Search results for " computing"

showing 10 items of 2075 documents

Artificial intelligence for affective computing : an emotion recognition case study.

2020

This chapter provides an introduction on the benefits of artificial intelligence (Al) techniques for the field of affective computing, through a case study about emotion recognition via brain (electroencephalography EEG) signals. Readers are first pro-vided with a general description of the field, followed by the main models of human affect, with special emphasis to Russell's circumplex model and the pleasur-arousal-dominance (PAD) model. Finally, an AI-based method for the detection of affect elicited via multimedia stimuli is presented. The method combines both connectivity-and channel-based EEG features with a selection method that considerably reduces the dimensionality of the data and …

Channel (digital image)medicine.diagnostic_testLogarithmComputer sciencebusiness.industryFeature selectionMutual informationElectroencephalographyField (computer science)Frequency domainmedicineArtificial intelligenceAffective computingbusiness
researchProduct

Channel aggregation with guard-band in D-OFDM based CRNs: Modeling and performance evaluation

2016

Channel aggregation (CA) techniques can offer flexible channel allocation and improve overall system performance in multi-channel cognitive radio networks (CRNs). Although many CA techniques have been proposed and studied, the impact of guard-band on CA for channel access has not been addressed in-depth. In this paper, we study the guard-band allocation mechanisms in discontinuous-orthogonal frequency division multiplexing (D-OFDM) based CRNs, and investigate the impact of guard-band sharing on SU flows when CA is enabled. Continuous time Markov chain (CTMC) based models have been developed in order to investigate the stochastic behavior of PU and SU flows. Based on our mathematical analysi…

Channel allocation schemesComputer scienceOrthogonal frequency-division multiplexingDistributed computingBandwidth (signal processing)Guard bandMarkov process020206 networking & telecommunications02 engineering and technologyFrequency-division multiplexingsymbols.namesakeCognitive radio0202 electrical engineering electronic engineering information engineeringsymbols020201 artificial intelligence & image processingSimulationCommunication channel2016 IEEE Wireless Communications and Networking Conference
researchProduct

A Trajectory-Driven 3D Channel Model for Human Activity Recognition

2021

This paper concerns the design, analysis, and simulation of a 3D non-stationary channel model fed with inertial measurement unit (IMU) data. The work in this paper provides a framework for simulating the micro-Doppler signatures of indoor channels for human activity recognition by using radiofrequency-based sensing technologies. The major human body segments, such as wrists, ankles, torso, and head, are modelled as a cluster of moving point scatterers. We provide expressions for the time variant (TV) speed and TV angles of motion based on 3D trajectories of the moving person. Moreover, we present mathematical expressions for the TV Doppler shifts and TV path gains associated with each movin…

Channel transfer functionGeneral Computer ScienceComputer scienceInternet of ThingsComputació centrada en humansDoppler EfecteActivity recognitionsymbols.namesakespectrogramInertial measurement unitVDP::Teknologi: 500::Medisinsk teknologi: 620Channel measurementsnon-stationary fading channelsmedicineGeneral Materials ScienceComputer visionNon-stationary fading channelsReconeixement de formes (Informàtica)channel state informationSpectrogrambusiness.industryWireless sensingGeneral Engineering:Enginyeria de la telecomunicació::Processament del senyal::Reconeixement de formes [Àrees temàtiques de la UPC]TorsoInertial measurement unitsExpression (mathematics)TK1-9971Time-variant Doppler power characteristicsmedicine.anatomical_structureChannel state informationHuman-centered computingchannel transfer functiontime-variant Doppler power characteristicsTrajectorysymbolsChannel state informationSpectrogramMicro-Doppler signature:Informàtica::Intel·ligència artificial [Àrees temàtiques de la UPC]Electrical engineering. Electronics. Nuclear engineeringArtificial intelligenceHuman activity recognitionbusinessDoppler effect
researchProduct

Priority Based Coordinated Electric Vehicle Charging System for Heterogeneous Traffic

2020

Despite the environmental and health merits associated with Electric vehicles (EVs), a massive deployment of EVs tends to create new technical and economic challenges for power systems. This is being addressed with different coordinated charging schemes where the charging coordination is distributed across multiple EVs and/or aggregators based on different objectives. This work analyzes an algorithm which maximize the operational profit of a charging station with a high charging station utilization while adhering all the constraints enforced by the utility grid. And it is analyzed the performance of the coordinated charging scheme which facilitates heterogeneous EV users whose arrival is un…

Charging stationElectric power systembusiness.product_categoryComputer scienceSoftware deploymentOn demandDistributed computingElectric vehiclebusinessGridProfit (economics)2020 5th International Conference on Smart and Sustainable Technologies (SpliTech)
researchProduct

Exploiting seeding of random number generators for efficient domain decomposition parallelization of dissipative particle dynamics

2013

Abstract Dissipative particle dynamics (DPD) is a new promising method commonly used in coarse-grained simulations of soft matter and biomolecular systems at constant temperature. The DPD thermostat involves the evaluation of stochastic or random forces between pairs of neighboring particles in every time step. In a parallel computing environment, the transfer of these forces from node to node can be very time consuming. In this paper we describe the implementation of a seeded random number generator with three input seeds at each step which enables the complete generation of the pairwise stochastic forces in parallel DPD simulations with minimal communication between nodes.

