Search results for "emso"

showing 10 items of 580 documents

Automotive Radar in a UAV to Assess Earth Surface Processes and Land Responses

2020

The use of unmanned aerial vehicles (UAVs) in earth science research has drastically increased during the last decade. The reason being innumerable advantages to detecting and monitoring various environmental processes before and after certain events such as rain, wind, flood, etc. or to assess the current status of specific landforms such as gullies, rills, or ravines. The UAV equipped sensors are a key part to success. Besides commonly used sensors such as cameras, radar sensors are another possibility. They are less known for this application, but already well established in research. A vast number of research projects use professional radars, but they are expensive and difficult to hand…

010504 meteorology & atmospheric sciencesComputer scienceUAVReal-time computingComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION0211 other engineering and technologiesComputerApplications_COMPUTERSINOTHERSYSTEMS77 GHz02 engineering and technologylcsh:Chemical technology01 natural sciencesBiochemistryArticleAnalytical Chemistrylaw.inventionARS-408lawlcsh:TP1-1185ComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMSElectrical and Electronic EngineeringRadarInstrumentationARS-404021101 geological & geomatics engineering0105 earth and related environmental sciencesRadarAtomic and Molecular Physics and OpticsEarth surfaceAutomotive radarKey (cryptography)Sensors
researchProduct

Combining congested-flow isolation and injection throttling in HPC interconnection networks

2011

Existing congestion control mechanisms in interconnects can be divided into two general approaches. One is to throttle traffic injection at the sources that contribute to congestion, and the other is to isolate the congested traffic in specially designated resources. These two approaches have different, but non-overlapping weaknesses. In this paper we present in detail a method that combines injection throttling and congested-flow isolation. Through simulation studies we first demonstrate the respective flaws of the injection throttling and of flow isolation. Thereafter we show that our combined method extracts the best of both approaches in the sense that it gives fast reaction to congesti…

020203 distributed computingInterconnectionbusiness.industryComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSFlow (psychology)020206 networking & telecommunications02 engineering and technologyBandwidth throttlingThrottleNetwork congestion0202 electrical engineering electronic engineering information engineeringIsolation (database systems)businessCombined methodComputer network
researchProduct

Hpdm : A Hybrid Pseudonym Distribution Method for Vehicular Ad-Hoc Networks

2016

Abstract Protecting the location privacy of drivers is still one of the main challenges in Vehicular Ad-hoc Networks (VANETs). The changing of pseudonym is commonly accepted as a solution to this problem. The pseudonyms represent fake vehicle identifiers. Roadside Units (RSUs) play a central role in the existing pseudonyms distribution solutions. Indeed, the VANET area should totally be covered by RSUs in order to satisfy the demand of vehicles in terms of pseudonyms. However, the total coverage is costly and hard to be achieved, especially in the first phase of VANETs deployment. In addition, RSUs could be overloaded due to the large number of pseudonyms requests that could be received fro…

020203 distributed computingVehicular ad hoc networkLocation privacyWireless ad hoc networkComputer sciencebusiness.industry[SPI] Engineering Sciences [physics]ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPseudonyms distribution.020206 networking & telecommunications02 engineering and technologyPseudonymNetwork simulationIdentifier[SPI]Engineering Sciences [physics]Pseudonyms distribution0202 electrical engineering electronic engineering information engineeringSecurityComputingMilieux_COMPUTERSANDSOCIETYGeneral Earth and Planetary SciencesDistribution methodVANETsbusinessGeneral Environmental ScienceComputer network
researchProduct

Emotional Design: Discovering Emotions Across Cars’ Morphologies

2020

The primary focus behind the overall design involves shifting from a designer-centric concept to a user-centric one. In essence, cars are utilitarian from an engineering point of view and symbolic-emotional from a social point of view. The modern car retains a strong social position and also generates vivid emotions. The tellability of a car is the priority when communicating with a customer. As a result, this paper proposes a computational approach towards studying the relationship between car morphology and the aforementioned produced emotions. Emotions are considered self-measurable and physiologically distinct. Each car is thus self-evaluated emotionally by a panel of potential users. T…

0209 industrial biotechnologyPoint (typography)[SHS.INFO]Humanities and Social Sciences/Library and information sciences05 social sciencesSocial environmentContext (language use)02 engineering and technologyStyle (sociolinguistics)[SHS]Humanities and Social SciencesPower (social and political)020901 industrial engineering & automationComputerSystemsOrganization_MISCELLANEOUS0502 economics and businessSocial position050211 marketingDynamismNeutralityPsychologyComputingMilieux_MISCELLANEOUSCognitive psychology
researchProduct

Efficient Transport Protocol for Networked Haptics Applications

2008

The performance of haptic application is highly sensitive to communication delays and losses of data. It implies several constraints in developing networked haptic applications. This paper describes a new internet protocol called Efficient Transport Protocol (ETP), which aims at developing distributed interactive applications. TCP and UDP are transport protocols commonly used in any kind of networked communication, but they are not focused on real time application. This new protocol is focused on reducing roundtrip time (RTT) and interpacket gap (IPG). ETP is, therefore, optimized for interactive applications which are based on processes that are continuously exchanging data. ETP protocol i…

