Search results for " computing"
showing 10 items of 2075 documents
Artificial intelligence for affective computing : an emotion recognition case study.
2020
This chapter provides an introduction on the benefits of artificial intelligence (Al) techniques for the field of affective computing, through a case study about emotion recognition via brain (electroencephalography EEG) signals. Readers are first pro-vided with a general description of the field, followed by the main models of human affect, with special emphasis to Russell's circumplex model and the pleasur-arousal-dominance (PAD) model. Finally, an AI-based method for the detection of affect elicited via multimedia stimuli is presented. The method combines both connectivity-and channel-based EEG features with a selection method that considerably reduces the dimensionality of the data and …
Channel aggregation with guard-band in D-OFDM based CRNs: Modeling and performance evaluation
2016
Channel aggregation (CA) techniques can offer flexible channel allocation and improve overall system performance in multi-channel cognitive radio networks (CRNs). Although many CA techniques have been proposed and studied, the impact of guard-band on CA for channel access has not been addressed in-depth. In this paper, we study the guard-band allocation mechanisms in discontinuous-orthogonal frequency division multiplexing (D-OFDM) based CRNs, and investigate the impact of guard-band sharing on SU flows when CA is enabled. Continuous time Markov chain (CTMC) based models have been developed in order to investigate the stochastic behavior of PU and SU flows. Based on our mathematical analysi…
A Trajectory-Driven 3D Channel Model for Human Activity Recognition
2021
This paper concerns the design, analysis, and simulation of a 3D non-stationary channel model fed with inertial measurement unit (IMU) data. The work in this paper provides a framework for simulating the micro-Doppler signatures of indoor channels for human activity recognition by using radiofrequency-based sensing technologies. The major human body segments, such as wrists, ankles, torso, and head, are modelled as a cluster of moving point scatterers. We provide expressions for the time variant (TV) speed and TV angles of motion based on 3D trajectories of the moving person. Moreover, we present mathematical expressions for the TV Doppler shifts and TV path gains associated with each movin…
Priority Based Coordinated Electric Vehicle Charging System for Heterogeneous Traffic
2020
Despite the environmental and health merits associated with Electric vehicles (EVs), a massive deployment of EVs tends to create new technical and economic challenges for power systems. This is being addressed with different coordinated charging schemes where the charging coordination is distributed across multiple EVs and/or aggregators based on different objectives. This work analyzes an algorithm which maximize the operational profit of a charging station with a high charging station utilization while adhering all the constraints enforced by the utility grid. And it is analyzed the performance of the coordinated charging scheme which facilitates heterogeneous EV users whose arrival is un…
Exploiting seeding of random number generators for efficient domain decomposition parallelization of dissipative particle dynamics
2013
Abstract Dissipative particle dynamics (DPD) is a new promising method commonly used in coarse-grained simulations of soft matter and biomolecular systems at constant temperature. The DPD thermostat involves the evaluation of stochastic or random forces between pairs of neighboring particles in every time step. In a parallel computing environment, the transfer of these forces from node to node can be very time consuming. In this paper we describe the implementation of a seeded random number generator with three input seeds at each step which enables the complete generation of the pairwise stochastic forces in parallel DPD simulations with minimal communication between nodes.
SAUCE: A Web-Based Automated Assessment Tool for Teaching Parallel Programming
2015
Many curricula for undergraduate studies in computer science provide a lecture on the fundamentals of parallel programming like multi-threaded computation on shared memory architectures using POSIX threads or OpenMP. The complex structure of parallel programs can be challenging, especially for inexperienced students. Thus, there is a latent need for software supporting the learning process. Subsequent lectures may cover more advanced parallelization techniques such as the Message Passing Interface (MPI) and the Compute Unified Device Architecture (CUDA) languages. Unfortunately, the majority of students cannot easily access MPI clusters or modern hardware accelerators in order to effectivel…
Nanomagnetic Self-Organizing Logic Gates
2021
The end of Moore's law for CMOS technology has prompted the search for low-power computing alternatives, resulting in several promising proposals based on magnetic logic[1-8]. One approach aims at tailoring arrays of nanomagnetic islands in which the magnetostatic interactions constrain the equilibrium orientation of the magnetization to embed logical functionalities[9-12]. Despite the realization of several proofs of concepts of such nanomagnetic logic[13-15], it is still unclear what the advantages are compared to the widespread CMOS designs, due to their need for clocking[16, 17] and/or thermal annealing [18,19] for which fast convergence to the ground state is not guaranteed. In fact, i…
Using Cloud Computing to Implement a Security Overlay Network
2012
This article proposes and analyzes a general cloud-based security overlay network that can be used as a transparent overlay network to provide services such as intrusion detection systems, antivirus and antispam software, and distributed denial-of-service prevention. The authors analyze each of these in-cloud security services in terms of resiliency, effectiveness, performance, flexibility, control, and cost.
Comparative analysis of architectures for monitoring cloud computing infrastructures
2015
The lack of control over the cloud resources is one of the main disadvantages associated to cloud computing. The design of efficient architectures for monitoring such resources can help to overcome this problem. This contribution describes a complete set of architectures for monitoring cloud computing infrastructures, and provides a taxonomy of them. The architectures are described in detail, compared among them, and analysed in terms of performance, scalability, usage of resources, and security capabilities. The architectures have been implemented in real world settings and empirically validated against a real cloud computing infrastructure based on OpenStack. More than 1000 virtual machin…
Distributing Storage in Cloud Environments
2013
Cloud computing has a major impact on today's IT strategies. Outsourcing applications from IT departments to the cloud relieves users from building big infrastructures as well as from building the corresponding expertise, and allows them to focus on their main competences and businesses. One of the main hurdles of cloud computing is that not only the application, but also the data has to be moved to the cloud. Networking speed severely limits the amount of data that can travel between the cloud and the user, between different sites of the same cloud provider, or indeed between different cloud providers. It is therefore important to keep applications near the data itself. This paper investig…