Search results for "TELECOMMUNICATION"

showing 10 items of 1769 documents

Opinion dynamics in social networks through mean field games

2016

Emulation, mimicry, and herding behaviors are phenomena that are observed when multiple social groups interact. To study such phenomena, we consider in this paper a large population of homogeneous social networks. Each such network is characterized by a vector state, a vector-valued controlled input, and a vector-valued exogenous disturbance. The controlled input of each network aims to align its state to the mean distribution of other networks' states in spite of the actions of the disturbance. One of the contributions of this paper is a detailed analysis of the resulting mean-field game for the cases of both polytopic and $mathcal L_2$ bounds on controls and disturbances. A second contrib…

0209 industrial biotechnologyeducation.field_of_studyControl and OptimizationDisturbance (geology)Applied MathematicsPopulation020206 networking & telecommunications02 engineering and technologyState (functional analysis)020901 industrial engineering & automationMean field theoryControl theoryBellman equationConvergence (routing)0202 electrical engineering electronic engineering information engineeringSpiteHerdingOpinion DynamicsSettore MAT/09 - Ricerca OperativaeducationMathematics
researchProduct

Using Inverse Reinforcement Learning with Real Trajectories to Get More Trustworthy Pedestrian Simulations

2020

Reinforcement learning is one of the most promising machine learning techniques to get intelligent behaviors for embodied agents in simulations. The output of the classic Temporal Difference family of Reinforcement Learning algorithms adopts the form of a value function expressed as a numeric table or a function approximator. The learned behavior is then derived using a greedy policy with respect to this value function. Nevertheless, sometimes the learned policy does not meet expectations, and the task of authoring is difficult and unsafe because the modification of one value or parameter in the learned value function has unpredictable consequences in the space of the policies it represents…

0209 industrial biotechnologyreinforcement learningComputer scienceGeneral Mathematics02 engineering and technologypedestrian simulationTask (project management)learning by demonstration020901 industrial engineering & automationAprenentatgeInformàticaBellman equation0202 electrical engineering electronic engineering information engineeringComputer Science (miscellaneous)Reinforcement learningEngineering (miscellaneous)business.industrycausal entropylcsh:MathematicsProcess (computing)020206 networking & telecommunicationsFunction (mathematics)inverse reinforcement learninglcsh:QA1-939Problem domainTable (database)Artificial intelligenceTemporal difference learningbusinessoptimizationMathematics
researchProduct

Nonlinear statistical retrieval of surface emissivity from IASI data

2017

Emissivity is one of the most important parameters to improve the determination of the troposphere properties (thermodynamic properties, aerosols and trace gases concentration) and it is essential to estimate the radiative budget. With the second generation of infrared sounders, we can estimate emissivity spectra at high spectral resolution, which gives us a global view and long-term monitoring of continental surfaces. Statistically, this is an ill-posed retrieval problem, with as many output variables as inputs. We here propose nonlinear multi-output statistical regression based on kernel methods to estimate spectral emissivity given the radiances. Kernel methods can cope with high-dimensi…

0211 other engineering and technologies020206 networking & telecommunications02 engineering and technologyAtmospheric modelInfrared atmospheric sounding interferometerLeast squaresKernel method13. Climate actionKernel (statistics)Linear regression0202 electrical engineering electronic engineering information engineeringEmissivityKernel regressionPhysics::Atmospheric and Oceanic Physics021101 geological & geomatics engineeringRemote sensingMathematics2017 IEEE International Geoscience and Remote Sensing Symposium (IGARSS)
researchProduct

Rough Set Theory for Optimization of Packet Management Mechanism in IP Routers

2020

Bandwidth and consequently optimum overall efficiency of network system relies greatly on mechanism of packet management in IP routers. Our research objective is to implement rough set theory to minimizing number of the network system attributes responsible for decision making in selection of those packets, which improve its transmission. Such an approach is called priority queuing system model, as we assign priority to the packets selected, following rough set theory. Regardless of the file format, for all the routers, packets are transmitted in sequence one-by-one. Nonetheless, quality of streaming data largely depends on how much the packet loss is minimized, or eliminated at all, if pos…

021103 operations researchNetwork packetComputer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSBandwidth (signal processing)0211 other engineering and technologies02 engineering and technologySystem modelIPv6Set (abstract data type)Transmission (telecommunications)Packet lossRough setbusinessComputer network
researchProduct

Secure and efficient verification for data aggregation in wireless sensor networks

2017

Summary The Internet of Things (IoT) concept is, and will be, one of the most interesting topics in the field of Information and Communications Technology. Covering a wide range of applications, wireless sensor networks (WSNs) can play an important role in IoT by seamless integration among thousands of sensors. The benefits of using WSN in IoT include the integrity, scalability, robustness, and easiness in deployment. In WSNs, data aggregation is a famous technique, which, on one hand, plays an essential role in energy preservation and, on the other hand, makes the network prone to different kinds of attacks. The detection of false data injection and impersonation attacks is one of the majo…

021110 strategic defence & security studiesComputer Networks and Communicationsbusiness.industryComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS0211 other engineering and technologiesEarly detection020206 networking & telecommunications02 engineering and technologyImpersonation attackComputer Science ApplicationsData aggregatorRobustness (computer science)Information and Communications TechnologySoftware deploymentScalability0202 electrical engineering electronic engineering information engineeringbusinessWireless sensor networkComputer networkInternational Journal of Network Management
researchProduct

Subjective Logic-Based In-Network Data Processing for Trust Management in Collocated and Distributed Wireless Sensor Networks

