Search results for "Computer network"

showing 10 items of 1634 documents

On the Fidelity of IEEE 802.11 commercial cards

2006

The IEEE 802.11 D CF protocol is known to be fair in terms of long-term resource repartition among the contending stations. However, when considering real scenarios, where commercial 802.11 cards interact, very unpredictable as well as sometimes surprising behaviors emerge. Motivation of this paper is to investigate the reasons of the very evident disagreement between the theoretical IEEE 802.11 DCF protocol models and its practical implementations. Inparticular, we try to characterize the card behavior not only in terms of perceived throughput, but also in terms of low-level channel access operations. In fact, the simple throughput analysis does not allow to identify what affecting paramet…

Signal processingCommunication channels (information theory); Internet; Signal processing; Wireless telecommunication systems; Baseband signals; Carrier sense function; MAC layer; Network protocolsComputer scienceMAC layerWireless local area networks (WLAN)backoff algorithmCommunication channels (information theory)IEEE 802.11Wireless telecommunication systemsNetwork protocolsThroughput (business)InternetBaseband signalsChannel allocation schemesSIMPLE (military communications protocol)Settore ING-INF/03 - Telecomunicazionibusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPhysical layerCarrier sense functionThroughputNetwork interface controllerEmbedded systemResource allocationbusinessComputer networkCommunication channel
researchProduct

Generalized singly-implicit Runge-Kutta methods with arbitrary knots

1985

The aim of this paper is to derive Butcher's generalization of singly-implicit methods without restrictions on the knots. Our analysis yields explicit computable expressions for the similarity transformations involved which allow the efficient implementation of the first phase of the method, i.e. the solution of the nonlinear equations. Furthermore, simple formulas for the second phase of the method, i.e. computation of the approximations at the next nodal point, are established. Finally, the matrix which governs the stability of the method is studied.

Similarity (geometry)Computer Networks and CommunicationsGeneralizationApplied MathematicsComputationMathematical analysisStability (learning theory)Computational MathematicsMatrix (mathematics)Runge–Kutta methodsNonlinear systemSimple (abstract algebra)SoftwareMathematicsBIT
researchProduct

Anam-Net: Anamorphic Depth Embedding-Based Lightweight CNN for Segmentation of Anomalies in COVID-19 Chest CT Images.

2021

Chest computed tomography (CT) imaging has become indispensable for staging and managing coronavirus disease 2019 (COVID-19), and current evaluation of anomalies/abnormalities associated with COVID-19 has been performed majorly by the visual score. The development of automated methods for quantifying COVID-19 abnormalities in these CT images is invaluable to clinicians. The hallmark of COVID-19 in chest CT images is the presence of ground-glass opacities in the lung region, which are tedious to segment manually. We propose anamorphic depth embedding-based lightweight CNN, called Anam-Net, to segment anomalies in COVID-19 chest CT images. The proposed Anam-Net has 7.8 times fewer parameters …

Similarity (geometry)Coronavirus disease 2019 (COVID-19)Computer Networks and CommunicationsComputer scienceComputed tomography02 engineering and technologyDeep LearningArtificial Intelligence0202 electrical engineering electronic engineering information engineeringMedical imagingmedicineImage Processing Computer-AssistedHumansSegmentationComputer visionLung regionLungmedicine.diagnostic_testbusiness.industryDeep learningVDP::Technology: 500COVID-19Image segmentationComputer Science ApplicationsEmbedding020201 artificial intelligence & image processingArtificial intelligenceNeural Networks ComputerbusinessTomography X-Ray ComputedSoftwareIEEE transactions on neural networks and learning systems
researchProduct

Monitoring wireless sensor networks through logical deductive processes

2006

This paper proposes a distributed multi-agent architecture for wireless sensor networks management, which exploits the dynamic reasoning capabilities of the Situation Calculus in order to emulate the reactive behavior of a human expert to fault situations. The information related to network events is generated by tunable agents installed on the network nodes and is collected by a logical entity for network managing where it is merged with general domain knowledge, with the aim of identifying the root causes of faults, and deciding on reparative actions. The logical inference system has being devised to carry out automated isolation, diagnosis, and, whenever possible, repair of network anoma…

Situation CalculuSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniEngineeringbusiness.industryMulti-agent systemDistributed computingReliability (computer networking)Network nodeInformation securityScalabilityWireless sensor networks managementDomain knowledgeSituation calculusbusinessLogical deductive processeWireless sensor networkWireless sensor networkNetwork management stationComputer networkMILCOM 2005 - 2005 IEEE Military Communications Conference
researchProduct

Social Media Data in an Augmented Reality System for Situation Awareness Support in Emergency Control Rooms

2021

AbstractDuring crisis situations, emergency operators require fast information access to achieve situation awareness and make the best possible decisions. Augmented reality could be used to visualize the wealth of user-generated content available on social media and enable context-adaptive functions for emergency operators. Although emergency operators agree that social media analytics will be important for their future work, it poses a challenge to filter and visualize large amounts of social media data. We conducted a goal-directed task analysis to identify the situation awareness requirements of emergency operators. By collecting tweets during two storms in Germany we evaluated the usefu…

