Search results for " computing"

showing 10 items of 2075 documents

A Survey on Technologies Which Make Bitcoin Greener or More Justified

2022

According to recent estimates, one bitcoin transaction consumes as much energy as 1.5 million Visa transactions. Why is bitcoin using so much energy? Most of the energy is used during the bitcoin mining process, which serves at least two significant purposes: a) distributing new cryptocurrency coins to the cryptoeconomy and b) securing the Bitcoin blockchain ledger. In reality, the comparison of bitcoin transactions to Visa transactions is not that simple. The amount of transactions in the Bitcoin network is not directly connected to the amount of bitcoin mining power nor the energy consumption of those mining devices; for example, it is possible to multiply the number of bitcoin transactio…

blockchainhajautetut järjestelmätenergiankulutus (energiateknologia)General Computer ScienceDLTbitcoinGeneral Engineeringlohkoketjutsustainabilitycryptocurrencyvirtuaalivaluuttagreen technologyunconventional computingclimate changeekologinen kestävyysGeneral Materials ScienceElectrical and Electronic EngineeringIEEE Access
researchProduct

A portable system for multiple parameters monitoring: towards assessment of health conditions and stress level in the automotive field

2019

In this work, an electronic portable combo system able to synchronously acquire multiple signals, e.g. electrocardiographic (ECG), photoplethysmographic (PPG) and breathing waveforms, is presented. The realized system is also capable of showing in real time some physiological parameters which can be used for assessing health/stress status of the volunteer, such as heart rate and breathing frequency and their trends over time. Thanks to the use of non-invasive PPG probes, of batteries as power supply, and to the possibility to add in the future additional sensors to acquire other signals, the system could also be employed inside vehicles for assessing the status of the driver. Finally, the r…

breathingComputer sciencebusiness.industry020209 energyStress assessment020208 electrical & electronic engineeringWork (physics)Real-time computingAutomotive industryAutomotive02 engineering and technologyInterval (mathematics)Settore ING-INF/01 - ElettronicaField (computer science)Power (physics)Photoplethysmogram (PPG)Settore ING-INF/06 - Bioingegneria Elettronica E Informatica0202 electrical engineering electronic engineering information engineeringBreathingHeart rate variabilityWaveformElectrocardiogram (ECG)business2019 AEIT International Conference of Electrical and Electronic Technologies for Automotive (AEIT AUTOMOTIVE)
researchProduct

Improving IEEE 802.11 Performance in Chain Topologies through Distributed Polling and Network Coding

2009

Wireless multi-hop networks often rely on the use of IEEE 802.11 technology. Despite of the robustness of the IEEE 802.11 Distributed Coordination Function (DCF) for working in various network scenarios, it has been proven that critical inefficiencies can arise in the case of multi-hop packet forwarding. In this paper, we propose a MAC scheme, based on the virtualization of the Point Coordination Function, optimized for working on chain topologies with bidirectional traffic flows. Our scheme is based on a token-like access mechanism coupled with network coding. The basic idea is the use of multiple Point Coordinators (PCs) along the node chain, which are elected by passing special token fra…

business.industryBidirectional trafficComputer scienceSettore ING-INF/03 - TelecomunicazioniDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPacket forwardingThroughputnetwork codingDistributed coordination functionNetwork topologyWLANToken passingPoint coordination functionIEEE 802.11Linear network codingWireless lanTelecommunications linkComputer Science::Networking and Internet ArchitectureWirelessPollingbusinessComputer network
researchProduct

Lau Effect And Binary Logic

1989

The Lau effect is applied to implement the whole set of binary logic operations optically. Our technique works with spatially incoherent light and does not require lenses or any other optical accessory.

business.industryComputer Science::Information RetrievalComputer programmingPhysics::OpticsOptical computingMoiré patternSet (abstract data type)Superposition principleModulationBinary dataOptical filterbusinessAlgorithmMathematicsSPIE Proceedings
researchProduct

Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets

2021

International audience; With the Internet's unprecedented growth and nations' reliance on computer networks, new cyber‐attacks are created every day as means for achieving financial gain, imposing political agendas, and developing cyberwarfare arsenals. Network security is thus acquiring increasing attention among researchers, practitioners, network architects, policy makers, and others. To defend organizations' networks from existing, foreseen, and future threats, intrusion detection systems (IDSs) are becoming a must. Existing surveys on anomaly‐based IDS (AIDS) focus on specific components such as detection mechanisms and lack many others. In contrast to existing surveys, this article co…

business.industryComputer scienceAnomaly (natural sciences)020206 networking & telecommunications02 engineering and technologyIntrusion detection system[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]Computer securitycomputer.software_genre[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR][INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingThe Internet[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Electrical and Electronic Engineering[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businesscomputer
researchProduct

