Search results for "multiagent system"

showing 10 items of 108 documents

Energy Efficient Optimization for Solar-Powered UAV Communications System

2021

In this work, we explore the energy efficiency optimization for a solar-powered unmanned aerial vehicle (UAV) communications system. We consider a scenario where a number of ground users (GUs) connect with a solar-powered multi-antenna UAV over a wireless link. First, we are able to derive the relations between the uplink data rate and heading angle of UAV and transmission power of GUs. In addition, the harvested energy from solar light is also affected by UAV’s angle. Accordingly, with the objective to maximize the energy efficiency that is related to uplink data rate and energy consumption, we propose to dynamically adjust the UAV trajectory and gesture, by optimizing its velocity, accele…

business.industryComputer scienceReal-time computingComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONComputerApplications_COMPUTERSINOTHERSYSTEMSEnergy consumptionCommunications systemComputer Science::Multiagent SystemsComputer Science::RoboticsTransmission (telecommunications)Computer Science::Systems and ControlTelecommunications linkTrajectoryWirelessComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMSbusinessEnergy (signal processing)Efficient energy use2021 IEEE International Conference on Communications Workshops (ICC Workshops)
researchProduct

Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets

2021

International audience; With the Internet's unprecedented growth and nations' reliance on computer networks, new cyber‐attacks are created every day as means for achieving financial gain, imposing political agendas, and developing cyberwarfare arsenals. Network security is thus acquiring increasing attention among researchers, practitioners, network architects, policy makers, and others. To defend organizations' networks from existing, foreseen, and future threats, intrusion detection systems (IDSs) are becoming a must. Existing surveys on anomaly‐based IDS (AIDS) focus on specific components such as detection mechanisms and lack many others. In contrast to existing surveys, this article co…

business.industryComputer scienceAnomaly (natural sciences)020206 networking & telecommunications02 engineering and technologyIntrusion detection system[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]Computer securitycomputer.software_genre[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR][INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingThe Internet[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Electrical and Electronic Engineering[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businesscomputer
researchProduct

PROLISEAN: A New Security Protocol for Programmable Matter

2021

The vision for programmable matter is to create a material that can be reprogrammed to have different shapes and to change its physical properties on demand. They are autonomous systems composed of a huge number of independent connected elements called particles. The connections to one another form the overall shape of the system. These particles are capable of interacting with each other and take decisions based on their environment. Beyond sensing, processing, and communication capabilities, programmable matter includes actuation and motion capabilities. It could be deployed in different domains and will constitute an intelligent component of the IoT. A lot of applications can derive fro…

Self-reconfiguring modular robot0209 industrial biotechnologySecurity AlgorithmsComputer Networks and CommunicationsComputer scienceDistributed computingHash functionSecurity Protocol02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]EncryptionLightweight Cryptography[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]020901 industrial engineering & automationComponent (UML)0202 electrical engineering electronic engineering information engineeringModular RobotsProgrammable MatterProtocol (object-oriented programming)IOTbusiness.industry020206 networking & telecommunicationsCryptographic protocolSupercomputer[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationProgrammable matter[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA][INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Amoebots[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessDistributed Computing
researchProduct

Scheduling independent stochastic tasks under deadline and budget constraints

2018

This article discusses scheduling strategies for the problem of maximizing the expected number of tasks that can be executed on a cloud platform within a given budget and under a deadline constraint. The execution times of tasks follow independent and identically distributed probability laws. The main questions are how many processors to enroll and whether and when to interrupt tasks that have been executing for some time. We provide complexity results and an asymptotically optimal strategy for the problem instance with discrete probability distributions and without deadline. We extend the latter strategy for the general case with continuous distributions and a deadline and we design an ef…

[INFO.INFO-CC]Computer Science [cs]/Computational Complexity [cs.CC]Mathematical optimizationOperations researchComputer science[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS]Cloud computing[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technologyExpected valueTheoretical Computer ScienceScheduling (computing)[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]deadline0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]schedulingComputer Science::Operating SystemsComputingMilieux_MISCELLANEOUSBudget constraint020203 distributed computingcloud platformindependent tasksbusiness.industry[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulationstochastic costAsymptotically optimal algorithmContinuous distributions[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Hardware and ArchitectureProbability distribution[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]020201 artificial intelligence & image processingInterrupt[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessSoftwarebudget
researchProduct

Combining gestures and vocalizations to imitate sounds

2015

International audience; Communicating about sounds is a difficult task without a technical language, and naïve speakers often rely on different kinds of non-linguistic vocalizations and body gestures (Lemaitre et al. 2014). Previous work has independently studied how effectively people describe sounds with gestures or vocalizations (Caramiaux, 2014, Lemaitre and Rocchesso, 2014). However, speech communication studies suggest a more intimate link between the two processes (Kendon, 2004). Our study thus focused on the combination of manual gestures and non-speech vocalizations in the communication of sounds. We first collected a large database of vocal and gestural imitations of a variety of …