Situation awarenessComputer Networks and CommunicationsComputer sciencebusiness.industryInterface (computing)05 social sciencesInternet privacyInformation access02 engineering and technologyFilter (software)VDP::Matematikk og Naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420Social media analyticsTheoretical Computer ScienceAngewandte Kognitionswissenschaft020204 information systems0202 electrical engineering electronic engineering information engineeringTask analysis0501 psychology and cognitive sciencesSocial mediaAugmented realitybusiness050107 human factorsSoftwareInformation Systems
researchProduct

Data Communication Security of Advanced Metering Infrastructure in Smart Grid

2013

Advanced Metering Infrastructure (AMI) is very critical part for wired/wireless communication in Smart Grid. It involves communication of vital smart metering data to central control center for smooth functioning of smart grid. Security and reliability of data is of paramount importance for operational reliability of smart grid. AMI network is susceptible to many cyber security threats and attacks. Therefore it is desirable to prevent the data from such vulnerabilities. The paper proposes two-phase method to provide security of data using dedicated authentication server which inhibits malicious and unauthorized nodes to gain access to AMI communication network. Secure environment is created…

Smart meterComputer scienceNetwork packetWireless networkbusiness.industryAuthentication serverCommunications securityComputer securitycomputer.software_genreSmart gridSecurity servicebusinesscomputerAutomatic meter readingComputer network2013 5th International Conference on Computational Intelligence and Communication Networks
researchProduct

GSWABE: faster GPU-accelerated sequence alignment with optimal alignment retrieval for short DNA sequences

2014

In this paper, we present GSWABE, a graphics processing unit GPU-accelerated pairwise sequence alignment algorithm for a collection of short DNA sequences. This algorithm supports all-to-all pairwise global, semi-global and local alignment, and retrieves optimal alignments on Compute Unified Device Architecture CUDA-enabled GPUs. All of the three alignment types are based on dynamic programming and share almost the same computational pattern. Thus, we have investigated a general tile-based approach to facilitating fast alignment by deeply exploring the powerful compute capability of CUDA-enabled GPUs. The performance of GSWABE has been evaluated on a Kepler-based Tesla K40 GPU using a varie…

Smith–Waterman algorithmSpeedupComputer Networks and CommunicationsComputer scienceSequence alignmentNeedleman–Wunsch algorithmParallel computingDNA sequencingComputer Science ApplicationsTheoretical Computer ScienceDynamic programmingCUDAComputational Theory and MathematicsSoftwareConcurrency and Computation: Practice and Experience
researchProduct

A distributed-memory MPI parallelization scheme for multi-domain incompressible SPH

2022

A parallel scheme for a multi-domain truly incompressible smoothed particle hydrodynamics (SPH) approach is presented. The proposed method is developed for distributed-memory architectures through the Message Passing Interface (MPI) paradigm as communication between partitions. The proposal aims to overcome one of the main drawbacks of the SPH method, which is the high computational cost with respect to mesh-based methods, by coupling a multi-resolution approach with parallel computing techniques. The multi-domain approach aims to employ different resolutions by subdividing the computational domain into non-overlapping blocks separated by block interfaces. The particles belonging to differe…

Smoothed particle hydrodynamics (SPH)Artificial IntelligenceComputer Networks and CommunicationsHardware and ArchitectureMulti-domain approachMPIParallel distributed-memory computationLoad balancingSoftwareSettore ICAR/01 - IdraulicaTheoretical Computer ScienceJournal of Parallel and Distributed Computing
researchProduct

Studying micro-communities in Facebook Communities

2018

In the visionary view of the future Internet, named the Next Generation Internet, a current idea is to have a user-centric approach where human behavior models will be used to define the networks or to manage services. During the last years, a great trend in current Social Media platforms is to offer the opportunity to establish and join groups of people online. Despite human behaviour in current Online Social Media have been studied in depth, characteristics of these aggregations of people in content-based communities are still unknown. In this paper, we propose an evaluation of micro-communities of users inside the big network of Facebook groups to understand how and when users are active…

Social Networks AnalysiSettore INF/01 - Informaticabusiness.industryInternet privacyComplex NetworkCommunity Detection; Complex Networks; Facebook Groups Analysis; Social Networks Analysis020206 networking & telecommunications02 engineering and technologyComplex networkComplex NetworksHuman-Computer InteractionSocial groupComputer Networks and CommunicationFacebook Groups AnalysiFacebook Groups Analysis0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingThe InternetSocial mediaSociologySocial Networks AnalysisbusinessCommunity DetectionSoftware1707Proceedings of the 4th EAI International Conference on Smart Objects and Technologies for Social Good
researchProduct

Who is the Perfect Match?

2018

Abstract Using digital tools for teaching allows to unburden teachers from organizational load and even provides qualitative improvements that are not achieved in traditional teaching. Algorithmically supported learning group formation aims at optimizing group composition so that each learner can achieve his or her maximum learning gain and learning groups stay stable and productive. Selecting and weighting relevant criteria for learning group formation is an interdisciplinary challenge. This contribution presents the status quo of algorithmic approaches and respective criteria for learning group formation. Based on this theoretical foundation, we describe an empirical study that investigat…

Social PsychologyComputer Networks and CommunicationsCommunicationHomogeneity (statistics)05 social sciences050301 educationConscientiousnessHuman-Computer Interaction0502 economics and businessStatisticsBusiness Management and Accounting (miscellaneous)Psychology0503 education050203 business & managementInformation Systemsi-com
researchProduct