148 research outputs found

    Connectivity Preserving Network Transformers

    Get PDF
    The Population Protocol model is a distributed model that concerns systems of very weak computational entities that cannot control the way they interact. The model of Network Constructors is a variant of Population Protocols capable of (algorithmically) constructing abstract networks. Both models are characterized by a fundamental inability to terminate. In this work, we investigate the minimal strengthenings of the latter that could overcome this inability. Our main conclusion is that initial connectivity of the communication topology combined with the ability of the protocol to transform the communication topology plus a few other local and realistic assumptions are sufficient to guarantee not only termination but also the maximum computational power that one can hope for in this family of models. The technique is to transform any initial connected topology to a less symmetric and detectable topology without ever breaking its connectivity during the transformation. The target topology of all of our transformers is the spanning line and we call Terminating Line Transformation the corresponding problem. We first study the case in which there is a pre-elected unique leader and give a time-optimal protocol for Terminating Line Transformation. We then prove that dropping the leader without additional assumptions leads to a strong impossibility result. In an attempt to overcome this, we equip the nodes with the ability to tell, during their pairwise interactions, whether they have at least one neighbor in common. Interestingly, it turns out that this local and realistic mechanism is sufficient to make the problem solvable. In particular, we give a very efficient protocol that solves Terminating Line Transformation when all nodes are initially identical. The latter implies that the model computes with termination any symmetric predicate computable by a Turing Machine of space Θ(n2)\Theta(n^2)

    IoT sensors in sea water environment: Ahoy! Experiences from a short summer trial

    Get PDF
    IoT sensors for measuring various sea water parameters, are explored here, aiming towards an educational context, in order to lead to a deeper understanding of the use of aquatic environments as natural resources, and towards the adoption of environmentally friendly behaviors. Sea-water sensing via IoT has not been extensively explored, due to practical difficulties in deployment, and the same applies to devising appropriate scenaria for understanding aquatic parameters in STEM education. A short hands-on IoT sensing trial, that has been conducted in various location of the Aegean sea, is reported in this paper. This research set out to gain insight into real data sets on which to base observations for devising realistic educational scenaria pertaining aquatic parameters. The results of this experiment are meant to guide research further, by shedding light into the IoT sensing issues that are involved in an educational scientific context. The goal is conducting broader research in the area of IoT water sensing towards its further utilization in STEM education

    Raising awareness for water polution based on game activities using internet of things

    Get PDF
    Awareness among young people regarding the environment and its resources and comprehension of the various factors that interplay, is key to changing human behaviour towards achieving a sustainable planet. In this paper IoT equipment, utilizing sensors for measuring various parameters of water quality, is used in an educational context targeting at a deeper understanding of the use of natural resources towards the adoption of environmentally friendly behaviours. We here note that the use of water sensors in STEM gameful learning is an area which has not received a lot of attention in the previous years. The IoT water sensing and related scenaria and practices, addressing children via discovery, gamification, and educational activities, are discussed in detail

    Bridging the gap between school and out-of-school science: A Making pedagogical approach

    Get PDF
    Making provides a beneficial learning environment that requires skills and knowledge from the areas of science, technology, engineering, and mathematics to design and construct a product or an artefact. In this paper the maker approach reflects on the pedagogical potential of learning through the design and deployment of an automated system that monitors and records environmental parameters in lakes and rivers. IoT technologies are used to connect schools with natural ecosystems, providing the opportunity to students to be actively involved in designing and developing technology artefacts to experiment with, and further, in the formulation of research questions, and in the processing and interpretation of research results and measurements. The study contributes to the research literature on bridging the gap between the school and out-of-school science

