Search results for " processing"

showing 10 items of 7549 documents

Detecting Bridge Anaphora

2017

The paper presents one of most important issues in natural language processing (NLP), namely the automated recognition of semantic relations (in this case, bridge anaphora). In this sense, we propose to recognize automatically, as accurately as possible, this type of relations in a literary corpus (the novel Quo Vadis), knowing that the diversity and complexity of relations between entities is impressive. Furthermore, we defined and classified the bridge anaphora type relations based on annotation conventions. In order to achieve the main goal, we developed a computational instrument, BAT (Bridge Anaphora Tool), currently still in a test (and implicitly an improvable) version. This study is…

Computer Networks and CommunicationsComputer sciencebusiness.industryAnaphora (linguistics)computer.software_genreBridge (interpersonal)Field (computer science)Computer Science ApplicationsAnnotationComputational Theory and MathematicsArtificial intelligencebusinesscomputerNatural language processingInternational Journal of Computers Communications & Control
researchProduct

Performance comparison of container orchestration platforms with low cost devices in the fog, assisting Internet of Things applications

2020

Abstract In the last decade there has been an increasing interest and demand on the Internet of Things (IoT) and its applications. But, when a high level of computing and/or real time processing is required for these applications, different problems arise due to their requirements. In this context, low cost autonomous and distributed Small Board Computers (SBC) devices, with processing, storage capabilities and wireless communications can assist these IoT networks. Usually, these SBC devices run an operating system based on Linux. In this scenario, container-based technologies and fog computing are an interesting approach and both have led to a new paradigm in how devices cooperate, improvi…

Computer Networks and CommunicationsComputer sciencebusiness.industryDistributed computing020206 networking & telecommunications02 engineering and technologyLoad balancing (computing)Virtualizationcomputer.software_genreNetwork topologyComputer Science ApplicationsHardware and ArchitecturePerformance comparisonScalability0202 electrical engineering electronic engineering information engineeringWireless020201 artificial intelligence & image processingOrchestration (computing)businessInternet of ThingscomputerJournal of Network and Computer Applications
researchProduct

Improved resource allocation strategy in SU-CoMP network

2011

Coordinated multi-point transmission and reception (CoMP) for single user, named as SU-CoMP, is considered as an efficient approach to mitigate inter-cell interference in orthogonal frequency division multiple access (OFDMA) systems. Two prevalent approaches in SU-CoMP are coordinated scheduling (CS) and joint processing (JP). Although JP in SU-CoMP has been proved to achieve a great link performance improvement for the cell-edge user, efficient resource allocation (RA) on the system level is quite needed. However, so far limited work has been done considering JP, and most existing schemes achieved the improvement of cell-edge performance at cost of the cell-average performance degradation …

Computer Networks and CommunicationsComputer sciencebusiness.industryDistributed computingOrthogonal frequency-division multiple accessScheduling (computing)TelecomunicacióSignal ProcessingSystem levelPerformance improvementTelecommunicationsbusinessComunicació i tecnologiaInformation Systems
researchProduct

Adaptive Medium Access Control for Distributed Processing in Wireless Sensor Networks

2019

Signal and information processing tasks over Wireless Sensor Networks can be successfully accomplished by means of a distributed implementation among the nodes. Existing distributed schemes are commonly based on iterative strategies that imply a huge demand of one-hop transmissions, which must be efficiently processed by the lower layers of the nodes. At the link layer, general purpose medium access (MAC) policies for wireless communications usually focus on avoiding collisions. These existing approaches result in a reduction of the number of simultaneous transmissions, and an underutilization of the channel as a consequence. This leads to a decrease in the performance of the distributed ta…

Computer Networks and CommunicationsComputer sciencebusiness.industryDistributed computingReliability (computer networking)020208 electrical & electronic engineeringInformation processing020206 networking & telecommunicationsAccess control02 engineering and technologySignal Processing0202 electrical engineering electronic engineering information engineeringWirelessLink layerUnicastbusinessWireless sensor networkInformation SystemsCommunication channel
researchProduct

Analysis of HMAX Algorithm on Black Bar Image Dataset

2020

An accurate detection and classification of scenes and objects is essential for interacting with the world, both for living beings and for artificial systems. To reproduce this ability, which is so effective in the animal world, numerous computational models have been proposed, frequently based on bioinspired, computational structures. Among these, Hierarchical Max-pooling (HMAX) is probably one of the most important models. HMAX is a recognition model, mimicking the structures and functions of the primate visual cortex. HMAX has already proven its effectiveness and versatility. Nevertheless, its computational structure presents some criticalities, whose impact on the results has never been…

