Journal articles on the topic 'Mobile IPv6 hand off'

To see the other types of publications on this topic, follow the link: Mobile IPv6 hand off.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Mobile IPv6 hand off.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Qin, Gang, Can Chen, and Bao Ping Yan. "Study on IPv6 Capabilities of Mobile Devices." Applied Mechanics and Materials 380-384 (August 2013): 2209–15. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2209.

Full text
Abstract:
With the rapid development of Internet, the current Internet Protocol IPv4 cannot meet the new requirements. Compared with IPv4, IPv6 has more advantages. Fruitful results have been borne in aspects of IPv6 protocol study and network construction in China. On the other hand, application and popularization of IPv6 is far from sufficient. In recent years, mobile devices have popularized very rapidly. More and more people use mobile devices, including smartphones and tablets, to surf online everywhere. If such a gigantic amount of mobile devices can access network with IPv6, it will be very important for application of IPv6. In this paper, we first analyze the market of mobile devices to determine the devices to be tested. Then we introduce how to construct test environment and test cases. After that, we illustrate the test procedure. Then we summarize how the mainstream mobile devices support IPv6. At the end of this paper, we look forward the future work.
APA, Harvard, Vancouver, ISO, and other styles
2

Zhang, Li Jun, and Samuel Pierre. "Mobility Support for IPv6-based Next Generation Wireless Networks." International Journal of Wireless Networks and Broadband Technologies 2, no. 3 (July 2012): 18–41. http://dx.doi.org/10.4018/ijwnbt.2012070103.

Full text
Abstract:
This paper presents an overview of IPv6-based mobility management protocols: mobile IPv6 (MIPv6), fast handovers for mobile IPv6 (FMIPv6), hierarchical mobile IPv6 (HMIPv6), and fast handover for hierarchical mobile IPv6 (F-HMIPv6). All these protocols play an important role in the next generation wireless networks, because in such networks, mobile users need to be freely change their access network or domain with on-going real-time multimedia services. The mobility management procedure for each protocol is described in details. Furthermore, handover performance is compared for host-based mobility protocols using analytical modeling. The effect of various wireless network parameters on the performance is studied carefully. Numerical analysis shows that handoff performance in wireless networks is largely dependent on various system parameters such as the user velocity, subnet radius, and session-to-mobility ratio, domain size and binding lifetime; there is a trade-off between performance metrics and such parameters.
APA, Harvard, Vancouver, ISO, and other styles
3

Jara, Antonio J., David Fernandez, Pablo Lopez, Miguel A. Zamora, and Antonio F. Skarmeta. "Lightweight MIPv6 with IPSec Support." Mobile Information Systems 10, no. 1 (2014): 37–77. http://dx.doi.org/10.1155/2014/563274.

Full text
Abstract:
Mobility management is a desired feature for the emerging Internet of Things (IoT). Mobility aware solutions increase the connectivity and enhance adaptability to changes of the location and infrastructure. IoT is enabling a new generation of dynamic ecosystems in environments such as smart cities and hospitals. Dynamic ecosystems require ubiquitous access to Internet, seamless handover, flexible roaming policies, and an interoperable mobility protocol with existing Internet infrastructure. These features are challenges for IoT devices, which are usually constrained devices with low memory, processing, communication and energy capabilities. This work presents an analysis of the requirements and desirable features for the mobility support in the IoT, and proposes an efficient solution for constrained environments based on Mobile IPv6 and IPSec. Compatibility with IPv6-existing protocols has been considered a major requirement in order to offer scalable and inter-domain solutions that were not limited to specific application domains in order to enable a new generation of application and services over Internet-enabled dynamic ecosystems, and security support based on IPSec has been also considered, since dynamic ecosystems present several challenges in terms of security and privacy. This work has, on the one hand, analysed suitability of Mobile IPv6 and IPSec for constrained devices, and on the other hand, analysed, designed, developed and evaluated a lightweight version of Mobile IPv6 and IPSec. The proposed solution of lightweight Mobile IPv6 with IPSec is aware of the requirements of the IoT and presents the best solution for dynamic ecosystems in terms of efficiency and security adapted to IoT-devices capabilities. This presents concerns in terms of higher overhead and memory requirements. But, it is proofed and concluded that even when higher memory is required and major overhead is presented, the integration of Mobile IPv6 and IPSec for constrained devices is feasible.
APA, Harvard, Vancouver, ISO, and other styles
4

Bitar, Esper, Michael McDonnell, and Nicolas D. Georganas. "Channel hand-off strategies in cellular mobile communication systems." Canadian Electrical Engineering Journal 12, no. 3 (July 1987): 99–104. http://dx.doi.org/10.1109/ceej.1987.6593828.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Yue, Wuyi, and Yutaka Matsumoto. "Performance Analysis of Mobile Radio Networks with Hand-off." Proceedings of the ISCIE International Symposium on Stochastic Systems Theory and its Applications 1996 (May 5, 1996): 225–34. http://dx.doi.org/10.5687/sss.1996.225.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Muñoz-Rodríguez, D., and K. W. Cattermole. "Multiple criteria for hand-off in cellular mobile radio." IEE Proceedings F Communications, Radar and Signal Processing 134, no. 1 (1987): 85. http://dx.doi.org/10.1049/ip-f-1.1987.0015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rietz, René, Radoslaw Cwalinski, Hartmut König, and Andreas Brinner. "An SDN-Based Approach to Ward Off LAN Attacks." Journal of Computer Networks and Communications 2018 (November 21, 2018): 1–12. http://dx.doi.org/10.1155/2018/4127487.

Full text
Abstract:
The detection of attacks on large administrative network domains is nowadays generally accomplished centrally by analyzing the data traffic on the uplink to the Internet. The first phase of an infection is usually difficult to observe. Often attackers use e-mail attachments or external media, such as USB sticks, hardware with preinstalled malware, or contaminated mobile devices to infect target systems. In such scenarios, the initial infection cannot be blocked at the network level. The lateral movement of attack programs (exploits) through internal networks and the exfiltration of data, however, which are the main purpose of targeted attacks, run always over the network. Security measures against such internal network attacks require a comprehensive monitoring concept that spans the entire network to its edge. Especially for preventive measures, this means providing a security concept for local area networks (LANs). In this paper, we propose based on an analysis of typical LAN-based attacks an approach for preventing these attacks for both IPv4 and IPv6 networks. It applies the software-defined networking (SDN) paradigm for centralizing the related network decisions in a central authority—the SDN controller—that manages all network connections and hence the associated data flows.
APA, Harvard, Vancouver, ISO, and other styles
8

Cong, L., E. Gunawan, C. B. Soh, B. H. Soong, P. T. Tan, and W. Weng. "Performance analysis of dynamic channel assignment algorithms in cellular mobile systems with hand-off." International Journal of Communication Systems 15, no. 8 (2002): 683–700. http://dx.doi.org/10.1002/dac.558.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Nejatian, S., S. K. Syed Yusof, N. M. Abdul Lattif, V. Rezaie, and V. Asadpour. "Fuzzy Based PC-PUSH in CR-MANETs." Mathematical Problems in Engineering 2014 (2014): 1–15. http://dx.doi.org/10.1155/2014/926709.

Full text
Abstract:
In cognitive radio (CR), the secondary user (SU) needs to hand off its ongoing communication to an idle channel in order to avoid interference to the primary user (PU). Spectrum hand off issue becomes challenging in CR mobile ad hoc networks (CR-MANETs) because of the uncertainty in spectrum availability, broad range of spectrum bands and lack of central entity. The purpose of this study is to design a unified spectrum handoff (USH) scheme for CR-MANETs that considers the spectrum heterogeneity and its availability over time and space. A local flow hand off is performed when spectrum hand off cannot be carried out due to the SUs mobility. To improve further USH, preemptive unified spectrum handoff (PUSH) algorithm is proposed in which two different preemptive hand off threshold regions are defined. The PUSH algorithm also predicts the cognitive link availability considering the PU interference boundary. Although the PUSH scheme improves the hand off performance, the number of spectrum hand offs due to the PU activity should be reduced in this scheme. Therefore, the PC-PUSH (Power Controller-PUSH) scheme is proposed in which the fuzzy logic is used to improve the PUSH in terms of the number of spectrum handoffs because of the PU activity. The PC-PUSH decreases the interference to the PUs, while reducing the number of spectrum handoffs. The results show that the proposed scheme improves the link maintenance probability, decreases the hand off delay, and reduces the number of spectrum handoffs.
APA, Harvard, Vancouver, ISO, and other styles
10

De Marco, G., L. Barolli, and Salvatore Loreto. "Taxonomy and Analysis of IP Micro-Mobility Protocols in Single and Simultaneous Movements Scenarios." Mobile Information Systems 3, no. 2 (2007): 55–70. http://dx.doi.org/10.1155/2007/919807.

Full text
Abstract:
The micro-mobility is an important aspect in mobile communications, where the applications are anywhere and used anytime. One of the problems of micro-mobility is the hand-off latency. In this paper, we analyse two solutions for IP micro-mobility by means of a general taxonomy. The first one is based on the Stream Control Transmission Protocol (SCTP), which allows the dynamic address configuration of an association. The second one is based on the Session Initiation Protocol (SIP), which is the most popular protocol for multimedia communications over IP networks. We show that for the SCTP solution, there is room for further optimisations of the hand-off latency by adding slight changes to the protocol. However, as full end-to-end solution, SCTP is not able to handle simultaneous movement of hosts, whose probability in general cannot be neglected. On the other hand, the SIP can handle both single and simultaneous movements cases, although the hand-off latency can increase with respect to the SCTP solution. We show that for a correct and fast hand-off, the SIP server should be statefull.
APA, Harvard, Vancouver, ISO, and other styles
11

Eun, Seong Bae, and Yi Geun Chae. "A hand-off mechanism of mobile nodes in a location positioning system based on ZigBee tags." Journal of the Korean Society of Marine Engineering 38, no. 2 (February 28, 2014): 175–81. http://dx.doi.org/10.5916/jkosme.2014.38.2.175.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Issac, Biju, Khairuddin Ab Hamid, and C. E. Tan. "HYBRID MOBILITY PREDICTION OF 802.11 INFRASTRUCTURE NODES BY LOCATION TRACKING AND DATA MINING." Journal of IT in Asia 3, no. 1 (April 20, 2016): 15–38. http://dx.doi.org/10.33736/jita.31.2010.

