Search results for "Oriente"

showing 10 items of 684 documents

Adaptive live video streaming on low-cost wireless multihop networks for road traffic surveillance in smart cities

2021

Abstract Traffic surveillance is an important issue for Intelligent Transportation Systems (ITS) that helps detect incidents automatically, such as wrong-way drivers, still-standing vehicles and jams. Sometimes these systems require a fast and short-term deployment of video cameras. In these cases, ad-hoc networks could be a low-cost and feasible option, but they have poor performance for video delivery. Thus, we propose a smart live video adaptive streaming technique in order to transport video streams from the cameras to the external road traffic monitoring servers. To achieve this goal, these networks need a thorough study in order to analyze video quality under their inherent constraint…

Routing protocolComputer Networks and CommunicationsComputer sciencebusiness.industryQuality of serviceReal-time computing020206 networking & telecommunications02 engineering and technologyVideo qualityNetwork topologyHardware and ArchitectureServer0202 electrical engineering electronic engineering information engineeringWireless020201 artificial intelligence & image processingbusinessIntelligent transportation systemProtocol (object-oriented programming)SoftwareFuture Generation Computer Systems
researchProduct

A Group-Based Protocol for Large Wireless AD-HOC and Sensor Networks

2008

Many routing protocols for ad-hoc networks and sensor networks have been designed, but none of them is based on groups. It is known that grouping nodes gives better performance to the group and to the whole system, thereby avoiding unnecessary message forwarding and additional overheads. We propose an approach where the network is split into several groups of sensors where connections between groups are established as a function of the proximity and the neighbor's available capacity (based on the sensor's energy). In this paper the network architecture is described with its mathematical description and the messages that are needed to proper operation. It is also simulated how much time is n…

Routing protocolNetwork architectureComputer sciencebusiness.industryWireless ad hoc networkcomputer.internet_protocolDistributed computingNetwork topologyWireless Application ProtocolRouting (electronic design automation)businessProtocol (object-oriented programming)Wireless sensor networkcomputerComputer networkNOMS Workshops 2008 - IEEE Network Operations and Management Symposium Workshops
researchProduct

Reflection scanning microscopy.

1992

To image nontransparent samples we have utilized a special type of scanning-probe microscope that is referred to here as a reflection scanning microscope. The reflection scanning microscope provides a method for producing a scanned point light source as well as a system for collecting the light that is reflected by the sample. The system, which uses an optical fiber coupler, is easily installed on an existing photon scanning tunneling microscope. A calculation of the coupling coefficient between the natural propagation mode of the optical fiber and the light that is reflected by the sample is presented along with a comparison between calculated and measured values of the intensity of the li…

Scanning Hall probe microscopeMaterials scienceMicroscopebusiness.industryMaterials Science (miscellaneous)Near-field opticsIndustrial and Manufacturing Engineeringlaw.inventionScanning probe microscopyLight intensityOpticslawMicroscopy4Pi microscopeBusiness and International ManagementbusinessFeature-oriented scanningApplied optics
researchProduct

The Italian excavations at Shiyukh Tahtani, North Syria. New light on the Bronze Age sequence.

2010

Short news on the results of the excavations in the Euphrates site, Syria. 2010 campaign.

Scavi Valle dell' Eufrate Siria.Excavations Euphrates Valley SyriaSettore L-OR/05 - Archeologia E Storia Dell'Arte Del Vicino Oriente Antico
researchProduct

MAC learning

2016

Cognition as a way to deal with the challenges of future wireless networks has been largely considered by the recent literature, with a main focus on physical layer adaptability and dynamic spectrum access. In this demo, we show how a simple cognition mechanism can be also applied at the MAC layer, by exploiting the emerging paradigm of programmable wireless cards. The idea is using the formal definition of simple MAC protocol components and platform-independent representation of channel events gathered from the wireless node, for emulating the behavior of protocols which are not currently running on the network, learning about their expected performance, and dynamically reconfiguring the w…

ScheduleSIMPLE (military communications protocol)Wireless networkbusiness.industryComputer scienceDistributed computingNode (networking)Physical layer020206 networking & telecommunications02 engineering and technology0202 electrical engineering electronic engineering information engineeringWirelessbusinessProtocol (object-oriented programming)Computer networkCommunication channelProceedings of the Tenth ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation, and Characterization
researchProduct

Reaction-diffusion on dynamic inhibition areas: A bio-inspired link scheduling algorithm

2014

We present the Dynamic Inhibition Areas Reaction-Diffusion (DIA-RD) algorithm, a distributed medium access control protocol that globally maximizes the spatial reusability (number of simultaneous transmissions per unit area) of wireless sensor networks. This algorithm is able, in consequence, to minimize the number of time slots needed to schedule the set of demanded links, making it very efficient to solve the Shortest Link Schedule problem. DIA-RD combines accurate interference management, provided by the use of dynamic inhibition areas based on the physical interference model; and global intelligent behavior, provided by the bio-inspired technique known as Reaction-Diffusion. This techni…

