205 research outputs found
Wireless Communication Protocols for Distributed Computing Environments
The distributed computing is an approach relying on the presence of multiple devices that can interact among them in order to perform a pervasive and parallel computing. This chapter deals with the communication protocol aiming to be used in a distributed computing scenario; in particular the considered computing infrastructure is composed by elements (nodes) able to consider specific application requests for the implementation of a service in a distributed manner according to the pervasive grid computing principle (Priol & Vanneschi, 2008; Vanneschi & Veraldi, 2007). In the classical grid computing paradigm, the processing nodes are high performance computers or multicore workstations, usually organized in clusters and interconnected through broadband wired communication networks with small delay (e.g., fiber optic, DSL lines). The pervasive grid computing paradigm overcomes these limitations allowing the development of distributed applications that can perform parallel computations using heterogeneous devices interconnected by different types of communication technologies. In this way, we can resort to a computing environment composed by fixed ormobile devices (e.g., smartphones, PDAs, laptops) interconnected through broadband wireless or wired networks where the devices are able to take part to a grid computing process. Suitable techniques for the pervasive grid computing should be able to discover and organize heterogeneous resources, to allow scaling an application according to the computing power, and to guarantee specific QoS profiles (Darby III & Tzeng, 2010; Roy & Das, 2009). In particular, aim of this chapter is to present the most important challenges for the communication point of view when forming a distributed network for performing parallel and distributed computing. The focus will be mainly on the resource discovery and computation scheduling on wireless not infrastructured networks by considering their capabilities in terms of reliability and adaptation when facing with heterogeneous computing requests
Proceedings of the 2012 Workshop on Ambient Intelligence Infrastructures (WAmIi)
This is a technical report including the papers presented at the Workshop on Ambient Intelligence Infrastructures (WAmIi) that took place in conjunction with the International Joint Conference on Ambient Intelligence (AmI) in Pisa, Italy on November 13, 2012. The motivation for organizing the workshop was the wish to learn from past experience on Ambient Intelligence systems, and in particular, on the lessons learned on the system architecture of such systems. A significant number of European projects and other research have been performed, often with the goal of developing AmI technology to showcase AmI scenarios. We believe that for AmI to become further successfully accepted the system architecture is essential
Proceedings of the 2012 Workshop on Ambient Intelligence Infrastructures (WAmIi)
This is a technical report including the papers presented at the Workshop on Ambient Intelligence Infrastructures (WAmIi) that took place in conjunction with the International Joint Conference on Ambient Intelligence (AmI) in Pisa, Italy on November 13, 2012. The motivation for organizing the workshop was the wish to learn from past experience on Ambient Intelligence systems, and in particular, on the lessons learned on the system architecture of such systems. A significant number of European projects and other research have been performed, often with the goal of developing AmI technology to showcase AmI scenarios. We believe that for AmI to become further successfully accepted the system architecture is essential
Digital Twins for Ports: Derived from Smart City and Supply Chain Twinning Experience
Ports are striving for innovative technological solutions to cope with the
ever-increasing growth of transport, while at the same time improving their
environmental footprint. An emerging technology that has the potential to
substantially increase the efficiency of the multifaceted and interconnected
port processes is the digital twin. Although digital twins have been
successfully integrated in many industries, there is still a lack of
cross-domain understanding of what constitutes a digital twin. Furthermore, the
implementation of the digital twin in complex systems such as the port is still
in its infancy. This paper attempts to fill this research gap by conducting an
extensive cross-domain literature review of what constitutes a digital twin,
keeping in mind the extent to which the respective findings can be applied to
the port. It turns out that the digital twin of the port is most comparable to
complex systems such as smart cities and supply chains, both in terms of its
functional relevance as well as in terms of its requirements and
characteristics. The conducted literature review, considering the different
port processes and port characteristics, results in the identification of three
core requirements of a digital port twin, which are described in detail. These
include situational awareness, comprehensive data analytics capabilities for
intelligent decision making, and the provision of an interface to promote
multi-stakeholder governance and collaboration. Finally, specific operational
scenarios are proposed on how the port's digital twin can contribute to energy
savings by improving the use of port resources, facilities and operations.Comment: This work has been submitted to the IEEE for possible publication.
