Search results for " computing"
showing 10 items of 2075 documents
An Auto-Operated Telepresence System for the Nao Humanoid Robot
2013
International audience; This paper presents the development process of an auto-operated telepresence system for the Nao humanoid robot with the main functionality of directing the robot autonomously to an operator-defined target location within a static workspace. The workspace is observed by an array of top-view cameras, which are used to localize the robot by means of a color-based marker detection technique. The system is accessible world-wide to the remote operator through any Internet-capable device via a web-based control interface. The web server responsible for coordinating the communication between system and operator is hosted on a cloud-based infrastructure online. The system was…
Consensus via multi-population robust mean-field games
2017
In less prescriptive environments where individuals are told ‘what to do’\ud but not ‘how to do’, synchronization can be a byproduct of strategic thinking,\ud prediction, and local interactions. We prove this in the context of multipopulation\ud robust mean-field games. The model sheds light on a multi-scale\ud phenomenon involving fast synchronization within the same population and\ud slow inter-cluster oscillation between different populations.
Tolerating malicious monitors in detecting misbehaving robots
2008
This paper considers a multi–agent system and focuses on the detection of motion misbehavior. Previous work by the authors proposed a solution, where agents act as local monitors of their neighbors and use locally sensed information as well as data received from other monitors. In this work, we consider possible failure of monitors that may send incorrect information to their neighbors due to spontaneous or even malicious malfunctioning. In this context, we propose a distributed software architecture that is able to tolerate such failures. Effectiveness of the proposed solution is shown through preliminary simulation results.
Towards Shipping 4.0. A preliminary gap analysis
2020
Abstract The paradigm of Industry 4.0 involves a substantial innovation to the value creation approach thought the supply chain and the application of digital enabling technologies like the Internet of Things (IoT), Big Data Analytics (BDA) and cloud computing. The fourth industrial revolution is thus expected to have a disruptive impact on maritime transport and shipping sectors, where smart ships and autonomous vessels well be part of a new and fully interconnected maritime ecosystem. Specific hardware components, such as sensors, actuators, or processors will be embedded in the ship’s key systems in order to provide valuable information to increase the efficiency, sustainability and safe…
Tabu Search to Plan Schedules in a Multiskill Customer Contact Center
2006
International audience; We have studied a realistic case of scheduling problem in a customer contact center, dealing with multiskill agents. Our model combines the last two steps of the standard approach by determining shifts and by assigning them to agents at the same time (scheduling and rostering). Moreover, we have considered realistic vacations, according to legal constraints and preferences of agents. We have envisioned entire weeks of work, with variable meal times and meal durations, without overtime. In this paper, we define the problem and describe a Tabu search based solution.
DESDEO : An Open Framework for Interactive Multiobjective Optimization
2018
We introduce a framework for interactive multiobjective optimization methods called DESDEO released under an open source license. With the framework, we want to make interactive methods easily accessible to be applied in solving real-world problems. The framework follows an object-oriented software design paradigm, where functionalities have been divided to modular, self-contained components. The framework contains implementations of some interactive methods, but also components which can be utilized to implement more interactive methods and, thus, increase the applicability of the framework. To demonstrate how the framework can be used, we consider an example problem where the pollution of…
On the Influence of Affect in EEG-Based Subject Identification
2021
Biometric signals have been extensively used for user identification and authentication due to their inherent characteristics that are unique to each person. The variation exhibited between the brain signals (EEG) of different people makes such signals especially suitable for biometric user identification. However, the characteristics of these signals are also influenced by the user’s current condition, including his/her affective state. In this paper, we analyze the significance of the affect-related component of brain signals within the subject identification context. Consistent results are obtained across three different public datasets, suggesting that the dominant component of the sign…
Efficient Protection for VDI Workstations
2019
Many enterprises migrate to a private cloud VDI environment. In such an environment multiple workstations are served by a single powerful server. On such an environment each VDI workstation receives only a limited CPU power. An average of less than a quarter of a core per planned VDI workstation is a common setup. Under such cases, anti-virus and application control software load is multiplied by the number of VDI workstation running on each server. These security applications take merely a few percentages of a single core on a normal desktop. However, on a VDI server where the multiple VDI workstations run on a single server, they may consume 20-25 percent the load. Naturally, such an incr…
Subjective Logic-Based In-Network Data Processing for Trust Management in Collocated and Distributed Wireless Sensor Networks
2018
While analyzing an explosive amount of data collected in today’s wireless sensor networks (WSNs), the redundant information in the sensed data needs to be handled. In-network data processing is a technique which can eliminate or reduce such redundancy, leading to minimized resource consumption. On the other hand, trust management techniques establish trust relationships among nodes and detect unreliable nodes. In this paper, we propose two novel in-network data processing schemes for trust management in static WSNs. The first scheme targets at networks, where sensor nodes are closely collocated to report the same event. Considering both spatial and temporal correlations, this scheme generat…
Two novel subjective logic-based in-network data processing schemes in wireless sensor networks
2016
Wireless sensor networks (WSNs) consist of connected low-cost and small-size sensor nodes. The sensor nodes are characterized by various limitations, such as energy availability, processing power, and storage capacity. Typically, nodes collect data from an environment and transmit the raw or processed data to a sink. However, the collected data contains often redundant information. An in-network processing scheme attempts to eliminate or reduce such redundancy in sensed data. In this paper, we propose two in-network data processing schemes for WSNs, which are built based on a lightweight algebra for data processing. The schemes bring also benefits like decreased network traffic load and inc…