Search results for "Real-time computing"

showing 10 items of 366 documents

Power Consumption Analysis of Operating Systems for Wireless Sensor Networks

2010

In this paper four wireless sensor network operating systems are compared in terms of power consumption. The analysis takes into account the most common operating systems-TinyOS v1.0, TinyOS v2.0, Mantis and Contiki-running on Tmote Sky and MICAz devices. With the objective of ensuring a fair evaluation, a benchmark composed of four applications has been developed, covering the most typical tasks that a Wireless Sensor Network performs. The results show the instant and average current consumption of the devices during the execution of these applications. The experimental measurements provide a good insight into the power mode in which the device components are running at every moment, and t…

EngineeringReal-time computingConservation of Energy Resourceslcsh:Chemical technologycomputer.software_genreBiochemistryContikiArticleAnalytical ChemistryTECNOLOGIA ELECTRONICAComputer Communication NetworksElectric Power SuppliesElectricitylcsh:TP1-1185MICAzElectrical and Electronic EngineeringInstrumentationWireless sensor network operating systemsElectric Power Suppliesbusiness.industryTinyOSSignal Processing Computer-AssistedMantisMicro-Electrical-Mechanical SystemsAtomic and Molecular Physics and Opticswireless sensor network operating systems; TinyOS; Mantis; Contiki; MICAz; TmoteMoment (mathematics)Key distribution in wireless sensor networksPower consumptionEmbedded systemRemote Sensing TechnologyBenchmark (computing)Operating systemAverage currentElectricitybusinessWireless TechnologyWireless sensor networkcomputerTmote
researchProduct

Automated inventory management and security surveillance system using image processing techniques

2010

Efficient inventory management and allocation of cargo space is an imperative parameter in the industry today. In this paper we propose an algorithm to automate complete inventory unit with the aid of image processing and artificial intelligence algorithms. These algorithms work on the data acquired through image processing. This data then integrates with the Artificial Intelligence algorithm which in turn takes inputs from the sensors present on the robot. These sensors help in precise localization of the robot. The path planning algorithm takes input from virtual map buffer which is present in the CPU memory. This buffer in accordance with the sensor data and Image Processing data generat…

EngineeringRobot kinematicsSoftwarebusiness.industryEmbedded systemReal-time computingRobotImage processingCentral processing unitMotion planningbusinessAutomationWireless sensor networkTENCON 2010 - 2010 IEEE Region 10 Conference
researchProduct

On the performance of joint processing schemes over the cluster area

2010

En este trabajo se caracterizan tres esquemas de transmisión conjunta para el enlace descendente y se compara su rendimiento dentro de un clúster de estaciones base. La motivación de este estudio es analizar el rendimiento de estos esquemas dentro del área del clúster, como un primer paso hacia el diseño de un esquema de transmisión conjunta adaptable que soporte escenarios de uso dinámicos. Cada uno de los esquemas analizados, centralizado, parcial y distribuido, requiere una cantidad diferente de conocimiento del canal disponible en el lado del transmisor, un intercambio distinto de información entre estaciones base y la retroalimentación de los usuarios. Además, estos esquemas muestran d…

EngineeringSignal processing:CIENCIAS TECNOLÓGICAS [UNESCO]business.industryReal-time computingcoordinated multi-point transmissionUNESCO::CIENCIAS TECNOLÓGICASBase stationSignal-to-noise ratioTransmission (telecommunications)LTE-AdvancedMetric (mathematics)Telecommunications linkEnhanced Data Rates for GSM EvolutionbusinessJoint (audio engineering)
researchProduct

A Bayesian Network Model for Fire Assessment and Prediction

2015

Smartphones and other wearable computers with modern sensor technologies are becoming more advanced and widespread. This paper proposes exploiting those devices to help the firefighting operation. It introduces a Bayesian network model that infers the state of the fire and predicts its future development based on smartphone sensor data gathered within the fire area. The model provides a prediction accuracy of 84.79i¾?% and an area under the curve of 0.83. This solution had also been tested in the context of a fire drill and proved to help firefighters assess the fire situation and speed up their work.

EngineeringSpeedupDrillbusiness.industryReal-time computingWearable computerBayesian networkFirefightingContext (language use)State (computer science)businessSimulation
researchProduct

Aggregated Packet Transmission in Duty-Cycled WSNs: Modeling and Performance Evaluation

2017

[EN] Duty cycling (DC) is a popular technique for energy conservation in wireless sensor networks (WSNs) that allows nodes to wake up and sleep periodically. Typically, a single-packet transmission (SPT) occurs per cycle, leading to possibly long delay. With aggregated packet transmission (APT), nodes transmit a batch of packets in a single cycle. The potential benefits brought by an APT scheme include shorter delay, higher throughput, and higher energy efficiency. In the literature, different analytical models have been proposed to evaluate the performance of SPT schemes. However, no analytical models for the APT mode on synchronous DC medium access control (MAC) mechanisms exist. In this …

EngineeringTransmission delayComputer Networks and CommunicationsRetransmissionReal-time computingAerospace EngineeringThroughput02 engineering and technology01 natural sciencesDiscrete-time Markov chain (DTMC) modelPacket switchingPacket lossComputer Science::Networking and Internet Architecture0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringProcessing delaybusiness.industryNetwork packetComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS010401 analytical chemistry020206 networking & telecommunicationsINGENIERIA TELEMATICA0104 chemical sciencesComputer Science::PerformancePacket aggregationAutomotive EngineeringPerformance evaluationDuty-cycled wireless sensor networksPacket aggregationbusinessComputer network
researchProduct