Copyright may be transferred without notice, after which this version may no
longer be accessibl
Developing Sense-and-Respond Capability in a Mobile Service Firm Enabled by Dispatching Technology: An Action Research Study
All organizations, including mobile services enterprises, must be able to adapt and respond to discontinuous and rapidly changing business environments. Although mobile service providers have considerable IT-enabled dispatching options, knowledge is limited on how to leverage these technologies to augment adaptive management practices that improve business performance and create customer benefits. Against this backdrop, my collaborative action research study adapted the framework and principles of sense-and-respond (S&R) adaptive enterprise design to help a mobile service provider, LSG, Inc., develop the transactional and transformational capabilities it needed to improve outcomes in providing field services for the State of Georgia’s lottery terminals. The dissertation examines how LSG leveraged its recent implementation of IT-enabled dispatching technology both to augment restructuring of its managerial framework and to develop adaptive strategies and modular capabilities that let it systematically sense and respond to rapid and unpredictable changes in its business environment. The study gave LSG an approach for developing and implementing adaptive enterprise design processes using the S&R framework as a heuristic to identify, modify, and redesign the command-and-control (C&C) organizational architecture and operational routines; this effort was augmented by new dispatching technology. My research revealed specific dynamic capabilities and guided senior managers’ implementation of new adaptive governance mechanisms, organizational learning processes, dynamic stakeholder resource commitments, and modular “customer-back” resource customization strategies. More generally, the research shows how adaptive enterprise design principles can transform and address the specific discontinuity challenges that small service enterprises face, and offers insights and understanding into how practitioner–researchers can use theory to leverage firm resources and assets to co-create operational value with stakeholders
Internet of Things Strategic Research Roadmap
Internet of Things (IoT) is an integrated part of Future Internet including existing and evolving Internet and network developments and could be conceptually defined as a dynamic global network infrastructure with self configuring capabilities based on standard and interoperable communication protocols where physical and virtual “things” have identities, physical attributes, and virtual personalities, use intelligent interfaces, and are seamlessly integrated into the information network
Optimised protocols for time-critical applications and internetworking in wehicular ad-hoc networks
Vehicular ad-hoc networks (VANETs) that enable communication among vehicles and between vehicles and unmanned aerial vehicles (UAVs) and cellular base stations have recently attracted significant interest from the research community, due to the wide range of practical applications they can facilitate (e.g., road safety, traffic management and rescue missions). Despite this increased research activity, the high vehicle mobility in a VANET raises concerns regarding the robustness and adaptiveness of such networks to support time-critical applications and internetworking.
In this thesis, as a first step toward the design of efficient MAC protocol to support time-critical applications and internetworking, we show that it is indeed possible to follow the dynamics of a network and consequently adapt the transmission probability of the Aloha protocol to reduce the interference and maximise the single-hop throughput between adjacent nodes. Extensive simulation validates the proposed analytical model, which
thus can serve as a promising tool to improve VANETs performance. By exploiting the parallel between the CSMA/CA and Aloha performance models, the optimal transmission probability for the Aloha protocol as a function of estimated vehicular density is derived. This probability is then used to obtain the optimal maximum CW that can be integrated in an amended CSMA/CA protocol to maximise the single-hop throughput among adjacent vehicles. We show by means of simulation that the beneficial impact the proposed protocol is increased channel throughput and reduced transmission delay when compared with the standardised protocol CSMA/CA in IEEE 802.11p. These results reveal the applicability of the new, optimised protocol to safety applications and clustering techniques with stringent performance requirements.
Lastly, we propose a Stable Clustering Algorithm for vehicular ad-hoc networks (SCalE) internetworking. The exchange of the necessary status information to support the efficient clusters formation can firmly relay on the support of our optimised CSMA/CA protocol. The SCalE algorithm makes use of the knowledge of the vehicles behaviour (explained in Chapter 5) for efficient selection of CHs, and selects a backup CH on top of the CH to maintain the stability of cluster structures. The increased stability and improved performance of the SCalE algorithm is studied and compared with existing clustering algorithms.Open Acces
A survey of self organisation in future cellular networks
This article surveys the literature over the period of the last decade on the emerging field of self organisation as applied to wireless cellular communication networks. Self organisation has been extensively studied and applied in adhoc networks, wireless sensor networks and autonomic computer networks; however in the context of wireless cellular networks, this is the first attempt to put in perspective the various efforts in form of a tutorial/survey. We provide a comprehensive survey of the existing literature, projects and standards in self organising cellular networks. Additionally, we also aim to present a clear understanding of this active research area, identifying a clear taxonomy and guidelines for design of self organising mechanisms. We compare strength and weakness of existing solutions and highlight the key research areas for further development. This paper serves as a guide and a starting point for anyone willing to delve into research on self organisation in wireless cellular communication networks
Recommended from our members
Double elevation: Autonomous weapons and the search for an irreducible law of war
What should be the role of law in response to the spread of artificial intelligence in war? Fuelled by both public and private investment, military technology is accelerating towards increasingly autonomous weapons, as well as the merging of humans and machines. Contrary to much of the contemporary debate, this is not a paradigm change; it is the intensification of a central feature in the relationship between technology and war: Double elevation, above one's enemy and above oneself. Elevation above one's enemy aspires to spatial, moral, and civilizational distance. Elevation above oneself reflects a belief in rational improvement that sees humanity as the cause of inhumanity and de-humanization as our best chance for humanization. The distance of double elevation is served by the mechanization of judgement. To the extent that judgement is seen as reducible to algorithm, law becomes the handmaiden of mechanization. In response, neither a focus on questions of compatibility nor a call for a 'ban on killer robots' help in articulating a meaningful role for law. Instead, I argue that we should turn to a long-standing philosophical critique of artificial intelligence, which highlights not the threat of omniscience, but that of impoverished intelligence. Therefore, if there is to be a meaningful role for law in resisting double elevation, it should be law encompassing subjectivity, emotion and imagination, law irreducible to algorithm, a law of war that appreciates situated judgement in the wielding of violence for the collective
- …