IEEE 2002 International Conference on Communications, Circuits and Systems and West Sino Expositions
ABSTRACT The dramatic growth of the Internet traffic and corresponding specific IP service requir... more ABSTRACT The dramatic growth of the Internet traffic and corresponding specific IP service requirements motivate the Internet service providers, network equipment manufacturers, and researchers not only to focus on scalability and cost effectiveness of the next generation optical network architecture design, but also on the need to provide assured quality of service (QoS) for Internet applications. We address the issues of supporting the QoS in one alternative optical network called PetaWeb network, proposed by Nortel Networks. PetaWeb is based on the use of adaptive core and edge switches, which can accommodate traffic fluctuations through reconfiguration of channels periodically. In order to achieve end-to-end QoS over PetaWeb network, a QoS-aware edge node and QoS-aware channel allocation algorithm come in consideration. This increases the effective capacity of the network, reduces packet loss and packet delay, so satisfying the desired services. Simulations are also implemented to evaluate and verify the network QoS performance.
The expression of microRNA (miR)-21, miR-128, miR-155, and miR-181a involved in DNA damage respon... more The expression of microRNA (miR)-21, miR-128, miR-155, and miR-181a involved in DNA damage response (DDR) and tumor responsiveness to platinum was assessed by RT-qPCR in the plasma of patients with non-small cell lung cancer (NSCLC; n = 128) obtained prior to initiation of first-line platinum chemotherapy. U6 small nuclear RNA (snRNA) was used for normalization, and fold change of each miRNA expression relative to the expression in healthy controls was calculated by the 2−ΔΔCt method. MicroRNA expression levels were correlated with patients’ outcomes. Integrated function and pathway enrichment analysis was performed to identify putative target genes. MiR-128, miR-155, and miR-181a expressions were higher in patients compared to healthy donors. MiRNA expression was not associated with response to treatment. High miR-128 and miR-155 were correlated with shorter overall survival (OS), whereas performance status (PS) 2 and high miR-128 independently predicted for decreased OS. In the sq...
2009 IEEE International Conference on Communications
ABSTRACT The FCC has set apart a frequency band with the specific goal of improving safety and ef... more ABSTRACT The FCC has set apart a frequency band with the specific goal of improving safety and efficiency of the transportation system. Its purpose is to provide wireless communications between stations on the roadside and mobile radio units located on board of vehicles. The resulting technology is known as WAVE and is currently under development as draft standard IEEE 802.1 lp. The most time- critical messages, carrying urgent safety-related information, are transmitted over the so-called control channel (CCH). WAVE devices use the EDCA MAC protocol, defined in the 2007 version of the IEEE 802.11 standard, to compete for the transmission medium. This work analyzes the performance of EDCA under the specific conditions of the CCH of a WAVE environment. The protocol is modeled using Markov chains and results related to throughput, frame-error rate, buffer occupancy and delay are obtained under different traffic-load conditions.
IEEE Global Telecommunications Conference, 1989, and Exhibition. 'Communications Technology for the 1990s and Beyond
A maximum likelihood sequential decoder for the reception of digitally modulated signals with sin... more A maximum likelihood sequential decoder for the reception of digitally modulated signals with single or multiamplitude constellations transmitted over a multiplicative, nonselective fading channel is derived. It is shown that its structure consists of a combination of envelope, multiple differential, and coherent detectors. The outputs of each of these detectors are jointly processed by means of an algorithm. This algorithm
Proceedings of 3rd IEEE International Symposium on High Performance Distributed Computing, 2000
A. Burrell et al. (1993; 1994) described an implementation efficient capacity allocation protocol... more A. Burrell et al. (1993; 1994) described an implementation efficient capacity allocation protocol for multimedia traffic (voice, video, high and low speed data). The protocol determines the capacity allocation of each traffic dynamically, and induces moving boundaries within prespecified and fixed channel frames. The channel frames are selected to satisfy the jittering constraints of all the traffic, such as voice,
ABSTRACT The past decade has seen a dramatic increase in wideband wireless communication traffic.... more ABSTRACT The past decade has seen a dramatic increase in wideband wireless communication traffic. The arrival time of a traffic load cannot be assumed to have an exponential-type correlation function due to a long-term dependence in such traffic (see Adler, R., Feldman, R. and Taqqu, M., "A Practical Guide to Heavy Tails", Birkhauser, 1998). We consider methods of generating random processes with long-term correlation using deterministic non-linear systems excited by fractional Brownian motion. The suggested model has certain advantages over other techniques since it allows a wide range of analytical results and can be used for non-Gaussian processes with long-range memory. Questions of numerical simulation are also considered
[Conference Record] SUPERCOMM/ICC '92 Discovering a New World of Communications, 2000
... Mathematically, this decision law can be stated as whereas for j1=2 it becomes Similarly, for... more ... Mathematically, this decision law can be stated as whereas for j1=2 it becomes Similarly, for the Duobinary MSK for jl=l we have (20 1 7 0 then + = I < 0 then 3, qi + qi - Sak-1 - 5ak-2 and for j1=2 > 0 then < 0 then &=-I. (21) 2 5 , 3, q; + q: + 4: - pk - 1 - pk - 2 - -ak-3 ...
2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing, 2011
... maximum likelihood estimators of the unknown HMM parameters are obtained using EM algorithm. ... more ... maximum likelihood estimators of the unknown HMM parameters are obtained using EM algorithm. ... peer systems for constructing security authentication mechanisms, such as key management and secure ... The problem of trust evalu-ation in wireless context has been examined ...
