Search results for "lcsh:Telecommunication"

showing 10 items of 24 documents

Time-Dependent Multiple Depot Vehicle Routing Problem on Megapolis Network under Wardrop's Traffic Flow Assignment

2018

In this work multiple depot vehicle routing problem is considered in case of variable travel times between nodes on a metropolis network. This variant of the classic multiple depot vehicle routing problem is motivated by the fact that in urban contexts variable traffic conditions play an essential role and can not be ignored in order to perform a realistic optimization. Time-travel matrices corresponding to each period of planning horizon were formed by solving the traffic assignment problem in conjunction with shortest path problem. Routing problem instances include from 20 to 100 customers randomly chosen from a road network of Saint-Petersburg. The results demonstrate that taking into ac…

Mathematical optimizationroadsDepotComputer scienceTraffic Flow Assignment0211 other engineering and technologiesTime horizon02 engineering and technologylcsh:Telecommunicationoptimointilcsh:TK5101-67200502 economics and businessVehicle routing problemta113050210 logistics & transportationreititys021103 operations researchtiet05 social sciencesbiological system modelingTraffic flowMultiple Depot Vehicle Routing ProblemVariable (computer science)suunnitteluroutingShortest path problemTime-Dependent Routing ProblemRouting (electronic design automation)planningMegapolis NetworkAssignment problemvehicle routingoptimization
researchProduct

NFVMon: Enabling Multioperator Flow Monitoring in 5G Mobile Edge Computing

2018

With the advances of new-generation wireless and mobile communication systems such as the fifth-generation (5G) mobile networks and Internet of Things (IoT) networks, demanding applications such as Ultra-High-Definition video applications is becoming ever popular. These applications require real-time monitoring and processing to meet the mission-critical quality of service requirements and are expected to be supported by the emerging fog or edge computing paradigms. This paper presents NFVMon, a novel monitoring architecture to enable flow monitoring capabilities of network traffic in a 5G multioperator mobile edge computing environment. The proposed NFVMon is integrated with the management…

Mobile edge computingArticle SubjectComputer Networks and CommunicationsComputer sciencebusiness.industrylcsh:TQuality of serviceTestbed020206 networking & telecommunicationsCloud computing02 engineering and technologylcsh:Technologylcsh:Telecommunicationlcsh:TK5101-67200202 electrical engineering electronic engineering information engineeringWireless020201 artificial intelligence & image processingElectrical and Electronic EngineeringbusinessInternet of Things5GEdge computingInformation SystemsComputer networkWireless Communications and Mobile Computing
researchProduct

Advanced Optical Processing of Microwave Signals

2005

The authors present a review on the recent approaches proposed to implement transversal RF filters. Different tunable transversal filters consisting of wavelength tunable optical taps and those employing the tunability of dispersive devices are presented showing their high-performance characteristics. A comprehensive review of the fundamentals and a discussion on the main limitation of these structures are also included.

Optical fiberMaterials sciencemicrowave photonicsoptical fibersdelay lines.Microwave signalslcsh:TK7800-8360Physics::Opticslaw.inventionlcsh:TelecommunicationRf filterslawlcsh:TK5101-6720Electrical and Electronic EngineeringMicrowave photonicsSignal processingbusiness.industrytransversal filterslcsh:ElectronicsOptical processingÒpticaWavelengthHardware and ArchitectureTransversal (combinatorics)Signal ProcessingOptoelectronicsbusinessTelecommunicationsAmplificadors de microonesEURASIP Journal on Advances in Signal Processing
researchProduct

BVS: A Lightweight Forward and Backward Secure Scheme for PMU Communications in Smart Grid

2011

In smart grid, phaser measurement units (PMUs) can upload readings to utility centers via supervisory control and data acquisition (SCADA) or energy management system (EMS) to enable intelligent controlling and scheduling. It is critical to maintain the secrecy of readings so as to protect customers' privacy, together with integrity and source authentication for the reliability and stability of power scheduling. In particular, appealing security scheme needs to perform well in PMUs that usually have computational resource constraints, thus designed security protocols have to remain lightweight in terms of computation and storage. In this paper, we propose a family of schemes to solve this p…

