Search results for "Erk"

showing 10 items of 2599 documents

Analysis and Evaluation of Adaptive RSSI-based Ranging in Outdoor Wireless Sensor Networks

2019

Estimating inter-node distances based on received radio signal strength (RSSI) is the foundation of RSSI-based outdoor localization in wireless sensor networks (WSNs). However, the accuracy of RSSI-based ranging depends on environmental and weather conditions. Therefore, it is important that RSSI-based ranging adapts to prevailing conditions to improve its range and location accuracy. This paper analyzes and evaluates RSSI-based ranging and adaptive techniques in outdoor WSNs to improve the range quality. The findings highlight the effects of path loss exponent (PLE) estimation error and temperature change on RSSI-based ranging. Consequently, we analyze techniques for mitigating these detri…

Computer Networks and CommunicationsComputer scienceReal-time computing02 engineering and technology01 natural scienceslocalizationCompensation (engineering)wireless sensor network0202 electrical engineering electronic engineering information engineeringRange (statistics)ComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMSta213010401 analytical chemistryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSpaikannussensoriverkottemperature020206 networking & telecommunicationsRanging0104 chemical sciencesHardware and Architecturelämpötilapath loss exponentWireless sensor networkSoftwarelangattomat verkot
researchProduct

On optimal deployment of low power nodes for high frequency next generation wireless systems

2018

Recent development of wireless communication systems and standards is characterized by constant increase of allocated spectrum resources. Since lower frequency ranges cannot provide sufficient amount of bandwidth, new bands are allocated at higher frequencies, for which operators resort to deploy more base stations to ensure the same coverage and to utilize more efficiently higher frequencies spectrum. Striving for deployment flexibility, mobile operators can consider deploying low power nodes that could be either small cells connected via the wired backhaul or relays that utilize the same spectrum and the wireless access technology. However, even though low power nodes provide a greater fl…

Computer Networks and CommunicationsComputer sciencegeneettiset algoritmitOptimal deployment050801 communication & media studies02 engineering and technologyrelaylangaton tiedonsiirtoBase station0508 media and communicationsoptimointigenetic algorithm0202 electrical engineering electronic engineering information engineeringWirelessWireless systemsta113ta213business.industry05 social sciencessmall cell020206 networking & telecommunicationsBackhaul (telecommunications)Software deploymentmulti-hop networkbusinessoptimizationlangattomat verkotComputer networkComputer Networks
researchProduct

Incentive Mechanism for Resource Allocation in Wireless Virtualized Networks with Multiple Infrastructure Providers

2020

To accommodate the explosively growing demands for mobile traffic service, wireless network virtualization is proposed as the main evolution towards 5G. In this work, a novel contract theoretic incentive mechanism is proposed to study how to manage the resources and provide services to the users in the wireless virtualized networks. We consider that the infrastructure providers (InPs) own the physical networks and the mobile virtual network operator (MVNO) has the service information of the users and needs to lease the physical radio resources for providing services. In particular, we utilize the contract theoretic approach to model the resource trading process between the MVNO and multiple…

Computer Networks and CommunicationsComputer sciencewireless virtualized networkcontract theory02 engineering and technologyresursointicomputer.software_genreresurssitallokointiResource (project management)0202 electrical engineering electronic engineering information engineeringWirelessResource managementElectrical and Electronic EngineeringVirtual networkuser associationbusiness.industryWireless network020206 networking & telecommunicationsVirtualizationpower allocationResource allocationbusinesscomputerSoftware5Glangattomat verkotkannustimetComputer network
researchProduct

Does the law matter? An empirical study on the accessibility of Finnish higher education institutions’ web pages

2022

AbstractInformation and communication technology (ICT) has made higher education available to many students in a new way. The role of online learning in higher education institutions (HEIs) has grown to an unprecedented scale due to the COVID-19 pandemic. The diversity of higher education students has increased, and accessible solutions are needed. New European and national regulations support these trends. The research reported in this paper was conducted in Finland, which is one of the leading European countries in terms of high technology and digitalisation. The aim of this research is to explore the accessibility of all Finnish HEIs’ (N = 38) landing pages based on Web Content Accessibi…

Computer Networks and Communicationsweb accessibility evaluation toolsWWW-sivutweb content accessibility guidelines (WCAG)web accessibilitytestausHuman-Computer Interactionerityisopiskelijathigher educationverkkosivustotkorkeakoulutesteettömyys ja saavutettavuusarviointiSoftwarestudents with special educational needs and disabilitiesInformation Systems
researchProduct

Cryptanalysis of Knapsack Cipher Using Ant Colony Optimization

2018

Ant Colony Optimization is a search metaheuristic inspired by the behavior of real ant colonies and shown their effectiveness, robustness to solve a wide variety of complex problems. In this paper, we present a novel Ant Colony Optimization (ACO) based attack for cryptanalysis of knapsack cipher algorithm. A Cipher-text only attack is used to discover the plaintext from the cipher-text. Moreover, our approach allows us to break knapsack cryptosystem in a minimum search space when compared with other techniques. Experimental results prove that ACO can be used as an effective tool to attack knapsack cipher.