    The Dynamics and Stability of Probabilistic Population Processes

    Get PDF
    We study here the dynamics and stability of Probabilistic Population Processes, via the differential equations approach. We provide a quite general model following the work of Kurtz [15] for approximating discrete processes with continuous differential equations. We show that it includes the model of Angluin et al. [1], in the case of very large populations. We require that the long-term behavior of the family of increasingly large discrete processes is a good approximation to the long-term behavior of the continuous process, i.e., we exclude population protocols that are extremely unstable such as parity-dependent decision processes. For the general model, we give a sufficient condition for stability that can be checked in polynomial time. We also study two interesting sub cases: (a) Protocols whose specifications (in our terms) are configuration independent. We show that they are always stable and that their eventual subpopulation percentages are actually a Markov Chain stationary distribution. (b) Protocols that have dynamics resembling virus spread. We show that their dynamics are actually similar to the well-known Replicator Dynamics of Evolutionary Games. We also provide a sufficient condition for stability in this case

    A smartwater metering deployment based on the fog computing paradigm

    Get PDF
    In this paper, we look into smart water metering infrastructures that enable continuous, on-demand and bidirectional data exchange between metering devices, water flow equipment, utilities and end-users. We focus on the design, development and deployment of such infrastructures as part of larger, smart city, infrastructures. Until now, such critical smart city infrastructures have been developed following a cloud-centric paradigm where all the data are collected and processed centrally using cloud services to create real business value. Cloud-centric approaches need to address several performance issues at all levels of the network, as massive metering datasets are transferred to distant machine clouds while respecting issues like security and data privacy. Our solution uses the fog computing paradigm to provide a system where the computational resources already available throughout the network infrastructure are utilized to facilitate greatly the analysis of fine-grained water consumption data collected by the smart meters, thus significantly reducing the overall load to network and cloud resources. Details of the system's design are presented along with a pilot deployment in a real-world environment. The performance of the system is evaluated in terms of network utilization and computational performance. Our findings indicate that the fog computing paradigm can be applied to a smart grid deployment to reduce effectively the data volume exchanged between the different layers of the architecture and provide better overall computational, security and privacy capabilities to the system

    The Computational Power of Beeps

    Full text link
    In this paper, we study the quantity of computational resources (state machine states and/or probabilistic transition precision) needed to solve specific problems in a single hop network where nodes communicate using only beeps. We begin by focusing on randomized leader election. We prove a lower bound on the states required to solve this problem with a given error bound, probability precision, and (when relevant) network size lower bound. We then show the bound tight with a matching upper bound. Noting that our optimal upper bound is slow, we describe two faster algorithms that trade some state optimality to gain efficiency. We then turn our attention to more general classes of problems by proving that once you have enough states to solve leader election with a given error bound, you have (within constant factors) enough states to simulate correctly, with this same error bound, a logspace TM with a constant number of unary input tapes: allowing you to solve a large and expressive set of problems. These results identify a key simplicity threshold beyond which useful distributed computation is possible in the beeping model.Comment: Extended abstract to appear in the Proceedings of the International Symposium on Distributed Computing (DISC 2015

    Modeling and forecasting gender-based violence through machine learning techniques

    Get PDF
    Gender-Based Violence (GBV) is a serious problem that societies and governments must address using all applicable resources. This requires adequate planning in order to optimize both resources and budget, which demands a thorough understanding of the magnitude of the problem, as well as analysis of its past impact in order to infer future incidence. On the other hand, for years, the rise of Machine Learning techniques and Big Data has led different countries to collect information on both GBV and other general social variables that in one way or another can affect violence levels. In this work, in order to forecast GBV, firstly, a database of features related to more than a decade’s worth of GBV is compiled and prepared from official sources available due to Spain’s open access. Then, secondly, a methodology is proposed that involves testing different methods of features selection so that, with each of the subsets generated, four techniques of predictive algorithms are applied and compared. The tests conducted indicate that it is possible to predict the number of GBV complaints presented to a court at a predictive horizon of six months with an accuracy (Root Median Squared Error) of 0.1686 complaints to the courts per 10,000 inhabitants—throughout the whole Spanish territory—with a Multi-Objective Evolutionary Search Strategy for the selection of variables, and with Random Forest as the predictive algorithm. The proposed methodology has also been successfully applied to three specific Spanish territories of different populations (large, medium, and small), pointing to the presented method’s possible use elsewhere in the world
    • …
    corecore