Full text
Abstract:
In an IEEE 802.11 Infrastructure network, as the mobile node is moving from one access point to another, the resource allocation and smooth hand off may be a problem. If some reliable prediction is done on mobile node’s next move, then resources can be allocated optimally as the mobile node moves around. This would increase the performance throughput of wireless network. We plan to investigate on a hybrid mobility prediction scheme that uses location tracking and data mining to predict the future path of the mobile node. We also propose a secure version of the same scheme. Through simulation and analysis, we present the prediction accuracy of our proposal.
APA, Harvard, Vancouver, ISO, and other styles
13

Sridharan, Mohan. "Bootstrap Learning and Visual Processing Management on Mobile Robots." Advances in Artificial Intelligence 2010 (February 9, 2010): 1–20. http://dx.doi.org/10.1155/2010/765876.

Full text
Abstract:
A central goal of robotics and AI is to enable a team of robots to operate autonomously in the real world and collaborate with humans over an extended period of time. Though developments in sensor technology have resulted in the deployment of robots in specific applications the ability to accurately sense and interact with the environment is still missing. Key challenges to the widespread deployment of robots include the ability to learn models of environmental features based on sensory inputs, bootstrap off of the learned models to detect and adapt to environmental changes, and autonomously tailor the sensory processing to the task at hand. This paper summarizes a comprehensive effort towards such bootstrap learning, adaptation, and processing management using visual input. We describe probabilistic algorithms that enable a mobile robot to autonomously plan its actions to learn models of color distributions and illuminations. The learned models are used to detect and adapt to illumination changes. Furthermore, we describe a probabilistic sequential decision-making approach that autonomously tailors the visual processing to the task at hand. All algorithms are fully implemented and tested on robot platforms in dynamic environments.
APA, Harvard, Vancouver, ISO, and other styles
14

de Winkel, Jasper, Vito Kortbeek, Josiah Hester, and Przemysław Pawełczak. "Battery-Free Game Boy." GetMobile: Mobile Computing and Communications 25, no. 2 (September 14, 2021): 22–26. http://dx.doi.org/10.1145/3486880.3486888.

Full text
Abstract:
Any future mobile electronic device with which a user interacts (smartphone, hand-held game console) should not pollute our planet. Consequently, designers need to rethink how to build mobile devices with fewer components that negatively impact the environment (by replacing batteries with energy harvesting sources) while not compromising the user experience quality. This article addresses the challenges of battery-free mobile interaction and presents the first battery-free, personal mobile gaming device powered by energy harvested from gamer actions and sunlight. Our design implements a power failure resilient Nintendo Game Boy emulator that can run off-the-shelf classic Game Boy games like Tetris or Super Mario Land. Beyond a fun toy, our design represents the first battery-free system design for continuous user attention despite frequent power failures caused by intermittent energy harvesting.
APA, Harvard, Vancouver, ISO, and other styles
15

Gupta, Amit Kumar, Vikas Goel, Ruchi Rani Garg, Dasarada Rajagopalan Thirupurasundari, Ankit Verma, and Mangal Sain. "A Fuzzy Based Handover Decision Scheme for Mobile Devices Using Predictive Model." Electronics 10, no. 16 (August 20, 2021): 2016. http://dx.doi.org/10.3390/electronics10162016.

Full text
Abstract:
Handover usually deals with the mobility of the end users in a mobile network to assure about the ongoing session of a user. It is observed that frequent handover results in call dropping due to latency. In order to overcome this issue, a fuzzy based handover decision scheme for mobile devices using a predictive model is proposed. First, an MFNN (Multi-layer Feed Forward Network) is used to determine the next cell of the user along with best hand off time. To obtain the best access network, multiple-attribute Access Network Selection Function (ANSF) is used. The fuzzy rule is applied by considering the parameter data rate, reliability, signal strength, battery power and mobility as input and the output obtained is the optimal network. The proposed scheme selects the best access network and enhances the quality of services.
APA, Harvard, Vancouver, ISO, and other styles
16

LELE, A. M., S. K. NANDY, and D. H. J. EPEMA. "HARMONY — AN ARCHITECTURE FOR PROVIDING QUALITY OF SERVICE IN MOBILE COMPUTING ENVIRONMENTS." Journal of Interconnection Networks 01, no. 03 (September 2000): 247–66. http://dx.doi.org/10.1142/s0219265900000159.

Full text
Abstract:
Future mobile multimedia systems will have wearable computing devices as their front ends, supported by database servers, I/O servers, and compute servers over a backbone network. Multimedia applications on such systems are demanding in terms of network and compute resources, and have stringent Quality of Service (QoS) requirements. Providing QoS has two aspects. On the one hand, the QoS requirements for the relevant resources have to be defined and suitable policies for meeting these requirements have to be devised and analyzed. On the other hand, the architecture of the system components and the mechanisms enabling the implementation of these policies have to be designed. In this paper we propose an architecture called HARMONY for providing QoS in mobile computing environments. The HARMONY architecture is a layered architecture that provides mechanisms for the management of network and compute resources, in particular for call admission control taking into account the simultaneous requests for both types of resources by the mobile units. It also provides a mechanism for mobility management of mobile units as they move from one cell to another in a mobile computing environment. The network resources are reserved based on the Entropy model. In order to provide compute guarantees, we provide a novel scheme for off-loading tasks from the mobile units to the compute servers in the backbone network. We propose a load-balancing scheme to minimize the call blocking probability due to lack of compute resources, which redistributes the total load in the system across all compute servers so that these are equally loaded. Through a quantitative analysis of the HARMONY architecture we establish its effectiveness in providing quality of service in mobile computing environments.
APA, Harvard, Vancouver, ISO, and other styles
17

Noh, Muhamad Syukri Md, Yanuar Z. Arief, and Nor Asiah Muhamad. "Development of Remote Control System for Residential AC Power Supply Based on GSM Technology." Applied Mechanics and Materials 818 (January 2016): 169–73. http://dx.doi.org/10.4028/www.scientific.net/amm.818.169.

Full text
Abstract:
The present study deals with the development of remote control system based on the Global System for Mobile Communication (GSM) technology for switching the low voltage AC power supply system at residential consumer. Function of this system is to disconnect and reconnect the electricity supply to consumers. The introduction of the GSM technology and particularly the use of hand-held mobile phones has brought the innovative distance communication to remote locations. This utilization of this technology for the remote control of systems and appliances will make life easier, safe and quick from anywhere. GSM module was used for receiving short message service (SMS) from user’s mobile phone that automatically enable the controller to take any further action such as to switch on and off the consumer load at the incoming power supply. The system was integrated with microcontroller and GSM network interface using assembly language. AVR Studio 4 software was utilized to accomplish the integration. The system is activated when user sends the SMS to GSM controller circuit at electric meter consumption panel board. Upon receiving the SMS command, the microcontroller unit then automatically controls the incoming power supply by switching on or off the device according to the user command. In other words, the developed system reads message from the mobile phone and responds to control the devices according to the received message. The system can also give feedback to the user to inform the status of switching operation if such command is received.
APA, Harvard, Vancouver, ISO, and other styles
18

Liang, Tyng-Yeu, and You-Jie Li. "A Location-Aware Service Deployment Algorithm Based on K-Means for Cloudlets." Mobile Information Systems 2017 (2017): 1–10. http://dx.doi.org/10.1155/2017/8342859.

Full text
Abstract:
Cloudlet recently was proposed to push data centers towards network edges for reducing the network latency of delivering cloud services to mobile devices. For the sake of user mobility, it is necessary to deploy and hand off services anytime anywhere for achieving the minimal network latency for users’ service requests. However, the cost of this solution usually is too high for service providers and is not effective for resource exploitation. To resolve this problem, we propose a location-aware service deployment algorithm based on K-means for cloudlets in this paper. Simply speaking, the proposed algorithm divides mobile devices into a number of device clusters according to the geographical location of mobile devices and then deploys service instances onto the edge cloud servers nearest to the centers of device clusters. Our performance evaluation has shown that the proposed algorithm can effectively reduce not only the network latency of edge cloud services but also the number of service instances used for satisfying the condition of tolerable network latency.
APA, Harvard, Vancouver, ISO, and other styles
19

Toscano, Giuseppe, Vincenzo Alfano, Antonio Scarfone, and Luigi Pari. "Pelleting Vineyard Pruning at Low Cost with a Mobile Technology." Energies 11, no. 9 (September 18, 2018): 2477. http://dx.doi.org/10.3390/en11092477.

Full text
Abstract:
The goal of this work was to test a patented pruning harvester and a mobile pelleting system specifically designed for the vineyard agripellet chain. Biomass was characterized before and after storage and after the pelleting stage. The performance, the fuel consumption, and the work quality of the harvester were assessed together with the productivity and the power consumption of the mobile pelleting system. Production costs of pellet were estimated for the whole logistic chain, considering two scenarios: Storage and pelleting directly at the farm site or at a dedicated location at variable distance from the fields. For comparison, the direct production of chips without pelleting was considered. Results indicate that harvester performance was quite good and comparable with commercial solutions; the chips produced exhibited excellent storage performance, allowing direct pelleting without forced drying; the pellet quality was good comparable with that produced from forestry biomass. From an economic point of view, in-field pelleting was the most cost-effective solution, with a good margin of profit up to 57€ t−1; on the other hand, when transport to an intermediate storage center is necessary, profit margin reduces gradually and fades off at an average 50 km distance from the fields.
APA, Harvard, Vancouver, ISO, and other styles
20

DE MARCO, GIUSEPPE, LEONARD BAROLLI, and MAURIZIO LONGO. "smartAR: A PSEUDO- END-TO-END APPROACH FOR IP MICRO-MOBILITY." Journal of Interconnection Networks 07, no. 01 (March 2006): 21–35. http://dx.doi.org/10.1142/s0219265906001557.

Full text
Abstract:
Nowadays, we can count several proposals about the micro-mobility problem in IP networks. In this paper, we try to summarize current proposals by means of a general classification scheme. Our taxonomy permits to identify pros and cons of current IP micromobility protocols. This classification should help understanding that e2e solutions do not cope with simultaneous movements of mobile nodes, and thus a mixed scheme would be better. Here, we design a new scheme, namely the smartAR scheme, which reduces network complexity and endures both single and simultaneous movements scenario. Moreover, we provide the classification of the IP micro-mobility protocols with a simple analysis of the hand-off latencies.
APA, Harvard, Vancouver, ISO, and other styles
21

Chinara, Suchismita, and Santanu Kumar Rath. "Topology Control by Transmission Range Adjustment Protocol for Clustered Mobile Ad Hoc Networks." ISRN Communications and Networking 2011 (October 28, 2011): 1–10. http://dx.doi.org/10.5402/2011/147925.

