential risks introduced by such algorithmic behavior in computer networks in particular on a stateful firewall. First we introduce the idea and theoretical background for the attack. We then describe in full detail a successfully con-ducted attack which takes advantage of the worst case computational complexi-ty of O(n2) of a hash table data structure used to store active sessions. The …

RouterComputer sciencenetwork vulnerabilitiesDenial-of-service attack02 engineering and technologyNetwork topologyComputer securitycomputer.software_genreFirewall (construction)Stateful firewall0202 electrical engineering electronic engineering information engineeringDenial of Servicecomplexity attackcomputational complexitybusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunicationsHash tablese-curitycomputer networksDoSbusinessSegmentation faultcomputerRebootComputer network
researchProduct

Flexible Spare Core Placement in Torus Topology based NoCs and its validation on an FPGA

2021

In the nano-scale era, Network-on-Chip (NoC) interconnection paradigm has gained importance to abide by the communication challenges in Chip Multi-Processors (CMPs). With increased integration density on CMPs, NoC components namely cores, routers, and links are susceptible to failures. Therefore, to improve system reliability, there is a need for efficient fault-tolerant techniques that mitigate permanent faults in NoC based CMPs. There exists several fault-tolerant techniques that address the permanent faults in application cores while placing the spare cores onto NoC topologies. However, these techniques are limited to Mesh topology based NoCs. There are few approaches that have realized …

RouterGeneral Computer ScienceComputer scienceMesh networkingTopology (electrical circuits)02 engineering and technologyNetwork topologyTopology0202 electrical engineering electronic engineering information engineeringcommunication costGeneral Materials Sciencetorus topologyspare coreInteger programmingGeneral Engineering020206 networking & telecommunicationsFault injectionNetwork-on-chipfault-tolerance020202 computer hardware & architectureVDP::Teknologi: 500Spare partapplication mappingSimulated annealinglcsh:Electrical engineering. Electronics. Nuclear engineeringlcsh:TK1-9971
researchProduct

A new Scheme for RPL to handle Mobility in Wireless Sensor Networks

2017

Mobile wireless sensor networks (WSNs) are characterised by dynamic changes in the network topology leading to route breaks and disconnections. The IPv6 routing protocol for low power and lossy networks (RPL), which has become a standard, uses the Trickle timer algorithm to handle changes in the network topology. However, neither RPL nor Trickle timer are well adapted to mobility. This paper investigates the problem of supporting mobility when using RPL. It enhances RPL to fit with sensors' mobility by studying two cases. Firstly, it proposes to modify RPL in order to fit with a dynamic and hybrid topology in the context of medical applications. Secondly, it investigates a more general case…

Routing protocol020203 distributed computingComputer Networks and CommunicationsComputer sciencebusiness.industryNetwork packetComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunicationsContext (language use)02 engineering and technologyNetwork topologyIPv6Key distribution in wireless sensor networksHardware and Architecture0202 electrical engineering electronic engineering information engineeringTimerbusinessWireless sensor networkSoftwareComputer networkInternational Journal of Ad Hoc and Ubiquitous Computing
researchProduct

I-RP: Interference Aware Routing Protocol for WBAN

2018

The Wireless Body Sensor Networks (WBSN) have witnessed tremendous research interest because of their wide range of applications (medical and non-medical) in order to improve the quality of life. The healthcare applications of WBSN demands dissemination of patient’s data, reliably and in a timely manner. For this purpose, medical teams may use real-time applications for disseminating critical data such as blood pressure, ECG, and EEG. The critical data packets are highly delay sensitive that must reach intended destination within time constraints. Due to the exchange of real-time and multi-media data, some nodes or links may experience the significant level of interference in the network. C…

Routing protocol021103 operations researchNetwork packetComputer sciencebusiness.industryQuality of serviceRetransmissionComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS0211 other engineering and technologies020206 networking & telecommunications02 engineering and technologyMetricsBody area network0202 electrical engineering electronic engineering information engineeringRouting (electronic design automation)businessWireless sensor networkComputer network
researchProduct

Power-constrained sensor selection and routing for cooperative detection in cognitive radios

2012

Given a spectrum-sensing network, a set of active nodes jointly aggregate sensed data at a preset frequency-band and simultaneously route this information to an arbitrarily chosen querying node through a power-constrained multi-hop path. Locally, each sensor node is assumed to be an energy-based detector. This work focuses on deriving algorithms that jointly optimize sensor selection and cooperative detection from which a power-efficient route to the querying node can be established, and then, a tree routing structure spanning the chosen nodes is constructed under a power budget constraint. Sensor information is sequentially aggregated along this optimized routing structure up to the queryi…

Routing protocolBackpressure routingDynamic Source RoutingStatic routingComputer sciencebusiness.industryNode (networking)020206 networking & telecommunicationsGeographic routing02 engineering and technologyKey distribution in wireless sensor networksCognitive radioLink-state routing protocol020204 information systemsSensor nodeMultipath routingComputer Science::Networking and Internet Architecture0202 electrical engineering electronic engineering information engineeringMobile wireless sensor networkbusinessWireless sensor networkComputer network
researchProduct

Adaptive live video streaming on low-cost wireless multihop networks for road traffic surveillance in smart cities

2021

Abstract Traffic surveillance is an important issue for Intelligent Transportation Systems (ITS) that helps detect incidents automatically, such as wrong-way drivers, still-standing vehicles and jams. Sometimes these systems require a fast and short-term deployment of video cameras. In these cases, ad-hoc networks could be a low-cost and feasible option, but they have poor performance for video delivery. Thus, we propose a smart live video adaptive streaming technique in order to transport video streams from the cameras to the external road traffic monitoring servers. To achieve this goal, these networks need a thorough study in order to analyze video quality under their inherent constraint…

Routing protocolComputer Networks and CommunicationsComputer sciencebusiness.industryQuality of serviceReal-time computing020206 networking & telecommunications02 engineering and technologyVideo qualityNetwork topologyHardware and ArchitectureServer0202 electrical engineering electronic engineering information engineeringWireless020201 artificial intelligence & image processingbusinessIntelligent transportation systemProtocol (object-oriented programming)SoftwareFuture Generation Computer Systems
researchProduct

Assignment of Roles and Channels for a Multichannel MAC in Wireless Mesh Networks

2009

International audience; A multichannel MAC improves throughput in wireless mesh networks by multiplexing transmissions over orthogonal channels. In this paper, we propose an efficient way for constructing the wireless mesh structure associated with Molecular MAC, a multichannel MAC layer designed for efficient packet forwarding. Molecular MAC outperforms other classical approaches, but requires a specific structure for efficient operation. First, we propose a centralized protocol that provides an upper bound for constructing such a molecular structure through a MILP (Mixed Integer Linear Programming) formulation that maximizes network capacity. Then, we present two distributed self-stabiliz…

Routing protocolComputer scienceDistributed computing[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Mesh networkingThroughput0102 computer and information sciences02 engineering and technology01 natural sciencesMultiplexinglaw.invention[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]law0202 electrical engineering electronic engineering information engineeringComputer Science::Networking and Internet ArchitectureComputer Science::Information TheorySpanning treeWireless mesh network[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industryRadio Link ProtocolComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPacket forwarding020206 networking & telecommunications010201 computation theory & mathematicsbusinessCommunication channelComputer network
researchProduct