Search results for "PROTOCOL"

showing 10 items of 1808 documents

Unmanned Aerial Vehicle-Based Non Destructive Diagnostics

2018

The paper proposes a cloud platform for analyzing the radiometric infrared videos uploaded by drones which patrol large photovoltaic plants. Thanks to artificial vision algorithms, it does not require any human support to select and associate the framed PV modules to the corresponding ones in the topology of the photovoltaic plant. The algorithm implements an innovative diagnostic protocol, which evaluates the thermal state of the photovoltaic module, whichever the environmental conditions are. The data automatically computed and collected in a multimedia database provide the O&M technicians with significant information to monitor the ageing of each module of the photovoltaic plant. The pro…

Computer scienceComputer Networks and CommunicationsMultimedia databaseReal-time computingEnergy Engineering and Power TechnologyCloud computingPV modulesdigital image processingIndustrial and Manufacturing EngineeringUploadSoftwareComputer aided diagnostics; digital image processing; drone based monitoring; PV cells; PV modules; thermography; Artificial Intelligence; Computer Networks and Communications; Computer Science Applications1707 Computer Vision and Pattern Recognition; Energy Engineering and Power Technology; Renewable Energy Sustainability and the Environment; Industrial and Manufacturing Engineering; InstrumentationPV moduleArtificial IntelligenceComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMSInstrumentation (computer programming)Renewable EnergyProtocol (object-oriented programming)InstrumentationSustainability and the Environmentbusiness.industryPV cellsRenewable Energy Sustainability and the EnvironmentPV cellPhotovoltaic systemComputer Science Applications1707 Computer Vision and Pattern RecognitionDronedrone based monitoringthermographySettore ING-IND/31 - ElettrotecnicaComputer Networks and CommunicationComputer aided diagnosticsbusinesscomputer aided diagnostic
researchProduct

Out-of-Band Signaling Scheme for High Speed Wireless LANs

2007

In recent years, the physical layer data rate provided by 802.11 Wireless LANs has dramatically increased thanks to significant advances in the modulation and coding techniques employed. However, previous studies show that the 802.11 MAC operation, namely the distributed coordination function (DCF), represents a limiting factor: the throughput efficiency drops as the channel bit rate increases, and a throughput upper limit does indeed exist when the channel bit rate goes to infinite high. These findings indicate that the performance of the DCF protocol will not be efficiently improved by merely increasing the channel bit rate. This paper shows that the DCF performance may significantly bene…

Computer scienceComputer network performanceWireless LANThroughputDistributed coordination functionBackward compatibilityIEEE 802.11Packet switchingWireless lanWireless LAN Throughput Bit rate Physical layer Modulation coding Access protocols Content management Signal design Media Access Protocol Performance analysisElectrical and Electronic EngineeringIEEE 802.11Settore ING-INF/03 - Telecomunicazionibusiness.industryApplied MathematicsComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPhysical layerCode rateComputer Science ApplicationsComputer network performance; IEEE 802.11; Wireless LANBurst switchingModulationOut-of-band managementbusinessCommunication channelComputer networkIEEE Transactions on Wireless Communications
researchProduct

A Method of Three-Dimensional Visualization of Molecular Processes of Apoptosis

2014

Apoptosis or programmed cell death plays an important role in many physiological states and diseases. Detection of apoptotic cells, tracing the development of apoptosis, drug development and regulation of apoptosis are an important parts of basic research in medicine. A large number of models have been developed that are based on the differential equations of the chemical kinetics, and can be expressed in a uniform notation using some XML-based languages, such as SBML and CellML. We describe the CellML and the simulation environment OpenCell herein. These tools can display models schematically and output results in the form of graphs showing time dependencies of component concentrations. Ho…

Computer scienceDifferential equationcomputer.internet_protocolbusiness.industryCellMLTracingVisualizationCell biologySoftwareComponent (UML)SBMLBiological systembusinesscomputerXML
researchProduct

A Restricted-Weakly Connected Dominating Set for Role Assignment in a Multichannel MAC for Wireless Mesh Network

2009

International audience; We propose an efficient way of constructing the wireless mesh structure associated with Molecular MAC, a multichannel access method designed for efficient packet forwarding. We base our role assignment on a restricted Weakly Connected Dominating Set structure. After presenting a formal definition of the role assignment problem, we prove its NP-completeness. Then, we propose a centralized 2-approximation algorithm that maximizes the sum of radio link capacities in the molecular structure. Finally, we extend this protocol so that it can operate in a distributed way still providing the same guarantee. This distributed protocol is self-stabilizing thus robust to topology…

Computer scienceDistributed computing[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Mesh networking0102 computer and information sciences02 engineering and technologyNetwork topology01 natural sciencesConnected dominating setlaw.invention[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]law0202 electrical engineering electronic engineering information engineeringComputer Science::Networking and Internet ArchitectureWireless mesh network[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industryRadio Link ProtocolComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPacket forwarding020206 networking & telecommunicationsOrder One Network Protocol010201 computation theory & mathematicsbusinessAssignment problemComputer network
researchProduct

Measuring the weather’s impact on MAC layer over 2.4GHz outdoor radio links

2015

The weather s impact on the performance of a radio link at the 2.4 GHz ISM (Industry, Scientific and Medical) band had not been yet studied in great detail up to now as it is generally believed that the ultra-high frequency band is not significantly affected by weather conditions. However, our study shows significant correlations between meteorological variables and control frame errors at MAC (Medium Access Control) layer of the IEEE 802.11b/g standard. This study is performed over an outdoor radio link setting which has been monitored for several months. Moreover, we check if link distance and so modulation scheme and data rate are also decisive features of such impact. Our real scenario …

