Search results for "resource"
showing 10 items of 4058 documents
Energy efficient optimisation for large‐scale multiple‐antenna system with WPT
2018
In this study, an energy-efficient optimisation scheme for a large-scale multiple-antenna system with wireless power transfer (WPT) is presented. In the considered system, the user is charged by a base station with a large number of antennas via downlink WPT and then utilises the received power to carry out uplink data transmission. Novel antenna selection, time allocation and power allocation schemes are presented to optimise the energy efficiency of the overall system. In addition, the authors also consider channel state information cannot be perfectly obtained when designing the resource allocation schemes. The non-linear fractional programming-based algorithm is utilised to address the …
Assessing Mathematizing Competences Through Multiple-Choice Tasks: Using Students’ Response Processes to Investigate Task Validity
2017
In this chapter, we report on multiple-choice tasks for assessing mathematizing competences of grade 9 students. The task format is complex, consisting of two layers. In the first layer, students are asked to consider a holistic modelling problem. In the second layer, they are asked for an atomistic competence (making assumptions, assigning variables, etc.) related to the same modelling problem. We conducted a qualitative study to investigate the validity of these tasks based on students’ response processes. Eight students worked in pairs solving the tasks collaboratively. The results show that all students were able to handle the layered task format. They reflected meta-cognitively on the …
Machine Learning Techniques for Intrusion Detection: A Comparative Analysis
2016
International audience; With the growth of internet world has transformed into a global market with all monetary and business exercises being carried online. Being the most imperative resource of the developing scene, it is the vulnerable object and hence needs to be secured from the users with dangerous personality set. Since the Internet does not have focal surveillance component, assailants once in a while, utilizing varied and advancing hacking topologies discover a path to bypass framework " s security and one such collection of assaults is Intrusion. An intrusion is a movement of breaking into the framework by compromising the security arrangements of the framework set up. The techniq…
Enriqueciendo la investigación en humanidades digitales. Análisis de textos de claustros académicos de la Universidad de Valencia (1775-1779) con KH …
2020
[ES] La aplicación de métodos automatizados en cualquier investigación ha facilitado el trasvase de metodologías de una disciplina a otra, permitiendo realizar análisis cuantitativos a textos con estructura o semiestructurados. El objeto de este trabajo es aplicar a un dataset en lenguaje natural -castellano del siglo XVIII- métodos de análisis de la disciplina de documentación. Pretende establecer una metodología automática de análisis cuantitativo y cualitativo de textos, que permita enriquecer en el futuro las conclusiones procedentes del análisis histórico tradicional. Este estudio construye los procedimientos necesarios para poder aplicar análisis de frecuencia, extracción y clasificac…
WSN Design and Verification Using On-Board Executable Specifications
2019
The gap between informal functional specifications and the resulting implementation in the chosen programming language is notably a source of errors in embedded systems design. In this paper, we discuss a methodology and a software platform aimed at coping with this issue in programming resource-constrained wireless sensor network nodes (WSNs). Whereas the typical development model for the WSNs is based on cross compilation, the proposed approach supports high-level symbolic coding of abstract models and distributed applications, as well as their test and their execution, directly on the target hardware. As a working example, we discuss the application of our methodology to specify the func…
Advanced C++11 Multithreading
2018
Abstract The previous chapter introduced the basic concepts of multithreading using the C++11 threading API starting with basic spawn and join approaches, while finishing with non-trivial synchronization based on mutexes and condition variables. However, the major bottleneck of application performance is usually caused by contention for a shared resource. In case of mutex-based programming all participating threads usually try to acquire the same lock in parallel which effectively serializes the program for lightweight operations such as increment/decrement or updates of a single scalar value. Fortunately, modern CPUs provide dedicated commands that allow for the efficient execution of unin…
Evaluation of a Visual Tool for Early Patent Infringement Detection During Design
2019
Patent infringement detection usually implies research among documents in different forms, in both natural and unstructured language, often involving a lot of human resources and time. In order to ease this patent check process, we previously presented a visual tool to be used by designers themselves at any stage of the design process, providing them with useful and reliable information for deciding whether to steer their design away from potential patent infringements. In this work, we report on a usability study carried out on such a tool with 21 professional designers from industry in the field of mechanical engineering. The outcome of our study shows that our tool is very well accepted …
Architecture of High Fidelity Simulation Tool for Crisis Management Training
2018
This paper addresses an ongoing project KriseSIM aiming at creating a virtual training tool for crisis management that should be realistic, flexible, scalable with highfidelity system architecture and user interface. Our goal is to accomplish high-level requirements developed through a codesign process with the crisis management stakeholders. In this paper, we describe a highfidelity training tool architecture, which follows the serious game design principles. The tool is designed as a resource management serious game genre, where the players will deal with limited resources and should respond based on various critical information flows. A preliminary result, i.e. the architecture and the t…
Distributed Symbolic Network Quality Assessment for Resource-constrained Devices
2021
After a Wireless Sensor Network (WSN) is deployed it is subject to significant variations of the quality of its radio links during its lifetime. Knowledge of the condition of the wireless links can be useful to optimize power consumption and increase the reliability of the network. However, resource-constrained nodes may not be able to spare the storage space for network monitoring code. Also, reprogramming deployed nodes can be costly or unfeasible. In this work, we show how an approach based on the exchange of symbolic executable code among nodes enables the assessment of the network status in terms of Packet Reception Rate (PRR) with no extra storage requirements on deployed networks. We…
Energy-Efficient Context-Aware Resource Allocation for Edge-Computing-Empowered Industrial IoT
2020
Edge computing provides a promising paradigm to support the implementation of industrial Internet of Things (IIoT) by offloading computational-intensive tasks from resource-limited machine-type devices (MTDs) to powerful edge servers. However, the performance gain of edge computing may be severely compromised due to limited spectrum resources, capacity-constrained batteries, and context unawareness. In this chapter, we consider the optimization of channel selection which is critical for efficient and reliable task delivery. We aim at maximizing the long-term throughput subject to long-term constraints of energy budget and service reliability. We propose a learning-based channel selection fr…