Search results for "Organization"

showing 10 items of 4550 documents

ACT-MAC: An asynchronous cooperative transmission MAC protocol for WSNs

2014

Duty cycling (DC) has been proven to be an efficient mechanism to reduce energy consumption in wireless sensor networks (WSNs). On the other hand, cooperative transmission (CT) enables longer range transmission to hop over an energy-hole node, resulting in more balanced energy consumption among nodes. In the literature, there exist few CT MAC protocols for DC operated WSNs and these protocols rely on fixed cycle length. In this paper, we propose a novel variable cycle length protocol, namely asynchronous cooperative transmission medium access control (ACT-MAC), which contains both features of reducing the unnecessary idle listening by DC and mitigating the energy-hole by making use of CT. T…

Computer sciencebusiness.industryAsynchronous communicationComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSComputer Science::Networking and Internet ArchitectureAccess controlEnergy consumptionbusinessWireless sensor networkEfficient energy useHop (networking)Computer network2014 IEEE International Conference on Communications Workshops (ICC)
researchProduct

Smart Manufacturing Testbed for the Advancement of Wireless Adoption in the Factory

2020

Wireless communication is a key enabling technology central to the advancement of the goals of the Industry 4.0 smart manufacturing concept. Researchers at the National Institute of Standards and Technology are constructing a testbed to aid in the adoption of wireless technology within the factory workcell and other harsh industrial radio environments. In this paper the authors present a new industrial wireless testbed design that motivates academic research and is relevant to the needs of industry. The testbed is designed to serve as both a demonstration and research platform for the wireless workcell. The work leverages lessons learned from past testbed incarnations that included a dual r…

Computer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020208 electrical & electronic engineeringTestbed02 engineering and technologyRadio propagation0202 electrical engineering electronic engineering information engineeringSystems engineeringKey (cryptography)Factory (object-oriented programming)RobotWireless020201 artificial intelligence & image processingWorkcellbusinessRobotic arm
researchProduct

Analysis of interference avoidance with load balancing in heterogeneous cellular networks

2016

In heterogeneous cellular networks (HCNets) smallcells are overlaid with macro-cells to handle heavy cellular data traffic in an efficient way. To achieve fast and reliable access to data with a better coverage it is necessary to offload users to the underutilized small-cells from the congested macro-cells. Sharing of the same licensed frequency spectrum by smallcells and macro-cells results in heavy cross-tier interference which significantly affects the downlink SINR. In this paper, we investigate and analyze a joint frequency-division duplex based cross-tier complementary spectrum sharing technique which is also regarded as reverse frequency allocation (RFA) scheme with load balancing. T…

Computer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS05 social sciencesDuplex (telecommunications)050801 communication & media studies020206 networking & telecommunications02 engineering and technologySpectral efficiencyLoad balancing (computing)Frequency allocation0508 media and communicationsTelecommunications link0202 electrical engineering electronic engineering information engineeringCellular networkbusinessComputer network2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)
researchProduct

Proactive Handoff of Secondary User in Cognitive Radio Network Using Machine Learning Techniques

2021

Spectrum management always appears as an essential part of modern communication systems. Handoff is initiated when the signal strength of a current user deteriorates below a certain threshold. In cognitive radio network, the perception of handoff is different due to the presence of two categories of users: certified/primary user and uncertified/secondary user. The reason for the spectrum handoff arises when the primary user (PU) returns to one of its band used by the secondary user. The spectrum handoff is of two types: reactive handoff and proactive handoff. There are certain limitations in reactive handoff, such as it suffers from prolonged handoff latency and interference. In the proacti…

Computer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSDecision treeCommunications systemMachine learningcomputer.software_genreSpectrum managementRandom forestSupport vector machineCognitive radioHandoverMultilayer perceptronArtificial intelligencebusinesscomputer
researchProduct

Kalman filter estimation of the contention dynamics in error-prone IEEE 802.11 networks

2008

In the last years, several strategies for maximizing the throughput performance of IEEE 802.11 networks have been proposed in literature. Specifically, it has been shown that optimizations are possible both at the medium access control (MAC) layer, and at the physical (PHY) layer. In fact, at the MAC layer, it is possible to minimize the channel wastes due to collisions and backoff expiration times, by tuning the minimum contention window as a function of the number n of competing stations. At the PHY layer, it is possible to improve the transmission robustness, by selecting a suitable modulation/coding scheme as a function of the channel quality perceived by the stations. However, the feas…

Computer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSReal-time computingPhysical layerEstimatorKalman filterNetwork allocation vectorExtended Kalman filterWLANIEEE 802.11Robustness (computer science)PHYComputer Science::Networking and Internet Architecturekalman filterbusinessComputer network
researchProduct

NoC Reconfiguration for CMP Virtualization

2011

At NoC level, the traffic interferences can be drastically reduced by using virtualization mechanisms. An effective strategy to virtualize a NoC consists in dividing the network in different partitions, each one serving different applications and traffic flows. In this paper, we propose a NoC reconfiguration mechanism to support NoC virtualization under real scenarios. Dynamic reassignment of network resources to different partitions is allowed in order to NoC dynamically adapts to application needs. Evaluation results show a good behavior of CMP virtualization.

