Search results for "resource"

showing 10 items of 4058 documents

Energy efficient optimisation for large‐scale multiple‐antenna system with WPT

2018

In this study, an energy-efficient optimisation scheme for a large-scale multiple-antenna system with wireless power transfer (WPT) is presented. In the considered system, the user is charged by a base station with a large number of antennas via downlink WPT and then utilises the received power to carry out uplink data transmission. Novel antenna selection, time allocation and power allocation schemes are presented to optimise the energy efficiency of the overall system. In addition, the authors also consider channel state information cannot be perfectly obtained when designing the resource allocation schemes. The non-linear fractional programming-based algorithm is utilised to address the …

Computer science020206 networking & telecommunications020302 automobile design & engineering02 engineering and technologyComputer Science ApplicationsNonlinear programmingBase station0203 mechanical engineeringChannel state informationTelecommunications link0202 electrical engineering electronic engineering information engineeringElectronic engineeringResource allocationWireless power transferElectrical and Electronic EngineeringAntenna (radio)Computer Science::Information TheoryEfficient energy useIET Communications
researchProduct

Assessing Mathematizing Competences Through Multiple-Choice Tasks: Using Students’ Response Processes to Investigate Task Validity

2017

In this chapter, we report on multiple-choice tasks for assessing mathematizing competences of grade 9 students. The task format is complex, consisting of two layers. In the first layer, students are asked to consider a holistic modelling problem. In the second layer, they are asked for an atomistic competence (making assumptions, assigning variables, etc.) related to the same modelling problem. We conducted a qualitative study to investigate the validity of these tasks based on students’ response processes. Eight students worked in pairs solving the tasks collaboratively. The results show that all students were able to handle the layered task format. They reflected meta-cognitively on the …

Computer science05 social sciencesMathematics education050301 education0501 psychology and cognitive sciences0503 educationCompetence (human resources)050104 developmental & child psychologyQualitative researchMultiple choice
researchProduct

Machine Learning Techniques for Intrusion Detection: A Comparative Analysis

2016

International audience; With the growth of internet world has transformed into a global market with all monetary and business exercises being carried online. Being the most imperative resource of the developing scene, it is the vulnerable object and hence needs to be secured from the users with dangerous personality set. Since the Internet does not have focal surveillance component, assailants once in a while, utilizing varied and advancing hacking topologies discover a path to bypass framework " s security and one such collection of assaults is Intrusion. An intrusion is a movement of breaking into the framework by compromising the security arrangements of the framework set up. The techniq…

Computer scienceAnomaly-based intrusion detection system02 engineering and technologyIntrusion detection systemIDSMachine learningcomputer.software_genre[ INFO.INFO-CV ] Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV][INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI]Machine LearningResource (project management)Component (UML)0202 electrical engineering electronic engineering information engineeringROCSet (psychology)[ INFO.INFO-AI ] Computer Science [cs]/Artificial Intelligence [cs.AI]False Positivebusiness.industryACM[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]020206 networking & telecommunicationsPrecisionObject (computer science)True PositiveOutlier020201 artificial intelligence & image processingThe InternetArtificial intelligenceData miningbusinesscomputer
researchProduct

Enriqueciendo la investigación en humanidades digitales. Análisis de textos de claustros académicos de la Universidad de Valencia (1775-1779) con KH …

2020

[ES] La aplicación de métodos automatizados en cualquier investigación ha facilitado el trasvase de metodologías de una disciplina a otra, permitiendo realizar análisis cuantitativos a textos con estructura o semiestructurados. El objeto de este trabajo es aplicar a un dataset en lenguaje natural -castellano del siglo XVIII- métodos de análisis de la disciplina de documentación. Pretende establecer una metodología automática de análisis cuantitativo y cualitativo de textos, que permita enriquecer en el futuro las conclusiones procedentes del análisis histórico tradicional. Este estudio construye los procedimientos necesarios para poder aplicar análisis de frecuencia, extracción y clasificac…

Computer scienceBIBLIOTECONOMIA Y DOCUMENTACIONUniversitatsLibrary and Information Sciences050905 science studiescomputer.software_genresiglo xviiiBibliography. Library science. Information resourcesQualitative analysis5202.01 Metodología de InvestigaciónClaustros universitarios1209.03 Análisis de Datoscastellano antiguoKH CoderSiglo XVIIIbusiness.industry05 social sciencesAnàlisi del discursanálisis de lenguaje naturalAutomationHumanitats InformàticaAnálisis de lenguaje naturalkh coderclaustros universitariosWork (electrical)Quantitative analysis (finance)Natural language analysisArtificial intelligence0509 other social sciencesCastellano antiguo050904 information & library sciencesbusinesscomputerWord frequency analysisNatural language processingZRevista Española de Documentación Científica
researchProduct

WSN Design and Verification Using On-Board Executable Specifications

2019

The gap between informal functional specifications and the resulting implementation in the chosen programming language is notably a source of errors in embedded systems design. In this paper, we discuss a methodology and a software platform aimed at coping with this issue in programming resource-constrained wireless sensor network nodes (WSNs). Whereas the typical development model for the WSNs is based on cross compilation, the proposed approach supports high-level symbolic coding of abstract models and distributed applications, as well as their test and their execution, directly on the target hardware. As a working example, we discuss the application of our methodology to specify the func…