Full text
Abstract:
The growth of interest and research on multihop wireless network is exponential in recent years. In mobile ad hoc networks (MANET), the nodes play the role of routers to forward the packets of neighbor nodes as there is no fixed infrastructure available to do so. Clustering is a proven solution that maps the architecture of cellular networks into ad hoc networks. Here, selected nodes form the virtual backbone of the network and take part in packet routing. This achieves faster packet delivery as limited nodes are responsible for the same even though the network is not strongly connected. In this paper, a distributed topology adaptive clustering algorithm is designed that requires local information by the nodes for the formation of clusters. The role of cluster head is fairly distributed among the nodes to obtain a longer network lifetime. The change of cluster heads and the mobility of nodes disturb the node connectivity resulting in communication instability. To overcome such situations, a topology control protocol is developed that adjusts the transmission range of concerned mobile nodes to achieve local connectivity among nodes within the clusters even after the hand-off by the heads takes place.
APA, Harvard, Vancouver, ISO, and other styles
22

AbdElHamid, Amr, Peng Zong, and Bassant Abdelhamid. "Advanced Software Ground Station and UAV Development for NLoS Control Using Mobile Communications." Discrete Dynamics in Nature and Society 2015 (2015): 1–20. http://dx.doi.org/10.1155/2015/285746.

Full text
Abstract:
Over the last decades, Unmanned Aerial Systems (UASs) have gained much attention due to their various applications in different sections. However, their communication range is limited to utilized communication equipment. Therefore, utilization of GSM channels opens a new prospect towards long distance UAV missions and mobile command and control centers. This paper demonstrates new design and development of a small-scale UAV and a Ground Control Station (GCS) using GSM bidirectional communications for Non-Line of Sight (NLoS) long range control. GCSs are considered the front end node in UAV guidance process. Therefore, the proposed GCS employs a two-layer framework to consider all ground pilot requirements. Moreover, a new exploitation of global weather forecast data is added to the GCS. On the other hand, the proposed airborne system utilizes a new integration of different Commercial off-the-Shelf (COTS) components and excludes short range receivers. The ground and flight tests show that stable bidirectional GSM communication is established, reliable hardware integration is accomplished, real time performance is achieved, GCS functional fidelity is obtained, and low cost is maintained. Finally, some qualitative aspects of the proposed platform are presented to address the detailed features.
APA, Harvard, Vancouver, ISO, and other styles
23

Prajapati, Pankaj, and Dr Shyam Akashe. "Effect of changes in supply voltage on power consumption of digital CMOS delay lines." International Journal of Electrical and Electronics Research 4, no. 4 (December 30, 2016): 118–21. http://dx.doi.org/10.37391/ijeer.040402.

Full text
Abstract:
In the beginning of the last decade, battery-powered hand-held devices such as mobile phones and laptop computers emerged. For that application we have to design a device which will consume minimum amount of energy. For that reason in this article we focused on power consumption and how to calculate the power. In this paper, an analysis of different delay lines based on CMOS architecture has been done. The effect of supply voltage on digital delay lines has been analysed as how supply voltage affected the value of power consumption of the digital delay line. After the analysis of those performance parameters, the trade-off has been made for better performance of delay lines.
APA, Harvard, Vancouver, ISO, and other styles
24

Regmi, Hem, Moh Sabbir Saadat, Sanjib Sur, and Srihari Nelakuditi. "SquiggleMilli." Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 5, no. 3 (September 9, 2021): 1–26. http://dx.doi.org/10.1145/3478113.

Full text
Abstract:
This paper proposes SquiggleMilli, a system that approximates traditional Synthetic Aperture Radar (SAR) imaging on mobile millimeter-wave (mmWave) devices. The system is capable of imaging through obstructions, such as clothing, and under low visibility conditions. Unlike traditional SAR that relies on mechanical controllers or rigid bodies, SquiggleMilli is based on the hand-held, fluidic motion of the mmWave device. It enables mmWave imaging in hand-held settings by re-thinking existing motion compensation, compressed sensing, and voxel segmentation. Since mmWave imaging suffers from poor resolution due to specularity and weak reflectivity, the reconstructed shapes could be imperceptible by machines and humans. To this end, SquiggleMilli designs a machine learning model to recover the high spatial frequencies in the object to reconstruct an accurate 2D shape and predict its 3D features and category. We have customized SquiggleMilli for security applications, but the model is adaptable to other applications with limited training samples. We implement SquiggleMilli on off-the-shelf components and demonstrate its performance improvement over the traditional SAR qualitatively and quantitatively.
APA, Harvard, Vancouver, ISO, and other styles
25

Ballestar-Tarín, María Luisa, Conchín Simó-Sanz, Elena Chover-Sierra, Carlos Saus-Ortega, Carmen Casal-Angulo, and Antonio Martínez-Sabater. "Self-Perception of Dependence as an Indicator of Smartphone Addiction—Establishment of a Cutoff Point in the SPAI–Spain Inventory." International Journal of Environmental Research and Public Health 17, no. 11 (May 28, 2020): 3838. http://dx.doi.org/10.3390/ijerph17113838.

Full text
Abstract:
Background: In recent years, the abusive use of the smartphone has reached a situation that could be considered pathological. In this sense, different instruments to assess this problematic use or addiction to the smartphone are used. One of these instruments is the Smartphone Addition Inventory (SPAI), which has been validated in the Spanish language (SPAI-Spain). The main difficulty of these scales is to establish a cut-off point that determines such mobile addiction. On the other hand, self-perception was used in different addictions as a predictor of the problem. Aim: The objective of this study was to establish the cut-off point in the scores of the SPAI-Spain, using as a reference the self-perception of addiction values. Methods: A receiver operating characteristics (ROC) analysis was carried out, establishing as the cut-off point the one that presented a higher value of Youden J, indicative of its sensitivity and specificity. Results: 2958 participants from the university community completed the SPAI–Spain questionnaire. Differences in SPAI–Spain scores were found among age groups and gender, even though not all of them were statistically significant. When using the self-perception of smartphone addiction as the benchmark value, a score of 44 was established as the cutting point of the SPAI-Spain questionnaire, with a Youden J corresponding to 0.416. Conclusions: The implementation of a cut-off point of the SPAI-Spain questionnaire makes it an instrument that allows early identification of those individuals at risk of addiction, as well as the establishment of preventive and/or intervention measures.
APA, Harvard, Vancouver, ISO, and other styles
26

LIU, SHAOSHAN, WON W. RO, CHEN LIU, ALFREDO CRISTOBAL-SALAS, CHRISTOPHE CÉRIN, JIAN-JUN HAN, and JEAN-LUC GAUDIOT. "INTRODUCING THE EXTREMELY HETEROGENEOUS ARCHITECTURE." Journal of Interconnection Networks 13, no. 03n04 (September 2012): 1250010. http://dx.doi.org/10.1142/s0219265912500107.

Full text
Abstract:
The computer industry is moving towards two extremes: extremely high-performance high-throughput cloud computing, and low-power mobile computing. Cloud computing, while providing high performance, is very costly. Google and Microsoft Bing spend billions of dollars each year to maintain their server farms, mainly due to the high power bills. On the other hand, mobile computing is under a very tight energy budget, but yet the end users demand ever increasing performance on these devices. This trend indicates that conventional architectures are not able to deliver high-performance and low power consumption at the same time, and we need a new architecture model to address the needs of both extremes. In this paper, we thus introduce our Extremely Heterogeneous Architecture (EHA) project: EHA is a novel architecture that incorporates both general-purpose and specialized cores on the same chip. The general-purpose cores take care of generic control and computation. On the other hand, the specialized cores, including GPU, hard accelerators (ASIC accelerators), and soft accelerators (FPGAs), are designed for accelerating frequently used or heavy weight applications. When acceleration is not needed, the specialized cores are turned off to reduce power consumption. We demonstrate that EHA is able to improve performance through acceleration, and at the same time reduce power consumption. Since EHA is a heterogeneous architecture, it is suitable for accelerating heterogeneous workloads on the same chip. For example, data centers and clouds provide many services, including media streaming, searching, indexing, scientific computations. The ultimate goal of the EHA project is two-fold: first, to design a chip that is able to run different cloud services on it, and through this design, we would be able to greatly reduce the cost, both recurring and non-recurring, of data centers\clouds; second, to design a light-weight EHA that runs on mobile devices, providing end users with improved experience even under tight battery budget constraints.
APA, Harvard, Vancouver, ISO, and other styles
27

Mann, Daniel. "‘I Am Spartacus’: individualising visual media and warfare." Media, Culture & Society 41, no. 1 (March 16, 2018): 38–53. http://dx.doi.org/10.1177/0163443718764805.

Full text
Abstract:
The constant presence of cameras and social media has become a given during day-to-day military activities in Israel and the Occupied Palestinian Territories. Such technologies shift the focus of warfare onto the individual, and in particular onto the faces of soldiers and Palestinians caught on camera. Due to the habitual use of mobile phones and social media by both soldiers and civilians, the face is singled out as a new battleground, where political action is substituted for individual responsibility. On one hand, the co-option of personal social media into armed conflict enables state actors to zero in on the faces and identities of Palestinian dissidents and alleged terrorists. On the other hand, the faces of Israeli soldiers are also captured and circulated on social media as digital images, posing a new threat to state authority, which depends on remaining faceless. Images of IDF soldiers’ faces, once recorded and shared, figuratively strip off the improvised masks they often wear to hide their identity and preserve their impunity. In Israel and Palestine, where everyday social media habits have become inseparable from routines of security and armed conflict, the image of a soldier’s face individualises his or her actions and demands accountability.
APA, Harvard, Vancouver, ISO, and other styles
28

Ozioko, Oliver, William Navaraj, Marion Hersh, and Ravinder Dahiya. "Tacsac: A Wearable Haptic Device with Capacitive Touch-Sensing Capability for Tactile Display." Sensors 20, no. 17 (August 24, 2020): 4780. http://dx.doi.org/10.3390/s20174780.