0209 industrial biotechnologySession Initiation ProtocolInternet Protocol Control Protocolcomputer.internet_protocolComputer scienceResource Reservation ProtocolLink Control ProtocolDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunications02 engineering and technologylaw.invention020901 industrial engineering & automationInternet protocol suitelawInternet Protocol0202 electrical engineering electronic engineering information engineeringUser Datagram ProtocolReal Time Streaming Protocolcomputer
researchProduct

Rough Set Theory for Optimization of Packet Management Mechanism in IP Routers

2020

Bandwidth and consequently optimum overall efficiency of network system relies greatly on mechanism of packet management in IP routers. Our research objective is to implement rough set theory to minimizing number of the network system attributes responsible for decision making in selection of those packets, which improve its transmission. Such an approach is called priority queuing system model, as we assign priority to the packets selected, following rough set theory. Regardless of the file format, for all the routers, packets are transmitted in sequence one-by-one. Nonetheless, quality of streaming data largely depends on how much the packet loss is minimized, or eliminated at all, if pos…

021103 operations researchNetwork packetComputer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSBandwidth (signal processing)0211 other engineering and technologies02 engineering and technologySystem modelIPv6Set (abstract data type)Transmission (telecommunications)Packet lossRough setbusinessComputer network
researchProduct

Secure and efficient verification for data aggregation in wireless sensor networks

2017

Summary The Internet of Things (IoT) concept is, and will be, one of the most interesting topics in the field of Information and Communications Technology. Covering a wide range of applications, wireless sensor networks (WSNs) can play an important role in IoT by seamless integration among thousands of sensors. The benefits of using WSN in IoT include the integrity, scalability, robustness, and easiness in deployment. In WSNs, data aggregation is a famous technique, which, on one hand, plays an essential role in energy preservation and, on the other hand, makes the network prone to different kinds of attacks. The detection of false data injection and impersonation attacks is one of the majo…

021110 strategic defence & security studiesComputer Networks and Communicationsbusiness.industryComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS0211 other engineering and technologiesEarly detection020206 networking & telecommunications02 engineering and technologyImpersonation attackComputer Science ApplicationsData aggregatorRobustness (computer science)Information and Communications TechnologySoftware deploymentScalability0202 electrical engineering electronic engineering information engineeringbusinessWireless sensor networkComputer networkInternational Journal of Network Management
researchProduct

Deep in the Dark: A Novel Threat Detection System using Darknet Traffic

2019

This paper proposes a threat detection system based on Machine Learning classifiers that are trained using darknet traffic. Traffic destined to Darknet is either malicious or by misconfiguration. Darknet traffic contains traces of several threats such as DDoS attacks, botnets, spoofing, probes and scanning attacks. We analyse darknet traffic by extracting network traffic features from it that help in finding patterns of these advanced threats. We collected the darknet traffic from the network sensors deployed at SURFnet and extracted several network-based features. In this study, we proposed a framework that uses supervised machine learning and a concept drift detector. Our experimental res…

021110 strategic defence & security studiesSpoofing attackComputer scienceNetwork telescopeDarknetComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS0211 other engineering and technologiesBotnetDenial-of-service attack02 engineering and technologyComputer securitycomputer.software_genre0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingcomputer
researchProduct

Developing an Analytical Framework for Analyzing and Comparing National E-Government Strategies

2020

Part 1: E-Government Foundations; International audience; Across the world, e-government strategies are developed for the effective digitalization of the public sector. They offer governments a framework for dealing with challenges such as technical and legal interoperability and collaboration between public and private sector stakeholders, and for promoting a future vision for a digital public sector. Since e-government strategies are policy document and, thus, likely to convey biased perspectives, analyses of these strategies can yield insights into these biases and different perspectives on public sector digitalization. Until now, there has been no widely recognized framework for systema…

050101 languages & linguisticsKnowledge managementmedia_common.quotation_subject[SHS.INFO]Humanities and Social Sciences/Library and information sciencesInteroperabilityDigital government strategy02 engineering and technologyGermanE-government strategy0202 electrical engineering electronic engineering information engineering0501 psychology and cognitive sciences[INFO]Computer Science [cs]Function (engineering)media_commonE-Governmentbusiness.industry05 social sciencesPublic sectorPrivate sectorPolicy analysislanguage.human_languageProof of conceptPolicy analysisComputerSystemsOrganization_MISCELLANEOUSlanguage020201 artificial intelligence & image processingbusiness
researchProduct

"Table 24" of "Search for heavy charged long-lived particles in the ATLAS detector in 31.6 fb$^{-1}$ of proton-proton collision data at $\sqrt{s} = 1…

2019

Candidate reconstruction efficiency for ID+Calo selection (IDCaloEff).

13000.0LLPP P --> CHI+ CHI-Proton-Proton ScatteringComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSP P --> GLUINO GLUINOComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONSUSYP P --> SQUARK+ SQUARK-P P --> STAU+ STAU-EFFSupersymmetryInformationSystems_MISCELLANEOUS
researchProduct