Search results for "operating system"

showing 10 items of 134 documents

An Empirical Investigation of Performance Overhead in Cross-Platform Mobile Development Frameworks

2020

AbstractThe heterogeneity of the leading mobile platforms in terms of user interfaces, user experience, programming language, and ecosystem have made cross-platform development frameworks popular. These aid the creation of mobile applications – apps – that can be executed across the target platforms (typically Android and iOS) with minimal to no platform-specific code. Due to the cost- and time-saving possibilities introduced through adopting such a framework, researchers and practitioners alike have taken an interest in the underlying technologies. Examining the body of knowledge, we, nonetheless, frequently encounter discussions on the drawbacks of these frameworks, especially with regard…

Computer sciencebusiness.industryMobile appMobile apps020206 networking & telecommunications020207 software engineering02 engineering and technologyData scienceBody of knowledgeDevelopment approachesUser experience designCross-platform0202 electrical engineering electronic engineering information engineeringCross-platform developmentMobile developmentAndroid (operating system)User interfacePerformance benchmarkEmpirical evidencebusinessVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Software
researchProduct

Evaluation of Ensemble Machine Learning Methods in Mobile Threat Detection

2017

The rapid growing trend of mobile devices continues to soar causing massive increase in cyber security threats. Most pervasive threats include ransom-ware, banking malware, premium SMS fraud. The solitary hackers use tailored techniques to avoid detection by the traditional antivirus. The emerging need is to detect these threats by any flow-based network solution. Therefore, we propose and evaluate a network based model which uses ensemble Machine Learning (ML) methods in order to identify the mobile threats, by analyzing the network flows of the malware communication. The ensemble ML methods not only protect over-fitting of the model but also cope with the issues related to the changing be…

Computer scienceintrusion detection0211 other engineering and technologiesDecision tree02 engineering and technologycomputer.software_genreComputer securitymobiililaitteet0202 electrical engineering electronic engineering information engineeringsupervised machine learningSoarAndroid (operating system)tietoturvata113021110 strategic defence & security studiesta213business.industrymobile threatsensemble methods020206 networking & telecommunicationsFlow networkEnsemble learninganomaly detectionmachine learningkoneoppiminenMalwareThe InternetbusinesscomputerMobile device
researchProduct

LoRa-Based Sensor Node Energy Consumption with Data Compression

2021

In this paper simple temporal compression algorithms' efficiency to reduce LoRa-based sensor node energy consumption has been evaluated and measured. It is known that radio transmission is the most energy consuming operation in a wireless sensor node. In this paper three lightweight compression algorithms are implemented in an embedded LoRa platform to compress sensor data in on-line mode and the overall energy consumption is measured. Energy consumption is compared to the situation without implementing any compression algorithm. The results show that a simple compression algorithm is an effective method to improve the battery powered sensor node lifetime. Despite the radio transmission's h…

Consumption (economics)Battery (electricity)Computer sciencebusiness.industrySensor nodeReal-time computingWirelessEnergy consumptionbusinessComputer Science::Operating SystemsWireless sensor networkEnergy (signal processing)Data compression2021 IEEE International Workshop on Metrology for Industry 4.0 & IoT (MetroInd4.0&IoT)
researchProduct

HUMAN RESOURCES MANAGEMENT IN MARITIME CONTAINER TERMINALS: OPTIMISATION METHODS AND POLICY IMPLICATIONS

2014

In the competitive environment of container transport, Container Terminals (CT) have to plan carefully the management of their resources and services in order to satisfy shipping companies’ requirements. Failure to do so may lead vessel operators to re-schedule their routes calling at new promising terminals. In particular, the optimal management of human resources is a major issue in port systems having low automation and high labour costs. This thesis aims at providing a large overview of current practices and issues concerning the management of dockworkers in the CT area, in order to suggest the analytical methods and policies for its improvement. The focus is on the operational plan (24…

Container TerminalSettore ICAR/05 - TrasportiPort Labour RegimeHuman Resources ManagementPort Operating System
researchProduct

Propagation of uncertainties in the Skyrme energy-density-functional model

2013

Parameters of nuclear energy-density-functionals (EDFs) are always derived by an optimization to experimental data. For the minima of appropriately defined penalty functions, a statistical sensitivity analysis provides the uncertainties of the EDF parameters. To quantify theoretical errors of observables given by the model, we studied the propagation of uncertainties within the UNEDF0 Skyrme-EDF approach. We found that typically the standard errors rapidly increase towards neutron rich nuclei. This can be linked to large uncertainties of the isovector coupling constants of the currently used EDFs.

