Search results for "Computer network"
showing 10 items of 1634 documents
A new Media Access Control layer Quality of Service multicast scheme for IEEE 802.11s based wireless mesh networks
2014
Inderscience Publishers; International audience; We propose a new Media Access Control (MAC) layer enabling Quality of Service (QoS) multicast scheme for IEEE 802.11s networks, where a unicast routing protocol called HWMP (Hybrid Wireless Mesh Protocol) is defined. The HWMP protocol is more adapted for best effort traffic, that's why its usage is not suitable for real time multimedia applications. The goal of our proposed mechanism is to take into account multicast communication under QoS constraints for the IEEE 802.11s mesh networks where no QoS multicasting has been defined. Our multicasting scheme handles QoS guarantee for real time applications. Indeed, our scheme is based on finding t…
Ultra-Low Power Wake-up Radio for 5G IoT
2019
5G Internet of Things (5G IoT), which is currently under development by 3GPP, paves the way for connecting diverse categories of devices to the IoT via cellular networks. For battery-powered low-cost IoT devices, wake-up radio (WuR) appears as an eminent technique for prolonging the lifetime of such devices, thanks to its outstanding energy consumption performance. However, only some small-size battery-powered IoT devices are able to transmit to a cellular IoT base station (BS) directly. In this article, we present W2B-IoT, a prototype implementation of a WuR-based two-tier system, which bridges cellular IoT BS and WuR via a Bluetooth low energy (BLE)-enabled Android smartphone. Such a WuR-…
Assessment of the Current for a Non-Linear Power Inductor Including Temperature in DC-DC Converters
2023
A method for estimating the current flowing through a non-linear power inductor operating in a DC/DC converter is proposed. The knowledge of such current, that cannot be calculated in closed form as for the linear inductor, is crucial for the design of the converter. The proposed method is based on a third-order polynomial model of the inductor, already developed by the authors; it is exploited to solve the differential equation of the inductor and to implement a flux model in a circuit simulator. The method allows the estimation of the current up to saturation, intended as the point at which the differential inductance is reduced to half of its maximum value. The current profile depends al…
Pain fingerprinting using multimodal sensing: pilot study
2021
Abstract Pain is a complex phenomenon, the experience of which varies widely across individuals. At worst, chronic pain can lead to anxiety and depression. Cost-effective strategies are urgently needed to improve the treatment of pain, and thus we propose a novel home-based pain measurement system for the longitudinal monitoring of pain experience and variation in different patients with chronic low back pain. The autonomous nervous system and audio-visual features are analyzed from heart rate signals, voice characteristics and facial expressions using a unique measurement protocol. Self-reporting is utilized for the follow-up of changes in pain intensity, induced by well-designed physical …
A tale of two frames : Exploring the role of framing in the use discontinuance of volitionally adopted technology
2022
https://doi.org/10.1111/isj.12355 The discontinuance of volitional IS (i.e., information systems adopted, used and discontinued at will) has recently attracted remarkable attention from academics and practitioners alike. However, most research to date has been ahistorical. Ignoring the temporal progression can be problematic when the phenomenon under investigation is dynamic and evolving. To balance this, we adopt a stage modelling approach to understand the process ending with the technology use being discontinued by users of a popular crowdsourcing platform. Two questions guided our investigation: (1) Why do users discontinue using an IS they have volitionally adopted and used? (2) How do…
Does the law matter? An empirical study on the accessibility of Finnish higher education institutions’ web pages
2022
AbstractInformation and communication technology (ICT) has made higher education available to many students in a new way. The role of online learning in higher education institutions (HEIs) has grown to an unprecedented scale due to the COVID-19 pandemic. The diversity of higher education students has increased, and accessible solutions are needed. New European and national regulations support these trends. The research reported in this paper was conducted in Finland, which is one of the leading European countries in terms of high technology and digitalisation. The aim of this research is to explore the accessibility of all Finnish HEIs’ (N = 38) landing pages based on Web Content Accessibi…
Upport vector machines for nonlinear kernel ARMA system identification.
2006
Nonlinear system identification based on support vector machines (SVM) has been usually addressed by means of the standard SVM regression (SVR), which can be seen as an implicit nonlinear autoregressive and moving average (ARMA) model in some reproducing kernel Hilbert space (RKHS). The proposal of this letter is twofold. First, the explicit consideration of an ARMA model in an RKHS (SVM-ARMA 2k) is proposed. We show that stating the ARMA equations in an RKHS leads to solving the regularized normal equations in that RKHS, in terms of the autocorrelation and cross correlation of the (nonlinearly) transformed input and output discrete time processes. Second, a general class of SVM-based syste…
Hypervisor-assisted dynamic malware analysis
2021
AbstractMalware analysis is a task of utmost importance in cyber-security. Two approaches exist for malware analysis: static and dynamic. Modern malware uses an abundance of techniques to evade both dynamic and static analysis tools. Current dynamic analysis solutions either make modifications to the running malware or use a higher privilege component that does the actual analysis. The former can be easily detected by sophisticated malware while the latter often induces a significant performance overhead. We propose a method that performs malware analysis within the context of the OS itself. Furthermore, the analysis component is camouflaged by a hypervisor, which makes it completely transp…
Effect of Demand Side Management on the Operation of PV-Integrated Distribution Systems
2020
In this new era of high electrical energy dependency, electrical energy must be abundant and reliable, thus smart grids are conducted to deliver load demands. Hence, smart grids are implemented alongside distributed generation of renewable energies to increase the reliability and controllability of the grid, but, with the very volatile nature of the Distributed Generation (DG), Demand Side Management (DSM) helps monitor and control the load shape of the consumed power. The interaction of DSM with the grid provides a wide range of mutual benefits to the user, the utility and the market. DSM methodologies such as Conservation Voltage Reduction (CVR) and Direct Load Control (DLC) collaborate i…
Enhancing HSUPA system level performance with dual carrier capability
2010
The purpose of this paper is to analyze how dual carrier capability can enhance High Speed Uplink Packet Access performance in comparison to using only single carrier. Dual carrier operation gives the User Equipment the possibility to transmit simultaneously using two 5 MHz bands, theoretically doubling the peak data rates and user throughput. The analysis is conducted with a system level simulation tool. This paper first indicates with single carrier simulations that, especially in small cells, terminals have spare power available for dual carrier operation. These observations are verified with dual carrier simulations by showing that the burst throughput can be practically doubled. In the…