Integration of cloud computing tools and knowledge bodies for the management of programming projects

2018

A Body of Knowledge (BOK) is a set of concepts and skills that represent the knowledge of a specific area of engineering or scientific discipline and ensure their common understanding [1]. A BOK can include technical terms and theoretical concepts as well as best practices [2] so in this document we will focus on the context of software engineering specifically in Software Project Management. In addition, Cloud Computing will is becoming the best way to deliver solutions that meet the current need for greater collaboration between companies, education and society. In this context, the learning of Software Project Management is important during the professional life of Informatica since it e…

business.industryComputer scienceBest practiceSoftware developmentInformation technology020207 software engineeringCloud computingContext (language use)02 engineering and technologyBody of knowledgeProduct (business)Engineering management0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinessSoftware project management2018 13th Iberian Conference on Information Systems and Technologies (CISTI)
researchProduct

Multi-Authored Manuscripts and Speedup in Academic Publishing

2014

It is unfair to count a n-authored paper as one paper for each coauthor, i.e., as n papers: this is “feeding the multitude”. Sharing the credit among coauthors by percentages or by simply dividing by n is fairer but somewhat harsh. So, we propose to take into account the productivity gains of parallelization by introducing a team bonus function that multiplies the allocation thereby increasing the credit allocated to each coauthor.The degree of parallelization cannot be determined exogenously discipline by discipline. So, one may propose that each team of coauthors indicates how the labor was organized to produce the paper. Unfortunately, the coauthors may systematically bias their answers …

business.industryComputer scienceCheatingmedia_common.quotation_subjectComputingMilieux_PERSONALCOMPUTINGParallel computingLimitingN-rulePublishingOrder (exchange)Bounded functionbusinessFunction (engineering)media_commonSSRN Electronic Journal
researchProduct

Trusted Computing and DRM

2015

Trusted Computing is a special branch of computer security. One branch of computer security involves protection of systems against external attacks. In that branch we include all methods that are used by system owners against external attackers, for example Firewalls, IDS, IPS etc. In all those cases the system owner installs software that uses its own means to determine if a remote user is malicious and terminates the attack. (Such means can be very simple such as detecting signatures of attacks or very complex such as machine learning and detecting anomalies in the usage pattern of the remote user). Another branch of attacks requires protection by the system owner against internal users. …

business.industryComputer scienceCloud computingTrusted ComputingAttack surfaceConditional accessComputer securitycomputer.software_genreDigital mediaDisk encryptionDirect Anonymous AttestationTrusted Platform Modulebusinesscomputer
researchProduct

Experimental BIM applications in Archaeology: a work-flow

2014

In the last few decades various conceptual models, methods and techniques have been studied to allow 3D digital access to Cultural Heritage (CH). Among these is BIM (Building Information Modeling): originally built up for construction projects, it has been already experimented in the CH domain, but not enough in the archaeological field. This paper illustrates a framework to create 3D archaeological models integrated with databases using BIM. The models implemented are queryable by the connection with a Relational Database Management System and sharable on the web. Parametric solid and semantic models are integrated with 3D standardized database models that are finally manageable in the pub…

business.industryComputer scienceCloud computingcomputer.software_genreArchaeologyBIM Archaeology Semantic modelling Data export Web documentationField (computer science)Domain (software engineering)Cultural heritageBuilding information modelingRelational database management systemWork flowbusinesscomputerDatabase model
researchProduct

Towards a SDN-based architecture for analyzing network traffic in cloud computing infrastructures

2015

Currently, network traffic monitoring tools do not fit well in the monitoring of cloud computing infrastructures. These tools are not integrated with the control plane of the cloud computing stack. This lack of integration causes a deficiency in the handling of the re-usage of IP addresses along virtual machines, a lack of adaption and reaction on highly frequent topology changes, and a lack of accuracy in the metrics gathered for the networking traffic flowing along the cloud infrastructure. The main contribution of this paper is to provide a novel SDN-based architecture to carry out the monitoring of network traffic in cloud infrastructures. The architecture in based on the integration be…

business.industryComputer scienceController (computing)Distributed computingFloodlight020206 networking & telecommunicationsCloud computing02 engineering and technologycomputer.software_genreNetwork traffic controlVirtual machineCloud testing0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingArchitecturebusinessSoftware-defined networkingcomputerComputer network2015 23rd International Conference on Software, Telecommunications and Computer Networks (SoftCOM)
researchProduct