Search results for "Modeling"

showing 10 items of 4489 documents

Efficient distributed average consensus in wireless sensor networks

2020

International audience; Computing the distributed average consensus in Wireless Sensor Networks (WSNs) is investigated in this article. This problem, which is both natural and important, plays a significant role in various application fields such as mobile agents and fleet vehicle coordination, network synchronization, distributed voting and decision, load balancing of divisible loads in distributed computing network systems, and so on. By and large, the average consensus' objective is to have all nodes in the network converged to the average value of the initial nodes' measurements based only on local nodes' information states. In this paper, we introduce a fully distributed algorithm to a…

AtomicitySpeedupComputer Networks and CommunicationsSynchronization networksComputer sciencebusiness.industry020206 networking & telecommunications[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technologyEnergy consumptionLoad balancing (computing)[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]Consensus[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Distributed algorithm0202 electrical engineering electronic engineering information engineering[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]020201 artificial intelligence & image processing[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessWireless sensor networkComputer networkComputer Communications
researchProduct

The security of mobile business applications based on mCRM

2020

A development of mobile technologies, and their common use in business, creates new challenges for people dealing with data security in the organization. This paper explores the types and nature of threats to the enterprise that result from the widespread use of business applications on smartphones (e.g. mobile CRM). The analysis has been focused on smartphones and tablets running on the Android operating system. We used STRIDE - a threat modeling technique commonly used to detect vulnerabilities in software security. We propose its modification to better design and implement solutions for the security of mobile devices. We also used the Data Flow Diagram and the Attack Tree concept to anal…

Attack treesInformation securityComputer science05 social sciencesAttack treeData securityMobile application02 engineering and technologyInformation securityComputer securitycomputer.software_genreSoftware security assurance020204 information systems0502 economics and businessThreat model0202 electrical engineering electronic engineering information engineeringSecurityData Protection Act 1998050211 marketingMobile technologyThreat modelingMobile devicecomputermCRM
researchProduct

Robust H-Infinity Filter Design for Uncertain Linear Systems Over Network with Network-Induced Delays and Output Quantization

2009

This paper investigates a convex optimization approach to the problem of robust H-Infinity filtering for uncertain linear systems connected over a common digital communication network. We consider the case where quantizers are static and the parameter uncertainties are norm bounded. Firstly, we propose a new model to investigate the effect of both the output quantization levels and the network conditions. Secondly, by introducing a descriptor technique, using Lyapunov-Krasovskii functional and a suitable change of variables, new required sufficient conditions are established in terms of delay-dependent linear matrix inequalities (LMIs) for the existence of the desired network-based quantize…

AttenuationLinear systemoutput quantizationTelecommunications networklcsh:QA75.5-76.95Computer Science ApplicationsFilter designQuantization (physics)Exponential stabilityControl and Systems EngineeringControl theoryModeling and SimulationBounded functionFilter designConvex optimizationnetworklcsh:Electronic computers. Computer scienceSoftwareMathematicsModeling, Identification and Control
researchProduct

Metodi per la ricostruzione virtuale e la visualizzazione di opere d'architettura perdute

2022

Digital technologies for architecture representation have strongly modified uses and rules inherited from a millennial tradition. In the initial development period CAD tools worked as electronic drafting machines and digital drawings were almost similar to hand-made drawings; plans, fronts, sections and the like. In this period perspective and axonometric drawings were rarely executed because architects realized that these drawings had to be substituted by 3D digital models views, but modeling tools were not so familiar to professionals, both for software and hardware limitations. The evolution of architecture digital representation is still in progress, but it is possible to outline a prec…

Augmented RealityDigital RepresentationVirtual RealityPerspective restitutionSettore ICAR/17 - Disegno3D modeling
researchProduct

Database Versioning 2.0, a Transparent SQL Approach Used in Quantitative Management and Decision Making

2015

Abstract Managerial decisions are based on accurate information and in today's time raw data is produced even with a stroke of a key. Regardless of the data creating process one needs to know how the information was extracted and which pool of data was used. One important factor is time therefore we need to structure it in layers of data history in such a way that it can be analyzed, (post)process, in order to be able to retrieve valuable information. The simplest way is to use a Database Management System (DBMS), but even with such a management system we face the issue of making it a self-contained database on each version of data added. Our proposed system, a continuation of previous work…

AutocommitSQLPhysical data modelComputer scienceViewData definition languagecomputer.software_genreDatabase designDatabase testingData modelingDecision Making ;DBMSGeneral Environmental Sciencecomputer.programming_languageDatabase modelData administrationSQLDatabasebusiness.industryComponent-oriented databaseDatabase Logical Version ControlAnalyticsGeneral Earth and Planetary SciencesbusinessRaw datacomputerIntelligent databaseProcedia Computer Science
researchProduct

