Search results for "Communications"

showing 10 items of 3827 documents

Argumentative reasoning and taxonomic analysis for the identification of medical errors

2015

Telemedicine consists of the use of information and communication technologies (ICTs) in the practice of medicine. The massive digitalisation of the society is changing the behaviour of ordinary people even in medical sectors. The impact of digitisation is also having impacts on teleexpertise, where a medical professional can remotely ask some advices through the use of ICTs to provide treatment to a patient in critical conditions in remote environment. However, sometimes the outcome of such advice obtained remotely can lead to medical errors. In these situations, it is important to determine whether the causes of the errors could have been avoidable or not for the purposes of establishing …

Argumentative[ INFO.INFO-MO ] Computer Science [cs]/Modeling and SimulationKnowledge managementComputer scienceMedical procedureMédecine humaine et pathologieArgumentation frameworkArgumentation theoryArtificial Intelligence[ SDV.MHEP ] Life Sciences [q-bio]/Human health and pathologyArgumentationMedical errorsElectrical and Electronic EngineeringLegal procedureTaxonomybusiness.industryModélisation et simulation16. Peace & justice[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationGroup decision-makingIdentification (information)Control and Systems EngineeringInformation and Communications TechnologyKnowledge tracingTeleexpertisebusiness[SDV.MHEP]Life Sciences [q-bio]/Human health and pathology
researchProduct

Modelling and Analysis of Nonstationary Vehicle-to-Infrastructure Channels with Time-Variant Angles of Arrival

2018

In mobile radio channel modelling, it is generally assumed that the angles of arrival (AOAs) are independent of time. This assumption does not in general agree with real-world channels in which the AOAs vary with the position of a moving receiver. In this paper, we first present a mathematical model for the time-variant AOAs. This model serves as the basis for the development of two nonstationary multipath fading channels models for vehicle-to-infrastructure communications. The statistical properties of both channel models are analysed with emphasis on the time-dependent autocorrelation function (ACF), time-dependent mean Doppler shift, time-dependent Doppler spread, and the Wigner-Ville sp…

Article SubjectComputer Networks and CommunicationsComputer science02 engineering and technologylcsh:Technologylcsh:Telecommunicationsymbols.namesake0203 mechanical engineeringPosition (vector)lcsh:TK5101-67200202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringComputer Science::Information TheoryBasis (linear algebra)lcsh:TAutocorrelationEmphasis (telecommunications)020302 automobile design & engineering020206 networking & telecommunicationsVehicle to infrastructuresymbolsDoppler effectAlgorithmMultipath propagationInformation SystemsCommunication channelWireless Communications and Mobile Computing
researchProduct

Wireless Caching Aided 5G Networks

2018

Article SubjectComputer Networks and CommunicationsComputer science5G-tekniikka0102 computer and information sciences02 engineering and technology01 natural scienceslcsh:Technologylcsh:Telecommunicationlcsh:TK5101-67200202 electrical engineering electronic engineering information engineeringWirelessElectrical and Electronic Engineeringwireless cachingta213business.industrylcsh:T020206 networking & telecommunications010201 computation theory & mathematicsnetworksbusiness5G5Glangattomat verkotInformation SystemsComputer networkWireless Communications and Mobile Computing
researchProduct

Statistical modeling, simulation, and experimental verification of wideband indoor mobile radio channel

2018

This paper focuses on the modeling, simulation, and experimental verification of wideband single-input single-output (SISO) mobile fading channels for indoor propagation environments. The indoor reference channel model is derived from a geometrical rectangle scattering model, which consists of an infinite number of scatterers. It is assumed that the scatterers are exponentially distributed over the two-dimensional (2D) horizontal plane of a rectangular room. Analytical expressions are derived for the probability density function (PDF) of the angle of arrival (AOA), the PDF of the propagation path length, the power delay profile (PDP), and the frequency correlation function (FCF). An efficie…

Article SubjectComputer Networks and CommunicationsComputer sciencelcsh:T020206 networking & telecommunications020302 automobile design & engineeringStatistical model02 engineering and technologyCorrelation function (quantum field theory)lcsh:Technologylcsh:Telecommunication0203 mechanical engineeringAngle of arrivallcsh:TK5101-67200202 electrical engineering electronic engineering information engineeringElectronic engineeringFadingElectrical and Electronic EngineeringWidebandPower delay profileInformation SystemsCommunication channelComputer Science::Information Theory
researchProduct

An Effective Wireless Sensor Network Routing Protocol Based on Particle Swarm Optimization Algorithm

