Search results for "Distributed"

showing 10 items of 1260 documents

Joint routing and per-flow fairness in wireless multihop networks

2008

In wireless multihop networks communication between two end-nodes is carried out by hopping over multiple short wireless links. Traditional CSMA/CA based media access control does not work satisfactory in a multihop scenario, since an intended target of a communication may be subject to mutual interference imposed by concurrent transmissions from nodes which cannot directly sense each other, causing unfair throughput allocation. Although TDMA seems to be a more promising solution, careful transmission scheduling is needed in order to achieve error-free communication and fairness. In our previous work, a TDMA scheduling algorithm has been proposed that schedules the transmissions in a fair m…

business.industryComputer scienceDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSTime division multiple accessData_CODINGANDINFORMATIONTHEORYLoad balancing (computing)Network topologyScheduling (computing)WLANroutingMedia access controlWirelessMaximum throughput schedulingbusinessWireless sensor networkComputer network
researchProduct

Deep Learning for Resource-Limited Devices

2020

In recent years, deep neural networks have revolutionized the development of intelligent systems and applications in many areas. Despite their numerous advantages and potentials, these intelligent models still suffer from several issues. Among them, the fact that they became very complex with millions of parameters. That is, requiring more resources and time, and being unsuitable for small restricted devices. To contribute in this direction, this paper presents (1) some state-of-the-art lightweight architectures that were specifically designed for small-sized devices, and (2) some recent solutions that have been proposed to optimize/compress classical deep neural networks to allow their dep…

business.industryComputer scienceDistributed computingDeep learningIntelligent decision support systemRedundancy (engineering)InitializationArtificial intelligencePruning (decision trees)businessAdaptation (computer science)Quantization (image processing)Convolutional neural networkProceedings of the 16th ACM Symposium on QoS and Security for Wireless and Mobile Networks
researchProduct

Psychological Influence of Double-Bind Situations in Human-Agent Interaction

2007

This paper presents a new approach to integrate artificial intelligence in virtual environments. The system presented deals in a separated way the visualization and intelligence modules, applying in this last case a distributed approach (multi-agent systems) so that scalable applications may be built. Therefore, it is necessary to define agent architectures that allow agents to be integrated in the VW. Thus, a designer is abstracted from the peculiarities of interacting with a virtual environment. There is a first prototype of the framework using JADE as the supporting multi-agent systems platform.

business.industryComputer scienceDistributed computingMulti-agent systemJADE (programming language)Virtual realitycomputer.software_genreVisualizationData visualizationSoftware agentVirtual machineScalabilitybusinesscomputercomputer.programming_language2007 IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT'07)
researchProduct

Optimizing the Use of an Integrated LMS: Hardware Evolution through Distributed Computing. Experience from the Universitat de València

2009

The advent of the Internet has opened a scope for research in new methods and tools that may facilitate the teaching and learning processes. This has, in turn, led to the development of learning platforms to support teaching and learning activities. Nowadays most universities provide their academic community with some form of a learning management system (LMS). To achieve the optimal use of such type of systems, they must integrate all their academic community and preexisting applications at its institutions. These complex objectives can be reached by using a robust architecture, preferably an open system, based on distributed computing. In this paper, we expose the Universitat de Valencia …

business.industryComputer scienceDistributed computingOpen system (computing)Academic communityLearning ManagementThe InternetArchitecturebusinessComputer hardware
researchProduct

On Unstructured File Sharing Networks

2007

We study the interaction among users of unstructured file sharing applications, who compete for available network resources (link bandwidth or capacity) by opening multiple connections on multiple paths so as to accelerate data transfer. We model this interaction with an unstructured file sharing game. Users are players and their strategies are the numbers of sessions on available paths. We consider a general bandwidth sharing framework proposed by Kelly [1] and Mo and Walrand [2], with TCP as a special case. Furthermore, we incorporate the Tit-for-Tat strategy (adopted by BitTorrent [3] networks) into the unstructured file sharing game to model the competition in which a connection can be …

business.industryComputer scienceDistributed computingcomputer.file_formatTit for tatsymbols.namesakeBandwidth allocationFile sharingNash equilibriumsymbolsResource allocationThe InternetbusinessBitTorrentcomputerGame theoryComputer network
researchProduct

Evolutionary approach to coverage testing of IEC 61499 function block applications

