Skip to main content
The paper describes an approximate model built from real sub-system performance data, of a public wireless network (3G / LTE) in view of minimum net energy consumption or minimum emissions per time unit and per user. This approach is... more
The paper describes an approximate model built from real sub-system performance data, of a public wireless network (3G / LTE) in view of minimum net energy consumption or minimum emissions per time unit and per user. This approach is justified in order to generate the integrated view required for “green” optimizations, while taking into account service demand and operations While subsystems with lower native energy footprints are being migrated into public networks, the many adaptation mechanisms at sub-system, protocol and management levels make system complexity too high to design major comprehensive “green” trade-offs. However, by focusing on the incremental effects of a new network user, the approximate model allows marginal effects to be estimated with good accuracy. This capability allows for the provisioning of personalized energy emissions reducing tariffs to end users with inherent advantages both to operators, energy suppliers and users. One key advantage is the possibility to reduce waste capacity, and thus energy consumption in the network, by allowing the user to specify just the service capacity and demands he/she has. The computational implementations exist at different levels: Static non-linear, non-linear with average traffic intensities, randomized over users by Monte-Carlo simulation, and determination of energy /emissions levels by value at risk. From an engineering point of view, the incremental model allows to tune sub-system characteristics jointly, especially transceivers, transmission and storage. From a configuration point of view, the model allows to determine which nodes in the network benefit most from back-up and renewable power sources. From a business perspective, the model allows to determine trade-offs between personalized bundle characteristics and the energy cost share in the marginal operating expense share. Detailed sub-system model and design improvements are carried out on a continuous basis in collaboration with industry.
While several paths have emerged in microelectronics and computing as follow-ons to Turing architectures, and have been implemented using essentially silicon circuits, very little beyond Moore research has considered: (1) first biological... more
While several paths have emerged in microelectronics and computing as follow-ons to Turing architectures, and have been implemented using essentially silicon circuits, very little beyond Moore research has considered: (1) first biological processes instead of sequential instructions, and, (2) the implementation of these processes exploiting particle physics interactions. This last combination enables native spatial-temporal integration and correlation, but also powerful interference filtering, gating, splitting and more. These biological functions, their realization by quantum and charge carrier interactions, allow proposing a novel computing architecture, with interfaces, information storage, and programmability. The paper presents the underlying biological processes, the particle physics phenomena which are exploited, and the proposed architecture, as well as an algebraic design formalism.
Internet: www.erim.eur.nl Bibliographic data and classifications of all the ERIM reports are also available on the ERIM website: www.erim.eur.nl
Sensor fusion42–44 consists in combining several physical or measurement principles, in order to achieve lower false alarm and nondetection rates in the area of testing. The tremendous importance of this new approach in electronics stems... more
Sensor fusion42–44 consists in combining several physical or measurement principles, in order to achieve lower false alarm and nondetection rates in the area of testing. The tremendous importance of this new approach in electronics stems from the fact that, so far, visual inspection and electrical testing have been kept separate, hence the term “integrated testing” (Figure 46). Two cases will be discussed—precap silicon IC and GaAs IC testing.
Finite learning sample size problems in pattern recognition. LF PAU 1978. Major problems and solutions relating finite learning sample constraints to the design of a statistical pattern classifier are surveyed. These problems are ...
Abstract This paper studies in theory, and gives a solution to, the following concerns: (1) obtain alternative classification decisions, ranked by some decreasing order of class membership probabilities; (2) imperfect teacher at the... more
Abstract This paper studies in theory, and gives a solution to, the following concerns: (1) obtain alternative classification decisions, ranked by some decreasing order of class membership probabilities; (2) imperfect teacher at the learning stage, or effect of labelling errors due to unsupervised learning; (3) non-cooperative teacher manipulating the a-priori class probabilities; (4) unknown a-priori class probabilities. This is carried out by considering a game between the recognition system and the teacher, in a game theoretical framework. Both players will ultimately select “mixed strategies” which are probability distributions over the set of N pattern classes. Within the context of signal classification, these N classes are N alternate signal classes e.g., sources, modelled by autoregressive processes. This approach, and the concerns (1)–(4) are especially relevant for the performance enhancement of a number of acoustic signal classification systems (e.g., seismic exploration, intrusion detection, sonar).