Full text
Abstract:
This paper presents a dual-function wearable device (Tacsac) with capacitive tactile sensing and integrated tactile feedback capability to enable communication among deafblind people. Tacsac has a skin contactor which enhances localized vibrotactile stimulation of the skin as a means of feedback to the user. It comprises two main modules—the touch-sensing module and the vibrotactile module; both stacked and integrated as a single device. The vibrotactile module is an electromagnetic actuator that employs a flexible coil and a permanent magnet assembled in soft poly (dimethylsiloxane) (PDMS), while the touch-sensing module is a planar capacitive metal-insulator-metal (MIM) structure. The flexible coil was fabricated on a 50 µm polyimide (PI) sheet using Lithographie Galvanoformung Abformung (LIGA) micromoulding technique. The Tacsac device has been tested for independent sensing and actuation as well as dual sensing-actuation mode. The measured vibration profiles of the actuator showed a synchronous response to external stimulus for a wide range of frequencies (10 Hz to 200 Hz) within the perceivable tactile frequency thresholds of the human hand. The resonance vibration frequency of the actuator is in the range of 60–70 Hz with an observed maximum off-plane displacement of 0.377 mm at coil current of 180 mA. The capacitive touch-sensitive layer was able to respond to touch with minimal noise both when actuator vibration is ON and OFF. A mobile application was also developed to demonstrate the application of Tacsac for communication between deafblind person wearing the device and a mobile phone user who is not deafblind. This advances existing tactile displays by providing efficient two-way communication through the use of a single device for both localized haptic feedback and touch-sensing.
APA, Harvard, Vancouver, ISO, and other styles
29

Palacios Jara, Efraín, Ahmad Mohamad Mezher, Mónica Aguilar Igartua, Rebeca P. Díaz Redondo, and Ana Fernández-Vilas. "QSMVM: QoS-Aware and Social-Aware Multimetric Routing Protocol for Video-Streaming Services over MANETS." Sensors 21, no. 3 (January 29, 2021): 901. http://dx.doi.org/10.3390/s21030901.

Full text
Abstract:
A mobile ad hoc network (MANET) is a set of autonomous mobile devices connected by wireless links in a distributed manner and without a fixed infrastructure. Real-time multimedia services, such as video-streaming over MANETs, offers very promising applications, e.g., two members of a group of tourists who want to share a video transmitted through the MANET they form, a video-streaming service deployed over a MANET where users watch a film, among other examples. On the other hand, social web technologies, where people actively interact online with others through social networks, are leading to a socialization of networks. Information of interaction among users is being used to provide socially-enhanced software. To achieve this, we need to know the strength of the relationship between a given user and each user they interact with. This strength of the relationship can be measured through a concept called tie strength (TS), first introduced by Mark Granovetter in 1973. In this article, we modify our previous proposal named multipath multimedia dynamic source routing (MMDSR) protocol to include a social metric TS in the decisions taken by the forwarding algorithm. We find a trade-off between the quality of service (QoS) and the trust level between users who form the forwarding path in the MANET. Our goal is to increase the trust metric while the QoS is not affected significantly.
APA, Harvard, Vancouver, ISO, and other styles
30

Guo, Qing, Wenzheng Xu, Tang Liu, Hongyou Li, Zheng Li, and Jian Peng. "Towards Low-Cost Yet High-Performance Sensor Networks by Deploying a Few Ultra-fast Charging Battery Powered Sensors." Sensors 18, no. 9 (August 23, 2018): 2771. http://dx.doi.org/10.3390/s18092771.

Full text
Abstract:
The employment of mobile vehicles to charge sensors via wireless energy transfer is a promising technology to maintain the perpetual operation of wireless sensor networks (WSNs). Most existing studies assumed that sensors are powered with off-the-shelf batteries, e.g., Lithium batteries, which are cheap, but it takes some non-trivial time to fully charge such a battery (e.g., 30–80 min). The long charging time may incur long sensor dead durations, especially when there are many lifetime-critical sensors to be charged. On the other hand, other studies assumed that every sensor is powered with an ultra-fast charging battery, where it only takes some trivial time to replenish such a battery, e.g., 1 min, but the adoption of many ultra-fast sensors will bring about high purchasing cost. In this paper, we propose a novel heterogeneous sensor network model, in which there are only a few ultra-fast sensors and many low-cost off-the-shelf sensors. The deployment cost of the network in the model is low, as the number of ultra-fast sensors is limited. We also have an important observation that we can significantly shorten sensor dead durations by enabling the ultra-fast sensors to relay more data for lifetime-critical off-the-shelf sensors. We then propose a joint charging scheduling and routing allocation algorithm, such that the longest sensor dead duration is minimized. We finally evaluate the performance of the proposed algorithm through extensive simulation experiments. Experimental results show that the proposed algorithm is very promising and the longest sensor dead duration by it is only about 10% of those by existing algorithms.
APA, Harvard, Vancouver, ISO, and other styles
31

Mariappan, Bhuvaneswari, and Shanmugalakshmi Ramachandran. "Estimation of Always Best Connected Network in Heterogeneous Environment Based on Prediction of Recent Call History and Call Blocking Probability." International Journal of Mobile Computing and Multimedia Communications 5, no. 4 (October 2013): 1–14. http://dx.doi.org/10.4018/ijmcmc.2013100101.

Full text
Abstract:
Presently, the emergence of 4G heterogeneous network has attracted most of the user centric applications like video chatting, online mobile interactive classroom besides voice services. To facilitate such bandwidth hungry multimedia applications and to ensure QoS (Quality of Service), Always Best Connected (ABC) network is to be selected among available heterogeneous network. The selection of the ABC network is based on certain design parameters such as cost factor, bandwidth utilization, packet delivery ratio, security, throughput, delay, packet loss ratio and call blocking probability. In this paper, all the above mentioned design parameters are considered to evaluate the performance of Always Best Connected network under heterogeneous environment for mobile users. In addition, to select Always Best Connected network in a heterogeneous environment, a novel parameter namely recent call history-‘rch' is proposed to predict the call blocking probability (Cbp) of a network.The estimation of ‘rch' parameter in terms of Cbp avoids unnecessary hand-off and enhances the effective bandwidth utilization of a cellular network under heavy load condition.A QoS mapper submodule is proposed in the QoS broker module to predict the ‘rch' parameter of a network to select an optimum network. Further, a statistcal model based on Bayesian network using the data on recent call history is applied for Cbp estimation and simulated over various heterogeneous environment condition. The simulated results show improved performance of user centric applications when compared with non-predictive methods.
APA, Harvard, Vancouver, ISO, and other styles
32

Paek, Jeongki, and Yoon Ji Choi. "Association between hand grip strength and impaired health-related quality of life in Korean cancer survivors: a cross-sectional study." BMJ Open 9, no. 9 (September 2019): e030938. http://dx.doi.org/10.1136/bmjopen-2019-030938.

Full text
Abstract:
ObjectivesTo assess the association between hand grip strength (HGS) and health-related quality of life (HRQoL) among Korean cancer survivors.DesignPopulation-based cross-sectional study.SettingA nationally representative population survey data (face-to-face interviews and health examinations were performed in mobile examination centres).ParticipantsA total of 1037 cancer survivors (person with cancer of any type who is still living) with available data on HGS and HRQoL in the sixth and seventh Korea National Health and Nutrition Examination Surveys (2014–2017).Primary outcome measuresPrevalence of impaired HRQoL by HGS.ResultsAmong 1037 cancer survivors (60.7% women, mean age=62.2 years), 19.2% of them had weak HGS according to gender-specific cut-off values (lowest quintile<29.7 kg in men and <19.7 kg in women). In the study population, the most common cancer site was the stomach, followed by the thyroid, breast, colorectal and cervix. Individuals with weak HGS showed statistically significantly increased impairment in all five dimensions of the EuroQoL-5 dimension (EQ-5D) compared with those in patients with normal HGS. In a multinomial logistic regression analysis, impaired HRQoL (some or extreme problem in EQ-5D) was significantly reduced in each dimension of the EQ-5D, except for anxiety/depression, when HGS was increased. The OR for impaired HRQoL ranged from 0.86 to 0.97 per 1 kg increase in HGS in four dimensions (mobility, self-care, usual activity and pain/discomfort).ConclusionsWeak HGS was associated with impaired HRQoL in cancer survivors. Future longitudinal studies are needed to confirm the causality between HGS and HRQoL in cancer survivors.
APA, Harvard, Vancouver, ISO, and other styles
33

Li, Chengguo, Eli Brewer, Liem Pham, and Heejung Jung. "Reducing Mobile Air Conditioner (MAC) Power Consumption Using Active Cabin-Air-Recirculation in A Plug-In Hybrid Electric Vehicle (PHEV)." World Electric Vehicle Journal 9, no. 4 (December 19, 2018): 51. http://dx.doi.org/10.3390/wevj9040051.

Full text
Abstract:
Air conditioner power consumption accounts for a large fraction of the total power used by hybrid and electric vehicles. This study examined the effects of three different cabin air ventilation settings on mobile air conditioner (MAC) power consumption, such as fresh mode with air conditioner on (ACF), fresh mode with air conditioner off (ACO), and air recirculation mode with air conditioner on (ACR). Tests were carried out for both indoor chassis dynamometer and on-road tests using a 2012 Toyota Prius plug-in hybrid electric vehicle. Real-time power consumption and fuel economy were calculated from On-Board Diagnostic-II (OBD-II) data and compared with results from the carbon balance method. MAC consumed 28.4% of the total vehicle power in ACR mode when tested with the Supplemental Federal Test Procedure (SFTP) SC03 driving cycle on the dynamometer, which was 6.1% less than in ACF mode. On the other hand, ACR and ACF mode did not show significant differences for the less aggressive on-road tests. This is likely due to the significantly lower driving loads experienced in the local driving route compared to the SC03 driving cycle. On-road and SC03 test results suggested that more aggressive driving tends to magnify the effects of the vehicle HVAC (heating, ventilation, and air conditioning) system settings. ACR conditions improved relative fuel economy (or vehicle energy efficiency) to that of ACO conditions by ~20% and ~8% compared to ACF conditions for SC03 and on-road tests, respectively. Furthermore, vehicle cabin air quality was measured and analyzed for the on-road tests. ACR conditions significantly reduced in-cabin particle concentrations, in terms of aerosol diffusion charger signal, by 92% compared to outside ambient conditions. These results indicate that cabin air recirculation is a promising method to improve vehicle fuel economy and improve cabin air quality.
APA, Harvard, Vancouver, ISO, and other styles
34

Resmy V and Priyanka R. "Effectiveness of Tech Neck Exercise among adult smartphone user with Text Neck Syndrome." International Journal of Research in Pharmaceutical Sciences 11, SPL4 (December 20, 2020): 21–24. http://dx.doi.org/10.26452/ijrps.v11ispl4.3729.

