2016
Autores
Ferreira, A; Sinha, D;
Publicação
140th Audio Engineering Society International Convention 2016, AES 2016
Abstract
In recent years, tools in perceptual coding of high-quality audio have been tailored to capture highly detailed information regarding signal components so that they gained an intrinsic ability to represent audio parametrically. In a recent paper, we described a first validation model to such an approach applied to parametric coding of wideband speech. In this paper we describe specific advances to such an approach that improve coding efficiency and signal quality. A special focus is devoted to the fact that persistent transmission to the decoder of phase information is avoided, to the synthesis of both impulse-like and noise-based plosives using short-term windows, to improved ways of spectral envelope modelling, and to the fact that direct synthesis in the time-domain of the periodic content of speech is allowed in order to cope with fast F0 changes. A few examples of signal coding and transformation illustrate the impact of those improvements.
2016
Autores
Kandasamy, S; Marques, C; Calcada, T; Ricardo, M; Matos, R; Sargento, S;
Publicação
WIRELESS NETWORKS
Abstract
Interference is a fundamental issue in wireless mesh networks (WMNs) and it seriously affects the network performance. In this paper we characterize the power interference in IEEE 802.11 CSMA/CA based wireless mesh networks using directional antennas. A model based centralized call admission control (CAC) scheme is proposed which uses physical collision constraints, and transmitter-side, receiver-side and when-idle protocol collision prevention constraints. The CAC assists to manage requests from users depending on the available bandwidth in the network: when a new virtual link establishment request from a user is accepted into the network, resources such as interface, bandwidth, transmission power and channel are allocated in the participating nodes and released once the session is completed. The proposed CAC is also able to contain the interference in the WMN by managing the transmission power of nodes.
2016
Autores
Dias, J; Ribeiro, F; Campos, R; Ricardo, M; Martins, L; Gomes, F; Carrapatoso, A;
Publicação
2016 12TH ANNUAL CONFERENCE ON WIRELESS ON-DEMAND NETWORK SYSTEMS AND SERVICES (WONS)
Abstract
This paper describes the evaluation of a multi-hop wireless networking solution for Smart Grid metering in an industrial environment. The solution relies on RPL, 6LoWPAN, and IEEE 802.15.4g protocols, and has been implemented using low-power and low-capacity devices. Also, it supports both TCP and UDP protocols to transport traffic from DLMS/COSEM Smart Grid metering applications. The experimental tests took place in an industrial environment during 20 days. The obtained results allowed the characterization and evaluation of the developed solution and can be used as a basis to evaluate other 6LoWPAN/IEEE 802.15.4g networking solutions.
2016
Autores
Conceicao, S; Pendao, C; Moreira, A; Ricardo, M;
Publicação
2016 WIRELESS DAYS (WD)
Abstract
Wireless Underground Networks (WUN) have many applications, such as border surveillance, agriculture monitoring, and infrastructure monitoring. Recent studies have shown that they are feasible and have deployment advantages over wired networks, but only a few WUN evaluations in multiple access scenarios have been done. This paper presents a simulation study on medium access for a WUN with 4 nodes buried, and one node aboveground. The simulations were carried out using the ns-3 simulator and they evaluate both Wi-Fi, and Lr-Wpan networks for dry and wet soils. We verified that for the same number of concurrent nodes, the use of the RTS/CTS mechanism has a much higher influence than the soil water content. Furthermore, a study about the feasibility of using Wi-Fi fingerprinting for positioning above the ground based on the buried infrastructure revealed promising results.
2016
Autores
Dias, J; Sousa, F; Ribeiro, F; Campos, R; Ricardo, M;
Publicação
2016 12TH ANNUAL CONFERENCE ON WIRELESS ON-DEMAND NETWORK SYSTEMS AND SERVICES (WONS)
Abstract
The rise of the Internet of Things and the growth of the IP cameras market are making Wireless Video Sensor Networks (WVSNs) popular. In turn, Wi-Fi is becoming the enabling technology for WVSNs due to its flexibility, high bitrates provided and low cost; however, these networks suffer from three major problems: bad performance, throughput unfairness, and energy inefficiency. In order to address the lack of holistic solutions to solve these problems, we propose the FM-WiFIX+ solution. This solution uses FM radio as an out-of-band control channel to signal when a video sensor should turn its IEEE 802.11 interface OFF, thus saving energy. The results obtained with a proof-of-concept prototype show that for a network with 7 nodes the proposed solution can achieve gains of energy up to 48 %, while maintaining good levels of performance and throughput fairness.
2016
Autores
da Silva, PM; Dias, J; Ricardo, M;
Publicação
2016 IFIP NETWORKING CONFERENCE (IFIP NETWORKING) AND WORKSHOPS
Abstract
Peer-to-Peer networks are extensively used for largescale file sharing. As more information flows through these networks, people are becoming increasingly concerned about their privacy. Traditional P2P file sharing systems provide performance and scalability at the cost of requiring peers to publicly advertise what they download. Several P2P privacyenhancing systems have been proposed but they still require peers to advertise, either fully or partially, what they download. Lacking alternatives, users have adopted anonymity systems for P2P file sharing, misunderstanding the privacy guarantees provided by such systems, in particular when relaying traffic of insecure applications such as BitTorrent. Our goal is to prevent any malicious peer(s) from ascertaining users' content interests so that plausible deniability always applies. We propose a novel P2P file sharing model, Mistrustful P2P, that (1) supports file sharing over open and untrustworthy P2P networks, (2) requires no trust between users by avoiding the advertisement of what peers download or miss, and (3) still ensures deterministic protection of user's interests against attacks of size up to a configured privacy protection level. We hope that our model can pave the ground for a new generation of privacyenhancing systems that take advantage of the new possibilities it introduces. We validate Mistrustful P2P through simulation, and demonstrate its feasibility.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.