Search results for "Telecommunication"

showing 10 items of 1769 documents

Ethernet FSO Communications Link Performance Study Under a Controlled Fog Environment

2012

In this letter the performance of a free space optical (FSO) communication link in the presence of fog is experimentally investigated in an indoor environment. A dedicated indoor atmospheric chamber, replicating the outdoor environment, is being used to evaluate the FSO link performance under the fog condition. Theoretical analysis supported by the experimental evaluation has been carried out for the intensity modulation/direct detection on-off keying non-return-to-zero (OOK-NRZ), OOK return-to-zero (OOK-RZ) and four pulse position modulation (4-PPM) modulation formats at the Ethernet baseline data-rate. The results shown indicate that the 4-PPM signalling scheme is the most robust to the f…

Ethernetbusiness.industryOptical linkKeyingXarxes locals sense fil Wi-FiAmplitude-shift keyingComputer Science ApplicationsTelecomunicacióModeling and SimulationPulse-position modulationElectronic engineeringBit error rateEnvironmental scienceElectrical and Electronic EngineeringTelecommunicationsbusinessIntensity modulationComunicació i tecnologiaFree-space optical communication
researchProduct

Novel Fault-Tolerant Routing Technique for ZMesh Topology based Network-on-Chip Design

2020

This paper proposes a novel fault-tolerant routing technique for ZMesh topology based Network-on-Chip (NoC) design. The proposed algorithm caters the link faults and routes the data packets seamlessly to the destination. This algorithm has been compared with the existing techniques proposed for mesh topology counterparts. The experimentations have been carried out by increasing ZMesh network size and percentage of link faults. The results show that in the event of link failures the proposed algorithm routes the data from source to destination flawlessly.

Event (computing)Computer scienceNetwork packetMesh networking020206 networking & telecommunicationsFault toleranceTopology (electrical circuits)02 engineering and technologyLink (geometry)TopologyNetwork on a chip0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingRouting (electronic design automation)2020 15th IEEE Conference on Industrial Electronics and Applications (ICIEA)
researchProduct

Optical Dark Rogue Wave

2016

AbstractPhotonics enables to develop simple lab experiments that mimic water rogue wave generation phenomena, as well as relativistic gravitational effects such as event horizons, gravitational lensing and Hawking radiation. The basis for analog gravity experiments is light propagation through an effective moving medium obtained via the nonlinear response of the material. So far, analogue gravity kinematics was reproduced in scalar optical wave propagation test models. Multimode and spatiotemporal nonlinear interactions exhibit a rich spectrum of excitations, which may substantially expand the range of rogue wave phenomena and lead to novel space-time analogies, for example with multi-parti…

Event horizonWave propagationPhysics::Opticshawking radiation01 natural sciencesArticleblack-holes010305 fluids & plasmasGravitationGeneral Relativity and Quantum Cosmology[NLIN.NLIN-PS]Nonlinear Sciences [physics]/Pattern Formation and Solitons [nlin.PS]0103 physical sciencesRogue wave010306 general physicsPhysics[PHYS.PHYS.PHYS-OPTICS]Physics [physics]/Physics [physics]/Optics [physics.optics]Bose-Einstein condensateMultidisciplinaryBirefringenceMulti-mode optical fiberbusiness.industryPolarization (waves)Quantum electrodynamicsBose-Einstein condensate; hawking radiation; black-holesBose-Einstein condensate;Hawking radiation; black-holes; analog; gravity; horizon; fibers; laserPhotonicsTelecommunicationsbusinessScientific Reports
researchProduct

A study of mobility and reachability in ad hoc networks using stochastic activity networks

2006

The integration of ad-hoc networks into real environments is now becoming more and more common and supervision and control systems are no exception. The efficiency of the communication in these networks as well as various other factors, are governed by the working area, the number of nodes, mobility, transmission power, etc. In this paper, the mobility and reachability of mobile nodes appearing spontaneously in a large installation such as can be found in a water purification system are studied. These nodes form an ad-hoc network and communicate between each other in order to finally reach a fixed node which can offer them information from the rest of the system in real time or act as a gat…

Evolving networksCover (telecommunications)Transmission (telecommunications)Computer scienceWireless ad hoc networkReachabilitybusiness.industryControl systemNode (networking)Distributed computingDefault gatewaybusinessComputer network2006 2nd Conference on Next Generation Internet Design and Engineering, 2006. NGI '06.
researchProduct

A gesture recognition framework for exploring museum exhibitions

2018

In this paper we present a gesture recognition framework for providing the visitors of a museum exhibition with a non intrusive interface for the multimedia enjoyment of digital contents. Early experiments were carried out at the Computer History Museum Exhibition of the University of Palermo.

ExhibitionComputer historySettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniAmbient intelligence Gesture recognition Human computer interactionGesture recognitionComputer scienceInterface (computing)0202 electrical engineering electronic engineering information engineering020206 networking & telecommunications020201 artificial intelligence & image processing02 engineering and technologyVisual arts
researchProduct

Enabling Backoff for SCM Wake-Up Radio: Protocol and Modeling

2017

In sub-carrier modulation (SCM) wake-up radio (WuR) enabled wireless sensor networks, a node can initiate data transmission at any instant of time. In this letter, we propose to activate a backoff procedure before sending wake-up calls (WuCs) in order to avoid potential collisions among WuCs. Consequently, no backoff is needed for the main radio after a WuC is received. A discrete-time Markov chain model is developed to evaluate the performance. Numerical results on network throughput, energy efficiency, average delay, and collision probability reveal the benefits of enabling backoff for SCM-WuRs, especially under heavy traffic loads or saturated traffic conditions.