Full text
Abstract:
A mobile phone is a gadget which is utilized for voice and information correspondence. Alongside the fundamental voice limit of a phone, current mobiles may support various additional features, for instance, text advising, email, gaming, camera, Whatsapp, Facebook, GPS and so on. The neck or cervical spine is a system which involves nerves, bones, joints, and muscles which are coordinated by the brain and the spinal cord. Besides, exacerbation along the nerve pathways can cause torment into the shoulder, arm and hand. "Text neck" is the term used to depict the neck torment and harm bolstered from looking down at the cell phone, tablets or distinctive far off gadgets too constantly and for actually quite a while. So the current examination points are to survey the effectiveness of tech neck exercise among adult smartphone user with text neck syndrome. Quantitative experimental research was conducted among 60 adults. A convenient sampling technique was used to select the samples. Self-structured questionnaires were used to collect the demographic data and pain scale was assessed. The result of the study shows that among 60 samples, it was concluded that "TECH NECK" exercise has no side effects and it is an easy and comfortable method which can be practised for a long time to adult within text neck syndrome.
APA, Harvard, Vancouver, ISO, and other styles
35

Shonrock, Diana D. "Management: Managing a Career in Place." Reference & User Services Quarterly 58, no. 4 (October 25, 2019): 205. http://dx.doi.org/10.5860/rusq.58.4.7145.

Full text
Abstract:
For the past ten years, I have had the pleasure of serving as editor of RUSQ’s Management column. In this space, I have enjoyed showcasing myriad perspectives on management broadly interpreted, articulated by an array of both aspiring and seasoned authors. As I prepared to hand off this responsibility after this issue, I realized that I have filled this role for longer than I ever spent at any one institution to this point in my career—which reminded me that an aspect of management I always wanted to present here is an entire career spent in one library. Managing a career in place, while not extinct, is a practice that waned over the years that our society became increasingly mobile and the notion of moving for opportunity took root. But in fact, a single library—if it’s the right one—can offer the chance to try new things, satisfy a sense of possibility, and advance one professionally, without all the packing and relocating. In this interview, former RUSA President Diana Shonrock shares the story of how she happened into her start in librarianship—and realized a fulfilling, multi-faceted career—all in one place: Iowa State University (ISU) in Ames, Iowa.—Editor
APA, Harvard, Vancouver, ISO, and other styles
36

Karolj, Valentina, Alberto Viseras, Luis Merino, and Dmitriy Shutin. "An Integrated Strategy for Autonomous Exploration of Spatial Processes in Unknown Environments." Sensors 20, no. 13 (June 30, 2020): 3663. http://dx.doi.org/10.3390/s20133663.

Full text
Abstract:
Exploration of spatial processes, such as radioactivity or temperature is a fundamental task in many robotic applications. In the literature, robotic exploration is mainly carried out for applications where the environment is a priori known. However, for most real life applications this assumption often does not hold, specifically for disaster scenarios. In this paper, we propose a novel integrated strategy that allows a robot to explore a spatial process of interest in an unknown environment. To this end, we build upon two major blocks. First, we propose the use of GP to model the spatial process of interest, and process entropy to drive the exploration. Second, we employ registration algorithms for robot mapping and localization, and frontier-based exploration to explore the environment. However, map and process exploration can be conflicting goals. Our integrated strategy fuses the two aforementioned blocks through a trade-off between process and map exploration. We carry out extensive evaluations of our algorithm in simulated environments with respect to different baselines and environment setups using simulated GP data as a process at hand. Additionally, we perform experimental verification with a mobile holonomic robot exploring a simulated process in an unknown labyrinth environment. Demonstrated results show that our integrated strategy outperforms both frontier-based and GP entropy-driven exploration strategies.
APA, Harvard, Vancouver, ISO, and other styles
37

Parès, G., A. Attard, F. Dosseul, A. N'Hari, O. Boillon, L. Toffanin, G. Klug, and G. Simon. "DEVELOPMENT OF AN ULTRA THIN DIE-TO-WAFER FLIP CHIP STACKING PROCESS FOR 2.5D INTEGRATION." International Symposium on Microelectronics 2013, no. 1 (January 1, 2013): 000516–22. http://dx.doi.org/10.4071/isom-2013-wa41.

Full text
Abstract:
3D integration relying on novel vertical interconnection technologies opens the gate to powerful microelectronic systems in ultra-thin packages answering the demand of the mobile market. Among these, die-to-wafer stacking is a key enabling technology for 2.5D as well as for 3D with technological challenges driven by, in one hand, the increase of the die surface and the number of I/Os and, on the other hand, the reduction of the vertical dimensions. In our integration scheme we have achieved flip chip stacking (or Face to Face) of 35 μm ultra-thin dies with low stand-off (&lt; 15 μm) copper micro-bumps and tin-silver-copper solders (SAC). Ultra-thin dies are prepared using dicing before grinding (DBG) technique. After DBG, plasma stress release process is applied to the backside of the singulated chips. Copper μbump technology is challenging with this very low profile stacking since the current flip chip process is no longer adapted to this geometry and that the die flatness tolerance become very critical to obtain a high soldering yield. Process improvements have been achieved on the copper pillar fabrication itself with several metallurgy stack configurations as well as new processes using damascene techniques. Furthermore, innovative technologies have been deployed on the pick and place and collective soldering processes. Intermetallic formation during reflow process is achieved through transient liquid phase (TLP) reaction leading to thorough consumption of the tin layer and to the formation of Cu6Sn5 and Cu3Sn compounds. Capillary underfill is finally successfully applied in the narrow die-to-wafer gap by jetting technique. After optimization, electrical tests show a very high yield close to 100% over a representative number of fully populated wafers. Reliability tests have also been carried out at wafer level exhibiting no significant resistance increase or yield loss over 1000 thermal cycles between −40 and +125°C.
APA, Harvard, Vancouver, ISO, and other styles
38

Wu, Mingxing, Liya Wang, Ming Li, and Huijun Long. "Alleviating feature fatigue in product development based on the bass model." Journal of Engineering, Design and Technology 13, no. 3 (July 6, 2015): 350–68. http://dx.doi.org/10.1108/jedt-04-2013-0026.

Full text
Abstract:
Purpose – This paper aims to propose a novel method to predict and alleviate feature fatigue. Many products now are loaded with an extensive number of features. Adding more features to one product generally makes the product more attractive on the one hand but, on the other hand, may result in increasing difficulty to use the product. This phenomenon is called “feature fatigue”, which will lead to dissatisfaction and negative word-of-mouth (WOM). Feature fatigue will damage the brand’s long-term profit, and ultimately decrease the manufacturer’s customer equity. Thus, a problem of balancing the benefit of increasing “attractiveness” with the cost of decreasing “usability” exists. Design/methodology/approach – A novel method based on the Bass model is proposed to predict and alleviate feature fatigue. Product capability, usability and WOM effects are integrated into the Bass model to predict the impacts of adding features on customer equity in product development, thus helping designers alleviate feature fatigue. A case study of mobile phone development based on survey data is presented to illustrate and validate the proposed method. Findings – The results of the case study demonstrate that adding more features indeed increases initial sales; however, adding too many features ultimately decreases customer equity due to usability problems. There is an optimal feature combination a product should include to balance product capability with usability. The proposed method makes a trade-off between initial sales and long-term profits to maximize customer equity. Originality/value – The proposed method can help designers predict the impacts of adding features on customer equity in the early stages of product development. It can provide decision supports for designers to decide what features should be added to maximize customer equity, thus alleviating feature fatigue.
APA, Harvard, Vancouver, ISO, and other styles
39

Trejo, Luis, and Ari Barrera-Animas. "Towards an Efficient One-Class Classifier for Mobile Devices and Wearable Sensors on the Context of Personal Risk Detection." Sensors 18, no. 9 (August 30, 2018): 2857. http://dx.doi.org/10.3390/s18092857.

Full text
Abstract:
In this work, we present a first step towards an efficient one-class classifier well suited for mobile devices to be implemented as part of a user application coupled with wearable sensors in the context of personal risk detection. We compared one-class Support Vector Machine (ocSVM) and OCKRA (One-Class K-means with Randomly-projected features Algorithm). Both classifiers were tested using four versions of the publicly available PRIDE (Personal RIsk DEtection) dataset. The first version is the original PRIDE dataset, which is based only on time-domain features. We created a second version that is simply an extension of the original dataset with new attributes in the frequency domain. The other two datasets are a subset of these two versions, after a feature selection procedure based on a correlation matrix analysis followed by a Principal Component Analysis. All experiments were focused on the performance of the classifiers as well as on the execution time during the training and classification processes. Therefore, our goal in this work is twofold: we aim at reducing execution time but at the same time maintaining a good classification performance. Our results show that OCKRA achieved on average, 89.1% of Area Under the Curve (AUC) using the full set of features and 83.7% when trained using a subset of them. Furthermore, regarding execution time, OCKRA reports in the best case a 33.1% gain when using a subset of the feature vector, instead of the full set of features. These results are better than those reported by ocSVM, in which case, even though the AUCs are very close to each other, execution times are significantly higher in all cases, for example, more than 20 h versus less than an hour in the worst-case scenario. Having in mind the trade-off between classification performance and efficiency, our results support the choice of OCKRA as our best candidate so far for a mobile implementation where less processing and memory resources are at hand. OCKRA reports a very encouraging speed-up without sacrificing the classifier performance when using the PRIDE dataset based only on time-domain attributes after a feature selection procedure.
APA, Harvard, Vancouver, ISO, and other styles
40

Sahrab, Ammar A., and Alaa Doohee Yaseen. "Filtered orthogonal frequency division multiplexing for improved 5G systems." Bulletin of Electrical Engineering and Informatics 10, no. 4 (August 1, 2021): 2079–87. http://dx.doi.org/10.11591/eei.v10i4.3119.

Full text
Abstract:
Wireless communications became an integrated part of the human life. Fifth generation (5G) is the modern communication which provides enhanced mobile broadband (eMBB), ultra reliable low latency communications (URLLC), and massive machine type communication (mMTC). Thus, 5G have to provide coverage to multi-numerology devices, therefore, modulation and access schemes are suggested in the literature such as cyclic prefix orthogonal frequency division multiplexing (CP-OFDM) and filtered OFDM (f-OFDM). CP-OFDM suffers from the high out of band emission which limited the multi-numerology applications. In f-OFDM, the out of band emission can be suppressed to an accepted extent such that different numerologies can be coexisting. On the other hand, f-OFDM can be more improved by using a proper filtering approach. In this paper three different filters are suggested based windowed-sinc function; Hanning, Hamming, and Blackman. Simulation results show that the proposed filters are promising for high spectral efficiency and out of band emission rejection. Furthermore, the bit error rate, error vector magnitude, and power spectral density are further improved with respect to CP-OFDM scheme but some trade-off is present. Overall, the suggested windowed-sinc filters are outperforming the traditional CP-OFDM. As a conclusion, the suggested windnowed-sinc filters have no limitations on the modulation order or the number of subcarriers utilized in the system.
APA, Harvard, Vancouver, ISO, and other styles
41

Toyong, Paul Junrey A. "Sleeping Habits, Classroom Behaviour and Academic Performance of Senior High School Students." International Journal of Multidisciplinary: Applied Business and Education Research 1, no. 1 (December 18, 2020): 54–63. http://dx.doi.org/10.11594/ijmaber.01.01.10.

