Search results for "Application"

showing 10 items of 5559 documents

Ontology and protocol secure for SCADA

2014

In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, this is an encryption tech…

vulnerabilitiessecurity protocolsdata acquisitionencryption technologycyber securityembedded applicationssupervisory controlsemantic attackssemantic security blocksecurity ontology[INFO] Computer Science [cs]SOAP protocollow latencyModbus protocolECC cryptographySCADAcontrol systems[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
researchProduct

Experiencing ethical retail ideology in the servicescape

2020

Studies of the ideological underpinnings of retail stores have improved our understanding of consumers’ retail experiences in brand and national ideology contexts. In retailing, ideology is manifested in retail spatial settings through tangible and intangible cues in servicescapes. This study expands our knowledge on ethical retail ideology by exploring how servicescapes convey cues that shape consumption experiences and foster ethical consumption. Data from an ethnographic study highlight how consumption experiences in physical retail spaces embedding a particular ethical ideology can be thematised as aesthetics, nostalgia and care. We show that the material and discursive aspects in servi…

vähittäiskauppaStrategy and Managementmedia_common.quotation_subjectethnographyretail ideologyconsumption experienceeettinen kulutus0502 economics and businessEthnographySociologymedia_commonMarketingservicescapeetnografiaComputingMilieux_THECOMPUTINGPROFESSION05 social sciencesAdvertisingethical consumptionComputingMilieux_GENERALkulutustottumuksetComputerApplications_GENERALComputingMilieux_COMPUTERSANDSOCIETY050211 marketingEthical consumptionIdeologyServicescape050203 business & management
researchProduct

MVC Frameworks in Web Development

2012

With the increased demand of complex, well-scalable and maintainable web applications, the MVC architecture is increasing in popularity and frameworks (whether they utilize the MVC architecture or not) are quickly becoming de facto –standard in web development. This Bachelor’s Thesis introduces the use of MVC architecture in web development and how several web application frameworks make use of it. This research introduces the concepts of both the MVC architecture and web application frameworks but does not go into the basics of web development. Three examples of web application frameworks that utilize the MVC architecture are introduced. Due to the constraints provided by the size of this …

web developmentMVC modelMVC architectureweb application frameworks
researchProduct

Practice for determining friction in hydraulic winch systems

2020

This paper presents a method for estimating friction in hydraulic active heave compensated (AHC) offshore winches. The method is a two-step approach where the first step is to model the friction loss in the hydraulic motors based on data from the sub-supplier. The second step requires real-life testing, where the remaining friction losses in the winch system is identified and modeled. In this context, a practice is characterized by obtaining a friction loss estimation with the highest possible accuracy over the widest possible range of operating conditions with a limited amount of experimental work. The method benefits from the use of parametric models, sub-supplier data, and real-life meas…

winch systemEngineeringbusiness.industrytorque losshydraulicslcsh:QA75.5-76.95Computer Science ApplicationsControl and Systems EngineeringModeling and Simulationlcsh:Electronic computers. Computer scienceoffshore knuckle boom cranesWinchbusinessSoftwareMarine engineeringModeling, Identification and Control: A Norwegian Research Bulletin
researchProduct

Learn to Cache: Machine Learning for Network Edge Caching in the Big Data Era

2018

The unprecedented growth of wireless data traffic not only challenges the design and evolution of the wireless network architecture, but also brings about profound opportunities to drive and improve future networks. Meanwhile, the evolution of communications and computing technologies can make the network edge, such as BSs or UEs, become intelligent and rich in terms of computing and communications capabilities, which intuitively enables big data analytics at the network edge. In this article, we propose to explore big data analytics to advance edge caching capability, which is considered as a promising approach to improve network efficiency and alleviate the high demand for the radio resou…

wireless networksContent popularityEdge deviceComputer scienceBig data5G-tekniikkaRadio resource02 engineering and technologyWireless network architecturebig data5G mobile communication0202 electrical engineering electronic engineering information engineeringElectrical and Electronic Engineeringta113: Computer science [C05] [Engineering computing & technology]hidden Markov modelsbusiness.industry020208 electrical & electronic engineeringWireless dataanalytical models020206 networking & telecommunications: Sciences informatiques [C05] [Ingénierie informatique & technologie]Computer Science Applicationsdata modelskoneoppiminenmachine learningdevice-to-device communicationEnhanced Data Rates for GSM EvolutionCachebusinesslangattomat verkotComputer networkIEEE Wireless Communications
researchProduct

IEEE Access Special Section Editorial: Exploiting the Benefits of Interference in Wireless Networks: Energy Harvesting and Security

