Search results for "Hard"
showing 10 items of 2294 documents
Communication and security in communicating things networks
2020
International audience
Recent advances on security and privacy in intelligent transportation systems (ITSs)
2019
Ensuring the performance and scalability of peer-to-peer distributed virtual environments
2010
Large scale distributed virtual environments (DVEs) have become a major trend in distributed applications. Peer-to-peer (P2P) architectures have been proposed as an efficient and truly scalable solution for these kinds of systems. However, in order to design efficient P2P DVEs these systems must be characterized, measuring the impact of different client behavior on system performance. This paper presents the experimental characterization of P2P DVEs. The results show that the saturation of a given client has an exclusive effect on the surrounding clients in the virtual world, having no noticeable effect at all on the rest of clients. Nevertheless, the interactions among clients that can tak…
Adaptive time window linear regression algorithm for accurate time synchronization in wireless sensor networks
2015
In this article we propose a new algorithm for time synchronization in wireless sensor networks. The algorithm is based on linear regression to achieve long-term synchronization between the clocks of different network motes. Since motes are built using low-cost hardware components, usually their internal local clocks are not very accurate. In addition, there are other effects that affect the clock precision, such as: environmental conditions, supply voltage, aging, manufacturing process. Because some of these causes are external and unpredictable, the clock drift between two motes can change in a random way. Due to these changes, the optimum time window used for performing the linear regres…
Preface: Special issue on arc routing problems and other related topics
2020
Human Factor Interrelationships to Improve Worker Reliability: Implementation of MCDM in the Agri-Food Sector
2023
Performance Shaping Factors (PSFs) are contextual, individual, and cognitive factors used in Human Reliability Analysis (HRA) to quantify the worker contribution to errors when performing a generic task. Although the empirical evidence demonstrates the existence of PSF interrelationships, the majority of HRA methods assume their independence. As a consequence, the resulting Human Error Probability (HEP) might be over- or underestimated. To deal with this issue, only a few qualitative guidelines or statistical-based approaches have been proposed so far. While the former are not well structured, the latter require a high computational effort and a proper number of input data. Therefore, the p…
Exploring Lightweight Deep Learning Solution for Malware Detection in IoT Constraint Environment
2022
The present era is facing the industrial revolution. Machine-to-Machine (M2M) communication paradigm is becoming prevalent. Resultantly, the computational capabilities are being embedded in everyday objects called things. When connected to the internet, these things create an Internet of Things (IoT). However, the things are resource-constrained devices that have limited computational power. The connectivity of the things with the internet raises the challenges of the security. The user sensitive information processed by the things is also susceptible to the trusability issues. Therefore, the proliferation of cybersecurity risks and malware threat increases the need for enhanced security in…
A Survey on Particle Swarm Optimization for Association Rule Mining
2022
Association rule mining (ARM) is one of the core techniques of data mining to discover potentially valuable association relationships from mixed datasets. In the current research, various heuristic algorithms have been introduced into ARM to address the high computation time of traditional ARM. Although a more detailed review of the heuristic algorithms based on ARM is available, this paper differs from the existing reviews in that we expected it to provide a more comprehensive and multi-faceted survey of emerging research, which could provide a reference for researchers in the field to help them understand the state-of-the-art PSO-based ARM algorithms. In this paper, we review the existing…
Nonlinear Robust Control of a Quadratic Boost Converter in a Wide Operation Range, Based on Extended Linearization Method
2022
This paper proposes a control system for a quadratic boost DC/DC converter in a wide range of operations, based on an inner loop with a sliding mode controller, for reaching a desired equilibrium state, and an outer loop with integral-type controller, for assuring robustness against load and input voltage variations and converter parameter uncertainties. The sliding mode controller is designed with the extended linearization method and assures local asymptotic stability, whereas the integral controller is designed using classical frequency methods, and assures input–output stability. It is shown that the proposed controller also deals with the sudden changes in the nominal operating conditi…
Methodology for Structured Data-Path Implementation in VLSI Physical Design: A Case Study
2022
State-of-the-art modern microprocessor and domain-specific accelerator designs are dominated by data-paths composed of regular structures, also known as bit-slices. Random logic placement and routing techniques may not result in an optimal layout for these data-path-dominated designs. As a result, implementation tools such as Cadence’s Innovus include a Structured Data-Path (SDP) feature that allows data-path placement to be completely customized by constraining the placement engine. A relative placement file is used to provide these constraints to the tool. However, the tool neither extracts nor automatically places the regular data-path structures. In other words, the relative placement f…