Search results for "operating system"
showing 10 items of 134 documents
An Empirical Investigation of Performance Overhead in Cross-Platform Mobile Development Frameworks
2020
AbstractThe heterogeneity of the leading mobile platforms in terms of user interfaces, user experience, programming language, and ecosystem have made cross-platform development frameworks popular. These aid the creation of mobile applications – apps – that can be executed across the target platforms (typically Android and iOS) with minimal to no platform-specific code. Due to the cost- and time-saving possibilities introduced through adopting such a framework, researchers and practitioners alike have taken an interest in the underlying technologies. Examining the body of knowledge, we, nonetheless, frequently encounter discussions on the drawbacks of these frameworks, especially with regard…
Evaluation of Ensemble Machine Learning Methods in Mobile Threat Detection
2017
The rapid growing trend of mobile devices continues to soar causing massive increase in cyber security threats. Most pervasive threats include ransom-ware, banking malware, premium SMS fraud. The solitary hackers use tailored techniques to avoid detection by the traditional antivirus. The emerging need is to detect these threats by any flow-based network solution. Therefore, we propose and evaluate a network based model which uses ensemble Machine Learning (ML) methods in order to identify the mobile threats, by analyzing the network flows of the malware communication. The ensemble ML methods not only protect over-fitting of the model but also cope with the issues related to the changing be…
LoRa-Based Sensor Node Energy Consumption with Data Compression
2021
In this paper simple temporal compression algorithms' efficiency to reduce LoRa-based sensor node energy consumption has been evaluated and measured. It is known that radio transmission is the most energy consuming operation in a wireless sensor node. In this paper three lightweight compression algorithms are implemented in an embedded LoRa platform to compress sensor data in on-line mode and the overall energy consumption is measured. Energy consumption is compared to the situation without implementing any compression algorithm. The results show that a simple compression algorithm is an effective method to improve the battery powered sensor node lifetime. Despite the radio transmission's h…
HUMAN RESOURCES MANAGEMENT IN MARITIME CONTAINER TERMINALS: OPTIMISATION METHODS AND POLICY IMPLICATIONS
2014
In the competitive environment of container transport, Container Terminals (CT) have to plan carefully the management of their resources and services in order to satisfy shipping companies’ requirements. Failure to do so may lead vessel operators to re-schedule their routes calling at new promising terminals. In particular, the optimal management of human resources is a major issue in port systems having low automation and high labour costs. This thesis aims at providing a large overview of current practices and issues concerning the management of dockworkers in the CT area, in order to suggest the analytical methods and policies for its improvement. The focus is on the operational plan (24…
Propagation of uncertainties in the Skyrme energy-density-functional model
2013
Parameters of nuclear energy-density-functionals (EDFs) are always derived by an optimization to experimental data. For the minima of appropriately defined penalty functions, a statistical sensitivity analysis provides the uncertainties of the EDF parameters. To quantify theoretical errors of observables given by the model, we studied the propagation of uncertainties within the UNEDF0 Skyrme-EDF approach. We found that typically the standard errors rapidly increase towards neutron rich nuclei. This can be linked to large uncertainties of the isovector coupling constants of the currently used EDFs.
The rise and the fall of a Pseudomonas aeruginosa endemic lineage in a hospital
2021
The biological features that allow a pathogen to survive in the hospital environment are mostly unknown. The extinction of bacterial epidemics in hospitals is mostly attributed to changes in medical practice, including infection control, but the role of bacterial adaptation has never been documented. We analysed a collection of Pseudomonas aeruginosa isolates belonging to the Besançon Epidemic Strain (BES), responsible for a 12year nosocomial outbreak, using a genotype-to-phenotype approach. Bayesian analysis estimated the emergence of the clone in the hospital 5 years before its opening, during the creation of its water distribution network made of copper. BES survived better than the refe…
A Distributed approach to the Remote Control and Programming Improvement
2006
The remote control of industrial plants through networks is becoming very important nowadays but it involves several issues that can degrade the performance and usability of the remote plant. This paper presents a distributed architecture improving a remote programming system which allows users to control and to program a plant remotely. The control system is based on a client/server architecture with many user interfaces that control the plant. The remote programming language is a mix of Java and client/server protocol in order to simplify the developing and to avoid the protocol/language translation. In order to obtain more efficiency, the program is developed in the client side and it is…
Effective pseudopotential for energy density functionals with higher-order derivatives
2011
We derive a zero-range pseudopotential that includes all possible terms up to sixth order in derivatives. Within the Hartree-Fock approximation, it gives the average energy that corresponds to a quasi-local nuclear Energy Density Functional (EDF) built of derivatives of the one-body density matrix up to sixth order. The direct reference of the EDF to the pseudopotential acts as a constraint that divides the number of independent coupling constants of the EDF by two. This allows, e.g., for expressing the isovector part of the functional in terms of the isoscalar part, or vice versa. We also derive the analogous set of constraints for the coupling constants of the EDF that is restricted by sp…
An efficient VM-based software protection
2011
This paper presents Truly-protect, a system, incorporating a virtual machine, that enables execution of encrypted programs. Our intention is to form a framework for a conditional access/digital rights management system.
MAC-Engine
2011
In this demo, we prove that the flexibility supported by off-the-shelf IEEE 802.11 hardware can be significantly extended if we move the control of the MAC programming interface from the driver to the firmware, i.e. from the host CPU to the card CPU. To this purpose, we introduce the concept of MAC--Engine, that is an executor of Programmable Finite State Machines (PFSM) implemented at the firmware level: we show how the card itself can support different protocol logics thanks to PFSM bytecode representations that can be dynamically injected inside the card memory at run-time without incurring in down time issues or network disconnect events. We provide different PFSM examples in order to t…