IEEE 2002 International Conference on Communications, Circuits and Systems and West Sino Expositions
ABSTRACT The dramatic growth of the Internet traffic and corresponding specific IP service requir... more ABSTRACT The dramatic growth of the Internet traffic and corresponding specific IP service requirements motivate the Internet service providers, network equipment manufacturers, and researchers not only to focus on scalability and cost effectiveness of the next generation optical network architecture design, but also on the need to provide assured quality of service (QoS) for Internet applications. We address the issues of supporting the QoS in one alternative optical network called PetaWeb network, proposed by Nortel Networks. PetaWeb is based on the use of adaptive core and edge switches, which can accommodate traffic fluctuations through reconfiguration of channels periodically. In order to achieve end-to-end QoS over PetaWeb network, a QoS-aware edge node and QoS-aware channel allocation algorithm come in consideration. This increases the effective capacity of the network, reduces packet loss and packet delay, so satisfying the desired services. Simulations are also implemented to evaluate and verify the network QoS performance.
The expression of microRNA (miR)-21, miR-128, miR-155, and miR-181a involved in DNA damage respon... more The expression of microRNA (miR)-21, miR-128, miR-155, and miR-181a involved in DNA damage response (DDR) and tumor responsiveness to platinum was assessed by RT-qPCR in the plasma of patients with non-small cell lung cancer (NSCLC; n = 128) obtained prior to initiation of first-line platinum chemotherapy. U6 small nuclear RNA (snRNA) was used for normalization, and fold change of each miRNA expression relative to the expression in healthy controls was calculated by the 2−ΔΔCt method. MicroRNA expression levels were correlated with patients’ outcomes. Integrated function and pathway enrichment analysis was performed to identify putative target genes. MiR-128, miR-155, and miR-181a expressions were higher in patients compared to healthy donors. MiRNA expression was not associated with response to treatment. High miR-128 and miR-155 were correlated with shorter overall survival (OS), whereas performance status (PS) 2 and high miR-128 independently predicted for decreased OS. In the sq...
2009 IEEE International Conference on Communications
ABSTRACT The FCC has set apart a frequency band with the specific goal of improving safety and ef... more ABSTRACT The FCC has set apart a frequency band with the specific goal of improving safety and efficiency of the transportation system. Its purpose is to provide wireless communications between stations on the roadside and mobile radio units located on board of vehicles. The resulting technology is known as WAVE and is currently under development as draft standard IEEE 802.1 lp. The most time- critical messages, carrying urgent safety-related information, are transmitted over the so-called control channel (CCH). WAVE devices use the EDCA MAC protocol, defined in the 2007 version of the IEEE 802.11 standard, to compete for the transmission medium. This work analyzes the performance of EDCA under the specific conditions of the CCH of a WAVE environment. The protocol is modeled using Markov chains and results related to throughput, frame-error rate, buffer occupancy and delay are obtained under different traffic-load conditions.
IEEE Global Telecommunications Conference, 1989, and Exhibition. 'Communications Technology for the 1990s and Beyond
A maximum likelihood sequential decoder for the reception of digitally modulated signals with sin... more A maximum likelihood sequential decoder for the reception of digitally modulated signals with single or multiamplitude constellations transmitted over a multiplicative, nonselective fading channel is derived. It is shown that its structure consists of a combination of envelope, multiple differential, and coherent detectors. The outputs of each of these detectors are jointly processed by means of an algorithm. This algorithm
Proceedings of 3rd IEEE International Symposium on High Performance Distributed Computing, 2000
A. Burrell et al. (1993; 1994) described an implementation efficient capacity allocation protocol... more A. Burrell et al. (1993; 1994) described an implementation efficient capacity allocation protocol for multimedia traffic (voice, video, high and low speed data). The protocol determines the capacity allocation of each traffic dynamically, and induces moving boundaries within prespecified and fixed channel frames. The channel frames are selected to satisfy the jittering constraints of all the traffic, such as voice,
ABSTRACT The past decade has seen a dramatic increase in wideband wireless communication traffic.... more ABSTRACT The past decade has seen a dramatic increase in wideband wireless communication traffic. The arrival time of a traffic load cannot be assumed to have an exponential-type correlation function due to a long-term dependence in such traffic (see Adler, R., Feldman, R. and Taqqu, M., "A Practical Guide to Heavy Tails", Birkhauser, 1998). We consider methods of generating random processes with long-term correlation using deterministic non-linear systems excited by fractional Brownian motion. The suggested model has certain advantages over other techniques since it allows a wide range of analytical results and can be used for non-Gaussian processes with long-range memory. Questions of numerical simulation are also considered
[Conference Record] SUPERCOMM/ICC '92 Discovering a New World of Communications, 2000
... Mathematically, this decision law can be stated as whereas for j1=2 it becomes Similarly, for... more ... Mathematically, this decision law can be stated as whereas for j1=2 it becomes Similarly, for the Duobinary MSK for jl=l we have (20 1 7 0 then + = I < 0 then 3, qi + qi - Sak-1 - 5ak-2 and for j1=2 > 0 then < 0 then &=-I. (21) 2 5 , 3, q; + q: + 4: - pk - 1 - pk - 2 - -ak-3 ...
2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing, 2011
... maximum likelihood estimators of the unknown HMM parameters are obtained using EM algorithm. ... more ... maximum likelihood estimators of the unknown HMM parameters are obtained using EM algorithm. ... peer systems for constructing security authentication mechanisms, such as key management and secure ... The problem of trust evalu-ation in wireless context has been examined ...
Uploads
Papers by Dimitrios Makrakis