Search results for "Computer network"

showing 10 items of 1634 documents

Energy efficiency and CO2 emissions of port container terminal equipment: Evidence from the Port of Valencia

2019

Abstract Energy efficiency has emerged as a key point in port industry because of different factors such as the adoption of stronger environmental regulations and the increasing pressure of the local community on the surrounding ports. As gathering operational data from port terminals can be difficult due to privacy, studies on emissions and energy efficiency of these terminals are scarce. The following research provides key information about the real energy consumption and CO2 emissions of one of the most relevant container terminals in the Mediterranean area, located in Valencia, Spain. The results show that yard terminal tractors and rubber tyred gantry cranes (RTGs) are the main emissio…

Tractorbusiness.product_categoryTerminal (telecommunication)020209 energy02 engineering and technologyEnergy consumption010501 environmental sciencesManagement Monitoring Policy and LawEnvironmental economics01 natural sciencesPort (computer networking)General Energy0202 electrical engineering electronic engineering information engineeringRetrofittingEnvironmental sciencebusinessTerminal equipment0105 earth and related environmental sciencesEfficient energy useLiquefied natural gasEnergy Policy
researchProduct

Indexing Method for Transitive Relationships of Product Information

2008

To successfully use a relational database management system (RDBMS) as a repository for product information, the RDBMS must efficiently process and properly answer ontological queries. The key to processing the ontological queries is whether the various semantic relationships among the concepts of the product ontology are likewise well-processed. In particular, the transitive relationships (e.g., is-a, component-of relationships) such as ancestors-descendents, parents-children, and taxonomy of products must be processed successfully. We propose an efficient index using a numbering scheme (labeling scheme) to process queries over transitive relationships. (This paper is an extended version o…

Transitive relationInformation retrievalComputer Networks and CommunicationsRelational databasecomputer.internet_protocolComputer scienceSearch engine indexingInformationSystems_DATABASEMANAGEMENTOntology (information science)computer.software_genreNumberingDatabase indexNumbering schemeIndex (publishing)Relational database management systemArtificial IntelligenceTaxonomy (general)Product (mathematics)OntologycomputerSoftwareXML2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology
researchProduct

Reliability of Data Transmission of UAVs

2018

Drones have been recently an interesting subject of research due to their roles in accomplishing missions. Flying in a formation fleet, they form a cooperative communication system in order to improve the efficiency of the mission. For this reason, the reliability of the communication is essential to guarantee the overall performance of the fleet although the link conditions, the external factors and the hardware failures of a drone. The drones capture several images or videos of the geographical area of the mission and send them to other drones in the fleet or to the Ground Station Control (GSC). The importance is to ensure that all the data transmitted is received. In this article, we aim…

Transmission (telecommunications)Computer scienceRobustness (computer science)Reliability (computer networking)Control (management)Communications systemComputer securitycomputer.software_genrecomputerProtocol (object-oriented programming)DroneData transmissionSSRN Electronic Journal
researchProduct

Performance evaluation of the MPE-iFEC Sliding RS Encoding for DVB-H streaming services

2008

This article studies the performance of the Sliding RS Encoding (SRSE) in the transmission of streaming services in DVB-H (Digital Video Broadcasting - Transmission System for Handheld Terminals) networks. The SRSE forms part of a set of specifications called MPE-iFEC which has been recently defined in the DVB-SH (Digital Video Broadcasting - Satellite Services to Handheld Devices) standard and is fully compatible with the link layer of DVB-H. MPE-iFEC is capable of encoding information related to different datagram bursts in a jointly manner in order to counteract the long signal blockages expected in satellite reception. This is what is usually referred to as Multi-Burst Encoding (MBE) an…

Transmission (telecommunications)Computer sciencebusiness.industryReed–Solomon error correctionDatagramEncoding (memory)Digital Video BroadcastingSingle-frequency networkLink layerData_CODINGANDINFORMATIONTHEORYForward error correctionbusinessComputer network2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications
researchProduct

A novel teletraffic-based power saving scheme for cellular networks with microcells

2011

As the number of network components increases to meet the explosion of mobile devices, power conservation has become an important strategy for network operators. In this paper, we propose a novel teletraffic-based approach to save power consumption of a three-cell microcellular network. When the traffic load in the middle cell is lower than certain threshold, the cell can be switched-off and its users will be covered by increasing the transmission power of one sector antenna in each of the two neighboring cells. Numerical results demonstrate that at a moderate cost of increased antenna transmission power of the two sectors, significant amount of network power can be saved for the whole netw…