Coupling constantPhysicsNuclear and High Energy PhysicsIsovectorEnergy density functionalta114Nuclear Theory010308 nuclear & particles physicsStatistical sensitivityNuclear TheoryCharge densityFOS: Physical sciencesObservable01 natural sciencesMaxima and minimaNuclear physicsNuclear Theory (nucl-th)0103 physical sciencesNeutron010306 general physicsComputer Science::Operating Systems
researchProduct

The rise and the fall of a Pseudomonas aeruginosa endemic lineage in a hospital

2021

The biological features that allow a pathogen to survive in the hospital environment are mostly unknown. The extinction of bacterial epidemics in hospitals is mostly attributed to changes in medical practice, including infection control, but the role of bacterial adaptation has never been documented. We analysed a collection of Pseudomonas aeruginosa isolates belonging to the Besançon Epidemic Strain (BES), responsible for a 12year nosocomial outbreak, using a genotype-to-phenotype approach. Bayesian analysis estimated the emergence of the clone in the hospital 5 years before its opening, during the creation of its water distribution network made of copper. BES survived better than the refe…

DNA Bacterialparallel evolutionLineage (genetic)Genomic IslandsPathogens and EpidemiologyBiologymedicine.disease_causeAmoeba (operating system)Disease OutbreaksMicrobiology03 medical and health sciencesAntibiotic resistanceDrug Resistance Multiple BacterialGenomic islandbacterial pathogensmedicineHumansPseudomonas InfectionsPathogenGenome size[SDV.MP] Life Sciences [q-bio]/Microbiology and ParasitologyResearch Articles030304 developmental biology0303 health sciencesoutbreak030306 microbiologyPseudomonas aeruginosahigh-risk cloneOutbreakBayes TheoremSequence Analysis DNAGeneral MedicineHospitals3. Good healthPhenotype[SDV.MP]Life Sciences [q-bio]/Microbiology and ParasitologyPseudomonas aeruginosa
researchProduct

A Distributed approach to the Remote Control and Programming Improvement

2006

The remote control of industrial plants through networks is becoming very important nowadays but it involves several issues that can degrade the performance and usability of the remote plant. This paper presents a distributed architecture improving a remote programming system which allows users to control and to program a plant remotely. The control system is based on a client/server architecture with many user interfaces that control the plant. The remote programming language is a mix of Java and client/server protocol in order to simplify the developing and to avoid the protocol/language translation. In order to obtain more efficiency, the program is developed in the client side and it is…

Database serverJavaComputer sciencebusiness.industryDistributed computingUsabilityRemote evaluationClient-sidecomputer.software_genrelaw.inventionClient–server modelRemote procedure calllawOperating systemUser interfacebusinesscomputerProtocol (object-oriented programming)Remote controlcomputer.programming_languageIECON 2006 - 32nd Annual Conference on IEEE Industrial Electronics
researchProduct

Effective pseudopotential for energy density functionals with higher-order derivatives

2011

We derive a zero-range pseudopotential that includes all possible terms up to sixth order in derivatives. Within the Hartree-Fock approximation, it gives the average energy that corresponds to a quasi-local nuclear Energy Density Functional (EDF) built of derivatives of the one-body density matrix up to sixth order. The direct reference of the EDF to the pseudopotential acts as a constraint that divides the number of independent coupling constants of the EDF by two. This allows, e.g., for expressing the isovector part of the functional in terms of the isoscalar part, or vice versa. We also derive the analogous set of constraints for the coupling constants of the EDF that is restricted by sp…

Density matrixCoupling constantPhysicsNuclear and High Energy PhysicsNuclear Theoryta114IsovectorIsoscalarNuclear TheoryHartree–Fock methodFOS: Physical sciencesNuclear Theory (nucl-th)Constraint (information theory)PseudopotentialQuantum mechanicsHomogeneous spaceComputer Science::Operating SystemsPhysical Review C
researchProduct

An efficient VM-based software protection

2011

This paper presents Truly-protect, a system, incorporating a virtual machine, that enables execution of encrypted programs. Our intention is to form a framework for a conditional access/digital rights management system.

Digital rights managementbusiness.industryComputer scienceSoftware protectionCryptographyConditional accessEncryptioncomputer.software_genreSoftwareVirtual machineEmbedded systemOperating systembusinesscomputerDigital rights management system2011 5th International Conference on Network and System Security
researchProduct

MAC-Engine

2011

In this demo, we prove that the flexibility supported by off-the-shelf IEEE 802.11 hardware can be significantly extended if we move the control of the MAC programming interface from the driver to the firmware, i.e. from the host CPU to the card CPU. To this purpose, we introduce the concept of MAC--Engine, that is an executor of Programmable Finite State Machines (PFSM) implemented at the firmware level: we show how the card itself can support different protocol logics thanks to PFSM bytecode representations that can be dynamically injected inside the card memory at run-time without incurring in down time issues or network disconnect events. We provide different PFSM examples in order to t…

DowntimeFinite-state machineComputer scienceFirmwarebusiness.industryInterface (computing)computer.software_genreExecutorBytecodeEmbedded systemOperating systembusinessProtocol (object-oriented programming)computerHost (network)Computer hardwareProceedings of the 6th ACM international workshop on Wireless network testbeds, experimental evaluation and characterization
researchProduct