The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose a novel method for channel estimation based on adaptive pilot spacing using low complexity with least-square (LS) channel estimation. Many channel estimation method uses LS or MMSE (Minimum Mean Square Error) channel estimator. The MMSE channel estimation technique suffers from a high computational complexity with an order of O(N - P3) operations ((N - P) represents the total...
In this paper, we are interested in the optimal redistribution of the available budget in average transmit power per packet among potential packet transmission attempts for improved Automatic Repeat reQuest (ARQ) protocol. A conventional ARQ protocol was combined in [5], with both Adaptive Modulation and Coding (AMC) and Power Control (PC) to improve spectral efficiency, while satisfying an average...
With the evolution of the current use of the Internet and the volume of content exchanged through the web, huge datacenter networks (DCN) are deployed to take into account the diversification and mass of contents. In these datacenters, the architecture is an important component that has a great impact on its performance. In addition, the communication inside them is usually IP-based, which has been...
Cognitive Radio (CR) presents a new approach to wireless spectrum utilization. A big number of Routing Protocols for Cognitive Radio Ad Hoc Networks (CRAHNs) have been proposed to increase the efficiency of spectrum utilization. These protocols don't maintain the QoS mechanisms. Many revisions are done to the CRAHN protocols to meet QoS challenges focused on bandwidth, end to end delay, total packets...
In wireless sensor networks (WSNs), Security is critical for many sensor network applications, such as military target tracking and security monitoring. In particular, providing authentication to small sensor nodes is challenging, due to the limited capabilities of sensor nodes in terms of computation, communication, memory storage, and energy supply. Therefore, the implementation of authentication...
In this study, fuzzy quantification sentences are used to create short summaries from hotel reviews. Also, opinion mining is used to extract opinion expressions from reviews. Fuzzy quantified sentences offer a brief information about the hotel attributes from customers feedback. These sentences are generated considering one type of fuzzy sets (triangular) using 3 types of quantifiers (“most”, “about...
In this paper we propose an in-home healthcare monitoring system offering several uses. It helps the elderly person to complete the activities independently in their own lives and at the same time facilitates family members and care provider to track inhabitants. The main idea is to have several sensors that can be used at home and enables full and tightly controlled elderly patient care. Each modality...
In this paper we present a secure data aggregation scheme in Wireless Sensor Networks for IoT. The proposed method encrypts the sensor data by our elliptic-curve based seed exchange algorithm and Hilbertcurve based data transformation. As a result, it is very difficult to trace a real value even though attackers overhear the sending data. Through our performance analysis, we show that our data aggregation...
In relay wireless systems, a data packet transmitted by a source node is forwarded by one or many relays nodes before reaching the destination node. In actual technologies, the destination recovers the identities of the sources and relays of received signals by using signaling information exchange before the data exchange and by including identities information (addresses) in data sequences. In this...
Electric distribution companies have been facing a strong trend towards substation automation. In this paper, we present an intelligent type-2 fuzzy agent approach in substation automation. The proposed concept is based on learning approach for intelligent agents that are embedded in intelligent infrastructure. The substation network is considered as a multi-agent system (MAS). MAS is used allowing...
The cloud computing paradigm has changed the way of managing identity. Domain based identity management systems are no more suitable. The alternative of a universal identifier globally handled by an all knowing identity provider proved its failure. The best opproach is to follow the cloud paradigm by offering an Identity as a Service layer. Many projects and standards were proposed to reach this goal...
This paper presents a real-world proven solution for dynamic street light control and management which relies on an open and flexible Internet of Things architecture. Substantial contribution is brought at the interoperability level using novel device connection concept based on model-driven communication agents to speed up the integration of sensors and actuators to Internet of Things platforms....
The Internet of Things (IoT) and particularly Machine-to-Machine (M2M) communications are considered as major enablers for future smart cities' initiatives. While offering a wide range of applications and services, supporting such devices constitutes, however, one of the most important challenges to be faced by Network Operators (NO). Indeed, the expected huge number of devices requesting to connect...
Smart cities and smart homes are booming fields of development of pervasive systems. With the high stakes these systems have to manage, and their sheer complexity, anomalies have to be considered. In these complex systems are many connected components with computing capacities. They can manage anomalies, even if partially, and can act as some kind of expert systems. These expert systems can be relied...
Quality monitoring for the call centers can be described as the process of listening to the recorded calls in order to measure the performance of a customer service representative or agent. The main challenge of quality monitoring is that managers have no time to listen all the records and therefore only a few of the stored calls are randomly selected. This results in inaccurate performance measurements,...
Computational grids and peer-to-peer computing are currently the largest systems, however one of the main challenges is how efficiently allocate and schedule resources of such systems. Economic principles have been introduced in investigation of resource allocation algorithms in computational grids. However, improving the agents' performances based-on their valuation is the key function in such systems...
A “smart City” includes many technological components (e.g., smarter intelligent transporting system, energy sharing, and safety and security service) that use the Internet communication technology, The Internet of Things (IoT) has an especially important role. The energy management system (EMS) is one of the main components in a smart city and is intended to conserve energy by using IoT technology...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.