Search results for "Telecommunication"
showing 10 items of 1769 documents
An analytical study of mixed backoff schemes for QoS differentiation in wireless LAN
2009
In this paper, we propose an analytical model to evaluate performances of a wireless network composed by two groups of nodes using two different backoff schemes for channel access. The two different backoff schemes are used for QoS differentiation in term of priority. Our analysis results show that the priority group can have its performances enhanced, in term of saturation throughput and delay, without significant degradation of normal group nodes performances. This enhancement is also noticed for throughput efficiency at system level.
On building an infrastructure for mobile and wireless systems
2002
Over the last few years, there have been at least two dramatic changes in the way computers are used. The first has its origin in the fact that computers have become more and more connected to each other. The second was triggered by the increasing miniaturization and affordability of hardware components and power supplies, together with the development of wireless communication paths. These two trends combined have allowed the development of powerful, yet comparatively low-priced, portable computers. In spite of these changes, little attention has been given to reaching a common consensus and to the development of a strong infrastructure in this area.
Spectral properties of a variable period Bragg grating including a segment isolated of external deformations
2017
In this work the behavior of a Bragg grating of variable period (usually called a linearly chirped fiber Bragg grating — CFBG) is analyzed when a small portion of it is fixed so that its properties remain unchanged, while the rest of the grating is affected by a longitudinal deformation. The system was simulated using the Transfer Matrix Method to obtain its behavior under different levels of deformation and it was observed the appearance of negative peaks in the spectral response (transmission peaks). The analysis allowed characterizing the system with different sizes of the fixed portion (defects) (0.5 to 6 mm), for a grating with 10 cm long and 3 nm spectral width.
Narrow Band Solid-Liquid Composite Arrangements: Alternative Solutions for Phononic Crystal-Based Liquid Sensors
2019
Periodic elastic composite structures attract great attention. They offer the ability to design artificial properties to advance the control over the propagation of elastic/acoustic waves. In previous work, we drew attention to composite periodic structures comprising liquids. It was shown that the transmission spectrum of the structure, specifically a well-isolated peak, follows the material properties of liquid constituent in a distinct manner. This idea was realized in several liquid sensor concepts that launched the field of phononic crystal liquid sensors. In this work we introduce a novel concept&mdash
Your friends mention It. What about visiting it? A mobile social-based sightseeing application
2016
In this short poster paper, we present an application for suggesting attractions to be visited by users, based on social signal processing techniques.
Progressive Web Apps: the Definite Approach to Cross-Platform Development?
2018
Progressive Web Apps: The Possible Web-native Unifier for Mobile Development
2017
A novel policy-driven reversible anonymisation scheme for XML-based services
2015
Author's version of an article in the journal: Information Systems. Also available from the publisher at: http://dx.doi.org/10.1016/j.is.2014.05.007 This paper proposes a reversible anonymisation scheme for XML messages that supports fine-grained enforcement of XACML-based privacy policies. Reversible anonymisation means that information in XML messages is anonymised, however the information required to reverse the anonymisation is cryptographically protected in the messages. The policy can control access down to octet ranges of individual elements or attributes in XML messages. The reversible anonymisation protocol effectively implements a multi-level privacy and security based approach, s…
Hardware Computation of Moment Functions in a Silicon Retina Using Binary Patterns
2006
International audience; We present in this paper a method for implementing moment functions in a CMOS retina for shape recognition applications. The method is based on the use of binary patterns and it allows the computation of different moment functions such geometric and Zernike moments of any orders by an adequate choice of the binary patterns. The advantages of the method over other methods described in the literature is that it is particularly suitable for the design of a programmable retina circuit where moment functions of different orders are obtained by simply loading the correct binary patterns into the memory devices implemented on the circuit. The moment values computed by the m…
PTNet: An efficient and green data center network
2017
International audience; In recent years, data centers have witnessed an exponential growth for hosting hundreds of thousands of servers as well as to accommodating a very large demand for resources. To fulfill the required level of demand, some approaches tackled network aspects so to host a huge number of servers while others focused on delivering rapid services to the clients by minimizing the path length between any two servers. In general, network devices are often designed to achieve 1:1 oversubscription. Alternatively, in a realistic data center environment, the average utilization of a network could vary between 5% and 25%, and thus the energy consumed by idle devices is wasted. This…