Search results for "Telecommunication"
showing 10 items of 1769 documents
Ontological Analysis and Modularization of CIDOC-CRM
2020
Conference cancelled due to COVID19; International audience; The CIDOC-CRM ontology is a standard for cultural heritage data modeling. Despite its large exploitation, the ontology is primarily maintained in a semi-formal notation, which makes it difficult to homogeneously exploit it in digital environments. In addition, the ontology consists of several classes and relations, whereas one sometimes wishes to reuse it but only partially. The purpose of the paper is to contribute to the use of CIDOC by strengthening its foundations. On the basis of formal ontology theories, we propose a first analysis of the ontology to enhance its conceptual structure. We also present a preliminary modularizat…
Lightweight Relay Selection in Multi-Hop Wake-Up Radio Enabled IoT Networks
2018
Wake-up Radios (WuRs) are becoming more popular in Internet of Things (IoT) networks owing to their overwhelming advantages such as low latency, high energy saving, and on-demand communication. In a multi-hop WuR-IoT network, route establishment between source and destination prior to actual data communications consumes a significant portion of energy. To reduce energy consumption and protocol overhead for route establishment, we propose a lightweight relay (LR) selection scheme, referred to as LR-WuR, where a lookup table and acknowledgment are used for next hop relay selection. We develop an analytical model to evaluate the performance of LR-WuR. Extensive simulations are performed to val…
Performance Analysis of M-Ary PSK Modulation Schemes over Multiple Double Rayleigh Fading Channels with EGC in Cooperative Networks
2010
This article studies the performance of M-ary phase shift keying (PSK) modulation schemes over mobile-to-mobile (M2M) fading channels with equal gain combining (EGC) in cooperative networks. The frequency-nonselective M2M fading channels are modeled assuming non-line-of-sight (NLOS) propagation conditions. Furthermore, a dual-hop amplify-and-forward relay type cooperative network is taken into consideration here. It is assumed that K diversity branches are present between the source mobile station and the destination mobile station via K mobile relays. The performance of M-ary PSK modulation schemes is analyzed by evaluating the average bit error probability (BEP). We have derived a simple …
Multi-Antenna Covert Communication With Jamming in the Presence of a Mobile Warden
2021
Covert communication can hide the information transmission process from the warden to prevent adversarial eavesdropping. However, it becomes challenging when the warden can move. In this paper, we propose a covert communication scheme against a mobile warden, which maximizes the connectivity throughput between a multi-antenna transmitter and a full-duplex jamming receiver with the covert outage probability (COP) limit. First, we analyze the monotonicity of the COP to obtain the optimal location the warden can move. Then, under this worst situation, we optimize the transmission rate, the transmit power and the jamming power of covert communication to maximize the connection throughput. This …
Directive local color transfer based on dynamic look-up table
2019
Abstract Color transfer in image processing usually suffers from misleading color mapping and loss of details. This paper presents a novel directive local color transfer method based on dynamic look-up table (D-DLT) to solve these problems in two steps. First, a directive mapping between the source and the reference image is established based on the salient detection and the color clusters to obtain directive color transfer intention. Then, dynamic look-up tables are created according to the color clusters to preserve the details, which can suppress pseudo contours and avoid detail loss. Subjective and objective assessments are presented to verify the feasibility and the availability of the…
Towards a SDN-based architecture for analyzing network traffic in cloud computing infrastructures
2015
Currently, network traffic monitoring tools do not fit well in the monitoring of cloud computing infrastructures. These tools are not integrated with the control plane of the cloud computing stack. This lack of integration causes a deficiency in the handling of the re-usage of IP addresses along virtual machines, a lack of adaption and reaction on highly frequent topology changes, and a lack of accuracy in the metrics gathered for the networking traffic flowing along the cloud infrastructure. The main contribution of this paper is to provide a novel SDN-based architecture to carry out the monitoring of network traffic in cloud infrastructures. The architecture in based on the integration be…
Capacity studies of spatially correlated MIMO Rice channels
2010
In this paper, we have studied the statistical properties of the capacity of spatially correlated multiple-input multiple-output (MIMO) Rice channels. We have derived an exact closed-form expression for the probability density function (PDF) and an exact expression for the cumulative distribution function (CDF) of the channel capacity for single-input multiple-output (SIMO) and multiple-input single-output (MISO) systems. Furthermore, an accurate closed-form expression has been derived for the level-crossing rate (LCR) and an accurate expression has been obtained for the average duration of fades (ADF) of the SIMO and MISO channel capacities. For the MIMO case, we have investigated the PDF,…
A spatial role-based authorization framework for sensor network-assisted indoor WLANs
2009
©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Article also available from publisher: http://dx.doi.org/10.1109/WIRELESSVITAE.2009.5172549 In this paper, we propose a spatial role-based authorization framework which specifies authorization based on both role and location constrains in a wireless local area network with assistance from a sensor network. The framework performs a location-restricted verificati…
Defending Surveillance Sensor Networks Against Data-Injection Attacks Via Trusted Nodes
2018
By injecting false data through compromised sensors, an adversary can drive the probability of detection in a sensor network-based spatial field surveillance system to arbitrarily low values. As a countermeasure, a small subset of sensors may be secured. Leveraging the theory of Matched Subspace Detection, we propose and evaluate several detectors that add robustness to attacks when such trusted nodes are available. Our results reveal the performance-security tradeoff of these schemes and can be used to determine the number of trusted nodes required for a given performance target.
Technologies for green radio communication networks
2011
Since the introduction of cellular communications in the early '80s, the demand for two-way mobile communication services has increased tremendously. Today there are over 4 billion mobile users and 4.6 million radio base station sites worldwide. This rapid growth of the cellular mobile industry has been at the price of increased energy consumption and a sizable carbon footprint.