Search results for "Telecommunication"

showing 10 items of 1769 documents

ChemInform Abstract: A Sialyl-Lewis A-Asparagine Building Block for Glycopeptide-Synthesis.

2000

chemistry.chemical_compoundChemistryStereochemistryBlock (telecommunications)General MedicineAsparagineSialyl-Lewis AGlycopeptideChemInform
researchProduct

Effect on health of non-alcohol beer and hop supplementation in a group of nuns in a closed order

2010

chemistry.chemical_compoundCommunicationNutrition and Dieteticschemistrybusiness.industryMedicine (miscellaneous)AlcoholHop (telecommunications)businessSocial psychologyMathematicsProceedings of the Nutrition Society
researchProduct

Transmission of electronic effects in 4-aryl-2,6-diphenylpyrylium perchlorates and related compounds

1996

chemistry.chemical_compoundchemistryTransmission (telecommunications)ArylOrganic ChemistryElectronic effectOrganic chemistryPhysical and Theoretical ChemistryCombinatorial chemistryJournal of Physical Organic Chemistry
researchProduct

A gearbox model for processing large volumes of data by using pipeline systems encapsulated into virtual containers

2020

Software pipelines enable organizations to chain applications for adding value to contents (e.g., confidentially, reliability, and integrity) before either sharing them with partners or sending them to the cloud. However, the pipeline components add overhead when processing large volumes of data, which can become critical in real-world scenarios. This paper presents a gearbox model for processing large volumes of data by using pipeline systems encapsulated into virtual containers. In this model, the gears represent applications, whereas gearboxes represent software pipelines. This model was implemented as a collaborative system that automatically performs Gear up (by using parallel patterns…

cloud storageCloud storageComputer Networks and CommunicationsComputer scienceDistributed computingcontinuous deliveryCloud computing02 engineering and technologyVirtual containersSoftwareIn-memory storage0202 electrical engineering electronic engineering information engineeringParallel patternssoftware pipelinesInformáticabusiness.industryvirtual containers020206 networking & telecommunicationsPipeline (software)Cloud storage; Continuous delivery; In-memory storage; Parallel patterns; Software pipelines; Virtual containersPipeline transportin-memory storageContinuous deliveryHardware and ArchitectureSoftware deploymentparallel patternsContainer (abstract data type)020201 artificial intelligence & image processingbusinessCloud storageSoftwareSoftware pipelinesFuture Generation Computer Systems
researchProduct

Multi-objective optimization for computation offloading in mobile-edge computing

2017

Mobile-edge cloud computing is a new cloud platform to provide pervasive and agile computation augmenting services for mobile devices (MDs) at anytime and anywhere by endowing ubiquitous radio access networks with computing capabilities. Although offloading computations to the cloud can reduce energy consumption at the MDs, it may also incur a larger execution delay. Usually the MDs have to pay cloud resource they used. In this paper, we utilize queuing theory to bring a thorough study on the energy consumption, execution delay and price cost of offloading process in a mobile-edge cloud system. Specifically, both wireless transmission and computing capabilities are explicitly and jointly co…

computational modeling020203 distributed computingMobile edge computingOptimization problemta213delaysbusiness.industryComputer scienceDistributed computingcloud computing020206 networking & telecommunicationsCloud computing02 engineering and technologyEnergy consumptionbase stationsMulti-objective optimizationBase stationenergy consumptioncomputers0202 electrical engineering electronic engineering information engineeringComputation offloadingbusinessoptimizationMobile deviceComputer network2017 IEEE Symposium on Computers and Communications (ISCC)
researchProduct

One and Two Dimensional Convolutional Neural Networks for Seizure Detection Using EEG Signals

2021

Deep learning for the automated detection of epileptic seizures has received much attention during recent years. In this work, one dimensional convolutional neural network (1D-CNN) and two dimensional convolutional neural network (2D-CNN) are simultaneously used on electroencephalogram (EEG) data for seizure detection. Firstly, using sliding windows without overlap on raw EEG to obtain the definite one-dimension time EEG segments (1D-T), and continuous wavelet transform (CWT) for 1D-T signals to obtain the two-dimension time-frequency representations (2D-TF). Then, 1D-CNN and 2D-CNN model architectures are used on 1D-T and 2D-TF signals for automatic classification, respectively. Finally, t…

convolutional neural networks (CNN)Computer scienceseizure detection02 engineering and technologyneuroverkotElectroencephalographyConvolutional neural network0202 electrical engineering electronic engineering information engineeringmedicineEEGContinuous wavelet transformSignal processingArtificial neural networkmedicine.diagnostic_testbusiness.industryelectroencephalogram (EEG)signaalinkäsittelyDeep learningtime-frequency representationtideep learningsignaalianalyysi020206 networking & telecommunicationsPattern recognitionkoneoppiminenBenchmark (computing)020201 artificial intelligence & image processingArtificial intelligencebusinessepilepsia
researchProduct

