作者:
Dutt, NikilRegazzoni, Carlo S.Rinner, BernhardYao, XinNikil Dutt (Fellow
IEEE) received the Ph.D. degree from the University of Illinois at Urbana–Champaign Champaign IL USA in 1989.""He is currently a Distinguished Professor of computer science (CS) cognitive sciences and electrical engineering and computer sciences (EECS) with the University of California at Irvine Irvine CA USA. He is a coauthor of seven books. His research interests include embedded systems electronic design automation (EDA) computer architecture distributed systems healthcare Internet of Things (IoT) and brain-inspired architectures and computing.""Dr. Dutt is a Fellow of ACM. He was a recipient of the IFIP Silver Core Award. He has received numerous best paper awards. He serves as the Steering Committee Chair of the IEEE/ACM Embedded Systems Week (ESWEEK). He is also on the steering organizing and program committees of several premier EDA and embedded system design conferences and workshops. He has served on the Editorial Boards for the IEEE Transactions on Very Large Scale Integration (VLSI) Systems and the ACM Transactions on Embedded Computing Systems and also previously served as the Editor-in-Chief (EiC) for the ACM Transactions on Design Automation of Electronic Systems. He served on the Advisory Boards of the IEEE Embedded Systems Letters the ACM Special Interest Group on Embedded Systems the ACM Special Interest Group on Design Automationt and the ACM Transactions on Embedded Computing Systems. Carlo S. Regazzoni (Senior Member
IEEE) received the M.S. and Ph.D. degrees in electronic and telecommunications engineering from the University of Genoa Genoa Italy in 1987 and 1992 respectively.""He is currently a Full Professor of cognitive telecommunications systems with the Department of Electrical Electronics and Telecommunication Engineering and Naval Architecture (DITEN) University of Genoa and a Co-Ordinator of the Joint Doctorate on Interactive and Cognitive Environments (JDICE) international Ph.D. course started initially as EU Erasmus Mundus Project and
Autonomous systems are able to make decisions and potentially take actions without direct human intervention, which requires some knowledge about the system and its environment as well as goal-oriented reasoning. In c...
详细信息
Autonomous systems are able to make decisions and potentially take actions without direct human intervention, which requires some knowledge about the system and its environment as well as goal-oriented reasoning. In computersystems, one can derive such behavior from the concept of a rational agent with autonomy (“control over its own actions”), reactivity (“react to events from the environment”), proactivity (“act on its own initiative”), and sociality (“interact with other agents”) as fundamental properties \n[1]\n. Autonomous systems will undoubtedly pervade into our everyday lives, and we will find them in a variety of domains and applications including robotics, transportation, health care, communications, and entertainment to name a few. \nThe articles in this month’s special issue cover concepts and fundamentals, architectures and techniques, and applications and case studies in the exciting area of self-awareness in autonomous systems.
In hyperspectral remote sensing data mining, it is important to take into account of both spectral and spatial information, such as the spectral signature, texture feature and morphological property, to improve the pe...
详细信息
One of the crucial elements in an Internet of Things (IoT) environment is a database. IoT performance will be at stake if the wrong database is adopted. In this research, three Structured Query Language (SQL) database...
One of the crucial elements in an Internet of Things (IoT) environment is a database. IoT performance will be at stake if the wrong database is adopted. In this research, three Structured Query Language (SQL) databases were tested against multiple network speeds in an IoT device. Single board computers (SBC) were used as a media of testing instead of an ordinary computer. A controlled wireless sensor network (WSN) was developed with several uniform constants and variable network speeds. A new data transmission rate equation also was proposed and tested. From the result, it was found that not all SQL databases can cater IoT devices. Some of them showed that performance decreased along with network speed. The correlation, between 0.90 and 0.96, proved the strong influence between the research subjects. In addition, file-type database is the best option available for SQL-wise IoT storage.
Optimization is the selection of a best set of parameters from available alternative sets. Global optimization is the task of finding the absolutely best set of parameters. In this paper, we present an adaptive flower...
详细信息
Presently practitioners in businesses are faced with issues related to the implementation of sustainable practices. Accordingly, practitioners in businesses need to make decision based on their current practice to ver...
Presently practitioners in businesses are faced with issues related to the implementation of sustainable practices. Accordingly, practitioners in businesses need to make decision based on their current practice to verify if present practice considers the environmental, economic, and social elements of sustainability. But, at the moment businesses utilizes manual specification based ranking and benchmarking approaches to ascertain that practitioners consider the natural environment and society as they make profit. Nevertheless, there is need for an autonomous method of measuring firms sustainable practice implementation. Therefore, this paper develops a persuasive agent’s model to measure; benchmark and rate businesses current practice based on review of prior sustainability studies. The persuasive agents’ model comprises of sustainable practice operations question, alternatives, and persuasive agents measurement procedures. Respectfully, findings from the study depict how the integrated persuasive agents autonomously measure, benchmark, rate and provide recommendations to practitioners. This study provides implications on how businesses can improve their business operation towards social, economic and environmental sustainable practice implementation.
Security of wireless nodes are a major concern in mobile ad hoc networks (MANETs). In this paper, we propose a scheme for detecting and blocking malicious nodes in MANETs. Our proposed scheme relies on specially deplo...
详细信息
Search techniques are an integral part for text authentication and plagiarism checks. In this work, our aim is to develop an efficient search algorithm for Arabic text (words and sentences) in a large database. The da...
详细信息
ISBN:
(数字)9781538677254
ISBN:
(纸本)9781538677261
Search techniques are an integral part for text authentication and plagiarism checks. In this work, our aim is to develop an efficient search algorithm for Arabic text (words and sentences) in a large database. The database contains the authentic source of information where information is ordered; thus the efficient algorithm can be used for searching the text in the database. The proposed search algorithm uses a quasi-Newton method - Secant method instead of the traditional binary search. The results show that the secant method has much faster convergence property than the binary search and hence the algorithm can find the search text in a shorter time period.
In collaborative deep learning, current learning frameworks follow either a centralized architecture or a distributed architecture. Whilst centralized architecture deploys a central server to train a global model over...
详细信息
暂无评论