Search results for "TELECOMMUNICATION"
showing 10 items of 1769 documents
Performance evaluation of different techniques to estimate subjective quality in live video streaming applications over LTE-Advance mobile networks
2018
Abstract Current mobile service providers are offering Gigabit Internet access over LTE-Advanced networks. Traditional services, such as live video streaming, over wired networks are feasible on these networks. However different aspects should be taken into account due to the fast changing network conditions as well as the constrained resources of the mobile phones, in order to provide a good subjective video quality in terms of Mean Opinion Score (MOS). Our goal is to estimate and predict this subjective metric without information or reference from the original video, known as Non Reference approach. This approach is important for the Service Provider from a practical point of view, becaus…
A novel policy-driven reversible anonymisation scheme for XML-based services
2015
Author's version of an article in the journal: Information Systems. Also available from the publisher at: http://dx.doi.org/10.1016/j.is.2014.05.007 This paper proposes a reversible anonymisation scheme for XML messages that supports fine-grained enforcement of XACML-based privacy policies. Reversible anonymisation means that information in XML messages is anonymised, however the information required to reverse the anonymisation is cryptographically protected in the messages. The policy can control access down to octet ranges of individual elements or attributes in XML messages. The reversible anonymisation protocol effectively implements a multi-level privacy and security based approach, s…
Energy Harvesting-Aware Backoff Algorithms for Distributed Device-to-Device Communication
2016
Due to limited energy capacity in mobile devices, energy harvesting is regarded as a promising technology for lifetime extension in device-to-device (D2D) communication. However, medium access control (MAC) protocols designed for D2D communication intrinsically do not consider the existence of harvested energy. In this paper we study four backoff (BO) algorithms, among which one algorithm is proposed to enhance the BO selection based on energy harvesting rate and residual energy of devices. Simulations are performed in order to assess how the proposed algorithm can extend the lifetime of a D2D communication network as well as to provide fair channel access opportunities among devices.
Relationship between prefrontal cognitive functions and dopaminergic transmission: A [18F]-fluoro-l-DOPA PET study
2006
New High Voltage Interconnections with Islands in the Mediterranean Sea: Malta and Sicily. Analysis of the Effects on Renewable Energy Sources Integr…
2018
The present paper shows the benefits coming from the operation of the recent electrical high voltage (HV) interconnections between Sicily, Malta and mainland Italy. These new interconnections allow zonal prices of electricity considerably lower than in the past, ensuring greater flexibility to the system and a better integration of Renewable Energy Sources (RES). After briefly illustrating the two high-voltage electrical systems (Sicily and Malta), and having provided a description of the interconnection cable with Malta and its protection devices, the authors hypothesized two modes of operation (Sicily-Malta system islanded or interconnected to the rest of Europe). For the first case (isla…
Cadmium mass measurements between the neutron shell closures at N=50 and 82
2010
International audience; The mass values of the neutron-deficient cadmium isotopes 99−109Cd and of the neutronrich isotopes 114,120,122−124,126,128Cd have been measured using ISOLTRAP. The behavior of the separation energies of the cadmium isotopes from N = 50 to 82 is discussed.
Automata and forbidden words
1998
Abstract Let L ( M ) be the (factorial) language avoiding a given anti-factorial language M . We design an automaton accepting L ( M ) and built from the language M . The construction is effective if M is finite. If M is the set of minimal forbidden words of a single word ν, the automaton turns out to be the factor automaton of ν (the minimal automaton accepting the set of factors of ν). We also give an algorithm that builds the trie of M from the factor automaton of a single word. It yields a nontrivial upper bound on the number of minimal forbidden words of a word.
A Survey on Proxy Mobile IPv6 Handover
2016
[EN] As wireless technologies have been improving in recent years, a mobility management mechanism is required to provide seamless and ubiquitous mobility for end users who are roaming among points of attachment in wireless networks. Thus, Mobile IPv6 was developed by the Internet Engineering Task Force (IETF) to support the mobility service. However, Mobile IPv6 is unable to fulfill the requirements of real-time applications, such as video streaming service and voice over IP service, due to its high handover (HO) latency. To address this problem, Proxy Mobile IPv6 (PMIPv6) has been introduced by the IETF. In PMIPv6, which is a network-based approach, the serving network controls mobility m…
Edge-Based Missing Data Imputation in Large-Scale Environments
2021
Smart cities leverage large amounts of data acquired in the urban environment in the context of decision support tools. These tools enable monitoring the environment to improve the quality of services offered to citizens. The increasing diffusion of personal Internet of things devices capable of sensing the physical environment allows for low-cost solutions to acquire a large amount of information within the urban environment. On the one hand, the use of mobile and intermittent sensors implies new scenarios of large-scale data analysis
Synchrotron x-ray transmission measurements and modeling of filters investigated for Athena
2020
International audience; Advanced Telescope for High-Energy Astrophysics is a large-class astrophysics space mission selected by the European Space Agency to study the theme "Hot and Energetic Universe." The mission essentially consists of a large effective area x-ray telescope and two detectors: the X-ray Integral Field Unit (X-IFU) and the Wide Field Imager (WFI). Both instruments require filters to shield from out-of-band radiation while providing high transparency to x-rays. The mission is presently in phase B; thus, to consolidate the preliminary design, investigated filter materials need to be properly characterized by experimental test campaigns. We report results from high-resolution…