Search results for "NETWORK"

showing 10 items of 7718 documents

Optimum design for work-hardening adaptation

1977

Abstract The finite element-linear programming approach and the work-hardening adaptation criterion are used to formulate a general theory of optimum design of rigid-work-hardening structures subjected to loads which vary statically within given limits. Self-weight, as well as some technological constraints, can be introduced into the framework of the optimization problem. The optimality conditions are discussed with the aid of geometrical descriptions as well, and a comparison is made with the standard limit design. Numerical applications are given for a plane truss and a plane frame with axial force-bending moment interaction.

EngineeringMathematical optimizationOptimization problemPlane (geometry)business.industryMechanical EngineeringFrame (networking)Computational MechanicsGeneral Physics and AstronomyTrussWork hardeningComputer Science ApplicationsMoment (mathematics)Mechanics of MaterialsLimit (mathematics)businessAdaptation (computer science)Computer Methods in Applied Mechanics and Engineering
researchProduct

New novel idea for Cloud Computing: How can we use Kalman filter in security of Cloud Computing

2012

Cloud is a virtual image about some amount of undefined powers, that is widespread and had unknown power and inexact amount of hardware and software configurations, and because of we have not any information about clouds location and time dimensions and also the amounts of its sources we tell that Cloud Computing. This technology presents lots of abilities and opportunities such as processing power, storage and accessing it from everywhere, supporting, working - team group - with the latest versions of software and etc., by the means of internet. On the other hand, in such a large scale networks we should consider the reliability and powerfulness of such networks in facing with events such …

SoftwareUtility computingFilter (video)Computer sciencebusiness.industryReliability (computer networking)Distributed computingCloud testingThe InternetCloud computingKalman filterbusiness2012 6th International Conference on Application of Information and Communication Technologies (AICT)
researchProduct

Students' satisfaction with their host city: case of Jelgava, Latvia

2019

SociologySocioeconomicsHost (network)Engineering for Rural Development
researchProduct

Forecasting Changes in Religiosity and Existential Security with an Agent-Based Model

2018

We employ existing data sets and agent-based modeling to forecast changes in religiosity and existential security among a collective of individuals over time. Existential security reflects the extent of economic, socioeconomic and human development provided by society. Our model includes agents in social networks interacting with one another based on the education level of the agents, the religious practices of the agents, and each agent's existential security within their natural and social environments. The data used to inform the values and relationships among these variables is based on rigorous statistical analysis of the International Social Survey Programme Religion Module (ISSP) and…

Agent-based model060303 religions & theologySocial networkbusiness.industryHuman Development ReportGeneral Social Sciences06 humanities and the artsInternational Social Survey Programme0603 philosophy ethics and religionHuman development (humanity)HomophilyReligiosityComputer Science (miscellaneous)060301 applied ethicsbusinessPsychologySocial psychologySocial influenceJournal of Artificial Societies and Social Simulation
researchProduct

RoadMic: Road Surface Monitoring Using Vehicular Sensor Networks with Microphones

2010

Road surface analysis including pothole reports is an important problem for road maintainers and drivers. In this paper we propose a methodology for pothole detection using mobile vehicles equipped with off the shelf microphone and global positioning devices attached to an on-board computer. The approach is generic enough to be extended for other kind of event detection using different sensors as well. The vehicles are driving on public streets and measuring pothole induced sound signals. Our approach was tested and evaluated by real world experiments in a road segment for which we had established the ground truth beforehand. The results show pothole detection with high accuracy despite the…

Background noiseComputer scienceMicrophonebusiness.industryComputerSystemsOrganization_MISCELLANEOUSElectro-optical sensorRoad surfaceReal-time computingGlobal Positioning SystemMobile wireless sensor networkPotholebusinessWireless sensor network
researchProduct

A privacy enhanced device access protocol for an IoT context

2013

In this paper, we present the case for a device authentication protocol that authenticates a device/service class rather than an individual device. The devices in question are providing services available to the public. The proposed protocol is an online protocol, and it uses a pseudo-random temporary identity scheme to provide user privacy. This allows the Internet-of-Things device to have full assurance of the user, with respect to the request service, while permitting the user to remain anonymous with respect to the device. The user can then enjoy identity and location privacy in addition to untraceability with respect to device access. Copyright © 2013 John Wiley & Sons, Ltd.

