Search results for "Network"

showing 10 items of 7718 documents

Bluetooth throughput measures for cardiomyocyte extracellular signal telemetry

2006

In this contribution the suitability of the Bluetooth transmission system is analyzed for its application to the realtime transmission of cardiac signals captured by micro-electrode array sensors. The required data rates for this type of cardiac signals are calculated to be 180 kbps for every single micro- electrode. The mean throughput value varies with the selected packet size: for packet sizes less than 1000 bytes the mean throughput is smaller than 180 kbps while for packet sizes greater than 1000 bytes the mean throughput saturates at around 230 kbps. This mean throughput value is guaranteed for over 80% of the time. Compression algorithms running on the sensor array allow the reductio…

business.industryComputer scienceNetwork packetComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSTransmission systemlaw.inventionBluetoothTransmission (telecommunications)Sensor arraylawEmbedded systembusinessThroughput (business)Computer hardwareData transmissionData compression2006 3rd International Symposium on Wireless Communication Systems
researchProduct

A simulation study of load balancing algorithms in cellular packet networks

2001

This paper provides a comparative performance evaluation of various load balancing schemes in cellular packet networks. With respect to traditional schemes, that measure each cell load in terms of number of admitted calls, our schemes use supplementary packet level information, expressed in terms of effective resource consumption of each individual call when retransmission mechanisms are employed. The simulation model adopted is based on a toroidal cellular network topology, to avoid border effects affecting the numerical results.

business.industryComputer scienceNetwork packetDistributed computingRetransmissionCellular networkLoad balancing (computing)Resource consumptionbusinessComputer network
researchProduct

A Self-Powered Long-range Wireless IoT Device based on LoRaWAN

2020

In this article, we propose a self-powered long-range wireless Internet-of-Things (IoT) device based on Long Range Wide Area Network (LoRaWAN) with various sensing capabilities. The nodes are designed based on ambient energy harvesting in such a way that these are self-sustainable throughout the components’ lifespan. Also, these nodes can be deployed on a large scale and are maintenance-free. In addition, these nodes can be deployed in remote places where the accessibility is limited, and maintenance is difficult. The wireless sensor nodes can be deployed both in indoor and outdoor environments with sufficient light levels for the solar panel, such as indoor lights in the indoor environment…

business.industryComputer scienceNode (networking)Range (aeronautics)Real-time computingWirelessbusinessInternet of ThingsEnergy harvestingAir quality indexWireless sensor networkPower (physics)2020 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS)
researchProduct

Face Processing on Low-Power Devices

2009

The research on embedded vision-based techniques is considered nowadays as one of the most interesting matters of computer vision. In this work we address the scenario in which a real-time face processing system is needed to monitor people walking through some locations. Some face detection (e.g., Viola-Jones face detector) and face recognition (e.g., eigenfaces) approaches have reached a certain level of maturity, so we focused on the development of such techniques on embedded systems taking into account both hardware and software constraints. Our goal is to detect the presence of some known individuals inside some sensitive areas producing a compact description of the observed people. Cap…

business.industryComputer scienceNode (networking)Real-time computingFacial recognition systemSoftwareEigenfaceEmbedded systemScalabilityResource allocation (computer)businessFace detectionWireless sensor networkface recognition embedded devices
researchProduct

FoSBaS: A bi-directional secrecy and collusion resilience key management scheme for BANs

2012

Body Area Network (BAN) consists of various types of small physiological sensors, transmission modules and low computational components and can thus form an E-health solution for continuous all-day and any-place health monitoring. To protect confidentiality of collected data, a shared group key is usually deployed in a BAN, and consequently a secure communication group is generated. In this paper, we propose a bi-directional security and collusion resilience key management scheme for BAN, referred to as FoSBaS. Detailed analysis shows that the scheme can provide both forward security and backward security and resist against collusion attacks. Furthermore, the FoSBaS is implemented on a Sun …

business.industryComputer scienceNode (networking)TestbedCryptographyEnergy consumptionSun SPOTComputer securitycomputer.software_genreSecure communicationForward secrecyBody area networkSecrecyResilience (network)businessKey managementcomputerWireless sensor networkGroup keyComputer network2012 IEEE Wireless Communications and Networking Conference (WCNC)
researchProduct

SCARKER: A sensor capture resistance and key refreshing scheme for mobile WSNs

2011

How to discover a captured node and to resist node capture attack is a challenging task in Wireless Sensor Networks (WSNs). In this paper, we propose a node capture resistance and key refreshing scheme for mobile WSNs which is based on the Chinese remainder theorem. The scheme is able of providing forward secrecy, backward secrecy and collusion resistance for diminishing the effects of capture attacks. By implementing our scheme on a Sun SPOT based sensor network testbed, we demonstrate that the time for updating a new group key varies from 56 ms to 546 ms and the energy consumption is limited to 16.5–225 mJ, depending on the length of secret keys and the number of sensors in a group.