Transmission (telecommunications)business.industryComputer scienceCellular networkSector antennaMobile telephonyAntenna (radio)businessTeletraffic engineeringComputer networkPower (physics)2011 IEEE 36th Conference on Local Computer Networks
researchProduct

Real-time transmission over Switched Ethernet using a contracts based framework

2009

Switched Ethernet is being used for real time transmissions in industrial automation more and and more. Most modern industrial switches are equipped with mechanisms to deal with time predictability. However, real-time transmission not only requires these mechanisms, but also the proper policies for managing network resources. This paper proposes the use of contracts. A contract is a set of transmission specifications which are negotiated between the applications and the run-time support. They define the application workload and the required performance guarantees. We implement contracts for real-time streaming as an extension of FRESCOR (Framework for Real-time Embedded Systems based on COn…

Transmission (telecommunications)business.industryComputer scienceFormal specificationLocal area networkResource allocationbusinessVariable bitrateAutomationComputer network2009 IEEE Conference on Emerging Technologies & Factory Automation
researchProduct

Enabling Backoff and Eliminating Redundant Idle Period for Medium Access in LTE-U

2017

To address the burgeoning demand for mobile data, 3GPP is actively studying the capability of operating LTE in the unlicensed band, referred to as LTE-U. One of the main challenges of this approach is to maintain better coexistence between WiFi and LTE-U devices. To enable the coexistence, the listen before talk (LBT) principle has been adopted for LTE-U medium access with two flavors of mechanisms, i.e., load based equipment (LBE) and frame based equipment (FBE) access. In this paper, we consider the FBE mechanism and enhance its performance by introducing a backoff procedure for LTE devices. We investigate the original FBE mechanism defined by 3GPP and the enhanced FBE (E- FBE) mechanism fr…

Transmission delaybusiness.industryComputer scienceMobile broadbandComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS05 social sciences050801 communication & media studiesIdle0508 media and communicationsTransmission (telecommunications)0502 economics and businessListen before talk050211 marketingbusinessComputer network2017 IEEE 86th Vehicular Technology Conference (VTC-Fall)
researchProduct

Preamble Sampling MAC Protocol for Low Power Wireless Sensor Networks with IEEE 802.15.4 Transceivers

2006

In this paper a preamble sampling MAC protocol for low power wireless sensor networks is proposed. The article describes the implementation of the protocol using network nodes equipped with the Chipcon CC2420 802.15.4 transceiver. The power consumption of the transceiver has been measured and the MAC protocol has been adapted to the transceiver properties. The results show the trade-off between power consumption and transmission delay for this algorithm during the communication process.

Transmission delaybusiness.industryComputer sciencecomputer.internet_protocolComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSEnergy consumptionlaw.inventionBluetoothlawLow-power electronicsWireless Application ProtocolComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMSTransceiverbusinessWireless sensor networkcomputerIEEE 802.15Computer network2006 IEEE Instrumentation and Measurement Technology Conference Proceedings
researchProduct

Non-regular network performance comparison between HSDPA and LTE

2010

In this paper we study and benchmark the performance of 3rd Generation Partnership Project (3GPP) High Speed Downlink Packet Access (HSDPA) and 3GPP Long Term Evolution (LTE) Downlink with constant bit rate type traffic. In addition a non-regular simulation scenario is considered using realistic propagation data and base station positions related to Tokyo city downtown area. HSDPA was introduced in 3GPP Release 5 and in further releases the technology has been improved with e.g. receive and transmit diversity technologies and support for higher order modulation schemes. LTE was introduced in 3GPP Release 8 with completely new physical layer and improved Radio Resource Management (RRM) funct…

Transmit diversityBase stationbusiness.industryComputer scienceMIMOPhysical layerThroughputFadingSpectral efficiencyRadio resource managementbusinessComputer networkIEEE 5th International Symposium on Wireless Pervasive Computing 2010
researchProduct

Data Mining Approach for Detection of DDoS Attacks Utilizing SSL/TLS Protocol

2015

Denial of Service attacks remain one of the most serious threats to the Internet nowadays. In this study, we propose an algorithm for detection of Denial of Service attacks that utilize SSL/TLS protocol. These protocols encrypt the data of network connections on the application layer which makes it impossible to detect attackers activity based on the analysis of packet payload. For this reason, we concentrate on statistics that can be extracted from packet headers. Based on these statistics, we build a model of normal user behavior by using several data mining algorithms. Once the model has been built, it is used to detect DoS attacks. The proposed framework is tested on the data obtained w…

Transport Layer SecurityNetwork securitybusiness.industryNetwork packetComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSDenial-of-service attackIntrusion detection systemcomputer.software_genreApplication layerAnomaly detectionThe InternetData miningbusinesscomputerComputer network
researchProduct