Search results for "Telecommunication"

showing 10 items of 1769 documents

Fingerprint Quality Evaluation in a Novel Embedded Authentication System for Mobile Users

2015

The way people access resources, data and services, is radically changing using modern mobile technologies. In this scenario, biometry is a good solution for security issues even if its performance is influenced by the acquired data quality. In this paper, a novel embedded automatic fingerprint authentication system (AFAS) for mobile users is described. The goal of the proposed system is to improve the performance of a standard embedded AFAS in order to enable its employment in mobile devices architectures. The system is focused on the quality evaluation of the raw acquired fingerprint, identifying areas of poor quality. Using this approach, no image enhancement process is needed after the …

AuthenticationArticle SubjectComputer Networks and CommunicationsComputer sciencebusiness.industrymedia_common.quotation_subjectFingerprint (computing)Real-time computingFingerprint Verification CompetitionComputer Science Applications1707 Computer Vision and Pattern RecognitionTK5101-6720Fingerprint recognitionComputer Science ApplicationsComputer Networks and CommunicationEmbedded systemData qualityTelecommunicationMobile technologyQuality (business)businessMobile devicemedia_commonMobile Information Systems
researchProduct

A distributed detection and prevention scheme from malicious nodes in vehicular networks

2016

Summary Vehicular environments still remain vulnerable to various potential attacks because of continuous interactions and information exchange between vehicles despite the deployment of authentication techniques by communication standards. Therefore, an authenticated node with a certificate could initiate an attack while complying with implemented protocols. Some mechanisms were proposed to enhance communication technologies, but none of them was able to anticipate nodes' behavior. They also mismanage oscillating vehicles, because they evict them automatically after misbehaving. In this paper, we propose a preventive mechanism, namely, Intrusion Prevention and Detection System (IPDS), able…

AuthenticationVehicular ad hoc networkComputer Networks and CommunicationsComputer sciencebusiness.industryNode (networking)020206 networking & telecommunications02 engineering and technologyKalman filterCertificateComputer securitycomputer.software_genreSoftware deployment0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingElectrical and Electronic EngineeringRouting (electronic design automation)businesscomputerInformation exchangeComputer networkInternational Journal of Communication Systems
researchProduct

Application of Radio Environment Map Reconstruction Techniques to Platoon-based Cellular V2X Communications

2020

Vehicle platoons involve groups of vehicles travelling together at a constant inter-vehicle distance, with different common benefits such as increasing road efficiency and fuel saving. Vehicle platooning requires highly reliable wireless communications to keep the group structure and carry out coordinated maneuvers in a safe manner. Focusing on infrastructure-assisted cellular vehicle to anything (V2X) communications, the amount of control information to be exchanged between each platoon vehicle and the base station is a critical factor affecting the communication latency. This paper exploits the particular structure and characteristics of platooning to decrease the control information exch…

Automobile DrivingComputer scienceReal-time computingvehicular communications02 engineering and technologylcsh:Chemical technologyradio environment mapsBiochemistryArticleAnalytical ChemistryElectrònica0202 electrical engineering electronic engineering information engineeringlcsh:TP1-1185Electrical and Electronic EngineeringInstrumentationIntelligent transportation systemComunicació i tecnologiaSpatial AnalysisCommunicationintelligent transportation systems020206 networking & telecommunicationsModels Theoreticalchannel acquisitionAtomic and Molecular Physics and OpticsKrigingVehicle platooning020201 artificial intelligence & image processingPlatoonspatial interpolation5GReflection mapping5GSensors
researchProduct

A Two-Dimensional Autoregressive Model for MIMO Wideband Mobile Radio Channels

2008

In this work, we propose the multichannel two- dimensional (2D) autoregressive (AR) model for multiple-input multiple-output (MIMO) wideband mobile wireless channels. The parameters of the proposed model can be estimated from the real- world measurement data. For this purpose, we suggest using a straightforward extension of the prediction error minimization (PEM) algorithm. We also address the problem of possible instability of the multichannel 2D AR model. A model stabilization procedure based on numerical optimization techniques is proposed. The performance of the multichannel 2D AR model has been evaluated based on the synthetic data generated using two different channel simulators.

Autoregressive modelBroadband networksbusiness.industryComputer scienceMIMOData_CODINGANDINFORMATIONTHEORYWidebandbusinessTelecommunicationsAlgorithmSynthetic dataCommunication channelIEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference
researchProduct

Level-crossing rate and average duration of fades of non-stationary multipath fading channels

2017

The level-crossing rate (LCR) and average duration of fades (ADF) are important statistical quantities describing the fading behaviour of mobile radio channels. To date, these quantities have only been analysed under the assumption that the mobile radio channel is wide-sense stationary, which is generally not the case in practice. In this paper, we propose a concept for the analysis of the LCR and ADF of non-stationary channels. Rice's standard formula for the derivation of the LCR of wide-sense stationary processes is extended to a more general formula enabling the computation of the instantaneous LCR of non-stationary processes. The application of the new concept results in closed-form ex…

