Search results for "Networking & Telecommunications"

showing 10 items of 962 documents

Modelling and Analysis of Non-Stationary Multipath Fading Channels with Time-Variant Angles of Arrival

2017

In mobile radio channel modelling, it is generally assumed that the angles of arrival (AOAs) are independent of time. This assumption does in general not agree with real-world channels in which the AOAs vary with the position of a moving receiver. In this paper, we first present a mathematical model for the time-variant AOAs. This model serves as the basis for the development of two non-stationary multipath fading channels models. The statistical properties of both channel models are analysed with emphasis on the time-dependent autocorrelation function (ACF), time-dependent mean Doppler shift, time-dependent Doppler spread, and the Wigner-Ville spectrum. It is shown that these characteristi…

Computer scienceAutocorrelation020302 automobile design & engineering020206 networking & telecommunications02 engineering and technologyDelay spreadsymbols.namesakeFading distribution0203 mechanical engineering0202 electrical engineering electronic engineering information engineeringsymbolsRake receiverFadingStatistical physicsDoppler effectMultipath propagationCommunication channelComputer Science::Information Theory
researchProduct

Efficient linear fusion of partial estimators

2018

Abstract Many signal processing applications require performing statistical inference on large datasets, where computational and/or memory restrictions become an issue. In this big data setting, computing an exact global centralized estimator is often either unfeasible or impractical. Hence, several authors have considered distributed inference approaches, where the data are divided among multiple workers (cores, machines or a combination of both). The computations are then performed in parallel and the resulting partial estimators are finally combined to approximate the intractable global estimator. In this paper, we focus on the scenario where no communication exists among the workers, de…

Computer scienceBayesian probabilityInferenceAsymptotic distribution02 engineering and technology01 natural sciences010104 statistics & probability[INFO.INFO-TS]Computer Science [cs]/Signal and Image ProcessingArtificial Intelligence0202 electrical engineering electronic engineering information engineeringStatistical inferenceFusion rules0101 mathematicsElectrical and Electronic EngineeringComputingMilieux_MISCELLANEOUSMinimum mean square errorApplied MathematicsConstrained optimizationEstimator020206 networking & telecommunicationsComputational Theory and MathematicsSignal ProcessingComputer Vision and Pattern RecognitionStatistics Probability and Uncertainty[SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processingAlgorithmDigital Signal Processing
researchProduct

Adaptive Importance Sampling: The past, the present, and the future

2017

A fundamental problem in signal processing is the estimation of unknown parameters or functions from noisy observations. Important examples include localization of objects in wireless sensor networks [1] and the Internet of Things [2]; multiple source reconstruction from electroencephalograms [3]; estimation of power spectral density for speech enhancement [4]; or inference in genomic signal processing [5]. Within the Bayesian signal processing framework, these problems are addressed by constructing posterior probability distributions of the unknowns. The posteriors combine optimally all of the information about the unknowns in the observations with the information that is present in their …

Computer scienceBayesian probabilityPosterior probabilityInference02 engineering and technologyMachine learningcomputer.software_genre01 natural sciences010104 statistics & probabilityMultidimensional signal processing[INFO.INFO-TS]Computer Science [cs]/Signal and Image ProcessingPrior probability0202 electrical engineering electronic engineering information engineering0101 mathematicsElectrical and Electronic EngineeringComputingMilieux_MISCELLANEOUSbusiness.industryApplied Mathematics020206 networking & telecommunicationsApproximate inferenceSignal ProcessingProbability distributionArtificial intelligencebusinessAlgorithmcomputer[SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processingImportance sampling
researchProduct

The Possibilities of Using BCI Technology in Biomedical Engineering

2018

The paper presents capabilities of building devices dedicated for persons with heavy mobility dysfunction and indicates the role of interfaces connecting brain with computer (Brain Computer Interface, BCI). Impulses coming from closing eyes, clenching teeth, and tongue movement were proposed as optimal in controlling the applications that manage executable systems. A group of electrodes giving a strong electric signal characteristic for the activity were designated and on the basis of conducted research a proposition of a scientific project concerning building of supporting devices for persons with heavy mobility dysfunction was presented.

Computer scienceClenching teeth010401 analytical chemistryBrain Computer Interface020206 networking & telecommunications02 engineering and technologycomputer.file_format01 natural sciences0104 chemical sciencesElectric signalClosing eyesHuman–computer interaction0202 electrical engineering electronic engineering information engineeringEEGExecutableBiomedical engineeringcomputerTongue movementBrain–computer interface
researchProduct

Logical Key Hierarchy for Group Management in Distributed Online Social Networks

2016

Distributed Online Social Networks (DOSNs) have recently been proposed to shift the control over user data from a unique entity to the users of the DOSN themselves. In this paper, we focus our attention on the problem of privacy preserving content sharing to a large group of users of the DOSNs. Several solutions, based on cryptographic techniques, have been recently proposed. The main challenge here is the definition of a scalable and decentralized approach that: i) minimizes the re-encryption of the contents published in a group when the composition of the group changes and ii) enables a fast distribution of the cryptographic keys to all the members (n) of a group, each time a new user is …

Computer scienceComputer Networks and CommunicationsCryptography02 engineering and technologyEncryptionSet (abstract data type)Public-key cryptography0202 electrical engineering electronic engineering information engineeringMathematics (all)Distributed Online Social Network; Privacy; Secure Group communicationFocus (computing)Social networkSettore INF/01 - Informaticabusiness.industryGroup (mathematics)020206 networking & telecommunicationsComputer Science Applications1707 Computer Vision and Pattern RecognitionSecure Group communicationDistributed Online Social NetworkPrivacyScalabilitySignal ProcessingKey (cryptography)020201 artificial intelligence & image processingbusinessSoftwareComputer network
researchProduct

