Search results for "Computer network"

showing 10 items of 1634 documents

A new Media Access Control layer Quality of Service multicast scheme for IEEE 802.11s based wireless mesh networks

2014

Inderscience Publishers; International audience; We propose a new Media Access Control (MAC) layer enabling Quality of Service (QoS) multicast scheme for IEEE 802.11s networks, where a unicast routing protocol called HWMP (Hybrid Wireless Mesh Protocol) is defined. The HWMP protocol is more adapted for best effort traffic, that's why its usage is not suitable for real time multimedia applications. The goal of our proposed mechanism is to take into account multicast communication under QoS constraints for the IEEE 802.11s mesh networks where no QoS multicasting has been defined. Our multicasting scheme handles QoS guarantee for real time applications. Indeed, our scheme is based on finding t…

Computer Networks and Communicationscomputer.internet_protocolComputer scienceDistributed computing[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Wireless mesh networksDistance Vector Multicast Routing ProtocolQoSHWMP[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]Multicast addressIEEE 802.11sXcastMAC layer multicastPragmatic General Multicastreal time multimedia applications.Protocol Independent MulticastMulticast[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSMAC routingSource-specific multicastreal time multimedia applicationsIP multicastbusinesscomputerComputer network
researchProduct

Ultra-Low Power Wake-up Radio for 5G IoT

2019

5G Internet of Things (5G IoT), which is currently under development by 3GPP, paves the way for connecting diverse categories of devices to the IoT via cellular networks. For battery-powered low-cost IoT devices, wake-up radio (WuR) appears as an eminent technique for prolonging the lifetime of such devices, thanks to its outstanding energy consumption performance. However, only some small-size battery-powered IoT devices are able to transmit to a cellular IoT base station (BS) directly. In this article, we present W2B-IoT, a prototype implementation of a WuR-based two-tier system, which bridges cellular IoT BS and WuR via a Bluetooth low energy (BLE)-enabled Android smartphone. Such a WuR-…

Computer Networks and Communicationscomputer.internet_protocolComputer sciencebusiness.industryVDP::Technology: 500::Information and communication technology: 550020206 networking & telecommunications02 engineering and technologyEnergy consumptionComputer Science ApplicationsBase station0202 electrical engineering electronic engineering information engineeringCellular networkElectrical and Electronic EngineeringAndroid (operating system)Internet of Thingsbusinesscomputer5GBluetooth Low EnergyComputer network
researchProduct

Assessment of the Current for a Non-Linear Power Inductor Including Temperature in DC-DC Converters

2023

A method for estimating the current flowing through a non-linear power inductor operating in a DC/DC converter is proposed. The knowledge of such current, that cannot be calculated in closed form as for the linear inductor, is crucial for the design of the converter. The proposed method is based on a third-order polynomial model of the inductor, already developed by the authors; it is exploited to solve the differential equation of the inductor and to implement a flux model in a circuit simulator. The method allows the estimation of the current up to saturation, intended as the point at which the differential inductance is reduced to half of its maximum value. The current profile depends al…

Computer Networks and Communicationsinductorsmagnetic coresnonlinear circuitsnonlinear network analysialgorithmsinductorSettore ING-INF/01 - ElettronicaAlgorithmmagnetic corenumerical simulationsferriteHardware and ArchitectureControl and Systems Engineeringnonlinear network analysisSignal ProcessingElectrical and Electronic Engineeringnonlinear circuitferritesElectronics
researchProduct

Pain fingerprinting using multimodal sensing: pilot study

2021

Abstract Pain is a complex phenomenon, the experience of which varies widely across individuals. At worst, chronic pain can lead to anxiety and depression. Cost-effective strategies are urgently needed to improve the treatment of pain, and thus we propose a novel home-based pain measurement system for the longitudinal monitoring of pain experience and variation in different patients with chronic low back pain. The autonomous nervous system and audio-visual features are analyzed from heart rate signals, voice characteristics and facial expressions using a unique measurement protocol. Self-reporting is utilized for the follow-up of changes in pain intensity, induced by well-designed physical …

