Search results for "Telecommunication"

showing 10 items of 1769 documents

Cooperative compressive power spectrum estimation in wireless fading channels

2017

This paper considers multiple wireless sensors that cooperatively estimate the power spectrum of the signals received from several sources. We extend our previous work on cooperative compressive power spectrum estimation to accommodate the scenario where the statistics of the fading channels experienced by different sensors are different. The signals received from the sources are assumed to be time-domain wide-sense stationary processes. Multiple sensors are organized into several groups, where each group estimates a different subset of lags of the temporal correlation. A fusion centre (FC) combines these estimates to obtain the power spectrum. As each sensor group computes correlation esti…

Computer sciencebusiness.industrycorrelation lagSub-Nyquist samplingEstimatorSpectral densityfading020206 networking & telecommunicationsmulticoset sampling02 engineering and technologypower spectrumSignalwide-sense stationarycooperative estimationComputer Science::Networking and Internet Architecture0202 electrical engineering electronic engineering information engineeringWireless020201 artificial intelligence & image processingFadingUniquenessNyquist ratebusinessAlgorithmWireless sensor network2017 International Conference on Electrical Engineering and Informatics (ICELTICs)
researchProduct

Does Wake-Up Radio Always Consume Lower Energy Than Duty-Cycled Protocols?

2017

Many recent studies anticipate that wake-up radio (WuR) will replace traditional duty-cycled (DC) protocols given its overwhelming performance superiority on energy consumption. Meanwhile, the question on whether WuR performs always better than DC protocols has not been answered explicitly. In this paper, we investigate in-depth the energy consumption performance of WuR by considering various levels of traffic load in a wireless sensor network. By comparing SCM-WuR with both synchronous MAC (S-MAC) and asynchronous MAC (X-MAC), we ascertain that SCM-WuR does consume orders of magnitude lowerenergythanDCprotocolswhentrafficloadislow.Howe ver, our numerical results reveal at the same time that …

Computer sciencebusiness.industrymedia_common.quotation_subject020208 electrical & electronic engineering020206 networking & telecommunications02 engineering and technologyEnergy consumptionWakeSynchronizationOrders of magnitude (bit rate)Asynchronous communicationRange (aeronautics)0202 electrical engineering electronic engineering information engineeringbusinessWireless sensor networkDutymedia_commonComputer network2017 IEEE 86th Vehicular Technology Conference (VTC-Fall)
researchProduct

Dynamic Flow-Adaptive Spectrum Leasing with Channel Aggregation in Cognitive Radio Networks.

2020

Cognitive radio networks (CRNs), which allow secondary users (SUs) to dynamically access a network without affecting the primary users (PUs), have been widely regarded as an effective approach to mitigate the shortage of spectrum resources and the inefficiency of spectrum utilization. However, the SUs suffer from frequent spectrum handoffs and transmission limitations. In this paper, considering the quality of service (QoS) requirements of PUs and SUs, we propose a novel dynamic flow-adaptive spectrum leasing with channel aggregation. Specifically, we design an adaptive leasing algorithm, which adaptively adjusts the portion of leased channels based on the number of ongoing and buffered PU …

Computer sciencechannel aggregating02 engineering and technologyBlocking (statistics)lcsh:Chemical technologyBiochemistryArticleAnalytical Chemistry0203 mechanical engineeringflow-adaptive spectrum leasing0202 electrical engineering electronic engineering information engineeringlcsh:TP1-1185Electrical and Electronic EngineeringInstrumentationVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550business.industryQuality of serviceSpectrum (functional analysis)020302 automobile design & engineering020206 networking & telecommunicationsAtomic and Molecular Physics and OpticsCognitive radioTransmission (telecommunications)Flow (mathematics)cognitive radio networksbusinessCommunication channelComputer networkSensors (Basel, Switzerland)
researchProduct

Implementation and Deployment Evaluation of the DMAMAC Protocol for Wireless Sensor Actuator Networks

2016

Abstract The increased application of wireless technologies including Wireless Sensor Actuator Networks (WSAN) in industry has given rise to a plethora of protocol designs. These designs target metrics ranging from energy efficiency to real-time constraints. Protocol design typically starts with a requirements specification, and continues with analytic and model-based simulation analysis. State-of- the-art network simulators provide extensive physical environment emulation, but still have limitations due to model abstractions. Deployment testing on actual hardware is therefore vital in order to validate implementability and usability in the real environment. The contribution of this article…

