Search results for "Telecomunicazioni"
showing 10 items of 246 documents
Testbed evaluation of optimized REACT over multi-hop paths
2018
REACT is a distributed resource allocation protocol that computes a max-min allocation of airtime for mesh networks. The allocation adapts automatically to changes in local traffic load and in local network views. SALT, a new contention window tuning algorithm, ensures that each node secures the airtime allocated to it by REACT. REACT and SALT are extended to the multi-hop flow scenario with the introduction of a new airtime reservation algorithm. With a reservation in place, multi-hop TCP flows show increased throughput when running over SALT and REACT compared to running over 802.11 DCF. All results are obtained from experimentation on the w-iLab.t wireless network testbed in Belgium.
ErrorSense: Characterizing WiFi Error Patterns for Detecting ZigBee Interference
2014
Recent years have witnessed the increasing adoption of heterogeneous wireless networks working in unlicensed ISM bands, thus creating serious problems of spectrum overcrowding. Although ZigBee, Bluetooth and WiFi networks have been natively designed for working in presence of interference, it has been observed that several performance impairments may occur because of heterogeneous sensitivity to detect or react to the presence of other technologies. In this paper we focus on the WiFi capability to detect interfering ZigBee links. Despite of the narrowband transmissions performed by ZigBee, in emerging scenarios ZigBee interference can have a significant impact on WiFi performance. Therefore…
Resource sharing optimality in WiFi infrastructure networks
2009
In WiFi networks, mobile nodes compete for accessing a shared channel by means of a random access protocol called Distributed Coordination Function (DCF). Although this protocol is in principle fair, since all the stations have the same probability to transmit on the channel, it has been shown that unfair behaviors may emerge in actual networking scenarios. Assuming that a contending node can dynamically change its strategy, by tuning its contention parameters to non-standard values on the basis of channel observations, we prove that, for infrastructure networks with bidirectional traffic and homogeneous application requirements, selfish access strategies are able to reach equilibrium condi…
Performance analysis of selfish access strategies on WiFi infrastructure networks
2009
In this paper we propose a game-theoretic approach for characterizing WiFi network performance in presence of intelligent nodes employing cognitive functionalities. We assume that a cognitive WiFi node is aware of its application requirements and is able to dynamically estimate the network status, in order to dynamically change its access strategy by tuning the contention window settings. We prove that, for infrastructure networks with bidirectional traffic and homogeneous application requirements, selfish access strategies are able to reach equilibrium conditions, which are also Pareto optimal. Indeed, we show that the station strategies converge toward values which maximize a per-node uti…
Peer to Peer Equation Augmentation for an Altitude Aided GNSS Receiver
2010
This paper considers the possibility to integrate external altitude measurements with a Kalman based Global Navigation Satellite System (GNSS) receiver in a peer to peer scenario. The performance of such a system is investigated for different characteristics of the aiding measurement and for different degree of trust of the receiver upon the aiding measurement. The aiding measurement is obtained starting from the altitude measurements that the other peers in the network send to the aided user. The experiments highlight the need for a parameter that points out the effectiveness and the consistency of the computed aiding measurement. To this purpose, a reliability index is proposed, on the ba…
Sensor Fusion Localization and Navigation for Visually Impaired People
2018
In this paper, we present an innovative cyber physical system for indoor and outdoor localization and navigation, based on the joint utilization of dead-reckoning and computer vision techniques on a smartphone-centric tracking system. The system is explicitly designed for visually impaired people, but it can be easily generalized to other users, and it is built under the assumption that special reference signals, such as colored tapes, painted lines, or tactile paving, are deployed in the environment for guiding visually impaired users along pre-defined paths. Differently from previous works on localization, which are focused only on the utilization of inertial sensors integrated into the s…
Blockchain for power systems:Current trends and future applications
2020
Abstract Today, the blockchain is synonymous of technological innovation, being recognized among the 10 top strategy technologies in 2018 by the consulting company Gartner, it is more and more adopted in different sectors. However, the initial enthusiasm around this technology is going beyond the peak of inflated expectations, towards more stable applications in money transactions, cryptocurrencies and Digital Commodity Exchanges. Essentially, misguided efforts, the overuse of blockchain, and the Bitcoin's price drop have been the main reasons for this decay in expectations. Nevertheless, the exploitation of the blockchain technology in the power systems area appears largely underexplored, …
A cultural heritage experience for visually impaired people
2020
Abstract In recent years, we have assisted to an impressive advance of computer vision algorithms, based on image processing and artificial intelligence. Among the many applications of computer vision, in this paper we investigate on the potential impact for enhancing the cultural and physical accessibility of cultural heritage sites. By using a common smartphone as a mediation instrument with the environment, we demonstrate how convolutional networks can be trained for recognizing monuments in the surroundings of the users, thus enabling the possibility of accessing contents associated to the monument itself, or new forms of fruition for visually impaired people. Moreover, computer vision …
The Quest for available bandwidth measurement techniques for large-scale distributed systems
2009
In recent years the research community has developed many techniques to estimate the end-to-end available bandwidth of an Internet path. This important metric can be potentially exploited to optimize the performance of several distributed systems and, even, to improve the effectiveness of the congestion control mechanism of TCP. Thus, it has been suggested that some existing estimation techniques could be used for this purpose. However, existing tools were not designed for large-scale deployments and were mostly validated in controlled settings, considering only one measurement running at a time. In this paper, we argue that current tools, while offering good estimates when used alone, migh…
Batch Methods for Resolution Enhancement of TIR Image Sequences
2015
Thermal infrared (TIR) time series are exploited by many methods based on Earth observation (EO), for such applications as agriculture, forest management, and meteorology. However, due to physical limitations, data acquired by a single sensor are often unsatisfactory in terms of spatial or temporal resolution. This issue can be tackled by using remotely sensed data acquired by multiple sensors with complementary features. When nonreal-time functioning or at least near real-time functioning is admitted, the measurements can be profitably fed to a sequential Bayesian algorithm, which allows to account for the correlation embedded in the successive acquisitions. In this work, we focus on appli…