14 research outputs found

    Introduction to the Special Issue on Sustainable Solutions for the Intelligent Transportation Systems

    Get PDF
    The intelligent transportation systems improve the transportation system’s operational efficiency and enhance its safety and reliability by high-tech means such as information technology, control technology, and computer technology. In recent years, sustainable development has become an important topic in intelligent transportation’s development, including new infrastructure and energy distribution, new energy vehicles and new transportation systems, and the development of low-carbon and intelligent transportation equipment. New energy vehicles’ development is a significant part of green transportation, and its automation performance improvement is vital for smart transportation. The development of intelligent transportation and green, low-carbon, and intelligent transportation equipment needs to be promoted, a significant feature of transportation development in the future. For intelligent infrastructure and energy distribution facilities, the electricity for popular electric vehicles and renewable energy, such as nuclear power and hydrogen power, should be considered

    On distributed mobile edge computing

    Get PDF
    Mobile Cloud Computing (MCC) has been proposed to offload the workloads of mobile applications from mobile devices to the cloud in order to not only reduce energy consumption of mobile devices but also accelerate the execution of mobile applications. Owing to the long End-to-End (E2E) delay between mobile devices and the cloud, offloading the workloads of many interactive mobile applications to the cloud may not be suitable. That is, these mobile applications require a huge amount of computing resources to process their workloads as well as a low E2E delay between mobile devices and computing resources, which cannot be satisfied by the current MCC technology. In order to reduce the E2E delay, a novel cloudlet network architecture is proposed to bring the computing and storage resources from the remote cloud to the mobile edge. In the cloudlet network, each mobile user is associated with a specific Avatar (i.e., a dedicated Virtual Machine (VM) providing computing and storage resources to its mobile user) in the nearby cloudlet via its associated Base Station (BS). Thus, mobile users can offload their workloads to their Avatars with low E2E delay (i.e., one wireless hop). However, mobile users may roam among BSs in the mobile network, and so the E2E delay between mobile users and their Avatars may become worse if the Avatars remain in their original cloudlets. Thus, Avatar handoff is proposed to migrate an Avatar from one cloudlet into another to reduce the E2E delay between the Avatar and its mobile user. The LatEncy aware Avatar handDoff (LEAD) algorithm is designed to determine the location of each mobile user\u27s Avatar in each time slot in order to minimize the average E2E delay among all the mobile users and their Avatars. The performance of LEAD is demonstrated via extensive simulations. The cloudlet network architecture not only facilitates mobile users in offloading their computational tasks but also empowers Internet of Things (IoT). Popular IoT resources are proposed to be cached in nearby brokers, which are considered as application layer middleware nodes hosted by cloudlets in the cloudlet network, to reduce the energy consumption of servers. In addition, an Energy Aware and latency guaranteed dynamic reSourcE caching (EASE) strategy is proposed to enable each broker to cache suitable popular resources such that the energy consumption from the servers is minimized and the average delay of delivering the contents of the resources to the corresponding clients is guaranteed. The performance of EASE is demonstrated via extensive simulations. The future work comprises two parts. First, caching popular IoT resources in nearby brokers may incur unbalanced traffic loads among brokers, thus increasing the average delay of delivering the contents of the resources. Thus, how to balance the traffic loads among brokers to speed up IoT content delivery process requires further investigation. Second, drone assisted mobile access network architecture will be briefly investigated to accelerate communications between mobile users and their Avatars

    Optimized and Automated Machine Learning Techniques Towards IoT Data Analytics and Cybersecurity