Average durationComputer science0202 electrical engineering electronic engineering information engineering020206 networking & telecommunicationsFading02 engineering and technologyStatistical physicsLevel crossingMultipath propagationComputer Science::Information TheoryCommunication channel2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)
researchProduct

Efficient techniques for energy saving in data center networks

2018

Data centers are constructed with a huge number of network devices to support the expanding cloud based services. These devices are used to achieve the highest performance in case of full utilization of the network. However, the peak capacity of the network is rarely reached. Consequently, many devices are set into idle state and cause a huge energy waste leading to a non-proportionality between the network load and the energy consumed. In this paper, we propose a new approach to improve the efficiency of data centers in terms of energy consumption. Our approach exploits the correlation in time of the inter-node communication traffic and some topological features to maximize energy saving w…

Average path lengthNetwork topologyComputer Networks and Communicationsbusiness.industryComputer scienceScalability020206 networking & telecommunicationsCloud computingData center network02 engineering and technologyEnergy consumptionData center network Network topology Average path length Energy consumption ScalabilityNetwork topologyAverage path lengthNetworking hardware020202 computer hardware & architectureEnergy consumptionScalability0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]Data centerbusinessEnergy (signal processing)Computer networkComputer Communications
researchProduct

Resource Allocation for Multi-Access Edge Computing with Fronthaul and Backhaul Constraints

2021

Edge computing is able to provide proximity solutions for the future wireless network to accommodate different types of devices with various computing service demands. Meanwhile, in order to provide ubiquitous connectivities to massive devices over a relatively large area, densely deploying remote radio head (RRH) is considered as a cost-efficient solution. In this work, we consider a vertical and heterogeneous multiaccess edge computing system. In the system, the RRHs are deployed for providing wireless access for the users and the edge node with computing capability can process the computation requests from the users. With the objective to minimize the total energy consumption for process…

Backhaul (telecommunications)Wireless networkComputer sciencebusiness.industryWirelessResource allocationResource managementEnergy consumptionbusinessRemote radio headEdge computingComputer network2021 17th International Symposium on Wireless Communication Systems (ISWCS)
researchProduct

Low Latency Ambient Backscatter Communications with Deep Q-Learning for Beyond 5G Applications

2020

Low latency is a critical requirement of beyond 5G services. Previously, the aspect of latency has been extensively analyzed in conventional and modern wireless networks. With the rapidly growing research interest in wireless-powered ambient backscatter communications, it has become ever more important to meet the delay constraints, while maximizing the achievable data rate. Therefore, to address the issue of latency in backscatter networks, this paper provides a deep Q-learning based framework for delay constrained ambient backscatter networks. To do so, a Q-learning model for ambient backscatter scenario has been developed. In addition, an algorithm has been proposed that employ deep neur…

BackscatterWireless networkComputer science05 social sciencesReal-time computing0202 electrical engineering electronic engineering information engineering0507 social and economic geographyQ-learning020206 networking & telecommunicationsNetwork performance02 engineering and technology050703 geography5G2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring)
researchProduct

Constrained consistency enforcement in AHP

2020

Abstract Decision-making in the presence of intangible elements must be based on a robust, but subtle, balance between expert know-how and judgment consistency when eliciting that know-how. This balance is frequently achieved as a trade-off reached after a feedback process softens the tension frequently found between one force steadily pulling towards (full) consistency, and another force driven by expert feeling and opinion. The linearization method, developed by the authors in the framework of the analytic hierarchy process, is a pull-towards-consistency mechanism that shows the path from an inconsistent body of judgment elicited from an expert towards consistency, by suggesting optimal c…

Balance (metaphysics)0209 industrial biotechnologyExpert judgmentConsensusOperations researchRiesz representation theoremProcess (engineering)Computer scienceAHPApplied MathematicsAnalytic hierarchy process020206 networking & telecommunications02 engineering and technologyComputational Mathematics020901 industrial engineering & automationConsistency (negotiation)LinearizationSettore ING-IND/17 - Impianti Industriali MeccaniciPath (graph theory)0202 electrical engineering electronic engineering information engineeringConsistencyEnforcementMATEMATICA APLICADADecision-making
researchProduct

Congestion Avoidance Using DYnamic COdec MAnagement: A solution for ISP

2005

The large diffusion of VoIP is an essential key for the success of emerging Internet service providers. These ISPs conflict with the interests of historical and predominant network maintainers which often control the network infrastructure and telephone services. To win this competition, emerging ISPs have to adopt strategic QoS solutions which will capture the attention of network users and phone clients. This paper presents a solution which is able to obtain the same performance of a 64 Kbps channel reducing the costs for over-provisioning network bandwidth. DyCoMa is a mechanism studied for VoIP applications in network with a limited bandwidth for multimedia services. It works preventing…

Bandwidth managementVoice over IPComputer sciencebusiness.industryQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSNetwork traffic controlNetwork congestionBandwidth allocationBandwidth (computing)CodecTelecommunicationsbusinessComputer network2005 Asia-Pacific Conference on Communications
researchProduct