Automated Content Analysis of Destination Image: a Case Study

2020

Automated content analysis has become one of the most used approaches to extract “hidden” dimensions from text corpora over the last years. One of the data analysis techniques belonging to this approach is topic modeling, which can be fruitfully used to analyse complex phenomena like tourist destination image. With this aim in mind, this paper discusses the use of topic modeling to identify the main components of the image of cruise holidays spread through a specific type of visual text, i.e. the Television commercial. In order to achieve this goal, the paper presents the methodology and main results of a study carried out over a sample of TV commercials, which have recently been broadcast …

Automated content analysis Topic modeling Destination image Television commercials Cruise linesSettore SECS-S/05 - Statistica Sociale
researchProduct

Mathematical Methods in Image Processing and Computer Vision

2016

Image processing and computer vision are growing research fields that take advantage of the increasing power or modern computers linked with sophisticated techniques coming from many fields of expertise and in particular from mathematics. We present an introduction to some problems in computer vision and image processing and to some mathematical techniques and concepts that are nowadays routinely used to approach them.

Automatic image annotationbusiness.industryHuman visual system model3D reconstructionDigital image processingComputer vision and image processingComputer visionImage processingArtificial intelligenceImage analysisImage-based modeling and renderingbusiness
researchProduct

On the instability of an axially moving elastic plate

2010

Problems of stability of an axially moving elastic band travelling at constant velocity between two supports and experiencing small transverse vibrations are considered in a 2D formulation. The model of a thin elastic plate subjected to bending and tension is used to describe the bending moment and the distribution of membrane forces. The stability of the plate is investigated with the help of an analytical approach. In the frame of a general dynamic analysis, it is shown that the onset of instability takes place in the form of divergence (buckling). Then the static forms of instability are investigated, and critical regimes are studied as functions of geometric and mechanical problem param…

AxiallyPlateBendingAnalytical solutionsInstabilityDisplacement (vector)symbols.namesakeMaterials Science(all)Modelling and SimulationGeneral Materials ScienceMathematicsApplied MathematicsMechanical EngineeringInstabilityMechanicsCondensed Matter PhysicsPoisson's ratioTransverse planeClassical mechanicsBucklingElasticMechanics of MaterialsModeling and SimulationBending momentsymbolsMovingliikkuminenThinAxial symmetryInternational Journal of Solids and Structures
researchProduct

How does eating in the absence of hunger in children relate to child's BMI, inhibitory control and to maternal controlling feeding practices?

2021

International audience; Young children have an innate ability to self-regulate their food-intake by following their inner sensations of hunger and satiation. Children's temperamental traits and environmental factors, such as controlling feeding practices, can alter their self-regulation abilities and can induce weight gain in the long-term. The current study aimed to study how young children's eating in the absence of hunger (EAH) is related to their level of inhibitory control, body mass index (BMI) and maternal controlling feeding practices (food as reward, restriction for health, restriction for weight control). Mothers of 621 French children aged 2.00-6.97 years (51% boys, M = 4.11 year…

BMI[SDV.AEN] Life Sciences [q-bio]/Food and Nutritionpreschoolersself-regulation of eating[SDV.AEN]Life Sciences [q-bio]/Food and Nutritionstructural equation modelingmaternal feeding practices
researchProduct

Adaptive discontinuous evolution Galerkin method for dry atmospheric flow

2014

We present a new adaptive genuinely multidimensional method within the framework of the discontinuous Galerkin method. The discontinuous evolution Galerkin (DEG) method couples a discontinuous Galerkin formulation with approximate evolution operators. The latter are constructed using the bicharacteristics of multidimensional hyperbolic systems, such that all of the infinitely many directions of wave propagation are considered explicitly. In order to take into account multiscale phenomena that typically appear in atmospheric flows nonlinear fluxes are split into a linear part governing the acoustic and gravitational waves and a nonlinear part that models advection. Time integration is realiz…

Backward differentiation formulasteady statesPhysics and Astronomy (miscellaneous)Wave propagationdry atmospheric convectionlarge time stepsystems of hyperbolic balance lawssymbols.namesakeDiscontinuous Galerkin methodApplied mathematicsevolution Galerkin schemesGalerkin methodMathematicssemi-implicit approximationNumerical AnalysisAdaptive mesh refinementApplied MathematicsEuler equationsRiemann solverComputer Science ApplicationsEuler equationsComputational MathematicsNonlinear systemClassical mechanicsModeling and SimulationsymbolsJournal of Computational Physics
researchProduct