Search results for " protocol"

showing 10 items of 1320 documents

Measuring the weather’s impact on MAC layer over 2.4GHz outdoor radio links

2015

The weather s impact on the performance of a radio link at the 2.4 GHz ISM (Industry, Scientific and Medical) band had not been yet studied in great detail up to now as it is generally believed that the ultra-high frequency band is not significantly affected by weather conditions. However, our study shows significant correlations between meteorological variables and control frame errors at MAC (Medium Access Control) layer of the IEEE 802.11b/g standard. This study is performed over an outdoor radio link setting which has been monitored for several months. Moreover, we check if link distance and so modulation scheme and data rate are also decisive features of such impact. Our real scenario …

Computer scienceFrequency bandMAC layerReal-time computingAccess controlWeather conditionsData ratelaw.inventionlawTEORIA DE LA SEÑAL Y COMUNICACIONESControl frame errorsStatistical analysisRadio linkElectrical and Electronic EngineeringLayer (object-oriented design)InstrumentationIEEE 802.11 standardsbusiness.industryApplied MathematicsRadio Link ProtocolFrame (networking)INGENIERIA TELEMATICACondensed Matter PhysicsStatistical analysisModulationbusinessMeasurement
researchProduct

Visually Perceived Distance Judgments: Tablet-Based Augmented Reality Versus the Real World

2016

Does visually perceived distance differ when objects are viewed in augmented reality (AR), as opposed to the real world? What are the differences? These questions are theoretically interesting, and the answers are important for the development of many tablet- and phone-based AR applications, including mobile AR navigation systems. This article presents a thorough literature review of distance judgment experimental protocols, and results from several areas of perceptual psychology. In addition to distance judgments of real and virtual objects, this section also discusses previous work in measuring the geometry of virtual picture space and considers how this work might be relevant to tablet A…

Computer scienceHuman Factors and Ergonomics02 engineering and technologySpace (commercial competition)050105 experimental psychologyField (computer science)0202 electrical engineering electronic engineering information engineeringAR application0501 psychology and cognitive sciencesPerceptual psychologyComputer visiondistance perceptionta113experimental protocolstablet-based augmented realitybusiness.industrybisection05 social sciencesnavigation systems020207 software engineeringaugmented realityComputer Science ApplicationsHuman-Computer Interactioncellular telephone systemsAugmented realityArtificial intelligencebusinessInternational Journal of Human–Computer Interaction
researchProduct

A Techno-Economic Perspective of Constrained Application Protocol

2017

Among billions of Internet enabled devices that are expected to surround us in the near future, many will be resource constrained, i.e., will have limited power supply, processing power and memory. To cope with these limitations, the Constrained Application Protocol (CoAP) has been recently introduced as a lightweight alternative to HTTP for connecting the resource limited devices to the Web. Although the new protocol offers solid technical advantages, it remains uncertain whether a successful uptake will follow, as it depends also on its economic feasibility for the involved stakeholders. Therefore, this paper studies the techno-economic feasibility of CoAP using a systematic methodologica…

Computer sciencePerspective (graphical)Techno economicEnvironmental economicsConstrained Application Protocol
researchProduct

MAC Protocols for Wake-up Radio: Principles, Modeling and Performance Analysis

2018

[EN] In wake-up radio (WuR) enabled wireless sensor networks (WSNs), a node triggers a data communication at any time instant by sending a wake-up call (WuC) in an on-demand manner. Such wake-up operations eliminate idle listening and overhearing burden for energy consumption in duty-cycled WSNs. Although WuR exhibits its superiority for light traffic, it is inefficient to handle high traffic load in a network. This paper makes an effort towards improving the performance of WuR under diverse load conditions with a twofold contribution. We first propose three protocols that support variable traffic loads by enabling respectively clear channel assessment (CCA), backoff plus CCA, and adaptive …

Computer scienceWireless sensor networks (WSNs)02 engineering and technology01 natural sciencesWake-up radio (WuR)Medium access control (MAC) protocol0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringLatency (engineering)QueueEnergy-efficient communicationbusiness.industryNode (networking)010401 analytical chemistryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunicationsEnergy consumptionINGENIERIA TELEMATICA0104 chemical sciencesComputer Science ApplicationsInternet of Things (IoT)Variable (computer science)Modeling and performance evaluationControl and Systems EngineeringbusinessWireless sensor networkInformation SystemsComputer networkEfficient energy useData transmission
researchProduct

Adoption of Constrained Application Protocol

2016

Among billions of Internet enabled devices that are expected to surround us in the near future, many will be resource constrained, i.e., will have limited power supply, processing power and memory. To cope with these limitations, the Constrained Application Protocol (CoAP) has been recently introduced as a lightweight alternative to HTTP for connecting the resource limited devices to the Web. Although the new protocol offers solid technical advantages, it remains uncertain whether a successful uptake will follow, as it depends also on its economic feasibility for the involved stakeholders. Therefore, this paper studies the techno-economic feasibility of CoAP using a systematic methodologica…

