Search results for "Telecommunication"

showing 10 items of 1769 documents

Logical Key Hierarchy for Group Management in Distributed Online Social Networks

2016

Distributed Online Social Networks (DOSNs) have recently been proposed to shift the control over user data from a unique entity to the users of the DOSN themselves. In this paper, we focus our attention on the problem of privacy preserving content sharing to a large group of users of the DOSNs. Several solutions, based on cryptographic techniques, have been recently proposed. The main challenge here is the definition of a scalable and decentralized approach that: i) minimizes the re-encryption of the contents published in a group when the composition of the group changes and ii) enables a fast distribution of the cryptographic keys to all the members (n) of a group, each time a new user is …

Computer scienceComputer Networks and CommunicationsCryptography02 engineering and technologyEncryptionSet (abstract data type)Public-key cryptography0202 electrical engineering electronic engineering information engineeringMathematics (all)Distributed Online Social Network; Privacy; Secure Group communicationFocus (computing)Social networkSettore INF/01 - Informaticabusiness.industryGroup (mathematics)020206 networking & telecommunicationsComputer Science Applications1707 Computer Vision and Pattern RecognitionSecure Group communicationDistributed Online Social NetworkPrivacyScalabilitySignal ProcessingKey (cryptography)020201 artificial intelligence & image processingbusinessSoftwareComputer network
researchProduct

Outage Probability Analysis of User-Centric SBS-Based HCNets Under Hybrid Rician/Rayleigh Fading

2020

To model dense user equipment (UE) distribution in heterogeneous cellular networks (HCNets), the Poisson cluster process (PCP) has emerged as a promising tool. In user-centric HCNets where UEs are distributed according to a PCP around a small base station (SBS), the network performance has been commonly studied in literature under a Rayleigh fading environment assumption. However, such an assumption may not hold in user-centric HCNets given the possible existence of a strong line-of-sight (LOS) link between UEs and BSs due to a relatively short transmission distance. This letter analyzes the performance of user-centric SBS based HCNets by considering that the desired LOS link experiences Ri…

Computer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunicationsData_CODINGANDINFORMATIONTHEORY02 engineering and technologyComputer Science ApplicationsBase stationTransmission (telecommunications)Modeling and SimulationRician fadingComputer Science::Networking and Internet Architecture0202 electrical engineering electronic engineering information engineeringCellular networkNetwork performanceElectrical and Electronic EngineeringAlgorithmComputer Science::Information TheoryRayleigh fadingIEEE Communications Letters
researchProduct

Multimodal Images Classification using Dense SURF, Spectral Information and Support Vector Machine

2019

International audience; The multimodal image classification is a challenging area of image processing which can be used to examine the wall painting in the cultural heritage domain. In such classification, a common space of representation is important. In this paper, we present a new method for multimodal representation learning, by using a pixel-wise feature descriptor named dense Speed Up Robust Features (SURF) combined with the spectral information carried by the pixel. For classification of extracted features we have used support vector machine (SVM). Our database was extracted from acquisition on cultural heritage wall paintings that contain four modalities UV, Visible, IRR and fluores…

Computer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONImage processing02 engineering and technologyImage (mathematics)0202 electrical engineering electronic engineering information engineeringFeature descriptorRepresentation (mathematics)Spectral informationSpeeded up robust features SURFGeneral Environmental SciencePixelbusiness.industry[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]020206 networking & telecommunicationsPattern recognitionSVM classificationSupport vector machineCultural heritageMultimodal imagesCielab spaceDense features[INFO.INFO-TI]Computer Science [cs]/Image Processing [eess.IV]General Earth and Planetary Sciences020201 artificial intelligence & image processingArtificial intelligencebusinessFeature learning
researchProduct

Fuzzy Logic Based Security Trust Evaluation for IoT Environments

2019

In the new technological era called the Internet of Things (IoT), people, machines and objects communicate with each other via the Internet by exchanging information. In this context, trust plays an important role and is considered as a key factor in the success of the IoT services expansion. IoT services and applications use in some cases data concerning the privacy of their users. Consequently, users should trust the entities exchanging their personal information. In this paper, we present a framework that evaluates the security trust level of IoT nodes based on a Fuzzy Logic model using different input parameters such as Device Physical Security, Device Security Level and Device Ownershi…

Computer scienceContext (language use)02 engineering and technology[INFO] Computer Science [cs]TrustComputer securitycomputer.software_genreFuzzy logicFuzzy LogicFactor (programming language)Node (computer science)0202 electrical engineering electronic engineering information engineeringcomputer.programming_languagePrivacy.[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industry020206 networking & telecommunicationsInternet of Things (IoT)SecurityKey (cryptography)020201 artificial intelligence & image processingThe InternetbusinessPersonally identifiable informationcomputerPhysical security2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA)
researchProduct

Towards a Hierarchical Multitask Classification Framework for Cultural Heritage

2018

Digital technologies such as 3D imaging, data analytics and computer vision opened the door to a large set of applications in cultural heritage. Digital acquisition of a cultural assets takes nowadays a couple of seconds thanks to the achievements in 2D and 3D acquisition technologies. However, enriching these cultural assets with labels and relevant metadata is still not fully automatized especially due to their nature and specificities. With the recent publication of several cultural heritage datasets, many researchers are tackling the challenge of effectively classifying and annotating digital heritage. The challenges that are often addressed are related to visual recognition and image c…

