Abstract: This paper considers the advent of 5G and the use of it in a Based Control System (BCS), posing as a basic concept the question of what the real differences and practical improvements are compared to 4G. To this purpose, a testbed hardware simulator has been designed and built where identical machines with the same sensors and management systems will communicate with different radio access network connections. This allows an objective statistical comparison of performance on the real functioning and improvement of the infrastructure with the Industrial Internet of Things (IIoT) connected to it.
Abstract: The research question of the article is to explore whether the dialogue meetings method could be relevant for reflective learning among researchers and practitioners when welfare technology should be implemented in municipalities, or not. A testbed was planned to be implemented in a retirement home in a Swedish municipality, and the practitioners worked with a pre-study of that testbed. In the article, the dialogue between the researchers and the practitioners in the dialogue meetings is described and analyzed. The potential of dialogue meetings as an arena for learning and reflection among researchers and practitioners is discussed. The research methodology approach is participatory action research with mixed methods (dialogue meetings, focus groups, participant observations). The main findings from the dialogue meetings were that the researchers learned more about the use of traditional research methods, and the practitioners learned more about how they could improve their use of the methods to facilitate change processes in their organization. These findings have the potential both for the researchers and the practitioners to result in more relevant use of research methods in change processes in organizations. It is concluded that dialogue meetings could be relevant for reflective learning among researchers and practitioners when welfare technology should be implemented in a health care organization.
Abstract: This paper addresses the reduction of peak to average
power ratio (PAPR) for the OFDM in Mobile-WiMAX physical layer
(PHY) standard. In the process, the best achievable PAPR of 0 dB is
found for the OFDM spectrum using phase modulation technique
which avoids the nonlinear distortion. The performance of the
WiMAX PHY standard is handled by the software defined radio
(SDR) prototype in which GNU Radio and USRP N210 employed as
software and hardware platforms respectively. It is also found that
BER performance is shown for different coding and different
modulation schemes. To empathize wireless propagation in specific
environments, a sliding correlator wireless channel sounding system
is designed by using SDR testbed.
Abstract: It is well known that the channel capacity of Multiple-
Input-Multiple-Output (MIMO) system increases as the number of
antenna pairs between transmitter and receiver increases but it suffers
from multiple expensive RF chains. To reduce the cost of RF chains,
Antenna Selection (AS) method can offer a good tradeoff between
expense and performance. In a transmitting AS system, Channel
State Information (CSI) feedback is necessarily required to choose
the best subset of antennas in which the effects of delays and errors
occurred in feedback channels are the most dominant factors
degrading the performance of the AS method. This paper presents the
concept of AS method using CSI from channel reciprocity instead of
feedback method. Reciprocity technique can easily archive CSI by
utilizing a reverse channel where the forward and reverse channels
are symmetrically considered in time, frequency and location. In this
work, the capacity performance of MIMO system when using AS
method at transmitter with reciprocity channels is investigated by
own developing Testbed. The obtained results show that reciprocity
technique offers capacity close to a system with a perfect CSI and
gains a higher capacity than a system without AS method from 0.9 to
2.2 bps/Hz at SNR 10 dB.
Abstract: The occurrence of missing values in database is a serious problem for Data Mining tasks, responsible for degrading data quality and accuracy of analyses. In this context, the area has shown a lack of standardization for experiments to treat missing values, introducing difficulties to the evaluation process among different researches due to the absence in the use of common parameters. This paper proposes a testbed intended to facilitate the experiments implementation and provide unbiased parameters using available datasets and suited performance metrics in order to optimize the evaluation and comparison between the state of art missing values treatments.
Abstract: Pattern recognition and image recognition methods are commonly developed and tested using testbeds, which contain known responses to a query set. Until now, testbeds available for image analysis and content-based image retrieval (CBIR) have been scarce and small-scale. Here we present the one million images CEA-List Image Collection (CLIC) testbed that we have produced, and report on our use of this testbed to evaluate image analysis merging techniques. This testbed will soon be made publicly available through the EU MUSCLE Network of Excellence.
Abstract: In the project FleGSens, a wireless sensor network
(WSN) for the surveillance of critical areas and properties is currently developed which incorporates mechanisms to ensure information
security. The intended prototype consists of 200 sensor nodes for
monitoring a 500m long land strip. The system is focused on ensuring
integrity and authenticity of generated alarms and availability in the
presence of an attacker who may even compromise a limited number
of sensor nodes. In this paper, two of the main protocols developed
in the project are presented, a tracking protocol to provide secure
detection of trespasses within the monitored area and a protocol for secure detection of node failures. Simulation results of networks
containing 200 and 2000 nodes as well as the results of the first prototype comprising a network of 16 nodes are presented. The focus of the simulations and prototype are functional testing of the protocols
and particularly demonstrating the impact and cost of several attacks.