Computer scienceAnt colony optimization algorithmsMathematicsofComputing_NUMERICALANALYSISMerkle–Hellman knapsack cryptosystemPlaintextData_CODINGANDINFORMATIONTHEORYAnt colonyComputingMethodologies_ARTIFICIALINTELLIGENCElaw.inventionKnapsack problemlawTheoryofComputation_ANALYSISOFALGORITHMSANDPROBLEMCOMPLEXITYCryptosystemCryptanalysisAlgorithmMetaheuristicSSRN Electronic Journal
researchProduct

Artificial Intelligence in Protecting Smart Building’s Cloud Service Infrastructure from Cyberattacks

2020

Gathering and utilizing stored data is gaining popularity and has become a crucial component of smart building infrastructure. The data collected can be stored, for example, into private, public, or hybrid cloud service infrastructure or distributed service by utilizing data platforms. The stored data can be used when implementing services, such as building automation (BAS). Cloud services, IoT sensors, and data platforms can face several kinds of cybersecurity attack vectors such as adversarial, AI-based, DoS/DDoS, insider attacks. If a perpetrator can penetrate the defenses of a data platform, she can cause significant harm to the system. For example, the perpetrator can disrupt a buildin…

Computer scienceDenial-of-service attackCloud computingComputerApplications_COMPUTERSINOTHERSYSTEMStekoälyComputer securitycomputer.software_genreInsiderpilvipalvelutälytalotComponent (UML)cloud servicetietoturvakyberturvallisuusBuilding automationbusiness.industryattack vectorsartificial intelligencePopularityartificial-intelligence-based applicationsHeating systemälytekniikkabusinessdata platformCloud storagecomputerverkkohyökkäykset
researchProduct

Molecular dynamics simulations in hybrid particle-continuum schemes: Pitfalls and caveats

2017

Heterogeneous multiscale methods (HMM) combine molecular accuracy of particle-based simulations with the computational efficiency of continuum descriptions to model flow in soft matter liquids. In these schemes, molecular simulations typically pose a computational bottleneck, which we investigate in detail in this study. We find that it is preferable to simulate many small systems as opposed to a few large systems, and that a choice of a simple isokinetic thermostat is typically sufficient while thermostats such as Lowe-Andersen allow for simulations at elevated viscosity. We discuss suitable choices for time steps and finite-size effects which arise in the limit of very small simulation bo…

Computer scienceGeneral Physics and AstronomySolverCondensed Matter - Soft Condensed Matter01 natural sciencesThermostatBottleneck010305 fluids & plasmaslaw.invention010101 applied mathematicsMolecular dynamicsHardware and ArchitectureDiscontinuous Galerkin methodlaw0103 physical sciencesSoft matterStatistical physics0101 mathematicsShear flowHidden Markov model
researchProduct

Reducing Power Consumption of Wireless Networks Through Collaborative DMC Mobile Clusters

2017

Reducing the energy consumption of the wireless network is significantly important to the economic and ecological sustainability of the ICT industry, as high energy consumption may limit the performance of wireless networks and is one of the main network costs. To solve energy consumption problem, especially on the terminal side, a scheme known as distributed mobile cloud (DMC) is considered to be a potential solution. Multiple mobile terminals (MTs) can cooperative to take advantage of good quality links among the MTs to save energy when receiving from the Base Station (BS). In this paper, we aim to find the optimal transmit power to further reduce the energy consumption of DMC. From simul…

Computer scienceReal-time computingkulutusmatkaviestinverkot02 engineering and technologyteho (fysiikka)energiansäästöklusteritBase station0203 mechanical engineeringDMCLimit (music)0202 electrical engineering electronic engineering information engineeringtransmit powerElectrical and Electronic EngineeringConsumption (economics)business.industryWireless networkpower consumption020206 networking & telecommunications020302 automobile design & engineeringEnergy consumptionTransmitter power outputComputer Science ApplicationsTerminal (electronics)green communicationsbusinessEnergy (signal processing)Computer networkWireless Personal Communications
researchProduct

Dual Connectivity in Non-Stand Alone Deployment mode of 5G in Manhattan Environment

2020

| openaire: EC/H2020/815191/EU//PriMO-5G The main target of this paper is to analyze the performance of an outdoor user in a dense micro cellular Manhattan grid environment using a ray launching simulation tool. The radio propagation simulations are performed using a Shoot and Bouncing Ray (SBR) method. The network performance is analyzed at three different frequencies i.e. 1.8 GHz, 3.5 GHz, and 28 GHz. Additionally, the benefits of combining LTE and potential 5G frequency bands by using feature of Dual Connectivity (DC) in an outdoor scenario has been highlighted. The considered performance metrics are received signal level, SINR, application throughput. The acquired simulation results fro…

Computer scienceReal-time computingystem performancetiedonsiirtotekniikat5G-tekniikka02 engineering and technology7. Clean energyRadio spectrumlangaton tiedonsiirto0203 mechanical engineeringSignal strength0202 electrical engineering electronic engineering information engineeringNetwork performancedual connectivitysuorituskykyray tracing020302 automobile design & engineering020206 networking & telecommunicationsGridtiedonsiirtoSystem performanceLTERadio propagationSoftware deploymentverkkoympäristöRay tracing (graphics)5G5Glangattomat verkot
researchProduct

P2PStudio - Monitoring, Controlling and Visualization Tool for Peer-to-Peer Networks Research

2006

Peer-to-Peer Studio has been developed as a monitoring, controlling and visualization tool for peer-to-peer networks. It uses a centralized architecture to gather events from a peer-to-peer network and can be used to visualize network topology and to send different commands to individual peer-to-peer nodes. The tool has been used with Chedar Peer-to-Peer network to study the behavior of different peer-to-peer resource discovery and topology management algorithms and for visualizing the results of NeuroSearch resource discovery algorithm produced by the Peer-to-Peer Realm network simulator. This paper presents the features, the architecture and the protocols of Peer-to-Peer Studio and the ex…

Computer sciencebusiness.industryP2PStudioDistributed computingPeer-to-peerNetwork topologycomputer.software_genreNetwork simulationVisualizationResource (project management)vertaisverkkoArchitecturebusinesscomputervalvontatyökaluStudioNetwork management stationComputer network
researchProduct