Search results for "Computer network"

showing 10 items of 1634 documents

A Metaheuristic Bandwidth Allocation Scheme for FiWi Networks Using Ant Colony Optimization

2015

Optical-wireless access networks constitute a quite attractive solution to meet the ever-increasing bandwidth requirements of end-users, offering significant benefits such as ubiquitous coverage in the wireless domain and huge bandwidth in the optical domain. However, converging optical and wireless networking technologies, with Passive Optical Networks (PONs) and 4G wireless standards, such as the Worldwide Interoperability for Microwave Access (WiMAX) and the Long Term Evolution (LTE), entails major challenges that need to be addressed. In this context, designing an efficient and fair bandwidth distribution with Quality of Service (QoS) support is a difficult task due to the interdependen…

Access networkDynamic bandwidth allocationWireless networkbusiness.industryComputer scienceSettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSWiMAXPassive optical networkBandwidth allocationComputer Networks and CommunicationAutomotive EngineeringBandwidth (computing)Radio resource managementbusinessComputer network
researchProduct

Proxy Mobile IPv6-Based Seamless Handover

2013

A prospective next generation wireless network is expected to integrate harmoniously into an IP-based core network. It is widely anticipated that IP-layer handover is a feasible solution to global mobility. However, the performance of IP-layer handover based on basic Mobile IP (MIP) cannot support real time services very well due to long handover delay. The Internet Engineering Task Force (IETF) Network-based Localized Mobility Management (NETLMM) working group developed a network-based localized mobility management protocol called Proxy Mobile IPv6 (PMIPv6) to reduce the handoff latency of MIPv6. Moreover, PMIPv6 provides the IP with the mobility to support User Equipments (UEs) without it…

Access networkHandoverWireless networkMobile IPbusiness.industryComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSCore networkbusinessProxy Mobile IPv6Mobility managementIPv6Computer network
researchProduct

Phone-Controlled Delivery of NGN Services into Residential Environments

2008

The horizontally layered architecture of the IMS/NGN standards family enables the delivery of services independent of access network and requesting device. In this article, the authors propose a further separation of service control and delivery, allowing the requesting device - in particular a user's mobile phone - to invite other devices (we will focus on DLNA appliances) into the service delivery, enhancing both user experience and service design flexibility. The proposed solution builds on exploiting proximity technologies (e.g. barcodes, NFC) for pairing the control device with a remote environment. Motivated by scenarios, the architecture concepts are explained and a prototype that wa…

Access networkMultimediabusiness.industryService delivery frameworkComputer scienceService designcomputer.software_genreUser experience designMobile phoneUniversal Plug and PlayNext-generation networkVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552Mobile telephonybusinesscomputerComputer network
researchProduct

Preamble Reservation Based Access for Grouped mMTC Devices with URLLC Requirements

2019

Author's accepted manuscript (postprint). © 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. Available from 16/07/2021. Ultra-reliable low latency communication (URLLC) and massive machine type communications (mMTC) are two of the three major technological pillars in 5G. For medium access in mMTC scenarios, e.g., smart cities, a major bottleneck for achieving reli…

Access networkbusiness.industryComputer science05 social sciencesReservation050801 communication & media studiesPreamble0508 media and communications0502 economics and business050211 marketingLatency (engineering)businessVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 5505GRandom accessComputer networkCommunication channel
researchProduct

A conceptual model of feedback mechanisms in adjusted affordances – Insights from usage of a mental mobile health application

2023

Affordance theory provides one of the most prominent lenses through which the socio-technical aspects of a system’s use can be investigated and understood. In this context, the literature has proposed that perceived and actualized affordances may be adjusted over time. Yet, how the adjustment of affordances occurs has not been explained in detail. Thus, in this article, we develop a conceptual model of feedback mechanisms that includes a more explicit description of how affordances are perceived by users, whether actualized and adjusted. With the model, we introduce the central concept of a generative base, out of which affordance perceptions emerge and which can be updated through affordan…

ActualizationComputer Networks and CommunicationsMental ModelsPerception000 Informatik Informationswissenschaft allgemeine Werke::000 Informatik Wissen Systeme::004 Datenverarbeitung; InformatikLibrary and Information SciencesFeedback MechanismsVDP::Matematikk og Naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420AffordancesInformation Systems004
researchProduct