2022

Improving wireless communication and artificial intelligence technologies by using Internet of Things (Itoh) paradigm has been contributed in developing a wide range of different applications. However, the exponential growth of smart phones and Internet of Things (IoT) devices in wireless sensor networks (WSNs) is becoming an emerging challenge that adds some limitations on Quality of Service (QoS) requirements. End-to-end latency, energy consumption, and packet loss during transmission are the main QoS requirements that could be affected by increasing the number of IoT applications connected through WSNs. To address these limitations, an effective routing protocol needs to be designed for …

Article SubjectComputer Networks and CommunicationsComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSElectrical and Electronic EngineeringVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Information Systems
researchProduct

In the Direction of Service Guarantees for Virtualized Network Functions

2022

The trend of consolidating network functions from specialized hardware to software running on virtualization servers brings significant advantages for reducing costs and simplifying service deployment. However, virtualization techniques have significant limitations when it comes to networking as there is no support for guaranteeing that network functions meet their service requirements. In this paper, we present a design for providing service guarantees to virtualized network functions based on rate control. The design is a combination of rate regulation through token bucket filters and the regular scheduling mechanisms in operating systems. It has the attractive property that traffic profi…

Article SubjectComputer Networks and CommunicationsElectrical and Electronic EngineeringVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Information SystemsWireless Communications and Mobile Computing
researchProduct

Face Mask Detection Using Deep Convolutional Neural Network and MobileNetV2-Based Transfer Learning

2022

The rapid spreading of Coronavirus disease 2019 (COVID-19) is a major health risk that the whole world is facing for the last two years. One of the main causes of the fast spreading of this virus is the direct contact of people with each other. There are many precautionary measures to reduce the spread of this virus; however, the major one is wearing face masks in public places. Detection of face masks in public places is a real challenge that needs to be addressed to reduce the risk of spreading the virus. To address these challenges, an automated system for face mask detection using deep learning (DL) algorithms has been proposed to control the spreading of this infectious disease effecti…

Article SubjectComputer Networks and CommunicationsElectrical and Electronic EngineeringVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Information SystemsWireless Communications and Mobile Computing
researchProduct

A Deep Learning-Based Framework for Feature Extraction and Classification of Intrusion Detection in Networks

2022

An intrusion detection system, often known as an IDS, is extremely important for preventing attacks on a network, violating network policies, and gaining unauthorized access to a network. The effectiveness of IDS is highly dependent on data preprocessing techniques and classification models used to enhance accuracy and reduce model training and testing time. For the purpose of anomaly identification, researchers have developed several machine learning and deep learning-based algorithms; nonetheless, accurate anomaly detection with low test and train times remains a challenge. Using a hybrid feature selection approach and a deep neural network- (DNN-) based classifier, the authors of this re…

Article SubjectComputer Networks and CommunicationsElectrical and Electronic EngineeringVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550VDP::Teknologi: 500::Elektrotekniske fag: 540Information SystemsWireless Communications and Mobile Computing
researchProduct

An Efficient Online/Offline Signcryption Scheme for Internet of Things in Smart Home

2022

The delivery of unified intelligent services is accomplished through a networked environment comprised of a wide array of electronic devices. Through the use of Internet of Things (IoT) technology, smart homes collect data from their surroundings and use it to improve their tenants’ lives. Remote control, real-time monitoring, and a fire alarm are all characteristics of smart home security. Since smart homes hold personally identifying information about their residents, security is critical to ensure their reliability and prevent data breaches. In this paper, a certificateless online/offline signcryption (COOS) technique for IoT-enabled smart homes is proposed. The proposed solution takes a…

Article SubjectComputer Networks and CommunicationsElectrical and Electronic EngineeringVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550VDP::Teknologi: 500::Elektrotekniske fag: 540Information Systems
researchProduct

Post-Quantum Secure Identity-Based Encryption Scheme using Random Integer Lattices for IoT-enabled AI Applications

2022

Identity-based encryption is an important cryptographic system that is employed to ensure confidentiality of a message in communication. This article presents a provably secure identity based encryption based on post quantum security assumption. The security of the proposed encryption is based on the hard problem, namely Learning with Errors on integer lattices. This construction is anonymous and produces pseudo random ciphers. Both public-key size and ciphertext-size have been reduced in the proposed encryption as compared to those for other relevant schemes without compromising the security. Next, we incorporate the constructed identity based encryption (IBE) for Internet of Things (IoT) …

Article SubjectComputer Networks and CommunicationsVDP::Matematikk og Naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420Information SystemsSecurity and Communication Networks
researchProduct