Computer scienceData field02 engineering and technology[INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI]Multitask ClassificationCultural diversity0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]Digital preservationComputingMilieux_MISCELLANEOUSContextual image classificationDigital heritagebusiness.industryDeep learningConvolutional Neural Networks[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]020206 networking & telecommunicationsData scienceMetadataCultural heritageDigital preservationCultural heritage020201 artificial intelligence & image processingArtificial intelligencebusinessClassifier (UML)
researchProduct

Efficient cluster-based routing algorithm for body sensor networks

2018

International audience; Body Sensor Networks have gained a lot of research interest lately for the variety of applications they can serve. In such networks where nodes might hold critical information about people's lives, designing efficient routing schemes is very important to guarantee data delivery with the lowest delay and energy consumption. Even though some cluster-based routing schemes were proposed in the literature, none of them offer a complete solution that guarantees energy and delay efficient routing in BSN. In this paper, we propose a robust cluster- based algorithm that increases the routing efficiency through every step of the routing process: cluster formation, cluster head…

Computer scienceDistributed computing010401 analytical chemistryRouting algorithm020206 networking & telecommunications[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technologyEnergy consumption[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation01 natural sciences0104 chemical sciences[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR][INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]0202 electrical engineering electronic engineering information engineering[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Data delivery[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]MATLABcomputerWireless sensor networkCluster basedcomputer.programming_language2018 IEEE Middle East and North Africa Communications Conference (MENACOMM)
researchProduct

A Restricted-Weakly Connected Dominating Set for Role Assignment in a Multichannel MAC for Wireless Mesh Network

2009

International audience; We propose an efficient way of constructing the wireless mesh structure associated with Molecular MAC, a multichannel access method designed for efficient packet forwarding. We base our role assignment on a restricted Weakly Connected Dominating Set structure. After presenting a formal definition of the role assignment problem, we prove its NP-completeness. Then, we propose a centralized 2-approximation algorithm that maximizes the sum of radio link capacities in the molecular structure. Finally, we extend this protocol so that it can operate in a distributed way still providing the same guarantee. This distributed protocol is self-stabilizing thus robust to topology…

Computer scienceDistributed computing[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Mesh networking0102 computer and information sciences02 engineering and technologyNetwork topology01 natural sciencesConnected dominating setlaw.invention[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]law0202 electrical engineering electronic engineering information engineeringComputer Science::Networking and Internet ArchitectureWireless mesh network[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industryRadio Link ProtocolComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPacket forwarding020206 networking & telecommunicationsOrder One Network Protocol010201 computation theory & mathematicsbusinessAssignment problemComputer network
researchProduct

Numerical implementation of active power flow tracing methods: Practical implications on transmission networks and DR programs support

2015

The goal of this paper is to demonstrate the powerful contribution of the electric active power flow tracing methods on studying the electric transmission systems operating conditions. The tracing methods allow to impute to every generation unit and/or load the responsibility of the power flows of all the elements connected to the network. This study propose the numerical implementation of two different tracing methods on two transmission networks through Matlab® scripts developed on purpose; then the analysis is focused on identifying the loads which mostly affect the power line flows of the system. The results of this analysis point out the loads on which the application of the Demand Res…

Computer scienceDistributed computingupstream- and downstream-looking algorithmselectric transmission systemTracingDemand ResponseNeplan®computer.software_genrePower (physics)Demand responseSettore ING-IND/33 - Sistemi Elettrici Per L'EnergiaElectric power transmissionTransmission (telecommunications)Scripting languageMatlab®Point (geometry)MATLABcomputerpower flow tracingcomputer.programming_language
researchProduct

Nonnegative Tensor Train Decompositions for Multi-domain Feature Extraction and Clustering

2016

Tensor train (TT) is one of the modern tensor decomposition models for low-rank approximation of high-order tensors. For nonnegative multiway array data analysis, we propose a nonnegative TT (NTT) decomposition algorithm for the NTT model and a hybrid model called the NTT-Tucker model. By employing the hierarchical alternating least squares approach, each fiber vector of core tensors is optimized efficiently at each iteration. We compared the performances of the proposed method with a standard nonnegative Tucker decomposition (NTD) algorithm by using benchmark data sets including event-related potential data and facial image data in multi-domain feature extraction and clustering tasks. It i…

Computer scienceFiber (mathematics)business.industryFeature extraction020206 networking & telecommunicationsPattern recognition010103 numerical & computational mathematics02 engineering and technology01 natural sciencesImage (mathematics)Multi domainCore (graph theory)0202 electrical engineering electronic engineering information engineeringDecomposition (computer science)TensorArtificial intelligence0101 mathematicsCluster analysisbusinessTucker decomposition
researchProduct

The Impact of Human Walking on the Time-Frequency Distribution of In-Home Radio Channels

2018

Passive activity recognition of home occupants has become a very hot topic in the area of radio communications, as it enables the development of cutting-edge healthcare monitoring solutions. Thanks to ubiquitous radio waves, such as WiFi signals, at today's homes, one can process radio waves reflected off a person's body for identifying certain mobility patterns. This new approach ignores the need for any wearable sensors. This paper reports a challenging indoor radio channel measurement campaign at 5.9 GHz, which has been conducted to study the impact of walking persons on the temporal and spectral properties of the channel. In particular, the time-frequency distribution of the channel has…

Computer scienceFingerprint (computing)Real-time computingProcess (computing)Wearable computer020206 networking & telecommunications02 engineering and technologyActivity recognition0202 electrical engineering electronic engineering information engineeringSpectrogram020201 artificial intelligence & image processingRadio waveCommunication channelEnvelope (motion)2018 Asia-Pacific Microwave Conference (APMC)
researchProduct