Search results for "working"

showing 10 items of 2747 documents

Proportional and Preemption-Enabled Traffic Offloading for IP Flow Mobility: Algorithms and Performance Evaluation

2018

IP Flow Mobility (IFOM) enables a user equipment to offload data traffic at the IP flow level. Although the procedure of IFOM-based flow offloading has been specified by 3GPP, how many IP flows should be offloaded and when offloading should be performed are not defined. Consequently, IP flows may be routed to a target access network which has a strong signal strength but with backhaul congestion or insufficient access capability. In this paper, we propose two algorithms, referred to as proportional offloading (PO), and proportional and preemption-enabled offloading (PPO), respectively, for IP flow offloading in hybrid cellular and wireless local area networks. The PO algorithm decides an op…

Access networkComputer Networks and CommunicationsComputer sciencebusiness.industryIT service continuityComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPreemptionLocal area networkAerospace Engineering020206 networking & telecommunications020302 automobile design & engineering02 engineering and technologyBackhaul (telecommunications)0203 mechanical engineeringUser equipmentAutomotive Engineering0202 electrical engineering electronic engineering information engineeringWirelessElectrical and Electronic EngineeringbusinessMobility managementAlgorithmIEEE Transactions on Vehicular Technology
researchProduct

Cloud-based eHealth video encoding system for real time thermographic streaming: Performance evaluation

2017

Recent studies about the use of cloud platforms indicate that more than three-fourths of healthcare institutions apply these technologies in their daily lives. However, in most cases the cloud is based on “Infrastructure as a Service”, instead of developing new applications using the benefits that can bring us this type of technology. For these reasons, this paper shows a private cloud-based system to provide a new application based on thermographic video streaming. In this case, the cloud architecture is divided into three zones. The first zone is where the patient is under medical supervision through body temperature analysis using a global thermal camera. The second zone is the cloud its…

Access networkMultimediaComputer sciencebusiness.industryReal-time computing020206 networking & telecommunications020207 software engineeringCloud computing02 engineering and technologycomputer.software_genreOrder (business)Video tracking0202 electrical engineering electronic engineering information engineeringeHealthCodecbusinesscomputer2017 IEEE International Conference on Communications (ICC)
researchProduct

Acute stress and working memory in older people.

2015

Several studies have shown that acute stress affects working memory (WM) in young adults, but the effect in older people is understudied. As observed in other types of memory, older people may be less sensitive to acute effects of stress on WM. We performed two independent studies with healthy older men and women (from 55 to 77 years old) to investigate the effects of acute stress (Trier Social Stress Test; TSST) and cortisol on WM. In study 1 (n = 63), after the TSST women (but not men) improved their performance on Digit Span Forward (a measure of the memory span component of WM) but not on Digit Span Backward (a measure of both memory span and the executive component of WM). Furthermore,…

Acute effectsMaleendocrine systemmedicine.medical_specialtyHydrocortisonePhysiologyAudiologyDevelopmental psychologyBehavioral NeuroscienceTrier social stress testmedicineMemory spanHumansYoung adultAcute stressAssociation (psychology)SalivaSocial BehaviorAgedEndocrine and Autonomic SystemsWorking memoryMiddle AgedPsychiatry and Mental healthNeuropsychology and Physiological PsychologyMemory Short-TermSalivary alpha-AmylasesFemaleOlder peoplePsychologyStress PsychologicalStress (Amsterdam, Netherlands)
researchProduct

A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks

2018

International audience; Unmanned aerial vehicles (UAVs) networks have not yet received considerable research attention. Specifically, security issues are a major concern because such networks, which carry vital information, are prone to various attacks. In this paper, we design and implement a novel intrusion detection and response scheme, which operates at the UAV and ground station levels, to detect malicious anomalies that threaten the network. In this scheme, a set of detection and response techniques are proposed to monitor the UAV behaviors and categorize them into the appropriate list (normal, abnormal, suspect, and malicious) according to the detected cyber-attack. We focus on the m…

Ad hoc networksMonitoringAnomaly-based intrusion detection systemWireless ad hoc networkComputer science[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]UAVMobile computing[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]JammingComputerApplications_COMPUTERSINOTHERSYSTEMS02 engineering and technologyIntrusion detection systemAnomaly detection and rules-based intrusion detection techniquesIDSBlack hole (networking)Computer securitycomputer.software_genreMobile communicationUnmanned aerial vehicles[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR][INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0202 electrical engineering electronic engineering information engineeringFalse positive paradoxOverhead (computing)Intrusion detectionElectrical and Electronic Engineering020206 networking & telecommunicationsComputer Science ApplicationsHuman-Computer InteractionControl and Systems Engineeringintrusion detection system020201 artificial intelligence & image processingcyber-attacksIntrusion prevention systemcomputerSoftware
researchProduct

Utility-based resource allocations in multi-hop wireless networks

2011

It is well known that CSMA (Carrier Sense Multiple Access) protocols exhibit very poor performance in case of multi-hop transmissions, because of inter-link interference due to imperfect carrier sensing. Since ad-hoc networks based on multihop packet deliveries are becoming more and more common in different application and networking scenarios, different medium access control extensions are currently considered for improving the channel utilization efficiency. In this paper, we propose a simple approach based on preallocating temporal slots in which different sets of nodes are allowed to contend for the channel access, which can significantly improve CSMA performance with limited signaling …

Ad-hoc Networks; Distributed Resource Allocation; Game theory; Sensor NetworksSettore ING-INF/04 - Automatica[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Ad-hoc Networksad hoc wireless networks allocations networksSettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSData_CODINGANDINFORMATIONTHEORYSensor NetworksDistributed Resource AllocationGame theory
researchProduct

