We report about design and construction of the bidirectional transceiver TRx module for subscriber part of the passive optical network PON for a fiber to the home FTth topology. the TRx module consists of a epoxy novo...
详细信息
ISBN:
(纸本)9780819473790
We report about design and construction of the bidirectional transceiver TRx module for subscriber part of the passive optical network PON for a fiber to the home FTth topology. the TRx module consists of a epoxy novolak resin polymer planar lightwave circuit (PLC) hybrid integration technology with volume holographic grating triplex filter VHGT, surface-illuminated photodetectors and spot-size converted Fabry-Perot laser diode in SMD package. the hybrid PLC has composed from a two parts - polymer optical waveguide including VHGT filter section and a optoelectronic microwave section. the both parts are placed on the composite substrate.
Communication in mobile ad-hoc networks is vulnerable to numerous passive attacks, such as eavesdropping of sensitive information. Encryption helps to protect the confidentiality of transmitted data. However, tracking...
详细信息
ISBN:
(纸本)9780889867741
Communication in mobile ad-hoc networks is vulnerable to numerous passive attacks, such as eavesdropping of sensitive information. Encryption helps to protect the confidentiality of transmitted data. However, tracking mobile communications introduces further threats to the reliability of mobile networks. After a successful identification of communicating entities, an adversary on the multi-hop communication path is able to selectively drop packets in order to save own resources. In addition, active attacks are frequently launched subsequently to passive attacks, allowing malicious network entities to disturb the functionality of the mobile network. In this paper, we present the concept of our protocol for k-anonymous communication in mobile ad-hoc networks. the basic idea of the protocol is to hide mobile communication within the communication of k honest nodes. Hence, an adversary trying to identify communication partners can just narrow down its search to at least k entities. A trust system helps to determine the anonymity-level k of the communication. A node wishing to communicate, is able to set the anonymity-level k for each communication dynamically, always in dependence on the sensitivity of transmitted data.
the Group-Lasso method for finding important explanatory factors suffers from the potential non-uniqueness of solutions and also from high computational costs. We formulate conditions for the uniqueness of Group-Lasso...
详细信息
ISBN:
(纸本)9781605582054
the Group-Lasso method for finding important explanatory factors suffers from the potential non-uniqueness of solutions and also from high computational costs. We formulate conditions for the uniqueness of Group-Lasso solutions which lead to an easily implementable test procedure that allows us to identify all potentially active groups. these results are used to derive an efficient algorithm that can deal with input dimensions in the millions and can approximate the solution path efficiently. the derived methods are applied to large-scale learning problems where they exhibit excellent performance and where the testing procedure helps to avoid misinterpretations of the solutions. Copyright 2008 by the author(s)/owner(s).
Sensor webs consist of a large collection of small nodes providing collaborative and distributed sensing ability in unpredictable environments. Nodes composing such sensor webs, are characterized by their resource res...
详细信息
ISBN:
(纸本)9781605580463
Sensor webs consist of a large collection of small nodes providing collaborative and distributed sensing ability in unpredictable environments. Nodes composing such sensor webs, are characterized by their resource restrictions, especially the energy, the processing, and the communication capacities. these nodes are also in constant interaction with each other and withtheir geographic environment. An efficient system aiming at managing sensor webs must take into account the evolution of the sensor nodes as well as the geographic environment. Such a management process involves coping with a variety of dynamic variables including the nodes characteristics, the environment properties as well as the sensed data. In this context, Multi-Agent Geo-Simulation (MAGS) provides a flexible approach that can be used to easily analyse complex systems such as sensor webs in large scale georeferenced environments. the purpose of this paper is to present SensorMAGS, an agent-based geo-simulation system which manages sensor nodes in virtual geographic environments. this system is applied in the context of a water resource monitoring project. Copyright 2008 ACM.
Multimedia systems and applications have recently started to integrate the sense of touch and force feedback in the human-computer interaction. Surprisingly, measuring the quality of experience (QoE) when haptic modal...
