Search results for "Computer network"

showing 10 items of 1634 documents

Performance Enhancement of Multimedia Broadcast Multicast Service (MBMS) with Receive Diversity

2007

The aim of this paper is to evaluate the effect of receive diversity on multimedia broadcast multicast service (MBMS) performance in wideband code division multiple access (WCDMA) networks. In addition to time diversity provided by long interleaving and receive diversity provided by multiple receive antennas, 3GPP release 6 specifications for MBMS introduce two macro diversity schemes: soft and selective combining. Diversity techniques are introduced in order to improve the MBMS performance. Improvements help especially the cell edge MBMS users who suffer most from the fading channel conditions. As receive diversity is one of the most efficient diversity techniques this paper examines the s…

Interleavingbusiness.industryCode division multiple accessComputer scienceFadingEnhanced Data Rates for GSM EvolutionRadio resource managementWidebandbusinessMultimedia Broadcast Multicast ServiceTime diversityComputer networkCooperative diversitySixth International Conference on Networking (ICN'07)
researchProduct

EECDC-MAC: An energy efficient cooperative duty cycle MAC protocol

2012

In this paper, we propose a novel energy efficient cooperative duty cycle MAC (EECDC-MAC) protocol in which sensor nodes use fixed wakeup rendezvous scheduling to exchange messages and a cooperative transmission mechanism to avoid overuse of nodes with lower residual energy. Numerical results demonstrate that the EECDC-MAC protocol can prolong the entire network longevity efficiently in comparison with an existing cooperative duty cycle MAC protocol, CDC-MAC, and another popular duty cycle MAC protocol, prediction wakeup MAC (PW-MAC) protocol.

Internet Protocol Control ProtocolTelecommunication network reliabilitybusiness.industryComputer scienceDuty cycleComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSRendezvousResidual energybusinessWireless sensor networkComputer networkScheduling (computing)Efficient energy use2012 IFIP Wireless Days
researchProduct

Formal verification of a Cooperative Automatic Repeat reQuest MAC protocol

2012

Author's version of an article published in the journal: Computer Standards & Interfaces. Also available from the publisher at: http://dx.doi.org/10.1016/j.csi.2011.12.001 Cooperative communications, in which a relay node helps the source node to deliver its packets to the destination node, are able to obtain significant benefits in terms of transmission reliability, coverage extension and energy efficiency. A Cooperative Automatic Repeat reQuest (C-ARQ) MAC protocol has been recently proposed to exploit cooperative diversity at the MAC layer. in this paper, we validate the integrity and the validity of the C-ARQ protocol using formal methods. The protocol logic is modeled in SDL and implem…

Internet Protocol Control Protocolcomputer.internet_protocolComputer scienceVDP::Mathematics and natural science: 400::Information and communication science: 420::Algorithms and computability theory: 422Distributed computingAutomatic repeat requestGeneral Inter-ORB ProtocolData_CODINGANDINFORMATIONTHEORYInternet protocol suitefinite model-checkingComputer Science::Networking and Internet ArchitecturePROMELAComputer Science::Information Theorybusiness.industryNode (networking)Link Control ProtocolComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKScooperative communicationsCooperative diversityprotocol verificationHardware and ArchitecturebusinessLawcomputerSoftwareReverse Address Resolution ProtocolComputer networkComputer Standards & Interfaces
researchProduct

AI-IoT Platform for Blind Estimation of Room Acoustic Parameters Based on Deep Neural Networks

2023

Room acoustical parameters have been widely used to describe sound perception in indoor environments, such as concert halls, conference rooms, etc. Many of them have been standardized and often have a high computational demand. With the increasing presence of deep learning approaches in automatic monitoring systems, wireless acoustic sensor networks (WASNs) offer great potential to facilitate the estimation of such parameters. In this scenario, Convolutional Neural Networks (CNNs) offer significant reductions in the computational requirements for in-node parameter predictions, enabling the so-called Artificial Intelligence-Internet of Things (AI-IoT). In this paper, we describe the design a…

InternetComputer Networks and CommunicationsHardware and ArchitectureInformàticaSignal ProcessingComputer Science ApplicationsInformation SystemsIEEE Internet of Things Journal
researchProduct

Network Virtualization Based on Effective Packet Transformations

2015

Promocijas darbā ir piedāvātas divas oriģinālas tehnoloģijas, kas paaugstina datortīklu virtualizēšanas efektivitāti: ZERO tunelēšanas protokols, un Pakešu Transformāciju Valoda (Packet Transformation Language, PTL), kas ļauj kompaktā pierakstā formāli aprakstīt ZERO un citus tunelēšanas protokolus. Darbā ir piedāvāts Ethernet-pāri-IP tunelēšanas protokols, kas nodala visus Ethernet kadrus tunelēšanai NICE un UGLY kadros. UGLY kadri tiek tunelēti ar tradicionālām metodēm, kā UDP vai GRE enkapsulācija, kas būtiski palielina kopējo paketes garumu dēļ papildus galvenēm un fragmentēšanas, kas parasti nepieciešama, lai transportētu garus Ethernet kadrus pāri IP datortīklam, kam parasti maksimāla…

InternetEthernetDatu apstrādes sistēmas un datortīklitunnelingstraumes apstrādemākoņdatošanaDatorzinātnesComputer ScienceData processing systems and computer networkscomputer networkstunelēšanadatoru tīkli
researchProduct

