Search results for "Networking & Telecommunications"

showing 10 items of 962 documents

Efficient Hybrid Emergency Aware MAC Protocol for Wireless Body Sensor Networks

2018

International audience; In Body Sensor Networks (BSNs), two types of events should be addressed: periodic and emergency events. Traffic rate is usually low during periodic observation, and becomes very high upon emergency. One of the main and challenging requirements of BSNs is to design Medium Access Control (MAC) protocols that guarantee immediate and reliable transmission of data in emergency situations, while maintaining high energy efficiency in non-emergency conditions. In this paper, we propose a new emergency aware hybrid DTDMA/DS-CDMA protocol that can accommodate BSN traffic variations by addressing emergency and periodic traffic requirements. It takes advantage of the high delay …

Computer sciencedelayAccess control02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]DTDMAlcsh:Chemical technology01 natural sciencesBiochemistryArticleAnalytical Chemistry[INFO.INFO-IU]Computer Science [cs]/Ubiquitous ComputingBSN[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]energy consumption0202 electrical engineering electronic engineering information engineeringWirelesslcsh:TP1-1185Electrical and Electronic EngineeringInstrumentationMACbusiness.industryNetwork packet010401 analytical chemistryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunicationsEnergy consumption[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationAtomic and Molecular Physics and Optics0104 chemical sciences[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]packet drop[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessWireless sensor networkEfficient energy useComputer networkDS-CDMAOPNETSensors
researchProduct

Knowledge-based verification of concatenative programming patterns inspired by natural language for resource-constrained embedded devices

2020

We propose a methodology to verify applications developed following programming patterns inspired by natural language that interact with physical environments and run on resource-constrained interconnected devices. Natural language patterns allow for the reduction of intermediate abstraction layers to map physical domain concepts into executable code avoiding the recourse to ontologies, which would need to be shared, kept up to date, and synchronized across a set of devices. Moreover, the computational paradigm we use for effective distributed execution of symbolic code on resource-constrained devices encourages the adoption of such patterns. The methodology is supported by a rule-based sys…

Computer scienceinternet of thing02 engineering and technologycomputer.software_genrelcsh:Chemical technologyBiochemistryOracleArticleAnalytical ChemistryDomain (software engineering)Softwarewireless sensor network0202 electrical engineering electronic engineering information engineeringlcsh:TP1-1185Electrical and Electronic Engineeringdistributed programmingwireless sensor networksEmbedded systemInstrumentationAbstraction (linguistics)concatenative languagessymbolic programmingSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniSymbolic programmingProgramming languagebusiness.industryRuntime verification020206 networking & telecommunications020207 software engineeringcomputer.file_formatforthinternet of thingsAtomic and Molecular Physics and Opticsconcatenative languageProgramming patternsembedded systemsExecutablebusinesscomputerNatural language
researchProduct

Evaluation of Ensemble Machine Learning Methods in Mobile Threat Detection

2017

The rapid growing trend of mobile devices continues to soar causing massive increase in cyber security threats. Most pervasive threats include ransom-ware, banking malware, premium SMS fraud. The solitary hackers use tailored techniques to avoid detection by the traditional antivirus. The emerging need is to detect these threats by any flow-based network solution. Therefore, we propose and evaluate a network based model which uses ensemble Machine Learning (ML) methods in order to identify the mobile threats, by analyzing the network flows of the malware communication. The ensemble ML methods not only protect over-fitting of the model but also cope with the issues related to the changing be…

Computer scienceintrusion detection0211 other engineering and technologiesDecision tree02 engineering and technologycomputer.software_genreComputer securitymobiililaitteet0202 electrical engineering electronic engineering information engineeringsupervised machine learningSoarAndroid (operating system)tietoturvata113021110 strategic defence & security studiesta213business.industrymobile threatsensemble methods020206 networking & telecommunicationsFlow networkEnsemble learninganomaly detectionmachine learningkoneoppiminenMalwareThe InternetbusinesscomputerMobile device
researchProduct

Assessment of Deep Learning Methodology for Self-Organizing 5G Networks

2019

In this paper, we present an auto-encoder-based machine learning framework for self organizing networks (SON). Traditional machine learning approaches, for example, K Nearest Neighbor, lack the ability to be precisely predictive. Therefore, they can not be extended for sequential data in the true sense because they require a batch of data to be trained on. In this work, we explore artificial neural network-based approaches like the autoencoders (AE) and propose a framework. The proposed framework provides an advantage over traditional machine learning approaches in terms of accuracy and the capability to be extended with other methods. The paper provides an assessment of the application of …

