Search results for " computing"

showing 10 items of 2075 documents

Stroke Cognitive Medical Assistant (StrokeCMA)

2018

Stroke is the number two killer after heart disease since it is responsible for almost 10% of all deaths worldwide. The main problem with a stroke is a significant delay in treatment that happened mainly due to inappropriate detection of stroke symptoms or inability of a person to perform further necessary actions, and might cause death, permanent disabilities, as well as more expensive treatment and rehabilitation. Nowadays assessment of a stroke is done by human, following widely adopted FAST approach of stroke assessment. Since a human factor become one of the causes of treatment delay, offered solution will try to minimize this factor. Artificial Intelligence, Cognitive Computing, Machi…

cognitive computingdecision support systemnatural language processingIBM Watsonmedical assistantautomated diagnosticsstroke symptoms detection
researchProduct

Multi-objective optimization for computation offloading in mobile-edge computing

2017

Mobile-edge cloud computing is a new cloud platform to provide pervasive and agile computation augmenting services for mobile devices (MDs) at anytime and anywhere by endowing ubiquitous radio access networks with computing capabilities. Although offloading computations to the cloud can reduce energy consumption at the MDs, it may also incur a larger execution delay. Usually the MDs have to pay cloud resource they used. In this paper, we utilize queuing theory to bring a thorough study on the energy consumption, execution delay and price cost of offloading process in a mobile-edge cloud system. Specifically, both wireless transmission and computing capabilities are explicitly and jointly co…

computational modeling020203 distributed computingMobile edge computingOptimization problemta213delaysbusiness.industryComputer scienceDistributed computingcloud computing020206 networking & telecommunicationsCloud computing02 engineering and technologyEnergy consumptionbase stationsMulti-objective optimizationBase stationenergy consumptioncomputers0202 electrical engineering electronic engineering information engineeringComputation offloadingbusinessoptimizationMobile deviceComputer network2017 IEEE Symposium on Computers and Communications (ISCC)
researchProduct

Incentive Mechanism for Edge Computing-Based Blockchain: A Sequential Game Approach

2022

The development of the blockchain framework is able to provide feasible solutions for a wide range of Industrial Internet of Things (IIoT) applications. While the IIoT devices are usually resource-limited, how to make sure the acquisition of computational resources and participation of the devices will be the driving force to realize blockchain. In this work, an edge computing-based blockchain framework is considered, where multiple edge service providers (ESPs) can provide computational resources to the IIoT devices. We focus on investigating the trading between the devices and ESPs, where ESPs are the sellers and devices are the buyers. A sequential game is formulated and by exploring the…

computational modelingblockchainsInternet of ThingsmininglohkoketjutComputer Science Applicationsedge computingreunalaskentaControl and Systems Engineeringtask analysispricinginformaticsincentive mechanismpeliteoriaesineiden internettiedonlouhintaElectrical and Electronic EngineeringgamesInformation SystemsIEEE Transactions on Industrial Informatics
researchProduct

Quantum Creativity and Cognition in Humans and Robots

2022

In this research, we present a categorical framework to connect research on creativity and cognition for humans and robots, in light of the quantum paradigm. These fields and their relationships suggest a wider vision: modeling human creativity/cognition through quantum computing, and creating robots that can help us learn more about the humans themselves. We represent the human–robot comparison through functors (function generalization). Fundamental elements to understand human creativity are motivation and feedback as aesthetic pleasure. Is it possible to model it? Can the quantum paradigm help us in such an endeavor? We envisage the concept of emergence and quantum computing as decisive…

creativity modelingswarm intelligenceGeneral MedicineQuantum computingJournal of Artificial Intelligence and Consciousness
researchProduct

System for Executing Encrypted Native Programs

2017

An important aspect of protecting software from attack, theft of algorithms, or illegal software use, is eliminating the possibility of performing reverse engineering. One common method to deal with these issues is code obfuscation. However, in most case it was shown to be ineffective. Code encryption is a much more effective means of defying reverse engineering, but it requires managing a secret key available to none but the permissible users. The authors propose a new and innovative solution. Critical functions in protected software are encrypted using well-known encryption algorithms. Following verification by external attestation, a thin hypervisor is used as the basis of an eco-system …

cyber-securitytrusted computinghypervisorattestation
researchProduct

Preventing Execution of Unauthorized Native-Code Software

2017

The business world is exhibiting a growing dependency on computer systems, their operations and the databases they contain. Unfortunately, it also suffers from an ever growing recurrence of malicious software attacks. Malicious attack vectors are diverse and the computer-security industry is producing an abundance of behavioral-pattern detections to combat the phenomenon. This paper proposes an alternative approach, based on the implementation of an attested, and thus trusted, thin-hypervisor. Secondary level address translation tables, governed and fully controlled by the hypervisor, are configured in order to assure that only pre-whitelisted instructions can be executed in the system. Thi…

cybersecuritywhitelistingtrusted computinghypervisorattestationAPT-protection
researchProduct