Computer Networks and Communicationskipusignaalianalyysimonitorointiaudio analysiskivunhoitomachine learningkoneoppiminenHardware and Architectureheart rateMedia Technologyselkäkrooninen kipuilmeetEEGsykemittaritlow back painfacial expressionelectroencephalographySoftwareMultimedia Tools and Applications
researchProduct

A tale of two frames : Exploring the role of framing in the use discontinuance of volitionally adopted technology

2022

https://doi.org/10.1111/isj.12355 The discontinuance of volitional IS (i.e., information systems adopted, used and discontinued at will) has recently attracted remarkable attention from academics and practitioners alike. However, most research to date has been ahistorical. Ignoring the temporal progression can be problematic when the phenomenon under investigation is dynamic and evolving. To balance this, we adopt a stage modelling approach to understand the process ending with the technology use being discontinued by users of a popular crowdsourcing platform. Two questions guided our investigation: (1) Why do users discontinue using an IS they have volitionally adopted and used? (2) How do…

Computer Networks and Communicationskäyttäjätqualitative studyMedia studiestietotekniikkaIS discontinuancekäyttöFraming (construction)teknologiavolitional ISlopettaminenstage modelPsychologyomaksuminenSoftwareInformation SystemsQualitative researchkäyttäjätutkimus
researchProduct

Does the law matter? An empirical study on the accessibility of Finnish higher education institutions’ web pages

2022

AbstractInformation and communication technology (ICT) has made higher education available to many students in a new way. The role of online learning in higher education institutions (HEIs) has grown to an unprecedented scale due to the COVID-19 pandemic. The diversity of higher education students has increased, and accessible solutions are needed. New European and national regulations support these trends. The research reported in this paper was conducted in Finland, which is one of the leading European countries in terms of high technology and digitalisation. The aim of this research is to explore the accessibility of all Finnish HEIs’ (N = 38) landing pages based on Web Content Accessibi…

Computer Networks and Communicationsweb accessibility evaluation toolsWWW-sivutweb content accessibility guidelines (WCAG)web accessibilitytestausHuman-Computer Interactionerityisopiskelijathigher educationverkkosivustotkorkeakoulutesteettömyys ja saavutettavuusarviointiSoftwarestudents with special educational needs and disabilitiesInformation Systems
researchProduct

Upport vector machines for nonlinear kernel ARMA system identification.

2006

Nonlinear system identification based on support vector machines (SVM) has been usually addressed by means of the standard SVM regression (SVR), which can be seen as an implicit nonlinear autoregressive and moving average (ARMA) model in some reproducing kernel Hilbert space (RKHS). The proposal of this letter is twofold. First, the explicit consideration of an ARMA model in an RKHS (SVM-ARMA 2k) is proposed. We show that stating the ARMA equations in an RKHS leads to solving the regularized normal equations in that RKHS, in terms of the autocorrelation and cross correlation of the (nonlinearly) transformed input and output discrete time processes. Second, a general class of SVM-based syste…

Computer Science::Machine LearningStatistics::TheoryComputer Networks and CommunicationsBiomedical signal processingInformation Storage and RetrievalMachine learningcomputer.software_genrePattern Recognition AutomatedStatistics::Machine LearningArtificial IntelligenceApplied mathematicsStatistics::MethodologyAutoregressive–moving-average modelComputer SimulationMathematicsTelecomunicacionesHardware_MEMORYSTRUCTURESSupport vector machinesModels StatisticalNonlinear system identificationbusiness.industryAutocorrelationSystem identificationSignal Processing Computer-AssistedGeneral MedicineComputer Science ApplicationsSupport vector machineNonlinear systemKernelAutoregressive modelNonlinear DynamicsARMA modelling3325 Tecnología de las TelecomunicacionesArtificial intelligenceNeural Networks ComputerbusinesscomputerSoftwareAlgorithmsReproducing kernel Hilbert spaceIEEE transactions on neural networks
researchProduct

