the IEC 61499 standard has been proposed for development of next-generation industrial automation systems to support portability, interoperability, and configurability. Compared withthe traditional IEC 61131-3 standa...
详细信息
ISBN:
(纸本)9781728129273
the IEC 61499 standard has been proposed for development of next-generation industrial automation systems to support portability, interoperability, and configurability. Compared withthe traditional IEC 61131-3 standard, it provides an open reference architecture with some key features: object-oriented modeling by using function blocks as basic elements, and event-driven execution by using data/events as input/output. Recently IEC 61499 has been integrated with its enabling technologies to realize distributedintelligent automation for industrial cyber-physical systems. In this paper, two perspectives are provided through analysis of recent research: a) design paradigms for IEC 61499, including object-oriented design, component-based design, and service-oriented architecture;and b) computing paradigms for IEC 61499, including distributed intelligence, autonomic computing, and cloud computing. Future research trends are also outlined as a conclusion.
this paper proposes a method of the interactive proof to fuse the multi-source text from the internet. the data from the internet described by ontology semantics, and the computing combined the semantic analysis with ...
详细信息
ISBN:
(纸本)9781509039449
this paper proposes a method of the interactive proof to fuse the multi-source text from the internet. the data from the internet described by ontology semantics, and the computing combined the semantic analysis withthe intelligent computation. An experiment about the relation of the hypertension and the food made in this paper, which used the former method.
Cloud computing became mainstream in the field of information technology. Cloud computing represents a distributedcomputing paradigm that focuses on providing a wide range of users withdistributed access to scalable...
详细信息
Many studies have identified the numerous advantages of heterogeneous network architectures in enhancing resource efficiency and user experience. However, there are still open questions related to the decision-making ...
详细信息
ISBN:
(纸本)9781665428545
Many studies have identified the numerous advantages of heterogeneous network architectures in enhancing resource efficiency and user experience. However, there are still open questions related to the decision-making process. In this paper, we present DURATS: distributed User-centric Radio Access technology Selection framework formulated as a Multiple Criteria Decision Making (MCDM) problem in the decision-making step. Realistic evaluation scenarios were conducted with a full-stack network simulator to prove the efficiency of this proposal. Our findings show the benefits of DURATS, under low and high-density network configurations, in enhancing network performance perceived by end-users while considering Quality of Service (QoS) constraints.
this paper investigates the problem of distributed resource management (i.e., joint device association, spectrum allocation, and power allocation) in two-tier heterogeneous networks without any central controller. Con...
详细信息
ISBN:
(纸本)9781665428545
this paper investigates the problem of distributed resource management (i.e., joint device association, spectrum allocation, and power allocation) in two-tier heterogeneous networks without any central controller. Considering the fact that the network is highly complex with large state and action spaces, a multi-agent dueling deep-Q network-based algorithm combined withdistributed coordinated learning is proposed to effectively learn the optimized intelligent resource management policy, where the algorithm adopts dueling deep network to learn the action-value distribution by estimating boththe state-value and action advantage functions. Under the distributed coordinated learning manner and dueling architecture, the learning algorithm can rapidly converge to the optimized policy. Simulation results demonstrate that the proposed distributed coordinated learning algorithm outperforms other existing learning algorithms in terms of learning efficiency, network data rate, and QoS satisfaction probability.
Today many users withtheir smart mobile devices enjoy the benefits of broadband Internet services. this is primarily enabled by pushing computing, control, data storage and processing into the cloud. However, the clo...
详细信息
ISBN:
(纸本)9781509038435
Today many users withtheir smart mobile devices enjoy the benefits of broadband Internet services. this is primarily enabled by pushing computing, control, data storage and processing into the cloud. However, the cloud encounters growing limitations, such as reduced latency, high mobility, high scalability and real-time execution in order to meet the computing and intelligent networking demands for the next 5G mobile and wireless network. A new paradigm called Fog computing and Networking, or briefly Fog has emerged to resolve these limits. Fog distributes computing, data processing, and networking services closer to the end users. It is an architecture where distributed edge and user devices collaborate with each other and withthe clouds to carry out computing, control, networking, and data management tasks. Fog applied in 5G network can significantly improve network performance in terms of spectral and energy efficiency, enable direct device-to-device wireless communications, and support the growing trend of network function virtualization and separation of network control intelligence from radio network hardware. this paper evaluates the quality of cloud and fog computing and networking orchestrated services in 5G mobile and wireless network in terms of energy efficiency.
this paper describes a technique to effectively isolate mobile objects or processes that execute downloaded, potentially suspicious programs. It relies on wish lists, trust lists and capability lists. Wish lists are c...
详细信息
ISBN:
(纸本)0818678135
this paper describes a technique to effectively isolate mobile objects or processes that execute downloaded, potentially suspicious programs. It relies on wish lists, trust lists and capability lists. Wish lists are carried along with programs or mobile objects and denote the resources requested by the program to do what it claims to do. Wish lists are transformed into capability lists when downloaded programs are started. Trust lists reside on stations and are used to determine which members of wish lists are taken over into capability lists. the capability lists are enforced during the execution of programs. All lists are symbolic to enable their interpretation in heterogeneous environments. the paper describes the technique, its integration in a Linux environment and first experiences.
LoRa (Long Range) networks tend to be a prevailing technology for smart buildings applications. Its Chirp Spread Spectrum (CSS) modulation technique allows for higher receiver sensitivity. However, its unstable behavi...
详细信息
ISBN:
(纸本)9781665439299
LoRa (Long Range) networks tend to be a prevailing technology for smart buildings applications. Its Chirp Spread Spectrum (CSS) modulation technique allows for higher receiver sensitivity. However, its unstable behaviour in terms of electromagnetic propagation motivated this paper to assess the influence of these parameters under temperature and humidity variations on the reliability of LoRa connectivity. the current work suggests a method that takes into consideration the indoor fluctuation of temperature and humidity. the current method is based on the Multi-Wall propagation Model (MW M) aiming at path loss calculation. Simulation results were verified with real-life measurements carried out in a Neapolis University Pafos (NU P) building. the simulation results are in good agreement withthe measured data. Nevertheless, the study revealed that the environmental factors of temperature and humidity have a smooth effect on indoor path loss calculation.
Withthe development of science and technology, biometrics technology has been introduced into the security field, and it is considered to be the most secure and effective way to identify a person by his or her biomet...
详细信息
ISBN:
(纸本)9781728186160
Withthe development of science and technology, biometrics technology has been introduced into the security field, and it is considered to be the most secure and effective way to identify a person by his or her biometrics. Among the many biometric identification methods, face recognition is one of the earliest, most widely used, most valuable, most mature and low-cost biometric identification methods. the traditional use of keys and smart cards, such as secret keys and digital passwords, has great risks and security risks. the embedded intelligent face recognition access control system solves this problem effectively.
the functions and software structure of the higher level of intelligentdistributed Sensor Network (IDSN) are considered. the main purpose of software functions is reaching of a high accuracy of the data acquisition a...
详细信息
ISBN:
(纸本)0780358902
the functions and software structure of the higher level of intelligentdistributed Sensor Network (IDSN) are considered. the main purpose of software functions is reaching of a high accuracy of the data acquisition and processing using neural networks. the proposed client-server software architecture provides effective using of computing resources of IDSN central computer.
暂无评论