Track finding at Belle II

2021

Computer physics communications 259, 107610 (2021). doi:10.1016/j.cpc.2020.107610

data analysis methodPhysics - Instrumentation and DetectorsComputer scienceReal-time computingFOS: Physical sciencesGeneral Physics and AstronomyBELLETrack (rail transport)01 natural sciences530programming010305 fluids & plasmasHigh Energy Physics - ExperimentTracking algorithmsHigh Energy Physics - Experiment (hep-ex)Tracking detectorsSoftware0103 physical sciences[PHYS.HEXP]Physics [physics]/High Energy Physics - Experiment [hep-ex]Belle II; Tracking algorithms; Tracking detectorsBelle IIddc:530[PHYS.PHYS.PHYS-INS-DET]Physics [physics]/Physics [physics]/Instrumentation and Detectors [physics.ins-det]010306 general physicsSpurious relationshipSelection (genetic algorithm)Event reconstructionbusiness.industrytrack data analysisInstrumentation and Detectors (physics.ins-det)Modular designResolution (logic)charged particleHardware and Architecturebusinessperformance
researchProduct

Col : A Data Collection Protocol for Vanet

2012

International audience; In this paper, we present a protocol to collect data within a vehicular ad hoc network (VANET). In spite of the intrinsic dynamic of such network, our protocol simultaneously offers three relevant properties: (1) It allows any vehicle to collect data beyond its direct neighborhood (i.e., vehicles within direct communication range) using vehicle-to-vehicle communications only (i.e., the infrastructure is not required); (2) It tolerates possible network partitions; (3) It works on demand and stops when the data collection is achieved. To the best of our knowledge, this is the first collect protocol having these three characteristics. All that is chiefly obtained thanks…

data collection protocolVehicular communication systemsVANETCorrectnessnetwork operator antComputer sciencedata acquisitionDistributed computing[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]self-stabilization area02 engineering and technologyVehicle dynamics[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]Transient analysis[SPI]Engineering Sciences [physics]0203 mechanical engineeringvehicular ad hoc networkvehicle to vehicle communication0202 electrical engineering electronic engineering information engineeringAlgorithm design and analysisHeuristic algorithmsCOL algorithmProtocol (object-oriented programming)ComputingMilieux_MISCELLANEOUSAirplug software distributionVehicular ad hoc networkData collectionbusiness.industryNetwork partitionnetwork partition020206 networking & telecommunications020302 automobile design & engineeringVehiclesSoftware distributionRoadsAlgorithm designvehicular ad hoc networksbusinessProtocolsComputer network
researchProduct

UAV-Assisted Data Collection in Wireless Sensor Networks: A Comprehensive Survey

2021

Wireless sensor networks (WSNs) are usually deployed to different areas of interest to sense phenomena, process sensed data, and take actions accordingly. The networks are integrated with many advanced technologies to be able to fulfill their tasks that is becoming more and more complicated. These networks tend to connect to multimedia networks and to process huge data over long distances. Due to the limited resources of static sensor nodes, WSNs need to cooperate with mobile robots such as unmanned ground vehicles (UGVs), or unmanned aerial vehicles (UAVs) in their developments. The mobile devices show their maneuverability, computational and energy-storage abilities to support WSNs in mul…

data collection scenariosTK7800-8360Computer Networks and CommunicationsProcess (engineering)Computer scienceDistributed computingComputerApplications_COMPUTERSINOTHERSYSTEMSwireless sensor networks (WSNs)mobile robotsenergy consumptionComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMSunmanned aerial vehicles (UAVs)Electrical and Electronic EngineeringData collectionControl algorithmcommunication structuresCommunication structures Control algorithms Data collection scenarios Energy consumption Mobile robots Unmanned aerial vehicles (UAVs) Wireless sensor networks (WSNs)Mobile robotEnergy consumptionSettore ING-IND/31 - ElettrotecnicaHardware and ArchitectureControl and Systems EngineeringSignal Processingcontrol algorithmsElectronicsMobile deviceWireless sensor networkLimited resourcesElectronics
researchProduct

Time-Frequency Characteristics of In-Home Radio Channels Influenced by Activities of the Home Occupant

2019

While aging is a serious global concern, in-home healthcare monitoring solutions are limited to context-aware systems and wearable sensors, which may easily be forgotten or ignored for privacy and comfort reasons. An emerging non-wearable fall detection approach is based on processing radio waves reflected off the body, who has no active interaction with the system. This paper reports on an indoor radio channel measurement campaign at 5.9 GHz, which has been conducted to study the impact of fall incidents and some daily life activities on the temporal and spectral properties of the indoor channel under both line-of-sight (LOS) and obstructed-LOS (OLOS) propagation conditions. The time-frequ…

device-free fall detectionComputer scienceReal-time computingWearable computerVDP::Information and communication science: 42002 engineering and technologylcsh:Chemical technology01 natural sciencesBiochemistryArticleAnalytical ChemistryDoppler power spectral density0202 electrical engineering electronic engineering information engineeringlcsh:TP1-1185Electrical and Electronic EngineeringInstrumentationnon-stationary radio channels010401 analytical chemistry020206 networking & telecommunicationsAtomic and Molecular Physics and Optics0104 chemical sciencesTime–frequency analysisspectrogram analysisVDP::Informasjons- og kommunikasjonsvitenskap: 420Radio waveCommunication channelambient-assisted livingSensors (Basel, Switzerland)
researchProduct