Search results for "PROTOCOL"
showing 10 items of 1808 documents
Unmanned Aerial Vehicle-Based Non Destructive Diagnostics
2018
The paper proposes a cloud platform for analyzing the radiometric infrared videos uploaded by drones which patrol large photovoltaic plants. Thanks to artificial vision algorithms, it does not require any human support to select and associate the framed PV modules to the corresponding ones in the topology of the photovoltaic plant. The algorithm implements an innovative diagnostic protocol, which evaluates the thermal state of the photovoltaic module, whichever the environmental conditions are. The data automatically computed and collected in a multimedia database provide the O&M technicians with significant information to monitor the ageing of each module of the photovoltaic plant. The pro…
Out-of-Band Signaling Scheme for High Speed Wireless LANs
2007
In recent years, the physical layer data rate provided by 802.11 Wireless LANs has dramatically increased thanks to significant advances in the modulation and coding techniques employed. However, previous studies show that the 802.11 MAC operation, namely the distributed coordination function (DCF), represents a limiting factor: the throughput efficiency drops as the channel bit rate increases, and a throughput upper limit does indeed exist when the channel bit rate goes to infinite high. These findings indicate that the performance of the DCF protocol will not be efficiently improved by merely increasing the channel bit rate. This paper shows that the DCF performance may significantly bene…
A Method of Three-Dimensional Visualization of Molecular Processes of Apoptosis
2014
Apoptosis or programmed cell death plays an important role in many physiological states and diseases. Detection of apoptotic cells, tracing the development of apoptosis, drug development and regulation of apoptosis are an important parts of basic research in medicine. A large number of models have been developed that are based on the differential equations of the chemical kinetics, and can be expressed in a uniform notation using some XML-based languages, such as SBML and CellML. We describe the CellML and the simulation environment OpenCell herein. These tools can display models schematically and output results in the form of graphs showing time dependencies of component concentrations. Ho…
A Restricted-Weakly Connected Dominating Set for Role Assignment in a Multichannel MAC for Wireless Mesh Network
2009
International audience; We propose an efficient way of constructing the wireless mesh structure associated with Molecular MAC, a multichannel access method designed for efficient packet forwarding. We base our role assignment on a restricted Weakly Connected Dominating Set structure. After presenting a formal definition of the role assignment problem, we prove its NP-completeness. Then, we propose a centralized 2-approximation algorithm that maximizes the sum of radio link capacities in the molecular structure. Finally, we extend this protocol so that it can operate in a distributed way still providing the same guarantee. This distributed protocol is self-stabilizing thus robust to topology…
Measuring the weather’s impact on MAC layer over 2.4GHz outdoor radio links
2015
The weather s impact on the performance of a radio link at the 2.4 GHz ISM (Industry, Scientific and Medical) band had not been yet studied in great detail up to now as it is generally believed that the ultra-high frequency band is not significantly affected by weather conditions. However, our study shows significant correlations between meteorological variables and control frame errors at MAC (Medium Access Control) layer of the IEEE 802.11b/g standard. This study is performed over an outdoor radio link setting which has been monitored for several months. Moreover, we check if link distance and so modulation scheme and data rate are also decisive features of such impact. Our real scenario …
Visually Perceived Distance Judgments: Tablet-Based Augmented Reality Versus the Real World
2016
Does visually perceived distance differ when objects are viewed in augmented reality (AR), as opposed to the real world? What are the differences? These questions are theoretically interesting, and the answers are important for the development of many tablet- and phone-based AR applications, including mobile AR navigation systems. This article presents a thorough literature review of distance judgment experimental protocols, and results from several areas of perceptual psychology. In addition to distance judgments of real and virtual objects, this section also discusses previous work in measuring the geometry of virtual picture space and considers how this work might be relevant to tablet A…
A Techno-Economic Perspective of Constrained Application Protocol
2017
Among billions of Internet enabled devices that are expected to surround us in the near future, many will be resource constrained, i.e., will have limited power supply, processing power and memory. To cope with these limitations, the Constrained Application Protocol (CoAP) has been recently introduced as a lightweight alternative to HTTP for connecting the resource limited devices to the Web. Although the new protocol offers solid technical advantages, it remains uncertain whether a successful uptake will follow, as it depends also on its economic feasibility for the involved stakeholders. Therefore, this paper studies the techno-economic feasibility of CoAP using a systematic methodologica…
Comparison of digital protocols for the measurement of peri-implant marginal bone loss
2018
Background The measurement of peri-implant marginal bone loss is currently carried out using digital methods of radiographic analysis assisted by various types of software. The purpose of this study was to compare the characteristics of three different softwares: specific radiology software for the development and visualization of radiological images in DICOM format (3Dicom Viewer®), advanced level software for professional editing of bitmap images (or raster graphics) (Adobe Photoshop®), and mid-level software for processing bitmap-type images, programmed in Java and in the public domain (ImageJ®). Material and Methods It was verified that the three softwares used are valid for the measure…
MAC Protocols for Wake-up Radio: Principles, Modeling and Performance Analysis
2018
[EN] In wake-up radio (WuR) enabled wireless sensor networks (WSNs), a node triggers a data communication at any time instant by sending a wake-up call (WuC) in an on-demand manner. Such wake-up operations eliminate idle listening and overhearing burden for energy consumption in duty-cycled WSNs. Although WuR exhibits its superiority for light traffic, it is inefficient to handle high traffic load in a network. This paper makes an effort towards improving the performance of WuR under diverse load conditions with a twofold contribution. We first propose three protocols that support variable traffic loads by enabling respectively clear channel assessment (CCA), backoff plus CCA, and adaptive …
Adoption of Constrained Application Protocol
2016
Among billions of Internet enabled devices that are expected to surround us in the near future, many will be resource constrained, i.e., will have limited power supply, processing power and memory. To cope with these limitations, the Constrained Application Protocol (CoAP) has been recently introduced as a lightweight alternative to HTTP for connecting the resource limited devices to the Web. Although the new protocol offers solid technical advantages, it remains uncertain whether a successful uptake will follow, as it depends also on its economic feasibility for the involved stakeholders. Therefore, this paper studies the techno-economic feasibility of CoAP using a systematic methodologica…