Search results for "Telecommunication"

showing 10 items of 1769 documents

Wi-Sense: a passive human activity recognition system using Wi-Fi and convolutional neural network and its integration in health information systems

2021

AbstractA human activity recognition (HAR) system acts as the backbone of many human-centric applications, such as active assisted living and in-home monitoring for elderly and physically impaired people. Although existing Wi-Fi-based human activity recognition methods report good results, their performance is affected by the changes in the ambient environment. In this work, we present Wi-Sense—a human activity recognition system that uses a convolutional neural network (CNN) to recognize human activities based on the environment-independent fingerprints extracted from the Wi-Fi channel state information (CSI). First, Wi-Sense captures the CSI by using a standard Wi-Fi network interface car…

Computer sciencebusiness.industry010401 analytical chemistry020206 networking & telecommunicationsPattern recognition02 engineering and technology01 natural sciencesConvolutional neural network0104 chemical sciencesActivity recognitionData setNetwork interface controllerChannel state informationVDP::Teknologi: 500::Medisinsk teknologi: 620Principal component analysis0202 electrical engineering electronic engineering information engineeringSpectrogramNoise (video)Artificial intelligenceElectrical and Electronic Engineeringbusiness
researchProduct

Stress Detection from Speech Using Spectral Slope Measurements

2018

Automatic detection of emotional stress is an active research domain, which has recently drawn increasing attention, mainly in the fields of computer science, linguistics, and medicine. In this study, stress is automatically detected by employing speech-derived features. Related studies utilize features such as overall intensity, MFCCs, Teager Energy Operator, and pitch. The present study proposes a novel set of features based on the spectral tilt of the glottal source and of the speech signal itself. The proposed features rely on the Probability Density Function of the estimated spectral slopes, and consist of the three most probable slopes from the glottal source, as well as the correspon…

Computer sciencebusiness.industry020206 networking & telecommunicationsProbability density functionPattern recognition02 engineering and technologyFundamental frequencySignalRandom forestEnergy operatorSpectral slopeClassifier (linguistics)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingArtificial intelligencebusinessWord (computer architecture)
researchProduct

On Multiple AER Handshaking Channels Over High-Speed Bit-Serial Bidirectional LVDS Links With Flow-Control and Clock-Correction on Commercial FPGAs f…

2017

Address event representation (AER) is a widely employed asynchronous technique for interchanging “neural spikes” between different hardware elements in neuromorphic systems. Each neuron or cell in a chip or a system is assigned an address (or ID), which is typically communicated through a high-speed digital bus, thus time-multiplexing a high number of neural connections. Conventional AER links use parallel physical wires together with a pair of handshaking signals (request and acknowledge). In this paper, we present a fully serial implementation using bidirectional SATA connectors with a pair of low-voltage differential signaling (LVDS) wires for each direction. The proposed implementation …

Computer sciencebusiness.industry020208 electrical & electronic engineeringBiomedical EngineeringSignal Processing Computer-AssistedEquipment Design02 engineering and technologyDifferential signalingHandshakingTransmission (telecommunications)Neuromorphic engineeringAsynchronous communicationEmbedded systemVHDL0202 electrical engineering electronic engineering information engineeringVerilog020201 artificial intelligence & image processingNeural Networks ComputerElectrical and Electronic EngineeringField-programmable gate arraybusinesscomputercomputer.programming_language
researchProduct

Wireless sensor network for Spectrum Cartography based on Kriging interpolation

2012

Dynamic spectrum access with Cognitive Radio (CR) network is a promising approach to increase the efficiency of spectrum usage. To allow the optimization of resource allocation and transmission adaptation techniques, each CR terminal needs to acquire awareness of the state of the time-frequency-location varying radio spectrum. In this paper we present a Spectrum Cartography (SC) approach where CR terminals are supported by a fixed wireless sensor network (WSN) to estimate and update the Power Spectral Density (PSD) over the area of interest. The wireless sensors collaborate to estimate the spatial distribution of the received power at a given frequency using either a centralized or a distri…

Computer sciencebusiness.industry05 social sciences050801 communication & media studies020206 networking & telecommunications02 engineering and technologyRadio spectrumKey distribution in wireless sensor networks0508 media and communicationsCognitive radioKriging0202 electrical engineering electronic engineering information engineeringResource allocationWirelessRadio resource managementFixed wirelessbusinessWireless sensor networkCartography
researchProduct

MDP-based Resource Allocation for Uplink Grant-free Transmissions in 5G New Radio

2020

The diversity of application scenarios in 5G mobile communication networks calls for innovative initial access schemes beyond traditional grant-based approaches. As a novel concept for facilitating small packet transmission and achieving ultra-low latency, grant-free communication is attracting lots of interests in the research community and standardization bodies. However, when a network consists of both grant based and grant-free based end devices, how to allocate slot resources properly between these two categories of devices remains as an unanswered question. In this paper, we propose a Markov decision process based scheme which dynamically allocates grant-free resources based on a spec…