This paper gives the implementation architecture for a multilevel knowledge representation scheme, aimed at sensor fusion of 3-dimensional scenes. PROLOG procedures are given for the extraction of edge, vertex, and region attributes of... more
This paper gives the implementation architecture for a multilevel knowledge representation scheme, aimed at sensor fusion of 3-dimensional scenes. PROLOG procedures are given for the extraction of edge, vertex, and region attributes of the corresponding software objects, from each sensor. Sensor-fusion is carried out by a truth maintenance procedure operating a classification of all objects into non-contradicting scene contexts. Context filtering gives the attributes of the sensor fusion region objects, which themselves are used in scripts for later scene evaluation. Implementation considerations are discussed in relation to an object oriented PROLOG environment. This architecture is being used in target classification, vision, mapping, threat assessment and change of activity [12,13]
ABSTRACT In this paper we consider an M/G/1 queue-based analytical model. The end-to-end performance of a tandem wireless router network with batch arrivals is optimized. The mean of the transmission delay (or 'response... more
ABSTRACT In this paper we consider an M/G/1 queue-based analytical model. The end-to-end performance of a tandem wireless router network with batch arrivals is optimized. The mean of the transmission delay (or 'response time') is minimized subject to an upper limit on the rate of losses and finite capacity queueing and recovery buffers. The optimal ratio of arrival-buffer size to recovery-buffer size is determined, which is a critical quantity, affecting both loss rate and transmission time. The impact of the retransmission probability is investigated: too high a value leads to congestion and so higher response times, too low and packets are lost forever, yielding a different penalty
Efficient image processing relies to a great extent upon the choice of data structures and knowledge representations which allow for a minimization of data transfer overheads and for the search of pointer or attribute lengths.
Publisher Summary This chapter discusses the applications of pattern recognition in failure diagnosis and quality control and defines the technical diagnostics as the field dealing with all methods, processes, devices and systems whereby... more
Publisher Summary This chapter discusses the applications of pattern recognition in failure diagnosis and quality control and defines the technical diagnostics as the field dealing with all methods, processes, devices and systems whereby one can detect, localize, analyse and monitor failure modes of a system—that is, defects and degradations. Failure diagnosis has itself evolved from the utilization of stand-alone tools (for example, calibers), to heuristic procedures, later codified into maintenance manuals. At a later stage, automatic test systems and nondestructive testing instruments, based on specific test sequences and sensors, have assisted the diagnosis. Examples discussed are: rotating machine vibration monitoring, signature analysis, optical flaw detection, ultrasonics, ferrography, wear sensors, process parameters, and thermography. There has been implementations and research on evolved diagnostic processes, with heavier emphasis on sensor integration, signal/image processing, software and communications. Research is carried out on automated failure diagnosis, and on expert systems to accumulate and structure failure symptoms and diagnostic strategies. The chapter discusses the basic concepts in technical diagnostics, some of the measurement problems, and the basic diagnostic strategies.
While you refuel for gas, why not refuel for information or upload vehicle data, using a cheap wireless technology as WiFi? This paper analyzes in extensive detail the user segmentation by vehicle usage, service offering, and full... more
While you refuel for gas, why not refuel for information or upload vehicle data, using a cheap wireless technology as WiFi? This paper analyzes in extensive detail the user segmentation by vehicle usage, service offering, and full business models from WiFi hot spot services delivered to and from vehicles (private, professional, public) around gas stations. Are also analyzed the parties which play a role in such services: authorization, provisioning and delivery, with all the dependencies modelled by attributed digraphs. Account is made of WiFi base station technical capabilities and costs. Five year financial models (CAPEX, OPEX), and data pertain to two possible service suppliers: multi-service oil companies, and mobile service operators (or MVNOs). Model optimization on the return-on-investment (R.O.I.) is carried out for different deployment scenarios, geographical coverage assumptions, as well as tariff structures. Comparison is also being made with public GPRS and 3G data servi...
As 3G, HSPDA and already now LTE wireless networks become ever more pervasive, especially for wireless high data rate and Internet traffic (>100 Mbps), increasing focus is given on ways to offload access by re-utilizing WiFi access... more
As 3G, HSPDA and already now LTE wireless networks become ever more pervasive, especially for wireless high data rate and Internet traffic (>100 Mbps), increasing focus is given on ways to offload access by re-utilizing WiFi access points available in-doors (offices, homes), or installing such access points outdoors in/alongside high demand density public areas (hot spots, public areas, road traffic lanes, etc..). In view of the relative much higher WiFi access node power consumption and much smaller coverage compatible with interference reduction, the WiFi off-loading access may have a significant negative impact on energy consumption and emissions per user. The paper builds on earlier extensive work on the modeling of 3G or LTE wireless infrastructure energy consumption on an incremental basis per new user. It addresses the questions of the best mix between LTE cellular base stations and WiFi off-load access nodes from the energy/emissions perspective. Detailed sub-system model...