Full text
Abstract:
Being sleepy in class can have a vital impact on the academic performance of a student. Lack of sufficient and adequate sleep can be harmful and even deadly. It is a basic necessity of life and important part of learning. This study utilized descriptive and correlational design to examine 119 senior high Electrical Installation and Maintenance (EIM) students who were selected through simple random sampling. Findings revealed that 88 percent of the students were sleep deprived and they usually sleep for lessthan 6 hours only. Two of the reasons of sleeping late were using of Facebook and Messenger account and playing mobile games. The third reason was making assignments and homework. The most prevalent classroom behaviours were: students were sleepy during class discussions and they slept in class during vacant periods and the third prevalent behavior was they felt tired during classes. Sixty-one percent of the students have a general average of 75-79 which is only fairly satisfactory and 29 percent have 80-84 grade which is only satisfactory in the K-12 grading system. There was a significant negative relationship (cc= -0.420 and p=0.000) between number of hours of night sleep and sleepiness classroom behavior. This suggested that the less number of hours of night sleep is correlated to high occurrence of sleepiness classroom behavior. There was a significant positive relationship (cc=0.627 and p=0.000) between number of hours of night sleep and academic per-formance. This suggested that the high number of hours of night sleep is associated to high academic performance. On the other hand, students with less sleep had low academic performance. There was a significant negative relationship (cc= -0.544 and p=0.000) between sleepiness classroom behavior and the academic performance. This implied that high occurrence of sleepiness classroom behavior is associated to low academic performance. The implications may serve as basis for policy makers, school administrators and teachers to educate students including the parents on the proper use of mobile phones and other gadgets. The parents need to set sleeping time or lights-off rules and regulate the use of mobile phones. Sleeping time or routine shall be imposed. School administrators and teachers need to craft a well-planned and well-designed policy on giving assignments and homework to attain high scholastic achievement.
APA, Harvard, Vancouver, ISO, and other styles
42

Михеева, Светлана Валентиновна, and Денис Владимирович Шлепанов. "SOME PROBLEMS THAT ARISE IN REMAND PRISON ACTIVITIESFOR ACTIONS AIMED AT DETECTION AND SEIZUREOF MOBILE COMMUNICATION FACILITIES." Vestnik Samarskogo iuridicheskogo instituta, no. 1(42) (March 22, 2021): 53–60. http://dx.doi.org/10.37523/sui.2021.42.1.008.

Full text
Abstract:
Одним из проблемных вопросов, возникающих при функционированнии следственных изоляторов в России, является наличие в незаконном пользовании у лиц, содержащихся под стражей, запрещенных к использованию, хранению и приобретению предметов, в частности средств мобильной связи, а также апгрейдов, обеспечивающих их более широкий спектр действия и работу. В целях обеспечения наиболее качественного выполнения служебных задач по предупреждению поступления в незаконное пользование лицам, изолированным от общества и содержащимся в следственных изоляторах, средств мобильной связи помимо установленного на контрольно-пропускных пунктах по пропуску людей оборудования, использующегося для досмотра, в ряде учреждений широко применяются рентген-установки для досмотра как личных вещей, так и ручной клади. Кроме того, на объектах оборудованы отсекающие тамбуры, используемые для хранения личных вещей сотрудников учреждения и лиц, его посещающих. Несомненно, обеспечение учреждений обозначенными техническими средствами финансово затратно, учитывая сокращение финансирования ФСИН России, при этом фактов проноса запрещенных предметов на территорию следственных изоляторов меньше не становится. Проникновение запрещенных предметов на территорию следственных изоляторов УИС происходит, как правило, в уязвимых для этого местах (сокрытие под одеждой, в медицинских протезах и т. д.). Передача или попытка передачи запрещенных предметов, изделий и веществ признается оконченным правонарушением в тот момент, когда совершены действия, прямо направленные на их доставку, то есть они были пронесены на территорию режимного объекта. One of the most urgent problems of the activity of the investigative isolators of the Penal System of the Russian Federation is the fight against the entry of prohibited items into places of detention, especially mobile communication devices and their accessories. In order to increase the effectiveness of activities aimed at preventing the entry of prohibited items into the territory of pre-trial detention facilities in the penitentiary system, in addition to stationary metal detectors, x-ray scanners are installed at checkpoints for the inspection of personal belongings and hand Luggage. Facilities for storing personal belongings of the staff of the institution and persons who arrived to visit it are provided at the facilities of the penitentiary system in parallel with the cut-off vestibules of the checkpoint. Of course, providing institutions that execute sentences with these technical means is financially costly, given the reduction in funding for the Federal penitentiary service of Russia. However, there are no fewer cases of prohibited items being brought into the territory of pre-trial detention facilities. The penetration of prohibited items into the territory of pre-trial detention centers of the penal system usually occurs in vulnerable places (hiding under clothing, in medical prostheses, etc.). the Transfer or attempt to transfer prohibited items, products and substances is considered a completed offense at the moment when actions directly aimed at their delivery are committed, that is, they were carried into the territory of a secure facility.
APA, Harvard, Vancouver, ISO, and other styles
43

Canciani, M., E. Conigliaro, M. Del Grasso, P. Papalini, and M. Saccone. "3D SURVEY AND AUGMENTED REALITY FOR CULTURAL HERITAGE. THE CASE STUDY OF AURELIAN WALL AT CASTRA PRAETORIA IN ROME." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLI-B5 (June 23, 2016): 931–37. http://dx.doi.org/10.5194/isprsarchives-xli-b5-931-2016.

Full text
Abstract:
The development of close-range photogrammetry has produced a lot of new possibility to study cultural heritage. 3D data acquired with conventional and low cost cameras can be used to document, investigate the full appearance, materials and conservation status, to help the restoration process and identify intervention priorities. At the same time, with 3D survey a lot of three-dimensional data are collected and analyzed by researchers, but there are a very few possibility of 3D output. The augmented reality is one of this possible output with a very low cost technology but a very interesting result. Using simple mobile technology (for iPad and Android Tablets) and shareware software (in the case presented “Augment”) it is possible to share and visualize a large number of 3D models with your own device. The case study presented is a part of an architecture graduate thesis, made in Rome at Department of Architecture of Roma Tre University. We have developed a photogrammetric survey to study the Aurelian Wall at Castra Praetoria in Rome. The surveys of 8000 square meters of surface have allowed to identify stratigraphy and construction phases of a complex portion of Aurelian Wall, specially about the Northern door of Castra. During this study, the data coming out of 3D survey (photogrammetric and topographic), are stored and used to create a reverse 3D model, or virtual reconstruction, of the Northern door of Castra. This virtual reconstruction shows the door in the Tiberian period, nowadays it's totally hidden by a curtain wall but, little and significative architectural details allow to know its original feature. The 3D model of the ancient walls has been mapped with the exact type of bricks and mortar, oriented and scaled according to the existing one to use augmented reality. Finally, two kind of application have been developed, one on site, were you can see superimposed the virtual reconstruction on the existing walls using the image recognition. On the other hand, to show the results also during the graduation day, the same application has been created in off-site condition using a poster.
APA, Harvard, Vancouver, ISO, and other styles
44

Canciani, M., E. Conigliaro, M. Del Grasso, P. Papalini, and M. Saccone. "3D SURVEY AND AUGMENTED REALITY FOR CULTURAL HERITAGE. THE CASE STUDY OF AURELIAN WALL AT CASTRA PRAETORIA IN ROME." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLI-B5 (June 23, 2016): 931–37. http://dx.doi.org/10.5194/isprs-archives-xli-b5-931-2016.

Full text
Abstract:
The development of close-range photogrammetry has produced a lot of new possibility to study cultural heritage. 3D data acquired with conventional and low cost cameras can be used to document, investigate the full appearance, materials and conservation status, to help the restoration process and identify intervention priorities. At the same time, with 3D survey a lot of three-dimensional data are collected and analyzed by researchers, but there are a very few possibility of 3D output. The augmented reality is one of this possible output with a very low cost technology but a very interesting result. Using simple mobile technology (for iPad and Android Tablets) and shareware software (in the case presented “Augment”) it is possible to share and visualize a large number of 3D models with your own device. The case study presented is a part of an architecture graduate thesis, made in Rome at Department of Architecture of Roma Tre University. We have developed a photogrammetric survey to study the Aurelian Wall at Castra Praetoria in Rome. The surveys of 8000 square meters of surface have allowed to identify stratigraphy and construction phases of a complex portion of Aurelian Wall, specially about the Northern door of Castra. During this study, the data coming out of 3D survey (photogrammetric and topographic), are stored and used to create a reverse 3D model, or virtual reconstruction, of the Northern door of Castra. This virtual reconstruction shows the door in the Tiberian period, nowadays it's totally hidden by a curtain wall but, little and significative architectural details allow to know its original feature. The 3D model of the ancient walls has been mapped with the exact type of bricks and mortar, oriented and scaled according to the existing one to use augmented reality. Finally, two kind of application have been developed, one on site, were you can see superimposed the virtual reconstruction on the existing walls using the image recognition. On the other hand, to show the results also during the graduation day, the same application has been created in off-site condition using a poster.
APA, Harvard, Vancouver, ISO, and other styles
45

Holland, D. A., C. Pook, D. Capstick, and A. Hemmings. "THE TOPOGRAPHIC DATA DELUGE – COLLECTING AND MAINTAINING DATA IN A 21ST CENTURY MAPPING AGENCY." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLI-B4 (June 14, 2016): 727–31. http://dx.doi.org/10.5194/isprsarchives-xli-b4-727-2016.