Computer scienceintrusion detection5G-tekniikka02 engineering and technologyIntrusion detection systemself-organizing networks (SON)Machine learningcomputer.software_genrelcsh:Technologyk-nearest neighbors algorithmself-organizing networkslcsh:Chemistryautoencoder (AE)deep learning (DL)mobility load balancing0202 electrical engineering electronic engineering information engineeringGeneral Materials ScienceInstrumentationlcsh:QH301-705.5Fluid Flow and Transfer ProcessesautoencoderArtificial neural networkbusiness.industrylcsh:Tmobility load balancing (MLB)Process Chemistry and TechnologyDeep learningGeneral Engineeringdeep learning020206 networking & telecommunicationsSelf-organizing networkLoad balancing (computing)021001 nanoscience & nanotechnologyAutoencoderlcsh:QC1-999Computer Science Applicationscell outage detectionlcsh:Biology (General)lcsh:QD1-999lcsh:TA1-2040Cellular networkArtificial intelligence0210 nano-technologybusinesslcsh:Engineering (General). Civil engineering (General)computerlcsh:Physics5G
researchProduct

Fast Implementation of Double-coupled Nonnegative Canonical Polyadic Decomposition

2019

Real-world data exhibiting high order/dimensionality and various couplings are linked to each other since they share some common characteristics. Coupled tensor decomposition has become a popular technique for group analysis in recent years, especially for simultaneous analysis of multi-block tensor data with common information. To address the multiblock tensor data, we propose a fast double-coupled nonnegative Canonical Polyadic Decomposition (FDC-NCPD) algorithm in this study, based on the linked CP tensor decomposition (LCPTD) model and fast Hierarchical Alternating Least Squares (Fast-HALS) algorithm. The proposed FDCNCPD algorithm enables simultaneous extraction of common components, i…

Computer sciencelinked CP tensor decomposition (LCPTD)02 engineering and technologySignal-to-noise ratiotensor decompositionConvergence (routing)0202 electrical engineering electronic engineering information engineeringDecomposition (computer science)TensorHigh orderta113konvergenssiconvergencesignal to noise ratio020206 networking & telecommunicationsbrain modelinghierarchical alternating least squares (HALS)Alternating least squaresCore (graph theory)coupled tensor decomposition020201 artificial intelligence & image processingAlgorithmsignal processing algorithmselectroencephalographymathematical modelCurse of dimensionality
researchProduct

A Parallel Approach to HRTF Approximation and Interpolation Based on a Parametric Filter Model

2017

[EN] Spatial audio-rendering techniques using head-related transfer functions (HRTFs) are currently used in many different contexts such as immersive teleconferencing systems, gaming, or 3-D audio reproduction. Since all these applications usually involve real-time constraints, efficient processing structures for HRTF modeling and interpolation are necessary for providing real-time binaural audio solutions. This letter presents a parametric parallel model that allows us to perform HRTF filtering and interpolation efficiently from an input HRTF dataset. The resulting model, which is an adaptation from a recently proposed modeling technique, not only reduces the size of HRTF datasets signific…

Computer scienceparallel filters02 engineering and technologySolid modelingbinaural synthesisTransfer functionTECNOLOGIA ELECTRONICA030507 speech-language pathology & audiology03 medical and health sciencesgraphic processing unit (GPU)0202 electrical engineering electronic engineering information engineeringCIENCIAS DE LA COMPUTACION E INTELIGENCIA ARTIFICIALhead-related transfer function (HRTF) modelingComputer visionElectrical and Electronic EngineeringAdaptation (computer science)Parametric statisticsbusiness.industryApplied MathematicsTeleconferenceBinaural synthesis020206 networking & telecommunicationsFilter (signal processing)interpolationInterpolationGraphic processing unit (GPU)Signal ProcessingHead-related transfer function (HRTF) modelingParallel filtersArtificial intelligence0305 other medical sciencebusinessAlgorithmInterpolation
researchProduct

Managing sensor data streams in a smart home application

2020

A challenge in developing an ambient activity recognition system for use in elder care is finding a balance between the sophistication of the system and a cost structure that fits within the budgets of public and private sector healthcare organisations. Much activity recognition research in the context of elder care is based on dense networks of sensors and advanced methods, such as supervised machine learning algorithms. This paper presents the data processing aspects of an activity recognition system based on a simpler, knowledge-based unsupervised approach, designed for a sparse network of sensors. By structuring sensor data management as a streaming system, we provide a simple programmi…