Computer sciencebusiness.industry05 social sciences050801 communication & media studies0508 media and communications0502 economics and businessTelecommunications linkResource allocation050211 marketingMobile telephonyMarkov decision processbusiness5GComputer network2020 IEEE Wireless Communications and Networking Conference (WCNC)
researchProduct

A Trajectory-Driven SIMO mm-Wave Channel Model for a Moving Point Scatterer

2021

In this paper, we propose a trajectory-based three-dimensional (3D) non-stationary channel model for a millimeter wave (mm-Wave) single-input multiple-output (SIMO) system. The proposed channel model is designed to capture the mobility of a moving point scatterer in an indoor environment. We derive the expression of the time-variant (TV) channel transfer function (CTF). We study the TV Doppler characteristics of the channel, such as the TV Doppler power spectrum and the TV mean Doppler shift. To validate the proposed channel model, we performed a measurement campaign in an indoor environment using a software defined radar operating at 24 GHz. As a moving object, we consider a single swingin…

Computer sciencebusiness.industryAcoustics020208 electrical & electronic engineeringPendulumSpectral density020206 networking & telecommunications02 engineering and technologylaw.inventionsymbols.namesakeSoftwarelawExtremely high frequency0202 electrical engineering electronic engineering information engineeringsymbolsTrajectoryRadarbusinessDoppler effectComputer Science::Information TheoryCommunication channel2021 15th European Conference on Antennas and Propagation (EuCAP)
researchProduct

A non-stationary multipath fading channel model incorporating the effect of velocity variations of the mobile station

2014

A standard assumption in mobile fading channel modelling is that the mobile station (MS) moves along a straight line with constant speed. In practice, this assumption is violated in most propagation scenarios. For the development of more realistic channel models, it is therefore important to relax this restriction by allowing the MS to change its velocity. In this paper, we study the effect of velocity changes on the statistical properties of multipath fading channels. Expressions will be derived for the local autocorrelation function (ACF), the Wigner-Ville spectrum, the average Doppler shift, and the Doppler spread. Our findings show that a variation of the speed and/or the direction of t…

Computer sciencebusiness.industryAutocorrelationMathematical analysisSpectral densityFading distributionChannel state informationMobile stationFadingTelecommunicationsbusinessMultipath propagationComputer Science::Information TheoryRayleigh fadingCommunication channel2014 IEEE Wireless Communications and Networking Conference (WCNC)
researchProduct

Resource sharing optimality in WiFi infrastructure networks

2009

In WiFi networks, mobile nodes compete for accessing a shared channel by means of a random access protocol called Distributed Coordination Function (DCF). Although this protocol is in principle fair, since all the stations have the same probability to transmit on the channel, it has been shown that unfair behaviors may emerge in actual networking scenarios. Assuming that a contending node can dynamically change its strategy, by tuning its contention parameters to non-standard values on the basis of channel observations, we prove that, for infrastructure networks with bidirectional traffic and homogeneous application requirements, selfish access strategies are able to reach equilibrium condi…

Computer sciencebusiness.industryBidirectional trafficSettore ING-INF/03 - TelecomunicazioniDistributed computingNode (networking)ThroughputDistributed coordination functionShared resourceSettore ING-INF/04 - AutomaticaWireless lanTelecommunications linkMobile telephonybusinessGame theory Mechanism Design WiFi Infrastructure NetworksRandom accessCommunication channelComputer network
researchProduct

Performance analysis of selfish access strategies on WiFi infrastructure networks

2009

In this paper we propose a game-theoretic approach for characterizing WiFi network performance in presence of intelligent nodes employing cognitive functionalities. We assume that a cognitive WiFi node is aware of its application requirements and is able to dynamically estimate the network status, in order to dynamically change its access strategy by tuning the contention window settings. We prove that, for infrastructure networks with bidirectional traffic and homogeneous application requirements, selfish access strategies are able to reach equilibrium conditions, which are also Pareto optimal. Indeed, we show that the station strategies converge toward values which maximize a per-node uti…

Computer sciencebusiness.industryBidirectional trafficSettore ING-INF/03 - Telecomunicazionimedia_common.quotation_subjectDistributed computingNode (networking)Physical layerThroughputGame theory distributed wifi networksGame theory; distributed; wifi networksSettore ING-INF/04 - AutomaticaWireless lanTelecommunications linkdistributedFunction (engineering)businessGame theoryGame theorywifi networksmedia_commonComputer network
researchProduct

Security Challenges of IoT-Based Smart Home Appliances

2018

The Internet of Things, IoT, and the related security challenges are reaching homes in the form of smart appliances. If the appliances are compromised, they can be used in botnet attacks against Internet services and potentially cause harm to people and property through the local network, for example, by heating up too much or allowing unauthorized access. The aim of this study was to see how secure these devices are against remote and network attacks. Several devices were tested with attacks coming from the same Wi-Fi network to gain various levels of control of the devices. Their security against a Man-in-the-Middle attack was also studied to see differences in the susceptibility to conne…

Computer sciencebusiness.industryBotnetLocal area network020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreEvil twinHarmHome automation020204 information systems0202 electrical engineering electronic engineering information engineeringCode injectionThe InternetbusinesscomputerVulnerability (computing)
researchProduct