Exponential backoffMarkov chainbusiness.industryComputer scienceNode (networking)ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS010401 analytical chemistryReal-time computing020206 networking & telecommunicationsThroughput02 engineering and technology01 natural sciences0104 chemical sciencesComputer Science ApplicationsModulationModeling and Simulation0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringbusinessWireless sensor networkComputer networkEfficient energy useData transmissionIEEE Communications Letters
researchProduct

RootsGLOH2: embedding RootSIFT 'square rooting' in sGLOH2

2020

This study introduces an extension of the shifting gradient local orientation histogram doubled (sGLOH2) local image descriptor inspired by RootSIFT ‘square rooting’ as a way to indirectly alter the matching distance used to compare the descriptor vectors. The extended descriptor, named RootsGLOH2, achieved the best results in terms of matching accuracy and robustness among the latest state-of-the-art non-deep descriptors in recent evaluation contests dealing with both planar and non-planar scenes. RootsGLOH2 also achieves a matching accuracy very close to that obtained by the best deep descriptors to date. Beside confirming that ‘square rooting’ has beneficial effects on sGLOH2 as it happe…

FEATURE EXTRACTIONLOCAL FEATUREComputer scienceFeature extractionComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONScale-invariant feature transformFEATURE MATCHING02 engineering and technologyRobustness (computer science)Euclidean geometryComputer Science::Multimedia0202 electrical engineering electronic engineering information engineeringBeneficial effectsSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniSettore INF/01 - Informaticabusiness.industryImage matching020206 networking & telecommunicationsPattern recognitionCOMPUTER VISIONImage Matching Local Image Descriptors RootSIFT sGLOH2Computer Science::Computer Vision and Pattern RecognitionEmbedding020201 artificial intelligence & image processingComputer Vision and Pattern RecognitionArtificial intelligencebusinessSoftwareSquare rootingIMAGE MATCHING
researchProduct

Uncommon Suffix Tries

2011

Common assumptions on the source producing the words inserted in a suffix trie with $n$ leaves lead to a $\log n$ height and saturation level. We provide an example of a suffix trie whose height increases faster than a power of $n$ and another one whose saturation level is negligible with respect to $\log n$. Both are built from VLMC (Variable Length Markov Chain) probabilistic sources; they are easily extended to families of sources having the same properties. The first example corresponds to a ''logarithmic infinite comb'' and enjoys a non uniform polynomial mixing. The second one corresponds to a ''factorial infinite comb'' for which mixing is uniform and exponential.

FOS: Computer and information sciencesCompressed suffix arrayPolynomialLogarithmGeneral MathematicsSuffix treevariable length Markov chain[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS]Generalized suffix treeprobabilistic source0102 computer and information sciences02 engineering and technologysuffix trie01 natural scienceslaw.inventionCombinatoricslawComputer Science - Data Structures and AlgorithmsTrieFOS: Mathematics0202 electrical engineering electronic engineering information engineeringData Structures and Algorithms (cs.DS)Mixing (physics)[ INFO.INFO-DS ] Computer Science [cs]/Data Structures and Algorithms [cs.DS]MathematicsDiscrete mathematicsApplied MathematicsProbability (math.PR)020206 networking & telecommunicationssuffix trie.Computer Graphics and Computer-Aided Design[MATH.MATH-PR]Mathematics [math]/Probability [math.PR]010201 computation theory & mathematicsmixing properties60J05 37E05Suffix[ MATH.MATH-PR ] Mathematics [math]/Probability [math.PR]Mathematics - ProbabilitySoftware
researchProduct

A gap analysis of Internet-of-Things platforms

2016

We are experiencing an abundance of Internet-of-Things (IoT) middleware solutions that provide connectivity for sensors and actuators to the Internet. To gain a widespread adoption, these middleware solutions, referred to as platforms, have to meet the expectations of different players in the IoT ecosystem, including device providers, application developers, and end-users, among others. In this article, we evaluate a representative sample of these platforms, both proprietary and open-source, on the basis of their ability to meet the expectations of different IoT users. The evaluation is thus more focused on how ready and usable these platforms are for IoT ecosystem players, rather than on t…

FOS: Computer and information sciencesComputer Networks and CommunicationsComputer science02 engineering and technologyGap analysiscomputer.software_genreWorld Wide WebComputer Science - Computers and SocietyOrder (exchange)Computers and Society (cs.CY)0202 electrical engineering electronic engineering information engineeringesineiden internetIoT ecosystemIoT marketplaceta113internet of Thingsbusiness.industry020206 networking & telecommunicationsIoT platformsData sharingMiddleware (distributed applications)Middleware020201 artificial intelligence & image processingThe InternetbusinessInternet of Thingsgap analysiscomputerComputer Communications
researchProduct

FIRST

2018

Thanks to the collective action of participating smartphone users, mobile crowdsensing allows data collection at a scale and pace that was once impossible. The biggest challenge to overcome in mobile crowdsensing is that participants may exhibit malicious or unreliable behavior, thus compromising the accuracy of the data collection process. Therefore, it becomes imperative to design algorithms to accurately classify between reliable and unreliable sensing reports. To address this crucial issue, we propose a novel Framework for optimizing Information Reliability in Smartphone-based participaTory sensing (FIRST) that leverages mobile trusted participants (MTPs) to securely assess the reliabil…

FOS: Computer and information sciencesComputer Networks and CommunicationsComputer scienceDistributed computingFrameworkCrowdsensing02 engineering and technologyTrustMobileComputer Science - Networking and Internet ArchitectureThe National MapInformation020204 information systems0202 electrical engineering electronic engineering information engineeringAndroid (operating system)ReputationPaceSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniNetworking and Internet Architecture (cs.NI)Data collectionParticipatory sensingInformation quality020206 networking & telecommunicationsQualitySoftware deploymentWireless sensor networkACM Transactions on Sensor Networks
researchProduct