Search results for "NETWORKS"
showing 10 items of 3260 documents
Efficient distributed average consensus in wireless sensor networks
2020
International audience; Computing the distributed average consensus in Wireless Sensor Networks (WSNs) is investigated in this article. This problem, which is both natural and important, plays a significant role in various application fields such as mobile agents and fleet vehicle coordination, network synchronization, distributed voting and decision, load balancing of divisible loads in distributed computing network systems, and so on. By and large, the average consensus' objective is to have all nodes in the network converged to the average value of the initial nodes' measurements based only on local nodes' information states. In this paper, we introduce a fully distributed algorithm to a…
2015
Visuo-auditory sensory substitution systems are augmented reality devices that translate a video stream into an audio stream in order to help the blind in daily tasks requiring visuo-spatial information. In this work, we present both a new mobile device and a transcoding method specifically designed to sonify moving objects. Frame differencing is used to extract spatial features from the video stream and two-dimensional spatial information is converted into audio cues using pitch, interaural time difference and interaural level difference. Using numerical methods, we attempt to reconstruct visuo-spatial information based on audio signals generated from various video stimuli. We show that de…
On the feasibility of personal audio systems over a network of distributed loudspeakers
2018
Los sistemas de reproducción de audio personal se ocupan de la creación de zonas sonoras personales dentro de una habitación sin necesidad de utilizar auriculares. Estos sistemas utilizan un conjunto de altavoces y diseñan los filtros necesarios en cada altavoz con el fin de que la señal de audio deseada llegue a cada persona en la sala lo más libre de interferencias posible. Existen propuestas muy interesantes en la literatura que hacen uso de arrays circulares o lineales, pero en este trabajo estudiamos el problema considerando una red de altavoces distribuidos controlados por un conjunto de nodos acústicos, que pueden intercambiar información a través de una red. Enunciamos el modelo de …
Fingerprint Quality Evaluation in a Novel Embedded Authentication System for Mobile Users
2015
The way people access resources, data and services, is radically changing using modern mobile technologies. In this scenario, biometry is a good solution for security issues even if its performance is influenced by the acquired data quality. In this paper, a novel embedded automatic fingerprint authentication system (AFAS) for mobile users is described. The goal of the proposed system is to improve the performance of a standard embedded AFAS in order to enable its employment in mobile devices architectures. The system is focused on the quality evaluation of the raw acquired fingerprint, identifying areas of poor quality. Using this approach, no image enhancement process is needed after the …
A distributed detection and prevention scheme from malicious nodes in vehicular networks
2016
Summary Vehicular environments still remain vulnerable to various potential attacks because of continuous interactions and information exchange between vehicles despite the deployment of authentication techniques by communication standards. Therefore, an authenticated node with a certificate could initiate an attack while complying with implemented protocols. Some mechanisms were proposed to enhance communication technologies, but none of them was able to anticipate nodes' behavior. They also mismanage oscillating vehicles, because they evict them automatically after misbehaving. In this paper, we propose a preventive mechanism, namely, Intrusion Prevention and Detection System (IPDS), able…
Attacks Against the WAP WTLS Protocol
1999
The WAP WTLS protocol was designed to provide privacy, data integrity, and authentication for wireless terminals. The protocol is currently being fielded, and it is expected that the protocol will be contained in millions of devices in a few years.
A Two-Dimensional Autoregressive Model for MIMO Wideband Mobile Radio Channels
2008
In this work, we propose the multichannel two- dimensional (2D) autoregressive (AR) model for multiple-input multiple-output (MIMO) wideband mobile wireless channels. The parameters of the proposed model can be estimated from the real- world measurement data. For this purpose, we suggest using a straightforward extension of the prediction error minimization (PEM) algorithm. We also address the problem of possible instability of the multichannel 2D AR model. A model stabilization procedure based on numerical optimization techniques is proposed. The performance of the multichannel 2D AR model has been evaluated based on the synthetic data generated using two different channel simulators.
Efficient techniques for energy saving in data center networks
2018
Data centers are constructed with a huge number of network devices to support the expanding cloud based services. These devices are used to achieve the highest performance in case of full utilization of the network. However, the peak capacity of the network is rarely reached. Consequently, many devices are set into idle state and cause a huge energy waste leading to a non-proportionality between the network load and the energy consumed. In this paper, we propose a new approach to improve the efficiency of data centers in terms of energy consumption. Our approach exploits the correlation in time of the inter-node communication traffic and some topological features to maximize energy saving w…
Construction of Disjoint Virtual Backbones for Wireless Sensor Networks
2020
A wireless sensor network is a wireless network of sensors aimed at monitoring physical events. It has ingratiated itself into almost all areas of human endeavors. Data dissemination in these networks is quite challenging and is generally accomplished by flooding. But flooding introduces broadcast storm problem due from implosion and overlap. To overcome this, topology management can prescribe a virtual backbone network to which routing is confined. In this paper we propose an algorithm that constructs multiple disjoint virtual backbone networks, using only nodes' locations. The disjointedness makes routing more robust and the network exploitation energy efficient. Simulations show our algo…
Microbial Diversity in the Midguts of Field and Lab-Reared Populations of the European Corn Borer Ostrinia nubilalis
2011
Background: Insects are associated with microorganisms that contribute to the digestion and processing of nutrients. The European Corn Borer (ECB) is a moth present world-wide, causing severe economical damage as a pest on corn and other crops. In the present work, we give a detailed view of the complexity of the microorganisms forming the ECB midgut microbiota with the objective of comparing the biodiversity of the midgut-associated microbiota and explore their potential as a source of genes and enzymes with biotechnological applications. Methodological/Principal Findings: A high-throughput sequencing approach has been used to identify bacterial species, genes and metabolic pathways, parti…