Acoustics and UltrasonicsComputer scienceInformationSystems_INFORMATIONINTERFACESANDPRESENTATION(e.g.HCI)Speech recognition02 engineering and technologyRepresentation (arts)[ SPI.SIGNAL ] Engineering Sciences [physics]/Signal and Image processing[INFO.INFO-NE]Computer Science [cs]/Neural and Evolutionary Computing [cs.NE][INFO.INFO-CL]Computer Science [cs]/Computation and Language [cs.CL]Loudness[INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI][SCCO]Cognitive science0202 electrical engineering electronic engineering information engineering[ INFO.INFO-NE ] Computer Science [cs]/Neural and Evolutionary Computing [cs.NE]050107 human factorsComputingMilieux_MISCELLANEOUSSound (medical instrument)05 social sciences[ SHS.ANTHRO-SE ] Humanities and Social Sciences/Social Anthropology and ethnology[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA][ SCCO.COMP ] Cognitive science/Computer science[SCCO.PSYC] Cognitive science/Psychology[INFO.INFO-SD]Computer Science [cs]/Sound [cs.SD][ SCCO.NEUR ] Cognitive science/Neuroscience[SCCO.PSYC]Cognitive science/Psychology[ INFO.EIAH ] Computer Science [cs]/Technology for Human Learning[ INFO.INFO-MA ] Computer Science [cs]/Multiagent Systems [cs.MA][INFO.EIAH]Computer Science [cs]/Technology for Human Learning[SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processingGesture[ SHS.MUSIQ ] Humanities and Social Sciences/Musicology and performing artsAcoustics[SCCO.COMP]Cognitive science/Computer scienceArts and Humanities (miscellaneous)[ INFO.INFO-HC ] Computer Science [cs]/Human-Computer Interaction [cs.HC]0501 psychology and cognitive sciences[ INFO.INFO-CL ] Computer Science [cs]/Computation and Language [cs.CL][INFO.INFO-HC]Computer Science [cs]/Human-Computer Interaction [cs.HC]Set (psychology)[ INFO.INFO-AI ] Computer Science [cs]/Artificial Intelligence [cs.AI][SPI.ACOU]Engineering Sciences [physics]/Acoustics [physics.class-ph][SPI.ACOU] Engineering Sciences [physics]/Acoustics [physics.class-ph][SHS.MUSIQ]Humanities and Social Sciences/Musicology and performing arts[ INFO.INFO-ET ] Computer Science [cs]/Emerging Technologies [cs.ET][SCCO.NEUR]Cognitive science/Neuroscience020207 software engineering[SHS.ANTHRO-SE]Humanities and Social Sciences/Social Anthropology and ethnologyVariety (linguistics)loudness[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Noise (video)[ INFO.INFO-SD ] Computer Science [cs]/Sound [cs.SD]
researchProduct

Cimo: An efficient 2-phases calculator of multimodal itineraries for real trans-territories based on a dynamic programming

2015

In this work we propose an exact solution for calculating multimodal itinerary. This solution is named Cimo (Calculateur d'Itineraires Multimodaux Ordonnes). Cimo is an exact optimal itineraries' calculator wherein itineraries are sorted, multimodal, and trans-territorial. The solution is based on a dynamic programming algorithm "cut", "price" and "share". This solution is multi-objectives and multi-constraints. Several versions of this algorithm are proposed following a methodological approach that enables evaluation of efficiency and complexity's gain : through theoretical calculus and benchmarks. In the first version of realistic problem, we propose a solution with itineraries calculated…

050210 logistics & transportationScheduleTheoretical computer scienceDegree (graph theory)Hierarchy (mathematics)Computer scienceModulo05 social sciencesContext (language use)02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE][INFO.INFO-MO]Computer Science [cs]/Modeling and Simulationlaw.inventionDynamic programming[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]Calculatorlaw[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]0502 economics and business0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processing[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]
researchProduct

Automated detection of contextuality proofs with intermediate numbers of observables

2021

<div style=""&gt<font face="arial, helvetica"&gt<span style="font-size: 13px;"&gtQuantum contextuality takes an important place amongst the concepts of quantum computing that bring an advantage over its classical counterpart. For a large class of contextuality </span&gt</font&gt<span style="font-size: 13px; font-family: arial, helvetica;"&gtproofs, aka. observable-based proofs of the Kochen-Specker Theorem, we first formulate the</span&gt</div&gt<div style=""&gt<font face="arial, helvetica"&gt<span style="font-size: 13px;"&gtcontextuality property as the absence of solutions to a linear system. Then we explain why </span&gt</font&gt<span style="font-size: 13px; font-family: arial, helvetica…

[INFO.INFO-ET] Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-SE] Computer Science [cs]/Software Engineering [cs.SE][INFO.INFO-DC] Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC][INFO.INFO-IU] Computer Science [cs]/Ubiquitous Computing[INFO.INFO-MA] Computer Science [cs]/Multiagent Systems [cs.MA][INFO.INFO-MO] Computer Science [cs]/Modeling and Simulation[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
researchProduct

