Search results for "Intelligence"

showing 10 items of 6959 documents

Analyzing the performance of a cluster-based architecture for immersive visualization systems

2008

Cluster computing has become an essential issue for designing immersive visualization systems. This paradigm employs scalable clusters of commodity computers with much lower costs than would be possible with the high-end, shared memory computers that have been traditionally used for virtual reality purposes. This change in the design of virtual reality systems has caused some development environments oriented toward shared memory computing to require modifications to their internal architectures in order to support cluster computing. This is the case of VR Juggler, which is considered one of the most important virtual reality application development frameworks based on open source code. Thi…

Computer Networks and Communicationsbusiness.industryComputer scienceVirtual realityModular designcomputer.software_genreTheoretical Computer ScienceVisualizationShared memoryArtificial IntelligenceHardware and ArchitectureHuman–computer interactionComputer clusterScalabilityCluster (physics)Operating systemArchitecturebusinesscomputerSoftwareJournal of Parallel and Distributed Computing
researchProduct

An efficient hardware implementation of MQ decoder of the JPEG2000

2014

Abstract JPEG2000 is an international standard for still images intended to overcome the shortcomings of the existing JPEG standard. Compared to JPEG image compression techniques, JPEG2000 standard has not only better not only has better compression ratios, but it also offers some exciting features. As it’s hard to meet the real-time requirement of image compression systems by software, it is necessary to implement compression system by hardware. The MQ decoder of the JPEG2000 standard is an important bottleneck for real-time applications. In order to meet the real-time requirement we propose in this paper a novel architecture for a MQ decoder with high throughput which is comparable to tha…

Computer Networks and Communicationsbusiness.industryComputer sciencecomputer.file_formatFrame rateJPEGArtificial IntelligenceHardware and ArchitectureEmbedded systemJPEG 2000StratixOverhead (computing)businessField-programmable gate arraycomputerThroughput (business)SoftwareComputer hardwareImage compressionMicroprocessors and Microsystems
researchProduct

Dual-model approach for safety-critical embedded systems

2020

Abstract The paper presents the design of digital controllers based on two models: the Petri net model, and the UML state machine. These two approaches differ in many aspects of design flow, such as conceptual modelling, and analysis and synthesis. Each of these approaches can be used individually to design an efficient logic controller, and such solutions are well-known, but their interoperability can contribute to a much better understanding of logic controller design and validation. This is especially important in the case of safety- or life-critical embedded systems, and apart from this, a dual-model controller design can make up redundant system increasing its reliability.

Computer Networks and Communicationsbusiness.industryDual modelComputer scienceReliability (computer networking)020208 electrical & electronic engineeringInteroperabilityDesign flow02 engineering and technologyPetri net020202 computer hardware & architectureUML state machineArtificial IntelligenceHardware and ArchitectureControl theoryEmbedded system0202 electrical engineering electronic engineering information engineeringbusinessSoftwareMicroprocessors and Microsystems
researchProduct

Enabling early sleeping and early data transmission in wake-up radio-enabled IoT networks

2019

Abstract Wireless sensor networks (WSNs) are one of the key enabling technologies for the Internet of things (IoT). In such networks, wake-up radio (WuR) is gaining its popularity thanks to its on-demand transmission feature and overwhelming energy consumption superiority. Despite this advantage, overhearing still occurs when a wake-up receiver decodes the address of a wake-up call (WuC) which is not intended to it, causing a certain amount of extra energy waste in the network. Moreover, long latency may occur due to WuC address decoding since WuCs are transmitted at a very low data rate. In this paper, we propose two schemes, i.e., early sleeping (ES) and early data transmission (EDT), to …

Computer Networks and Communicationsbusiness.industryNetwork packetComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSTestbedLatency (audio)020206 networking & telecommunications02 engineering and technologyEnergy consumptionTransmission (telecommunications)0202 electrical engineering electronic engineering information engineeringKey (cryptography)020201 artificial intelligence & image processingbusinessWireless sensor networkVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Computer networkData transmission
researchProduct

A Predictive Approach for the Efficient Distribution of Agent-Based Systems on a Hybrid-Cloud

2018

International audience; Hybrid clouds are increasingly used to outsource non-critical applications to public clouds. However, the main challenge within such environments, is to ensure a cost-efficient distribution of the systems between the resources that are on/off premises. For Multi Agent Systems (MAS), this challenge is deepened due to irregular workload progress and intensive communication between the agents, which may result in high computing and data transfer costs. Thus, in this paper we propose a generic framework for adaptive cost-efficient deployment of MAS with a special focus on hybrid clouds. The framework is based mainly on the use of a performance evaluation process that con…

Computer Networks and Communicationsbusiness.industryProcess (engineering)Computer scienceAgent-Based SystemDistributed computingMulti-agent systemDeployment020206 networking & telecommunicationsCloud computingWorkload02 engineering and technologyOutsourcingHardware and ArchitectureSoftware deployment[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Prediction ProcessGraph partitioning algorithm0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingMetricsState (computer science)Hybrid CloudbusinessSoftware
researchProduct

Detecting Emotions in Comments on Forums

2014

The paper presents one of the most important issues in Natural Language Processing (NLP), emotion identification and classification to implement a computational technology based on existing resources, open-source or freely available for research purposes. Furthermore, we are interested to use it for establishing Gold standards in sentiment analysis area, such as SentiWordNet. In this sense, we propose to recognize and classify the emotions (sentiments) of the public consumer from the written texts which appeared on the various Forums. We analyse the writing style which refers to how consumers construct sentences together when they write comments to indicate their passion about an entity (pe…

