Search results for "TELECOMMUNICATION"

showing 10 items of 1769 documents

Performance analysis of Alamouti-coded OFDM systems over spatio-temporally correlated underwater acoustic channels

2017

In this paper, we analyze the performance of Alamouti-coded orthogonal frequency division multiplexing (OFDM) systems over time-varying underwater acoustic (UWA) channels. A realistic UWA channel model has been considered, which can be correlated in either time or space or simultaneously in both domains. An exact analytical expression for the bit error probability (BEP) is necessary to analyze accurately the performance of Alamouti-coded OFDM systems over the spatio-temporally correlated UWA channel model. Hence, by using this UWA channel model, an expression has been derived for the BEP of Alamouti-coded OFDM systems assuming that the receiver knows perfectly the channel state information.…

010505 oceanographyComputer scienceOrthogonal frequency-division multiplexingbusiness.industry05 social sciences050801 communication & media studies01 natural sciencesExpression (mathematics)Computer Science::Performancesymbols.namesake0508 media and communicationsChannel state informationsymbolsWirelessAntenna (radio)UnderwaterbusinessTelecommunicationsDoppler effectAlgorithmComputer Science::Information Theory0105 earth and related environmental sciencesCommunication channel2017 IEEE International Conference on Communications (ICC)
researchProduct

Measuring acoustic complexity in continuously varying signals: how complex is a wolf howl?

2017

Communicative complexity is a key behavioural and ecological indicator in the study of animal cognition. Much attention has been given to measures such as repertoire size and syntactic structure in both bird and mammal vocalizations, as large repertoires and complex call combinations may give an indication of the cognitive abilities both of the sender and receiver. However, many animals communicate using a continuous vocal signal that does not easily lend itself to be described by concepts such as ‘repertoire’. For example, dolphin whistles and wolf howls both have complex patterns of frequency modulation, so that no two howls or whistles are quite the same. Is there a sense in which some o…

0106 biological sciencescanidsEcologybusiness.industrycommunicationEntropy05 social sciencesLibrary science010603 evolutionary biology01 natural sciencesAutocorrelation0501 psychology and cognitive sciences050102 behavioral science & comparative psychologySociologyTelecommunicationsbusinesscomplexityComputingMilieux_MISCELLANEOUSEcology Evolution Behavior and Systematics
researchProduct

On Some Misconceptions Concerning Digital Banking and Alternative Delivery Channels

2016

A great deal of conceptual confusion surrounds the notions of digital banking and innovative alternative delivery channels that support banking and other financial transactions globally. The authors contend that the concepts of digital banking and associated delivery channels are ambiguous and restrictive; their usability has been undermined and their purpose and objective have, to a large extent, been misunderstood. Against this backdrop, the authors offer an inclusive definition of digital banking and delivery channels and provide logical explanations of these terms that can benefit scholars, the telecommunication sector, the banking industry, policy makers, and service providers (in term…

02 engineering and technologyManagement Information Systemsbanking industry020204 information systems0502 economics and business0202 electrical engineering electronic engineering information engineeringmedicineEconomicsMarketingta512Confusiondigital bankingbusiness.industry05 social sciencestelecommunication sectorUsabilityService providerBanking industryComputer Science Applicationsalternative delivery channeldigital banking ecosystemFinancial transactionRetail banking050211 marketingmedicine.symptombusinessInternational Journal of E-Business Research
researchProduct

Konforme Abbildung und Greensche Funktion

1949

Mit Hilfe des Additionstheorems Gl. (I, 31) und mit Hilfe der imaginaren Transformation von Jacobi Gl. (I, 33) folgt fur die durch die Funktion λ = sn (z, k) vermittelte, Abbildung der z-Ebene auf die λ-Ebene $$\lambda = {\lambda _1} + i{\lambda _2} = snz = sn\left( {x + iy} \right) = \frac{{snxcniydniy + sniycnxdnx}}{{1 - {k^2}s{n^2}xs{n^2}iy}}$$ .

0202 electrical engineering electronic engineering information engineering020206 networking & telecommunications02 engineering and technology16. Peace & justice
researchProduct

Peer-to-peer cooperative GNSS-based localization for stationary reference nodes in wireless sensor networks

2017

Most localization algorithms in wireless sensor networks rely on a few reference nodes with known locations to estimate the locations of unknown nodes. The locations of reference nodes can be either manually configured or, more practically, obtained by means of some satellite-based positioning system(s). However, satellite-based locations may be inaccurate and imprecise, which results in reduced location accuracy of localization algorithms. This paper proposes a peer-to-peer cooperative GNSS-based localization algorithm for stationary reference nodes to improve their relative location accuracy and precision. The algorithm applies simple statistical methods and GNSS-based information from mu…

020203 distributed computingAccuracy and precisionPositioning systemSIMPLE (military communications protocol)Computer sciencebusiness.industryReal-time computing020206 networking & telecommunications02 engineering and technologyPeer-to-peercomputer.software_genrelocalizationlokalisointiGNSS applicationsalgoritmit0202 electrical engineering electronic engineering information engineeringGlobal Positioning SystemSatellitebusinesscomputerWireless sensor networklangattomat verkot
researchProduct

