Search results for "Telecommunication"

showing 10 items of 1769 documents

Occupational Exposure to Extremely Low-Frequency Magnetic Fields and Risk of Amyotrophic Lateral Sclerosis : Results of a Feasibility Study for a Poo…

2021

Bioelectromagnetics 42(4), 271-283 (2021). doi:10.1002/bem.22335

Riskmedicine.medical_specialtyPhysiologyPooling610 MedizinBiophysics02 engineering and technology030218 nuclear medicine & medical imaging03 medical and health sciencesElectromagnetic Fields0302 clinical medicine610 Medical sciencesOccupational ExposureEnvironmental healthEpidemiology0202 electrical engineering electronic engineering information engineeringmedicineHumansRadiology Nuclear Medicine and imagingSocioeconomic statusExposure assessmentbusiness.industryAmyotrophic Lateral SclerosisConfounding020206 networking & telecommunicationsGeneral MedicineMagnetic FieldsRelative riskEtiologyFeasibility StudiesPopulation studybusiness
researchProduct

Wireless HROV Control with Compressed Visual Feedback Using Acoustic and RF Links

2020

AbstractUnderwater cooperative robotics offers the possibility to perform challenging intervention applications, such as recovering archeological objects as within the context of the MERBOTS research project, or grasping, transporting and assembly of big objects, using more than one mobile manipulator, as faced by the TWINBOT project. In order to enhance safety during the intervention, it is reasonable to avoid the umbilical, also giving more mobility to the robots, and enabling a broader set of cooperative movements. Several solutions, based on acoustic, radiofrequency (RF) or Visual Light Communication (VLC) have been proposed for underwater communications in the literature. This paper pr…

Robotics Network simulation0209 industrial biotechnologyComputer scienceInterface (computing)Time division multiple access02 engineering and technologyIndustrial and Manufacturing Engineering020901 industrial engineering & automationArtificial IntelligenceInformàticateleoperationWirelessElectrical and Electronic EngineeringNetwork packetbusiness.industryMobile manipulatorMechanical EngineeringXarxes locals sense fil Wi-Fi021001 nanoscience & nanotechnologyunderwater communicationsTransmission (telecommunications)Control and Systems EngineeringTeleoperation0210 nano-technologybusinessSoftwareComputer hardwareUnderwater acoustic communicationJournal of Intelligent & Robotic Systems
researchProduct

A vision-based fully automated approach to robust image cropping detection

2020

Abstract The definition of valid and robust methodologies for assessing the authenticity of digital information is nowadays critical to contrast social manipulation through the media. A key research topic in multimedia forensics is the development of methods for detecting tampered content in large image collections without any human intervention. This paper introduces AMARCORD (Automatic Manhattan-scene AsymmetRically CrOpped imageRy Detector), a fully automated detector for exposing evidences of asymmetrical image cropping on Manhattan-World scenes. The proposed solution estimates and exploits the camera principal point, i.e., a physical feature extracted directly from the image content th…

Robust computer visionExploitComputer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONRobust statisticsImage processing02 engineering and technologyCropping detectionMultimedia forensicRobustness (computer science)0202 electrical engineering electronic engineering information engineeringMultimedia Forensics Robust Computer Vision Cropping Detection Image Content AnalysisComputer visionElectrical and Electronic EngineeringSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniSettore INF/01 - InformaticaVision basedbusiness.industryDetectorImage content analysi020206 networking & telecommunicationsFully automatedSignal Processing020201 artificial intelligence & image processingComputer Vision and Pattern RecognitionArtificial intelligencebusinessCroppingSoftwareSignal Processing: Image Communication
researchProduct

DECENTRALIZED SUBSPACE PROJECTION IN LARGE NETWORKS

2018

A great number of applications in wireless sensor networks involve projecting a vector of observations onto a subspace dictated by prior information. Accomplishing such a task in a centralized fashion entails great power consumption, congestion at certain nodes, and suffers from robustness issues. A sensible alternative is to compute such projections in a decentralized fashion. To this end, recent works proposed schemes based on graph filters, which compute projections exactly with a finite number of local exchanges among sensor nodes. However, existing methods to obtain these filters are confined to reduced families of projection matrices or small networks. This paper proposes a method tha…

Robustness (computer science)Large networksComputer scienceDistributed computing0202 electrical engineering electronic engineering information engineeringGraph (abstract data type)020206 networking & telecommunications02 engineering and technologyWireless sensor networkFinite setPrior informationSubspace topology2018 IEEE Global Conference on Signal and Information Processing (GlobalSIP)
researchProduct

AQM generalized nyquist stability in multiple bottleneck networks

2005

Abstract The influence of multiple bottlenecks on the stability of Active Queue Management (AQM) controllers, usually configured on a single bottleneck basis is discussed. We consider a network scenario where RED is configured at each router according to previously developed control theoretic techniques. These configuration rules assure stability in a single bottleneck scenario. We show that instability may arise when two links become congested. We justify this result through a multiple bottleneck model using the Generalized Nyquist stability criterion.