2016

The flexible access to information in working memory is crucial for adaptive behavior. It is assumed that this is realized by switching the focus of attention within working memory. Switching of attention is mirrored in the P3a component of the human event-related brain potential (ERP) and it has been argued that the processes reflected by the P3a are also relevant for selecting information within working memory. The aim of the present study was to further evaluate whether the P3a mirrors genuine switching of attention within working memory by applying an object switching task: Participants updated a memory list of four digits either by replacing one item with another digit or by processing…

Adaptive behaviorWorking memorybusiness.industrySpeech recognition05 social sciencesMemory rehearsalProcess (computing)Object (computer science)050105 experimental psychologyTask (project management)03 medical and health sciencesBehavioral NeurosciencePsychiatry and Mental healthP3a0302 clinical medicineNeuropsychology and Physiological PsychologyNeurologyMemory span0501 psychology and cognitive sciencesArtificial intelligencePsychologybusiness030217 neurology & neurosurgeryBiological PsychiatryFrontiers in Human Neuroscience
researchProduct

A distributed real-time data prediction and adaptive sensing approach for wireless sensor networks

2018

International audience; Many approaches have been proposed in the literature to reduce energy consumption in Wireless Sensor Networks (WSNs). Influenced by the fact that radio communication and sensing are considered to be the most energy consuming activities in such networks. Most of these approaches focused on either reducing the number of collected data using adaptive sampling techniques or on reducing the number of data transmitted over the network using prediction models. In this article, we propose a novel prediction-based data reduction method. furthermore, we combine it with an adaptive sampling rate technique, allowing us to significantly decrease energy consumption and extend the …

Adaptive samplingComputer Networks and CommunicationsComputer scienceReal-time computing[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technology[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]0202 electrical engineering electronic engineering information engineeringReal-time dataWork (physics)020206 networking & telecommunicationsEnergy consumption[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationComputer Science Applications[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Hardware and Architecture[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]020201 artificial intelligence & image processing[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]Wireless sensor networkSoftwarePredictive modellingEnergy (signal processing)Information SystemsData reductionPervasive and Mobile Computing
researchProduct

An efficient adaptive strategy for searching in peer-to-peer networks

2005

One of the main technical challenges in Peer-to-Peer (P2P) networks is how to efficiently locate desired resources. Although structured systems, based on distributed hash tables, can achieve fair effectiveness, they are not suitable for widely deployed Internet applications. In fact, this kind of systems shows many severe limitations, such as ignoring the autonomous nature of peers, and supporting only weakly semantic functions. Unstructured P2P networks are more attractive for real applications, since they can avoid both the limitations of centralized systems, and the drawbacks of structured approaches. However, their search algorithms are usually based on inefficient flooding schemes, tha…

Adaptive strategiesGeneral Computer ScienceExploitbusiness.industryComputer scienceDistributed computingPeer-to-peercomputer.software_genreNetwork topologyHash tableFlooding (computer networking)Search algorithmThe InternetbusinesscomputerMultiagent and Grid Systems
researchProduct

Facial emotion recognition in children and adolescents with specific learning disorder

2020

(1) Background: Some recent studies suggest that children and adolescents with different neurodevelopmental disorders perform worse in emotions recognition through facial expressions (ER) compared with typically developing peers. This impairment is also described in children with Specific Learning Disorders (SLD), compromising their scholastic achievement, social functioning, and quality of life. The purpose of our study is to evaluate ER skills in children and adolescents with SLD compared to a control group without learning disorders, and correlate them with intelligence and executive functions. (2) Materials and Methods: Our work is a cross-sectional observational study. Sixty-three chil…

Adolescentmedia_common.quotation_subjectAngerArticlelcsh:RC321-57103 medical and health sciences0302 clinical medicineExecutive functionSpecific Learning DisorderadolescentsFacial emotion recognitionlcsh:Neurosciences. Biological psychiatry. NeuropsychiatryChildrenmedia_commonFacial expressionIntelligence quotientWorking memoryGeneral NeuroscienceNeuropsychologyExecutive functionsexecutive functions030227 psychiatryfacial emotion recognition; specific learning disorder; children; adolescents; executive functionsSpecific learning disorderObservational studyPsychology030217 neurology & neurosurgeryClinical psychology
researchProduct

Working memory structure and intellectual disability

2000

The working memory of people with intellectual disability has been found to generally lag behind their mental age. However, studies concerning the structure of working memory or its connections to other cognitive functions are rare. The present study employs a versatile battery of tests for the evaluation of working memory structure in adults with intellectual disability of unknown aetiology. In addition, connections between working memory and cognitive skills valid for everyday functioning are evaluated. Working memory performance in the study participants was found to stem from two distinct components which could be regarded to represent phonological and general working memory. General wo…

AdultAdolescentReconstructive memoryShort-term memoryNeuropsychological TestsSeverity of Illness Index050105 experimental psychologyDevelopmental psychologyArts and Humanities (miscellaneous)Intellectual DisabilityMemory spanHumans0501 psychology and cognitive sciencesCognitive skillChildMemory DisordersWorking memory05 social sciencesRehabilitationReproducibility of ResultsMiddle AgedAchievementPsychiatry and Mental healthCross-Sectional StudiesNeurologyChild PreschoolPopulation SurveillanceNeurology (clinical)Childhood memoryVerbal memoryCognition DisordersPsychologyCognitive loadFollow-Up Studies050104 developmental & child psychologyCognitive psychologyJournal of Intellectual Disability Research
researchProduct