244 research outputs found
Bidirectional propagation method for analysis of reflection on radio networks
In this paper, our aim is to evaluate and analyze two propagation methods over mobile IPv6 networks which are bidirectional tunneling and routing optimization and both deliver a packet from a correspondent node to the mobile node and vice versa via specific tunnel. To this end we propose a mobile IPv6 scenario by including real-time applications such as video- conferencing. As a result of the evaluation, routing optimization method reduces end-to-end delay and packet delay variation because the number of packets experience tunneling is reduced by this method. This results in increasing network performance
Fog Computing for Detecting Vehicular Congestion, An Internet of Vehicles based Approach: A review
Vehicular congestion is directly impacting the efficiency of the transport
sector. A wireless sensor network for vehicular clients is used in Internet of
Vehicles based solutions for traffic management applications. It was found that
vehicular congestion detection by using Internet of Vehicles based connected
vehicles technology are practically feasible for congestion handling. It was
found that by using Fog Computing based principles in the vehicular wireless
sensor network, communication in the system can be improved to support larger
number of nodes without impacting performance. In this paper, connected
vehicles technology based vehicular congestion identification techniques are
studied. Computing paradigms that can be used for the vehicular network are
studied to develop a practically feasible vehicular congestion detection system
that performs accurately for a large coverage area and multiple scenarios. The
designed system is expected to detect congestion to meet traffic management
goals that are of primary importance in intelligent transportation systems
Personalized fall detection monitoring system based on learning from the user movements
Personalized fall detection system is shown to provide added and more
benefits compare to the current fall detection system. The personalized model
can also be applied to anything where one class of data is hard to gather. The
results show that adapting to the user needs, improve the overall accuracy of
the system. Future work includes detection of the smartphone on the user so
that the user can place the system anywhere on the body and make sure it
detects. Even though the accuracy is not 100% the proof of concept of
personalization can be used to achieve greater accuracy. The concept of
personalization used in this paper can also be extended to other research in
the medical field or where data is hard to come by for a particular class. More
research into the feature extraction and feature selection module should be
investigated. For the feature selection module, more research into selecting
features based on one class data
A Vector Matroid-Theoretic Approach in the Study of Structural Controllability Over F(z)
In this paper, the structural controllability of the systems over F(z) is
studied using a new mathematical method-matroids. Firstly, a vector matroid is
defined over F(z). Secondly, the full rank conditions of [sI-A|B] are derived
in terms of the concept related to matroid theory, such as rank, base and
union. Then the sufficient condition for the linear system and composite system
over F(z) to be structurally controllable is obtained. Finally, this paper
gives several examples to demonstrate that the married-theoretic approach is
simpler than other existing approaches
Modeling Based on Elman Wavelet Neural Network for Class-D Power Amplifiers
In Class-D Power Amplifiers (CDPAs), the power supply noise can intermodulate
with the input signal, manifesting into power-supply induced intermodulation
distortion (PS-IMD) and due to the memory effects of the system, there exist
asymmetries in the PS-IMDs. In this paper, a new behavioral modeling based on
the Elman Wavelet Neural Network (EWNN) is proposed to study the nonlinear
distortion of the CDPAs. In EWNN model, the Morlet wavelet functions are
employed as the activation function and there is a normalized operation in the
hidden layer, the modification of the scale factor and translation factor in
the wavelet functions are ignored to avoid the fluctuations of the error
curves. When there are 30 neurons in the hidden layer, to achieve the same
square sum error (SSE) , EWNN needs 31 iteration steps,
while the basic Elman neural network (BENN) model needs 86 steps. The
Volterra-Laguerre model has 605 parameters to be estimated but still can't
achieve the same magnitude accuracy of EWNN. Simulation results show that the
proposed approach of EWNN model has fewer parameters and higher accuracy than
the Volterra-Laguerre model and its convergence rate is much faster than the
BENN model
Effective supervision for enhancing quality of doctoral research in computer science and engineering
This article reflects on effective supervision and possible guidance for enhancing quality of doctoral research in the computer
science and engineering field. The aims of this study are (1) to understand supervision and the role of supervisors in the quality
of doctoral research, (2) to elaborate on effective supervision in the computer science and engineering field and challenges
in effective supervision, and (3) to identify key indicators for evaluating effective supervision with a view to improving the
quality of doctoral research. After studying various pieces of literature and conducting interviews with experienced supervisors
and doctoral students, the article concludes by describing important characteristics in effective supervision. Some of
the features for effective supervision are common to other areas of research; however, in computer science and engineering
and similar fields, it is important that a supervisor takes the role of a team member by giving proper advice on the reports,
algorithm and mathematical modeling developed in the research, and demonstrating the ability to provide advice on complex
problems with practical approaches.Open access funding provided by Malmö University. This work is supported by the Swedish Foundation for International Cooperation in Research and Higher Education (STINT) unde, the National Research Foundation (NRF) of South Africa, and partially by the Department of Computer Science and Media Technology at Malmö University in Sweden, and the Department of Electrical, Electronic and Computer Engineering, University of Pretoria in South Africa.https://www.springer.com/journal/42979am2024Electrical, Electronic and Computer EngineeringSDG-04:Quality Educatio
Measuring the similarity of PML documents with RFID-based sensors
The Electronic Product Code (EPC) Network is an important part of the
Internet of Things. The Physical Mark-Up Language (PML) is to represent and
de-scribe data related to objects in EPC Network. The PML documents of each
component to exchange data in EPC Network system are XML documents based on PML
Core schema. For managing theses huge amount of PML documents of tags captured
by Radio frequency identification (RFID) readers, it is inevitable to develop
the high-performance technol-ogy, such as filtering and integrating these tag
data. So in this paper, we propose an approach for meas-uring the similarity of
PML documents based on Bayesian Network of several sensors. With respect to the
features of PML, while measuring the similarity, we firstly reduce the
redundancy data except information of EPC. On the basis of this, the Bayesian
Network model derived from the structure of the PML documents being compared is
constructed.Comment: International Journal of Ad Hoc and Ubiquitous Computin
- …