Computer sciencecomputer.internet_protocolTime division multiple accessWireless Routing Protocol02 engineering and technologyPacket lossWireless sensor networks and applications0202 electrical engineering electronic engineering information engineeringWirelessSuperframeNetwork architecture and designProtocol (object-oriented programming)Communication protocols.General Environmental ScienceEmulationbusiness.industry020206 networking & telecommunicationsKey distribution in wireless sensor networksEmbedded systemInternetwork protocolGeneral Earth and Planetary Sciences020201 artificial intelligence & image processingCommunications protocolbusinesscomputerReverse Address Resolution ProtocolEfficient energy useProcedia Computer Science
researchProduct

Efficient Hybrid Emergency Aware MAC Protocol for Wireless Body Sensor Networks

2018

International audience; In Body Sensor Networks (BSNs), two types of events should be addressed: periodic and emergency events. Traffic rate is usually low during periodic observation, and becomes very high upon emergency. One of the main and challenging requirements of BSNs is to design Medium Access Control (MAC) protocols that guarantee immediate and reliable transmission of data in emergency situations, while maintaining high energy efficiency in non-emergency conditions. In this paper, we propose a new emergency aware hybrid DTDMA/DS-CDMA protocol that can accommodate BSN traffic variations by addressing emergency and periodic traffic requirements. It takes advantage of the high delay …

Computer sciencedelayAccess control02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]DTDMAlcsh:Chemical technology01 natural sciencesBiochemistryArticleAnalytical Chemistry[INFO.INFO-IU]Computer Science [cs]/Ubiquitous ComputingBSN[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]energy consumption0202 electrical engineering electronic engineering information engineeringWirelesslcsh:TP1-1185Electrical and Electronic EngineeringInstrumentationMACbusiness.industryNetwork packet010401 analytical chemistryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunicationsEnergy consumption[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationAtomic and Molecular Physics and Optics0104 chemical sciences[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]packet drop[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessWireless sensor networkEfficient energy useComputer networkDS-CDMAOPNETSensors
researchProduct

Knowledge-based verification of concatenative programming patterns inspired by natural language for resource-constrained embedded devices

2020

We propose a methodology to verify applications developed following programming patterns inspired by natural language that interact with physical environments and run on resource-constrained interconnected devices. Natural language patterns allow for the reduction of intermediate abstraction layers to map physical domain concepts into executable code avoiding the recourse to ontologies, which would need to be shared, kept up to date, and synchronized across a set of devices. Moreover, the computational paradigm we use for effective distributed execution of symbolic code on resource-constrained devices encourages the adoption of such patterns. The methodology is supported by a rule-based sys…

Computer scienceinternet of thing02 engineering and technologycomputer.software_genrelcsh:Chemical technologyBiochemistryOracleArticleAnalytical ChemistryDomain (software engineering)Softwarewireless sensor network0202 electrical engineering electronic engineering information engineeringlcsh:TP1-1185Electrical and Electronic Engineeringdistributed programmingwireless sensor networksEmbedded systemInstrumentationAbstraction (linguistics)concatenative languagessymbolic programmingSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniSymbolic programmingProgramming languagebusiness.industryRuntime verification020206 networking & telecommunications020207 software engineeringcomputer.file_formatforthinternet of thingsAtomic and Molecular Physics and Opticsconcatenative languageProgramming patternsembedded systemsExecutablebusinesscomputerNatural language
researchProduct

Evaluation of Ensemble Machine Learning Methods in Mobile Threat Detection

2017

The rapid growing trend of mobile devices continues to soar causing massive increase in cyber security threats. Most pervasive threats include ransom-ware, banking malware, premium SMS fraud. The solitary hackers use tailored techniques to avoid detection by the traditional antivirus. The emerging need is to detect these threats by any flow-based network solution. Therefore, we propose and evaluate a network based model which uses ensemble Machine Learning (ML) methods in order to identify the mobile threats, by analyzing the network flows of the malware communication. The ensemble ML methods not only protect over-fitting of the model but also cope with the issues related to the changing be…

Computer scienceintrusion detection0211 other engineering and technologiesDecision tree02 engineering and technologycomputer.software_genreComputer securitymobiililaitteet0202 electrical engineering electronic engineering information engineeringsupervised machine learningSoarAndroid (operating system)tietoturvata113021110 strategic defence & security studiesta213business.industrymobile threatsensemble methods020206 networking & telecommunicationsFlow networkEnsemble learninganomaly detectionmachine learningkoneoppiminenMalwareThe InternetbusinesscomputerMobile device
researchProduct

