148 research outputs found
Connectivity Preserving Network Transformers
The Population Protocol model is a distributed model that concerns systems of
very weak computational entities that cannot control the way they interact. The
model of Network Constructors is a variant of Population Protocols capable of
(algorithmically) constructing abstract networks. Both models are characterized
by a fundamental inability to terminate. In this work, we investigate the
minimal strengthenings of the latter that could overcome this inability. Our
main conclusion is that initial connectivity of the communication topology
combined with the ability of the protocol to transform the communication
topology plus a few other local and realistic assumptions are sufficient to
guarantee not only termination but also the maximum computational power that
one can hope for in this family of models. The technique is to transform any
initial connected topology to a less symmetric and detectable topology without
ever breaking its connectivity during the transformation. The target topology
of all of our transformers is the spanning line and we call Terminating Line
Transformation the corresponding problem. We first study the case in which
there is a pre-elected unique leader and give a time-optimal protocol for
Terminating Line Transformation. We then prove that dropping the leader without
additional assumptions leads to a strong impossibility result. In an attempt to
overcome this, we equip the nodes with the ability to tell, during their
pairwise interactions, whether they have at least one neighbor in common.
Interestingly, it turns out that this local and realistic mechanism is
sufficient to make the problem solvable. In particular, we give a very
efficient protocol that solves Terminating Line Transformation when all nodes
are initially identical. The latter implies that the model computes with
termination any symmetric predicate computable by a Turing Machine of space
IoT sensors in sea water environment: Ahoy! Experiences from a short summer trial
IoT sensors for measuring various sea water parameters, are explored here, aiming towards an educational context, in order to lead to a deeper understanding of the use of aquatic environments as natural resources, and towards the adoption of environmentally friendly behaviors. Sea-water sensing via IoT has not been extensively explored, due to practical difficulties in deployment, and the same applies to devising appropriate scenaria for understanding aquatic parameters in STEM education. A short hands-on IoT sensing trial, that has been conducted in various location of the Aegean sea, is reported in this paper. This research set out to gain insight into real data sets on which to base observations for devising realistic educational scenaria pertaining aquatic parameters. The results of this experiment are meant to guide research further, by shedding light into the IoT sensing issues that are involved in an educational scientific context. The goal is conducting broader research in the area of IoT water sensing towards its further utilization in STEM education
Raising awareness for water polution based on game activities using internet of things
Awareness among young people regarding the environment and its resources and comprehension of the various factors that interplay, is key to changing human behaviour towards achieving a sustainable planet. In this paper IoT equipment, utilizing sensors for measuring various parameters of water quality, is used in an educational context targeting at a deeper understanding of the use of natural resources towards the adoption of environmentally friendly behaviours. We here note that the use of water sensors in STEM gameful learning is an area which has not received a lot of attention in the previous years. The IoT water sensing and related scenaria and practices, addressing children via discovery, gamification, and educational activities, are discussed in detail
Bridging the gap between school and out-of-school science: A Making pedagogical approach
Making provides a beneficial learning environment that requires skills and knowledge from the areas of science, technology, engineering, and mathematics to design and construct a product or an artefact. In this paper the maker approach reflects on the pedagogical potential of learning through the design and deployment of an automated system that monitors and records environmental parameters in lakes and rivers. IoT technologies are used to connect schools with natural ecosystems, providing the opportunity to students to be actively involved in designing and developing technology artefacts to experiment with, and further, in the formulation of research questions, and in the processing and interpretation of research results and measurements. The study contributes to the research literature on bridging the gap between the school and out-of-school science
The Dynamics and Stability of Probabilistic Population Processes
