Search results for " protocol"

showing 10 items of 1320 documents

Positioning Error Prediction and Training Data Evaluation in RF Fingerprinting Method

2019

Radio Frequency (RF) fingerprinting-based localization has become a research interest due to its minimum hardware requirement and satisfiable positioning accuracy. However, despite the significant attention this topic has gained, most of the research focused on the calculation of position estimates. In this paper, we propose a simple and novel method that can be used as an indicator of fingerprinting positioning error. The method is based on cluster radius evaluation of multiple fingerprinting data during the test phase, which can be used by a Location Based Service (LBS) provider to predict the user position estimation accuracy. This method can be used effectively in real-time to predict t…

SIMPLE (military communications protocol)Computer sciencecomputer.internet_protocolmedia_common.quotation_subjectQuality of service020206 networking & telecommunications02 engineering and technologyFingerprint recognitioncomputer.software_genrePosition (vector)Location-based service0202 electrical engineering electronic engineering information engineeringRADIUS020201 artificial intelligence & image processingQuality (business)Radio frequencyData miningcomputermedia_common2019 International Conference on Indoor Positioning and Indoor Navigation (IPIN)
researchProduct

SITA/G - Description and simulation tools for public utility systems on IBM PC

1991

Abstract Simulation is a powerful and universal systems research tool for the analysis of discrete event model's functional quality. The simulation is used very widely in different areas of our everyday life. Simulation system SITA/G is produced in the Latvia University Research Institute of Mathematics and Computer Science. SITA/G softwares is proposed for using on IBM PC. SITA/G offers the facilities to describe, build and edit graphic programs by means of specification language SITA. Also the proposed system allows: 1) the visual demonstration of the simulation process of the graphic simulation programs; 2) obtaining of the probability characteristics of the systems under research. SITA/…

SIMPLE (military communications protocol)Programming languageProcess (engineering)Iterative methodSystems researchIBM PC compatiblemedia_common.quotation_subjectQuality (business)Specification languageSimulation systemcomputer.software_genrecomputermedia_commonIFAC Proceedings Volumes
researchProduct

An ontology-based metamodel for multiagent-based simulations

2014

Multiagent-based simulations enable us to validate dierent use-case scenarios in a lot of application domains. The idea is to develop a realistic virtual environment to test particular domain-specic procedures. This paper presents our general framework for interactive multiagent-based simulations in virtual environments. The major contribution of this paper is the integration of the notion of ontology as a core element to the design process of a behavioral simulation. The proposed metamodel describes the concepts of a multiagent simulation using situated agents moving in a semantically enriched 3D environment. The agents perceive the geometric and semantic data in the surrounding environmen…

SIMPLE (military communications protocol)business.industryComputer scienceOntology (information science)Semantic data modelcomputer.software_genreMetamodelingHardware and ArchitectureVirtual machineModeling and SimulationIndustry Foundation ClassesSituatedSystems engineeringSoftware engineeringbusinessEngineering design processcomputerSoftwareSimulation Modelling Practice and Theory
researchProduct

Run duration effects on the hydrodynamic properties of a loam soil estimated by steady-state infiltration methods

2020

Steady-state methods for the analysis of single-ring infiltration data are commonly applied. However, the duration of an infiltrometer experiment is often established quite subjectively based on the assumption that in general infiltration stabilizes rather quickly in the field. For a loam soil, the effect of the duration of a beerkan run on sorptivity, S, and saturated hydraulic conductivity, Ks, was tested by using the BEST (Beerkan Estimation of Soil Transfer parameters)-steady method and SSBI (Steady version of the Simplified method based on a Beerkan Infiltration run) method for data analysis. The standard experiment, based on a total of 15 water volumes each establishing an initial pon…

SSBI methodSteady state (electronics)0208 environmental biotechnologyexperimental protocolBioengineeringSoil science02 engineering and technologyIndustrial and Manufacturing Engineeringlcsh:Agriculturesoil sorptivitysaturated soil hydraulic conductivitySettore AGR/08 - Idraulica Agraria E Sistemazioni Idraulico-ForestaliBeerkan infiltration runlcsh:Agriculture (General)BEST-steadySSBI method.Mechanical Engineeringlcsh:S04 agricultural and veterinary scienceslcsh:S1-972020801 environmental engineeringInfiltration (hydrology)Duration (music)Loam040103 agronomy & agriculture0401 agriculture forestry and fisheriesEnvironmental science
researchProduct