    Get PDF
    The Internet-of-Things (IoT) systems have emerged as a prevalent technology in our daily lives. With the wide spread of sensors and smart devices in recent years, the data generation volume and speed of IoT systems have increased dramatically. In most IoT systems, massive volumes of data must be processed, transformed, and analyzed on a frequent basis to enable various IoT services and functionalities. Machine Learning (ML) approaches have shown their capacity for IoT data analytics. However, applying ML models to IoT data analytics tasks still faces many difficulties and challenges. The first challenge is to process large amounts of dynamic IoT data to make accurate and informed decisions. The second challenge is to automate and optimize the data analytics process. The third challenge is to protect IoT devices and systems against various cyber threats and attacks. To address the IoT data analytics challenges, this thesis proposes various ML-based frameworks and data analytics approaches in several applications. Specifically, the first part of the thesis provides a comprehensive review of applying Automated Machine Learning (AutoML) techniques to IoT data analytics tasks. It discusses all procedures of the general ML pipeline. The second part of the thesis proposes several supervised ML-based novel Intrusion Detection Systems (IDSs) to improve the security of the Internet of Vehicles (IoV) systems and connected vehicles. Optimization techniques are used to obtain optimized ML models with high attack detection accuracy. The third part of the thesis developed unsupervised ML algorithms to identify network anomalies and malicious network entities (e.g., attacker IPs, compromised machines, and polluted files/content) to protect Content Delivery Networks (CDNs) from service targeting attacks, including distributed denial of service and cache pollution attacks. The proposed framework is evaluated on real-world CDN access log data to illustrate its effectiveness. The fourth part of the thesis proposes adaptive online learning algorithms for addressing concept drift issues (i.e., data distribution changes) and effectively handling dynamic IoT data streams in order to provide reliable IoT services. The development of drift adaptive learning methods can effectively adapt to data distribution changes and avoid data analytics model performance degradation

    Design of a computer application for solving error decoupling problems

    Get PDF
    In de lineaire stationaire systeemtheorie bestaan legio problemen op het gebied van de storingsontkoppeling. De oplossing van zo'n probleem zowel als het nagaan of een oplossing uberhaupt bestaat, zijn beide slechts mogelijk na berekening van een aantal zg. invariante deelruimten.Het hoofddoel van dit afstudeerwerk is het implementeren van algoritmen op de computer, waarmee deze deelruimten kunnen worden berekend. Vervolgens kan dan van een aantal storingsontkoppelingsproblemen worden nagegaan of ze oplosbaar zijn

    Fintech Competition: Law, Policy, and Market Organisation

    Get PDF
    This open access book is the first to systematically explore competition policy in fintech markets. Drawing from the expertise of law scholars, economists, and social and natural scientists from the EU and the US, this edited collection explores the competitive dynamics, market organisation, and competition law application in fintech markets

    Geotechnical Engineering for the Preservation of Monuments and Historic Sites III

    Get PDF
    The conservation of monuments and historic sites is one of the most challenging problems facing modern civilization. It involves, in inextricable patterns, factors belonging to different fields (cultural, humanistic, social, technical, economical, administrative) and the requirements of safety and use appear to be (or often are) in conflict with the respect of the integrity of the monuments. The complexity of the topic is such that a shared framework of reference is still lacking among art historians, architects, structural and geotechnical engineers. The complexity of the subject is such that a shared frame of reference is still lacking among art historians, architects, architectural and geotechnical engineers. And while there are exemplary cases of an integral approach to each building element with its static and architectural function, as a material witness to the culture and construction techniques of the original historical period, there are still examples of uncritical reliance on modern technology leading to the substitution from earlier structures to new ones, preserving only the iconic look of the original monument. Geotechnical Engineering for the Preservation of Monuments and Historic Sites III collects the contributions to the eponymous 3rd International ISSMGE TC301 Symposium (Naples, Italy, 22-24 June 2022). The papers cover a wide range of topics, which include:   - Principles of conservation, maintenance strategies, case histories - The knowledge: investigations and monitoring - Seismic risk, site effects, soil structure interaction - Effects of urban development and tunnelling on built heritage - Preservation of diffuse heritage: soil instability, subsidence, environmental damages The present volume aims at geotechnical engineers and academics involved in the preservation of monuments and historic sites worldwide

    Global Food Value Chains and Competition Law BRICS Draft Report

    Get PDF
    corecore