The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Complexity is a term that is currently used not only in research articles but also in the methodologies and standards used to manage information and projects. The complexity can represent the size of a system, process, program or project, the number of functions and the cost of their acquisition, operation and maintenance. Within the context of this work, the complexity is a variable that represents...
High reliability is an important characteristic of Cyber-Physical Systems (CPS). New CPS components/subsystems have to be developed for the detection, isolation, recovery and prevention of failures and external attacks. To address this challenge, we propose a multi-agent-based subsystem architecture that can detect and prevent CPS hardware components' failures. The architecture comprises of several...
Distributed storage systems and caching systems are becoming widespread, and this motivates the increasing interest on assessing their achievable performance in terms of reliability for legitimate users and security against malicious users. While the assessment of reliability takes benefit of the availability of well established metrics and tools, assessing security is more challenging. The classical...
In order for autonomous surface vessels (ASVs) to avoid collisions at sea it is necessary to predict the future trajectories of surrounding vessels. This paper investigate the use of historical automatic identification system (AIS) data to predict such trajectories. The availability of AIS data have steadily increased in the last years as a result of more regulations, together with wider coverage...
This paper proposes a modified IMWBF decoding algorithm for low-density parity-check (LDPC) codes. In the proposed modification, the magnitude of the received signal is updated when the number of the unsatisfied parity-check equations participated by this received signal is larger than a predetermined threshold. Through this modification, the outlier, defined as the undesired large-magnitude received...
Current motor assessment tools can provide numerical indicators of performance but do not provide actionable information to target further improvement in rehabilitation interventions. Psychophysics-based outcome measures show promise to provide more useful information in the laboratory environment but have been limited in clinical implementation. Here we present a constrained-time task to assess paced...
Field Programmable Gate Array (FPGA) system is widely used in deep learning application and cloud system for acceleration. Quality and reliability of IP block is essential to the successful development of today's complex hardware acceleration design. In this paper, we discuss the important issues of quality and reliability of digital soft IP, and propose a qualification measurement system that can...
As cloud computing becomes increasingly popular, cloud providers compete to offer the same or similar services over the Internet. Quality of Service (QoS), which describes how well a service is performed, is an important differentiator among functionally equivalent services. As a result, how to help users to find cloud services that meet their QoS requirements becomes an important problem. In this...
Efficient routing is one of the key challenges for next generation vehicular networks for providing fast and reliable communication in a smart city context. Various routing protocols have been proposed for determining optimal routing paths in highly dynamic topologies. However, it is the dilemma of those kinds of networks that good paths are used intensively, resulting in congestion and path quality...
Performance-based Logistics (PBL) contracts require metrics and methodologies set in a systemic way to provide readiness for the warfighter at reasonable costs. There must be a clever and verifiable connection of metrics in order to access and analyze data and to deliver sound and consistent inputs for the entire support system to accomplish its goals. A system of incentives and penalties usually...
Maximal leakage from a random variable X to a random variable Y is defined as the multiplicative increase, upon observing Y, of the probability of correctly guessing a randomized function of X, maximized over all such functions [1]. Herein, this guessing framework is used to give operational definitions to common information leakage metrics, including Shannon capacity, maximal correlation, and local...
This paper studies the maximum secrecy rate for a semi-deterministic wiretap channel, in which the channel between the transmitter and the legitimate receiver is deterministic, while that between the transmitter and the eavesdropper is a discrete memoryless channel. For a given decoding error probability and information leakage (measured by the total variation distance), the optimal second-order secrecy...
“To be considered for the 2017 IEEE Jack Keil Wolf ISIT Student Paper Award” In this paper, we show the equivalency of weak and strong secrecy conditions for a large class of secure network coding problems. When we restrict to linear operations, we show the equivalency of “perfect secrecy with zero-error constraint” and “weak secrecy with ∊-error constraint”.
Profiling the diversity of land use in modern cities by mining data related to human mobility represents a challenging problem in urban planning, transportation and smart city management. Previous work on mobile phone data (i.e., Call Detail Records) has shown the existence of strong correlations between the urban tissue and the associated mobile communication demand. Similarly, GPS traces of vehicles...
Cloud datacenters must ensure high availability for the hosted applications and failures can be the bane of datacenter operators. Understanding the what, when and why of failures can help tremendously to mitigate their occurrence and impact. Failures can, however, depend on numerous spatial and temporal factors spanning hardware, workloads, support facilities, and even the environment. One has to...
The capabilities of a sensing system and its implementation are among the critical factors to determine the overall performance and the subsequent public acceptance of automated/autonomous vehicles. However, the uncertainty for system to work and maintain safety under undesirable conditions, such as inclement weather or low illumination, is still an obstacle to commonly accepted and legitimate applications...
Safety and security in marine environments is an emerging application area of low-power wireless sensor networks. Yet, these environments pose big challenges to network reliability. The IEEE802.15.4-TSCH protocol has been extensively regarded as a reliable low-power wireless sensor network solution. It requires, though, an external scheduling mechanism in place to allocate connections to specific...
The evolution of industrial wireless sensor networks (IWSNs) is driven by various factory automation applications with strict demands on latency and reliability, which requires flexible network resource allocation to support diverse QoS requirements of different applications. To this end, we propose an application-driven virtual network embedding (AVNE) scheme to facilitate the QoS provisioning for...
In this work a preliminary study is proposed to assess the validity of an automatic and low cost measurement method for Functional ReachTest (FRT) implementation. To this aim FRT was performed on 10 trials of 4 healthy men and results from the system under validation are compared with the corresponding data from a calibrated stereo-photogrammetric system: the percentage variation between them is lower...
Transmissions over the wiretap channel have been studied for a long time from the information theory standpoint. This has allowed to assess the secrecy performance against eavesdropping while ensuring reliable transmission towards the legitimate receiver. However, most previous studies rely on a number of assumptions which are far from practical wireless communications, like infinite length codewords,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.