Hypervisor-assisted dynamic malware analysis

2021

AbstractMalware analysis is a task of utmost importance in cyber-security. Two approaches exist for malware analysis: static and dynamic. Modern malware uses an abundance of techniques to evade both dynamic and static analysis tools. Current dynamic analysis solutions either make modifications to the running malware or use a higher privilege component that does the actual analysis. The former can be easily detected by sophisticated malware while the latter often induces a significant performance overhead. We propose a method that performs malware analysis within the context of the OS itself. Furthermore, the analysis component is camouflaged by a hypervisor, which makes it completely transp…

Computer engineering. Computer hardwareSoftware_OPERATINGSYSTEMSvirtualisointiComputer Networks and CommunicationsComputer scienceContext (language use)Static program analysiscomputer.software_genreTK7885-7895Artificial IntelligenceComponent (UML)Overhead (computing)tietoturvaMalware analysiskyberturvallisuusbusiness.industryHypervisorQA75.5-76.95haittaohjelmatComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSTask (computing)Electronic computers. Computer scienceEmbedded systemMalwarebusinesscomputerSoftwareInformation SystemsCybersecurity
researchProduct

Effect of Demand Side Management on the Operation of PV-Integrated Distribution Systems

2020

In this new era of high electrical energy dependency, electrical energy must be abundant and reliable, thus smart grids are conducted to deliver load demands. Hence, smart grids are implemented alongside distributed generation of renewable energies to increase the reliability and controllability of the grid, but, with the very volatile nature of the Distributed Generation (DG), Demand Side Management (DSM) helps monitor and control the load shape of the consumed power. The interaction of DSM with the grid provides a wide range of mutual benefits to the user, the utility and the market. DSM methodologies such as Conservation Voltage Reduction (CVR) and Direct Load Control (DLC) collaborate i…

Computer science020209 energyReliability (computer networking)conservation voltage reductiondistribution systems02 engineering and technologylcsh:TechnologyReduction (complexity)lcsh:Chemistry0202 electrical engineering electronic engineering information engineeringGeneral Materials ScienceInstrumentationlcsh:QH301-705.5distribution systemFluid Flow and Transfer Processesdistributed generationdemand side managementVoltage reductionbusiness.industrylcsh:TProcess Chemistry and Technology020208 electrical & electronic engineeringPhotovoltaic systemGeneral Engineeringdirect load controlGridlcsh:QC1-999Computer Science ApplicationsReliability engineeringRenewable energySettore ING-IND/33 - Sistemi Elettrici Per L'EnergiaSmart gridlcsh:Biology (General)lcsh:QD1-999lcsh:TA1-2040Distributed generationbusinesslcsh:Engineering (General). Civil engineering (General)lcsh:PhysicsApplied Sciences
researchProduct

Enhancing HSUPA system level performance with dual carrier capability

2010

The purpose of this paper is to analyze how dual carrier capability can enhance High Speed Uplink Packet Access performance in comparison to using only single carrier. Dual carrier operation gives the User Equipment the possibility to transmit simultaneously using two 5 MHz bands, theoretically doubling the peak data rates and user throughput. The analysis is conducted with a system level simulation tool. This paper first indicates with single carrier simulations that, especially in small cells, terminals have spare power available for dual carrier operation. These observations are verified with dual carrier simulations by showing that the burst throughput can be practically doubled. In the…

Computer scienceCode division multiple accessbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSSystem-level simulationData_CODINGANDINFORMATIONTHEORYInterference (wave propagation)Electronic mailSpread spectrumUser equipmentElectronic engineeringFadingbusinessThroughput (business)Computer networkIEEE 5th International Symposium on Wireless Pervasive Computing 2010
researchProduct