100,731 research outputs found
A Transfer Learning Approach for Cache-Enabled Wireless Networks
Locally caching contents at the network edge constitutes one of the most
disruptive approaches in G wireless networks. Reaping the benefits of edge
caching hinges on solving a myriad of challenges such as how, what and when to
strategically cache contents subject to storage constraints, traffic load,
unknown spatio-temporal traffic demands and data sparsity. Motivated by this,
we propose a novel transfer learning-based caching procedure carried out at
each small cell base station. This is done by exploiting the rich contextual
information (i.e., users' content viewing history, social ties, etc.) extracted
from device-to-device (D2D) interactions, referred to as source domain. This
prior information is incorporated in the so-called target domain where the goal
is to optimally cache strategic contents at the small cells as a function of
storage, estimated content popularity, traffic load and backhaul capacity. It
is shown that the proposed approach overcomes the notorious data sparsity and
cold-start problems, yielding significant gains in terms of users'
quality-of-experience (QoE) and backhaul offloading, with gains reaching up to
in a setting consisting of four small cell base stations.Comment: some small fixes in notatio
Rock falls impacting railway tracks. Detection analysis through an artificial intelligence camera prototype
During the last few years, several approaches have been proposed to improve early warning systems for managing geological risk
due to landslides, where important infrastructures (such as railways, highways, pipelines, and aqueducts) are exposed elements.
In this regard, an Artificial intelligence Camera Prototype (AiCP) for real-time monitoring has been integrated in a multisensor
monitoring system devoted to rock fall detection. An abandoned limestone quarry was chosen at Acuto (central Italy) as test-site
for verifying the reliability of the integratedmonitoring system. A portion of jointed rockmass, with dimensions suitable for optical
monitoring, was instrumented by extensometers. One meter of railway track was used as a target for fallen blocks and a weather
station was installed nearby. Main goals of the test were (i) evaluating the reliability of the AiCP and (ii) detecting rock blocks that
reach the railway track by the AiCP. At this aim, several experiments were carried out by throwing rock blocks over the railway
track. During these experiments, the AiCP detected the blocks and automatically transmitted an alarm signal
Neighbourhood-aware counter-based broadcast scheme for wireless ad hoc networks
Broadcasting is a vital operation in mobile ad hoc
networks (MANETs) and it is crucial to enhance its
efficiency to ensure successful deployment. Although
flooding is ideal for broadcast operations due to its
simplicity and high reachability it suffers from high
packet collision which can degrade network
performance severely. Counter-based broadcast
schemes have been introduced to alleviate the
limitations of flooding. This study introduces an
enhancement to counter-based broadcast by adjusting
the threshold value and the Random Assessment Delay
(RAD) using minimal neighbourhood information
Intrusion-aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks
Existing anomaly and intrusion detection schemes of wireless sensor networks
have mainly focused on the detection of intrusions. Once the intrusion is
detected, an alerts or claims will be generated. However, any unidentified
malicious nodes in the network could send faulty anomaly and intrusion claims
about the legitimate nodes to the other nodes. Verifying the validity of such
claims is a critical and challenging issue that is not considered in the
existing cooperative-based distributed anomaly and intrusion detection schemes
of wireless sensor networks. In this paper, we propose a validation algorithm
that addresses this problem. This algorithm utilizes the concept of
intrusion-aware reliability that helps to provide adequate reliability at a
modest communication cost. In this paper, we also provide a security resiliency
analysis of the proposed intrusion-aware alert validation algorithm.Comment: 19 pages, 7 figure
Using digital watermarking to enhance security in wireless medical image transmission
This is the published version of the article. Copyright 2010 Mary Ann Liebert Inc.During the last few years, wireless networks have been increasingly used both inside hospitals and in patientsâ homes to transmit medical information. In general, wireless networks suffer from decreased security. However, digital watermarking can be used to secure medical information. In this study, we focused on combining wireless transmission and digital watermarking technologies to better secure the transmission of medical images within and outside the hospital. Methods: We utilized an integrated system comprising the wireless network and the digital watermarking module to conduct a series of tests. Results: The test results were evaluated by medical consultants. They concluded that the images suffered no visible quality degradation and maintained their diagnostic integrity. Discussion: The proposed integrated system presented reasonable stability, and its performance was comparable to that of a fixed network. This system can enhance security during the transmission of medical images through a wireless channel.The General Secretariat for Research and Technology of the Hellenic Ministry of Development and the British Council
- âŠ