The goal of this paper is to bridge the paradigms of Linked Data and Conceptual Modeling, which have been developed from quite distinct concerns, although certain opportunities may stimulate the evolution of the Web t...
详细信息
The goal of this paper is to bridge the paradigms of Linked Data and Conceptual Modeling, which have been developed from quite distinct concerns, although certain opportunities may stimulate the evolution of the Web towards a new type of knowledge space driven by diagrammatic models. To this end, the work at hand investigates structural patterns in a multitude of modeling languages accumulated over time within the Open Model Initiative Laboratory and defines for each pattern transformation rules that produce graph-based model serializations, thus enabling the processing of diagrammatic models using the Web of Data tech-nological space and practices.
Recent proliferation of sensor networks in various application areas has promoted real-time behavioral monitoring of various physical systems. The opportunity to use sensor generated data dynamically for improving spe...
详细信息
Recent proliferation of sensor networks in various application areas has promoted real-time behavioral monitoring of various physical systems. The opportunity to use sensor generated data dynamically for improving speed, accuracy, and general performance of predictive behavior modeling simulation is of paramount importance. The present paper identifies enabling modeling methods and computational strategies that are critical for achieving real-time or near real-time simulation response of very large and complex systems. It also discusses our choices of these technologies in the context of sample multidisciplinary computational mechanics applications and describes two examples to demonstrate the feasibility of integrating real-time data with real-time simulation.
Trust and security are critical deployment require-ments for Industrial Internet of Things (IIoT) networks. A recent protocol, called TRUTH, integrates security mechanisms for authentication and privacy alongside a De...
详细信息
ISBN:
(数字)9798350364910
ISBN:
(纸本)9798350364927
Trust and security are critical deployment require-ments for Industrial Internet of Things (IIoT) networks. A recent protocol, called TRUTH, integrates security mechanisms for authentication and privacy alongside a Dempster-Shafer based trust model, to assess the trustworthiness of collected data. We analyze this protocol and show that it does not comply with the implementation requirements of the 5G standard, and that flaws in the identification of involved parties hinder its adoption by 5G devices. We show how to fix this protocol and tailor it for the specific 5G implementation constraints, by enhancing its computational and communication performance. Finally, we show how to prove the security of this fixed protocol (TRUTH +) using the Tamarin automated verification tool.
In the context of high-end computing systems, general-purpose operating systems impose overhead on the applications they support due to unneeded services. Although dedicated operating systems overcome this issue, they...
详细信息
In the context of high-end computing systems, general-purpose operating systems impose overhead on the applications they support due to unneeded services. Although dedicated operating systems overcome this issue, they are difficult to develop or adapt. In this paper, we propose a framework, based on the component programming paradigm, which supports the development and adaptation of such operating systems. This framework makes possible the a la carte construction of operating systems which provide specific high-end computing system characteristics.
This paper presents a secure image cryptography telecom system based on a Chua's circuit chaotic noise generator. A chaotic system based on synchronised Master-Slave Chua's circuits has been used as a chaotic ...
详细信息
The DEVStone benchmark allows us to evaluate the performance of discrete-event simulators based on the DEVS formalism. It provides model sets with different characteristics, enabling the analysis of specific issues of...
详细信息
The Business Process Modelling and Notation (BPMN) is a widely-accepted standard for process modelling, which can be used to model the clinical processes contained in guidelines. computersystems based on guidelines n...
详细信息
The Business Process Modelling and Notation (BPMN) is a widely-accepted standard for process modelling, which can be used to model the clinical processes contained in guidelines. computersystems based on guidelines need to embed these clinical processes, e.g. using a computer-Interpretable Guideline (CIG) language. However, encoding guidelines in a CIG language is a difficult task which is usually performed by technical staff. Building on our previous work, the transformation-based refinement of guideline models, in this paper we describe an algorithm to transform BPMN models into the SDA CIG language. The use of BPMN has the potential to empower clinicians in the modelling task. In combination with the transformation algorithm, this can lead to an increased adoption of CIG languages, SDA and others.
During emergency situations, reliable and fast communication is crucial for an effective response and coordination of recovery and rescue operations. However, regular communication means may not be always available no...
During emergency situations, reliable and fast communication is crucial for an effective response and coordination of recovery and rescue operations. However, regular communication means may not be always available nor reliable. In this scenario, constellations of Low Earth Orbit satellites can offer high bandwidth capabilities with (relatively) low latency, making them ideal for supporting disaster management teams on the ground and complementing (or replacing) terrestrial telecommunication infrastructures. In this context, the use of the recently defined QUIC protocol can provide the possibility to seamlessly switch from ground communication to satellite ones when needed. In this paper, we discuss the case study of satellite communication in an emergency scenario, assessing via a simulation study the benefits achievable by QUIC under varying queuing parameters and congestion control algorithm behavior.
Weather and atmospheric patterns are often persistent. The simplest weather forecasting method is the so-called persistence model, which assumes that the future state of a system will be similar (or equal) to the pres...
详细信息
An integrated advanced control and supervision system in operation in a sugar factory is presented. The system works on top of a commercial distributed computer control system, and combines artificial intelligence tec...
详细信息
An integrated advanced control and supervision system in operation in a sugar factory is presented. The system works on top of a commercial distributed computer control system, and combines artificial intelligence techniques for fault detection and diagnosis with advanced predictive controllers and models for other tasks.
暂无评论