Search results for " computing"
showing 10 items of 2075 documents
PV-Alert: Fog Computing based Architecture for Safeguarding Vulnerable Road Users
2018
High volumes of pedestrians, cyclists and other vulnerable road users (VRUs) have much higher casualty rates per mile; not surprising given their lack of protection from an accident. In order to alleviate the problem, sensing capabilities of smartphones can be used to detect, warn and safeguard these road users. In this research we propose an infrastructure-less fog-based architecture named PV-Alert (Pedestrian-Vehicle Alert) where fog nodes process delay sensitive data obtained from smartphones for alerting pedestrians and drivers before sending the data to the cloud for further analysis. Fog computing is considered in developing the architecture since it is an emerging paradigm that has p…
Average Age of Information in Wireless Powered Mobile Edge Computing System
2022
Mobile edge computing (MEC) has been recognized as a promising technique to provide enhanced computation services for low-power wireless devices at the network edge. How to evaluate the timeliness of the task and data delivery is critical for the development of MEC applications. Considering a wireless powered MEC system, in this letter we study the average age of information (AoI), which is a crucial performance metric to measure the freshness of information. Specifically, in the considered system, a sensor node harvests energy from an energy transmitter and transmits computation tasks to the MEC server. The charging time of the sensor node’s capacitor, the waiting time and service time at …
Agile logic for SaaS implementation: Capitalizing on marketing automation software in a start-up
2022
The emergence of Software-as-a-Service (SaaS) has facilitated agile technology implementation that focuses on iterative adaptations via learning by doing rather than the realization of a predesigned implementation plan. This study conceptualizes such an agile approach and explicates its operationalization via a four-year qualitative case study of a business-to-business (B2B) start-up firm’s implementation of a HubSpot marketing automation (MA) SaaS. The study shows how agile implementation continuously introduces adaptations to SaaS features and organizational routines for improving their mutual fit given the organization’s goals. The study also contributes to theory by offering a novel fra…
Short-time non-work-related computing and creative performance
2014
It has been argued that non-work-related computing (NWRC) takes time away from work and, hence, decreases work productivity. On the other hand, it has also been claimed that short-time non-work-related computing (STNWRC) (a maximum of 15 minutes), has a positive impact on work productivity, including relief from boredom, higher creativity, and the underlying recovery mechanisms. To examine the impact of STNWRC on creative performance, we draw on Fredrickson's broaden-and-build theory, the concept of recovery with mental well-being and low cognitive effort. A 2 × 2 factorial experiment with 40 subjects was conducted. The results indicate that STNWRC has a positive effect on creative performa…
Simulating multilevel dynamics of antimicrobial resistance in a membrane computing model
2019
Membrane computing is a bio-inspired computing paradigm whose devices are the so-called membrane systems or P systems. The P system designed in this work reproduces complex biological landscapes in the computer world. It uses nested “membrane-surrounded entities” able to divide, propagate, and die; to be transferred into other membranes; to exchange informative material according to flexible rules; and to mutate and be selected by external agents. This allows the exploration of hierarchical interactive dynamics resulting from the probabilistic interaction of genes (phenotypes), clones, species, hosts, environments, and antibiotic challenges. Our model facilitates analysis of several aspects…
Gamifying Teacher Students’ Learning Platform
2020
This paper presents initial results from a study exploring teacher students’ experiences related to the gamification of an online learning platform in higher education. The aim was to get an understanding of the participants’ views regarding the use of game elements and to examine the user type profile of this group in order to explore the potential of applying user types in planning gamification solutions for teacher students. The participants’ overall experience of having game elements as part of their course platform was principally positive. User types students presented were investigated using the Hexad scale adapted from game design: in this user group, Socialiser and Philanthropist w…
The 1-way on-line coupled atmospheric chemistry model system MECO(n) – Part 2: On-line coupling with the Multi-Model-Driver (MMD)
2012
A new, highly flexible model system for the seamless dynamical down-scaling of meteorological and chemical processes from the global to the meso-γ scale is presented. A global model and a cascade of an arbitrary number of limited-area model instances run concurrently in the same parallel environment, in which the coarser grained instances provide the boundary data for the finer grained instances. Thus, disk-space intensive and time consuming intermediate and pre-processing steps are entirely avoided and the time interpolation errors of common off-line nesting approaches are minimised. More specifically, the regional model COSMO of the German Weather Service (DWD) is nested on-line into the …
Arm security alternatives
2019
Many real-world scenarios such as protecting DRM, online payments and usage in NFC payments in embedded devices require a trustworthy “trusted execution environment” (TEE) platform. The TEE should run on the ARM architecture. That is popular in embedded devices. Furthermore, past experience has proved that such TEE platform should be available in source code form. Without the source code 3rd parties and user cannot be conducted code review audit. Lack of review put doubt on the system as a trustworthy environment. The popular Android OS supports various TEE implementations. Each TEE OS implementation has its own unique way of deploying trusted applications(trustlets) and its own distinct fe…
On GPU-accelerated fast direct solvers and their applications in image denoising
2015
Incentive Mechanism for Edge-Computing-Based Blockchain
2020
Blockchain has been gradually applied to different Internet of Things (IoT) platforms. As the efficiency of the blockchain mainly depends on the network computing capability, how to make sure the acquisition of the computational resources and participation of the devices would be the driving force. In this work, we focus on investigating incentive mechanism for rational miners to purchase the computational resources. A edge computing-based blockchain network is considered, where the edge service provider (ESP) can provide computational resources for the miners. Accordingly, we formulate a two-stage Stackelberg game between the miners and ESP. The aim is to investigate Stackelberg equilibriu…