ERIM Report Series reference number ERS-2008-011-LIS Publication March 2008 Number of pages 8 Persistent paper URL http://hdl.handle.net/1765/11762 Email address corresponding author lpau@rsm.nl Address Erasmus Research Institute of... more
ERIM Report Series reference number ERS-2008-011-LIS Publication March 2008 Number of pages 8 Persistent paper URL http://hdl.handle.net/1765/11762 Email address corresponding author lpau@rsm.nl Address Erasmus Research Institute of Management (ERIM) RSM ...
This paper introduces individual tariffs at service and content bundle level in mobile communications. It gives a theoretical framework (economic, sociological) as well as a computational game solution method. The user can be an... more
This paper introduces individual tariffs at service and content bundle level in mobile communications. It gives a theoretical framework (economic, sociological) as well as a computational game solution method. The user can be an individual or a community. Individual tariffs are decided through interactions between the user and the supplier. A numerical example from mobile music illustrates the concepts.
This work gives an analytical business model comparison of the Internet IPv4 and IPv6 protocols, focusing on the business implications of intrinsic technical properties of these protocols .The technical properties modeled in business... more
This work gives an analytical business model comparison of the Internet IPv4 and IPv6 protocols, focusing on the business implications of intrinsic technical properties of these protocols .The technical properties modeled in business terms are: address space, payload, autoconfiguration, IP mobility, security, and flow label. Three operational cash flow focused performance indexes are defined for respectively an Internet operator or ISP, for the address domain owner, and for the end user. Special considerations are made and modeling changes for mobile Internet traffic. The effects of technical innovation in the Internet services and protocols are taken into account, as are special considerations for N.A.T. and content owners. A numerical case is provided which mimics the current state of the Internet network and services, and around which sensitivity analysis can be carried out, or such that additional service models can be added. It establishes in the case the relative advantages or...
This paper analyzes and reviews the rapid transformation of Russian telecommunications and Internet operators over the past 20 years, from small town phone service suppliers, to top-5 global players. The approach taken is a dynamic... more
This paper analyzes and reviews the rapid transformation of Russian telecommunications and Internet operators over the past 20 years, from small town phone service suppliers, to top-5 global players. The approach taken is a dynamic eco-systems oriented analysis of the past 20 years evolution, to identify disruptive strategy changes , and to assess their weight compared to a regulation based process in countries or regions having achieved a high economic impact of their telecommunications sector. The identification of the key disruptive changes allows studying stages in the evolution. In turn, the strategy dynamics driving the key players is mapped out. The comparative analysis identifies what Russia has done in a distinctively different way to major telecommunications and Internet countries, or not at all. On that basis, perspectives for the Russian telecommunications and Internet eco-system are elaborated. Such a study has implications on both the entrepreneurial approach and the regulatory approach in telecommunications and related industries.
This paper links communications and media usage to social and household economics boundaries. It highlights that in present day society , communications and media are a necessity, but not always affordable , and that they furthermore open... more
This paper links communications and media usage to social and household economics boundaries. It highlights that in present day society , communications and media are a necessity, but not always affordable , and that they furthermore open up for addictive behaviours which raise additional financial and social risks .A simple and efficient methodology compatible with state-of-the-art social and communications business
Various types of microscopes are used in microelectronics. These differ in the illumination fields used (vertical, oblique, darkfield, interferential, differential), light sources, iris and diaphragms, and filters (see Tables 6 and 7).
Based on the analogy between the events ``component failed'' (in reliability) and ``measurement out of tolerances'' (in quality control) acceptance sampling by variables is investigated when using the measurements made at... more
Based on the analogy between the events ``component failed'' (in reliability) and ``measurement out of tolerances'' (in quality control) acceptance sampling by variables is investigated when using the measurements made at several check-points for each device to be tested. The joint use of the fault-tree approach (especially in terms of min-cuts and min-paths) and of finite-sample hypothesis testing, leads to estimates of consumer and producer risks of a quality control procedure taking into account the internal design (functional diagram) of each device. As an example, a tuneable frequency multiplier is fully treated.