Citizens’ Cybersecurity Behavior: Some Major Challenges

2022

Citizens’ cybersecurity behaviors are an important concern in the modern age. This work discusses the challenges of studying citizen cybersecurity behaviors and the directions for future research. peerReviewed

InternetturvallisuusComputer Networks and CommunicationsComputer scienceuhatorganisaatiottietoturvapolitiikkahakkerointikansalaisetvaikuttaminenetätyöEngineering ethicstietoturvaElectrical and Electronic EngineeringkyberturvallisuusverkkohyökkäyksetLawIEEE Security & Privacy
researchProduct

Smart Grid Security: A new Approach to Detect Intruders in a Smart Grid Neighborhood Area Network

2016

International audience; In this paper, we propose an efficient and lightweight attack detection mechanism for a smart grid Neighborhood Area Network (NAN) that combine between distributed and centralized intrusion detection. A NAN includes the customers' appliances, smart meters and collectors. The smart meters measure the power consumption of each appliance and the collectors aggregate the measures and forward them to the control center for analysis. Intrusion Detection System (IDS) agents, proposed in our framework, run in a distributed fashion at smart meters level and in a centralized fashion at collector and control center nodes. A combination between a rule-based detection and a learn…

Intruder detection[ INFO ] Computer Science [cs]Computer science[SPI] Engineering Sciences [physics][ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Denial-of-service attack02 engineering and technologyIntrusion detection system[INFO] Computer Science [cs]Resource exhaustion0202 electrical engineering electronic engineering information engineering[ SPI ] Engineering Sciences [physics]Neighborhood area networkSmart GridFalse data injection[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industrySmart grid security020208 electrical & electronic engineering020206 networking & telecommunicationsAttackGrid[SPI.TRON] Engineering Sciences [physics]/Electronics[ SPI.TRON ] Engineering Sciences [physics]/ElectronicsSmart gridDoSbusinessEnergy (signal processing)Computer networkEfficient energy use
researchProduct

A Trusted Hybrid Learning Approach to Secure Edge Computing

2021

Securing edge computing has drawn much attention due to the vital role of edge computing in Fifth Generation (5G) wireless networks. Artificial Intelligence (AI) has been adopted to protect networks against attackers targeting the connected edge devices or the wireless channel. However, the proposed detection mechanisms could generate a high false detection rate, especially against unknown attacks defined as zero-day threats. Thereby, we propose and conceive a new hybrid learning security framework that combines the expertise of security experts and the strength of machine learning to protect the edge computing network from known and unknown attacks, while minimizing the false detection rat…

Intrustion Detection: Computer science [C05] [Engineering computing & technology]Monitoringbusiness.industryComputer scienceFeature extractionHybrid learningServersHybrid learning: Sciences informatiques [C05] [Ingénierie informatique & technologie]Computer Science ApplicationsImage edge detectionHuman-Computer Interaction[SPI]Engineering Sciences [physics]Hardware and ArchitectureServerSecurityEdge ComputingFeature extractionEnginesElectrical and Electronic Engineeringbusiness5GEdge computingComputer network
researchProduct

Predicting lorawan behavior. How machine learning can help

2020

Large scale deployments of Internet of Things (IoT) networks are becoming reality. From a technology perspective, a lot of information related to device parameters, channel states, network and application data are stored in databases and can be used for an extensive analysis to improve the functionality of IoT systems in terms of network performance and user services. LoRaWAN (Long Range Wide Area Network) is one of the emerging IoT technologies, with a simple protocol based on LoRa modulation. In this work, we discuss how machine learning approaches can be used to improve network performance (and if and how they can help). To this aim, we describe a methodology to process LoRaWAN packets a…

IoTComputer Networks and CommunicationsComputer scienceDecision treeChannel occupancy; cluster analysis; IoT; LoRa; LoRaWAN; machine learning; network optimization; prediction analysisMachine learningcomputer.software_genreChannel occupancyLoRalcsh:QA75.5-76.95network optimizationNetwork performanceProtocol (object-oriented programming)Profiling (computer programming)Artificial neural networkNetwork packetbusiness.industrySettore ING-INF/03 - TelecomunicazioniPipeline (software)LoRaWANHuman-Computer Interactionmachine learningprediction analysisArtificial intelligencelcsh:Electronic computers. Computer sciencebusinesscomputerCommunication channelcluster analysis
researchProduct

Development of a Low-Cost IoT System for Lightning Strike Detection and Location

2019

Lightning and thunder are some of the most violent natural phenomena. They generate a great deal of expenditure and economic loss, especially when they strike in cities. The identification of the concrete geographic area where they strike is of critical importance for emergency services in order to enhance their effectiveness by doing an intensive coverage of the affected area. To achieve this purpose at the city scale, this paper proposes the design, prototype, and validation of a distributed network of Internet of Things (IoT) devices. The IoT devices are empowered with lightning detection capabilities and are synchronized with the other devices in the sensor network. All of them cooperat…

IoTComputer Networks and CommunicationsComputer scienceLightning (connector)Real-time computing0211 other engineering and technologies02 engineering and technology01 natural scienceslaw.inventionlaw0103 physical sciencesElectrical and Electronic Engineering010306 general physicsLightning detection021110 strategic defence & security studiesThunderLightningsensor designLightning strikeHardware and ArchitectureControl and Systems EngineeringSignal Processinglightning detection and locationTrilaterationWireless sensor networkFIWAREElectronics
researchProduct