A Hardware and Secure Pseudorandom Generator for Constrained Devices

2018

Hardware security for an Internet of Things or cyber physical system drives the need for ubiquitous cryptography to different sensing infrastructures in these fields. In particular, generating strong cryptographic keys on such resource-constrained device depends on a lightweight and cryptographically secure random number generator. In this research work, we have introduced a new hardware chaos-based pseudorandom number generator, which is mainly based on the deletion of an Hamilton cycle within the $N$ -cube (or on the vectorial negation), plus one single permutation. We have rigorously proven the chaotic behavior and cryptographically secure property of the whole proposal: the mid-term eff…

Applied cryptography; Chaotic circuits; Constrained devices; Discrete dynamical systems; FPGA; Lightweight Cryptography; Random number generators; Statistical tests; Control and Systems Engineering; Information Systems; Computer Science Applications1707 Computer Vision and Pattern Recognition; Electrical and Electronic EngineeringHardware security moduleComputer scienceRandom number generationCryptography[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technologyPseudorandom generatorConstrained devicesLightweight CryptographyChaotic circuits[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]PermutationRandom number generatorsStatistical tests0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringField-programmable gate arrayThroughput (business)FPGAPseudorandom number generatorGenerator (category theory)business.industry020208 electrical & electronic engineeringComputer Science Applications1707 Computer Vision and Pattern Recognition020206 networking & telecommunicationsDiscrete dynamical systems[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationComputer Science ApplicationsApplied cryptography[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Control and Systems EngineeringKey (cryptography)[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessComputer hardwareInformation SystemsIEEE Transactions on Industrial Informatics
researchProduct

Modèle dynamique multiniveau et holonique pour la simulation d'un système complexe à grande échelle avec environnement spatial : Application à la sim…

2020

Nowadays, with the emergence of connected objects and cars, road traffic systems become more and more complex and exhibit hierarchical behaviours at several levels of detail. The multilevel modeling approach is an appropriate approach to represent traffic from several perspectives. Multilevel models are also an appropriate approach to model large-scale complex systems such as road traffic. However, most of the multilevel models of traffic proposed in the literature are static because they use a set of predefined levels of detail and these representations cannot change during simulation. Moreover, these multilevel models generally consider only two levels of detail. Few works have been inter…

Dynamique[SPI.OTHER]Engineering Sciences [physics]/OtherSystème Multi-Agent HoloniqueModélisation et Simulation MultiniveauxTrafic routier[SPI.OTHER] Engineering Sciences [physics]/OtherRoad TrafficHolonic Multiagent SystemDynamicScalabilityPassage à l'EchelleMultilevel Modeling and Simulation
researchProduct

Global emergence of the widespread Pseudomonas aeruginosa ST235 clone

2018

Abstract Objectives Despite the non-clonal epidemic population structure of Pseudomonas aeruginosa , several multi-locus sequence types are distributed worldwide and are frequently associated with epidemics where multidrug resistance confounds treatment. ST235 is the most prevalent of these widespread clones. In this study we aimed to understand the origin of ST235 and the molecular basis for its success. Methods The genomes of 79 P. aeruginosa ST235 isolates collected worldwide over a 27-year period were examined. A phylogenetic network was built, using a Bayesian approach to find the Most Recent Common Ancestor, and we identified antibiotic resistance determinants and ST235-specific genes…

0301 basic medicineMost recent common ancestorClone (cell biology)[ SDV.MP.BAC ] Life Sciences [q-bio]/Microbiology and Parasitology/Bacteriologymedicine.disease_causeGlobal HealthGenome[ SDV.MP ] Life Sciences [q-bio]/Microbiology and ParasitologyPrevalenceCluster Analysis[ SDV.BIBS ] Life Sciences [q-bio]/Quantitative Methods [q-bio.QM]High-risk clonesPhylogenyComputingMilieux_MISCELLANEOUSMolecular EpidemiologyGeneral Medicine3. Good healthInfectious Diseases[SDV.MP]Life Sciences [q-bio]/Microbiology and Parasitology[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA][ SDV.BBM.GTP ] Life Sciences [q-bio]/Biochemistry Molecular Biology/Genomics [q-bio.GN]Pseudomonas aeruginosaEfflux[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]FluoroquinolonesMicrobiology (medical)Genotype030106 microbiologyEpidemic[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]BiologyBacterial resistanceMicrobiology[INFO.INFO-IU]Computer Science [cs]/Ubiquitous ComputingEvolution Molecular03 medical and health sciences[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]Antibiotic resistanceDrug Resistance BacterialmedicinePseudomonas InfectionsGenePseudomonas aeruginosaPathogenInternational clones[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationMultiple drug resistanceGenes Bacterial[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Multilocus Sequence Typing
researchProduct