Computer sciencebusiness.industryPerspective (graphical)Techno economic020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreConstrained Application ProtocolWeb of ThingsRisk analysis (engineering)Software deployment0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingThe InternetLiterature surveybusinesscomputerProtocol (object-oriented programming)International Journal of Innovation in the Digital Economy
researchProduct

MEDiSN

2008

Staff shortages and an increasingly aging population are straining the ability of emergency departments to provide high-quality care. Moreover, there is a growing concern about the ability of hospitals to provide effective care during disaster events. Tools that automate patient monitoring would greatly improve efficiency, quality of care, and the volume of patients treated. Towards this goal, we have developed MEDiSN, a wireless sensor network for monitoring patients' vital signs in hospitals and disaster events. MEDiSN consists of Patient Monitors which are custom-built, patient-worn motes that sample, compress and secure medical data, and Relay Points that form a static multi-hop wireles…

Computer sciencebusiness.industryRemote patient monitoringQuality of serviceVital signsVolume (computing)Sample (statistics)Computer securitycomputer.software_genreWirelessbusinesscomputerCollection Tree ProtocolWireless sensor networkProceedings of the 6th ACM conference on Embedded network sensor systems
researchProduct

Read&Answer, A Tool to Capture on-Line Processing of Electronic Texts

2009

This paper is aimed at presenting Read&Answer, a tool that records reading times, one of the main on-line methods employed in text processing research. Read&Answer allows the recording, analysis and interpretation of the learner processing in order to test specific hypotheses and explain final comprehension results. First, we will describe the tool, and then we will briefly explain some research studies using the tool. We will show how Read&Answer can be used in combination with another on-line method extensively employed in text processing research, i.e., verbal protocols, and we will also compare Read&Answer with eye movement tracking, a widely accepted on-line reading times technique.

Computer sciencebusiness.industrymedia_common.quotation_subjectInterpretation (philosophy)Eye movementcomputer.software_genreTest (assessment)ComprehensionText processingReading (process)Artificial intelligenceLine (text file)businessThink aloud protocolcomputerNatural language processingmedia_commonThe Ergonomics Open Journal
researchProduct

Implementation and Deployment Evaluation of the DMAMAC Protocol for Wireless Sensor Actuator Networks

2016

Abstract The increased application of wireless technologies including Wireless Sensor Actuator Networks (WSAN) in industry has given rise to a plethora of protocol designs. These designs target metrics ranging from energy efficiency to real-time constraints. Protocol design typically starts with a requirements specification, and continues with analytic and model-based simulation analysis. State-of- the-art network simulators provide extensive physical environment emulation, but still have limitations due to model abstractions. Deployment testing on actual hardware is therefore vital in order to validate implementability and usability in the real environment. The contribution of this article…

Computer sciencecomputer.internet_protocolTime division multiple accessWireless Routing Protocol02 engineering and technologyPacket lossWireless sensor networks and applications0202 electrical engineering electronic engineering information engineeringWirelessSuperframeNetwork architecture and designProtocol (object-oriented programming)Communication protocols.General Environmental ScienceEmulationbusiness.industry020206 networking & telecommunicationsKey distribution in wireless sensor networksEmbedded systemInternetwork protocolGeneral Earth and Planetary Sciences020201 artificial intelligence & image processingCommunications protocolbusinesscomputerReverse Address Resolution ProtocolEfficient energy useProcedia Computer Science
researchProduct

L'America dei Concordati, Sistemi pattizi e di coordinazione nel subcontinente

2020

Le molteplici convenzioni che sono state firmate tra la Santa Sede e gli Stati dello scacchiere latinoamericano hanno spesso rappresentato l’evoluzione verso concordati fondati non più sul confessionismo statale, ma sul riconoscimento della libertas Ecclesiae, ossia della sua autonomia e indipendenza nell’adempimento della propria missione specifica, e sulla libertà cultuale riconosciuta a tutti i cittadini e alle loro organizzazioni confessionali. Si rivela di particolare interesse analizzare la specificità di questi accordi in termini di dinamiche diplomatiche, nella tipicità dei sistemi delle relazioni bilaterali, nonché delle politiche religiose dal XIX al XXI secolo.

Concordati - Modus Vivendi - Protocolli - Relazioni tra Stati latinoamericani e Chiesa cattolica.Settore IUS/11 - Diritto Canonico E Diritto Ecclesiastico
researchProduct

Articolo 3 - Primo Protocollo

2012

Si tratta di un commento all'articolo 3 del Protocollo addizionale alla Convenzione europea dei diritti umani, che protegge il diritto a libere elezioni. This is a Commentary to Article 3 of the First Protocol to the European Convention on Human Rights, protecting the Right to free elections.

Convenzione europea dei diritti umani - Articolo 3 del Protocollo addizionale - Voto - diritti politici - elezioniSettore IUS/13 - Diritto InternazionaleEuropean Convention on Human Rights - Article 3 First Protocol - Right to Vote - Political Rights - Elections
researchProduct