Search results for "Tributi"

showing 10 items of 6415 documents

Feature extraction from remote sensing data using Kernel Orthonormalized PLS

2007

This paper presents the study of a sparse kernel-based method for non-linear feature extraction in the context of remote sensing classification and regression problems. The so-called kernel orthonormalized PLS algorithm with reduced complexity (rKOPLS) has two core parts: (i) a kernel version of OPLS (called KOPLS), and (ii) a sparse (reduced) approximation for large scale data sets, which ultimately leads to rKOPLS. The method demonstrates good capabilities in terms of expressive power of the extracted features and scalability.

business.industryComputer scienceFeature extractionContext (language use)Regression analysisPattern recognitionSparse approximationcomputer.software_genreKernel principal component analysisKernel (linear algebra)Kernel embedding of distributionsKernel (statistics)Radial basis function kernelArtificial intelligenceData miningbusinesscomputerRemote sensing2007 IEEE International Geoscience and Remote Sensing Symposium
researchProduct

Performance analysis of binary DPSK modulation schemes over Hoyt fading channels

2009

This paper presents a performance analysis of differential phase shift keying (DPSK) modulation schemes over Hoyt fading channels. Based upon the theory of DPSK modulation and a recently derived formula for the probability density function (PDF) of the differential phase between two Hoyt vectors contaminated by additive white Gaussian noise (AWGN), the bit error probability (BEP) for DPSK systems with noncoherent demodulation over Hoyt channels is analyzed. In the analysis, the correlation between adjacent bits is taken into account. The obtained theoretical results are fully validated first by reducing them to the corresponding known solutions for the Rayleigh fading distribution being a s…

business.industryComputer scienceKeyingComputer Science::Performancesymbols.namesakeFading distributionAdditive white Gaussian noiseModulationsymbolsDemodulationProbability distributionFadingTelecommunicationsbusinessAlgorithmComputer Science::Information TheoryRayleigh fading2009 6th International Symposium on Wireless Communication Systems
researchProduct

DTMC modeling for performance evaluation of DW-MAC in wireless sensor networks

2016

Synchronized duty cycling (DC) aligns sensor nodes to wake up at the same time in order to reduce idle listening for medium access control (MAC) in wireless sensor networks (WSNs). Demand wakeup MAC (DW-MAC) is a popular synchronous DC MAC protocol which allows nodes to compete and transmit multiple packets in one operational cycle. This multiple packet transmission (MPT) feature makes DW-MAC more energy efficient when comparing with other existing single time competition based protocols such as sensor MAC (S-MAC). In the literature, no analytical model exists to evaluate the performance of DW-MAC. In this paper, we develop two associated discrete time Markov chain (DTMC) models and incorpo…

business.industryComputer scienceNetwork packetComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS010401 analytical chemistryReal-time computing020206 networking & telecommunications02 engineering and technologyEnergy consumption01 natural sciencesSynchronization0104 chemical sciencesComputer Science::PerformanceKey distribution in wireless sensor networksComputer Science::Networking and Internet Architecture0202 electrical engineering electronic engineering information engineeringMobile wireless sensor networkMultiple Access with Collision Avoidance for WirelessbusinessWireless sensor networkComputer Science::Information TheoryEfficient energy useComputer network2016 IEEE Wireless Communications and Networking Conference
researchProduct

SCARKER: A sensor capture resistance and key refreshing scheme for mobile WSNs

2011

How to discover a captured node and to resist node capture attack is a challenging task in Wireless Sensor Networks (WSNs). In this paper, we propose a node capture resistance and key refreshing scheme for mobile WSNs which is based on the Chinese remainder theorem. The scheme is able of providing forward secrecy, backward secrecy and collusion resistance for diminishing the effects of capture attacks. By implementing our scheme on a Sun SPOT based sensor network testbed, we demonstrate that the time for updating a new group key varies from 56 ms to 546 ms and the energy consumption is limited to 16.5–225 mJ, depending on the length of secret keys and the number of sensors in a group.

business.industryComputer scienceNode (networking)TestbedMobile computingEnergy consumptionSun SPOTKey distribution in wireless sensor networksForward secrecyMobile telephonybusinessWireless sensor networkComputer networkGroup key2011 IEEE 36th Conference on Local Computer Networks
researchProduct

Analysis of the Effect of Human Presence on a Wireless Sensor Network

2011

Wireless Sensor Networks (WSNs) are gaining an increasing industry wide adoption. However, there remain major challenges such as network dimensioning and node placement especially in Built Environment Networks (BENs). Decisions on the node placement, orientation, and the number of nodes to cover the area of interest are usually ad-hoc. Ray tracing tools are traditionally employed to predict RF signal propagation; however, such tools are primarily intended for outdoor environments. RF signal propagation varies greatly indoors due to building materials and infrastructure, obstacles, node placement, antenna orientation and human presence. Because of the complexity of signal prediction, these f…

business.industryComputer scienceSettore ING-INF/03 - TelecomunicazioniRSSReal-time computingcomputer.file_formatRadio propagationKey distribution in wireless sensor networksBuilt Environment Networks (BENs) Human Presence Node Placement Radiation Patterns Wireless Sensor Networks (WSNs)Ray tracing (graphics)Radio frequencyTransceiverbusinessWireless sensor networkcomputerDimensioningSoftwareComputer network
researchProduct

