Search results for "VDP::Technology: 500"

showing 10 items of 538 documents

Delivering Services to Residential Appliances by Utilizing Remote Resource Awareness

2008

Service providers are nowadays offering a variety of services, and in particular multimedia content delivery. Besides, consumer appliances are increasingly becoming digitalized including support for communication networks. However, it is difficult, and in many cases impossible, to use these services with standard consumer appliances, such as TV and media player devices. Rather, usage is often restricted so that they can only be accessed through web browsers from PCs, mobile phones and similar terminals. This is unfortunate, because dedicated consumer appliances are often better suited to handle the content and thereby give consumers a better experience. Within this paper, three design appro…

Resource awarenessWeb browserMultimediaComputer scienceService discoveryMobile computingService providercomputer.software_genreTelecommunications networkVariety (cybernetics)World Wide WebVideoconferencingVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552computer
researchProduct

The Nature of Rest Silanol Groups on the Surfaces of Silica Based Solid Phase Extraction Materials

2013

Author's version of an article in the journal: Advanced Materials Research. Also available from the publisher at: http://dx.doi.org/10.4028/www.scientific.net/AMR.650.66 Chemically bonded solid phase materials are very important in separation chemistry. The chemically modified silica gel contains rest silanol groups that can affect the retention properties when they are used for separation of compounds. Some commercially available solid phase extraction (SPE) materials based on silica gel were analysed for rest silanol groups by near infrared spectroscopy. The combination frequency of the water molecules in the 5500- 5000 cm -1 region was used in identifying the nature of water molecules on…

Rest (physics)VDP::Mathematics and natural science: 400::Chemistry: 440near infrared spectroscopyVDP::Technology: 500::Chemical engineering: 560Chemistrysolid phase extractionGeneral EngineeringAnalytical chemistryAdvanced materialssecond derivative profilesSilanolchemistry.chemical_compoundChemical engineeringsilanol groupsEndcappingSolid phase extractionAdvanced Materials Research
researchProduct

Broadband Internet Access via Multi-Hop Wireless Mesh Networks: Design, Protocol and Experiments

2010

Published version of an article from the journal: Wireless Personal Communications. The original publication is available at Spingerlink. http://dx.doi.org/10.1007/s11277-009-9907-9 While bandwidth for Internet access in urban areas is steadily increasing in recent years, many rural areas are still suffering from the effect of the digital divide. This paper presents a broadband Internet access paradigm developed in the context of the ADHOCSYS project, which was financed by the European Commission under the 6th Framework Program Information and Society Technologies, within the strategic objective of Broadband for All. Aiming at providing reliable Internet access in rural and mountainous regi…

Routing protocolbusiness.product_categoryBroadband networksComputer scienceMesh networkingHop (networking)law.inventionlawVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552BroadbandInternet accessWi-FiElectrical and Electronic EngineeringVDP::Mathematics and natural science: 400::Information and communication science: 420::Communication and distributed systems: 423Network architectureWireless mesh networkbusiness.industryWireless networkQuality of serviceWireless WANOrder One Network ProtocolComputer Science ApplicationsInternet Connection SharingDigital subscriber lineNetwork access pointHazy Sighted Link State Routing ProtocolRural areabusinessTelecommunicationsMunicipal wireless networkComputer network
researchProduct

Adaptive Control Design for Underactuated Cranes With Guaranteed Transient Performance: Theoretical Design and Experimental Verification

2022

For antiswing control of underactuated cranes, how to guarantee the converging speed of cranes through control design is essential but still remains unsolved. In this paper, the adaptive antiswing control for underactuated gantry cranes with guaranteed transient performance under unmodeled dynamics and external disturbances is investigated. To sovle this problem, a set of filters are proposed to make the backstepping technique applicable for the control of crane systems. Then through variable transformation the position error and swing angel could be guaranteed converging to the origin with a given exponential speed. Hardware experiments are conducted to show that the proposed scheme achiev…

Scheme (programming language)Adaptive controlComputer scienceUnderactuationVDP::Technology: 500::Mechanical engineering: 570SwingExponential functionControl and Systems EngineeringRobustness (computer science)Control theoryBacksteppingTransient (oscillation)Electrical and Electronic Engineeringcomputercomputer.programming_languageIEEE Transactions on Industrial Electronics
researchProduct

A Learning Automata Based Solution to Service Selection in Stochastic Environments

2010

Published version of a paper published in the book: Trends in Applied Intelligent Systems. Also available on SpringerLink: http://dx.doi.org/10.1007/978-3-642-13033-5_22 With the abundance of services available in today’s world, identifying those of high quality is becoming increasingly difficult. Reputation systems can offer generic recommendations by aggregating user provided opinions about service quality, however, are prone to ballot stuffing and badmouthing . In general, unfair ratings may degrade the trustworthiness of reputation systems, and changes in service quality over time render previous ratings unreliable. In this paper, we provide a novel solution to the above problems based …

Scheme (programming language)Computational complexity theoryComputer sciencemedia_common.quotation_subject0102 computer and information sciences02 engineering and technologyMachine learningcomputer.software_genreComputer security01 natural sciences0202 electrical engineering electronic engineering information engineeringQuality (business)Simplicitymedia_commoncomputer.programming_languageService qualityLearning automatabusiness.industryVDP::Technology: 500::Information and communication technology: 550VDP::Mathematics and natural science: 400::Information and communication science: 420::Knowledge based systems: 425010201 computation theory & mathematics020201 artificial intelligence & image processingStochastic optimizationArtificial intelligencebusinesscomputerReputation
researchProduct