2015

The paper addresses the problem of coverage testing of industrial automation software represented in the IEC 61499 standard, one of the recent standards for distributed control system design. Contrary to model-based testing (MBT), the paper focuses on implementation coverage, not model coverage. An approach based on evolutionary algorithms is presented which generates coverage test suites for both basic and composite IEC 61499 function blocks. It employs two third-party tools, FBDK and EvoSuite. The evaluation of the approach was performed on a set of control applications for two lab-scale demonstration plants. Results show that the approach is applicable and shows good performance at least…

business.industryComputer scienceEvolutionary algorithmAutomationEvolutionary computationReliability engineeringSet (abstract data type)SoftwareUnified Modeling LanguageBlock (programming)Software engineeringbusinessDistributed control systemcomputercomputer.programming_language2015 IEEE 13th International Conference on Industrial Informatics (INDIN)
researchProduct

Improving the multiple errors detection coverage in distributed embedded systems

2004

Currently, a lot of critical applications in automobile and aircraft avionics are built on fault-tolerant real-time distributed embedded systems. Fault injection techniques have been used extensively in the experimental validation of these systems and it is a challenge to adapt them to the demands of new technologies. This paper deals with the effect of physical faults at pin level on the Communication Network Interface in a prototype based on time-triggered architecture. Due to the essential necessity of observing system behavior during injection experiments, a suitable monitor for distributed embedded systems is proposed. The monitor is used to detect failures in the value domain that cou…

business.industryComputer scienceInterface (computing)Distributed computingControl (management)Real-time computingFault injectionAvionicsSystem monitoringTelecommunications networkDomain (software engineering)Embedded systemCode (cryptography)business22nd International Symposium on Reliable Distributed Systems, 2003. Proceedings.
researchProduct

A PLC based monitoring and remote control architecture for Distributed Generation and Storage systems in LV smart grids

2021

(Abstract) This paper proposes a new power line communication (PLC) architecture for monitoring and remote control of Distributed Generators (DG) and Energy Storage Systems (ESS) connected to low voltage distribution networks. The final aim is to improve the performance of the PLC link in terms of robustness and efficiency in devices addressing. The proposed solution is based on a concentrator, to be installed in secondary substation, and a new PLC bridge, to be linked both to inverters and interface protection systems of DGs or ESSs. In this way, a communication link is obtained between distribution system operator (DSO) and DG or ESS owners. The proposed system is able to provide advanced…

business.industryComputer scienceInterface (computing)Electrical engineeringConcentratorlaw.inventionPower-line communicationSmart gridRobustness (computer science)lawDistributed generationInverterbusinessRemote control2021 IEEE 6th International Forum on Research and Technology for Society and Industry (RTSI)
researchProduct

Implementation and Experimental Tests of a Management System for MV/LV Distribution Grids

2019

The continuous monitoring of network power flows and the remote control of Distributed Generators and Energy Storage Systems are the essential elements to allow a full exploitation of Renewable Energy Sources and their real integration in distribution networks. Thus in the paper a management system is presented for load flow monitoring in MV/LV distribution network. Moreover, on the basis of calculated power flows, the management system is able to send control commands to DGs and ESSs, to vary their power production or power factor or eventually to disconnect them in order to maintain the network stability. The proposed solution was really implemented in the MV network of Ustica Island, dev…

business.industryComputer scienceLoad flow020209 energy020208 electrical & electronic engineeringContinuous monitoringElectrical engineeringSmart grid02 engineering and technologyPower factorEnergy storageRenewable energylaw.inventionSCADAlawMobile stationPower system measurement0202 electrical engineering electronic engineering information engineeringDistributed generationbusinessSettore ING-INF/07 - Misure Elettriche E ElettronicheLow voltageRemote control2019 International Conference on Clean Electrical Power (ICCEP)
researchProduct

A simulation study of load balancing algorithms in cellular packet networks

2001

This paper provides a comparative performance evaluation of various load balancing schemes in cellular packet networks. With respect to traditional schemes, that measure each cell load in terms of number of admitted calls, our schemes use supplementary packet level information, expressed in terms of effective resource consumption of each individual call when retransmission mechanisms are employed. The simulation model adopted is based on a toroidal cellular network topology, to avoid border effects affecting the numerical results.

business.industryComputer scienceNetwork packetDistributed computingRetransmissionCellular networkLoad balancing (computing)Resource consumptionbusinessComputer network
researchProduct