Full text
Abstract:
In the last few years, the number of sensors and data collection systems available to a mapping agency has grown considerably. In the field, in addition to total stations measuring position, angles and distances, the surveyor can choose from hand-held GPS devices, multi-lens imaging systems or laser scanners, which may be integrated with a laptop or tablet to capture topographic data directly in the field. These systems are joined by mobile mapping solutions, mounted on large or small vehicles, or sometimes even on a backpack carried by a surveyor walking around a site. Such systems allow the raw data to be collected rapidly in the field, while the interpretation of the data can be performed back in the office at a later date. In the air, large format digital cameras and airborne lidar sensors are being augmented with oblique camera systems, taking multiple views at each camera position and being used to create more realistic 3D city models. Lower down in the atmosphere, Unmanned Aerial Vehicles (or Remotely Piloted Aircraft Systems) have suddenly become ubiquitous. Hundreds of small companies have sprung up, providing images from UAVs using ever more capable consumer cameras. It is now easy to buy a 42 megapixel camera off the shelf at the local camera shop, and Canon recently announced that they are developing a 250 megapixel sensor for the consumer market. While these sensors may not yet rival the metric cameras used by today’s photogrammetrists, the rapid developments in sensor technology could eventually lead to the commoditization of high-resolution camera systems. With data streaming in from so many sources, the main issue for a mapping agency is how to interpret, store and update the data in such a way as to enable the creation and maintenance of the end product. This might be a topographic map, ortho-image or a digital surface model today, but soon it is just as likely to be a 3D point cloud, textured 3D mesh, 3D city model, or Building Information Model (BIM) with all the data interpretation and modelling that entails. In this paper, we describe research/investigations into the developing technologies and outline the findings for a National Mapping Agency (NMA). We also look at the challenges that these new data collection systems will bring to an NMA, and suggest ways that we may work to meet these challenges and deliver the products desired by our users.
APA, Harvard, Vancouver, ISO, and other styles
46

Holland, D. A., C. Pook, D. Capstick, and A. Hemmings. "THE TOPOGRAPHIC DATA DELUGE – COLLECTING AND MAINTAINING DATA IN A 21ST CENTURY MAPPING AGENCY." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLI-B4 (June 14, 2016): 727–31. http://dx.doi.org/10.5194/isprs-archives-xli-b4-727-2016.

Full text
Abstract:
In the last few years, the number of sensors and data collection systems available to a mapping agency has grown considerably. In the field, in addition to total stations measuring position, angles and distances, the surveyor can choose from hand-held GPS devices, multi-lens imaging systems or laser scanners, which may be integrated with a laptop or tablet to capture topographic data directly in the field. These systems are joined by mobile mapping solutions, mounted on large or small vehicles, or sometimes even on a backpack carried by a surveyor walking around a site. Such systems allow the raw data to be collected rapidly in the field, while the interpretation of the data can be performed back in the office at a later date. In the air, large format digital cameras and airborne lidar sensors are being augmented with oblique camera systems, taking multiple views at each camera position and being used to create more realistic 3D city models. Lower down in the atmosphere, Unmanned Aerial Vehicles (or Remotely Piloted Aircraft Systems) have suddenly become ubiquitous. Hundreds of small companies have sprung up, providing images from UAVs using ever more capable consumer cameras. It is now easy to buy a 42 megapixel camera off the shelf at the local camera shop, and Canon recently announced that they are developing a 250 megapixel sensor for the consumer market. While these sensors may not yet rival the metric cameras used by today’s photogrammetrists, the rapid developments in sensor technology could eventually lead to the commoditization of high-resolution camera systems. With data streaming in from so many sources, the main issue for a mapping agency is how to interpret, store and update the data in such a way as to enable the creation and maintenance of the end product. This might be a topographic map, ortho-image or a digital surface model today, but soon it is just as likely to be a 3D point cloud, textured 3D mesh, 3D city model, or Building Information Model (BIM) with all the data interpretation and modelling that entails. In this paper, we describe research/investigations into the developing technologies and outline the findings for a National Mapping Agency (NMA). We also look at the challenges that these new data collection systems will bring to an NMA, and suggest ways that we may work to meet these challenges and deliver the products desired by our users.
APA, Harvard, Vancouver, ISO, and other styles
47

Verdecia-Peña, Randy, and José I. Alonso. "A Two-Hop mmWave MIMO NR-Relay Nodes to Enhance the Average System Throughput and BER in Outdoor-to-Indoor Environments." Sensors 21, no. 4 (February 16, 2021): 1372. http://dx.doi.org/10.3390/s21041372.

Full text
Abstract:
Millimeter-Wave (mmWave) bands are receiving enormous attention in 5G mobile communications, due to the capability to provide a multi-gigabit transmission rate. In this paper, a two-hop architecture for 5G communications with the capacity to support high end-to-end performance due to the use of Relay Nodes (RNs) in mmWave-bands is presented. One of the novelties of the paper is the implementation of Amplify-and-Forward (A&F) and Decode-and-Forward (D&F) RNs along with a mmWave-band transceiver chain (Tx/Rx). In addition, two approaches for channel estimation were implemented at the D&F RN for decoding the backhaul link. One of them assumes complete knowledge of the channel (PCE), and the other one performs the channel estimation through Least Square (LS) estimator. A large number of simulations, using MATLABTM and SimulinkTM software, were performed to verify the potential benefits of the proposal two-hop 5G architecture in an outdoor-to-indoor scenario. The main novelty in performing these simulations is the use of signals with 5G features, as DL-SCH transport channel coding, PDSCH generation, and SS Burst generation, which is another of the main contributions of the paper. On the other hand, mmWave transmitter and receiver chains were designed and implemented with off-the shelf components. The simulations show that the two-hop network substantially improves the Key Performance Indicators (KPIs), Bit Error Rate (BER), and Throughput, in the communications between the logical 5G Radio Node (gNodeB), and the New Radio User Equipment (NR-UE). For example, a throughput improvement of 22 Mbps is obtained when a 4 × 4 × 2 MIMO D&F with LS architecture is used versus a SISO D&F with PCE architecture for Signal-to-Noise Ratio (SNR) = 20 dB and 64-QAM signal. This improvement reaches 96 Mbps if a 256-QAM signal is considered. The improvement in BER is 11 dB and 10.5 dB, respectively, for both cases. This work also shows that the obtained results with D&F RNs are better than with A&F RNs. For example, an improvement of 17 Mbps in the use of SISO D&F with LS vs. SISO A&F, for the 64-QAM signal is obtained. Besides, this paper constitutes a first step to the implementation of a mmWave MIMO 5G cooperative network platform.
APA, Harvard, Vancouver, ISO, and other styles
48

Giselvania, A., V. F. Jayalie, and S. Gondhowiardjo. "The Role of Multisectoral Collaboration in Indonesia for Successful Health Promotion." Journal of Global Oncology 4, Supplement 2 (October 1, 2018): 134s. http://dx.doi.org/10.1200/jgo.18.71100.

Full text
Abstract:
Background: Cancer had caused 14,067,900 people suffered in 2012. In Indonesia, with 357,000 cases, added by mortality and morbidity, cancer has added the country double burden of disease. Thus, preventive measure should be done to tackle the problem. One of the best ways is health promotion through the massive campaign and multisectoral collaboration using the momentum of annual World Cancer Day (WCD). Annual WCD has been held by National Cancer Control Committee (NCCC)-Ministry of Health (MoH), however, 2017 is the kick-off event which engages multisector to promote cancer awareness and knowledge. Aim: This campaign aims to increase awareness and knowledge about cancer (including the healthy lifestyle, detection program and treatment) among Indonesian. Strategy: The national action was planned based on the strategic objective of NCCC. The campaign was coordinated by NCCC-MoH of Indonesia and implemented throughout the country. The local situation, condition and creativity were encouraged to ensure the successful campaign. Program process: Initial coordination was made by NCCC. The proposal was disseminated to the centers across Indonesia. Then, centers would carry out the event and report to the NCCC. Meanwhile, a massive campaign in Jakarta was held by NCCC. Outcomes: There were 25 out of 34 provinces, consisted of 18 nongovernmental organizations (NGOs), 20 professional societies, 37 hospitals and 25 provincial public health service involved in the WCD campaign. This WCD was held under decree of Minister of Health. Several programs in the WCD were press briefing, seminars, talk show, fun campaign in public areas (i.e., celebrity performance, yoga), promotion via local television/newspaper and social media; early detection such as Papanicolaou test, mobile mammography, breast ultrasound, clinical breast examination and visual inspection of acetic acid. The impact of WCD 2017 was tremendous compared with previous year, with multisectoral involvement, overloaded participants and broke the World of Record Museum-Indonesia (MURI) with the most dancer involved dance for the cancer survivor. In addition, the impact can be seen in 2018, when no decree of the minister and national movement provided. In 2018, NCCC only organized a training of trainer with the hope of having an extension of the hand to deliver knowledge and awareness. Nevertheless, each part of Indonesia was commemorating their own WCD without any coordination. These evidence showed that NCCC had been successful to increase awareness and knowledge about cancer. What was learned: Many people were involved in the preparation, starting from doctors, local government, NGOs, hospitals, MoH, companies, survivors and celebrities. Moreover, social media campaign and celebrities played a great role in making this event succeed. Therefore, multisector collaboration is an essential part of raising awareness and knowledge about cancer.
APA, Harvard, Vancouver, ISO, and other styles
49

Nayyar, Anand, Pijush Kanti Dutta Pramankit, and Rajni Mohana. "Introduction to the Special Issue on Evolving IoT and Cyber-Physical Systems: Advancements, Applications, and Solutions." Scalable Computing: Practice and Experience 21, no. 3 (August 1, 2020): 347–48. http://dx.doi.org/10.12694/scpe.v21i3.1568.

