Search results for " computing"

showing 10 items of 2075 documents

A Trusted Hybrid Learning Approach to Secure Edge Computing

2021

Securing edge computing has drawn much attention due to the vital role of edge computing in Fifth Generation (5G) wireless networks. Artificial Intelligence (AI) has been adopted to protect networks against attackers targeting the connected edge devices or the wireless channel. However, the proposed detection mechanisms could generate a high false detection rate, especially against unknown attacks defined as zero-day threats. Thereby, we propose and conceive a new hybrid learning security framework that combines the expertise of security experts and the strength of machine learning to protect the edge computing network from known and unknown attacks, while minimizing the false detection rat…

Intrustion Detection: Computer science [C05] [Engineering computing & technology]Monitoringbusiness.industryComputer scienceFeature extractionHybrid learningServersHybrid learning: Sciences informatiques [C05] [Ingénierie informatique & technologie]Computer Science ApplicationsImage edge detectionHuman-Computer Interaction[SPI]Engineering Sciences [physics]Hardware and ArchitectureServerSecurityEdge ComputingFeature extractionEnginesElectrical and Electronic Engineeringbusiness5GEdge computingComputer network
researchProduct

Development of a Low-Cost IoT System for Lightning Strike Detection and Location

2019

Lightning and thunder are some of the most violent natural phenomena. They generate a great deal of expenditure and economic loss, especially when they strike in cities. The identification of the concrete geographic area where they strike is of critical importance for emergency services in order to enhance their effectiveness by doing an intensive coverage of the affected area. To achieve this purpose at the city scale, this paper proposes the design, prototype, and validation of a distributed network of Internet of Things (IoT) devices. The IoT devices are empowered with lightning detection capabilities and are synchronized with the other devices in the sensor network. All of them cooperat…

IoTComputer Networks and CommunicationsComputer scienceLightning (connector)Real-time computing0211 other engineering and technologies02 engineering and technology01 natural scienceslaw.inventionlaw0103 physical sciencesElectrical and Electronic Engineering010306 general physicsLightning detection021110 strategic defence & security studiesThunderLightningsensor designLightning strikeHardware and ArchitectureControl and Systems EngineeringSignal Processinglightning detection and locationTrilaterationWireless sensor networkFIWAREElectronics
researchProduct

IoT-Based Home Monitoring: Supporting Practitioners' Assessment by Behavioral Analysis.

2019

This paper introduces technical solutions devised to support the Deployment Site - Regione Emilia Romagna (DS-RER) of the ACTIVAGE project. The ACTIVAGE project aims at promoting IoT (Internet of Things)-based solutions for Active and Healthy ageing. DS-RER focuses on improving continuity of care for older adults (65+) suffering from aftereffects of a stroke event. A Wireless Sensor Kit based on Wi-Fi connectivity was suitably engineered and realized to monitor behavioral aspects, possibly relevant to health and wellbeing assessment. This includes bed/rests patterns, toilet usage, room presence and many others. Besides hardware design and validation, cloud-based analytics services are intro…

IoTComputer sciencesmart homeCloud computing02 engineering and technologylcsh:Chemical technologyBiochemistryArticleAnalytical Chemistry03 medical and health sciences0302 clinical medicineHome automation0202 electrical engineering electronic engineering information engineeringlcsh:TP1-1185Use caseElectrical and Electronic EngineeringInstrumentationToiletbusiness.industryEvent (computing)020206 networking & telecommunicationsData scienceAtomic and Molecular Physics and Opticsanomaly detectioncontinuous monitoring3. Good healthactive assisted living (AAL)behavioural analysisSoftware deploymentAnalyticsbusiness030217 neurology & neurosurgerySensors (Basel, Switzerland)
researchProduct

A data aggregation strategy based on wavelet for the internet of things

2017

The advent of emerging information and communication technologies, such as RFID, small size sensors and sensor networks, has made accessible a huge amount of information that requires sophisticated and efficient search algorithms to support queries on that data. In this paper we focus on the problem of aggregating data collected from these devices to efficiently support queries, inferences or statistics on them. In general, data aggregation techniques are necessary to efficiently collect information in a compact and cost-effective way. Some current solutions try to meet the above criteria, by exploiting different data aggregation techniques, for instance BitVector or Q_Digest. In this manus…

IoTExploitRange query (data structures)Computer science0102 computer and information sciences02 engineering and technologyFog Computingcomputer.software_genre01 natural sciencesWaveletSoftwareSearch algorithmHistogramComputational Theory and Mathematic0202 electrical engineering electronic engineering information engineeringP2PSettore INF/01 - Informaticabusiness.industry020206 networking & telecommunicationsData aggregation; Fog Computing; IoT; P2P; Range query; WaveletData aggregationData aggregator010201 computation theory & mathematicsComputational MathematicRange queryData miningbusinesscomputerWireless sensor networkWaveletSoftware
researchProduct

Classification of Actual Sensor Network Deployments in Research Studies from 2013 to 2017

2020

Technologies, such as Wireless Sensor Networks (WSN) and Internet of Things (IoT), have captured the imagination of researchers, businesses, and general public, due to breakthroughs in embedded system development, sensing technologies, and ubiquitous connectivity in recent years. That resulted in the emergence of an enormous, difficult-to-navigate body of work related to WSN and IoT. In an ongoing research effort to highlight trends and developments in these technologies and to see whether they are actually deployed rather than subjects of theoretical research with presumed potential use cases, we gathered and codified a dataset of scientific publications from a five-year period from 2013 t…