Receiver-Initiated Data Collection in Wake-Up Radio Enabled mIoT Networks: Achieving Collision-Free Transmissions by Hashing and Partitioning

2021

To achieve ultra-low energy consumption and decade-long battery lifetime for Internet of Things (IoT) networks, wake-up radio (WuR) appears as an eminent solution. While keeping devices in deep sleep for most of the time, a WuR enabled IoT device can be woken up for data transmission at any time by a wake-up call (WuC). However, collisions happen among WuCs for transmitter-initiated data reporting and among data packets for receiver-initiated data collection . In this article, we propose three novel hashing-based schemes in order to achieve collision-free data transmissions for receiver-initiated data collection. We consider first a simple scenario where all devices in a region of interest …

Scheme (programming language)Data collectionSIMPLE (military communications protocol)Computer Networks and CommunicationsRenewable Energy Sustainability and the Environmentbusiness.industryNetwork packetComputer scienceHash functionVDP::Technology: 500Energy consumptionUploadbusinesscomputercomputer.programming_languageComputer networkData transmission
researchProduct

Discretized Bayesian Pursuit – A New Scheme for Reinforcement Learning

2012

Published version of a chapter in the book: Advanced Research in Applied Artificial Intelligence. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-642-31087-4_79 The success of Learning Automata (LA)-based estimator algorithms over the classical, Linear Reward-Inaction ( L RI )-like schemes, can be explained by their ability to pursue the actions with the highest reward probability estimates. Without access to reward probability estimates, it makes sense for schemes like the L RI to first make large exploring steps, and then to gradually turn exploration into exploitation by making progressively smaller learning steps. However, this behavior becomes counter-intuitive wh…

Scheme (programming language)Mathematical optimizationDiscretizationLearning automataComputer sciencebusiness.industryVDP::Mathematics and natural science: 400::Information and communication science: 420::Algorithms and computability theory: 422estimator algorithmsBayesian probabilityBayesian reasoninglearning automataEstimatorVDP::Technology: 500::Information and communication technology: 550discretized learningBayesian inferenceAction (physics)Reinforcement learningArtificial intelligencepursuit schemesbusinesscomputercomputer.programming_language
researchProduct

Solving Non-Stationary Bandit Problems by Random Sampling from Sibling Kalman Filters

2010

Published version of an article from Lecture Notes in Computer Science. Also available at SpringerLink: http://dx.doi.org/10.1007/978-3-642-13033-5_21 The multi-armed bandit problem is a classical optimization problem where an agent sequentially pulls one of multiple arms attached to a gambling machine, with each pull resulting in a random reward. The reward distributions are unknown, and thus, one must balance between exploiting existing knowledge about the arms, and obtaining new information. Dynamically changing (non-stationary) bandit problems are particularly challenging because each change of the reward distributions may progressively degrade the performance of any fixed strategy. Alt…

Scheme (programming language)Mathematical optimizationOptimization problemComputer scienceBayesian probabilityVDP::Technology: 500::Information and communication technology: 550Kalman filterBayesian inferenceMulti-armed banditVDP::Mathematics and natural science: 400::Information and communication science: 420::Knowledge based systems: 425computerThompson samplingOptimal decisioncomputer.programming_language
researchProduct

Developing a Tool Point Control Scheme for a Hydraulic Crane Using Interactive Real-time Dynamic Simulation

2010

This paper describes the implementation of an interactive real-time dynamic simulation model of a hydraulic crane. The user input to the model is given continuously via joystick and output is presented continuously in a 3D animation. Using this simulation model, a tool point control scheme is developed for the specific crane, considering the saturation phenomena of the system and practical implementation. This paper describes the implementation of an interactive real-time dynamic simulation model of a hydraulic crane. The user input to the model is given continuously via joystick and output is presented continuously in a 3D animation. Using this simulation model, a tool point control scheme…

Scheme (programming language)VDP::Mathematics and natural science: 400::Mathematics: 410::Applied mathematics: 413Engineeringhydraulic craneInteractive real-time dynamic simulationbusiness.industryControl (management)VDP::Technology: 500::Mechanical engineering: 570Control engineeringComputerApplications_COMPUTERSINOTHERSYSTEMSlcsh:QA75.5-76.95Computer Science ApplicationsDynamic simulationHydraulic craneTool point controlIdentification (information)Control and Systems EngineeringModeling and SimulationPoint (geometry)lcsh:Electronic computers. Computer sciencebusinesscomputerSoftwareSimulationcomputer.programming_language
researchProduct

Secure and efficient data storage in unattended wireless sensor networks

2009

©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Article also available from publisher: http://dx.doi.org/10.1109/NTMS.2009.5384753 Providing forward and backward secrecy is still a big challenge in Unattended Wireless Sensor Networks (UWSNs), though some storage schemes have been proposed. Additionally, high storage requirement needs efficient storage techniques. In this paper, we propose a novel homomorphic…

Scheme (programming language)business.industryComputer scienceMobile computingHomomorphic encryptionCryptographyComputer data storageSecrecyVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552Mobile telephonybusinesscomputerWireless sensor networkcomputer.programming_languageComputer network
researchProduct