Service (business)Challenge-Handshake Authentication ProtocolAuthenticationComputer Networks and CommunicationsComputer science020206 networking & telecommunicationsContext (language use)02 engineering and technologyComputer securitycomputer.software_genreAuthentication protocol0202 electrical engineering electronic engineering information engineeringIdentity (object-oriented programming)020201 artificial intelligence & image processingKey derivation functionProtocol (object-oriented programming)computerInformation SystemsSecurity and Communication Networks
researchProduct

Subjective Evaluation of Video on Demand Systems Using Different Network Connections

2009

Nowadays, society makes use of new technologies as they appear. Due to this boom, the use of resources via web is increasing notably. In of training and education cases, companies such as universities are offering tele-learning platforms to complement and facilitate the learning process. Some of these called e-learning platforms can have explanatory videos as a resource for training. For the codification of these videos, we have to use parameters which provide a trade-off between the video sizes to be transmitted that optimize bandwidth and video and audio quality. This paper presents a subjective study of the video quality on transmission depending on the types of users’ network access to …

Access networkMultimediaComputer scienceInteractive videoWireless networkbusiness.industryVideo qualitycomputer.software_genreResource (project management)ServerThe InternetSound qualitybusinesscomputer2009 First International Conference on Intensive Applications and Services
researchProduct

Robust l2-gain control for 2D nonlinear stochastic systems with time-varying delays and actuator saturation

2013

Abstract This paper is concerned with the problems of stability analysis and l2-gain control for a class of two-dimensional (2D) nonlinear stochastic systems with time-varying delays and actuator saturation. Firstly, a convex hull representation is used to describe the saturation behavior, and a sufficient condition for the existence of mean-square exponential stability of the considered system is derived. Then, a state feedback controller which guarantees the resulting closed-loop system to be mean-square exponentially stable with l2-gain performance is proposed, and an optimization procedure to maximize the estimation of domain of attraction is also given. All the obtained results are for…

Convex hullComputer Networks and CommunicationsApplied MathematicsLinear matrixActuator saturationNonlinear systemExponential stabilityControl and Systems EngineeringControl theorySignal ProcessingFull state feedbackAutomatic gain controlSaturation (chemistry)MathematicsJournal of the Franklin Institute
researchProduct

The Conceptualisation and Measurement of Mega Sport Event Legacies

2007

This paper focuses on the legacy of mega sport events. First, the concept of legacy is defined before the problems of measuring and forecasting legacy are discussed. Benchmarking and the use of macro data do not correctly reveal legacy. Hence a bottom-up approach is introduced which identifies the event legacy by evaluation of ‘soft’ and ‘hard’ event-related changes in a host city. These changes are defined as ‘event-structures’ (infrastructure, knowledge, image, emotions, networks, culture). Many of them change the quality of location factors of the host city in the long-term. The benefits/costs through the transformation of the host city are the legacy of a mega sport event. Here a partic…

Event (computing)Tourism Leisure and Hospitality Managementmedia_common.quotation_subjectQuality (business)BenchmarkingEconomic impact analysisSociologyMacroMega-Host (network)Data scienceTourismmedia_commonJournal of Sport & Tourism
researchProduct

Effect of Acoustic Wave Reflections on Space Charge Measurements with PEA Method

2018

The Pulsed Electro-Acoustic (PEA) method is the most used technique for space charge detection in solid dielectrics. The methodology is largely employed in the field of High Voltage Direct Current (HVDC) transmission and is based on the detection of acoustic waves generated by charges vibration. One of the most common problems arising during the detection is the presence of multiple reflections taking place due to the presence of means discontinuity in the different PEA cell components. This reflection phenomenon, if not well taken into account, could cause incorrect interpretation of the PEA output signal. It is easy to understand that a simulation model is a basic tool to understand the w…

PhysicsPEA methodRenewable Energy Sustainability and the EnvironmentNumerical analysisAcousticsPEA modelEnergy Engineering and Power TechnologyComputer Science Applications1707 Computer Vision and Pattern RecognitionAcoustic waveDielectricsimulationSpace chargeIndustrial and Manufacturing EngineeringVibrationSettore ING-IND/31 - ElettrotecnicaComputer Networks and CommunicationTransduceracosutic waveArtificial IntelligenceHigh-voltage direct currentMATLABInstrumentationcomputercomputer.programming_language2018 IEEE 4th International Forum on Research and Technology for Society and Industry (RTSI)
researchProduct