Search results for "TELECOMMUNICATIONS"

showing 10 items of 1639 documents

DTMC modeling for performance evaluation of DW-MAC in wireless sensor networks

2016

Synchronized duty cycling (DC) aligns sensor nodes to wake up at the same time in order to reduce idle listening for medium access control (MAC) in wireless sensor networks (WSNs). Demand wakeup MAC (DW-MAC) is a popular synchronous DC MAC protocol which allows nodes to compete and transmit multiple packets in one operational cycle. This multiple packet transmission (MPT) feature makes DW-MAC more energy efficient when comparing with other existing single time competition based protocols such as sensor MAC (S-MAC). In the literature, no analytical model exists to evaluate the performance of DW-MAC. In this paper, we develop two associated discrete time Markov chain (DTMC) models and incorpo…

business.industryComputer scienceNetwork packetComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS010401 analytical chemistryReal-time computing020206 networking & telecommunications02 engineering and technologyEnergy consumption01 natural sciencesSynchronization0104 chemical sciencesComputer Science::PerformanceKey distribution in wireless sensor networksComputer Science::Networking and Internet Architecture0202 electrical engineering electronic engineering information engineeringMobile wireless sensor networkMultiple Access with Collision Avoidance for WirelessbusinessWireless sensor networkComputer Science::Information TheoryEfficient energy useComputer network2016 IEEE Wireless Communications and Networking Conference
researchProduct

Bluetooth throughput measures for cardiomyocyte extracellular signal telemetry

2006

In this contribution the suitability of the Bluetooth transmission system is analyzed for its application to the realtime transmission of cardiac signals captured by micro-electrode array sensors. The required data rates for this type of cardiac signals are calculated to be 180 kbps for every single micro- electrode. The mean throughput value varies with the selected packet size: for packet sizes less than 1000 bytes the mean throughput is smaller than 180 kbps while for packet sizes greater than 1000 bytes the mean throughput saturates at around 230 kbps. This mean throughput value is guaranteed for over 80% of the time. Compression algorithms running on the sensor array allow the reductio…

business.industryComputer scienceNetwork packetComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSTransmission systemlaw.inventionBluetoothTransmission (telecommunications)Sensor arraylawEmbedded systembusinessThroughput (business)Computer hardwareData transmissionData compression2006 3rd International Symposium on Wireless Communication Systems
researchProduct

Probabilistic Transition-Based Approach for Detecting Application-Layer DDoS Attacks in Encrypted Software-Defined Networks

2017

With the emergence of cloud computing, many attacks, including Distributed Denial-of-Service (DDoS) attacks, have changed their direction towards cloud environment. In particular, DDoS attacks have changed in scale, methods, and targets and become more complex by using advantages provided by cloud computing. Modern cloud computing environments can benefit from moving towards Software-Defined Networking (SDN) technology, which allows network engineers and administrators to respond quickly to the changing business requirements. In this paper, we propose an approach for detecting application-layer DDoS attacks in cloud environment with SDN. The algorithm is applied to statistics extracted from…

business.industryComputer scienceProbabilistic logic020206 networking & telecommunicationsDenial-of-service attackCloud computing02 engineering and technologyEncryptionApplication layeranomaly detectionDDoS attackSDNprobabilistic model0202 electrical engineering electronic engineering information engineeringbehavior pattern020201 artificial intelligence & image processingAnomaly detectionCluster analysisbusinessSoftware-defined networkingComputer networkclustering
researchProduct

Service level guarantee framework for IoT environments

2017

Nowadays, providing IoT environments with service level guarantee is a challenging task. We propose a framework for IoT service level guarantee thanks to several specific Service Level Agreements (SLAs) for IoT environments. We specify different SLAs for each entity contributing in our IoT architecture in order to conclude a global SLA called IoT-SLA (iSLA). These different SLAs enable IoT service provision with Quality of Service (QoS) guarantee. Achieving this guarantee requires several communications and interactions between the components of the proposed IoT architecture. These interactions allow an IoT Service Provider (IoT-SP) to conclude the iSLA with an IoT Client (IoT-C). We specif…

business.industryComputer scienceQuality of service020206 networking & telecommunications02 engineering and technologyService providerTask (project management)Order (business)Service level0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinessInternet of ThingsComputer networkProceedings of the 1st International Conference on Internet of Things and Machine Learning
researchProduct

Channel Occupancy-Based Dynamic Spectrum Leasing in Multichannel CRNs: Strategies and Performance Evaluation

2016

Spectrum leasing has been proposed as an effective approach for enabling more flexible spectrum utilization in CRNs. In CRNs, a primary network (PN) which consists of multiple primary users (PUs) can lease part of the licensed spectrum to secondary users (SUs) in exchange for operational benefits. The focus of this study is to investigate how and to what extent the PN allows spectrum leasing in CRNs, considering the QoS requirements of the PN and the secondary network (SN). Correspondingly, we propose two dynamic spectrum leasing strategies, which can improve the QoS performance of SUs while ensuring sufficient remuneration for PUs. In order to dynamically adjust the portion of leased bandw…

business.industryComputer scienceQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSComputerApplications_COMPUTERSINOTHERSYSTEMS020206 networking & telecommunications020302 automobile design & engineering02 engineering and technologyBlocking (statistics)Cognitive radioDigital subscriber line0203 mechanical engineeringDynamic pricing0202 electrical engineering electronic engineering information engineeringResource allocationNetwork performanceElectrical and Electronic EngineeringbusinessSimulationComputer networkIEEE Transactions on Communications
researchProduct

