Search results for "military communication"

showing 10 items of 50 documents

MAC learning

2016

Cognition as a way to deal with the challenges of future wireless networks has been largely considered by the recent literature, with a main focus on physical layer adaptability and dynamic spectrum access. In this demo, we show how a simple cognition mechanism can be also applied at the MAC layer, by exploiting the emerging paradigm of programmable wireless cards. The idea is using the formal definition of simple MAC protocol components and platform-independent representation of channel events gathered from the wireless node, for emulating the behavior of protocols which are not currently running on the network, learning about their expected performance, and dynamically reconfiguring the w…

ScheduleSIMPLE (military communications protocol)Wireless networkbusiness.industryComputer scienceDistributed computingNode (networking)Physical layer020206 networking & telecommunications02 engineering and technology0202 electrical engineering electronic engineering information engineeringWirelessbusinessProtocol (object-oriented programming)Computer networkCommunication channelProceedings of the Tenth ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation, and Characterization
researchProduct

Receiver-Initiated Data Collection in Wake-Up Radio Enabled mIoT Networks: Achieving Collision-Free Transmissions by Hashing and Partitioning

2021

To achieve ultra-low energy consumption and decade-long battery lifetime for Internet of Things (IoT) networks, wake-up radio (WuR) appears as an eminent solution. While keeping devices in deep sleep for most of the time, a WuR enabled IoT device can be woken up for data transmission at any time by a wake-up call (WuC). However, collisions happen among WuCs for transmitter-initiated data reporting and among data packets for receiver-initiated data collection . In this article, we propose three novel hashing-based schemes in order to achieve collision-free data transmissions for receiver-initiated data collection. We consider first a simple scenario where all devices in a region of interest …

Scheme (programming language)Data collectionSIMPLE (military communications protocol)Computer Networks and CommunicationsRenewable Energy Sustainability and the Environmentbusiness.industryNetwork packetComputer scienceHash functionVDP::Technology: 500Energy consumptionUploadbusinesscomputercomputer.programming_languageComputer networkData transmission
researchProduct

Multi-cloud privacy preserving schemes for linear data mining

2015

This paper presents an approach to privacy-preserving data mining that relies upon a relatively simple secret sharing scheme. Its main feature is that users, sensitive data owners, are engaged in the secret sharing operations that protect their privacy. They are grouped in independent clouds connected to a central unit, the data miner, that only manages the aggregated data of each cloud, therefore avoiding the disclosure of information belonging to single nodes. We propose two privacy preserving schemes, with different privacy levels and communication costs. When designing them, we assume that some users' data might become inaccessible during the operation of the privacy preserving protocol…

Scheme (programming language)privacy linear data miningSIMPLE (military communications protocol)Computer sciencebusiness.industryPrivacy softwareSettore ING-INF/03 - TelecomunicazioniCloud computingcomputer.software_genreSecret sharingComputer Networks and CommunicationFeature (machine learning)Overhead (computing)Data miningElectrical and Electronic EngineeringbusinesscomputerComputer networkcomputer.programming_language
researchProduct

Interaction Mechanism of Humans in a Cyber-Physical Environment

2015

The research initiative “Industrie 4.0” (I4.0) of the high-tech strategy announced by the German government targets the deployment of a cyber-physical system (CPS) in production and logistics. Such CPS-based environments are characterized by an increasing number of heterogeneous intelligent autonomous and communicating artifacts tightly integrated with humans. Thus, the human’s role will become a composite factor (“man-in-the-mesh”) for this future CPS environment, playing more than just a simple role inside the control loop. This paper investigates the need of a robust communication between CPS and humans, which includes a clear semantic of the exchanged information. For this purpose, a me…

Service (systems architecture)SIMPLE (military communications protocol)Human–computer interactionSoftware deploymentMechanism (biology)Computer scienceFactor (programming language)Control systemMediationCyber-physical systemcomplex mixturescomputercomputer.programming_language
researchProduct

High-level Programming and Symbolic Reasoning on IoT Resource Constrained Devices

2015

While the vision of Internet of Things (IoT) is rather inspiring, its practical implementation remains challenging. Conventional programming approaches prove unsuitable to provide IoT resource constrained devices with the distributed processing capabilities required to implement intelligent, autonomic, and self-organizing behaviors. In our previous work, we had already proposed an alternative programming methodology for such systems that is characterized by high-level programming and symbolic expressions evaluation, and developed a lightweight middleware to support it. Our approach allows for interactive programming of deployed nodes, and it is based on the simple but effective paradigm of …

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniInteractive programmingSIMPLE (military communications protocol)MultimediaKnowledge representation and reasoningComputer Networks and CommunicationsComputer scienceDistributed computingcomputer.file_formatKnowledge Representationcomputer.software_genreFuzzy logiclcsh:TelecommunicationSoftware development processResource constrained devicesFuzzy LogicHigh-level programming languageMiddleware (distributed applications)Fuzzy Logic.lcsh:TK5101-6720ExecutableResource constrained devicecomputerHigh-level programmingEAI Endorsed Transactions on Cognitive Communications
researchProduct

