Search results for " computing"
showing 10 items of 2075 documents
Optimal Resource Allocation in Multi-Hop Networks: Contention vs. Scheduling
2014
CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) is actually the most used method in ad-hoc networks for transmitting on a contending medium, even if it shows poor performance in presence of hidden nodes. To increase performance, we propose an algorithm that combines CSMA and TDMA (Time Division Multiple Access) approaches. The adopted solution consists of grouping contending nodes in non-interfering subsets and granting a different numbers of time slots to different groups, while using the CSMA to manage medium access among nodes belonging to the same subset. An optimization procedure to assign the time slots to each subset of nodes and to find an equilibrium between contention …
Robots, privacy and data protection
2015
A research on robots, drones and privacy/data protection, with focus on cloud robotics, Internet of Things, contracts and the use cases of telepresence, courier robots and smart cities quadricopters.
Compact Quantum Circuit Design of PUFFIN and PRINT Lightweight Ciphers for Quantum Key Recovery Attack
2023
Quantum computing plays a vital role in the next generation computing platforms as researchers have achieved quantum supremacy by proving that quantum computers can outperform classical computers. These high performance computers will pose a serious threat to the security of the conventional cryptographic algorithms. The secret key of the conventional cryptographic algorithms when implemented by quantum circuits can easily be recovered with the help of Grover key search algorithm. The Grover’s algorithm requires low cost quantum implementation of cryptographic algorithms in order to mount the quantum key recovery attack successfully. Hence the low cost quantum implementation of conventional…
Cognitive Linguistics as the Underlying Framework for Semantic Annotation
2012
In recent years many attempts have been made to design suitable sets of rules aimed at extracting the semantic meaning from plain text, and to achieve annotation, but very few approaches make extensive use of grammars. Current systems are mainly focused on extracting the semantic role of the entities described in the text. This approach has limitations: in such applications the semantic role is conceived merely as the meaning of the involved entities without considering their context. As an example, current semantic annotators often specify a date entity without any annotation regarding the kind of the date itself i.e. a birth date, a book publication date, and so on. Moreover, these system…
Cognitive Computing supported Medical Decision Support System for Patient’s Driving Assessment
2018
To smartly utilize a huge and constantly growing volume of data, improve productivity and increase competitiveness in various fields of life; human requires decision making support systems that efficiently process and analyze the data, and, as a result, significantly speed up the process. Similarly to all other areas of human life, healthcare domain also is lacking Artificial Intelligence (AI) based solution. A number of supervised and unsupervised Machine Learning and Data Mining techniques exist to help us to deal with structured data. However, in a real life, we pretty much deal with unstructured data that hides useful knowledge and valuable information inside human-readable plain texts,…
On the use of composite indicators for mobile communications network management in smart sustainable cities
2020
Beyond 5G networks will be fundamental towards enabling sustainable mobile communication networks. One of the most challenging scenarios will be met in ultra-dense networks that are deployed in densely populated areas. In this particular case, mobile network operators should benefit from new assessment metrics and data science tools to ensure an effective management of their networks. In fact, incorporating architectures allowing a cognitive network management framework could simplify processes and enhance the network&rsquo
An Intrusion Detection System for Fog Computing and IoT based Logistic Systems using a Smart Data Approach
2016
The Internet of Things (IoT) is widely used in advanced logistic systems. Safety and security of such systems are utmost important to guarantee the quality of their services. However, such systems are vulnerable to cyber-attacks. Development of lightweight anomaly based intrusion detection systems (IDS) is one of the key measures to tackle this problem. In this paper, we present a new distributed and lightweight IDS based on an Artificial Immune System (AIS). The IDS is distributed in a three-layered IoT structure including the cloud, fog and edge layers. In the cloud layer, the IDS clusters primary network traffic and trains its detectors. In the fog layer, we take advantage of a smart dat…
Towards Seamless IoT Device-Edge-Cloud Continuum:
2021
In this paper we revisit a taxonomy of client-side IoT software architectures that we presented a few years ago. We note that the emergence of inexpensive AI/ML hardware and new communication technologies are broadening the architectural options for IoT devices even further. These options can have a significant impact on the overall end-to-end architecture and topology of IoT systems, e.g., in determining how much computation can be performed on the edge of the network. We study the implications of the IoT device architecture choices in light of the new observations, as well as make some new predictions about future directions. Additionally, we make a case for isomorphic IoT systems in whic…
Software architectures for mobile computing
1999
Computational Rationality as a Theory of Interaction
2022
Funding Information: This work was funded by the Finnish Center for AI and Academy of Finland (“BAD” and “Human Automata”). We thank our reviewers, Xiuli Chen, Joerg Mueller, Christian Guckelsberger, Sebastiaan de Peuter, Samuel Kaski, Pierre-Alexandre Murena, Antti Keuru-lainen, Suyog Chandramouli, and Roderick Murray-Smith for their comments. Publisher Copyright: © 2022 ACM. How do people interact with computers? This fundamental question was asked by Card, Moran, and Newell in 1983 with a proposition to frame it as a question about human cognition - in other words, as a matter of how information is processed in the mind. Recently, the question has been reframed as one of adaptation: how …