The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
On behalf of the IEEE Instrumentation & Measurement Society, the official sponsor of the conference, I am pleased to offer a very sincere welcome to the first edition of the IEEE International Workshop on “Measurements & Networking” M&N 2011.
Computer networks and more specifically wireless communication networks are increasingly becoming susceptible to more sophisticated and untraceable attacks. Most of the current Intrusion Detection Systems either focus on just one layer of observation or use a limited number of metrics without proper data fusion techniques. However, the true status of a network is rarely accurately detectable by examining...
Many well-known and efficient technologies for satellite-based localization in open space there exist; however, their accuracy and availability depend on several factors, such as the characteristics of the devices used, the surrounding environment, and the distance from reference stations. In the ALARP (A railway automatic track warning system based on distributed personal mobile terminals) system,...
The development of intelligent surveillance systems is an active research area. In this context, mobile and multifunctional robots have been recently adopted as successful means to reduce fixed installations and the number of devices needed to cover a given area. On the other hand, modern techniques for data fusion and decision making can significantly increase the information content extracted from...
The paper deals with the implementation of a suitable technological support to improve the success likelihood of Urban Search and Rescue (USAR) missions. In particular, the adoption of an heterogeneous sensors network for situation awareness and security applications is suggested. The sensor network consists of two types of sensor, mandated, respectively, to through-the-wall radar (TTW) imaging and...
VoIP systems have to face far tougher security threats than their underlying IP infrastructure. In fact, a security hole in a VoIP infrastructure could bring to a major security failure for the interconnected PSTN network(s), usually regarded as a reliable and secure domain. This is the reason why before connecting a private VoIP network to the carrier infrastructure, a great number of tests have...
Reconfigurability in an antenna system is a desired characteristic that has attracted of attention in the past years. In this work, a novel class of nonconformal Fermat-like spiral multi-port microantennas for next-generation wireless communications and radar applications is presented. The device modeling is carried out by using a computationally enhanced locally conformal finite-difference time-domain...
Proximity sensors are increasingly used in distributed monitoring applications, e.g. for surveillance purposes. However, most of existing solutions have two different, usually contrasting requirements, i.e. either they have strong directional features, or they just cover very short distances. In order to tackle such issues, in this paper a new, almost omnidirectional proximity detection technique...
This paper investigates the application of a compressed sampling (CS) algorithm as a spectrum sensing and signal analysis preprocessor for vector measurements of digital modulations. Compressed sampling is a paradigm which exploits sparsity, a feature common to several signals of interest, to allow the design of efficient data acquisition schemes. These need to be followed by more complex signal processing...
The paper presents an experimental study of the effects of in-channel interference on the performance of a CGPS receiver, which is a node of a large geodetic surveillance system in the Neapolitan volcanic area, in the South of Italy. A suitable reconfigurable experimental setup has been developed, to emit controlled interfering signals chosen on the basis of previous studies and at the same time to...
Spectrum sensing is a key factor for either the development of Cognitive Radio or the implementation of instruments able to automatically monitor the radio spectrum. Within the process of spectrum sensing, segmentation aims to detect the boundaries of the transmission channels in a wide frequency range. The paper proposes a new spectrum segmentation method characterized by low processing time. The...
Dependability assessment of networked component-based systems requires fine-grained modelling of the failure behaviour and propagation aspects of individual components. We have recently introduced a formalism called FI4FA, enabling the analysis of I4 (incompletion, inconsistency, interference and impermanence) failures as well as the analysis of the corresponding mitigations.
The amount of multimedia information generated in today society is growing exponentially. This makes an important purpose of research to evaluate the quality of service in order to achieve customer satisfaction, i.e. in order to improve the quality of experience.
The RRATE algorithm opened a new class of solutions for the computation of bandwidth-guaranteed paths in MPLS networks giving significant increase in both path selection speed and efficiency. Nevertheless, analyzing RRATE behavior while dealing with complex and big (in terms of nodes and link number) networks, has been shown that are possible more enhancements if changes are made to the core function...
The next generation of critical systems, namely complex Critical Infrastructures (LCCIs), require efficient runtime management, reconfiguration strategies, and the ability to take decisions on the basis of current and past behavior of the system. Anomaly-based detection, leveraging information gathered at Operating System (OS) level (e.g., number of system call errors, signals, and holding semaphores...
The selection of optimal attributes from the set of all possible attributes of a network traffic is the first step to detect network intrusions. However, in order to optimize the effectiveness of intrusion detection procedure and decrease its complexity, it is still a challenge to select an optimal attribute subset. In this context, the primary problem of attribute selection is the criterion to evaluate...
The paper presents a network simulator specifically designed for the analysis of real-time wireless networks in an industrial control context, and for time-space localization applications. Critical issues associated to physical components are accounted for, together with the performance of the communication channel in an interfering environment. A comparison toward already available simulation schemes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.