Computer scienceInformation System02 engineering and technologywireless sensor networkSoftware0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringEmbedded systemsymbolic programmingSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniFunctional specificationbusiness.industry020208 electrical & electronic engineeringRuntime verificationresource-constrained deviceComputer Science Applications1707 Computer Vision and Pattern Recognitioncomputer.file_formatsystem specificationComputer Science ApplicationsControl and Systems EngineeringEmbedded systemsystem programmingExecutablebusinesscomputerInformation SystemsIEEE Transactions on Industrial Informatics
researchProduct

Advanced C++11 Multithreading

2018

Abstract The previous chapter introduced the basic concepts of multithreading using the C++11 threading API starting with basic spawn and join approaches, while finishing with non-trivial synchronization based on mutexes and condition variables. However, the major bottleneck of application performance is usually caused by contention for a shared resource. In case of mutex-based programming all participating threads usually try to acquire the same lock in parallel which effectively serializes the program for lightweight operations such as increment/decrement or updates of a single scalar value. Fortunately, modern CPUs provide dedicated commands that allow for the efficient execution of unin…

Computer scienceMonitorMultithreadingThreading (manufacturing)Operating systemSemaphorecomputer.software_genreData typecomputerBottleneckSpawn (computing)Shared resource
researchProduct

Evaluation of a Visual Tool for Early Patent Infringement Detection During Design

2019

Patent infringement detection usually implies research among documents in different forms, in both natural and unstructured language, often involving a lot of human resources and time. In order to ease this patent check process, we previously presented a visual tool to be used by designers themselves at any stage of the design process, providing them with useful and reliable information for deciding whether to steer their design away from potential patent infringements. In this work, we report on a usability study carried out on such a tool with 21 professional designers from industry in the field of mechanical engineering. The outcome of our study shows that our tool is very well accepted …

Computer scienceProcess (engineering)Visual interfaceEnd-user programmingPatent infringement detectionPatent infringementComputingMilieux_LEGALASPECTSOFCOMPUTING02 engineering and technologyBlock programming; End-user programming; Patent infringement detection; Visual interfaces; Visual programming050905 science studiesField (computer science)Block programmingVisual interfaces0202 electrical engineering electronic engineering information engineeringHuman resourcesVisual programming languageSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniVisual programmingSettore INF/01 - Informaticabusiness.industry05 social sciences020207 software engineeringUsabilityData scienceWork (electrical)0509 other social sciencesbusinessEngineering design process
researchProduct

Architecture of High Fidelity Simulation Tool for Crisis Management Training

2018

This paper addresses an ongoing project KriseSIM aiming at creating a virtual training tool for crisis management that should be realistic, flexible, scalable with highfidelity system architecture and user interface. Our goal is to accomplish high-level requirements developed through a codesign process with the crisis management stakeholders. In this paper, we describe a highfidelity training tool architecture, which follows the serious game design principles. The tool is designed as a resource management serious game genre, where the players will deal with limited resources and should respond based on various critical information flows. A preliminary result, i.e. the architecture and the t…

Computer scienceProcess (engineering)business.industry020207 software engineering02 engineering and technologyCrisis management01 natural sciences010309 opticsSoftware portability0103 physical sciences0202 electrical engineering electronic engineering information engineeringSystems architectureVirtual trainingResource managementUser interfaceArchitectureSoftware engineeringbusiness2018 5th International Conference on Information and Communication Technologies for Disaster Management (ICT-DM)
researchProduct

Distributed Symbolic Network Quality Assessment for Resource-constrained Devices

2021

After a Wireless Sensor Network (WSN) is deployed it is subject to significant variations of the quality of its radio links during its lifetime. Knowledge of the condition of the wireless links can be useful to optimize power consumption and increase the reliability of the network. However, resource-constrained nodes may not be able to spare the storage space for network monitoring code. Also, reprogramming deployed nodes can be costly or unfeasible. In this work, we show how an approach based on the exchange of symbolic executable code among nodes enables the assessment of the network status in terms of Packet Reception Rate (PRR) with no extra storage requirements on deployed networks. We…

Computer scienceQuality assessmentSymbolic programmingDistributed computingResource constrainedEmbedded SystemSymbolic code exchangeDistributed computingWireless Sensor Network
researchProduct

Energy-Efficient Context-Aware Resource Allocation for Edge-Computing-Empowered Industrial IoT

2020

Edge computing provides a promising paradigm to support the implementation of industrial Internet of Things (IIoT) by offloading computational-intensive tasks from resource-limited machine-type devices (MTDs) to powerful edge servers. However, the performance gain of edge computing may be severely compromised due to limited spectrum resources, capacity-constrained batteries, and context unawareness. In this chapter, we consider the optimization of channel selection which is critical for efficient and reliable task delivery. We aim at maximizing the long-term throughput subject to long-term constraints of energy budget and service reliability. We propose a learning-based channel selection fr…

Computer scienceServerReliability (computer networking)Distributed computingResource allocationContext (language use)Lyapunov optimizationEnhanced Data Rates for GSM EvolutionEdge computingEfficient energy use
researchProduct