Abstract. This paper summarizes key attributes and the uniqueness of smart business networks [1], to propose thereafter operational implementation architecture. It involves, amongst others, the embedding of business logic specific to a... more
Abstract. This paper summarizes key attributes and the uniqueness of smart business networks [1], to propose thereafter operational implementation architecture. It involves, amongst others, the embedding of business logic specific to a network of business partners, inside the communications control networks. It also involves the definition of business protocols between these partners and the joint management of some common functions relying on open networking standards. This implies some key paradigm changes, both of a technical and of a business nature, which are offered here for discussion via a set of propositions. Ultimately, smart business networks reshuffle the very notion of linear life cycles in software systems development, to replace it with asynchronous interaction protocols between parties to the development. Keywords: Smart business networks, Business protocols, Architecture, Communications networks, Signalling
In this chapter, we will be dealing with systems, all initially at the same design, manufacturing, quality control and operating standards. For each set of operating conditions, technical specifications describe the expected performance... more
In this chapter, we will be dealing with systems, all initially at the same design, manufacturing, quality control and operating standards. For each set of operating conditions, technical specifications describe the expected performance and characteristics of these systems, all of which cannot, in general, be quantified. After having introduced a number of basic concepts in failure analysis and diagnosis, the relation to pattern recognition will be explained.
This paper presents an object-oriented environment VPP, which generates and validates Prolog code from a visual representation of labelled directed graphs. Conversely, Prolog code can be represented graphically and edited visually, The... more
This paper presents an object-oriented environment VPP, which generates and validates Prolog code from a visual representation of labelled directed graphs. Conversely, Prolog code can be represented graphically and edited visually, The main applications are for knowledge acquisition/reverse engineering, and target system code generation and configuration.
: This report summarizes the major progress made during the support of NATO Research Grant 1639--On Hybrid Approaches to Pattern Recognition; Automatic Inspection by Lots in the Presence of Classification Errors; and Visual Screening of... more
: This report summarizes the major progress made during the support of NATO Research Grant 1639--On Hybrid Approaches to Pattern Recognition; Automatic Inspection by Lots in the Presence of Classification Errors; and Visual Screening of Integrated Circuits for Metallization Faults by Pattern Analysis Methods.
The communications systems, terminals , software and deployment service, industries ,have undergone the past ten years a significant technological internal evolution and external revolution at customer end (such as Internet ,Mobile... more
The communications systems, terminals , software and deployment service, industries ,have undergone the past ten years a significant technological internal evolution and external revolution at customer end (such as Internet ,Mobile networks and terminals, Broadband,..). Very little management research has studied their financial survivability irrespective of changes in demand volumes in the present technological /organizational cycle . This paper analyzes the implications of genuine open mandated communications standards ,of higher product volumes , of very high R&D , of the larger use of sourced /purchased technologies ,and of contract manufacturing . The methodology used is equilibrium analyses . Two specific areas will be mentioned as examples .The paper also shows how eventually those industries in a later cycle will bounce back .
This paper is concerned with the specification to be given to an automatic test system (ATS) (test frequency distribution, ATS reliability, false alarm rate), in order to interact with the monitored system's reliability and the... more
This paper is concerned with the specification to be given to an automatic test system (ATS) (test frequency distribution, ATS reliability, false alarm rate), in order to interact with the monitored system's reliability and the maintenance policy. A decision rule is introduced to select between unscheduled repair or overhaul in order to minimize the maintenance costs per unit operational time. This decision rule is derived from a Markov model. Results have been applied to the case of an airborne equipment, and to a computer controlled telecommunications equipment.
Network “reliability”, more properly specified via its availability (percentage of time the network is available to its users) and its integrity (probability that data transmitted is not lost or damaged), is essential for all users.... more
Network “reliability”, more properly specified via its availability (percentage of time the network is available to its users) and its integrity (probability that data transmitted is not lost or damaged), is essential for all users. Moreover one should never forget that the “reliability” performance may, under some distributed applications, be more important than the general network capabilities.
Page 1. knowledge for an expert system. Proceedings of the 1986 IEEE Computer Society Workshop on Visual Languages, pages 167-178, Dallas, TX, June. Musen, MA, Fagan, LM, Combs, DM, and Shortliffe, EH, (1987). Use ...
Much research is currently going on about the processing of one or two-camera imagery, possibly combined with other sensors and actuators, in view of achieving attentive vision, i.e. processing selectively some parts of a scene possibly... more
Much research is currently going on about the processing of one or two-camera imagery, possibly combined with other sensors and actuators, in view of achieving attentive vision, i.e. processing selectively some parts of a scene possibly with another resolution. Attentive vision in turn is an element of active vision where the outcome of the image processing triggers changes in the image acquisition geometry and/or of the environment. Almost all this research is assuming classical imaging, scanning and conversion geometries, such as raster based scanning and processing of several digitized outputs on separate image processing units. A consortium of industrial companies comprising Digital Equipment Europe, Thomson CSF, and a few others, have taken a more radical view of this. To meet active vision requirements in industry, an intelligent camera is being designed and built, comprised of three basic elements: – a unique Thomson CSF CCD sensor architecture with random addressing – the DE...

And 98 more