Search results for " protocol"
showing 10 items of 1320 documents
Positioning Error Prediction and Training Data Evaluation in RF Fingerprinting Method
2019
Radio Frequency (RF) fingerprinting-based localization has become a research interest due to its minimum hardware requirement and satisfiable positioning accuracy. However, despite the significant attention this topic has gained, most of the research focused on the calculation of position estimates. In this paper, we propose a simple and novel method that can be used as an indicator of fingerprinting positioning error. The method is based on cluster radius evaluation of multiple fingerprinting data during the test phase, which can be used by a Location Based Service (LBS) provider to predict the user position estimation accuracy. This method can be used effectively in real-time to predict t…
SITA/G - Description and simulation tools for public utility systems on IBM PC
1991
Abstract Simulation is a powerful and universal systems research tool for the analysis of discrete event model's functional quality. The simulation is used very widely in different areas of our everyday life. Simulation system SITA/G is produced in the Latvia University Research Institute of Mathematics and Computer Science. SITA/G softwares is proposed for using on IBM PC. SITA/G offers the facilities to describe, build and edit graphic programs by means of specification language SITA. Also the proposed system allows: 1) the visual demonstration of the simulation process of the graphic simulation programs; 2) obtaining of the probability characteristics of the systems under research. SITA/…
An ontology-based metamodel for multiagent-based simulations
2014
Multiagent-based simulations enable us to validate dierent use-case scenarios in a lot of application domains. The idea is to develop a realistic virtual environment to test particular domain-specic procedures. This paper presents our general framework for interactive multiagent-based simulations in virtual environments. The major contribution of this paper is the integration of the notion of ontology as a core element to the design process of a behavioral simulation. The proposed metamodel describes the concepts of a multiagent simulation using situated agents moving in a semantically enriched 3D environment. The agents perceive the geometric and semantic data in the surrounding environmen…
Run duration effects on the hydrodynamic properties of a loam soil estimated by steady-state infiltration methods
2020
Steady-state methods for the analysis of single-ring infiltration data are commonly applied. However, the duration of an infiltrometer experiment is often established quite subjectively based on the assumption that in general infiltration stabilizes rather quickly in the field. For a loam soil, the effect of the duration of a beerkan run on sorptivity, S, and saturated hydraulic conductivity, Ks, was tested by using the BEST (Beerkan Estimation of Soil Transfer parameters)-steady method and SSBI (Steady version of the Simplified method based on a Beerkan Infiltration run) method for data analysis. The standard experiment, based on a total of 15 water volumes each establishing an initial pon…
SUSTAINABLE WATER FREE CLEANING PROTOCOL FOR WAX REMOVAL FROM A SOLID SURFACE
2014
MAC learning
2016
Cognition as a way to deal with the challenges of future wireless networks has been largely considered by the recent literature, with a main focus on physical layer adaptability and dynamic spectrum access. In this demo, we show how a simple cognition mechanism can be also applied at the MAC layer, by exploiting the emerging paradigm of programmable wireless cards. The idea is using the formal definition of simple MAC protocol components and platform-independent representation of channel events gathered from the wireless node, for emulating the behavior of protocols which are not currently running on the network, learning about their expected performance, and dynamically reconfiguring the w…
A Dynamic Attribute-Based Authentication Scheme
2015
Attribute-based authentication (ABA) is an approach to authenticate users by their attributes, so that users can get authenticated anonymously and their privacy can be protected. In ABA schemes, required attributes are represented by attribute trees, which can be combined with signature schemes to construct ABA schemes. Most attribute trees are built from top to down and can not change with attribute requirement changes. In this paper, we propose an ABA scheme based on down-to-top built attribute trees or dynamic attribute trees, which can change when attribute requirements change. Therefore, the proposed dynamic ABA scheme is more efficient in a dynamic environment by avoiding regenerating…
Receiver-Initiated Data Collection in Wake-Up Radio Enabled mIoT Networks: Achieving Collision-Free Transmissions by Hashing and Partitioning
2021
To achieve ultra-low energy consumption and decade-long battery lifetime for Internet of Things (IoT) networks, wake-up radio (WuR) appears as an eminent solution. While keeping devices in deep sleep for most of the time, a WuR enabled IoT device can be woken up for data transmission at any time by a wake-up call (WuC). However, collisions happen among WuCs for transmitter-initiated data reporting and among data packets for receiver-initiated data collection . In this article, we propose three novel hashing-based schemes in order to achieve collision-free data transmissions for receiver-initiated data collection. We consider first a simple scenario where all devices in a region of interest …
Multi-cloud privacy preserving schemes for linear data mining
2015
This paper presents an approach to privacy-preserving data mining that relies upon a relatively simple secret sharing scheme. Its main feature is that users, sensitive data owners, are engaged in the secret sharing operations that protect their privacy. They are grouped in independent clouds connected to a central unit, the data miner, that only manages the aggregated data of each cloud, therefore avoiding the disclosure of information belonging to single nodes. We propose two privacy preserving schemes, with different privacy levels and communication costs. When designing them, we assume that some users' data might become inaccessible during the operation of the privacy preserving protocol…
A Geographical Self-Organizing Approach for Vehicular Networks
2012
Cooperative vehicular networks have always been considered as the perfect way to bring more comfort to the passengers and more safety to the human life. Thus, research community and governmental organizations are interested to study and deploy these networks. The vehicular networks principle is connecting vehicles to each other and to existing infrastructure. However, their industrialization faces some challenges: (i) high mobility, (ii) frequently partitioned network, (iii) geographically constrained topology, and (iv) scalability. Therefore, in contrast to traditional networks, vehicular network protocols focus on both achieving adequate QoS level and reducing overhead. Achieving these tw…