RouterBasis (linear algebra)Communication networks; Control theory; Stability analysis;Control theoryNyquist stability criterionStability (learning theory)Active queue managementTelecommunications networkBottleneckMathematics
researchProduct

Algorithmic Complexity Vulnerability Analysis of a Stateful Firewall

2016

Algorithmic complexity vulnerabilities are an opportunity for an ad-versary to conduct a sophisticated kind of attack i.e. on network infrastructure services. Such attacks take advantage of worst case time or space complexity of algorithms implemented on devices in their software. In this paper we address potential risks introduced by such algorithmic behavior in computer networks in particular on a stateful firewall. First we introduce the idea and theoretical background for the attack. We then describe in full detail a successfully con-ducted attack which takes advantage of the worst case computational complexi-ty of O(n2) of a hash table data structure used to store active sessions. The …

RouterComputer sciencenetwork vulnerabilitiesDenial-of-service attack02 engineering and technologyNetwork topologyComputer securitycomputer.software_genreFirewall (construction)Stateful firewall0202 electrical engineering electronic engineering information engineeringDenial of Servicecomplexity attackcomputational complexitybusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunicationsHash tablese-curitycomputer networksDoSbusinessSegmentation faultcomputerRebootComputer network
researchProduct

Flexible Spare Core Placement in Torus Topology based NoCs and its validation on an FPGA

2021

In the nano-scale era, Network-on-Chip (NoC) interconnection paradigm has gained importance to abide by the communication challenges in Chip Multi-Processors (CMPs). With increased integration density on CMPs, NoC components namely cores, routers, and links are susceptible to failures. Therefore, to improve system reliability, there is a need for efficient fault-tolerant techniques that mitigate permanent faults in NoC based CMPs. There exists several fault-tolerant techniques that address the permanent faults in application cores while placing the spare cores onto NoC topologies. However, these techniques are limited to Mesh topology based NoCs. There are few approaches that have realized …

RouterGeneral Computer ScienceComputer scienceMesh networkingTopology (electrical circuits)02 engineering and technologyNetwork topologyTopology0202 electrical engineering electronic engineering information engineeringcommunication costGeneral Materials Sciencetorus topologyspare coreInteger programmingGeneral Engineering020206 networking & telecommunicationsFault injectionNetwork-on-chipfault-tolerance020202 computer hardware & architectureVDP::Teknologi: 500Spare partapplication mappingSimulated annealinglcsh:Electrical engineering. Electronics. Nuclear engineeringlcsh:TK1-9971
researchProduct

<title>Revenue-maximization-based adaptive WFQ</title>

2002

In the future Internet, di erent applications such as Voice over IP (VoIP) and Video-on-Demand (VoD) arise with di erent Quality of Service (QoS) parameters including e.g. guaranteed bandwidth, delay jitter, and latency. Different kinds of service classes (e.g. gold, silver, bronze) arise. The customers of di erent classes pay di erent prices to the service provider, who must share resources in a plausible way. In a router, packets are queued using a multi-queue system, where each queue corresponds to one service class. In this paper, an adaptive Weighted Fair Queue based algorithm for traAEc allocation is presented and studied. The weights in gradient type WFQ algorithm are adapted using r…

RouterService qualityVoice over IPAdaptive algorithmbusiness.industryNetwork packetComputer scienceQuality of serviceReal-time computingService providerTelecommunications networklaw.inventionlawInternet ProtocolRevenueThe InternetbusinessQueueWeighted fair queueingComputer networkSPIE Proceedings
researchProduct

A new Scheme for RPL to handle Mobility in Wireless Sensor Networks

2017

Mobile wireless sensor networks (WSNs) are characterised by dynamic changes in the network topology leading to route breaks and disconnections. The IPv6 routing protocol for low power and lossy networks (RPL), which has become a standard, uses the Trickle timer algorithm to handle changes in the network topology. However, neither RPL nor Trickle timer are well adapted to mobility. This paper investigates the problem of supporting mobility when using RPL. It enhances RPL to fit with sensors' mobility by studying two cases. Firstly, it proposes to modify RPL in order to fit with a dynamic and hybrid topology in the context of medical applications. Secondly, it investigates a more general case…

Routing protocol020203 distributed computingComputer Networks and CommunicationsComputer sciencebusiness.industryNetwork packetComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunicationsContext (language use)02 engineering and technologyNetwork topologyIPv6Key distribution in wireless sensor networksHardware and Architecture0202 electrical engineering electronic engineering information engineeringTimerbusinessWireless sensor networkSoftwareComputer networkInternational Journal of Ad Hoc and Ubiquitous Computing
researchProduct

I-RP: Interference Aware Routing Protocol for WBAN

2018

The Wireless Body Sensor Networks (WBSN) have witnessed tremendous research interest because of their wide range of applications (medical and non-medical) in order to improve the quality of life. The healthcare applications of WBSN demands dissemination of patient’s data, reliably and in a timely manner. For this purpose, medical teams may use real-time applications for disseminating critical data such as blood pressure, ECG, and EEG. The critical data packets are highly delay sensitive that must reach intended destination within time constraints. Due to the exchange of real-time and multi-media data, some nodes or links may experience the significant level of interference in the network. C…

Routing protocol021103 operations researchNetwork packetComputer sciencebusiness.industryQuality of serviceRetransmissionComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS0211 other engineering and technologies020206 networking & telecommunications02 engineering and technologyMetricsBody area network0202 electrical engineering electronic engineering information engineeringRouting (electronic design automation)businessWireless sensor networkComputer network
researchProduct