Massively Parallel ANS Decoding on GPUs

2019

In recent years, graphics processors have enabled significant advances in the fields of big data and streamed deep learning. In order to keep control of rapidly growing amounts of data and to achieve sufficient throughput rates, compression features are a key part of many applications including popular deep learning pipelines. However, as most of the respective APIs rely on CPU-based preprocessing for decoding, data decompression frequently becomes a bottleneck in accelerated compute systems. This establishes the need for efficient GPU-based solutions for decompression. Asymmetric numeral systems (ANS) represent a modern approach to entropy coding, combining superior compression results wit…

020203 distributed computingComputer science020206 networking & telecommunicationsData_CODINGANDINFORMATIONTHEORY02 engineering and technologyParallel computingCUDAScalability0202 electrical engineering electronic engineering information engineeringCodecSIMDEntropy encodingMassively parallelDecoding methodsData compressionProceedings of the 48th International Conference on Parallel Processing
researchProduct

Massively Parallel Huffman Decoding on GPUs

2018

Data compression is a fundamental building block in a wide range of applications. Besides its intended purpose to save valuable storage on hard disks, compression can be utilized to increase the effective bandwidth to attached storage as realized by state-of-the-art file systems. In the foreseeing future, on-the-fly compression and decompression will gain utmost importance for the processing of data-intensive applications such as streamed Deep Learning tasks or Next Generation Sequencing pipelines, which establishes the need for fast parallel implementations. Huffman coding is an integral part of a number of compression methods. However, efficient parallel implementation of Huffman decompre…

020203 distributed computingComputer sciencebusiness.industryDeep learning020206 networking & telecommunicationsData_CODINGANDINFORMATIONTHEORY02 engineering and technologyParallel computingHuffman codingsymbols.namesakeCUDATitan (supercomputer)0202 electrical engineering electronic engineering information engineeringsymbolsArtificial intelligencebusinessMassively parallelData compressionProceedings of the 47th International Conference on Parallel Processing
researchProduct

Security and Privacy in Wireless IoT

2018

The 13 articles in this special section focus on security and privacy in wireless Internet of Things (IoT). IoT is a paradigm that involves networked physical objects with embedded technologies to collect, communicate, sense, and interact with the external environment through wireless or wired connections. With rapid advancements in IoT technology, the number of IoT devices is expected to surpass 50 billion by 2020, which has also drawn the attention of attackers who seek to exploit the merits of this new technology for their own benefits. There are many potential security and privacy threats to IoT, such as attacks against IoT systems and unauthorized access to private information of end u…

020203 distributed computingExploitEnd userbusiness.industryWireless networkComputer scienceNetwork security020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreComputer Science Applications0202 electrical engineering electronic engineering information engineeringWirelessEnergy supplyElectrical and Electronic EngineeringInternet of ThingsbusinessPrivate information retrievalcomputerIEEE Wireless Communications
researchProduct

Combining congested-flow isolation and injection throttling in HPC interconnection networks

2011

Existing congestion control mechanisms in interconnects can be divided into two general approaches. One is to throttle traffic injection at the sources that contribute to congestion, and the other is to isolate the congested traffic in specially designated resources. These two approaches have different, but non-overlapping weaknesses. In this paper we present in detail a method that combines injection throttling and congested-flow isolation. Through simulation studies we first demonstrate the respective flaws of the injection throttling and of flow isolation. Thereafter we show that our combined method extracts the best of both approaches in the sense that it gives fast reaction to congesti…

020203 distributed computingInterconnectionbusiness.industryComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSFlow (psychology)020206 networking & telecommunications02 engineering and technologyBandwidth throttlingThrottleNetwork congestion0202 electrical engineering electronic engineering information engineeringIsolation (database systems)businessCombined methodComputer network
researchProduct

Experimental trade-offs between different strategies for multihop communications evaluated over real deployments of wireless sensor network for envir…

2018

Although much work has been done since wireless sensor networks appeared, there is not a great deal of information available on real deployments that incorporate basic features associated with these networks, in particular multihop routing and long lifetimes features. In this article, an environmental monitoring application (Internet of Things oriented) is described, where temperature and relative humidity samples are taken by each mote at a rate of 2 samples/min and sent to a sink using multihop routing. Our goal is to analyse the different strategies to gather the information from the different motes in this context. The trade-offs between ‘sending always’ and ‘buffering locally’ approac…

020203 distributed computingInternetComputer Networks and Communicationsbusiness.industryComputer scienceTrade offsGeneral Engineering020206 networking & telecommunications02 engineering and technologyXarxes locals sense fil Wi-Filcsh:QA75.5-76.95Environmental monitoring0202 electrical engineering electronic engineering information engineeringlcsh:Electronic computers. Computer scienceInternet of ThingsbusinessWireless sensor networkComputer network
researchProduct