Search results for "internet"

showing 10 items of 2589 documents

Domain-Knowledge Optimized Simulated Annealing for Network-on-Chip Application Mapping

2013

Network-on-Chip architectures are scalable on-chip interconnection networks. They replace the inefficient shared buses and are suitable for multicore and manycore systems. This paper presents an Optimized Simulated Annealing (OSA) algorithm for the Network-on-Chip application mapping problem. With OSA, the cores are implicitly and dynamically clustered using knowledge about communication demands. We show that OSA is a more feasible Simulated Annealing approach to NoC application mapping by comparing it with a general Simulated Annealing algorithm and a Branch and Bound algorithm, too. Using real applications we show that OSA is significantly faster than a general Simulated Annealing, withou…

Computer Science::Hardware ArchitectureInterconnectionMulti-core processorNetwork on a chipBranch and boundComputer scienceScalabilitySimulated annealingComputer Science::Networking and Internet ArchitectureParallel computingAdaptive simulated annealingCluster analysis
researchProduct

Application of information fusion to unreliable wireless sensor networks

2012

Masteroppgave i informasjons- og kommunikasjonsteknologi IKT590 2012 – Universitetet i Agder, Grimstad Thesis is appropriated analyze to performance metric evaluation for decentralized distributed detection sensor network strategy. Performance metric investigated a typical wireless sensor network with respect to IEEE 802.15.4 standard. Distributed detection is considered with present of the fusion node as long as clustering and non-clustering sensor network. The clusters are organized uniform and non-uniform topology sensor networks with tree-based topologies and hierarchical multi-level fusion centers. Fusion centers are acting as head of cluster for decision making based on majority-like …

Computer Science::Networking and Internet Architecture
researchProduct

Automatic construction of test sets: Theoretical approach

2005

We consider the problem of automatic construction of complete test set (CTS) from program text. The completeness criterion adopted is C1, i.e., it is necessary to execute all feasible branches of program at least once on the tests of CTS. A simple programming language is introduced with the property that the values used in conditional statements are not arithmetically deformed. For this language the CTS problem is proved to be algorithmically solvable and CTS construction algorithm is obtained. Some generalizations of this language containing counters, stacks or arrays are considered where the CTS problem remains solvable. In conclusion the applications of the obtained results to CTS constr…

Computer Science::PerformanceComputer scienceProperty (programming)Simple (abstract algebra)Completeness (order theory)Test setComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSComputer Science::Networking and Internet ArchitectureComputer Science::Programming LanguagesInternal variableArithmeticHardware_LOGICDESIGNTest (assessment)
researchProduct

Spectrogram Analysis of Multipath Fading Channels under Variations of the Mobile Speed

2016

When modelling, analysing, and simulating mobile radio channels, it is generally assumed that the speed of the mobile station (MS) is constant. In practice, however, the mobile speed varies with time. Mobile speed variations result in nonwide- sense stationary multipath fading channels, which can be modelled by a sum-of-chirps (SOCh) processes. In this paper, we analyse the local Doppler power spectral density (PSD) of SOCh processes by using the concept of the spectrogram. The spectrogram provides an estimate of the local Doppler PSD and gives insight into how the Doppler PSD changes over time if the MS increases or decreases its speed. A closed-form solution is presented for the spectrogr…

Computer science010401 analytical chemistrySpectral density020206 networking & telecommunications02 engineering and technology01 natural sciences0104 chemical sciencesTime–frequency analysissymbols.namesakeMobile stationComputer Science::Networking and Internet Architecture0202 electrical engineering electronic engineering information engineeringsymbolsElectronic engineeringSpectrogramDoppler effectRandom variableMultipath propagationCommunication channel2016 IEEE 84th Vehicular Technology Conference (VTC-Fall)
researchProduct

Teletraffic Engineering for Direct Load Control in Smart Grids

2018

International audience; The traditional paradigm for power grid operation is to continuously adapt energy production to demand. This paradigm is challenged by the increasing penetration of renewable sources, that are more variable and less predictable. An alternative approach is the direct load control of some inherently flexible electric loads to shape the demand. Direct control of deferrable loads presents analogies with flow admission control in telecommunication networks: a request for network resources (bandwidth or energy) can be delayed on the basis of the current network status in order to guarantee some performance metrics. In this paper we go beyond such an analogy, showing that u…

Computer science020209 energyDistributed computingDirect controlEnergy Engineering and Power Technology02 engineering and technologySmart gridAdmission control; Direct load control; Privacy; Smart grid;7. Clean energyTeletraffic engineering[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0202 electrical engineering electronic engineering information engineeringPower gridElectrical and Electronic EngineeringDirect load controlLeakage (electronics)Direct Load Controlbusiness.industryRenewable Energy Sustainability and the EnvironmentSettore ING-INF/03 - TelecomunicazioniBandwidth (signal processing)Admission Control[SPI.NRJ]Engineering Sciences [physics]/Electric powerAdmission controlRenewable energySmart gridControl and Systems EngineeringPrivacybusinessAdmission control
researchProduct

Speech Intelligibility Analysis and Approximation to Room Parameters through the Internet of Things

2021

In recent years, Wireless Acoustic Sensor Networks (WASN) have been widely applied to different acoustic fields in outdoor and indoor environments. Most of these applications are oriented to locate or identify sources and measure specific features of the environment involved. In this paper, we study the application of a WASN for room acoustic measurements. To evaluate the acoustic characteristics, a set of Raspberry Pi 3 (RPi) has been used. One is used to play different acoustic signals and four are used to record at different points in the room simultaneously. The signals are sent wirelessly to a computer connected to a server, where using MATLAB we calculate both the impulse response (IR…