Computer sciencebusiness.industryControl reconfigurationDynamic priority schedulingComputerSystemsOrganization_PROCESSORARCHITECTURESVirtualizationcomputer.software_genreNetwork on a chipSystem on a chipResource managementRouting (electronic design automation)businesscomputerComputer network2011 IEEE 10th International Symposium on Network Computing and Applications
researchProduct

C<sup>2</sup>SMA/CA: Enabling co-channel concurrency in WLANs using positional information

2013

An attractive approach to overcome capacity limitations in a densely deployed WLAN environment is to enable transmission concurrency. In this paper, we propose a co-channel concurrent transmission scheme, referred to as C2SMA/CA, which determines whether to allow multiple concurrent transmissions based on interference estimation using positional information. A distributed multi-link concurrency scheduling algorithm is implemented, and its performance is evaluated through extensive simulations.

Computer sciencebusiness.industryDistributed computingConcurrencyComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSSMA*businessComputer networkScheduling (computing)2013 IEEE Wireless Communications and Networking Conference (WCNC)
researchProduct

Applying Wavelet Packet Decomposition and One-Class Support Vector Machine on Vehicle Acceleration Traces for Road Anomaly Detection

2013

Road condition monitoring through real-time intelligent systems has become more and more significant due to heavy road transportation. Road conditions can be roughly divided into normal and anomaly segments. The number of former should be much larger than the latter for a useable road. Based on the nature of road condition monitoring, anomaly detection is applied, especially for pothole detection in this study, using accelerometer data of a riding car. Accelerometer data were first labeled and segmented, after which features were extracted by wavelet packet decomposition. A classification model was built using one-class support vector machine. For the classifier, the data of some normal seg…

Computer sciencebusiness.industryIntelligent decision support systemPattern recognitionMachine learningcomputer.software_genreWavelet packet decompositionSupport vector machineComputerSystemsOrganization_MISCELLANEOUSAnomaly detectionVehicle accelerationArtificial intelligencebusinesscomputerClassifier (UML)
researchProduct

Uplink DPCCH Gating of Inactive UEs in Continuous Packet Connectivity Mode for HSUPA

2007

In order to further improve the packet performance in the UMTS FDD system, uplink dedicated physical control channel (DPCCH) gating as a scheme is proposed in 3GPP under the work item "continuous connectivity for packet data users". In this paper, the uplink DPCCH gating concept is described and analyzed on both a qualitative and a quantitative level. And the system performance of different gating patterns used in the scheme was investigated by analytical prediction and system level simulations with different channel profiles. As shown, the selection of the gating pattern has a significant influence on the system performance, which is correlated with the uplink data transmission activity an…

Computer sciencebusiness.industryNetwork packetComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSData_CODINGANDINFORMATIONTHEORYGatingDPCCHVoIPTelecommunications linkComputer Science::Networking and Internet ArchitectureElectronic engineeringHSUPAbusinessUMTS frequency bandsComputer Science::Information TheoryCommunication channelPower controlComputer networkData transmission2007 IEEE Wireless Communications and Networking Conference
researchProduct

Maximum Lifetime of the Wireless Sensor Network and the Gossip Problem

2018

In the gossip problem each node of the graph G possesses a unique piece of information - the gossip message. A sequence of one-way or two-way communications between pair of nodes is made to spread the messages so that any node of the graph knows all the gossips. The question is, what is the minimum number of calls between pairs of nodes needed to exchange all gossip messages? The solution to the two-way communication gossip problem is that \(2N-4\) calls (\(N\ge 4\)) suffice if and only if the graph contains a four cycle subgraph. For one-way communication problem the classical results states that in a strongly connected graph \(2N-2\) calls (\(N\ge 4\)) suffice. In this paper we consider t…

Computer sciencebusiness.industryNode (networking)ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSEnergy management020206 networking & telecommunicationsContext (language use)02 engineering and technologyLoad balancing (computing)Transmission (telecommunications)Gossip0202 electrical engineering electronic engineering information engineeringGraph (abstract data type)Sensor network lifetime020201 artificial intelligence & image processingGossipingbusinessWireless sensor networkConnectivityComputer network
researchProduct