Search results for " networking"
showing 10 items of 1264 documents
Dynamics-based assessment of nanoscopic polymer-network mesh structures and their defects.
2018
Polymer-network gels often exhibit complex nanoscopic architectures. First, the polymer-network mesh topology on scales of 1–10 nm is usually not uniform and regular, but disordered and irregular. Second, on top of that, many swollen polymer networks display spatial inhomogeneity of their polymer segmental density and crosslinking density on scales of 10–100 nm. This multi-scale structural complexity affects the permeability, mechanical strength, and optical clarity of the polymer gels, which is of central relevance for their performance in popular applications. As a result, there is a need to characterize the polymer network structures on multiple scales. On the scale of the spatial inhomo…
A gearbox model for processing large volumes of data by using pipeline systems encapsulated into virtual containers
2020
Software pipelines enable organizations to chain applications for adding value to contents (e.g., confidentially, reliability, and integrity) before either sharing them with partners or sending them to the cloud. However, the pipeline components add overhead when processing large volumes of data, which can become critical in real-world scenarios. This paper presents a gearbox model for processing large volumes of data by using pipeline systems encapsulated into virtual containers. In this model, the gears represent applications, whereas gearboxes represent software pipelines. This model was implemented as a collaborative system that automatically performs Gear up (by using parallel patterns…
Networked Analysis of a Teaching Unit for Primary School Symmetries in the Form of an E-Book
2021
In mathematics education, technology offers many opportunities to enrich curricular contents. Plane symmetries is a topic often skipped by primary teachers. However, it is important and may be worked in attractive ways in dynamic geometry software environments. In any regular classroom there are students with different levels of mathematical attainment, some needing easy tasks while others, particularly mathematically-gifted students, need challenging problems. We present a teaching unit for plane symmetries, adequate for upper primary school grades, implemented in a fully interactive electronic book, with most activities solved in GeoGebra apps. The book allows student to choose which itin…
Multi-objective optimization for computation offloading in mobile-edge computing
2017
Mobile-edge cloud computing is a new cloud platform to provide pervasive and agile computation augmenting services for mobile devices (MDs) at anytime and anywhere by endowing ubiquitous radio access networks with computing capabilities. Although offloading computations to the cloud can reduce energy consumption at the MDs, it may also incur a larger execution delay. Usually the MDs have to pay cloud resource they used. In this paper, we utilize queuing theory to bring a thorough study on the energy consumption, execution delay and price cost of offloading process in a mobile-edge cloud system. Specifically, both wireless transmission and computing capabilities are explicitly and jointly co…
Does ns2 Really Simulate MPLS Networks?
2008
Multi Protocol Label Switching (MPLS) is being used in many corporate networks and public infrastructures and as a backbone technology of many Autonomous Systems. Because of its importance, what is needed is to find out simulators able to simulate MPLS networks whose results reflect the real environment as much as possible. In this article, we will show real measurements from the Railway Infrastructure Administrator (ADIF, the Spanish railway infrastructure manager) MPLS network and we will compare them with the results obtained by the freeware simulator ns2. We will check the level of reliability provided by the simulator and we will know under which parameters its results will be similar …
One and Two Dimensional Convolutional Neural Networks for Seizure Detection Using EEG Signals
2021
Deep learning for the automated detection of epileptic seizures has received much attention during recent years. In this work, one dimensional convolutional neural network (1D-CNN) and two dimensional convolutional neural network (2D-CNN) are simultaneously used on electroencephalogram (EEG) data for seizure detection. Firstly, using sliding windows without overlap on raw EEG to obtain the definite one-dimension time EEG segments (1D-T), and continuous wavelet transform (CWT) for 1D-T signals to obtain the two-dimension time-frequency representations (2D-TF). Then, 1D-CNN and 2D-CNN model architectures are used on 1D-T and 2D-TF signals for automatic classification, respectively. Finally, t…
A Cooperative Multi-Agent System for Crowd Sensing Based Estimation in Smart Cities
2020
The concept of Smart City has spread as a solution to ensure better access to information and services to citizens, but also as a means to reduce the environmental footprint of cities. To this end, a continuous and wide observation of the environment is necessary to analyze information that enables government bodies to act on the environment appropriately. Moreover, a diffused acquisition of information requires adequate infrastructure and proper devices, which results in relevant installation and maintenance costs. Our proposal enables reducing the number of necessary sensors to be deployed while ensuring that information is available at any time and anywhere. We present the HybridIoT syst…
Towards digital cognitive clones for the decision-makers: adversarial training experiments
2021
Abstract There can be many reasons for anyone to make a digital copy (clone) of own decision-making behavior. This enables virtual presence of a professional decision-maker simultaneously in many places and processes of Industry 4.0. Such clone can be used as one’s responsible representative when the human is not available. Pi-Mind (“Patented Intelligence”) is a technology, which enables “cloning” cognitive skills of humans using adversarial machine learning. In this paper, we present a cyber-physical environment as an adversarial learning ecosystem for cloning image classification skills. The physical component of the environment is provided by the logistic laboratory with camera-surveilla…
Taxonomy of generative adversarial networks for digital immunity of Industry 4.0 systems
2021
Abstract Industry 4.0 systems are extensively using artificial intelligence (AI) to enable smartness, automation and flexibility within variety of processes. Due to the importance of the systems, they are potential targets for attackers trying to take control over the critical processes. Attackers use various vulnerabilities of such systems including specific vulnerabilities of AI components. It is important to make sure that inappropriate adversarial content will not break the security walls and will not harm the decision logic of critical systems. We believe that the corresponding security toolset must be organized as a trainable self-protection mechanism similar to immunity. We found cer…
The Effect of Damage Functions on Urban Flood Damage Appraisal
2014
Flooding damage appraisal can been obtained by interpolating real damage data caused by historical flooding events or accounting the effects of a flood in terms of the depreciation of assets. Most often, the expected damage is evaluated by means of damage functions describing the relationship occurring between the damage and hydraulic characteristics of flood. The present paper aims to evaluate the uncertainty linked to the choice of the depth-damage function adopted in the flood damage analysis. Several possible depth-damage function formulations were selected in literature and applied to historical flooding events monitored in the "Centro Storico" catchment in Palermo (Italy). (C) 2013 Th…