Search results for "Modeling and simulation"

showing 10 items of 1561 documents

Power allocation for two-cell two-user joint transmission

2012

In this paper, we develop a power allocation scheme for the downlink of a two-cell two-user joint transmission system. The objective is to maximize the sum rate under per-cell power constraints. We study a worst case scenario where the carrier phases between the two base stations are un-synchronized, so that joint transmission must be performed without precoding. The derived power allocation scheme is remarkably simple, i.e., each cell transmits with full power to only one user. Note that joint transmission is still possible, when two cells select the same user for data transmission. Moreover, we prove that, in this scenario, the joint transmission case happens with higher probability when …

Computer scienceReal-time computingPower allocation02 engineering and technologyData_CODINGANDINFORMATIONTHEORYPrecodingPower budgetTelecomunicacióBase station0203 mechanical engineeringTelecommunications link0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringComunicació i tecnologiabusiness.industryCommunication Systems020302 automobile design & engineering020206 networking & telecommunicationsTransmission systemTransmitter power outputComputer Science Applicationscoordinated multi-point (CoMP)Transmission (telecommunications)Modeling and SimulationSignal Processingimperfect synchronizationbusinessjoint transmissionComputer networkData transmission
researchProduct

An asynchronous covert channel using spam

2012

AbstractCurrent Internet e-mail facilities are built onto the foundation of standard rules and protocols, which usually allow a considerable amount of “freedom” to their designers. Each of these standards has been defined based on a number of vendor specific implementations, in order to provide common inter-working procedures for cross-vendor communication. Thus, a lot of optional and redundant information is being exchanged during e-mail sessions, which is available to implement versatile covert channel mechanisms.This work exploits this possibility by presenting a simple but effective steganographic scheme that can be used to deploy robust secret communication through spam e-mails. This s…

Computer scienceRetransmissionCovert channelAsynchronous covert channelData lossComputer securitycomputer.software_genreSecure communicationModelling and SimulationCommunication sourceRaptor codeStegosystemSpam steganographybusiness.industryE-mail steganographyComputational MathematicsComputational Theory and MathematicsAsynchronous communicationRaptor codesSecure communicationModeling and SimulationKey (cryptography)businessAsynchronous covert channel; E-mail steganography; Raptor codes; Secure communication; Spam steganography; Stegosystem; Modeling and Simulation; Computational Theory and Mathematics; Computational MathematicscomputerComputer networkComputers & Mathematics with Applications
researchProduct

Efficient anomaly detection on sampled data streams with contaminated phase I data

2020

International audience; Control chart algorithms aim to monitor a process over time. This process consists of two phases. Phase I, also called the learning phase, estimates the normal process parameters, then in Phase II, anomalies are detected. However, the learning phase itself can contain contaminated data such as outliers. If left undetected, they can jeopardize the accuracy of the whole chart by affecting the computed parameters, which leads to faulty classifications and defective data analysis results. This problem becomes more severe when the analysis is done on a sample of the data rather than the whole data. To avoid such a situation, Phase I quality must be guaranteed. The purpose…

Computer scienceSample (material)0211 other engineering and technologies02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]01 natural sciences[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing010104 statistics & probabilitysymbols.namesake[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]ChartControl chartEWMA chart0101 mathematics021103 operations researchData stream miningbusiness.industryPattern recognition[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]OutliersymbolsAnomaly detection[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Artificial intelligence[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessGibbs sampling
researchProduct

Corrigendum to “Intelligent agents for feature modelling in computer aided design” [J. Comput. Des. Eng. (2018) 19–40]

2018

Computer sciencebusiness.industryComputational Mechanics02 engineering and technologycomputer.software_genreComputer Graphics and Computer-Aided DesignHuman-Computer InteractionComputational MathematicsIntelligent agent020303 mechanical engineering & transports0203 mechanical engineeringFeature (computer vision)Modeling and Simulation0202 electrical engineering electronic engineering information engineeringComputer Aided Design020201 artificial intelligence & image processingArtificial intelligencebusinessEngineering (miscellaneous)computerJournal of Computational Design and Engineering
researchProduct

Advances in vehicle routing and logistics optimization

2019

nessuno

Computer sciencebusiness.industryModeling and SimulationVehicle routing problemIn vehicleTransportationManagement Science and Operations ResearchRouting (electronic design automation)businessvehicle routingComputer networkEURO Journal on Transportation and Logistics
researchProduct

A multiblock PLS-based algorithm applied to a causal model in marketing

2012

Computer sciencebusiness.industryModeling and Simulationmedia_common.quotation_subjectLoyaltyManagement Science and Operations ResearchMarketingBusiness-to-businessbusinessGeneral Business Management and AccountingLoyalty business modelCausal modelmedia_commonApplied Stochastic Models in Business and Industry
researchProduct