Consensus-based Distributed Intrusion Detection for Multi-Robot Systems

2008

This paper addresses a security problem in robotic multi-agent systems, where agents are supposed to cooperate according to a shared protocol. A distributed Intrusion Detection System (IDS) is proposed here, that detects possible non-cooperative agents. Previous work by the authors showed how single monitors embedded on-board the agents can detect non- cooperative behavior, using only locally available information. In this paper, we allow such monitors to share the collected information in order to overcome their sensing limitation. In this perspective, we show how an agreement on the type of behavior of a target-robot may be reached by the monitors, through execution of a suitable consensu…

Engineeringbusiness.industryDistributed computingReal-time computingIntrusion detection systemDecentralised systemUpper and lower boundsComputer Science::Multiagent SystemsConsensusSettore ING-INF/04 - AutomaticaConvergence (routing)Transient (computer programming)Intrusion detectionbusinessIntelligent transportation systemProtocol (object-oriented programming)set--valued consensus algorithm
researchProduct

Synchronization in Vehicle Routing—A Survey of VRPs with Multiple Synchronization Constraints

2012

This paper presents a survey of vehicle routing problems with multiple synchronization constraints. These problems exhibit, in addition to the usual task covering constraints, further synchronization requirements between the vehicles, concerning spatial, temporal, and load aspects. They constitute an emerging field in vehicle routing research and are becoming a “hot” topic. The contribution of the paper is threefold: (i) It presents a classification of different types of synchronization. (ii) It discusses the central issues related to the exact and heuristic solution of such problems. (iii) It comprehensively reviews pertinent literature with respect to applications as well as successful s…

Engineeringbusiness.industryHeuristic (computer science)Distributed computingReal-time computingTransportationField (computer science)Task (project management)TransshipmentVehicle routing problemSynchronization (computer science)In vehicleRouting (electronic design automation)businessCivil and Structural EngineeringTransportation Science
researchProduct

Unidirectional Direct Load Control through Smart Plugs

2014

International audience; Balancing energy demand and production is be-coming a more and more challenging task for energy utilities also because of the larger penetration of renewable energies which are more difficult to predict and control. While the traditional solution is to dynamically adapt energy production to follow time-varying demand, a new trend is to drive demand itself. Most of the ongoing actions in this direction involve greedy energy consumers, like industrial plants, supermarkets or large buildings. Pervasive communication technologies may allow in the near future to push further the granularity of such approach, by having the energy utility interacting with residen-tial appli…

Engineeringbusiness.industryLoad control switchSettore ING-INF/03 - TelecomunicazioniDistributed computing[SPI.NRJ]Engineering Sciences [physics]/Electric powerReal-time computingProbabilistic logic[SCCO.COMP]Cognitive science/Computer scienceLoad balancing (electrical power)Renewable energySmart Grid; Demand Response; Direct Load Control; Energy SystemsDemand response[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]Smart gridSettore ING-INF/04 - Automatica[MATH.MATH-OC]Mathematics [math]/Optimization and Control [math.OC]GranularityInterruptbusinessSmart Grid Demand Response Direct Load Control Energy Systems
researchProduct

Distributed Multi-level Motion Planning for Autonomous Vehicles in Large Scale Industrial Environments

2013

In this paper we propose a distributed coordination algorithm for safe and efficient traffic management of heterogeneous robotic agents, moving within dynamic large scale industrial environments. The algorithm consists of a distributed resource--sharing protocol involving a re--planning strategy. Once every agent is assigned with a desired motion path, the algorithm ensures ordered traffic flows of agents, that avoid inter--robot collision and system deadlock (stalls). The algorithm allows multi--level representation of the environment, i.e. large or complex rooms may be seen as a unique resource with given capacity at convenience, which makes the approach appealing for complex industrial e…

Engineeringbusiness.industryMulti-agent systemDistributed computingReal-time computingDeadlockmulti-robotPlanningResource (project management)Shared memorySettore ING-INF/04 - AutomaticaPath (graph theory)RobotMotion planningbusinessProtocol (object-oriented programming)
researchProduct

Local Monitor Implementation for Decentralized Intrusion Detection in Secure Multi–Agent Systems

2007

This paper focuses on the detection of misbehav- ing agents within a group of mobile robots. A novel approach to automatically synthesize a decentralized Intrusion Detection System (IDS) as well as an efficient implementation of local monitors are presented. In our scenario, agents perform possi- bly different independent tasks, but cooperate to guarantee the entire system’s safety. Indeed, agents plan their next actions by following a set of logic rules which is shared among them. Such rules are decentralized, i.e. they depend only on configurations of neighboring agents. However, some agents may not be acting according to this cooperation protocol, due to spontaneous failure or tampering.…

Engineeringbusiness.industryMulti-agent systemDistributed computingReal-time computingMobile robotIntrusion detection systemsecuritySpace (commercial competition)Set (abstract data type)Settore ING-INF/04 - AutomaticaIntrusion detectionmulti-agent systemsRule of inferencebusinessProtocol (object-oriented programming)
researchProduct