Computer scienceAcoustics01 natural scienceslcsh:TechnologySet (abstract data type)lcsh:Chemistry030507 speech-language pathology & audiology03 medical and health sciencesWASNroom acousticsWirelessGeneral Materials ScienceMATLABInstrumentationlcsh:QH301-705.5Impulse responsecomputer.programming_languageFluid Flow and Transfer ProcessesMeasure (data warehouse)room parameters estimationbusiness.industrylcsh:TProcess Chemistry and Technology010401 analytical chemistryGeneral Engineeringspeech intelligibility indexRoom acousticslcsh:QC1-9990104 chemical sciencesComputer Science Applicationslcsh:Biology (General)lcsh:QD1-999Asynchronous communicationlcsh:TA1-2040impulse response0305 other medical scienceInternet of Thingsbusinesslcsh:Engineering (General). Civil engineering (General)computerlcsh:PhysicsApplied Sciences
researchProduct

Machine Learning Techniques for Intrusion Detection: A Comparative Analysis

2016

International audience; With the growth of internet world has transformed into a global market with all monetary and business exercises being carried online. Being the most imperative resource of the developing scene, it is the vulnerable object and hence needs to be secured from the users with dangerous personality set. Since the Internet does not have focal surveillance component, assailants once in a while, utilizing varied and advancing hacking topologies discover a path to bypass framework " s security and one such collection of assaults is Intrusion. An intrusion is a movement of breaking into the framework by compromising the security arrangements of the framework set up. The techniq…

Computer scienceAnomaly-based intrusion detection system02 engineering and technologyIntrusion detection systemIDSMachine learningcomputer.software_genre[ INFO.INFO-CV ] Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV][INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI]Machine LearningResource (project management)Component (UML)0202 electrical engineering electronic engineering information engineeringROCSet (psychology)[ INFO.INFO-AI ] Computer Science [cs]/Artificial Intelligence [cs.AI]False Positivebusiness.industryACM[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]020206 networking & telecommunicationsPrecisionObject (computer science)True PositiveOutlier020201 artificial intelligence & image processingThe InternetArtificial intelligenceData miningbusinesscomputer
researchProduct

Geometrical Modeling of Non-Stationary Polarimetric Vehicular Radio Channels

2019

This paper presents a geometry-based statistical model (GBSM) of polarimetric wideband multipath radio channels for vehicle-to-vehicle (V2V) communications. The proposed model captures the effects of depolarization caused by multipath propagation, and it also accounts for the non-stationary characteristics of wideband V2V channels. This is a novel feature, because the existing polarimetric channel models are built on the assumption that the channel is a wide-sense stationary random process. In the modeling framework described in this paper, the channel depolarization function is given by a linear transformation in the form of a simple rotation matrix. This linear transformation is transpare…

Computer scienceComputationPolarimetryStatistical modelComputingMilieux_LEGALASPECTSOFCOMPUTINGRotation matrixTopologyLinear mapComputer Science::Networking and Internet ArchitectureWidebandVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Multipath propagationComputer Science::Information TheoryCommunication channel
researchProduct

Outage Probability Analysis of User-Centric SBS-Based HCNets Under Hybrid Rician/Rayleigh Fading

2020

To model dense user equipment (UE) distribution in heterogeneous cellular networks (HCNets), the Poisson cluster process (PCP) has emerged as a promising tool. In user-centric HCNets where UEs are distributed according to a PCP around a small base station (SBS), the network performance has been commonly studied in literature under a Rayleigh fading environment assumption. However, such an assumption may not hold in user-centric HCNets given the possible existence of a strong line-of-sight (LOS) link between UEs and BSs due to a relatively short transmission distance. This letter analyzes the performance of user-centric SBS based HCNets by considering that the desired LOS link experiences Ri…

Computer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunicationsData_CODINGANDINFORMATIONTHEORY02 engineering and technologyComputer Science ApplicationsBase stationTransmission (telecommunications)Modeling and SimulationRician fadingComputer Science::Networking and Internet Architecture0202 electrical engineering electronic engineering information engineeringCellular networkNetwork performanceElectrical and Electronic EngineeringAlgorithmComputer Science::Information TheoryRayleigh fadingIEEE Communications Letters
researchProduct

A Kalman Filter Approach for Distinguishing Channel and Collision Errors in IEEE 802.11 Networks

2008

In the last years, several strategies for maximizing the throughput performance of IEEE 802.11 networks have been proposed in literature. Specifically, it has been shown that optimizations are possible both at the medium access control (MAC) layer, and at the physical (PHY) layer. In fact, at the MAC layer, it is possible to minimize the channel waste due to collisions and backoff expiration times, by tuning the minimum contention window as a function of the network congestion level. At the PHY layer, it is possible to improve the transmission robustness, by selecting a suitable modulation/coding scheme as a function of the channel quality perceived by the stations. However, the feasibility…

Computer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSReal-time computingPhysical layerchannel estimationThroughputKalman filterNetwork allocation vectorNetwork congestionExtended Kalman filterWLANIEEE 802.11ModulationRobustness (computer science)PHYWireless lanComputer Science::Networking and Internet ArchitectureCommunication channel
researchProduct