Search results for "Telecommunication"

showing 10 items of 1769 documents

Attribute based access control scheme with controlled access delegation for collaborative E-health environments

2017

Abstract Modern electronic healthcare (e-health) settings constitute collaborative environments with complex access requirements. Thus, there is a need for sophisticated fine-grained access control mechanisms to cater these access demands and thereby experience the full potential of e-health systems. In order to realize a flexible access control scheme, integrating access delegation is of paramount importance. However, access delegation has to be enforced in a controlled manner so that it will not jeopardize the security of the system. In this paper, we addressed this issue through proposing an attribute based access control scheme integrated with controlled access delegation capabilities. …

Scheme (programming language)Computer access controlDelegationRevocationComputer Networks and CommunicationsComputer sciencebusiness.industrymedia_common.quotation_subject020206 networking & telecommunications020207 software engineeringProvisioningAccess control02 engineering and technologyComputer securitycomputer.software_genre0202 electrical engineering electronic engineering information engineeringPhysical accessRole-based access controlSafety Risk Reliability and QualitybusinesscomputerSoftwaremedia_commoncomputer.programming_languageJournal of Information Security and Applications
researchProduct

Reducing Overhearing Energy in Wake-Up Radio-Enabled WPANs: Scheme and Performance

2018

Wake-up Radio (WuR)-enabled wireless personal area networks (WPANs) are more popular over conventional WPANs thanks to WuR's on-demand transmission feature and overwhelming energy consumption superiority. In a WuRenabled WPAN, overhearing occurs when a wake-up receiver decodes and validates the address of a wake-up call which is not intended to it. However, such overhearing consumes a portion of the required reception energy for unintended nodes. To diminish overhearing thus conserve total reception energy in a network, we propose a bit-by-bit address decoding (BBAD) scheme and compare it with another addressing scheme for WuR that uses a micro-controller unit to decode and match the whole …

Scheme (programming language)Computer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS010401 analytical chemistryTestbed020206 networking & telecommunications02 engineering and technologyEnergy consumption01 natural sciences0104 chemical sciencesTransmission (telecommunications)0202 electrical engineering electronic engineering information engineeringWirelessbusinesscomputerEnergy (signal processing)Decoding methodsComputer networkcomputer.programming_language2018 IEEE International Conference on Communications (ICC)
researchProduct

UAV Communication Strategies in the Next Generation of Mobile Networks

2020

| openaire: EC/H2020/857031/EU//5G!Drones The Next Generation of Mobile Networks (NGMN) alliance advocates the use of different means to support vehicular communications. This aims to cope with the massive data generated by these devices which could affect the Quality of Service (QoS) of the associated applications, but also the overall operation carried out by the vehicles. However, efficient communication strategies must be considered in order to select, for each vehicle, the communication mean ensuring the best QoS. In this paper, we tackle this issue and we propose efficient communication strategies for Unmanned Aerial Vehicles (UAVs). In addition to direct UAV-to-Infrastructure communi…

Scheme (programming language)Computer sciencebusiness.industryQuality of serviceNode (networking)05 social sciencesComputerApplications_COMPUTERSINOTHERSYSTEMS050801 communication & media studies020206 networking & telecommunications02 engineering and technologySpectral efficiencylaw.inventionUAV-to-Infrastructure (U2I)0508 media and communicationsRelaylawUAV-to-UAV (U2U)0202 electrical engineering electronic engineering information engineeringbusinessMobile NetworksUnmanned Aerial Vehicles (UAVs)computerComputer networkcomputer.programming_language
researchProduct

Blockchain Based Delegatable Access Control Scheme for a Collaborative E-Health Environment

2018

Modern electronic healthcare (e-health) settings constitute collaborative environments requiring sophisticated fine-grained access control mechanisms to cater their access demands. Access delegatability is quite crucial to realize fine-grained, flexible access control schemes compatible with such environments. In this paper, we addressed this issue through proposing an attribute based access control scheme integrated with controlled access delegation capabilities suitable for a multi-domain e-health environment. We have utilized the blockchain technology to manage attribute assignments, delegations as well as revocations. The scheme enables delegations in a controlled manner without jeopard…

Scheme (programming language)DelegationRevocationbusiness.industryComputer sciencemedia_common.quotation_subject010401 analytical chemistryControl (management)Overhead (engineering)020206 networking & telecommunicationsAccess control02 engineering and technologyAttribute-based access controlComputer securitycomputer.software_genre01 natural sciences0104 chemical sciences0202 electrical engineering electronic engineering information engineeringInformationSystems_MISCELLANEOUSbusinessKey managementcomputermedia_commoncomputer.programming_language2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)
researchProduct

An analytical model of a new packet marking algorithm for TCP flows: Preliminary insights

2004

In differentiated services networks, packet marking schemes can be devised to differentiate packets belonging to a same TCP flow, with the goal of improving the experienced performance. This paper presents an analytical model for an adaptive packet marking scheme proposed in our previous work. The model combines three specific sub-models aimed at describing i) the TCP sources aggregate ii) the marker, and iii) the network status. Some preliminary simulative results seem to validate the model.