Assessment of Deep Learning Methodology for Self-Organizing 5G Networks

2019

In this paper, we present an auto-encoder-based machine learning framework for self organizing networks (SON). Traditional machine learning approaches, for example, K Nearest Neighbor, lack the ability to be precisely predictive. Therefore, they can not be extended for sequential data in the true sense because they require a batch of data to be trained on. In this work, we explore artificial neural network-based approaches like the autoencoders (AE) and propose a framework. The proposed framework provides an advantage over traditional machine learning approaches in terms of accuracy and the capability to be extended with other methods. The paper provides an assessment of the application of …

Computer scienceintrusion detection5G-tekniikka02 engineering and technologyIntrusion detection systemself-organizing networks (SON)Machine learningcomputer.software_genrelcsh:Technologyk-nearest neighbors algorithmself-organizing networkslcsh:Chemistryautoencoder (AE)deep learning (DL)mobility load balancing0202 electrical engineering electronic engineering information engineeringGeneral Materials ScienceInstrumentationlcsh:QH301-705.5Fluid Flow and Transfer ProcessesautoencoderArtificial neural networkbusiness.industrylcsh:Tmobility load balancing (MLB)Process Chemistry and TechnologyDeep learningGeneral Engineeringdeep learning020206 networking & telecommunicationsSelf-organizing networkLoad balancing (computing)021001 nanoscience & nanotechnologyAutoencoderlcsh:QC1-999Computer Science Applicationscell outage detectionlcsh:Biology (General)lcsh:QD1-999lcsh:TA1-2040Cellular networkArtificial intelligence0210 nano-technologybusinesslcsh:Engineering (General). Civil engineering (General)computerlcsh:Physics5G
researchProduct

Fast Implementation of Double-coupled Nonnegative Canonical Polyadic Decomposition

2019

Real-world data exhibiting high order/dimensionality and various couplings are linked to each other since they share some common characteristics. Coupled tensor decomposition has become a popular technique for group analysis in recent years, especially for simultaneous analysis of multi-block tensor data with common information. To address the multiblock tensor data, we propose a fast double-coupled nonnegative Canonical Polyadic Decomposition (FDC-NCPD) algorithm in this study, based on the linked CP tensor decomposition (LCPTD) model and fast Hierarchical Alternating Least Squares (Fast-HALS) algorithm. The proposed FDCNCPD algorithm enables simultaneous extraction of common components, i…

Computer sciencelinked CP tensor decomposition (LCPTD)02 engineering and technologySignal-to-noise ratiotensor decompositionConvergence (routing)0202 electrical engineering electronic engineering information engineeringDecomposition (computer science)TensorHigh orderta113konvergenssiconvergencesignal to noise ratio020206 networking & telecommunicationsbrain modelinghierarchical alternating least squares (HALS)Alternating least squaresCore (graph theory)coupled tensor decomposition020201 artificial intelligence & image processingAlgorithmsignal processing algorithmselectroencephalographymathematical modelCurse of dimensionality
researchProduct

Restoration and Enhancement of Historical Stereo Photos Through Optical Flow

2021

Restoration of digital visual media acquired from repositories of historical photographic and cinematographic material is of key importance for the preservation, study and transmission of the legacy of past cultures to the coming generations. In this paper, a fully automatic approach to the digital restoration of historical stereo photographs is proposed. The approach exploits the content redundancy in stereo pairs for detecting and fixing scratches, dust, dirt spots and many other defects in the original images, as well as improving contrast and illumination. This is done by estimating the optical flow between the images, and using it to register one view onto the other both geometrically …

Computer sciencemedia_common.quotation_subjectNoise reductionComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONOptical flow02 engineering and technologyConsistency (database systems)Image restoration0202 electrical engineering electronic engineering information engineeringRedundancy (engineering)Contrast (vision)Computer visionImage restorationmedia_commonSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniSettore INF/01 - Informaticabusiness.industryOptical flow021001 nanoscience & nanotechnologySensor fusionStereo matchingTransmission (telecommunications)Image denoisingImage enhancementGradient filtering020201 artificial intelligence & image processingArtificial intelligence0210 nano-technologybusiness
researchProduct