Search results for "Networking & Telecommunications"
showing 10 items of 962 documents
Energy Harvesting-Aware Backoff Algorithms for Distributed Device-to-Device Communication
2016
Due to limited energy capacity in mobile devices, energy harvesting is regarded as a promising technology for lifetime extension in device-to-device (D2D) communication. However, medium access control (MAC) protocols designed for D2D communication intrinsically do not consider the existence of harvested energy. In this paper we study four backoff (BO) algorithms, among which one algorithm is proposed to enhance the BO selection based on energy harvesting rate and residual energy of devices. Simulations are performed in order to assess how the proposed algorithm can extend the lifetime of a D2D communication network as well as to provide fair channel access opportunities among devices.
Cadmium mass measurements between the neutron shell closures at N=50 and 82
2010
International audience; The mass values of the neutron-deficient cadmium isotopes 99−109Cd and of the neutronrich isotopes 114,120,122−124,126,128Cd have been measured using ISOLTRAP. The behavior of the separation energies of the cadmium isotopes from N = 50 to 82 is discussed.
Automata and forbidden words
1998
Abstract Let L ( M ) be the (factorial) language avoiding a given anti-factorial language M . We design an automaton accepting L ( M ) and built from the language M . The construction is effective if M is finite. If M is the set of minimal forbidden words of a single word ν, the automaton turns out to be the factor automaton of ν (the minimal automaton accepting the set of factors of ν). We also give an algorithm that builds the trie of M from the factor automaton of a single word. It yields a nontrivial upper bound on the number of minimal forbidden words of a word.
A Survey on Proxy Mobile IPv6 Handover
2016
[EN] As wireless technologies have been improving in recent years, a mobility management mechanism is required to provide seamless and ubiquitous mobility for end users who are roaming among points of attachment in wireless networks. Thus, Mobile IPv6 was developed by the Internet Engineering Task Force (IETF) to support the mobility service. However, Mobile IPv6 is unable to fulfill the requirements of real-time applications, such as video streaming service and voice over IP service, due to its high handover (HO) latency. To address this problem, Proxy Mobile IPv6 (PMIPv6) has been introduced by the IETF. In PMIPv6, which is a network-based approach, the serving network controls mobility m…
Edge-Based Missing Data Imputation in Large-Scale Environments
2021
Smart cities leverage large amounts of data acquired in the urban environment in the context of decision support tools. These tools enable monitoring the environment to improve the quality of services offered to citizens. The increasing diffusion of personal Internet of things devices capable of sensing the physical environment allows for low-cost solutions to acquire a large amount of information within the urban environment. On the one hand, the use of mobile and intermittent sensors implies new scenarios of large-scale data analysis
Comprehensive Experimental Analysis of Handcrafted Descriptors for Face Recognition
2018
Over the past few decades, LBP descriptor, which shown its high robustness in extracting discriminative features from an image, has been successfully applied in diverse challenging computer vision applications including face recognition. The efficiency and usability of the LBP operator and its success in various real world applications has inspired the development of much new powerful LBP variants. Indeed, after the appearance of the LBP operator, several renowned extensions and modifications of LBP have been proposed in the literature to the point that it can be difficult to recognize their respective LBP-related strategies, strengths and weaknesses according to a given application, and th…
Energy Efficient Optimization for Computation Offloading in Fog Computing System
2017
In this paper, we investigate the energy efficient computation offloading scheme in a multi-user fog computing system. We consider the users need to make the decision on whether to offload the tasks to the fog node nearby, based on the energy consumption and delay constraint. In particular, we utilize queuing theory to bring a thorough study on the energy consumption and execution delay of the offloading process. Two queuing models are applied respectively to model the execution processes at the mobile device (MD) and fog node. Based on the theoretical analysis, an energy efficient optimization problem is formulated with the objective to minimize the energy consumption subjects to execution…
Energy-Efficient Resource Optimization with Wireless Power Transfer for Secure NOMA Systems
2018
In this paper, we investigate resource allocation algorithm design for secure non-orthogonal multiple access (NOMA) systems empowered by wireless power transfer. With the consideration of an existing eavesdropper, the objective is to obtain secure and energy efficient transmission among multiple users by optimizing time, power and subchannel allocation. Moreover, we also take into consideration for the practical case that the statistics of the channel state information of the eavesdropper is not available. In order to address the optimization problem and its high computational complexity, we propose an iterative algorithm with guaranteed convergence to deliver a suboptimal solution for gene…
Kernel-Based Inference of Functions Over Graphs
2018
Abstract The study of networks has witnessed an explosive growth over the past decades with several ground-breaking methods introduced. A particularly interesting—and prevalent in several fields of study—problem is that of inferring a function defined over the nodes of a network. This work presents a versatile kernel-based framework for tackling this inference problem that naturally subsumes and generalizes the reconstruction approaches put forth recently for the signal processing by the community studying graphs. Both the static and the dynamic settings are considered along with effective modeling approaches for addressing real-world problems. The analytical discussion herein is complement…
Integration of WiFi ToF Positioning System in the Open, Flexible and Adaptive WiSHFUL Architecture
2017
We integrate a prototypeWiFi Time-of-Flight (ToF) ranging and positioning system in the WiSHFUL software platforms and hardware radios for experimental prototyping. Users have access to ToF measurements as well as computed positions through unified programming interfaces that make possible to investigate innovative positioning and networking solutions. TRUE pub