A new autonomous data transmission reduction method for wireless sensors networks

2018

International audience; The inherent limitation in energy resources and computational power for sensor nodes in a Wireless Sensor Network, poses the challenge of extending the lifetime of these networks. Since radio communication is the dominant energy consuming activity, most presented approaches focused on reducing the number of data transmitted to the central workstation. This can be achieved by deploying both on the workstation and the sensor node a synchronized prediction model capable of forecasting future values. Thus, enabling the sensor node to transmit only the values that surpasses a predefined error threshold. This mechanism offers a decrease in the cost of transmission energy f…

Computer sciencebusiness.industryReal-time computing020206 networking & telecommunications[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technology[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation7. Clean energy[INFO.INFO-IU]Computer Science [cs]/Ubiquitous ComputingReduction (complexity)[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]Transmission (telecommunications)[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]020204 information systemsSensor node0202 electrical engineering electronic engineering information engineeringWireless[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessWireless sensor networkEnergy (signal processing)Data transmissionData reduction2018 IEEE Middle East and North Africa Communications Conference (MENACOMM)
researchProduct

Hidden attractors on one path : Glukhovsky-Dolzhansky, Lorenz, and Rabinovich systems

2017

In this report, by the numerical continuation method we visualize and connect hidden chaotic sets in the Glukhovsky-Dolzhansky, Lorenz and Rabinovich systems using a certain path in the parameter space of a Lorenz-like system.

Computer sciencechaosChaoticFOS: Physical sciencesPhysics::Data Analysis; Statistics and ProbabilityParameter space01 natural sciences010305 fluids & plasmasRabinovich systemLorenz system0103 physical sciencesAttractorGlukhovsky–Dolzhansky systemApplied mathematics010301 acousticsEngineering (miscellaneous)kaaosteoriaApplied Mathematicsta111Lorenz-like systemNonlinear Sciences - Chaotic DynamicsNonlinear Sciences::Chaotic DynamicsNumerical continuationModeling and SimulationPath (graph theory)numeerinen analyysiChaotic Dynamics (nlin.CD)hidden attractorInternational Journal of Bifurcation and Chaos
researchProduct

Review on Modeling and Control of Flexible Link Manipulators

2020

This paper presents a review of dynamic modeling techniques and various control schemes to control flexible link manipulators (FLMs) that were studied in recent literature. The advantages and complexities associated with the FLMs are discussed briefly. A survey of the reported studies is carried out based on the method used for modeling link flexibility and obtaining equations of motion of the FLMs. The control techniques are reviewed by classifying them into two main categories: model-based and model-free control schemes. The merits and limitations of different modeling and control methods are highlighted.

Computer sciencedeflectionControl (management)Control engineeringlcsh:QA75.5-76.95Computer Science ApplicationsPeer reviewvibrationsVDP::Teknologi: 500flexibilitydynamic modelingControl and Systems EngineeringModeling and Simulationelasticitylcsh:Electronic computers. Computer scienceLink (knot theory)controlflexible link manipulatorSoftwareModeling, Identification and Control: A Norwegian Research Bulletin
researchProduct

Efficient Hybrid Emergency Aware MAC Protocol for Wireless Body Sensor Networks

2018

International audience; In Body Sensor Networks (BSNs), two types of events should be addressed: periodic and emergency events. Traffic rate is usually low during periodic observation, and becomes very high upon emergency. One of the main and challenging requirements of BSNs is to design Medium Access Control (MAC) protocols that guarantee immediate and reliable transmission of data in emergency situations, while maintaining high energy efficiency in non-emergency conditions. In this paper, we propose a new emergency aware hybrid DTDMA/DS-CDMA protocol that can accommodate BSN traffic variations by addressing emergency and periodic traffic requirements. It takes advantage of the high delay …

Computer sciencedelayAccess control02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]DTDMAlcsh:Chemical technology01 natural sciencesBiochemistryArticleAnalytical Chemistry[INFO.INFO-IU]Computer Science [cs]/Ubiquitous ComputingBSN[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]energy consumption0202 electrical engineering electronic engineering information engineeringWirelesslcsh:TP1-1185Electrical and Electronic EngineeringInstrumentationMACbusiness.industryNetwork packet010401 analytical chemistryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunicationsEnergy consumption[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationAtomic and Molecular Physics and Optics0104 chemical sciences[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]packet drop[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessWireless sensor networkEfficient energy useComputer networkDS-CDMAOPNETSensors
researchProduct