Detecting and Diagnosing Anomalous Behavior in Large Systems with Change Detection Algorithms

Large telecommunications networks are designed to achieve high reliability with hardware and software redundancy that is managed through complex fault-tolerant mechanisms for error detection and recovery. Because of the fault-tolerant mechanisms, when errors do occur they do not always cause failures and, hence, it can be difficult to detect anomalous ...

Enabling Safe Wireless Harbor Automation via 5G URLLC

Automated Rubber-Tyred Gantry cranes, AutoRTGs, are in many cases replacing manually operated cranes in day-to-day operations at harbor container terminals. The automated systems provide significant benefits by improving operational efficiency and predictability as well as enabling safer working environment. The crane operations are remotely controlled or automatic under supervision of ...

Impact of Bandwidth Part (BWP) Switching on 5G NR System Performance

Bandwidth Parts (BWPs) is a 5G NR feature introduced in 3GPP Release 15 for dynamically adapting the carrier bandwidth and numerology in which a UE operates. BWP allows supporting multiple services per carrier, e.g. eMBB and mMTC. Although BWP enables higher spectrum flexibility and power savings, the effect of delays ...

Enhanced Resource Scheduling for Platooning in 5G V2X Systems

Vehicular platooning with short inter-vehicular distances promises to achieve better road traffic efficiency and high fuel savings. Manoeuvring and maintaining such Platoons is very challenging and requires mutual awareness and coordination between the vehicles through a highly reliable and low latency communication mechanism. Thus, cellular vehicle-to-vehicle communication is a key ...

Nicotine dependence among adolescents in the European Union: How many and who are affected?

© The Author(s) 2018. Published by Oxford University Press on behalf of Faculty of Public Health. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com. BACKGROUND: Nicotine dependence during adolescence increases the risk of continuing smoking into adulthood. The magnitude of nicotine dependence among adolescents in the European Union (EU) has ...

Stratification of 5G evolution and Beyond 5G

The next decade will bring exciting transformation in physical, digital and digital twin worlds and, while requirements and use cases for the era Beyond 5G (B5G) are not fully clear at this time, an attempt at stratification of 5G evolution and B5G has been developed. Such stratification i.e., decomposition into ...

Silicon Nitride Bragg Grating with Joule Thermal Tuning for External Cavity Lasers

The paper presents a fabrication platform based on silicon nitride embedded in silica on silicon wafers. Long Bragg gratings have been fabricated for narrow linewidth lasers. A narrow stop-band (0.2 nm) Bragg gratings with etched facet chips is achieved in this platform. Heaters have been integrated on the chips allowing ...

1.2Tbit/s Single Channel and 45Tbit/s WDM Field Transmission

We demonstrate the first field fiber transmission experiment with channel rates >1 Tbit/s field-deployed production network of Etisalat. Full C-Band transmission with only 40 channels is demonstrated over 93 km SSMF using EDFAs only. After FEC decoding a record net capacity of 45 Tbit/s was achieved.

16384-QAM TRANSMISSION AT 10 GBD OVER 25-KM SSMF USING POLARIZATION-MULTIPLEXED PROBABILISTIC CONSTELLATION SHAPING

We demonstrate the transmission of 10-GBd polarization-multiplexed probabilistically shaped 16384-ary quadrature amplitude modulation (16384-QAM) over 25.5-km standard single mode fiber (SSMF), with a net single-carrier bit rate of 223.8 Gb/s carrying 22.3 information bits/symbol/2-pol.

5G New Radio User Equipment Power Modelling and Potential Energy Savings

Currently the 3rd generation partnership project (3GPP) is studying how user equipment power saving can be achieved for the upcoming fifth generation New Radio technology. To accomplish this objective a power model has been developed for evaluation of schemes related to Radio Resource Control (RRC) Connected mode, Radio Resource Management, ...

Transparent Remote Connectivity to Bluetooth Low Energy Devices

The evolution of the Internet of Things (IoT) has increased our needs for secure and transparent inter-connectivity between heterogeneous networks. We expect everything to be connected regardless of the access technology. However, an important part of the IoT consists of the short-range wireless communication technologies such as Bluetooth or ZigBee. ...

An early characterisation of wearing variability on motion signals for wearables

We explore a new variability observed in motion signals acquired from modern wearables. Wearing variability refers to the variations of the device orientation and placement across wearing events. We collect the accelerometer data on a smartwatch and an earbud and analyse how motion signals change due to the wearing variability. ...

Unsupervised Domain Adaptation for Design of Robust Sensory Systems

Despite significant advances in the performance of sensory inference models, their poor robustness to changing environmental conditions and hardware remains a major hurdle for widespread adoption. In this paper, we introduce the concept of unsupervised domain adaptation which is a technique to adapt sensory inference models to new domains only ...

The city as a personal assistant

Publication rights licensed to ACM. Conversational agents are increasingly becoming digital partners in our everyday computational experiences. Although rich, and fresh in content, they are oblivious to users? locality beyond geospatial weather and traffic conditions. We introduce conversational agents that are hyper-local, embedded deeply into the urban infrastructure providing rich, ...

WellComP 2019: Second international workshop on computing for well-being

Publication rights licensed to ACM. With the advancements in ubiquitous computing, ubicomp technology has deeply spread into our daily lives, including office work, home and house-keeping, health management, transportation, or even urban living environments. Furthermore, beyond the initial metric of computing, such as ?efficiency? and ?productivity?, the benefits that people ...

Capturing Attentional Problems with Smart Eyewear

Emerging smart eyewear solutions offer new ways to present information. In addition, new technology provides an unobtrusive way to study human cognitive and attentional functions in real life. This combination presents a unique possibility to design more usable and intuitive interfaces and information visualizations for the users. Flexible and fluent ...

Degradable inference for energy autonomous vision applications

Publication rights licensed to ACM. Mobile vision systems, often battery-powered, are now incredibly powerful in capturing, analyzing, and understanding real-world events uncovering interminable opportunities for new applications in the areas of life-logging, cognitive augmentation, security, safety, wildlife surveillance, etc. There are two complementary challenges in the design of a mobile ...

222-GBAUD ON-OFF KEYING TRANSMITTER USING ULTRA-HIGH-SPEED 2:1-SELECTOR AND PLASMONIC MODUATOR ON SILICON PHOTONICS

We demonstrate a 222-GBaud OOK optical transmitter for short-reach transmission, with direct detection after 120 m of standard single mode fiber. To reach this record symbol rate, we leverage a 2:1 digital multiplexing selector in InP DHBT and a plasmonic-organic hybrid (POH) modulator on silicon photonics.

Formation of protein networks between mucins: Molecular dynamics study based on the interaction energy of the system

Molecular dynamics simulations have been performed for a model aqueous solution of mucin. As mucin is a central part of lubricin, a key component of synovial fluid, we investigate its ability to form cross-linked networks. Such network formation could be of major importance for the viscoelastic properties of the soft-matter ...

OSAA: On-Demand Source Authentication and Authorization in the Internet

Lack of ability to control inbound traffic is one of the essential security vulnerabilities of the present Internet. It is the consequence of the fundamental fact that the Internet was built as a highly distributed public network, in which every node may freely send arbitrary traffic to any other node. ...