Middleware with QoS Support to Control Intelligent Systems

2008

This paper presents the architecture of a middleware for control component-based distributed systems. The fundamental idea underlying this architecture is the use of a hierarchical communications structure called "logical namespace tree" and a structured set of control processes interconnected, called "logical sensors graph". This architecture is named frame sensor adapter control (FSA-Ctrl). The aim of FSA-Ctrl is to provide a simple interface to specify the control actions and ensure a communication with some specified QoS parameters restrictions. In this architecture both systems, communication and control, manages the QoS policies. The communication system is based on the data distribut…

Adapter (computing)Computer sciencebusiness.industryQuality of serviceControl systemDistributed computingIntelligent decision support systemData Distribution ServiceNamespaceSoftware architecturebusinessCommunications systemComputer network2008 The Second International Conference on Advanced Engineering Computing and Applications in Sciences
researchProduct

A distributed real-time data prediction and adaptive sensing approach for wireless sensor networks

2018

International audience; Many approaches have been proposed in the literature to reduce energy consumption in Wireless Sensor Networks (WSNs). Influenced by the fact that radio communication and sensing are considered to be the most energy consuming activities in such networks. Most of these approaches focused on either reducing the number of collected data using adaptive sampling techniques or on reducing the number of data transmitted over the network using prediction models. In this article, we propose a novel prediction-based data reduction method. furthermore, we combine it with an adaptive sampling rate technique, allowing us to significantly decrease energy consumption and extend the …

Adaptive samplingComputer Networks and CommunicationsComputer scienceReal-time computing[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technology[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]0202 electrical engineering electronic engineering information engineeringReal-time dataWork (physics)020206 networking & telecommunicationsEnergy consumption[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationComputer Science Applications[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Hardware and Architecture[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]020201 artificial intelligence & image processing[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]Wireless sensor networkSoftwarePredictive modellingEnergy (signal processing)Information SystemsData reductionPervasive and Mobile Computing
researchProduct

An efficient adaptive strategy for searching in peer-to-peer networks

2005

One of the main technical challenges in Peer-to-Peer (P2P) networks is how to efficiently locate desired resources. Although structured systems, based on distributed hash tables, can achieve fair effectiveness, they are not suitable for widely deployed Internet applications. In fact, this kind of systems shows many severe limitations, such as ignoring the autonomous nature of peers, and supporting only weakly semantic functions. Unstructured P2P networks are more attractive for real applications, since they can avoid both the limitations of centralized systems, and the drawbacks of structured approaches. However, their search algorithms are usually based on inefficient flooding schemes, tha…

Adaptive strategiesGeneral Computer ScienceExploitbusiness.industryComputer scienceDistributed computingPeer-to-peercomputer.software_genreNetwork topologyHash tableFlooding (computer networking)Search algorithmThe InternetbusinesscomputerMultiagent and Grid Systems
researchProduct

SINGLE-TRIAL BASED INDEPENDENT COMPONENT ANALYSIS ON MISMATCH NEGATIVITY IN CHILDREN

2010

Independent component analysis (ICA) does not follow the superposition rule. This motivates us to study a negative event-related potential — mismatch negativity (MMN) estimated by the single-trial based ICA (sICA) and averaged trace based ICA (aICA), respectively. To sICA, an optimal digital filter (ODF) was used to remove low-frequency noise. As a result, this study demonstrates that the performance of the sICA+ODF and aICA could be different. Moreover, MMN under sICA+ODF fits better with the theoretical expectation, i.e., larger deviant elicits larger MMN peak amplitude.

AdolescentLearning DisabilitiesComputer Networks and CommunicationsSpeech recognitionMismatch negativityElectroencephalographyGeneral MedicineIndependent component analysisNoiseAcoustic StimulationAttention Deficit Disorder with HyperactivityEvoked Potentials AuditoryHumansSingle trialChildEvoked PotentialsDigital filterAlgorithmsMathematicsInternational Journal of Neural Systems
researchProduct

An adoption model for mobile banking in Ghana

2009

The impact of social and cultural factors on the adoption of technology still requires much research. To investigate it more fully, we examine the reasons for the adoption and non-adoption of mobile banking in Ghana. Through a survey of 271 people in Ghana, it has been found that social and cultural factors in the form of perceived credibility, facilitating conditions, perceived elitisation and demographic factors do play a significant role in adoption decisions. It has been found that elitisation of technology and services can be a positive influence for adopters whilst being a negative influence for non-adopters. In addition, perceived credibility and facilitating conditions also influenc…

Adoption modelMobile bankingComputer Networks and Communicationsbusiness.industryInformation technologyPerceived credibilityContext (language use)Electrical and Electronic EngineeringMarketingbusinessComputer Science ApplicationsInternational Journal of Mobile Communications
researchProduct