Search results for "Communications protocol"

showing 6 items of 76 documents

A distributed visualization system for crowd simulations1

2011

The visualization system of large-scale crowd simulations should scale up with both the number of visuals views of the virtual world and the number of agents displayed in each visual. Otherwise, we could have large scale crowd simulations where only a small percentage of the population is displayed. Several approaches have been proposed in order to efficiently render crowds of animated characters. However, these approaches either render crowds animated with simple behaviors or they can only support a few hundreds of user-driven entities. In this paper, we propose a distributed visualization system for large crowds of autonomous agents that allows the visualization of crowds animated with co…

education.field_of_studySIMPLE (military communications protocol)Computer scienceAutonomous agentPopulationComputer Science ApplicationsTheoretical Computer ScienceVisualizationCrowdsComputational Theory and MathematicsArtificial IntelligenceHuman–computer interactionComputer graphics (images)ServerOverhead (computing)Crowd simulationeducationSoftwareIntegrated Computer-Aided Engineering
researchProduct

Security in Modern Smart Cities: An Information Technology Perspective

2019

In a big and modern city, the security system is not a single-layered single module system. Instead, it consists of many layers with autonomous subsystems which are capable of interfacing reciprocally in an efficient and coordinated way horizontally and vertically. The design of such indigenous subsystems and ensuring tight interaction between them while taking into account high usability and resource utilization is not a simple task. In this regard, this article provides a comprehensive overview of the security systems in smart cities. We begin by introducing trends and key stakeholders in smart cities. Next, we provide examples of mass surveillance systems in developed countries like the …

mass surveillancesmart citiesSIMPLE (military communications protocol)turvallisuusComputer sciencebusiness.industryInformation technologyUsabilityCloud computingsecuritysuurkaupungitIndigenousTask (project management)Engineering managementautonomous systemsInterfacingKey (cryptography)älytekniikkatarkkailubusiness2019 2nd International Conference on Communication, Computing and Digital systems (C-CODE)
researchProduct

Value Creation and Evolution of a Value Network: A Longitudinal Case Study on a Platform-as-a-Service Provider

2014

Current research on cloud computing emphasizes the important role of Platform-as-a-Service (PaaS) providers. However, little is known about how PaaS providers can offer value to the content providers and firms operating the platform. The findings demonstrate how a small PaaS provider in the cloud gaming market was able to develop a strong position in the value network by offering direct and indirect value to its partners. The findings also reveal how the firm developed its value network over fourteen years, from a complex network with several actors to a very simple value network which included only partners of prime importance. peerReviewed

ta113Knowledge managementSIMPLE (military communications protocol)business.industrySoftware as a serviceCloud computingBusiness valueComplex networkvalue crationPlatform-as-a-Servicevalue networkValue networkValue (economics)Position (finance)BusinessMarketing2014 47th Hawaii International Conference on System Sciences
researchProduct

BioImageXD: an open, general-purpose and high-throughput image-processing platform

2012

BioImageXD puts open-source computer science tools for three-dimensional visualization and analysis into the hands of all researchers, through a user-friendly graphical interface tuned to the needs of biologists. BioImageXD has no restrictive licenses or undisclosed algorithms and enables publication of precise, reproducible and modifiable workflows. It allows simple construction of processing pipelines and should enable biologists to perform challenging analyses of complex processes. We demonstrate its performance in a study of integrin clustering in response to selected inhibitors.

ta113SIMPLE (military communications protocol)Computer sciencebusiness.industryta1182Computational BiologyImage processingCell BiologyBioinformaticsBiochemistryVisualizationHigh-Throughput Screening AssaysUser-Computer InterfaceSoftwareWorkflowImaging Three-DimensionalHuman–computer interactionbusinessCluster analysisMolecular BiologyThroughput (business)AlgorithmsSoftwareBiotechnologyGraphical user interfaceNATURE METHODS
researchProduct

An efficient cluster-based outdoor user positioning using LTE and WLAN signal strengths

2015

In this paper we propose a novel cluster-based RF fingerprinting method for outdoor user-equipment (UE) positioning using both LTE and WLAN signals. It uses a simple cost effective agglomerative hierarchical clustering with Davies-Bouldin criterion to select the optimal cluster number. The positioning method does not require training signature formation prior to UE position estimation phase. It is capable of reducing the search space for clustering operation by using LTE cell-ID searching criteria. This enables the method to estimate UE positioning in short time with less computational expense. To validate the cluster-based positioning real-time field measurements were collected using readi…

ta113SIMPLE (military communications protocol)business.industryComputer scienceReal-time computingLTE cell-IDFingerprint recognitionGridminimization of drive testsDetermining the number of clusters in a data setEmbedded systemgrid-based RF fingerprintingRadio frequencybusinessCluster analysishierarchical clustering
researchProduct

Underwater Multirobot Cooperative Intervention MAC Protocol

2020

This work introduces a Medium Access Control (MAC) protocol designed to allow a group of underwater robots that share a wireless communication channel to effectively communicate with each other. The goal of the Underwater Multirobot Cooperative Intervention MAC (UMCI-MAC) protocol presented in this work is to minimize the end to end delay and the jitter. The access to the medium in UMCI-MAC follows a Time Division Multiple Access (TDMA) strategy which is arbitrated by a master, which also has the capability to prioritize the transmission of some nodes over the rest of the network. Two experiments have been carried out with a team of four Autonomous Underwater Vehicles (AUV) in order to comp…

wireless networksaccess protocolsGeneral Computer ScienceComputer scienceUnderwater communicationsEnd-to-end delayTime division multiple accessThroughput02 engineering and technologyteleroboticsTelecomunicació0203 mechanical engineering0202 electrical engineering electronic engineering information engineeringWirelessGeneral Materials ScienceJitterbusiness.industryNetwork packetWireless networkComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSGeneral Engineering020302 automobile design & engineering020206 networking & telecommunicationsApplication layerunderwater communicationslcsh:Electrical engineering. Electronics. Nuclear engineeringremotely operated vehiclesbusinessCommunications protocolRobotsProtocols de xarxes d'ordinadorslcsh:TK1-9971Underwater acoustic communicationComputer networkCommunication channelIEEE Access
researchProduct