A Cooperative Multi-Agent System for Crowd Sensing Based Estimation in Smart Cities

2020

The concept of Smart City has spread as a solution to ensure better access to information and services to citizens, but also as a means to reduce the environmental footprint of cities. To this end, a continuous and wide observation of the environment is necessary to analyze information that enables government bodies to act on the environment appropriately. Moreover, a diffused acquisition of information requires adequate infrastructure and proper devices, which results in relevant installation and maintenance costs. Our proposal enables reducing the number of necessary sensors to be deployed while ensuring that information is available at any time and anywhere. We present the HybridIoT syst…

cooperative multi-agent systemsGeneral Computer ScienceComputer scienceContext (language use)02 engineering and technologycomputer.software_genre[INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI]missing information estimationIntelligent sensorSmart city11. Sustainability0202 electrical engineering electronic engineering information engineeringGeneral Materials ScienceComputingMilieux_MISCELLANEOUSGovernmentSmart cityEcological footprintMulti-agent systemGeneral Engineering020206 networking & telecommunicationsRisk analysis (engineering)13. Climate actionheterogeneous data integration020201 artificial intelligence & image processinglcsh:Electrical engineering. Electronics. Nuclear engineeringcomputerlcsh:TK1-9971Data integrationIEEE Access
researchProduct

Digitale kommunikasjonsløsninger for samhandling mellom koronar bypassopererte pasienter og helsepersonell på spesialistsykehus etter utskrivelse til…

2016

Masteroppgave i helse- og sosialinformatikk- Universitetet i Agder, 2016 Background In Norway there are expectations of further development and strategic investment in information technology within the health care system. Persons who undergo a coronary artery bypass graft (CABG) surgery are in need of information and guidance related to problems that may arise after they have returned home from hospital. Purpose The purpose of this project was to explore to what extent digital communication solutions might meet the need for information and guidance from health personnel experienced by patients who had undergone a CABG surgery, after discharge from the specialist hospital. Additionally, it w…

coronary artery bypass graft surgerytelecommunicationsVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552tele rehabilitationHSI500e-healthinternetCABG
researchProduct

Towards digital cognitive clones for the decision-makers: adversarial training experiments

2021

Abstract There can be many reasons for anyone to make a digital copy (clone) of own decision-making behavior. This enables virtual presence of a professional decision-maker simultaneously in many places and processes of Industry 4.0. Such clone can be used as one’s responsible representative when the human is not available. Pi-Mind (“Patented Intelligence”) is a technology, which enables “cloning” cognitive skills of humans using adversarial machine learning. In this paper, we present a cyber-physical environment as an adversarial learning ecosystem for cloning image classification skills. The physical component of the environment is provided by the logistic laboratory with camera-surveilla…

cybersecurityComputer scienceProcess (engineering)päätöksentukijärjestelmätneuroverkot02 engineering and technologytekoälyAdversarial machine learningAdversarial systemHuman–computer interactionComponent (UML)0202 electrical engineering electronic engineering information engineeringesineiden internetartificial digital immunitykyberturvallisuusGeneral Environmental ScienceGenerative Adversarial NetworksCloning (programming)ohjausjärjestelmät020206 networking & telecommunicationsAdversaryIndustry 4.0koneoppiminenälytekniikkaGeneral Earth and Planetary Sciences020201 artificial intelligence & image processingClone (computing)Procedia Computer Science
researchProduct

Taxonomy of generative adversarial networks for digital immunity of Industry 4.0 systems

2021

Abstract Industry 4.0 systems are extensively using artificial intelligence (AI) to enable smartness, automation and flexibility within variety of processes. Due to the importance of the systems, they are potential targets for attackers trying to take control over the critical processes. Attackers use various vulnerabilities of such systems including specific vulnerabilities of AI components. It is important to make sure that inappropriate adversarial content will not break the security walls and will not harm the decision logic of critical systems. We believe that the corresponding security toolset must be organized as a trainable self-protection mechanism similar to immunity. We found cer…

cybersecurityIndustry 4.0Computer scienceVulnerabilityneuroverkot02 engineering and technologytekoälyComputer securitycomputer.software_genreAdversarial systemImmunityTaxonomy (general)0202 electrical engineering electronic engineering information engineeringesineiden internetartificial digital immunitykyberturvallisuusGeneral Environmental ScienceFlexibility (engineering)Generative Adversarial Networksbusiness.industryMechanism (biology)020206 networking & telecommunicationsIndustry 4.0AutomationVariety (cybernetics)koneoppiminenälytekniikkaGeneral Earth and Planetary Sciences020201 artificial intelligence & image processingbusinesscomputerProcedia Computer Science
researchProduct