IoTInformation Systems and ManagementComputer sciencebusiness.industryReal-time computingScopusreviewData scienceWork relatedWSNField (computer science)lcsh:ZComputer Science Applicationslcsh:Bibliography. Library science. Information resourcesSoftware deploymentelectrical_electronic_engineeringResearch studiesdeploymentUse caseInternet of ThingsbusinessWireless sensor networkPublicationInformation SystemsData
researchProduct

Lecture Notes in Real-Time Intelligent Systems

2018

Intelligent computing refers greatly to artificial intelligence with the aim at making computer to act as a human. This newly developed area of real-time intelligent computing integrates the aspect of dynamic environments with the human intelligence. This book presents a comprehensive practical and easy to read account which describes current state-of-the art in designing and implementing real-time intelligent computing to robotics, alert systems, IoT, remote access control, multi-agent systems, networking, mobile smart systems, crowd sourcing, broadband systems, cloud computing, streaming data and many other applications areas. The solutions discussed in this book will encourage the resear…

IoTMultimediaComputer scienceRemote Access ControlIntelligent decision support systemStreaming DataCloud Computingcomputer.software_genreIntelligent SystemsMulti-agent SystemsNetworkingMobile Smart SystemsCrowdsourcingcomputerBroadband Systems
researchProduct

Demo abstract: Cross-technology TDMA synchronization using energy pattern beacons

2017

When different technologies use the same frequency bands in close proximity, the resulting interference typically results in performance degradation. Coexistence methods exist, but these are often technology specific and require technology specific interference detection methods. To remove the root cause of the performance degradation, devices should be able to negotiate medium access even when using different technologies. To this end, an architecture that allows cross-technology medium access by means of a Time Division Multiple Access (TDMA) scheme was devised. In order to achieve cross-technology synchronization, which is required for the TDMA solution, an energy pattern beacon is trans…

IoTbusiness.industryComputer scienceWiFiComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSTestbedReal-time computingTime division multiple access020206 networking & telecommunicationsThroughput02 engineering and technologyInterference (wave propagation)01 natural sciencesBeacon010309 opticsZigBee0103 physical sciencesSynchronization (computer science)0202 electrical engineering electronic engineering information engineeringWirelessIntertecnology interferenceIBCNbusinessWireless sensor network2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
researchProduct

A Design Theory for Secure Information Systems Design Methods

2006

Many alternative methods for designing secure information systems (SIS) have been proposed to ensure system security. However, within all the literature on SIS methods, there exists little theoretically grounded work that addresses the fundamental requirements and goals of SIS design. This paper first uses design theory to develop a SIS design theory framework that defines six requirements for SIS design methods, and second, shows how known SIS design methods fail to satisfy these requirements. Third, the paper describes a SIS design method that does address these requirements and reports two empirical studies that demonstrate the validity of the proposed framework. peerReviewed

Iterative designComputer scienceDistributed computingAxiomatic designComputer Science ApplicationsHardware_GENERALSystems engineeringDesigntheorySystems designProbabilistic designIDEF4Design methodsInformation SystemsDesign technologyHardware_LOGICDESIGN
researchProduct

The Impact of Java Applications at Microarchitectural Level from Branch Prediction Perspective

2009

The portability, the object-oriented and distributed programming models, multithreading support and automatic garbage collection are features that make Java very attractive for application developers. The main goal of this paper consists in pointing out the impact of Java applications at microarchitectural level from two perspectives: unbiased branches and indirect jumps/calls, such branches limiting the ceiling of dynamic branch prediction and causing significant performance degradation. Therefore, accurately predicting this kind of branches remains an open problem. The simulation part of the paper mainly refers to determining the context length influence on the percentage of unbiased bran…

JavaComputer Networks and CommunicationsComputer scienceIndirect branchContext (language use)Parallel computingArityBranch predictorComputer Science ApplicationsSoftware portabilityInheritance (object-oriented programming)Computational Theory and MathematicscomputerGarbage collectioncomputer.programming_languageInternational Journal of Computers Communications & Control
researchProduct

P2PRealm - Peer-to-Peer Network Simulator

2006

Peer-to-peer realm (P2PRealm) is an efficient peer-to-peer network simulator for studying algorithms based on neural networks. In contrast to many simulators, which emphasize on detailed network simulation, the speed of simulation in P2PRealm is essential, because neural networks require a time consuming training phase. Efficiency has been obtained by optimizing training loops inside the simulator, using Java native interface (JNI) as well as distributing the simulator to hundreds of workstations using the P2PDisCo platform. In this paper we describe the architecture of P2PRealm and its input/output interfaces. Also, we present the mechanisms used for internally optimizing the implementatio…

JavaComputer architecture simulatorWorkstationArtificial neural networkComputer scienceJava Native InterfaceDistributed computingPeer-to-peercomputer.software_genreNetwork simulationlaw.inventionvertaisverkkosimulaattorilawcomputerPower system simulator for engineeringcomputer.programming_language2006 11th Intenational Workshop on Computer-Aided Modeling, Analysis and Design of Communication Links and Networks
researchProduct