A Novel Amplify-and-Forward Relay Channel Model for Mobile-to-Mobile Fading Channels under Line-of-Sight Conditions

2021

In this chapter, we have proposed a new flexible M2M amplify-and-forward relay fading channel model under LOS propagation conditions. The novelty in the model is that we have considered the LOS components in both transmission links, i.e., the direct link between the source mobile station and the destination mobile station as well as the link via the mobile relay. By analogy with multiple scattering radio propagation channels, we have developed the MLSS fading channel as a second-order scattering channel, where the received signal comprises the single and double scattered components. Furthermore, the flexibility of the MLSS fading channel model comes from the fact that it can be reduced to d…

business.industryComputer scienceTopologylaw.inventionsymbols.namesakeNon-line-of-sight propagationScattering channelFading distributionRelaylawChannel state informationMobile stationsymbolsComputer Science::Networking and Internet ArchitectureFadingRayleigh scatteringTelecommunicationsbusinessRelay channelCommunication channelComputer Science::Information Theory
researchProduct

A study on the statistical properties of double hoyt fading channels

2009

This paper deals with a study on the statistical properties of narrowband amplify-and-forward relay fading channels for Hoyt multipath propagation environments. We consider the basic radio link topology, where only one fixed relay station is used for the amplification. In this case, the envelope of the signal received over the overall multipath channel is modeled by the so-called double Hoyt fading process. Considering this multipath propagation channel model, analytical expressions for the first and second order statistics are provided. Specifically, the mean value, variance, probability density function (PDF), level-crossing rate (LCR), and average duration of fades (ADF) of double Hoyt p…

business.industryComputer sciencelaw.inventionFading distributionNarrowbandRelaylawComputer Science::Networking and Internet ArchitectureSector modelFadingStatistical physicsbusinessMultipath propagationComputer Science::Information TheoryComputer networkRayleigh fadingCommunication channel2009 6th International Symposium on Wireless Communication Systems
researchProduct

MansOS

2010

Often software for wireless sensor networks (WSNs) is developed using a specific event based operating system (OS) such as TinyOS. However, this requires steep learning curve for the new developers. Other operating systems for embedded devices have limited support for new hardware platforms. Our goal is to provide an operating system for resource constrained devices that is easy to use for the wide range of researchers and developers familiar with C programming language and Unix operating system concepts. In addition, we provide a framework for agile portability to new hardware platforms, due to the nature of WSN systems that require specific hardware or features for the sensing tasks at ha…

business.industryComputer sciencemedia_common.quotation_subjectcomputer.software_genreEmbedded operating systemSoftware portabilityKey distribution in wireless sensor networksSoftwareDebuggingEmbedded systemOperating systemx86businessnesCWireless sensor networkcomputermedia_commonProceedings of the 8th ACM Conference on Embedded Networked Sensor Systems
researchProduct

[Loyauté des transactions sur un marché relatif aux attributs de croyance : une analyse appliquée aux produits agro-alimentaires]

2001

International audience; Après avoir décliné la typologie des caractéristiques des produits en termes d'attributs de recherche, d'expérience et de croyance, les auteurs soulignent les mécanismes susceptibles d'assurer l'efficacité des transactions marchandes. Afin de cerner les enjeux liés à la loyauté des transactions dans le cas des attributs de croyance, ils montrent à l'aide d'un jeu simple, le caractère crucial des phases de définition, de vérification et de signalement, ces dernières nécessitant généralement l'intervention d'agents extérieurs à la transaction marchande.

business.industryCredence[SDV]Life Sciences [q-bio]Economics Econometrics and Finance (miscellaneous)Food safety[SDV] Life Sciences [q-bio]Food packagingCredence goodCommerceKaufkraftparitätProduktqualitätFood productsINFORMATION DU CONSOMMATEUREuropean integrationEconomicsddc:330Consommation distribution et transformationBusiness Management and Accounting (miscellaneous)AußenhandelFood qualitybusinessSocial policyVertrauensgüter
researchProduct

Statistical properties of the capacity of Rice channels with MRC and EGC

2009

In this paper, we have studied the statistical properties of the capacity of Rice channels for both maximal ratio combining (MRC) and equal gain combining (EGC) schemes. We have analyzed the effect of the number of diversity branches and the amplitude of the line-of-sight (LOS) components in the diversity branches on the statistics of the channel capacity. Specifically, we have derived analytical expressions for the probability density function (PDF), cumulative distribution function (CDF), level-crossing rate (LCR), and average duration of fades (ADF) of the capacity of Rice channels when using MRC and EGC. It is observed that if the number of diversity branches or the amplitude of the LOS…

business.industryCumulative distribution functionProbability density functionrespiratory systemAntenna diversityChannel capacitySignal-to-noise ratioAmplitudeStatisticsWirelessMaximal-ratio combiningbusinessTelecommunicationshuman activitiesComputer Science::Information TheoryMathematics2009 International Conference on Wireless Communications & Signal Processing
researchProduct