Modeling Efficient and Effective Communications in VANET through Population Protocols

2021

Vehicular Ad-hoc NETworks (VANETs) enable a countless set of next-generation applications thanks to the technological progress of the last decades. These applications rely on the assumption that a simple network of vehicles can be extended with more complex and powerful network infrastructure, in which several Road Side Units (RSUs) are employed to achieve application-specific goals. However, this assumption is not always satisfied as in many real-world scenarios it is unfeasible to have a conspicuous deployment of RSUs, due to both economic and environmental constraints. With the aim to overcome this limitation, in this paper we investigate how the only Vehicle-to-Vehicle (V2V) communicati…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle Informazionieducation.field_of_studypopulation protocols VANET Vehicle-to-Vehicle communicationsVehicular ad hoc networkSIMPLE (military communications protocol)Event (computing)Computer scienceDistributed computingPopulationPopulation protocolSchema (genetic algorithms)Software deploymentSynchronization (computer science)education2021 IEEE International Conference on Smart Computing (SMARTCOMP)
researchProduct

On the Fidelity of IEEE 802.11 commercial cards

2006

The IEEE 802.11 D CF protocol is known to be fair in terms of long-term resource repartition among the contending stations. However, when considering real scenarios, where commercial 802.11 cards interact, very unpredictable as well as sometimes surprising behaviors emerge. Motivation of this paper is to investigate the reasons of the very evident disagreement between the theoretical IEEE 802.11 DCF protocol models and its practical implementations. Inparticular, we try to characterize the card behavior not only in terms of perceived throughput, but also in terms of low-level channel access operations. In fact, the simple throughput analysis does not allow to identify what affecting paramet…

Signal processingCommunication channels (information theory); Internet; Signal processing; Wireless telecommunication systems; Baseband signals; Carrier sense function; MAC layer; Network protocolsComputer scienceMAC layerWireless local area networks (WLAN)backoff algorithmCommunication channels (information theory)IEEE 802.11Wireless telecommunication systemsNetwork protocolsThroughput (business)InternetBaseband signalsChannel allocation schemesSIMPLE (military communications protocol)Settore ING-INF/03 - Telecomunicazionibusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPhysical layerCarrier sense functionThroughputNetwork interface controllerEmbedded systemResource allocationbusinessComputer networkCommunication channel
researchProduct

Improving similarity measures for re-identification of vehicles using AMR sensors

2013

The use of Anisotropic Magneto-Resistive (AMR) sensors for road traffic monitoring has gained popularity in recent years. The Earth magnetic field variations caused by vehicles passing over this kind of sensors can be measured and used for various purposes, including vehicle re-identification at different sensing zones. AMR sensors provide data that allow the calculation of traffic parameters by using simple signal processing techniques. But when vehicle re-identification is the objective, it is not clear which is the best method to compare the signals from different sensors in order to know whether or not they belong to the same vehicle. This paper presents an experimental study with the o…

Signal processingSimilarity (geometry)SIMPLE (military communications protocol)business.industryComputer scienceReal-time computingElectrical engineeringSimilarity measurebusinessRoad trafficRe identification2013 9th International Conference on Information, Communications & Signal Processing
researchProduct

Experiences with the integration of protocol software tools

1996

An analysis of a number of protocol software tools that are widely used in the development of communication protocols in the Finnish telecommunications industry is presented. To analyse the integrated use of these tools, a non-trivial application layer protocol with ACSE, ROSE and a simple presentation layer has been designed and implemented with the help of these software tools. Particular attention has been paid to compose a complete protocol implementation from the fragments produced with separate tools. Our observations clearly indicate that this integration is a major problem with the current practices.

SoftwareSIMPLE (military communications protocol)Computer Networks and CommunicationsPresentation layerComputer sciencebusiness.industryDistributed computingCommunications protocolSoftware engineeringbusinessComputer-aided software engineeringProtocol (object-oriented programming)Application layerComputer Communications
researchProduct

2MOLCAS as a development platform for quantum chemistry software

2004

This work presents the quantum chemistry package MOLCAS, with emphasis on its usefulness as a platform for developing new quantum chemical codes, and the reader is assumed to be familiar with such a process. The development of new codes for quantum chemistry is a time-consuming job that can be dramatically simplified by using libraries for standard problems (such as calculation of integrals), and tools to surmount computer language and operating system limitations. The MOLCAS quantum chemistry software contains modules for a variety of quantum chemical methods, such as Hartree-Fock (HF), density functional theory (DFT), coupled-cluster (CC), and multiconfigurational (MCSCF) approaches, incl…

Source codeApplication programming interfaceSIMPLE (military communications protocol)business.industryComputer sciencemedia_common.quotation_subjectProcess (computing)Software developmentCondensed Matter PhysicsAtomic and Molecular Physics and OpticsComputational scienceSoftwareDistributed developmentPerturbation theory (quantum mechanics)Physical and Theoretical Chemistrybusinessmedia_commonInternational Journal of Quantum Chemistry
researchProduct