We study here the dynamics and stability of Probabilistic Population Processes, via the differential equations approach. We provide a quite general model following the work of Kurtz [15] for approximating discrete processes with continuous differential equations. We show that it includes the model of Angluin et al. [1], in the case of very large populations. We require that the long-term behavior of the family of increasingly large discrete processes is a good approximation to the long-term behavior of the continuous process, i.e., we exclude population protocols that are extremely unstable such as parity-dependent decision processes. For the general model, we give a sufficient condition for stability that can be checked in polynomial time. We also study two interesting sub cases: (a) Protocols whose specifications (in our terms) are configuration independent. We show that they are always stable and that their eventual subpopulation percentages are actually a Markov Chain stationary distribution. (b) Protocols that have dynamics resembling virus spread. We show that their dynamics are actually similar to the well-known Replicator Dynamics of Evolutionary Games. We also provide a sufficient condition for stability in this case
A smartwater metering deployment based on the fog computing paradigm
In this paper, we look into smart water metering infrastructures that enable continuous, on-demand and bidirectional data exchange between metering devices, water flow equipment, utilities and end-users. We focus on the design, development and deployment of such infrastructures as part of larger, smart city, infrastructures. Until now, such critical smart city infrastructures have been developed following a cloud-centric paradigm where all the data are collected and processed centrally using cloud services to create real business value. Cloud-centric approaches need to address several performance issues at all levels of the network, as massive metering datasets are transferred to distant machine clouds while respecting issues like security and data privacy. Our solution uses the fog computing paradigm to provide a system where the computational resources already available throughout the network infrastructure are utilized to facilitate greatly the analysis of fine-grained water consumption data collected by the smart meters, thus significantly reducing the overall load to network and cloud resources. Details of the system's design are presented along with a pilot deployment in a real-world environment. The performance of the system is evaluated in terms of network utilization and computational performance. Our findings indicate that the fog computing paradigm can be applied to a smart grid deployment to reduce effectively the data volume exchanged between the different layers of the architecture and provide better overall computational, security and privacy capabilities to the system
Modeling and forecasting gender-based violence through machine learning techniques
Gender-Based Violence (GBV) is a serious problem that societies and governments must address using all applicable resources. This requires adequate planning in order to optimize both resources and budget, which demands a thorough understanding of the magnitude of the problem, as well as analysis of its past impact in order to infer future incidence. On the other hand, for years, the rise of Machine Learning techniques and Big Data has led different countries to collect information on both GBV and other general social variables that in one way or another can affect violence levels. In this work, in order to forecast GBV, firstly, a database of features related to more than a decade’s worth of GBV is compiled and prepared from official sources available due to Spain’s open access. Then, secondly, a methodology is proposed that involves testing different methods of features selection so that, with each of the subsets generated, four techniques of predictive algorithms are applied and compared. The tests conducted indicate that it is possible to predict the number of GBV complaints presented to a court at a predictive horizon of six months with an accuracy (Root Median Squared Error) of 0.1686 complaints to the courts per 10,000 inhabitants—throughout the whole Spanish territory—with a Multi-Objective Evolutionary Search Strategy for the selection of variables, and with Random Forest as the predictive algorithm. The proposed methodology has also been successfully applied to three specific Spanish territories of different populations (large, medium, and small), pointing to the presented method’s possible use elsewhere in the world
The Computational Power of Beeps
In this paper, we study the quantity of computational resources (state
machine states and/or probabilistic transition precision) needed to solve
specific problems in a single hop network where nodes communicate using only
beeps. We begin by focusing on randomized leader election. We prove a lower
bound on the states required to solve this problem with a given error bound,
probability precision, and (when relevant) network size lower bound. We then
show the bound tight with a matching upper bound. Noting that our optimal upper
bound is slow, we describe two faster algorithms that trade some state
optimality to gain efficiency. We then turn our attention to more general
classes of problems by proving that once you have enough states to solve leader
election with a given error bound, you have (within constant factors) enough
states to simulate correctly, with this same error bound, a logspace TM with a
constant number of unary input tapes: allowing you to solve a large and
expressive set of problems. These results identify a key simplicity threshold
beyond which useful distributed computation is possible in the beeping model.Comment: Extended abstract to appear in the Proceedings of the International
Symposium on Distributed Computing (DISC 2015
45th International Colloquium on Automata, Languages, and Programming, ICALP 2018
Front Matter, Table of Contents, Preface, Conference Organizatio
- …