Search results for "TELECOMMUNICATION"
showing 10 items of 1769 documents
Performance analysis of Alamouti-coded OFDM systems over spatio-temporally correlated underwater acoustic channels
2017
In this paper, we analyze the performance of Alamouti-coded orthogonal frequency division multiplexing (OFDM) systems over time-varying underwater acoustic (UWA) channels. A realistic UWA channel model has been considered, which can be correlated in either time or space or simultaneously in both domains. An exact analytical expression for the bit error probability (BEP) is necessary to analyze accurately the performance of Alamouti-coded OFDM systems over the spatio-temporally correlated UWA channel model. Hence, by using this UWA channel model, an expression has been derived for the BEP of Alamouti-coded OFDM systems assuming that the receiver knows perfectly the channel state information.…
Measuring acoustic complexity in continuously varying signals: how complex is a wolf howl?
2017
Communicative complexity is a key behavioural and ecological indicator in the study of animal cognition. Much attention has been given to measures such as repertoire size and syntactic structure in both bird and mammal vocalizations, as large repertoires and complex call combinations may give an indication of the cognitive abilities both of the sender and receiver. However, many animals communicate using a continuous vocal signal that does not easily lend itself to be described by concepts such as ‘repertoire’. For example, dolphin whistles and wolf howls both have complex patterns of frequency modulation, so that no two howls or whistles are quite the same. Is there a sense in which some o…
On Some Misconceptions Concerning Digital Banking and Alternative Delivery Channels
2016
A great deal of conceptual confusion surrounds the notions of digital banking and innovative alternative delivery channels that support banking and other financial transactions globally. The authors contend that the concepts of digital banking and associated delivery channels are ambiguous and restrictive; their usability has been undermined and their purpose and objective have, to a large extent, been misunderstood. Against this backdrop, the authors offer an inclusive definition of digital banking and delivery channels and provide logical explanations of these terms that can benefit scholars, the telecommunication sector, the banking industry, policy makers, and service providers (in term…
Konforme Abbildung und Greensche Funktion
1949
Mit Hilfe des Additionstheorems Gl. (I, 31) und mit Hilfe der imaginaren Transformation von Jacobi Gl. (I, 33) folgt fur die durch die Funktion λ = sn (z, k) vermittelte, Abbildung der z-Ebene auf die λ-Ebene $$\lambda = {\lambda _1} + i{\lambda _2} = snz = sn\left( {x + iy} \right) = \frac{{snxcniydniy + sniycnxdnx}}{{1 - {k^2}s{n^2}xs{n^2}iy}}$$ .
Peer-to-peer cooperative GNSS-based localization for stationary reference nodes in wireless sensor networks
2017
Most localization algorithms in wireless sensor networks rely on a few reference nodes with known locations to estimate the locations of unknown nodes. The locations of reference nodes can be either manually configured or, more practically, obtained by means of some satellite-based positioning system(s). However, satellite-based locations may be inaccurate and imprecise, which results in reduced location accuracy of localization algorithms. This paper proposes a peer-to-peer cooperative GNSS-based localization algorithm for stationary reference nodes to improve their relative location accuracy and precision. The algorithm applies simple statistical methods and GNSS-based information from mu…
Massively Parallel ANS Decoding on GPUs
2019
In recent years, graphics processors have enabled significant advances in the fields of big data and streamed deep learning. In order to keep control of rapidly growing amounts of data and to achieve sufficient throughput rates, compression features are a key part of many applications including popular deep learning pipelines. However, as most of the respective APIs rely on CPU-based preprocessing for decoding, data decompression frequently becomes a bottleneck in accelerated compute systems. This establishes the need for efficient GPU-based solutions for decompression. Asymmetric numeral systems (ANS) represent a modern approach to entropy coding, combining superior compression results wit…
Massively Parallel Huffman Decoding on GPUs
2018
Data compression is a fundamental building block in a wide range of applications. Besides its intended purpose to save valuable storage on hard disks, compression can be utilized to increase the effective bandwidth to attached storage as realized by state-of-the-art file systems. In the foreseeing future, on-the-fly compression and decompression will gain utmost importance for the processing of data-intensive applications such as streamed Deep Learning tasks or Next Generation Sequencing pipelines, which establishes the need for fast parallel implementations. Huffman coding is an integral part of a number of compression methods. However, efficient parallel implementation of Huffman decompre…
Security and Privacy in Wireless IoT
2018
The 13 articles in this special section focus on security and privacy in wireless Internet of Things (IoT). IoT is a paradigm that involves networked physical objects with embedded technologies to collect, communicate, sense, and interact with the external environment through wireless or wired connections. With rapid advancements in IoT technology, the number of IoT devices is expected to surpass 50 billion by 2020, which has also drawn the attention of attackers who seek to exploit the merits of this new technology for their own benefits. There are many potential security and privacy threats to IoT, such as attacks against IoT systems and unauthorized access to private information of end u…
Combining congested-flow isolation and injection throttling in HPC interconnection networks
2011
Existing congestion control mechanisms in interconnects can be divided into two general approaches. One is to throttle traffic injection at the sources that contribute to congestion, and the other is to isolate the congested traffic in specially designated resources. These two approaches have different, but non-overlapping weaknesses. In this paper we present in detail a method that combines injection throttling and congested-flow isolation. Through simulation studies we first demonstrate the respective flaws of the injection throttling and of flow isolation. Thereafter we show that our combined method extracts the best of both approaches in the sense that it gives fast reaction to congesti…
Experimental trade-offs between different strategies for multihop communications evaluated over real deployments of wireless sensor network for envir…
2018
Although much work has been done since wireless sensor networks appeared, there is not a great deal of information available on real deployments that incorporate basic features associated with these networks, in particular multihop routing and long lifetimes features. In this article, an environmental monitoring application (Internet of Things oriented) is described, where temperature and relative humidity samples are taken by each mote at a rate of 2 samples/min and sent to a sink using multihop routing. Our goal is to analyse the different strategies to gather the information from the different motes in this context. The trade-offs between ‘sending always’ and ‘buffering locally’ approac…