Outage Probability Analysis of User-Centric SBS-Based HCNets Under Hybrid Rician/Rayleigh Fading

2020

To model dense user equipment (UE) distribution in heterogeneous cellular networks (HCNets), the Poisson cluster process (PCP) has emerged as a promising tool. In user-centric HCNets where UEs are distributed according to a PCP around a small base station (SBS), the network performance has been commonly studied in literature under a Rayleigh fading environment assumption. However, such an assumption may not hold in user-centric HCNets given the possible existence of a strong line-of-sight (LOS) link between UEs and BSs due to a relatively short transmission distance. This letter analyzes the performance of user-centric SBS based HCNets by considering that the desired LOS link experiences Ri…

Computer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunicationsData_CODINGANDINFORMATIONTHEORY02 engineering and technologyComputer Science ApplicationsBase stationTransmission (telecommunications)Modeling and SimulationRician fadingComputer Science::Networking and Internet Architecture0202 electrical engineering electronic engineering information engineeringCellular networkNetwork performanceElectrical and Electronic EngineeringAlgorithmComputer Science::Information TheoryRayleigh fadingIEEE Communications Letters
researchProduct

Multimodal Images Classification using Dense SURF, Spectral Information and Support Vector Machine

2019

International audience; The multimodal image classification is a challenging area of image processing which can be used to examine the wall painting in the cultural heritage domain. In such classification, a common space of representation is important. In this paper, we present a new method for multimodal representation learning, by using a pixel-wise feature descriptor named dense Speed Up Robust Features (SURF) combined with the spectral information carried by the pixel. For classification of extracted features we have used support vector machine (SVM). Our database was extracted from acquisition on cultural heritage wall paintings that contain four modalities UV, Visible, IRR and fluores…

Computer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONImage processing02 engineering and technologyImage (mathematics)0202 electrical engineering electronic engineering information engineeringFeature descriptorRepresentation (mathematics)Spectral informationSpeeded up robust features SURFGeneral Environmental SciencePixelbusiness.industry[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]020206 networking & telecommunicationsPattern recognitionSVM classificationSupport vector machineCultural heritageMultimodal imagesCielab spaceDense features[INFO.INFO-TI]Computer Science [cs]/Image Processing [eess.IV]General Earth and Planetary Sciences020201 artificial intelligence & image processingArtificial intelligencebusinessFeature learning
researchProduct

Fuzzy Logic Based Security Trust Evaluation for IoT Environments

2019

In the new technological era called the Internet of Things (IoT), people, machines and objects communicate with each other via the Internet by exchanging information. In this context, trust plays an important role and is considered as a key factor in the success of the IoT services expansion. IoT services and applications use in some cases data concerning the privacy of their users. Consequently, users should trust the entities exchanging their personal information. In this paper, we present a framework that evaluates the security trust level of IoT nodes based on a Fuzzy Logic model using different input parameters such as Device Physical Security, Device Security Level and Device Ownershi…

Computer scienceContext (language use)02 engineering and technology[INFO] Computer Science [cs]TrustComputer securitycomputer.software_genreFuzzy logicFuzzy LogicFactor (programming language)Node (computer science)0202 electrical engineering electronic engineering information engineeringcomputer.programming_languagePrivacy.[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industry020206 networking & telecommunicationsInternet of Things (IoT)SecurityKey (cryptography)020201 artificial intelligence & image processingThe InternetbusinessPersonally identifiable informationcomputerPhysical security2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA)
researchProduct

Towards a Hierarchical Multitask Classification Framework for Cultural Heritage

2018

Digital technologies such as 3D imaging, data analytics and computer vision opened the door to a large set of applications in cultural heritage. Digital acquisition of a cultural assets takes nowadays a couple of seconds thanks to the achievements in 2D and 3D acquisition technologies. However, enriching these cultural assets with labels and relevant metadata is still not fully automatized especially due to their nature and specificities. With the recent publication of several cultural heritage datasets, many researchers are tackling the challenge of effectively classifying and annotating digital heritage. The challenges that are often addressed are related to visual recognition and image c…

Computer scienceData field02 engineering and technology[INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI]Multitask ClassificationCultural diversity0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]Digital preservationComputingMilieux_MISCELLANEOUSContextual image classificationDigital heritagebusiness.industryDeep learningConvolutional Neural Networks[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]020206 networking & telecommunicationsData scienceMetadataCultural heritageDigital preservationCultural heritage020201 artificial intelligence & image processingArtificial intelligencebusinessClassifier (UML)
researchProduct

Efficient cluster-based routing algorithm for body sensor networks

2018

International audience; Body Sensor Networks have gained a lot of research interest lately for the variety of applications they can serve. In such networks where nodes might hold critical information about people's lives, designing efficient routing schemes is very important to guarantee data delivery with the lowest delay and energy consumption. Even though some cluster-based routing schemes were proposed in the literature, none of them offer a complete solution that guarantees energy and delay efficient routing in BSN. In this paper, we propose a robust cluster- based algorithm that increases the routing efficiency through every step of the routing process: cluster formation, cluster head…

Computer scienceDistributed computing010401 analytical chemistryRouting algorithm020206 networking & telecommunications[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technologyEnergy consumption[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation01 natural sciences0104 chemical sciences[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR][INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]0202 electrical engineering electronic engineering information engineering[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Data delivery[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]MATLABcomputerWireless sensor networkCluster basedcomputer.programming_language2018 IEEE Middle East and North Africa Communications Conference (MENACOMM)
researchProduct