Scheme (programming language)Flowchartbusiness.industryComputer scienceNetwork packetComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSTelecommunications serviceTCP tuninglaw.inventionIntelligent NetworkPacket switchingDifferentiated serviceslawbusinesscomputerComputer networkcomputer.programming_language
researchProduct

5G Functional Architecture and Signaling Enhancements to Support Path Management for eV2X

2019

Enhanced vehicle-to-everything (eV2X) communication is one of the most challenging use cases that the fifth generation (5G) of cellular mobile communications must address. In particular, eV2X includes some 5G vehicular applications targeting fully autonomous driving which require ultra-high reliability. The usual approach to providing vehicular communication based on single-connectivity transmission, for instance, through the direct link between vehicles (PC5 interface), often fails at guaranteeing the required reliability. To solve such a problem, in this paper, we consider a scheme where the radio path followed by eV2X messages can be proactively and dynamically configured to either trans…

Scheme (programming language)General Computer ScienceComputer scienceDistributed computingInterface (computing)Reliability (computer networking)02 engineering and technology0202 electrical engineering electronic engineering information engineeringGeneral Materials ScienceUse casecomputer.programming_languageMulti-connectivitybusiness.industryGeneral Engineering020206 networking & telecommunications5G coreTransmission (telecommunications)Path (graph theory)V2Xsidelink020201 artificial intelligence & image processinglcsh:Electrical engineering. Electronics. Nuclear engineeringMobile telephonybusinesslcsh:TK1-9971computer5GIEEE Access
researchProduct

Multi-beam cooperative frequency reuse for coordinated multi-point transmission

2010

Coordinated multi-point (CoMP) joint transmission is considered in the 3rd generation partnership project (3GPP) long term evolution (LTE)-advanced as a key technique to mitigate inter-cell interference and improve the cell-edge performance. To effectively apply CoMP joint transmission, efficient frequency reuse schemes need to be designed to support resource management cooperation among coordinated cells. However, most of the existing frequency reuse schemes are not suitable for CoMP systems due to not considering multi-point joint transmission scenarios in their frequency reuse rules. In addition, the restrictions of frequency resources in those schemes result in a high blocking probabili…

Scheme (programming language)Operations researchComputer Networks and CommunicationsComputer scienceDistributed computingInterference (wave propagation)Blocking (statistics)LTE AdvancedTelecomunicacióTransmission (telecommunications)Signal ProcessingKey (cryptography)Resource managementThroughput (business)computerComunicació i tecnologiaInformation Systemscomputer.programming_language
researchProduct

Priority-based initial access for URLLC traffic in massive IoT networks: Schemes and performance analysis

2020

Abstract At a density of one million devices per square kilometer, the10’s of billions of devices, objects, and machines that form a massive Internet of things (mIoT) require ubiquitous connectivity. Among a massive number of IoT devices, a portion of them require ultra-reliable low latency communication (URLLC) provided via fifth generation (5G) networks, bringing many new challenges due to the stringent service requirements. Albeit a surge of research efforts on URLLC and mIoT, access mechanisms which include both URLLC and massive machine type communications (mMTC) have not yet been investigated in-depth. In this paper, we propose three novel schemes to facilitate priority-based initial …

Scheme (programming language)Service (systems architecture)Computer Networks and CommunicationsComputer sciencebusiness.industryReliability (computer networking)Frame (networking)020206 networking & telecommunications02 engineering and technologyTransmission (telecommunications)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingLatency (engineering)businesscomputerVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 5505GRandom accesscomputer.programming_languageComputer network
researchProduct

Optimal Buffer Resource Allocation in Wireless Caching Networks

2019

Wireless caching systems have been exhaustively investigated in recent years. Due to limited buffer capacity, and unbalanced arrival and service rates, the backlogs may exist in the caching node and even cause buffer overflow. In this paper, we first investigate the relationship among backlogs, buffer capacity, data arrival rate and service rate, utilizing the martingale theory which is flexible in handling any arrival and service processes. Then given a target buffer overflow probability, the minimal required buffer portion is determined. If the devoted buffer capacity can fulfill all serving users' minimal buffer requirements, an optimization problem is constructed with the objective to m…

Scheme (programming language)Service (systems architecture)Hardware_MEMORYSTRUCTURESOptimization problembusiness.industryComputer scienceNode (networking)020302 automobile design & engineering020206 networking & telecommunications02 engineering and technologyoptimal buffer resource allocationwireless caching networksBuffer (optical fiber)langaton tiedonsiirto0203 mechanical engineeringoptimointi0202 electrical engineering electronic engineering information engineeringResource allocation (computer)Wirelessbusinesscomputerlangattomat verkotBuffer overflowComputer networkcomputer.programming_language
researchProduct

A symbolic distributed event detection scheme for Wireless Sensor Networks

2016

Due to the possibility of extensive and pervasive deployment of many tiny sensor devices in the area of interest, Wireless Sensor Networks (WSNs) result particularly suitable to detect significant events and to react accordingly in industrial and home scenarios. In this context, fuzzy inference systems for event detection in WSNs have proved to be accurate enough in treating imprecise sensory readings to decrease the number of false alarms. Besides reacting to event occurrences, the whole network may infer more information to enrich the event semantics resulting from reasoning processes carried out on the individual nodes. Contextual knowledge, including spatial and temporal relationships, …

Scheme (programming language)Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniComputer scienceProcess (engineering)Event (computing)020208 electrical & electronic engineeringEvent DetectionForth020206 networking & telecommunicationsContext (language use)02 engineering and technologySymbolic Processingcomputer.software_genreDistributed SystemSoftware deployment0202 electrical engineering electronic engineering information engineeringData miningWireless sensor networkcomputerWireless Sensor Networkcomputer.programming_language
researchProduct