PasswordSecurity analysisArticle SubjectComputer sciencebusiness.industryCommunicationHash functionComputerApplications_COMPUTERSINOTHERSYSTEMSCryptographic protocolComputational resourcelcsh:TelecommunicationPublic-key cryptographySmart gridSCADAlcsh:TK5101-6720Media TechnologyElectrical and Electronic EngineeringbusinessComputer networkInternational Journal of Digital Multimedia Broadcasting
researchProduct

Security framework for dynamic service-oriented IT systems

2018

The paper proposes a framework for dynamic service-oriented IT systems security. We review the context of service-oriented architecture (SOA), which constitutes a paradigm of dynamic system configuration including security constraints at the system module development stage, supporting with the domain-driven resources, carrying out routine SOA maintenance and implementing XML-compatible parsing technologies in order to improve the system performance. Likewise, we discuss the fundamental differences between security management systems with traditional centralized and monolithic architecture and service-oriented IT systems from the perspective of security-related issues. Web services security …

Security frameworkProcess managementService oriented systemsComputer Networks and CommunicationsComputer science0211 other engineering and technologiesContext (language use)02 engineering and technologylcsh:Telecommunicationlcsh:TK5101-6720security level0202 electrical engineering electronic engineering information engineeringComputer Science (miscellaneous)Electrical and Electronic EngineeringArchitectureService orientedSecurity levelService-oriented systems021110 strategic defence & security studieslcsh:T58.5-58.64lcsh:Information technologybusiness.industryInformation technologyComputer Science Applicationssecurity incidents020201 artificial intelligence & image processingbusinessJournal of Information and Telecommunication
researchProduct

High-level Programming and Symbolic Reasoning on IoT Resource Constrained Devices

2015

While the vision of Internet of Things (IoT) is rather inspiring, its practical implementation remains challenging. Conventional programming approaches prove unsuitable to provide IoT resource constrained devices with the distributed processing capabilities required to implement intelligent, autonomic, and self-organizing behaviors. In our previous work, we had already proposed an alternative programming methodology for such systems that is characterized by high-level programming and symbolic expressions evaluation, and developed a lightweight middleware to support it. Our approach allows for interactive programming of deployed nodes, and it is based on the simple but effective paradigm of …

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniInteractive programmingSIMPLE (military communications protocol)MultimediaKnowledge representation and reasoningComputer Networks and CommunicationsComputer scienceDistributed computingcomputer.file_formatKnowledge Representationcomputer.software_genreFuzzy logiclcsh:TelecommunicationSoftware development processResource constrained devicesFuzzy LogicHigh-level programming languageMiddleware (distributed applications)Fuzzy Logic.lcsh:TK5101-6720ExecutableResource constrained devicecomputerHigh-level programmingEAI Endorsed Transactions on Cognitive Communications
researchProduct

Simultaneous harvest-and-transmit ambient backscatter communications under Rayleigh fading

2019

Ambient backscatter communications is an emerging paradigm and a key enabler for pervasive connectivity of low-powered wireless devices. It is primarily beneficial in the Internet of things (IoT) and the situations where computing and connectivity capabilities expand to sensors and miniature devices that exchange data on a low power budget. The premise of the ambient backscatter communication is to build a network of devices capable of operating in a battery-free manner by means of smart networking, radio frequency (RF) energy harvesting and power management at the granularity of individual bits and instructions. Due to this innovation in communication methods, it is essential to investigat…

Signal Processing (eess.SP)energy harvestingPower managementBackscatterComputer Networks and CommunicationsComputer sciencelcsh:TK7800-8360energiansiirtoSystems and Control (eess.SY)02 engineering and technologysmart networkingElectrical Engineering and Systems Science - Systems and Control01 natural sciencesPower budgetlcsh:Telecommunicationlangaton tiedonsiirtoInternet of things (IoT)lcsh:TK5101-6720FOS: Electrical engineering electronic engineering information engineeringSmart networking0202 electrical engineering electronic engineering information engineeringElectronic engineeringWirelessesineiden internetElectrical Engineering and Systems Science - Signal ProcessingRayleigh fadingEnergy harvestingbusiness.industrylcsh:Electronics010401 analytical chemistry020206 networking & telecommunicationsambient backscatter communicationsWireless-powered communications0104 chemical sciencesComputer Science ApplicationsAmbient backscatter communicationswireless-powered communicationsSignal ProcessingälytekniikkaRadio frequencybusinessEnergy harvestinglangattomat verkotEnergy (signal processing)EURASIP Journal on Wireless Communications and Networking
researchProduct