SUSTAINABLE WATER FREE CLEANING PROTOCOL FOR WAX REMOVAL FROM A SOLID SURFACE

2014

SUSTAINABLE WATER FREE CLEANING PROTOCOL FOR WAX REMOVAL FROM A SOLID SURFACE
researchProduct

MAC learning

2016

Cognition as a way to deal with the challenges of future wireless networks has been largely considered by the recent literature, with a main focus on physical layer adaptability and dynamic spectrum access. In this demo, we show how a simple cognition mechanism can be also applied at the MAC layer, by exploiting the emerging paradigm of programmable wireless cards. The idea is using the formal definition of simple MAC protocol components and platform-independent representation of channel events gathered from the wireless node, for emulating the behavior of protocols which are not currently running on the network, learning about their expected performance, and dynamically reconfiguring the w…

ScheduleSIMPLE (military communications protocol)Wireless networkbusiness.industryComputer scienceDistributed computingNode (networking)Physical layer020206 networking & telecommunications02 engineering and technology0202 electrical engineering electronic engineering information engineeringWirelessbusinessProtocol (object-oriented programming)Computer networkCommunication channelProceedings of the Tenth ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation, and Characterization
researchProduct

A Dynamic Attribute-Based Authentication Scheme

2015

Attribute-based authentication (ABA) is an approach to authenticate users by their attributes, so that users can get authenticated anonymously and their privacy can be protected. In ABA schemes, required attributes are represented by attribute trees, which can be combined with signature schemes to construct ABA schemes. Most attribute trees are built from top to down and can not change with attribute requirement changes. In this paper, we propose an ABA scheme based on down-to-top built attribute trees or dynamic attribute trees, which can change when attribute requirements change. Therefore, the proposed dynamic ABA scheme is more efficient in a dynamic environment by avoiding regenerating…

Scheme (programming language)AuthenticationComputer scienceComputerApplications_COMPUTERSINOTHERSYSTEMSConstruct (python library)computer.software_genreSignature (logic)Authentication protocolLightweight Extensible Authentication ProtocolData miningChallenge–response authenticationcomputerData Authentication Algorithmcomputer.programming_language
researchProduct

Receiver-Initiated Data Collection in Wake-Up Radio Enabled mIoT Networks: Achieving Collision-Free Transmissions by Hashing and Partitioning

2021

To achieve ultra-low energy consumption and decade-long battery lifetime for Internet of Things (IoT) networks, wake-up radio (WuR) appears as an eminent solution. While keeping devices in deep sleep for most of the time, a WuR enabled IoT device can be woken up for data transmission at any time by a wake-up call (WuC). However, collisions happen among WuCs for transmitter-initiated data reporting and among data packets for receiver-initiated data collection . In this article, we propose three novel hashing-based schemes in order to achieve collision-free data transmissions for receiver-initiated data collection. We consider first a simple scenario where all devices in a region of interest …

Scheme (programming language)Data collectionSIMPLE (military communications protocol)Computer Networks and CommunicationsRenewable Energy Sustainability and the Environmentbusiness.industryNetwork packetComputer scienceHash functionVDP::Technology: 500Energy consumptionUploadbusinesscomputercomputer.programming_languageComputer networkData transmission
researchProduct

Multi-cloud privacy preserving schemes for linear data mining

2015

This paper presents an approach to privacy-preserving data mining that relies upon a relatively simple secret sharing scheme. Its main feature is that users, sensitive data owners, are engaged in the secret sharing operations that protect their privacy. They are grouped in independent clouds connected to a central unit, the data miner, that only manages the aggregated data of each cloud, therefore avoiding the disclosure of information belonging to single nodes. We propose two privacy preserving schemes, with different privacy levels and communication costs. When designing them, we assume that some users' data might become inaccessible during the operation of the privacy preserving protocol…

Scheme (programming language)privacy linear data miningSIMPLE (military communications protocol)Computer sciencebusiness.industryPrivacy softwareSettore ING-INF/03 - TelecomunicazioniCloud computingcomputer.software_genreSecret sharingComputer Networks and CommunicationFeature (machine learning)Overhead (computing)Data miningElectrical and Electronic EngineeringbusinesscomputerComputer networkcomputer.programming_language
researchProduct

A Geographical Self-Organizing Approach for Vehicular Networks

2012

Cooperative vehicular networks have always been considered as the perfect way to bring more comfort to the passengers and more safety to the human life. Thus, research community and governmental organizations are interested to study and deploy these networks. The vehicular networks principle is connecting vehicles to each other and to existing infrastructure. However, their industrialization faces some challenges: (i) high mobility, (ii) frequently partitioned network, (iii) geographically constrained topology, and (iv) scalability. Therefore, in contrast to traditional networks, vehicular network protocols focus on both achieving adequate QoS level and reducing overhead. Achieving these tw…

Self-organizationVehicular ad hoc network[SPI] Engineering Sciences [physics]Computer sciencebusiness.industryQuality of serviceself-organizationvirtual backboneperformance evaluationScalabilityKey (cryptography)Overhead (computing)vehicular networksElectrical and Electronic EngineeringCommunications protocolbusinessProtocol (object-oriented programming)analytical study.clusteringComputer networkJournal of Communications
researchProduct