Search results for "NETWORK"
showing 10 items of 7718 documents
Optimum design for work-hardening adaptation
1977
Abstract The finite element-linear programming approach and the work-hardening adaptation criterion are used to formulate a general theory of optimum design of rigid-work-hardening structures subjected to loads which vary statically within given limits. Self-weight, as well as some technological constraints, can be introduced into the framework of the optimization problem. The optimality conditions are discussed with the aid of geometrical descriptions as well, and a comparison is made with the standard limit design. Numerical applications are given for a plane truss and a plane frame with axial force-bending moment interaction.
New novel idea for Cloud Computing: How can we use Kalman filter in security of Cloud Computing
2012
Cloud is a virtual image about some amount of undefined powers, that is widespread and had unknown power and inexact amount of hardware and software configurations, and because of we have not any information about clouds location and time dimensions and also the amounts of its sources we tell that Cloud Computing. This technology presents lots of abilities and opportunities such as processing power, storage and accessing it from everywhere, supporting, working - team group - with the latest versions of software and etc., by the means of internet. On the other hand, in such a large scale networks we should consider the reliability and powerfulness of such networks in facing with events such …
Students' satisfaction with their host city: case of Jelgava, Latvia
2019
Forecasting Changes in Religiosity and Existential Security with an Agent-Based Model
2018
We employ existing data sets and agent-based modeling to forecast changes in religiosity and existential security among a collective of individuals over time. Existential security reflects the extent of economic, socioeconomic and human development provided by society. Our model includes agents in social networks interacting with one another based on the education level of the agents, the religious practices of the agents, and each agent's existential security within their natural and social environments. The data used to inform the values and relationships among these variables is based on rigorous statistical analysis of the International Social Survey Programme Religion Module (ISSP) and…
RoadMic: Road Surface Monitoring Using Vehicular Sensor Networks with Microphones
2010
Road surface analysis including pothole reports is an important problem for road maintainers and drivers. In this paper we propose a methodology for pothole detection using mobile vehicles equipped with off the shelf microphone and global positioning devices attached to an on-board computer. The approach is generic enough to be extended for other kind of event detection using different sensors as well. The vehicles are driving on public streets and measuring pothole induced sound signals. Our approach was tested and evaluated by real world experiments in a road segment for which we had established the ground truth beforehand. The results show pothole detection with high accuracy despite the…
A privacy enhanced device access protocol for an IoT context
2013
In this paper, we present the case for a device authentication protocol that authenticates a device/service class rather than an individual device. The devices in question are providing services available to the public. The proposed protocol is an online protocol, and it uses a pseudo-random temporary identity scheme to provide user privacy. This allows the Internet-of-Things device to have full assurance of the user, with respect to the request service, while permitting the user to remain anonymous with respect to the device. The user can then enjoy identity and location privacy in addition to untraceability with respect to device access. Copyright © 2013 John Wiley & Sons, Ltd.
Subjective Evaluation of Video on Demand Systems Using Different Network Connections
2009
Nowadays, society makes use of new technologies as they appear. Due to this boom, the use of resources via web is increasing notably. In of training and education cases, companies such as universities are offering tele-learning platforms to complement and facilitate the learning process. Some of these called e-learning platforms can have explanatory videos as a resource for training. For the codification of these videos, we have to use parameters which provide a trade-off between the video sizes to be transmitted that optimize bandwidth and video and audio quality. This paper presents a subjective study of the video quality on transmission depending on the types of users’ network access to …
Robust l2-gain control for 2D nonlinear stochastic systems with time-varying delays and actuator saturation
2013
Abstract This paper is concerned with the problems of stability analysis and l2-gain control for a class of two-dimensional (2D) nonlinear stochastic systems with time-varying delays and actuator saturation. Firstly, a convex hull representation is used to describe the saturation behavior, and a sufficient condition for the existence of mean-square exponential stability of the considered system is derived. Then, a state feedback controller which guarantees the resulting closed-loop system to be mean-square exponentially stable with l2-gain performance is proposed, and an optimization procedure to maximize the estimation of domain of attraction is also given. All the obtained results are for…
The Conceptualisation and Measurement of Mega Sport Event Legacies
2007
This paper focuses on the legacy of mega sport events. First, the concept of legacy is defined before the problems of measuring and forecasting legacy are discussed. Benchmarking and the use of macro data do not correctly reveal legacy. Hence a bottom-up approach is introduced which identifies the event legacy by evaluation of ‘soft’ and ‘hard’ event-related changes in a host city. These changes are defined as ‘event-structures’ (infrastructure, knowledge, image, emotions, networks, culture). Many of them change the quality of location factors of the host city in the long-term. The benefits/costs through the transformation of the host city are the legacy of a mega sport event. Here a partic…
Effect of Acoustic Wave Reflections on Space Charge Measurements with PEA Method
2018
The Pulsed Electro-Acoustic (PEA) method is the most used technique for space charge detection in solid dielectrics. The methodology is largely employed in the field of High Voltage Direct Current (HVDC) transmission and is based on the detection of acoustic waves generated by charges vibration. One of the most common problems arising during the detection is the presence of multiple reflections taking place due to the presence of means discontinuity in the different PEA cell components. This reflection phenomenon, if not well taken into account, could cause incorrect interpretation of the PEA output signal. It is easy to understand that a simulation model is a basic tool to understand the w…