2018

While analyzing an explosive amount of data collected in today’s wireless sensor networks (WSNs), the redundant information in the sensed data needs to be handled. In-network data processing is a technique which can eliminate or reduce such redundancy, leading to minimized resource consumption. On the other hand, trust management techniques establish trust relationships among nodes and detect unreliable nodes. In this paper, we propose two novel in-network data processing schemes for trust management in static WSNs. The first scheme targets at networks, where sensor nodes are closely collocated to report the same event. Considering both spatial and temporal correlations, this scheme generat…

021110 strategic defence & security studiesComputer scienceNode (networking)Reliability (computer networking)Distributed computing0211 other engineering and technologies020206 networking & telecommunications02 engineering and technologyEnergy consumptionSensor node0202 electrical engineering electronic engineering information engineeringRedundancy (engineering)Trust management (information system)Electrical and Electronic EngineeringSubjective logicInstrumentationWireless sensor networkIEEE Sensors Journal
researchProduct

Two novel subjective logic-based in-network data processing schemes in wireless sensor networks

2016

Wireless sensor networks (WSNs) consist of connected low-cost and small-size sensor nodes. The sensor nodes are characterized by various limitations, such as energy availability, processing power, and storage capacity. Typically, nodes collect data from an environment and transmit the raw or processed data to a sink. However, the collected data contains often redundant information. An in-network processing scheme attempts to eliminate or reduce such redundancy in sensed data. In this paper, we propose two in-network data processing schemes for WSNs, which are built based on a lightweight algebra for data processing. The schemes bring also benefits like decreased network traffic load and inc…

021110 strategic defence & security studiesData processingbusiness.industryComputer scienceVisual sensor networkReal-time computing0211 other engineering and technologies020206 networking & telecommunications02 engineering and technologySynthetic dataKey distribution in wireless sensor networks0202 electrical engineering electronic engineering information engineeringMobile wireless sensor networkWirelessbusinessSubjective logicWireless sensor network2016 IEEE 12th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
researchProduct

Recent advances of the multipactor RF breakdown in RF satellite microwave passive devices

2016

The main goal of this work is the review of the recent advances in the study of the multipactor RF breakdown phenomenon in RF satellite microwave passive devices for space telecommunication applications developed in the Val Space Consortium. In this work several topics related with the multipactor phenomenon will be discussed.

03 medical and health sciences0302 clinical medicineMaterials scienceNuclear magnetic resonance0202 electrical engineering electronic engineering information engineering020206 networking & telecommunicationsSatellite02 engineering and technologyRadio frequencyEngineering physics030217 neurology & neurosurgeryMicrowaveBreakdown phenomenon2016 Progress in Electromagnetic Research Symposium (PIERS)
researchProduct

β(3)‐Adrenoceptors in the normal and diseased urinary bladder—What are the open questions?

2019

β(3)‐Adrenoceptor agonists are used in the treatment of overactive bladder syndrome. Although the relaxant response to adrenergic stimulation in human detrusor smooth muscle cells is mediated mainly via β(3)‐adrenoceptors, the plasma concentrations of the therapeutic dose of mirabegron, the only clinically approved β(3)‐adrenoceptor agonist, are considerably lower than the EC(50) for causing direct relaxation of human detrusor, suggesting a mechanism of action other than direct relaxation of detrusor smooth muscle. However, the site and mechanism of action of β(3)‐adrenoceptor agonists in the bladder have not been firmly established. Postulated mechanisms include prejunctional suppression o…

0301 basic medicineAgonistmedicine.medical_specialtyAdrenergic receptormedicine.drug_classUrinary BladderAdrenergic beta-3 Receptor Agonistsurologic and male genital diseasesThemed Section: Review Articles03 medical and health sciences0302 clinical medicineTherapeutic indexDesensitization (telecommunications)Internal medicineMedicineAnimalsHumansPharmacologyUrinary bladderRelaxation (psychology)business.industry030104 developmental biologymedicine.anatomical_structureEndocrinologyMechanism of actionReceptors Adrenergic beta-3medicine.symptombusinessMirabegron030217 neurology & neurosurgerymedicine.drug
researchProduct

Network-Wide Adaptive Burst Detection Depicts Neuronal Activity with Improved Accuracy

2017

Neuronal networks are often characterized by their spiking and bursting statistics. Previously, we introducedan adaptive burst analysis methodwhich enhances the analysis power for neuronal networks with highly varying firing dynamics. The adaptation is based on single channels analyzing each element of a network separately. Such kind of analysis was adequate for the assessment of local behavior, where the analysis focuses on the neuronal activity in the vicinity of a single electrode. However, the assessment of the whole network may be hampered, if parts of the network are analyzed using different rules. Here, we test how using multiple channels and measurement time points affect adaptive b…

0301 basic medicineComputer scienceNeuroscience (miscellaneous)Interval (mathematics)Machine learningcomputer.software_genreta3112lcsh:RC321-57103 medical and health sciencesCellular and Molecular NeuroscienceBursting0302 clinical medicineMoving averageHistogramMethodsCluster analysislcsh:Neurosciences. Biological psychiatry. Neuropsychiatryta113network classificationbusiness.industryEmphasis (telecommunications)Pattern recognition217 Medical engineeringlaskennallinen neurotiede113 Computer and information sciencesPower (physics)030104 developmental biologymicroelectrode arraysburst detectionburst synchronySpike (software development)Artificial intelligenceneuronal networksbusinesscomputer030217 neurology & neurosurgeryNeurosciencecomputational neuroscienceFrontiers in Computational Neuroscience
researchProduct