Multispectral Imaging using a Stereo Camera: Concept, Design and Assessment

2011

This paper proposes a one-shot six-channel multispectral color image acquisition system using a stereo camera and a pair of optical filters. The two filters from the best pair selected from among readily available filters such that they modify the sensitivities of the two cameras in such a way that they produce optimal estimation of spectral reflectance and/or color are placed in front of the two lenses of the stereo camera. The two images acquired from the stereo camera are then registered for pixel-to-pixel correspondence. The spectral reflectance and/or color at each pixel on the scene are estimated from the corresponding camera outputs in the two images. Both simulations and experiments…

[ INFO.INFO-TS ] Computer Science [cs]/Signal and Image ProcessingComputer scienceMultispectral imageComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONlcsh:TK7800-836002 engineering and technology[ SPI.SIGNAL ] Engineering Sciences [physics]/Signal and Image processing01 natural scienceslcsh:Telecommunicationlaw.inventionMultispectral pattern recognitionstereo camera010309 optics[INFO.INFO-TS]Computer Science [cs]/Signal and Image ProcessinglawCamera auto-calibrationlcsh:TK5101-67200103 physical sciences0202 electrical engineering electronic engineering information engineeringmultispectral imagingComputer visionreflectance estimationPixelColor imagebusiness.industrylcsh:ElectronicsReflectivityLens (optics)020201 artificial intelligence & image processingArtificial intelligencebusiness[SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processing:Mathematics and natural science: 400::Information and communication science: 420::Simulation visualization signal processing image processing: 429 [VDP]Stereo cameraComputer stereo visionCamera resectioning
researchProduct

Causality-based Social Media Analysis for Normal Users Credibility Assessment in a Political Crisis

2019

Information trustworthiness assessment on political social media discussions is crucial to maintain the order of society, especially during emergent situations. The polarity nature of political topics and the echo chamber effect by social media platforms allow for a deceptive and a dividing environment. During a political crisis, a vast amount of information is being propagated on social media, that leads up to a high level of polarization and deception by the beneficial parties. The traditional approaches to tackling misinformation on social media usually lack a comprehensive problem definition due to its complication. This paper proposes a probabilistic graphical model as a theoretical vi…

fake newsComputer sciencemedia_common.quotation_subjectPolarization (politics)Bayesian networkDeceptionData sciencelcsh:TelecommunicationPoliticslcsh:TK5101-6720bayesian networksCredibilitySocial mediaMisinformationRoad mapsocial media analysiscausality analysismedia_common2019 25th Conference of Open Innovations Association (FRUCT)
researchProduct

Zero-shot Semantic Segmentation using Relation Network

2021

Zero-shot learning (ZSL) is widely studied in recent years to solve the problem of lacking annotations. Currently, most studies on ZSL are for image classification and object detection. But, zero-shot semantic segmentation, pixel level classification, is still at its early stage. Therefore, this work proposes to extend a zero-shot image classification model, Relation Network (RN), to semantic segmentation tasks. We modified the structure of RN based on other state-of-the-arts semantic segmentation models (i.e. U-Net and DeepLab) and utilizes word embeddings from Caltech-UCSD Birds 200-2011 attributes and natural language processing models (i.e. word2vec and fastText). Because meta-learning …

hahmontunnistus (tietotekniikka)Meta learning (computer science)Computer scienceSemanticscomputer visionlcsh:Telecommunicationmeta-learninglcsh:TK5101-6720SegmentationWord2veczero-shot semantic segmentationkonenäközero-shot learningimage segmentationContextual image classificationbusiness.industrydeep learningPattern recognitionImage segmentationsemantic segmentationObject detectionkoneoppiminenrelation networkArtificial intelligencebusinessWord (computer architecture)
researchProduct