Chemical substanceRandom number generationDissipative particle dynamicsGeneral Physics and AstronomyDomain decomposition methodsParallel computingThermostatlaw.inventionHardware and ArchitecturelawNode (circuits)Pairwise comparisonConstant (mathematics)MathematicsComputer Physics Communications
researchProduct

SAUCE: A Web-Based Automated Assessment Tool for Teaching Parallel Programming

2015

Many curricula for undergraduate studies in computer science provide a lecture on the fundamentals of parallel programming like multi-threaded computation on shared memory architectures using POSIX threads or OpenMP. The complex structure of parallel programs can be challenging, especially for inexperienced students. Thus, there is a latent need for software supporting the learning process. Subsequent lectures may cover more advanced parallelization techniques such as the Message Passing Interface (MPI) and the Compute Unified Device Architecture (CUDA) languages. Unfortunately, the majority of students cannot easily access MPI clusters or modern hardware accelerators in order to effectivel…

Class (computer programming)POSIX Threadsbusiness.industryComputer scienceMessage Passing InterfaceParallel computingcomputer.software_genreCUDASoftwareShared memoryVirtual machineWeb applicationbusinesscomputer
researchProduct

Nanomagnetic Self-Organizing Logic Gates

2021

The end of Moore's law for CMOS technology has prompted the search for low-power computing alternatives, resulting in several promising proposals based on magnetic logic[1-8]. One approach aims at tailoring arrays of nanomagnetic islands in which the magnetostatic interactions constrain the equilibrium orientation of the magnetization to embed logical functionalities[9-12]. Despite the realization of several proofs of concepts of such nanomagnetic logic[13-15], it is still unclear what the advantages are compared to the widespread CMOS designs, due to their need for clocking[16, 17] and/or thermal annealing [18,19] for which fast convergence to the ground state is not guaranteed. In fact, i…

Class (computer programming)Technology and EngineeringCondensed Matter - Mesoscale and Nanoscale PhysicsComputer scienceSIGNAL (programming language)FOS: Physical sciencesGeneral Physics and AstronomyNAND gateNonlinear Sciences - Adaptation and Self-Organizing SystemsPhysics and AstronomyCMOSComputer engineeringLogic gateSIMULATIONMesoscale and Nanoscale Physics (cond-mat.mes-hall)Path (graph theory)Reversible computingddc:530Unconventional computingAdaptation and Self-Organizing Systems (nlin.AO)Hardware_LOGICDESIGN
researchProduct

Using Cloud Computing to Implement a Security Overlay Network

2012

This article proposes and analyzes a general cloud-based security overlay network that can be used as a transparent overlay network to provide services such as intrusion detection systems, antivirus and antispam software, and distributed denial-of-service prevention. The authors analyze each of these in-cloud security services in terms of resiliency, effectiveness, performance, flexibility, control, and cost.

Cloud computing securityComputer Networks and CommunicationsComputer scienceNetwork securitybusiness.industryOverlay networkDenial-of-service attackCloud computingIntrusion detection systemElectronic mailNetwork Access ControlElectrical and Electronic EngineeringbusinessLawComputer networkIEEE Security & Privacy Magazine
researchProduct

Comparative analysis of architectures for monitoring cloud computing infrastructures

2015

The lack of control over the cloud resources is one of the main disadvantages associated to cloud computing. The design of efficient architectures for monitoring such resources can help to overcome this problem. This contribution describes a complete set of architectures for monitoring cloud computing infrastructures, and provides a taxonomy of them. The architectures are described in detail, compared among them, and analysed in terms of performance, scalability, usage of resources, and security capabilities. The architectures have been implemented in real world settings and empirically validated against a real cloud computing infrastructure based on OpenStack. More than 1000 virtual machin…

Cloud computing securityComputer Networks and Communicationsbusiness.industryComputer scienceDistributed computingCloud computingcomputer.software_genreSet (abstract data type)Utility computingHardware and ArchitectureVirtual machineScalabilitybusinesscomputerSoftwareFuture Generation Computer Systems
researchProduct

Distributing Storage in Cloud Environments

2013

Cloud computing has a major impact on today's IT strategies. Outsourcing applications from IT departments to the cloud relieves users from building big infrastructures as well as from building the corresponding expertise, and allows them to focus on their main competences and businesses. One of the main hurdles of cloud computing is that not only the application, but also the data has to be moved to the cloud. Networking speed severely limits the amount of data that can travel between the cloud and the user, between different sites of the same cloud provider, or indeed between different cloud providers. It is therefore important to keep applications near the data itself. This paper investig…

Cloud computing securityComputer sciencebusiness.industryCloud testingDistributed computingLocalityThe InternetCloud computingLoad balancing (computing)businessCloud storageOutsourcing2013 IEEE International Symposium on Parallel & Distributed Processing, Workshops and Phd Forum
researchProduct