Search results for "tiedonsiirto"

showing 7 items of 67 documents

Multi-hop D2D Communications with Network Coding : From A Performance Perspective

2019

Multi-hop device-to-device (D2D) communications play an important role in expanding D2D coverage. In this paper, we study a relay-based and network-coding-assisted (in particular, XOR coding) multi-hop D2D communication system. In the system, toward jointly considering the impact of interference and network traffic conditions on the quality of D2D communications, various channel fading models and traffic models are investigated, and the packet loss probability of D2D links is meticulously computed using these models. With the packet loss probability of D2D links, the general closed-form expressions of end-to-end packet loss probability (E2EPLP) of the system with the presence (or absence) o…

ta213Computer Networks and Communicationsbusiness.industryComputer sciencetraffic modelAerospace Engineeringnetwork codingmatkaviestinverkotCommunications systemperformance evaluationSpread spectrumlangaton tiedonsiirtomobiililaitteetPacket lossLinear network codingAutomotive EngineeringFadingElectrical and Electronic Engineeringbusinessmulti-hop D2D communicationCommunication channelComputer network
researchProduct

Managing mobility in an always-best-connected IP network

2013

tieto- ja viestintätekniikkaverkonvaihtotietoliikenneverkottiedonsiirtomultihomingprotokollat3G-tekniikkaliikkuvuuden hallintaAlways-Best-Connecetd3GPP EPCstandarditmobility managementhandoverlangattomat verkot
researchProduct

Unsupervised network intrusion detection systems for zero-day fast-spreading network attacks and botnets

2015

Today, the occurrence of zero-day and complex attacks in high-speed networks is increasingly common due to the high number vulnerabilities in the cyber world. As a result, intrusions become more sophisticated and fast to detrimental the networks and hosts. Due to these reasons real-time monitoring, processing and intrusion detection are now among the key features of NIDS. Traditional types of intrusion detection systems such as signature base IDS are not able detect intrusions with new and complex strategies. Now days, automatic traffic analysis and anomaly intrusion detection became more efficient in field of network security however they suffer from high number of false alarms. Among all …

tunkeilijan havaitsemisjärjestelmätintrusion detectionmonitorointitietoliikenneverkottiedonsiirtoanomaly detectionreaaliaikaisuusmachine learningclustering (unsupervised)koneoppiminenalgoritmitnetwork securityklusterianalyysitietoturvaverkkohyökkäykset
researchProduct

Communication in the software vulnerability reporting process

2003

verkostotprosessitoppiva organisaatiotiedonhallintatietoturvatiedonsiirtoviestintä
researchProduct

Energy Efficient Optimization for Wireless Virtualized Small Cell Networks With Large-Scale Multiple Antenna

2017

Wireless network virtualization is envisioned as a promising framework to provide efficient and customized services for next-generation wireless networks. In wireless virtualized networks (WVNs), limited radio resources are shared among different services providers for providing services to different users with heterogeneous demands. In this paper, we propose a resource allocation scheme for an orthogonal frequency division multiplexing-based WVN, where one small cell base station equipped with a large number of antennas serves the users with different service requirements. In particular, with the objective to obtain the energy efficiency in the uplink, a joint power, subcarrier, and antenn…

wireless networksWi-Fi arrayvirtualisointioptimisationenergiatehokkuusComputer scienceOrthogonal frequency-division multiplexing02 engineering and technologylangaton tiedonsiirtoBase stationoptimointi0203 mechanical engineeringvirtualisationTelecommunications link0202 electrical engineering electronic engineering information engineeringWirelessResource managementElectrical and Electronic EngineeringRadio resource managementenergy efficiencyta213business.industryWireless networkwireless data transmissionsmall cell020302 automobile design & engineering020206 networking & telecommunicationsResource allocationMulti-frequency networkSmall cellbusinesslangattomat verkotlarge scale multiple antenna systemEfficient energy useComputer networkIEEE Transactions on Communications
researchProduct

Service-Oriented Wireless Virtualized Networks: An Intelligent Resource Management Approach

2022

wireless networkspalvelutvirtualisointicostslaatulangaton tekniikkaresurssitIndium phosphidevirtualizationkustannuksetIII-V semiconductor materialslangaton tiedonsiirtoAutomotive Engineeringquality of serviceresource managementtietoverkotlangattomat verkotIEEE Vehicular Technology Magazine
researchProduct

Resource Allocation and Computation Offloading for Wireless Powered Mobile Edge Computing

2022

In this paper, we investigate a resource allocation and computation offloading problem in a heterogeneous mobile edge computing (MEC) system. In the considered system, a wireless power transfer (WPT) base station (BS) with an MEC sever is able to deliver wireless energy to the mobile devices (MDs), and the MDs can utilize the harvested energy for local computing or task offloading to the WPT BS or a Macro BS (MBS) with a stronger computing server. In particular, we consider that the WPT BS can utilize full- or half-duplex wireless energy transmission mode to empower the MDs. The aim of this work focuses on optimizing the offloading decision, full/half-duplex energy harvesting mode and energ…

wireless power transferBiochemistryAtomic and Molecular Physics and OpticsResource AllocationAnalytical Chemistryallokointilangaton tiedonsiirtofull-duplexmobiililaitteetmobile edge computing; offloading; wireless power transfer; full-duplex; half-duplexComputers HandheldoffloadingComputer Simulationmobile edge computinghalf-duplexElectrical and Electronic EngineeringInstrumentationSensors
researchProduct