Computer Networks and Communicationsbusiness.industryRomanianmedia_common.quotation_subjectPerspective (graphical)Sentiment analysisEmotion identificationPassionPublic relationslanguage.human_languageField (computer science)Computer Science ApplicationsComputational Theory and MathematicslanguageNatural (music)SociologyArtificial intelligencebusinessConstruct (philosophy)media_commonInternational Journal of Computers Communications & Control
researchProduct

An efficient distributed algorithm for generating and updating multicast trees

2006

As group applications are becoming widespread, efficient network utilization becomes a growing concern. Multicast transmission represents a necessary lower network service for the wide diffusion of new multimedia network applications. Multicast transmission may use network resources more efficiently than multiple point-to-point messages; however, creating optimal multicast trees (Steiner Tree Problem in networks) is prohibitively expensive. This paper proposes a distributed algorithm for the heuristic solution of the Steiner Tree Problem, allowing the construction of effective distribution trees using a coordination protocol among the network nodes. Furthermore, we propose a novel distribut…

Computer Networks and Communicationscomputer.internet_protocolComputer scienceDistributed computingNetwork ontology.Distance Vector Multicast Routing ProtocolMultimedia Broadcast Multicast ServiceSteiner tree problemTheoretical Computer Sciencesymbols.namesakeArtificial IntelligenceConvergence (routing)Multicast addressXcastCommunication complexityPragmatic General MulticastIntelligent systemSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniMulticast transmissionProtocol Independent MulticastMulticastInter-domainbusiness.industryNode (networking)Programmable networkComputer Graphics and Computer-Aided DesignSource-specific multicastHardware and ArchitectureDistributed algorithmNetwork serviceReliable multicastsymbolsSituation calculuIP multicastbusinesscomputerSoftwareComputer networkParallel Computing
researchProduct

A saturated strategy robustly ensures stability of the cooperative equilibrium for Prisoner's dilemma

2016

We study diffusion of cooperation in a two-population game in continuous time. At each instant, the game involves two random individuals, one from each population. The game has the structure of a Prisoner's dilemma where each player can choose either to cooperate (c) or to defect (d), and is reframed within the field of approachability in two-player repeated game with vector payoffs. We turn the game into a dynamical system, which is positive, and propose a saturated strategy that ensures local asymptotic stability of the equilibrium (c, c) for any possible choice of the payoff matrix. We show that there exists a rectangle, in the space of payoffs, which is positively invariant for the syst…

Computer Science::Computer Science and Game Theory0209 industrial biotechnologyControl and OptimizationSymmetric gameNormal-form gameStochastic gameSymmetric equilibrium02 engineering and technologyPrisoner's dilemma01 natural sciences010104 statistics & probability020901 industrial engineering & automationStrategySettore ING-INF/04 - AutomaticaArtificial IntelligenceRepeated gameDecision Sciences (miscellaneous)Simultaneous gameSettore MAT/09 - Ricerca Operativa0101 mathematicsMathematical economicsGames Sociology Statistics Trajectory Asymptotic stability Jacobian matricesArtificial Intelligence; Decision Sciences (miscellaneous); Control and OptimizationMathematics2016 IEEE 55th Conference on Decision and Control (CDC)
researchProduct

Recursive and bargaining values

2021

Abstract We introduce two families of values for TU-games: the recursive and bargaining values. Bargaining values are obtained as the equilibrium payoffs of the symmetric non-cooperative bargaining game proposed by Hart and Mas-Colell (1996). We show that bargaining values have a recursive structure in their definition, and we call this property recursiveness. All efficient, linear, and symmetric values that satisfy recursiveness are called recursive values. We generalize the notions of potential, and balanced contributions property, to characterize the family of recursive values. Finally, we show that if a time discount factor is considered in the bargaining model, every bargaining value h…

Computer Science::Computer Science and Game TheoryDiscountingSociologia matemàticaProperty (philosophy)ComputingMilieux_THECOMPUTINGPROFESSIONSociology and Political ScienceGeneral Social SciencesComputingMethodologies_ARTIFICIALINTELLIGENCEEconomia socialComputer Science::Multiagent SystemsComputingMilieux_COMPUTERSANDSOCIETYMatemàtica financeraEconomia Mètodes estadísticsStatistics Probability and UncertaintyValue (mathematics)Mathematical economicsGeneral PsychologyMathematics
researchProduct

Support vector machines in engineering: an overview

2014

This paper provides an overview of the support vector machine SVM methodology and its applicability to real-world engineering problems. Specifically, the aim of this study is to review the current state of the SVM technique, and to show some of its latest successful results in real-world problems present in different engineering fields. The paper starts by reviewing the main basic concepts of SVMs and kernel methods. Kernel theory, SVMs, support vector regression SVR, and SVM in signal processing and hybridization of SVMs with meta-heuristics are fully described in the first part of this paper. The adoption of SVMs in engineering is nowadays a fact. As we illustrate in this paper, SVMs can …

Computer Science::Machine LearningBeamformingData processingSignal processingGeneral Computer ScienceContextual image classificationComputer sciencebusiness.industryMachine learningcomputer.software_genreSupport vector machineComputingMethodologies_PATTERNRECOGNITIONKernel methodState (computer science)Artificial intelligenceData miningbusinesscomputerDecoding methodsWiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery
researchProduct