Computer scienceFrequency bandMAC layerReal-time computingAccess controlWeather conditionsData ratelaw.inventionlawTEORIA DE LA SEÑAL Y COMUNICACIONESControl frame errorsStatistical analysisRadio linkElectrical and Electronic EngineeringLayer (object-oriented design)InstrumentationIEEE 802.11 standardsbusiness.industryApplied MathematicsRadio Link ProtocolFrame (networking)INGENIERIA TELEMATICACondensed Matter PhysicsStatistical analysisModulationbusinessMeasurement
researchProduct

Visually Perceived Distance Judgments: Tablet-Based Augmented Reality Versus the Real World

2016

Does visually perceived distance differ when objects are viewed in augmented reality (AR), as opposed to the real world? What are the differences? These questions are theoretically interesting, and the answers are important for the development of many tablet- and phone-based AR applications, including mobile AR navigation systems. This article presents a thorough literature review of distance judgment experimental protocols, and results from several areas of perceptual psychology. In addition to distance judgments of real and virtual objects, this section also discusses previous work in measuring the geometry of virtual picture space and considers how this work might be relevant to tablet A…

Computer scienceHuman Factors and Ergonomics02 engineering and technologySpace (commercial competition)050105 experimental psychologyField (computer science)0202 electrical engineering electronic engineering information engineeringAR application0501 psychology and cognitive sciencesPerceptual psychologyComputer visiondistance perceptionta113experimental protocolstablet-based augmented realitybusiness.industrybisection05 social sciencesnavigation systems020207 software engineeringaugmented realityComputer Science ApplicationsHuman-Computer Interactioncellular telephone systemsAugmented realityArtificial intelligencebusinessInternational Journal of Human–Computer Interaction
researchProduct

A Techno-Economic Perspective of Constrained Application Protocol

2017

Among billions of Internet enabled devices that are expected to surround us in the near future, many will be resource constrained, i.e., will have limited power supply, processing power and memory. To cope with these limitations, the Constrained Application Protocol (CoAP) has been recently introduced as a lightweight alternative to HTTP for connecting the resource limited devices to the Web. Although the new protocol offers solid technical advantages, it remains uncertain whether a successful uptake will follow, as it depends also on its economic feasibility for the involved stakeholders. Therefore, this paper studies the techno-economic feasibility of CoAP using a systematic methodologica…

Computer sciencePerspective (graphical)Techno economicEnvironmental economicsConstrained Application Protocol
researchProduct

Comparison of digital protocols for the measurement of peri-implant marginal bone loss

2018

Background The measurement of peri-implant marginal bone loss is currently carried out using digital methods of radiographic analysis assisted by various types of software. The purpose of this study was to compare the characteristics of three different softwares: specific radiology software for the development and visualization of radiological images in DICOM format (3Dicom Viewer®), advanced level software for professional editing of bitmap images (or raster graphics) (Adobe Photoshop®), and mid-level software for processing bitmap-type images, programmed in Java and in the public domain (ImageJ®). Material and Methods It was verified that the three softwares used are valid for the measure…

Computer scienceRadiography0206 medical engineering02 engineering and technologyengineering.material03 medical and health sciencesDICOM0302 clinical medicineSoftwareComputer graphics (images)General DentistryProtocol (science)business.industryResearchAdobe030206 dentistrycomputer.file_format:CIENCIAS MÉDICAS [UNESCO]020601 biomedical engineeringVisualizationUNESCO::CIENCIAS MÉDICASengineeringBitmapOral SurgeryRaster graphicsbusinesscomputerJournal of Clinical and Experimental Dentistry
researchProduct

MAC Protocols for Wake-up Radio: Principles, Modeling and Performance Analysis

2018

[EN] In wake-up radio (WuR) enabled wireless sensor networks (WSNs), a node triggers a data communication at any time instant by sending a wake-up call (WuC) in an on-demand manner. Such wake-up operations eliminate idle listening and overhearing burden for energy consumption in duty-cycled WSNs. Although WuR exhibits its superiority for light traffic, it is inefficient to handle high traffic load in a network. This paper makes an effort towards improving the performance of WuR under diverse load conditions with a twofold contribution. We first propose three protocols that support variable traffic loads by enabling respectively clear channel assessment (CCA), backoff plus CCA, and adaptive …

Computer scienceWireless sensor networks (WSNs)02 engineering and technology01 natural sciencesWake-up radio (WuR)Medium access control (MAC) protocol0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringLatency (engineering)QueueEnergy-efficient communicationbusiness.industryNode (networking)010401 analytical chemistryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunicationsEnergy consumptionINGENIERIA TELEMATICA0104 chemical sciencesComputer Science ApplicationsInternet of Things (IoT)Variable (computer science)Modeling and performance evaluationControl and Systems EngineeringbusinessWireless sensor networkInformation SystemsComputer networkEfficient energy useData transmission
researchProduct

Adoption of Constrained Application Protocol

2016

Among billions of Internet enabled devices that are expected to surround us in the near future, many will be resource constrained, i.e., will have limited power supply, processing power and memory. To cope with these limitations, the Constrained Application Protocol (CoAP) has been recently introduced as a lightweight alternative to HTTP for connecting the resource limited devices to the Web. Although the new protocol offers solid technical advantages, it remains uncertain whether a successful uptake will follow, as it depends also on its economic feasibility for the involved stakeholders. Therefore, this paper studies the techno-economic feasibility of CoAP using a systematic methodologica…

Computer sciencebusiness.industryPerspective (graphical)Techno economic020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreConstrained Application ProtocolWeb of ThingsRisk analysis (engineering)Software deployment0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingThe InternetLiterature surveybusinesscomputerProtocol (object-oriented programming)International Journal of Innovation in the Digital Economy
researchProduct