2018

Interference used to be viewed as a harmful factor in wireless networks, which can reduce the quality of information transmission. To combat against interference, many interference management techniques have emerged. Due to the latest research advances, interference (or noise) can also be exploited to offer some benefits to wireless networks. The first aspect is that interference in multi-user networks can be collected as a green power supply for the transceivers, known as wireless energy harvesting. Another application is that one can generate artificial noise to disrupt the adversarial eavesdropping, and guarantee the security of wireless networks. Therefore, conventional interference man…

wireless networksGeneral Computer ScienceComputer sciencenoise (radio technology)ComputerApplications_COMPUTERSINOTHERSYSTEMShäiriötInterference (communication)General Materials Sciencekohinakyberturvallisuusta213Wireless networkbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSGeneral EngineeringEavesdroppingTransmission (telecommunications)interferenceslcsh:Electrical engineering. Electronics. Nuclear engineeringTransceiverbusinessenergiantuotantolcsh:TK1-9971Energy harvestinglangattomat verkotComputer networkIEEE Access
researchProduct

Underwater Multirobot Cooperative Intervention MAC Protocol

2020

This work introduces a Medium Access Control (MAC) protocol designed to allow a group of underwater robots that share a wireless communication channel to effectively communicate with each other. The goal of the Underwater Multirobot Cooperative Intervention MAC (UMCI-MAC) protocol presented in this work is to minimize the end to end delay and the jitter. The access to the medium in UMCI-MAC follows a Time Division Multiple Access (TDMA) strategy which is arbitrated by a master, which also has the capability to prioritize the transmission of some nodes over the rest of the network. Two experiments have been carried out with a team of four Autonomous Underwater Vehicles (AUV) in order to comp…

wireless networksaccess protocolsGeneral Computer ScienceComputer scienceUnderwater communicationsEnd-to-end delayTime division multiple accessThroughput02 engineering and technologyteleroboticsTelecomunicació0203 mechanical engineering0202 electrical engineering electronic engineering information engineeringWirelessGeneral Materials ScienceJitterbusiness.industryNetwork packetWireless networkComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSGeneral Engineering020302 automobile design & engineering020206 networking & telecommunicationsApplication layerunderwater communicationslcsh:Electrical engineering. Electronics. Nuclear engineeringremotely operated vehiclesbusinessCommunications protocolRobotsProtocols de xarxes d'ordinadorslcsh:TK1-9971Underwater acoustic communicationComputer networkCommunication channelIEEE Access
researchProduct

Trajectory Design and Resource Allocation for Multi-UAV Networks : Deep Reinforcement Learning Approaches

2023

The future mobile communication system is expected to provide ubiquitous connectivity and unprecedented services over billions of devices. The unmanned aerial vehicle (UAV), which is prominent in its flexibility and low cost, emerges as a significant network entity to realize such ambitious targets. In this work, novel machine learning-based trajectory design and resource allocation schemes are presented for a multi-UAV communications system. In the considered system, the UAVs act as aerial Base Stations (BSs) and provide ubiquitous coverage. In particular, with the objective to maximize the system utility over all served users, a joint user association, power allocation and trajectory desi…

wireless networksreinforcement learningComputer Networks and Communicationssyväoppiminenmiehittämättömät ilma-aluksetcommunication systemsComputer Science ApplicationskoneoppiminenControl and Systems Engineeringtrajectoryresource managementautonomous aerial vehiclesthroughputlangattomat verkot
researchProduct

Precision Agriculture: Past, Present and Future

2011

From 1978 the Global Positioning System, needed for sensing the position of military targets (e.g. buildings, machinery), was developed as a pure military system, while in 1983 it was made available also for public use. Therefore, at the beginning of 80s precision agriculture, requiring GPS for sensing the position to which any measured field parameter must be geo-referenced, was implemented for the first time in US. In fact, soil and crop parameters are spatially variable in a field, so that spatially uniform rate crop input applications cause increased environmental impact and crop input waste. In order to reduce the environmental impact and optimise the use of crop inputs, precision agri…

within-field spatial variability GPS sensors yield mapping geo-referenced application of crop inputsSettore AGR/09 - Meccanica Agraria
researchProduct

Modelling and analysing oriented fibrous structures

2014

Abstract. A mathematical model for fibrous structures using a direction dependent scaling law is presented. The orientation of fibrous nets (e.g. paper) is analysed with a method based on the curvelet transform. The curvelet-based orientation analysis has been tested successfully on real data from paper samples: the major directions of fibrefibre orientation can apparently be recovered. Similar results are achieved in tests on data simulated by the new model, allowing a comparison with ground truth. peerReviewed

wood fibresREPRESENTATIONHistoryScaling lawGround truthMathematical modelfibrous structuresIMAGEComputer scienceOrientation (computer vision)Curvelet transformComputer Science ApplicationsEducationOrientation analysisPAPER111 MathematicsCurveletCONTINUOUS CURVELET TRANSFORMRepresentation (mathematics)AlgorithmJournal of Physics: Conference Series
researchProduct