Computer Networks and CommunicationsComputer sciencelcsh:TK7800-8360Context (language use)02 engineering and technologySet (abstract data type)03 medical and health sciences0302 clinical medicineGabor filterBBIDEncoding (memory)0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringModularity (networks)Contextual image classificationbusiness.industrylcsh:ElectronicsPattern recognitioncomputational modelBlack Bar Image DatasetHardware and ArchitectureControl and Systems EngineeringHMAXSignal Processingtexture classification020201 artificial intelligence & image processingArtificial intelligencerecognitionbusiness030217 neurology & neurosurgeryimage classificationElectronics
researchProduct

Communication and security in communicating things networks

2020

International audience

Computer Networks and CommunicationsHardware and ArchitectureComputer science0202 electrical engineering electronic engineering information engineering020206 networking & telecommunications020201 artificial intelligence & image processing[INFO]Computer Science [cs]02 engineering and technologyComputer securitycomputer.software_genrecomputerSoftwareComputingMilieux_MISCELLANEOUS
researchProduct

Human Factor Interrelationships to Improve Worker Reliability: Implementation of MCDM in the Agri-Food Sector

2023

Performance Shaping Factors (PSFs) are contextual, individual, and cognitive factors used in Human Reliability Analysis (HRA) to quantify the worker contribution to errors when performing a generic task. Although the empirical evidence demonstrates the existence of PSF interrelationships, the majority of HRA methods assume their independence. As a consequence, the resulting Human Error Probability (HEP) might be over- or underestimated. To deal with this issue, only a few qualitative guidelines or statistical-based approaches have been proposed so far. While the former are not well structured, the latter require a high computational effort and a proper number of input data. Therefore, the p…

Computer Networks and CommunicationsHardware and ArchitectureControl and Systems EngineeringPerformance Shaping Factor (PSF)Human Error Probability (HEP); Performance Shaping Factor (PSF); interdependence; Multi Criteria Decision Making (MCDM)Signal ProcessingMulti Criteria Decision Making (MCDM)Human Error Probability (HEP)Electrical and Electronic EngineeringinterdependenceElectronics
researchProduct

Exploring Lightweight Deep Learning Solution for Malware Detection in IoT Constraint Environment

2022

The present era is facing the industrial revolution. Machine-to-Machine (M2M) communication paradigm is becoming prevalent. Resultantly, the computational capabilities are being embedded in everyday objects called things. When connected to the internet, these things create an Internet of Things (IoT). However, the things are resource-constrained devices that have limited computational power. The connectivity of the things with the internet raises the challenges of the security. The user sensitive information processed by the things is also susceptible to the trusability issues. Therefore, the proliferation of cybersecurity risks and malware threat increases the need for enhanced security in…

Computer Networks and CommunicationsHardware and ArchitectureControl and Systems EngineeringSignal ProcessingElectrical and Electronic EngineeringInternet of Things; deep learning; natural language processing; RNN; LSTM; malware detectionVDP::Matematikk og Naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420Electronics; Volume 11; Issue 24; Pages: 4147
researchProduct

A Survey on Particle Swarm Optimization for Association Rule Mining

2022

Association rule mining (ARM) is one of the core techniques of data mining to discover potentially valuable association relationships from mixed datasets. In the current research, various heuristic algorithms have been introduced into ARM to address the high computation time of traditional ARM. Although a more detailed review of the heuristic algorithms based on ARM is available, this paper differs from the existing reviews in that we expected it to provide a more comprehensive and multi-faceted survey of emerging research, which could provide a reference for researchers in the field to help them understand the state-of-the-art PSO-based ARM algorithms. In this paper, we review the existing…

Computer Networks and CommunicationsHardware and ArchitectureControl and Systems EngineeringSignal ProcessingElectrical and Electronic EngineeringVDP::Teknologi: 500::Elektrotekniske fag: 540Electronics
researchProduct

Nonlinear Robust Control of a Quadratic Boost Converter in a Wide Operation Range, Based on Extended Linearization Method

2022

This paper proposes a control system for a quadratic boost DC/DC converter in a wide range of operations, based on an inner loop with a sliding mode controller, for reaching a desired equilibrium state, and an outer loop with integral-type controller, for assuring robustness against load and input voltage variations and converter parameter uncertainties. The sliding mode controller is designed with the extended linearization method and assures local asymptotic stability, whereas the integral controller is designed using classical frequency methods, and assures input–output stability. It is shown that the proposed controller also deals with the sudden changes in the nominal operating conditi…

Computer Networks and CommunicationsHardware and ArchitectureControl and Systems EngineeringSignal ProcessingExtended linearizationquadratic boost convertersliding mode controlrobustnessElectrical and Electronic Engineeringquadratic boost converter; sliding mode control; extended linearization; robustness
researchProduct