Search results for "Erk"
showing 10 items of 2599 documents
Analysis and Evaluation of Adaptive RSSI-based Ranging in Outdoor Wireless Sensor Networks
2019
Estimating inter-node distances based on received radio signal strength (RSSI) is the foundation of RSSI-based outdoor localization in wireless sensor networks (WSNs). However, the accuracy of RSSI-based ranging depends on environmental and weather conditions. Therefore, it is important that RSSI-based ranging adapts to prevailing conditions to improve its range and location accuracy. This paper analyzes and evaluates RSSI-based ranging and adaptive techniques in outdoor WSNs to improve the range quality. The findings highlight the effects of path loss exponent (PLE) estimation error and temperature change on RSSI-based ranging. Consequently, we analyze techniques for mitigating these detri…
On optimal deployment of low power nodes for high frequency next generation wireless systems
2018
Recent development of wireless communication systems and standards is characterized by constant increase of allocated spectrum resources. Since lower frequency ranges cannot provide sufficient amount of bandwidth, new bands are allocated at higher frequencies, for which operators resort to deploy more base stations to ensure the same coverage and to utilize more efficiently higher frequencies spectrum. Striving for deployment flexibility, mobile operators can consider deploying low power nodes that could be either small cells connected via the wired backhaul or relays that utilize the same spectrum and the wireless access technology. However, even though low power nodes provide a greater fl…
Incentive Mechanism for Resource Allocation in Wireless Virtualized Networks with Multiple Infrastructure Providers
2020
To accommodate the explosively growing demands for mobile traffic service, wireless network virtualization is proposed as the main evolution towards 5G. In this work, a novel contract theoretic incentive mechanism is proposed to study how to manage the resources and provide services to the users in the wireless virtualized networks. We consider that the infrastructure providers (InPs) own the physical networks and the mobile virtual network operator (MVNO) has the service information of the users and needs to lease the physical radio resources for providing services. In particular, we utilize the contract theoretic approach to model the resource trading process between the MVNO and multiple…
Does the law matter? An empirical study on the accessibility of Finnish higher education institutions’ web pages
2022
AbstractInformation and communication technology (ICT) has made higher education available to many students in a new way. The role of online learning in higher education institutions (HEIs) has grown to an unprecedented scale due to the COVID-19 pandemic. The diversity of higher education students has increased, and accessible solutions are needed. New European and national regulations support these trends. The research reported in this paper was conducted in Finland, which is one of the leading European countries in terms of high technology and digitalisation. The aim of this research is to explore the accessibility of all Finnish HEIs’ (N = 38) landing pages based on Web Content Accessibi…
Cryptanalysis of Knapsack Cipher Using Ant Colony Optimization
2018
Ant Colony Optimization is a search metaheuristic inspired by the behavior of real ant colonies and shown their effectiveness, robustness to solve a wide variety of complex problems. In this paper, we present a novel Ant Colony Optimization (ACO) based attack for cryptanalysis of knapsack cipher algorithm. A Cipher-text only attack is used to discover the plaintext from the cipher-text. Moreover, our approach allows us to break knapsack cryptosystem in a minimum search space when compared with other techniques. Experimental results prove that ACO can be used as an effective tool to attack knapsack cipher.
Artificial Intelligence in Protecting Smart Building’s Cloud Service Infrastructure from Cyberattacks
2020
Gathering and utilizing stored data is gaining popularity and has become a crucial component of smart building infrastructure. The data collected can be stored, for example, into private, public, or hybrid cloud service infrastructure or distributed service by utilizing data platforms. The stored data can be used when implementing services, such as building automation (BAS). Cloud services, IoT sensors, and data platforms can face several kinds of cybersecurity attack vectors such as adversarial, AI-based, DoS/DDoS, insider attacks. If a perpetrator can penetrate the defenses of a data platform, she can cause significant harm to the system. For example, the perpetrator can disrupt a buildin…
Molecular dynamics simulations in hybrid particle-continuum schemes: Pitfalls and caveats
2017
Heterogeneous multiscale methods (HMM) combine molecular accuracy of particle-based simulations with the computational efficiency of continuum descriptions to model flow in soft matter liquids. In these schemes, molecular simulations typically pose a computational bottleneck, which we investigate in detail in this study. We find that it is preferable to simulate many small systems as opposed to a few large systems, and that a choice of a simple isokinetic thermostat is typically sufficient while thermostats such as Lowe-Andersen allow for simulations at elevated viscosity. We discuss suitable choices for time steps and finite-size effects which arise in the limit of very small simulation bo…
Reducing Power Consumption of Wireless Networks Through Collaborative DMC Mobile Clusters
2017
Reducing the energy consumption of the wireless network is significantly important to the economic and ecological sustainability of the ICT industry, as high energy consumption may limit the performance of wireless networks and is one of the main network costs. To solve energy consumption problem, especially on the terminal side, a scheme known as distributed mobile cloud (DMC) is considered to be a potential solution. Multiple mobile terminals (MTs) can cooperative to take advantage of good quality links among the MTs to save energy when receiving from the Base Station (BS). In this paper, we aim to find the optimal transmit power to further reduce the energy consumption of DMC. From simul…
Dual Connectivity in Non-Stand Alone Deployment mode of 5G in Manhattan Environment
2020
| openaire: EC/H2020/815191/EU//PriMO-5G The main target of this paper is to analyze the performance of an outdoor user in a dense micro cellular Manhattan grid environment using a ray launching simulation tool. The radio propagation simulations are performed using a Shoot and Bouncing Ray (SBR) method. The network performance is analyzed at three different frequencies i.e. 1.8 GHz, 3.5 GHz, and 28 GHz. Additionally, the benefits of combining LTE and potential 5G frequency bands by using feature of Dual Connectivity (DC) in an outdoor scenario has been highlighted. The considered performance metrics are received signal level, SINR, application throughput. The acquired simulation results fro…
P2PStudio - Monitoring, Controlling and Visualization Tool for Peer-to-Peer Networks Research
2006
Peer-to-Peer Studio has been developed as a monitoring, controlling and visualization tool for peer-to-peer networks. It uses a centralized architecture to gather events from a peer-to-peer network and can be used to visualize network topology and to send different commands to individual peer-to-peer nodes. The tool has been used with Chedar Peer-to-Peer network to study the behavior of different peer-to-peer resource discovery and topology management algorithms and for visualizing the results of NeuroSearch resource discovery algorithm produced by the Peer-to-Peer Realm network simulator. This paper presents the features, the architecture and the protocols of Peer-to-Peer Studio and the ex…