business.industryComputer scienceNode (networking)TestbedMobile computingEnergy consumptionSun SPOTKey distribution in wireless sensor networksForward secrecyMobile telephonybusinessWireless sensor networkComputer networkGroup key2011 IEEE 36th Conference on Local Computer Networks
researchProduct

A damage identification procedure based on Hilbert transform: Experimental validation

2010

SUMMARY This paper aims at validating the feasibility of an identification procedure, based on the use of the Hilbert transform, by means of experimental tests for shear-type multi-degree-of-freedom systems. Particularly, a three-degree-of-freedom frame will be studied either numerically or experimentally by means of a laboratory scale model built at the laboratory of the Structural, Aerospace and Geotechnical Engineering Department (DISAG) of University of Palermo. Several damage scenarios have been considered to prove the effectiveness of the procedure. Moreover, the experimental tests have been conducted by considering two different input loads: pulse forces, simulated by means of an ins…

business.industryComputer scienceNoise (signal processing)Frame (networking)SIGNAL (programming language)incipient damageBuilding and ConstructionStructural engineeringHilbert transformIdentification (information)symbols.namesakeData acquisitionMechanics of MaterialssymbolsEarthquake shaking tableMinificationHilbert transformSettore ICAR/08 - Scienza Delle CostruzionibusinessAlgorithmanalytical signalCivil and Structural EngineeringStructural Control and Health Monitoring
researchProduct

Conceptual Ontological Object Knowledge Base and Language

2008

This paper deals with AI in aspect of knowledge acquisition and ontology base structure. The core of the system was designed in an object model to optimize it for further processing. Direct concept linking was used to assure fast semantic network processing. Predefined attributes used in the core minimize the number of basic connections within the ontology and help in inference. The system is assumed to generate questions and to specify the knowledge. The AI system defined in this way opens a possibility for better understanding of such basic human mind mechanisms as learning or analyzing.

business.industryComputer scienceOpen Knowledge Base Connectivitycomputer.software_genreKnowledge acquisitionSemantic networkKnowledge-based systemsKnowledge extractionKnowledge baseHuman–computer interactionOntologyDomain knowledgeArtificial intelligencebusinesscomputerNatural language processing
researchProduct

Automatic Detection of Infantile Hemangioma using Convolutional Neural Network Approach

2020

Infantile hemangioma is the most common tumor of childhood. This study proposes an automatic detection as a preliminary step for a further accurate monitoring tool to evaluate the clinical status of hemangioma. For the detection of hemangioma pixels, a convolutional neural network (CNN) was trained on patches of two classes (hemangioma and nonhemangioma) from the train dataset, and then it was used to classify all the pixels of the region of interest from the test dataset. In order to evaluate the results of segmentation obtained with CNN, the region of interest of the test dataset was also segmented using two classical methods of segmentation: fuzzy c-means clustering (FCM) and segmentatio…

business.industryComputer sciencePattern recognitionImage segmentationmedicine.diseaseConvolutional neural networkOtsu's methodHemangiomasymbols.namesakeRegion of interestHistogramsymbolsmedicineSegmentationArtificial intelligencebusinessCluster analysis2020 International Conference on e-Health and Bioengineering (EHB)
researchProduct

Probabilistic Transition-Based Approach for Detecting Application-Layer DDoS Attacks in Encrypted Software-Defined Networks

2017

With the emergence of cloud computing, many attacks, including Distributed Denial-of-Service (DDoS) attacks, have changed their direction towards cloud environment. In particular, DDoS attacks have changed in scale, methods, and targets and become more complex by using advantages provided by cloud computing. Modern cloud computing environments can benefit from moving towards Software-Defined Networking (SDN) technology, which allows network engineers and administrators to respond quickly to the changing business requirements. In this paper, we propose an approach for detecting application-layer DDoS attacks in cloud environment with SDN. The algorithm is applied to statistics extracted from…

business.industryComputer scienceProbabilistic logic020206 networking & telecommunicationsDenial-of-service attackCloud computing02 engineering and technologyEncryptionApplication layeranomaly detectionDDoS attackSDNprobabilistic model0202 electrical engineering electronic engineering information engineeringbehavior pattern020201 artificial intelligence & image processingAnomaly detectionCluster analysisbusinessSoftware-defined networkingComputer networkclustering
researchProduct