A Hybrid Algorithm Based on WiFi for Robust and Effective Indoor Positioning

2019

Indoor positioning based on the Wireless Fidelity (WiFi) protocol and the Pedestrian Dead Reckoning (PDR) approach is widely exploited because of the existing WiFi infrastructure in buildings and the advancement of built-in smartphone sensors. In this work, a hybrid algorithm that combines WiFi fingerprinting and PDR to both exploit their advantages as well as limiting the impact of their disadvantages is proposed. Specifically, to build a probability map from noisy Received Signal Strength (RSS), a Gaussian Process (GP) regression is deployed to estimate and construct the RSS fingerprints with incomplete data. Mean and variance of generated points are used to estimate WiFi fingerprinting p…

business.industryComputer scienceRSSReal-time computingComputingMilieux_LEGALASPECTSOFCOMPUTING020206 networking & telecommunications02 engineering and technologycomputer.file_formatHybrid algorithmData setsymbols.namesakeInertial measurement unitDead reckoning0202 electrical engineering electronic engineering information engineeringsymbolsWireless020201 artificial intelligence & image processingbusinessParticle filterVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Gaussian processcomputer2019 19th International Symposium on Communications and Information Technologies (ISCIT)
researchProduct

Energy Efficient Optimization for Solar-Powered UAV Communications System

2021

In this work, we explore the energy efficiency optimization for a solar-powered unmanned aerial vehicle (UAV) communications system. We consider a scenario where a number of ground users (GUs) connect with a solar-powered multi-antenna UAV over a wireless link. First, we are able to derive the relations between the uplink data rate and heading angle of UAV and transmission power of GUs. In addition, the harvested energy from solar light is also affected by UAV’s angle. Accordingly, with the objective to maximize the energy efficiency that is related to uplink data rate and energy consumption, we propose to dynamically adjust the UAV trajectory and gesture, by optimizing its velocity, accele…

business.industryComputer scienceReal-time computingComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONComputerApplications_COMPUTERSINOTHERSYSTEMSEnergy consumptionCommunications systemComputer Science::Multiagent SystemsComputer Science::RoboticsTransmission (telecommunications)Computer Science::Systems and ControlTelecommunications linkTrajectoryWirelessComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMSbusinessEnergy (signal processing)Efficient energy use2021 IEEE International Conference on Communications Workshops (ICC Workshops)
researchProduct

Experimental Characterization of Mobile Fading Channels Aiming the Design of Non-Wearable Fall Detection Radio Systems at 5.9 GHz

2016

One of the major concerns for the independent living of elderlies is a fall incident. To decrease human interaction errors and user privacy concerns of existing fall detection systems, a new generation of fall detection systems is emerging. The new trend is to design non-wearable devices that can monitor the physical activities of the home user using radio waves reflected off the body. This paper reports an in-home radio measurement campaign at 5.9 GHz, which has been conducted to study the impacts of different physical activities of the user, including fall incidents, on the channel transfer function (CTF) and the power delay profile (PDP) of indoor mobile radio channels. The home is equip…

business.industryComputer scienceReal-time computingElectrical engineeringWearable computer020206 networking & telecommunicationsDifferential (mechanical device)02 engineering and technology0202 electrical engineering electronic engineering information engineeringKey (cryptography)020201 artificial intelligence & image processingFadingbusinessPower delay profileRadio waveCommunication channel
researchProduct

Learning from Errors: Detecting ZigBee Interference in WiFi Networks

2014

In this work we show how to detect ZigBee interference on commodity WiFi cards by monitoring the reception errors, such as synchronization errors, invalid header formats, too long frames, etc., caused by ZigBee transmissions. Indeed, in presence of non-WiFi modulated signals, the occurrence of these types of errors follows statistics that can be easily recognized. Moreover, the duration of the error bursts depends on the transmission interval of the interference source, while the error spacing depends on the receiver implementation. On the basis of these considerations, we propose the adoption of hidden Markov chains for characterizing the behavior of WiFi receivers in presence of controlle…

business.industryComputer scienceSettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSReal-time computingwlan 802.11 802.15.4 frame error detection wireless coexistenceInterval (mathematics)Interference (wave propagation)SynchronizationLearning from errorsTransmission (telecommunications)HeaderbusinessHidden Markov modelComputer networkNeuRFon
researchProduct

GPON as a contribution to the construction of Smart Cities

2019

business.industryComputer scienceTelecommunicationsbusinessPassive optical network2019 14th Iberian Conference on Information Systems and Technologies (CISTI)
researchProduct