Buscar
Mostrando ítems 191-200 de 234
Inductive loops for traffic control
(2015-09)
Inductive Loop Detectors (ILDs) are the most commonly used sensors in traffic management
systems. This work provides a system capable of obtaining simultaneous inductive
signatures of vehicles traveling on a roadway with ...
A fog computing based cyber-physical system for the automation of pipe-related tasks in the Industry 4.0 shipyard
(M D P I AG, 2018-06-17)
[Abstract] Pipes are one of the key elements in the construction of ships, which usually contain between 15,000 and 40,000 of them. This huge number, as well as the variety of processes that may be performed on a pipe, ...
Calculation of the Connected Dominating Set Considering Vertex Importance Metrics
(M D P I AG, 2018-01-28)
[Abstract] The computation of a set constituted by few vertices to define a virtual backbone supporting information interchange is a problem that arises in many areas when analysing networks of different natures, like ...
Hybrid Supervised-Unsupervised Channel Estimation Scheme with Dynamic Transmission of Pilots
(Springer, 2011-02)
[Abstract] Multiple-Input Multiple-Output (MIMO) digital communications standards typically include pilot symbols in the definition of the transmit signals with the purpose of acquiring the Channel State Information (CSI) ...
A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications
(M D P I AG, 2017-08-29)
[Abstract] Fog computing extends cloud computing to the edge of a network enabling new Internet of Things (IoT) applications and services, which may involve critical data that require privacy and security. In an IoT fog ...
A low-cost decision-aided channel estimation method for Alamouti OSTBC
(Springer, 2013-11)
[Abstract] In wireless communication systems, channel state information (CSI) acquisition is typically performed at the receiver side every time a new frame is received, without taking into account whether it is really ...
Towards Post-Quantum Blockchain: A Review on Blockchain Cryptography Resistant to Quantum Computing Attacks
(Institute of Electrical and Electronics Engineers, 2020-01-23)
[Abstract] Blockchain and other Distributed Ledger Technologies (DLTs) have evolved significantly in the last years and their use has been suggested for numerous applications due to their ability to provide transparency, ...
Towards the internet of smart clothing: a review on IoT wearables and garments for creating intelligent connected e-textiles
(M D P I AG, 2018-12-07)
[Abstract] Technology has become ubiquitous, it is all around us and is becoming part of us. Togetherwith the rise of the Internet of Things (IoT) paradigm and enabling technologies (e.g., Augmented Reality (AR), Cyber-Physical ...
Clock frequency Impact on the performance of high-security cryptographic cipher suites for energy-efficient resource-constrained IoT devices
(M D P I AG, 2018-12-20)
[Abstract] Modern Internet of Things (IoT) systems have to be able to provide high-security levels, but it is difficult to accommodate computationally-intensive cryptographic algorithms on the resource-constrained hardware ...
A Novel Strategy for Improving the Quality of Embedded Zerotree Wavelet Images Transmitted over Alamouti Coding Systems
(Springer, 2011)
[Abstract] This work deals with the transmission of images, previously coded using the Embedded Zerotree Wavelet (EZW) transform, over wireless systems in which
Space-Time Coding (STC) is used. It is shown how the system ...