The ever increasing wireless data services, such as imaging, video, audio, multimedia, etc., have demands for the very high speed wireless communications and network, which are unfortunately a bottleneck when combinin...
The ever increasing wireless data services, such as imaging, video, audio, multimedia, etc., have demands for the very high speed wireless communications and network, which are unfortunately a bottleneck when combining with the wireline core network. Users' are now expecting high quality of experience with low-cost devices, ubiquitous connectivity, energy efficiency, high reliability, or even ultra-low latency if a vehicle terminal is applied.
We demonstrate an astro-comb for relatively low resolution astronomical spectrographs. The space of comb lines is Altered to 30 GHz by a Fabry-Perot cavity spaced by an ULE glass. The radial velocity precision is ...
详细信息
Network Functions Virtualization (NFV) is a concept that aims at providing network operators with benefits in terms of cost, flexibility, and vendor independence by utilizing virtualization techniques to run network f...
详细信息
this paper proposes a novel crosstalk analysis model applicable to closed ring-based optical network-on-chip. In order to show how this model is used, an example of analyzing crosstalk noise and SNR in a generic close...
详细信息
this paper proposes a novel crosstalk analysis model applicable to closed ring-based optical network-on-chip. In order to show how this model is used, an example of analyzing crosstalk noise and SNR in a generic closed ring-based ONoC is studied.
This HealthCom short paper reports our new lab approach in the Smart and Connected e-Health Services (SCeHS). It summarizes the architecture and platform plan, the functional resources, and the application flows enabl...
详细信息
This HealthCom short paper reports our new lab approach in the Smart and Connected e-Health Services (SCeHS). It summarizes the architecture and platform plan, the functional resources, and the application flows enablement SDN, connected via data virtualization and exchange protocols, for the purpose of e-Health service development and deployment.
This work investigates the use of reconfigurable devices as computing platform for self-organizing embedded systems. Those usually consist of a set of distributed, autonomous nodes interacting with each other in order...
详细信息
A significant design issue in Wireless Sensor networks (WSNs) is to reduce energy consumption or to ensure its usage is organized and managed in the best possible manner. In this research Improved Particle Swarm Optim...
详细信息
A significant design issue in Wireless Sensor networks (WSNs) is to reduce energy consumption or to ensure its usage is organized and managed in the best possible manner. In this research Improved Particle Swarm Optimization (IPSO) is adopted in Energy-Balanced Unequal Clustering (EBUC) with the aim of optimize performance in terms of the number of alive nodes in WSNs. The performance of the adopted IPSO algorithm are validated by Numerical experiments in conventional background, however it has not been deployed in cluster-based WSNs which is done by this research. The IPSO is used to form clusters and partition the network in cluster-based WSNs with objective of addressing the standard PSO issues, which degrade the performance. The acquired results showed that the deploying IPSO in EBUC algorithm decreases the number of the dead nodes and increase network life time.
While we have all been warned about viruses attacking our computers and hackers stealing our private information, very few of us realize the similar threat to our phones. With the number of smartphones in use growing ...
详细信息
ISBN:
(纸本)9781467385602
While we have all been warned about viruses attacking our computers and hackers stealing our private information, very few of us realize the similar threat to our phones. With the number of smartphones in use growing each day, we now find ourselves to be a society equipped with devices packed with personal information and small enough to be easily stolen or misplaced. Millions of smartphone users are reporting unauthenticated behavior on their phones, yet many refuse to use passcode protection. Our goal is to use information gathered from the phone, specifically app usage statistics, in order to determine if a user is the actual owner of the smartphone. For this project, we created an app that could record a variety of information from smartphones and their sensors and make simple decisions about whether the person using the phone was the actual owner and lock itself accordingly. Because of time constraints, we looked at data sets from Glasgow Caledonian University and LiveLab at Rice University rather than collecting our own data. We used the LIBSVM library to create two-class SVM models for each of the 34 users in the LiveLab datasets. We then constructed testing datasets of both owner and non-owner data and tested the accuracy of the models. Accuracy rates for all 34 users were for the most part over 85%, and while false positive (identifying the owner as non-owner) rates were sometimes high, these false positive diagnoses would not compromise the security of the phone.
Sometimes mental stress needs to be control as it results in different dangerous suffering. Timely mental stress detection can help to prevent stress related health problems. The aim of this paper is to design an IoT ...
详细信息
Sometimes mental stress needs to be control as it results in different dangerous suffering. Timely mental stress detection can help to prevent stress related health problems. The aim of this paper is to design an IoT base wearable, cost effective and low power smart band for health care that detect mental stress based on skin conductance. This band can monitor user's mental stress continuously and transmit the stress related data wirelessly to user's smart phone. It not only help the users in better understanding their stress patterns but also provide the physician with reliable data for a much better treatment. Inputs to this device are various signals from different sensors. By intelligently analyzing the correlation between these signals using machine learning algorithm, this band predicts that whether the subject is suffering from stress or not.
In this paper, we address, for the first time as far as we know, the problem of provisioning connection requests with fault-tolerant requirements - referred to as Dependable connections (D-connections) - in survivable...
详细信息
In this paper, we address, for the first time as far as we know, the problem of provisioning connection requests with fault-tolerant requirements - referred to as Dependable connections (D-connections) - in survivable translucent wavelength-routed optical networks impaired with physical-layer effects taking into consideration Shared Risk Link Group (SRLG) constraints. Due to the complexity of the investigated problem, we, here, propose a practical heuristic algorithm that computes in a reasonable computational time a near-optimal routing solution, for a given set of D-connections to be set up, with the objective of maximizing the number of accommodated requests whilst guaranteeing an admissible Quality of Transmission (QoT) for all set up primary and backup lightpaths, given a limited amount of available network resources. The proposed heuristic integrates an original Two-Stage Protection (TSP) procedure which ensures fast recovery to all established D-connections from any possible SRLG-failure based on a combination of the Path Protection (PP) scheme broadly known for its resource utilization efficiency, and the Partial Path Protection (PPP) scheme widely recognized for its effectiveness in avoiding topology traps. The integrated protection procedure relies on a generic purpose-built auxiliary graph model that may support various factors of network heterogeneity through the manipulation of different edges in the constructed auxiliary graph. During the primary and backup computation processes, TSP procedure attempts to minimize network resource consumption by allowing the simultaneous use of two efficient resource sharing techniques combined, to the best of our knowledge, for the first time under a static traffic pattern, and performed in such a way that the 100% fault-recoverability is still guaranteed for all set up connections. The effectiveness of the adopted protection procedure is demonstrated through extensive numerical experiments carried out on different ne
暂无评论