详细信息
ISBN:
(纸本)9783540690566
Multimedia systems and applications have recently started to integrate the sense of touch and force feedback in the human-computer interaction. Surprisingly, measuring the quality of experience (QoE) when haptic modality is incorporated in a virtual user interface has received limited attention from the research community. In this paper, we propose a taxonomy for measuring the quality of experience of Virtual Reality (VR) applications. Furthermore, the taxonomy is modeled using a Fuzzy Logic Inference System (FIS) to quantitatively measure the QoE of a haptic virtual environment. Finally, the proposed model is tested using the Mamdani system. the simulation and usability analysis demonstrated that the proposed model reflects the user estimation for the applications more accurately and thus is capable of measuring the overall QoE of a haptic application.
In the multi-agent pathfinding problem, groups of agents need to plan paths between their respective start and goal locations in a given environment, usually a two-dimensional map. Existing approaches to this problem ...
详细信息
Heuristic functions for single-agent search applications estimate the cost of the optimal solution. When multiple heuristics exist, taking their maximum is an effective way to combine them. A new technique is introduc...
详细信息
Satellite-based telecom systems provide the best and quickest solution to reducing the digital divide in less-favored areas owing to their wide geographical coverage and the speed and ease of deployment of terminal eq...
详细信息
ISBN:
(纸本)9781424419470
Satellite-based telecom systems provide the best and quickest solution to reducing the digital divide in less-favored areas owing to their wide geographical coverage and the speed and ease of deployment of terminal equipment. However, satellite system must be efficient and cost effective, and capable of full inter-working with state-of-the-art terrestrial broadband networks. this paper presents a novel two-way broadband satellite architecture developed in the framework of the UNIC (UNIversal satellite home Connection) project, sponsored within the 6th EU Research Programme Framework. the UNIC system architecture provides TV-Centric triple play services to actual end-users in the home employing DVB-S2 and DVB-RCS technologies in the forward and the return link, respectively, together with a newly low-cost defined architecture for the distribution of connectivity to end-users, including an ad-hoc interactive Set-Top-Box.
Large distributed Real Time systems are time consuming to develop. they frequently overrun cost and time schedules. It has been claimed that Model Driven Architecture is able to address some of the issues that cause t...
详细信息
Large distributed Real Time systems are time consuming to develop. they frequently overrun cost and time schedules. It has been claimed that Model Driven Architecture is able to address some of the issues that cause these problems. A high level of abstraction and automatic translation between models may help. Platform Independent models for the individual components of the system mixed with scheduling information may enable functional changes and real performance to be assessed early in the development. Establishing different views from the requirements repository may better fit the development engineers skill and reduce errors. this is a position paper that discusses current challenges for the model-based development of distributed real time systems and how they might be overcome. 1.
this book - in conjunction withthe two volumes CCIS 0015 and LNCS 5226 - constitutes the refereed proceedings of the 4thinternationalconference on Intelligent computing, ICIC 2008, held in Shanghai, China, in Septe...
详细信息
ISBN:
(数字)9783540859840
ISBN:
(纸本)9783540859833
this book - in conjunction withthe two volumes CCIS 0015 and LNCS 5226 - constitutes the refereed proceedings of the 4thinternationalconference on Intelligent computing, ICIC 2008, held in Shanghai, China, in September 2008. the 136 revised full papers were carefully reviewed and selected from 2336 submissions. the papers address all current issues in the field of intelligent computing technology, including neural networks, evolutionary computing and genetic algorithms, fuzzy systems and soft computing, particle swarm optimization and niche technology, supervised and semi-supervised learning, unsupervised and reinforcement learning, fine feature extraction methods, combinatorial and numerical optimization, neural computing and optimization, case based reasoning and autonomy-oriented computing, as well as artificial life and artificial immune systems. the volume is rounded off by three special sessions on computational analysis and data mining in biological systems, on data mining and fusion in bioinformatics, and on intelligent pattern recognition and understanding in image processing.
暂无评论