Search results for "Computer network"
showing 10 items of 1634 documents
A Non-Local Mode-I Cohesive Model for Ascending Thoracic Aorta Dissections (ATAD)
2018
This paper presents a non-local interface mechanical model to describe aortic dissection. In this regard, the mode-I debonding problem based on a cohesive zone modeling is endowed with non-local terms to include long-range interactions that are present in multi-layered biological tissue. Such non-local effects are related to the collagen fibers that transmit forces between non-adjacent elements. Numerical simulations are provided with different values of the non-local parameters in order to show the effect of the non-locality during the debonding processes.
Multi-objective optimization for computation offloading in mobile-edge computing
2017
Mobile-edge cloud computing is a new cloud platform to provide pervasive and agile computation augmenting services for mobile devices (MDs) at anytime and anywhere by endowing ubiquitous radio access networks with computing capabilities. Although offloading computations to the cloud can reduce energy consumption at the MDs, it may also incur a larger execution delay. Usually the MDs have to pay cloud resource they used. In this paper, we utilize queuing theory to bring a thorough study on the energy consumption, execution delay and price cost of offloading process in a mobile-edge cloud system. Specifically, both wireless transmission and computing capabilities are explicitly and jointly co…
Does ns2 Really Simulate MPLS Networks?
2008
Multi Protocol Label Switching (MPLS) is being used in many corporate networks and public infrastructures and as a backbone technology of many Autonomous Systems. Because of its importance, what is needed is to find out simulators able to simulate MPLS networks whose results reflect the real environment as much as possible. In this article, we will show real measurements from the Railway Infrastructure Administrator (ADIF, the Spanish railway infrastructure manager) MPLS network and we will compare them with the results obtained by the freeware simulator ns2. We will check the level of reliability provided by the simulator and we will know under which parameters its results will be similar …
An Optimized Architecture for CGA Operations and Its Application to a Simulated Robotic Arm
2022
Conformal geometric algebra (CGA) is a new geometric computation tool that is attracting growing attention in many research fields, such as computer graphics, robotics, and computer vision. Regarding the robotic applications, new approaches based on CGA have been proposed to efficiently solve problems as the inverse kinematics and grasping of a robotic arm. The hardware acceleration of CGA operations is required to meet real-time performance requirements in embedded robotic platforms. In this paper, we present a novel embedded coprocessor for accelerating CGA operations in robotic tasks. Two robotic algorithms, namely, inverse kinematics and grasping of a human-arm-like kinematics chain, ar…
StateOS : A Memory-Efficient Hybrid Operating System for IoT Devices
2023
The increasing significance of operating systems (OSs) in the development of the internet of things (IoT) has emerged in the last decade. An event-driven OS is memory efficient and suitable for resource-constrained IoT devices and wireless sensors, although the program’s control flow, which is determined by events, is not always obvious. A multithreaded OS with sequential control flow is often considered clearer. However, this approach is memory-consuming. A hybrid OS seeks to combine the strengths of the event-driven approach with multithreaded approach. An event-driven cooperative threaded OS represents a hybrid approach that supports concurrency by explicitly yielding control to another …
The Effect of Damage Functions on Urban Flood Damage Appraisal
2014
Flooding damage appraisal can been obtained by interpolating real damage data caused by historical flooding events or accounting the effects of a flood in terms of the depreciation of assets. Most often, the expected damage is evaluated by means of damage functions describing the relationship occurring between the damage and hydraulic characteristics of flood. The present paper aims to evaluate the uncertainty linked to the choice of the depth-damage function adopted in the flood damage analysis. Several possible depth-damage function formulations were selected in literature and applied to historical flooding events monitored in the "Centro Storico" catchment in Palermo (Italy). (C) 2013 Th…
Col : A Data Collection Protocol for Vanet
2012
International audience; In this paper, we present a protocol to collect data within a vehicular ad hoc network (VANET). In spite of the intrinsic dynamic of such network, our protocol simultaneously offers three relevant properties: (1) It allows any vehicle to collect data beyond its direct neighborhood (i.e., vehicles within direct communication range) using vehicle-to-vehicle communications only (i.e., the infrastructure is not required); (2) It tolerates possible network partitions; (3) It works on demand and stops when the data collection is achieved. To the best of our knowledge, this is the first collect protocol having these three characteristics. All that is chiefly obtained thanks…
UAV-Assisted Data Collection in Wireless Sensor Networks: A Comprehensive Survey
2021
Wireless sensor networks (WSNs) are usually deployed to different areas of interest to sense phenomena, process sensed data, and take actions accordingly. The networks are integrated with many advanced technologies to be able to fulfill their tasks that is becoming more and more complicated. These networks tend to connect to multimedia networks and to process huge data over long distances. Due to the limited resources of static sensor nodes, WSNs need to cooperate with mobile robots such as unmanned ground vehicles (UGVs), or unmanned aerial vehicles (UAVs) in their developments. The mobile devices show their maneuverability, computational and energy-storage abilities to support WSNs in mul…
Predicting the availability of users' devices in Decentralized Online Social Networks
2018
The understanding of the user temporal behavior is a crucial aspect for all those systems that rely on user resources for daily operations, such as decentralized online social networks (DOSNs). Indeed, DOSNs exploit the devices of their users to take on and share the tasks needed to provide services such as storing the published data. In the last years, the increasing popularity of DOSN services has changed the way of how people interact with each other by enabling users to connect to these services at any time by using their personal devices (such as notebooks or smartphones). As a result, the availability of data in these systems is strongly affected (or reflected) by the temporal behavio…
Wireless Sensor Network Operating System Design Rules Based on Real-World Deployment Survey
2013
Wireless sensor networks (WSNs) have been a widely researched field since the beginning of the 21st century. The field is already maturing, and TinyOS has established itself as the de facto standard WSN Operating System (OS). However, the WSN researcher community is still active in building more flexible, efficient and user-friendly WSN operating systems. Often, WSN OS design is based either on practical requirements of a particular research project or research group's needs or on theoretical assumptions spread in the WSN community. The goal of this paper is to propose WSN OS design rules that are based on a thorough survey of 40 WSN deployments. The survey unveils trends of WSN applic…