Computer sciencesmart homeComputer Networks and CommunicationsData managementsensor data streamskotihoitoContext (language use)sensor data processing02 engineering and technology01 natural sciencesActivity recognitionwireless sensor networkHome automationälytalotpassive infrared sensor0202 electrical engineering electronic engineering information engineeringactivity recognitionanturitElectrical and Electronic EngineeringgeroteknologiaData stream miningbusiness.industry010401 analytical chemistryPublic sectorsensoriverkothealthcare020206 networking & telecommunicationsData sciencesensor data managementWSNsensor data0104 chemical sciencesComputer Science ApplicationsPIRControl and Systems EngineeringProgramming paradigmälytekniikkabusinesshome careWireless sensor networkInternational Journal of Sensor Networks
researchProduct

A Generic Approach to Scheduling and Checkpointing Workflows

2018

This work deals with scheduling and checkpointing strategies to execute scientific workflows on failure-prone large-scale platforms. To the best of our knowledge, this work is the first to target fail-stop errors for arbitrary workflows. Most previous work addresses soft errors, which corrupt the task being executed by a processor but do not cause the entire memory of that processor to be lost, contrarily to fail-stop errors. We revisit classical mapping heuristics such as HEFT and MinMin and complement them with several checkpointing strategies. The objective is to derive an efficient trade-off between checkpointing every task (CkptAll), which is an overkill when failures are rare events, …

Computer scienceworkflowDistributed computing02 engineering and technologyTheoretical Computer ScienceScheduling (computing)résiliencecheckpointfail-stop error0202 electrical engineering electronic engineering information engineeringRare eventsOverhead (computing)[INFO]Computer Science [cs]Resilience (network)resilienceComplement (set theory)020203 distributed computing020206 networking & telecommunications020202 computer hardware & architecture[INFO.INFO-PF]Computer Science [cs]/Performance [cs.PF]Task (computing)WorkflowHardware and Architectureerreur fatale[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]HeuristicsSoftware
researchProduct

Towards a Non-Intrusive Context-Aware Speech Quality Model

2020

Understanding how humans judge perceived speech quality while interacting through Voice over Internet Protocol (VoIP) applications in real-time is essential to build a robust and accurate speech quality prediction model. Speech quality is degraded in the presence of background noise reducing the Quality of Experience (QoE). Speech Enhancement (SE) algorithms can improve speech quality in noisy environments. The publicly available NOIZEUS speech corpus contains speech in environmental background noise babble, car, street, and train at two Signal-to-noise ratio (SNRs) 5dB and 10dB. Objective Speech Quality Metrics (OSQM) are used to monitor and measure speech quality for VoIP applications. Th…

Context modelVoice activity detectionNoise measurementComputer scienceSpeech recognitionMean opinion score020206 networking & telecommunicationsSpeech corpus02 engineering and technology01 natural sciencesBackground noiseSpeech enhancement0103 physical sciences0202 electrical engineering electronic engineering information engineeringQuality of experience010301 acoustics2020 31st Irish Signals and Systems Conference (ISSC)
researchProduct

A User-Centric Approach for Personalized Service Provisioning in Pervasive Environments

2011

Published version of an article published in Wireless Personal Communications (2011). Also available from the publisher at http://dx.doi.org/10.1007/s11277-011-0387-3 The vision of pervasive environments is being realized more than ever with the proliferation of services and computing resources located in our surrounding environments. Identifying those services that deserve the attention of the user is becoming an increasingly-challenging task. In this paper, we present an adaptive multi-criteria decision making mechanism for recommending relevant services to the mobile user. In this context, "Relevance" is determined based on a user-centric approach that combines both the reputation of the…

Context-aware pervasive systemsService (systems architecture)Pervasive computing service recommendation unobtrusive applicationsUbiquitous computingComputer sciencemedia_common.quotation_subjectVDP::Technology: 500::Information and communication technology: 550020206 networking & telecommunicationsContext (language use)02 engineering and technologyComputer Science ApplicationsTask (project management)World Wide Web0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingRelevance (information retrieval)Electrical and Electronic EngineeringUser-centered designReputationmedia_commonWireless Personal Communications
researchProduct