Search results for "Computer network"
showing 10 items of 1634 documents
AIOC2: A deep Q-learning approach to autonomic I/O congestion control in Lustre
2021
Abstract In high performance computing systems, I/O congestion is a common problem in large-scale distributed file systems. However, the current implementation mainly requires administrator to manually design low-level implementation and optimization, we proposes an adaptive I/O congestion control framework, named AIOC 2 , which can not only adaptively tune the I/O congestion control parameters, but also exploit the deep Q-learning method to start the training parameters and optimize the tuning for different types of workloads from the server and the client at the same time. AIOC 2 combines the feedback-based dynamic I/O congestion control and deep Q-learning parameter tuning technology to …
An Augmented Reality (AR) CAD System at Construction Sites
2011
Augmented Reality (AR) technologies allow computer-generated content to be superimposed over a live camera view of the real world. Although AR is still a very promising technology, currently only a few commercial applications for industrial purposes exploit the potential of adding contextual content to real scenarios. Most of AR applications are oriented to fields such as education or entertainment, where the requirements in terms of repeatability, fault tolerance, reliability and safety are low. Different visualization devices, tracking methods and interaction techniques are described in the literature, establishing a classification between Indoor and Outdoor AR systems. On the one hand, t…
Performance of LoRa for Bike-Sharing Systems
2019
Today bike sharing systems are becoming popular in many cities as short-distance transit vehicles. More than 18 million bicycles are available worldwide for public use and one of the main problems that afflicts such sharing systems is the loss of bikes, which can be stolen or simply left in unknown locations. Thus, many bikes are docked or tracked using GPS and costly cellular connections. In this paper, we consider the emerging Long Range (LoRa) technology for use in bike sharing systems. LoRa exploits free ISM bands and has been conceived for low power and low data rate applications. Additionally, LoRa is characterized by large cells and heterogeneous application domains, which may lead t…
A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments
2007
A man-in-the-middle (MitM) attack is, in the scope of a LAN, a technique where an attacker is able to redirect all traffic between two hosts of that same LAN for packet sniffing or data manipulation, without the end hosts being aware of it. Usually these attacks exploit security flaws in the implementation of the ARP protocol at hosts. Up to now, detecting such attacks required setting up a machine with special-purpose software for this task. As an additional problem, few intrusion detection systems (IDS) are able to prevent MitM attacks. In this work we present a low-cost embedded IDS which, when plugged into a switch or hub, is able to detect and/or prevent MitM attacks automatically and …
Licensed and Unlicensed Spectrum Management for Energy-Efficient Cognitive M2M
2020
Edge computing has emerged as a promising solution for relieving the tension between resource-limited MTDs and computational-intensive tasks. To realize successful task offloading with limited spectrum, we focus on the cognitive machine-to-machine (CM2M) paradigm which enables a massive number of MTDs to either opportunistically use the licensed spectrum that is temporarily available, or to exploit the under-utilized unlicensed spectrum. We formulate the channel selection problem with both licensed and unlicensed spectrum as an adversarial multi-armed bandit (MAB) problem, and combine the exponential-weight algorithm for exploration and exploitation (EXP3) and Lyapunov optimization to devel…
DEMO: Unconventional WiFi-ZigBee communications without gateways
2014
Nowadays, the overcrowding of ISM bands is becoming an evident limitation for the performance and widespread usage of 802.11 and 802.15.4 technologies. In this demo, we prove that it is possible to opportunistically exploit the inter-technology interference between 802.11 and 802.15.4 to build an unconventional low-rate communication channel and signalling protocol, devised to improve the performance of each contending technology. Differently from previous solutions, inter-technology communications do not require the deployment of a gateway with two network interfaces, but can be activated (when needed) directly between two heterogeneous nodes, e.g. a WiFi node and a ZigBee node. This capab…
Enabling Backoff for SCM Wake-Up Radio: Protocol and Modeling
2017
In sub-carrier modulation (SCM) wake-up radio (WuR) enabled wireless sensor networks, a node can initiate data transmission at any instant of time. In this letter, we propose to activate a backoff procedure before sending wake-up calls (WuCs) in order to avoid potential collisions among WuCs. Consequently, no backoff is needed for the main radio after a WuC is received. A discrete-time Markov chain model is developed to evaluate the performance. Numerical results on network throughput, energy efficiency, average delay, and collision probability reveal the benefits of enabling backoff for SCM-WuRs, especially under heavy traffic loads or saturated traffic conditions.
A gap analysis of Internet-of-Things platforms
2016
We are experiencing an abundance of Internet-of-Things (IoT) middleware solutions that provide connectivity for sensors and actuators to the Internet. To gain a widespread adoption, these middleware solutions, referred to as platforms, have to meet the expectations of different players in the IoT ecosystem, including device providers, application developers, and end-users, among others. In this article, we evaluate a representative sample of these platforms, both proprietary and open-source, on the basis of their ability to meet the expectations of different IoT users. The evaluation is thus more focused on how ready and usable these platforms are for IoT ecosystem players, rather than on t…
FIRST
2018
Thanks to the collective action of participating smartphone users, mobile crowdsensing allows data collection at a scale and pace that was once impossible. The biggest challenge to overcome in mobile crowdsensing is that participants may exhibit malicious or unreliable behavior, thus compromising the accuracy of the data collection process. Therefore, it becomes imperative to design algorithms to accurately classify between reliable and unreliable sensing reports. To address this crucial issue, we propose a novel Framework for optimizing Information Reliability in Smartphone-based participaTory sensing (FIRST) that leverages mobile trusted participants (MTPs) to securely assess the reliabil…
Optimized Kernel Entropy Components
2016
This work addresses two main issues of the standard Kernel Entropy Component Analysis (KECA) algorithm: the optimization of the kernel decomposition and the optimization of the Gaussian kernel parameter. KECA roughly reduces to a sorting of the importance of kernel eigenvectors by entropy instead of by variance as in Kernel Principal Components Analysis. In this work, we propose an extension of the KECA method, named Optimized KECA (OKECA), that directly extracts the optimal features retaining most of the data entropy by means of compacting the information in very few features (often in just one or two). The proposed method produces features which have higher expressive power. In particular…