Full text
Abstract:
Internet of Things (IoT) is regarded as a next-generation wave of Information Technology (IT) after the widespread emergence of the Internet and mobile communication technologies. IoT supports information exchange and networked interaction of appliances, vehicles and other objects, making sensing and actuation possible in a low-cost and smart manner. On the other hand, cyber-physical systems (CPS) are described as the engineered systems which are built upon the tight integration of the cyber entities (e.g., computation, communication, and control) and the physical things (natural and man-made systems governed by the laws of physics). The IoT and CPS are not isolated technologies. Rather it can be said that IoT is the base or enabling technology for CPS and CPS is considered as the grownup development of IoT, completing the IoT notion and vision. Both are merged into closed-loop, providing mechanisms for conceptualizing, and realizing all aspects of the networked composed systems that are monitored and controlled by computing algorithms and are tightly coupled among users and the Internet. That is, the hardware and the software entities are intertwined, and they typically function on different time and location-based scales. In fact, the linking between the cyber and the physical world is enabled by IoT (through sensors and actuators). CPS that includes traditional embedded and control systems are supposed to be transformed by the evolving and innovative methodologies and engineering of IoT. Several applications areas of IoT and CPS are smart building, smart transport, automated vehicles, smart cities, smart grid, smart manufacturing, smart agriculture, smart healthcare, smart supply chain and logistics, etc. Though CPS and IoT have significant overlaps, they differ in terms of engineering aspects. Engineering IoT systems revolves around the uniquely identifiable and internet-connected devices and embedded systems; whereas engineering CPS requires a strong emphasis on the relationship between computation aspects (complex software) and the physical entities (hardware). Engineering CPS is challenging because there is no defined and fixed boundary and relationship between the cyber and physical worlds. In CPS, diverse constituent parts are composed and collaborated together to create unified systems with global behaviour. These systems need to be ensured in terms of dependability, safety, security, efficiency, and adherence to real‐time constraints. Hence, designing CPS requires knowledge of multidisciplinary areas such as sensing technologies, distributed systems, pervasive and ubiquitous computing, real-time computing, computer networking, control theory, signal processing, embedded systems, etc. CPS, along with the continuous evolving IoT, has posed several challenges. For example, the enormous amount of data collected from the physical things makes it difficult for Big Data management and analytics that includes data normalization, data aggregation, data mining, pattern extraction and information visualization. Similarly, the future IoT and CPS need standardized abstraction and architecture that will allow modular designing and engineering of IoT and CPS in global and synergetic applications. Another challenging concern of IoT and CPS is the security and reliability of the components and systems. Although IoT and CPS have attracted the attention of the research communities and several ideas and solutions are proposed, there are still huge possibilities for innovative propositions to make IoT and CPS vision successful. The major challenges and research scopes include system design and implementation, computing and communication, system architecture and integration, application-based implementations, fault tolerance, designing efficient algorithms and protocols, availability and reliability, security and privacy, energy-efficiency and sustainability, etc. It is our great privilege to present Volume 21, Issue 3 of Scalable Computing: Practice and Experience. We had received 30 research papers and out of which 14 papers are selected for publication. The objective of this special issue is to explore and report recent advances and disseminate state-of-the-art research related to IoT, CPS and the enabling and associated technologies. The special issue will present new dimensions of research to researchers and industry professionals with regard to IoT and CPS. Vivek Kumar Prasad and Madhuri D Bhavsar in the paper titled "Monitoring and Prediction of SLA for IoT based Cloud described the mechanisms for monitoring by using the concept of reinforcement learning and prediction of the cloud resources, which forms the critical parts of cloud expertise in support of controlling and evolution of the IT resources and has been implemented using LSTM. The proper utilization of the resources will generate revenues to the provider and also increases the trust factor of the provider of cloud services. For experimental analysis, four parameters have been used i.e. CPU utilization, disk read/write throughput and memory utilization. Kasture et al. in the paper titled "Comparative Study of Speaker Recognition Techniques in IoT Devices for Text Independent Negative Recognition" compared the performance of features which are used in state of art speaker recognition models and analyse variants of Mel frequency cepstrum coefficients (MFCC) predominantly used in feature extraction which can be further incorporated and used in various smart devices. Mahesh Kumar Singh and Om Prakash Rishi in the paper titled "Event Driven Recommendation System for E-Commerce using Knowledge based Collaborative Filtering Technique" proposed a novel system that uses a knowledge base generated from knowledge graph to identify the domain knowledge of users, items, and relationships among these, knowledge graph is a labelled multidimensional directed graph that represents the relationship among the users and the items. The proposed approach uses about 100 percent of users' participation in the form of activities during navigation of the web site. Thus, the system expects under the users' interest that is beneficial for both seller and buyer. The proposed system is compared with baseline methods in area of recommendation system using three parameters: precision, recall and NDGA through online and offline evaluation studies with user data and it is observed that proposed system is better as compared to other baseline systems. Benbrahim et al. in the paper titled "Deep Convolutional Neural Network with TensorFlow and Keras to Classify Skin Cancer" proposed a novel classification model to classify skin tumours in images using Deep Learning methodology and the proposed system was tested on HAM10000 dataset comprising of 10,015 dermatoscopic images and the results observed that the proposed system is accurate in order of 94.06\% in validation set and 93.93\% in the test set. Devi B et al. in the paper titled "Deadlock Free Resource Management Technique for IoT-Based Post Disaster Recovery Systems" proposed a new class of techniques that do not perform stringent testing before allocating the resources but still ensure that the system is deadlock-free and the overhead is also minimal. The proposed technique suggests reserving a portion of the resources to ensure no deadlock would occur. The correctness of the technique is proved in the form of theorems. The average turnaround time is approximately 18\% lower for the proposed technique over Banker's algorithm and also an optimal overhead of O(m). Deep et al. in the paper titled "Access Management of User and Cyber-Physical Device in DBAAS According to Indian IT Laws Using Blockchain" proposed a novel blockchain solution to track the activities of employees managing cloud. Employee authentication and authorization are managed through the blockchain server. User authentication related data is stored in blockchain. The proposed work assists cloud companies to have better control over their employee's activities, thus help in preventing insider attack on User and Cyber-Physical Devices. Sumit Kumar and Jaspreet Singh in paper titled "Internet of Vehicles (IoV) over VANETS: Smart and Secure Communication using IoT" highlighted a detailed description of Internet of Vehicles (IoV) with current applications, architectures, communication technologies, routing protocols and different issues. The researchers also elaborated research challenges and trade-off between security and privacy in area of IoV. Deore et al. in the paper titled "A New Approach for Navigation and Traffic Signs Indication Using Map Integrated Augmented Reality for Self-Driving Cars" proposed a new approach to supplement the technology used in self-driving cards for perception. The proposed approach uses Augmented Reality to create and augment artificial objects of navigational signs and traffic signals based on vehicles location to reality. This approach help navigate the vehicle even if the road infrastructure does not have very good sign indications and marking. The approach was tested locally by creating a local navigational system and a smartphone based augmented reality app. The approach performed better than the conventional method as the objects were clearer in the frame which made it each for the object detection to detect them. Bhardwaj et al. in the paper titled "A Framework to Systematically Analyse the Trustworthiness of Nodes for Securing IoV Interactions" performed literature on IoV and Trust and proposed a Hybrid Trust model that seperates the malicious and trusted nodes to secure the interaction of vehicle in IoV. To test the model, simulation was conducted on varied threshold values. And results observed that PDR of trusted node is 0.63 which is higher as compared to PDR of malicious node which is 0.15. And on the basis of PDR, number of available hops and Trust Dynamics the malicious nodes are identified and discarded. Saniya Zahoor and Roohie Naaz Mir in the paper titled "A Parallelization Based Data Management Framework for Pervasive IoT Applications" highlighted the recent studies and related information in data management for pervasive IoT applications having limited resources. The paper also proposes a parallelization-based data management framework for resource-constrained pervasive applications of IoT. The comparison of the proposed framework is done with the sequential approach through simulations and empirical data analysis. The results show an improvement in energy, processing, and storage requirements for the processing of data on the IoT device in the proposed framework as compared to the sequential approach. Patel et al. in the paper titled "Performance Analysis of Video ON-Demand and Live Video Streaming Using Cloud Based Services" presented a review of video analysis over the LVS \& VoDS video application. The researchers compared different messaging brokers which helps to deliver each frame in a distributed pipeline to analyze the impact on two message brokers for video analysis to achieve LVS & VoS using AWS elemental services. In addition, the researchers also analysed the Kafka configuration parameter for reliability on full-service-mode. Saniya Zahoor and Roohie Naaz Mir in the paper titled "Design and Modeling of Resource-Constrained IoT Based Body Area Networks" presented the design and modeling of a resource-constrained BAN System and also discussed the various scenarios of BAN in context of resource constraints. The Researchers also proposed an Advanced Edge Clustering (AEC) approach to manage the resources such as energy, storage, and processing of BAN devices while performing real-time data capture of critical health parameters and detection of abnormal patterns. The comparison of the AEC approach is done with the Stable Election Protocol (SEP) through simulations and empirical data analysis. The results show an improvement in energy, processing time and storage requirements for the processing of data on BAN devices in AEC as compared to SEP. Neelam Saleem Khan and Mohammad Ahsan Chishti in the paper titled "Security Challenges in Fog and IoT, Blockchain Technology and Cell Tree Solutions: A Review" outlined major authentication issues in IoT, map their existing solutions and further tabulate Fog and IoT security loopholes. Furthermore, this paper presents Blockchain, a decentralized distributed technology as one of the solutions for authentication issues in IoT. In addition, the researchers discussed the strength of Blockchain technology, work done in this field, its adoption in COVID-19 fight and tabulate various challenges in Blockchain technology. The researchers also proposed Cell Tree architecture as another solution to address some of the security issues in IoT, outlined its advantages over Blockchain technology and tabulated some future course to stir some attempts in this area. Bhadwal et al. in the paper titled "A Machine Translation System from Hindi to Sanskrit Language Using Rule Based Approach" proposed a rule-based machine translation system to bridge the language barrier between Hindi and Sanskrit Language by converting any test in Hindi to Sanskrit. The results are produced in the form of two confusion matrices wherein a total of 50 random sentences and 100 tokens (Hindi words or phrases) were taken for system evaluation. The semantic evaluation of 100 tokens produce an accuracy of 94\% while the pragmatic analysis of 50 sentences produce an accuracy of around 86\%. Hence, the proposed system can be used to understand the whole translation process and can further be employed as a tool for learning as well as teaching. Further, this application can be embedded in local communication based assisting Internet of Things (IoT) devices like Alexa or Google Assistant. Anshu Kumar Dwivedi and A.K. Sharma in the paper titled "NEEF: A Novel Energy Efficient Fuzzy Logic Based Clustering Protocol for Wireless Sensor Network" proposed a a deterministic novel energy efficient fuzzy logic-based clustering protocol (NEEF) which considers primary and secondary factors in fuzzy logic system while selecting cluster heads. After selection of cluster heads, non-cluster head nodes use fuzzy logic for prudent selection of their cluster head for cluster formation. NEEF is simulated and compared with two recent state of the art protocols, namely SCHFTL and DFCR under two scenarios. Simulation results unveil better performance by balancing the load and improvement in terms of stability period, packets forwarded to the base station, improved average energy and extended lifetime.
APA, Harvard, Vancouver, ISO, and other styles
50

"4556760 Hand-off filter for cellular mobile radio." Telematics and Informatics 3, no. 2 (January 1986): X. http://dx.doi.org/10.1016/s0736-5853(86)80025-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography