1,180 research outputs found
Task allocation in group of nodes in the IoT: A consensus approach
The realization of the Internet of Things (IoT) paradigm relies on the implementation of systems of cooperative intelligent objects with key interoperability capabilities. In order for objects to dynamically cooperate to IoT applications' execution, they need to make their resources available in a flexible way. However, available resources such as electrical energy, memory, processing, and object capability to perform a given task, are often limited. Therefore, resource allocation that ensures the fulfilment of network requirements is a critical challenge. In this paper, we propose a distributed optimization protocol based on consensus algorithm, to solve the problem of resource allocation and management in IoT heterogeneous networks. The proposed protocol is robust against links or nodes failures, so it's adaptive in dynamic scenarios where the network topology changes in runtime. We consider an IoT scenario where nodes involved in the same IoT task need to adjust their task frequency and buffer occupancy. We demonstrate that, using the proposed protocol, the network converges to a solution where resources are homogeneously allocated among nodes. Performance evaluation of experiments in simulation mode and in real scenarios show that the algorithm converges with a percentage error of about±5% with respect to the optimal allocation obtainable with a centralized approach
Energy consumption management in Smart Homes: An M-Bus communication system
Energy consumption management in Smart Home environments relies on the implementation of systems of cooperative intelligent objects named Smart Meters. In order for devices to cooperate to smart metering applications' execution, they need to make their information available. In this paper we propose a framework that aims at managing energy consumption of controllable appliances in groups of Smart Homes belonging to the same neighbourhood or condominium. We consider not only electric power distribution, but also alternative energy sources such as solar panels. We define a communication paradigm based on M-Bus for the acquisition of relevant data by managing nodes. We also provide a lightweight algorithm for the distribution of the available alternative power among houses. Performance evaluation of experiments in simulation mode prove that the proposed framework does not jeopardise the lifetime of Smart Meters, particularly in typical situations where managed devices do not continuously turn on and off
The macrozoobenthic community of the Santa Gilla lagoon (southern Sardinia, Italy)
1 - Macrozoobenthos is one of the most significant communities of hydrobionts for assessing the ecological state of a water body. In spite of its importance, only few data concerning the macrobenthic community of Santa Gilla lagoon are available;
2 - Santa Gilla is one of the most important wetlands in Sardinia. The aim of this study is to give data on species composition of its macrozoobenthic community;
3 - Sampling has been carried out in 2010-2011 in July, October, January and April, in three stations located along a salinity gradient and the main environmental parameters were measured;
4 - A total of 13031 specimens belonging to 92 taxonomic groups and 5 main phyla (Anellida, Mollusca, Arthropoda, Cnidaria and Nemertea) were found. Among them, 52 different taxa were collected and pointed out for the first time in Santa Gilla lagoon in this work.
5 - Finally, seasonal and space differences were observed in the abundance values of the main taxonomic groups and in the diversity indices values
Multiaxial Kitagawa analysis of A356-T6
Experimental Kitagawa analysis has been performed on A356-T6 containing
natural and artificial defects. Results are obtained with a load ratio of R =
-1 for three different loadings: tension, torsion and combined tension-torsion.
The critical defect size determined is 400 \pm 100 \mum in A356-T6 under
multiaxial loading. Below this value, the microstructure governs the endurance
limit mainly through Secondary Dendrite Arm Spacing (SDAS). Four theoretical
approaches are used to simulate the endurance limit characterized by a Kitagawa
relationship are compared: Murakami relationships [Y Murakami, Metal Fatigue:
Effects of Small Defects and Nonmetallic Inclusions, Elsevier, 2002.],
defect-crack equivalency via Linear Elastic Fracture Mechanics (LEFM), the
Critical Distance Method (CDM) proposed by Susmel and Taylor [L. Susmel, D.
Taylor. Eng. Fract. Mech. 75 (2008) 15.] and the gradient approach proposed by
Nadot [Y. Nadot, T. ~Billaudeau. Eng. Fract. Mech. 73 (2006) 1.]. It is shown
that the CDM and gradient methods are accurate; however fatigue data for three
loading conditions is necessary to allow accurate identification of an
endurance limit.Comment: 27 pages, 11 figure
Objects that agree on task frequency in the IoT: A lifetime-oriented consensus based approach
Some key features of the end-systems impact on the way communications happen within the IoT: available objects' resources are limited, different objects may provide the same information (e. g. sense the same physical measure), the number of nodes in the IoT is quickly overcoming the number of Internet hosts with greater reliability issues. This entails for a new paradigm of communication with respect to those characterizing the traditional Internet. Before providing the required information about the physical world, objects coordinate with the other objects in groups and provide a unified service to the external world (the application that requires the service), with the intent to distribute the load of the requested services according to specific community defined rules, which could be: lifetime extension, QoS (Quality of Service) maximization, reward maximization, or others. In this paper other than describing the characteristics of this new communication paradigm and challenges it is called to address, we also propose a first solution for its implementation that relies on a distributed optimization protocol based on the consensus algorithm. Results of simulations and real experiments are also presented that show the viability in implementing the new communication model in a distributed way
Analysis of the fatigue strength under two load levels of a stainless steel based on energy dissipation
In this paper the fatigue behaviour of a stainless steel AISI 304L is analysed. In the first part of the work the results obtained under constant amplitude fatigue are presented and synthesised in terms of both stress amplitude and energy released to the surroundings as heat by a unit volume of material per cycle, Q. Then some specimens have been fatigued in variable amplitude, two different load level tests: the first level was set higher while the second was lower than the constant amplitude fatigue limit. The Q values, evaluated during the second part of the fatigue test, have been compared with those calculated under constant amplitude fatigue at the same load level. The comparison allowed us to notice that the Q parameter is sensitive to the fatigue damage accumulated by the material during the first part of the fatigue test
Resistenza a fatica di strutture in leghe di alluminio: normative a confronto e verifica sperimentale
Le problematiche relative all’utilizzo delle normative nell’ambito della progettazione a fatica di strutture in leghe di alluminio sono state di recente affrontate in numerosi lavori che hanno messo in luce sia le difficoltà legate al passaggio da normative oramai obsolete ad altre di nuova concezione, ma di caratteristiche e struttura completamente diverse, che la sostanziale carenza anche all’interno delle più recenti normative europee, quale l’Eurocodice 9, di molti risultati e metodi sviluppati in anni di ricerca scientifica e ormai indiscutibilmente consolidati. Il presente lavoro si propone di approfondire entrambe le tematiche tramite il confronto tra risultati sperimentali tratti da letteratura e le corrispondenti curve di resistenza proposte rispettivamente dalla normativa italiana UNI 8634, di recente ritirata, e dall’Eurocodice 9. In questo modo verranno messe in luce le differenze tra i valori di resistenza proposti dalle due norme e verrà illustrata sia la corrispondenza a volte poco soddisfacente con i risultati sperimentali che le conseguenze dovute alla mancata applicazione di assodati risultati teorici
Subsidence due to crack closure and depressurization of hydrothermal systems: a case study from Mt Epomeo (Ischia Island, Italy)
Levelling surveys carried out between 1990 and 2003 on the Mt
Epomeo resurgent block (Ischia Island) record negative dislocations
on its northern and southern flanks with a maximum
subsidence rate of 1.27 cm yr)1. This deformation is not
associated with the cooling, crystallization or lateral drainage
of magma and cannot be explained by a pressure point or
prolate ellipsoid source. Results from dislocation models and
the available structural and geochemical information indicate
that the subsidence is due to crack closure processes along two
main ENE–WSW and E–W preexisting faults, which represent the
preferred pathway of CO2 degassing from the hydrothermal
system located beneath Mt Epomeo. The monitoring of the
dislocations and CO2 flux along these faults could give useful
information on the dynamics of the hydrothermal system
Checking and Enforcing Security through Opacity in Healthcare Applications
The Internet of Things (IoT) is a paradigm that can tremendously
revolutionize health care thus benefiting both hospitals, doctors and patients.
In this context, protecting the IoT in health care against interference,
including service attacks and malwares, is challenging. Opacity is a
confidentiality property capturing a system's ability to keep a subset of its
behavior hidden from passive observers. In this work, we seek to introduce an
IoT-based heart attack detection system, that could be life-saving for patients
without risking their need for privacy through the verification and enforcement
of opacity. Our main contributions are the use of a tool to verify opacity in
three of its forms, so as to detect privacy leaks in our system. Furthermore,
we develop an efficient, Symbolic Observation Graph (SOG)-based algorithm for
enforcing opacity
- …