1,750 research outputs found

    Self-Evaluation Applied Mathematics 2003-2008 University of Twente

    Get PDF
    This report contains the self-study for the research assessment of the Department of Applied Mathematics (AM) of the Faculty of Electrical Engineering, Mathematics and Computer Science (EEMCS) at the University of Twente (UT). The report provides the information for the Research Assessment Committee for Applied Mathematics, dealing with mathematical sciences at the three universities of technology in the Netherlands. It describes the state of affairs pertaining to the period 1 January 2003 to 31 December 2008

    Gossip Algorithms for Distributed Signal Processing

    Full text link
    Gossip algorithms are attractive for in-network processing in sensor networks because they do not require any specialized routing, there is no bottleneck or single point of failure, and they are robust to unreliable wireless network conditions. Recently, there has been a surge of activity in the computer science, control, signal processing, and information theory communities, developing faster and more robust gossip algorithms and deriving theoretical performance guarantees. This article presents an overview of recent work in the area. We describe convergence rate results, which are related to the number of transmitted messages and thus the amount of energy consumed in the network for gossiping. We discuss issues related to gossiping over wireless links, including the effects of quantization and noise, and we illustrate the use of gossip algorithms for canonical signal processing tasks including distributed estimation, source localization, and compression.Comment: Submitted to Proceedings of the IEEE, 29 page

    Learning structure and schemas from heterogeneous domains in networked systems: a survey

    Get PDF
    The rapidly growing amount of available digital documents of various formats and the possibility to access these through internet-based technologies in distributed environments, have led to the necessity to develop solid methods to properly organize and structure documents in large digital libraries and repositories. Specifically, the extremely large size of document collections make it impossible to manually organize such documents. Additionally, most of the document sexist in an unstructured form and do not follow any schemas. Therefore, research efforts in this direction are being dedicated to automatically infer structure and schemas. This is essential in order to better organize huge collections as well as to effectively and efficiently retrieve documents in heterogeneous domains in networked system. This paper presents a survey of the state-of-the-art methods for inferring structure from documents and schemas in networked environments. The survey is organized around the most important application domains, namely, bio-informatics, sensor networks, social networks, P2Psystems, automation and control, transportation and privacy preserving for which we analyze the recent developments on dealing with unstructured data in such domains.Peer ReviewedPostprint (published version

    Accessibility evaluation of chats and forums in e-learning environments

    Get PDF
    Proceedings of: 2013 International Conference on Frontiers in Education: Computer Science & Computer Engineering (FECS'13): WORLDCOMP'13, July 22-25, 2013, Las Vegas, Nevada (USA)Collaborative learning is useful for students in their learning process. Nowadays, most e-learning systems include Computer Supported Collaborative Learning (CSCL) tools like chats and forums; however, are they accessible for everybody? This paper presents a heuristic evaluation of accessibility of two CSCL tools (chat and forum) in four web-based, open-source Learning Content Management Systems (LCMS): Moodle, ATutor, dotLRN and Claroline. The evaluation results show that the CSCL tools evaluated present accessibility barriers which are a handicap for many students who want to use the LCMSs Moreover, some recommendations are offered in order to improve the accessibility of the evaluated tools. Considering these recommendations in the development of the evaluated tools, all students could participate actively in the collaborative tasks proposed by teachersThis research work has been supported by the Regional Government of Madrid under the Research Network MA2VICMR (S2009/TIC-1542) and by the Spanish Ministry of Economy under the project MULTIMEDICA (TIN2010-20644-C03-01)Publicad

    Dinamička distribucija sigurnosnih ključeva i koalicijski protokol IP adresa za mobilne ad hoc mreže

    Get PDF
    In mobile adhoc networks (MANETs) a tree-based dynamic address auto-configuration protocol (T-DAAP) is one of the best protocols designed for address assignment as far as the network throughput and packet delays are concerned. Moreover, MANET security is an important factor for many applications given that any node can listen to the channel and overhear the packets being transmitted. In this paper, we merge the address assignment with the security key delivery into one protocol, such that a node in the MANET is configured with IP address and security key simultaneously. To the best of our knowledge, no single protocol provides concurrent assignment of IP addresses and security keys for MANET nodes. The proposed method, which is based on T-DAAP, shows significant enhancements in the required control packets needed for assigning network nodes IP addresses and security keys, MAC layer packets, total end-to-end delay, and channel throughput over those obtained when using separate protocols. Additionally, it provides not only efficient security keys to the nodes from the first moment they join the network, but also secure delivery of the address and security key to all participating nodes. It is noteworthy to mention that providing a complete security model for MANET to detect and countermeasure network security threats and attacks is beyond the scope of our proposed protocol.Kod mobilnih ad hoc mreža (MANET) dinamički protokol za autokonfiguraciju adresa baziran na stablu (T-DAAP) je jedan od najboljih protokola dizajniranih za dodjelu adresa iz perspektive propusnosti mreže i i kašnjenja paketa. štoviše, sigurnost MANET-a je važan faktor za mnoge aplikacije s obzirom da bilo koji čvor može osluškivati kanal i slučajno čuti pakete koji se šalju. U ovom radu, dodjela adresa i dostava sigurnosnih ključeva spojeni su u jedan protokol tako da je čvor u MANET-u konfiguriran simultano s IP adresom i sigurnosnim ključem. Prema saznanjima autora, niti jedan postojeći protokol ne pruža istovremeno dodjeljivanje IP adrese i sigurnosnog ključa za MANET čvorove. Predložena metoda, koja se bazira na T-DAAP-u, pokazuje značajna poboljšanja u odnosu na metode koje koriste odvojene porotokole, kod traženih kontrolnih paketa koji su potrebni za dodjeljivanje IP adresa i sigurnosnih ključeva čvorovima mreže, MAC paketa, ukupnog end-to-end kašnjenja i propusnosti kanala. Dodatno pruža ne samo efikasne sigurnosne ključeve čvorovima od trenutka kad se priključe mreži, nego i sigurno dostavljanje adrese i sigurnosnog ključa svim čvorovima koji sudjeluju u mreži. Važno je spomenuti da je pružanje cjelokupnog sigurnosnog modela za MANET koji detektira dodatno i protumjere prijetnjama i napadima na sigurnost mreže izvan dosega predloženog protokola

    Radiative Contour Mapping Using UAS Swarm

    Full text link
    The work is related to the simulation and design of small and medium scale unmanned aerial system (UAS), and its implementation for radiation measurement and contour mapping with onboard radiation sensors. The compact high-resolution CZT sensors were integrated to UAS platforms as the plug-and-play components using Robot Operation System. The onboard data analysis provides time and position-stamped intensities of gamma-ray peaks for each sensor that are used as the input data for the swarm flight control algorithm. In this work, a UAS swarm is implemented for radiation measurement and contour mapping. The swarm of UAS has advantages over a single agent based approach in detecting radiative sources and effectively mapping the area. The proposed method can locate sources of radiation as well as mapping the contaminated area for enhancing situation awareness capabilities for first responders. This approach uses simultaneous radiation measurements by multiple UAS flying in a circular formation to find the steepest gradient of radiation to determine a bulk heading angle for the swarm for contour mapping, which can provide a relatively precise boundary of safety for potential human exploration

    Performance Evaluation Of Tcp Variants In Wi-Fi Network Using Cross Layer Design Protocol And Explicit Congestion Notification

    Full text link
    corecore