ScheduleTransmission (telecommunications)Computer scienceDistributed computingConvergence (routing)Interference (wave propagation)Wireless sensor networkProtocol (object-oriented programming)Scheduling (computing)2014 IEEE Wireless Communications and Networking Conference (WCNC)
researchProduct

Dissemination protocol for Heterogeneous Cooperative Vehicular Networks

2012

International audience; The difficulties associated with network connectivity, unreliable channels, and city environment characteristics make data dissemination task in vehicular urban networks a real challenge. Recently, some interesting solutions have been proposed to perform data dissemination in this environment. Starting from the analysis of these solutions, we present a new dissemination protocol named DHVN (Dissemination protocol for Heterogeneous Cooperative Vehicular Networks) that considers: (i) roads topology, (ii) network connectivity and possible partitioning in case of low traffic density, and (iii) heterogeneous communication capabilities of the vehicles. We compare our proto…

Scheme (programming language)050210 logistics & transportationVehicular ad hoc networkComputer sciencebusiness.industryDistributed computing05 social sciences020206 networking & telecommunicationsTopology (electrical circuits)02 engineering and technologyNetwork connectivityTask (computing)[SPI]Engineering Sciences [physics]0502 economics and business0202 electrical engineering electronic engineering information engineeringBandwidth (computing)businesscomputerDisseminationProtocol (object-oriented programming)computer.programming_languageComputer network
researchProduct

Combining hashing and enciphering algorithms for epidemiological analysis of gathered data.

2008

Summary Objectives: Compiling individual records coming from different sources is necessary for multi-center studies. Legal aspects can be satisfied by implementing anonymization procedures. When using these procedures with a different key for each study it becomes almost impossible to link records from separate data collections. Methods: The originality of the method relies on the way the combination of hashing and enciphering techniques is performed: like in asymmetric encryption, two keys are used but the private key depends on the patient’s identity. Results: The combination of hashing and enciphering techniques provides a great improvement in the overall security of the proposed scheme…

Scheme (programming language)Computer sciencemedia_common.quotation_subjectHash functionHealth Informaticscomputer.software_genreEncryption01 natural sciencesField (computer science)Patient identificationPublic-key cryptography010104 statistics & probability03 medical and health sciences0302 clinical medicineHealth Information ManagementOriginality030212 general & internal medicine0101 mathematicscomputer.programming_languagemedia_commonAdvanced and Specialized Nursingbusiness.industryData CollectionEpidemiologic StudiesIdentity (object-oriented programming)Data miningbusinesscomputerAlgorithmsConfidentialityMethods of information in medicine
researchProduct

Simple scheme for extracting work with a single bath

2019

We propose a simple protocol exploiting the thermalization of a storage bipartite system S to extract work from a resource system R. The protocol is based on a recent work definition involving only a single bath. A general description of the protocol is provided without specifying the characteristics of S. We quantify both the extracted work and the ideal efficiency of the process, also giving maximum bounds for them. Then, we apply the protocol to two cases: two interacting qubits and the Rabi model. In both cases, for very strong couplings, an extraction of work comparable with the bare energies of the subsystems of S is obtained and its peak is reached for finite values of the bath tempe…

Scheme (programming language)Work (thermodynamics)Ideal (set theory)Quantum ThermodynamicSettore FIS/02 - Fisica Teorica Modelli E Metodi MatematiciComputer scienceProcess (computing)Cavity QEDTopology01 natural sciencesSettore FIS/03 - Fisica Della Materia010305 fluids & plasmasEntanglement[PHYS.QPHY]Physics [physics]/Quantum Physics [quant-ph]Simple (abstract algebra)QubitTransfer (computing)0103 physical sciences010306 general physicscomputerProtocol (object-oriented programming)ComputingMilieux_MISCELLANEOUScomputer.programming_language
researchProduct

Meta-analysis of time perception and temporal processing in schizophrenia: Differential effects on precision and accuracy

2016

Numerous studies have reported that time perception and temporal processing are impaired in schizophrenia. In a meta-analytical review, we differentiate between time perception (judgments of time intervals) and basic temporal processing (e.g., judgments of temporal order) as well as between effects on accuracy (deviation of estimates from the veridical value) and precision (variability of judgments). In a meta-regression approach, we also included the specific tasks and the different time interval ranges as covariates. We considered 68 publications of the past 65years, and meta-analyzed data from 957 patients with schizophrenia and 1060 healthy control participants. Independent of tasks and…

Schizophrenia (object-oriented programming)05 social sciencesCognitionTime perceptionbehavioral disciplines and activities050105 experimental psychologyDevelopmental psychologyJudgment03 medical and health sciencesPsychiatry and Mental healthClinical PsychologyInterval (music)Variable (computer science)0302 clinical medicineMeta-analysisTime PerceptionCovariateHumansSchizophrenic Psychology0501 psychology and cognitive sciencesMeta-regressionPsychology030217 neurology & neurosurgeryCognitive psychologyClinical Psychology Review
researchProduct