143 Hits in 9.3 sec

Software architectures for big data: a systematic literature review

Cigdem Avci, Bedir Tekinerdogan, Ioannis N. Athanasiadis
2020 Big Data Analytics  
Yet, although many different concerns in big data systems are addressed the notion of architecture seems to be more implicit.  ...  Hence a proper architecture for the big data system is important to achieve the provided requirements.  ...  Acknowledgements All authors would like to thank to the reviewers for the valuable comments. Authors' contributions All authors have contributed equally to finish this paper.  ... 
doi:10.1186/s41044-020-00045-1 fatcat:lhwrekad5nd5xdssqky75qy7qq

ACNP 55th Annual Meeting: Poster Session III

2016 Neuropsychopharmacology  
Prior to injection, we obtained a T1-weighted MRI to obtain anatomical information to guide the placement of the cannula.  ...  We injected a total dose of 10 μg of LPS at a concentration of 1 μg/μl, and an Neuropsychopharmacology (2016) 41, S455-S630  ...  to the longer and more frequent time-out punishments they are paired with.  ... 
doi:10.1038/npp.2016.242 fatcat:4efd43swjbboranfrcs3pp32h4

D2.1 Vision, State of the Art and Requirements Analysis

Striccoli Domenico
2019 Zenodo  
market solutions; (iii) to identify and describe the technical and architectural requirements of the GUARD framework.  ...  The main objectives of this deliverable are (i) to describe the project vision, the applicability scenarios, and demonstration use cases; (ii) to perform an analysis of the State of the Art and current  ...  The abstraction provides both real-time and historical information, hence allowing both on-line and off-line analyses.  ... 
doi:10.5281/zenodo.3564301 fatcat:lrb6r6zat5bk5oqwpwwlui3ztm

D2.1 Vision, State of the Art and Requirements Analysis

Striccoli Domenico
2019 Zenodo  
market solutions; (iii) to identify and describe the technical and architectural requirements of the GUARD framework.  ...  The main objectives of this deliverable are (i) to describe the project vision, the applicability scenarios, and demonstration use cases; (ii) to perform an analysis of the State of the Art and current  ...  The smart grid scenario Name Smart Grid Motivation Even though the electrical grid has been operated for over a century with minimal changes to the original design, it is nowadays undergoing a radical  ... 
doi:10.5281/zenodo.4268474 fatcat:vtvogbwapzdc7nn6vms2cvdjou

Systematic review of features for co‐simulating security incidents in Cyber‐Physical Systems

Ricardo M. Czekster, Charles Morisset, John A. Clark, Sadegh Soudjani, Charalampos Patsios, Peter Davison
2021 Security and Privacy  
Cyber-Physical Systems (CPS) and Internet-of-Things (IoT) plus energy are the enabling technology of modern power systems also known as the Smart Grid (SG).  ...  Cyber-physical security is a major source of concern due to the high reliance of the SG on Information and Communication Technologies (ICT) and their widespread use.  ...  ACKNOWLEDGMENTS The authors wish to acknowledge funding from the Industrial Strategy Challenge Fund and Engineering and Physical Sciences Research Council (EPSRC/UK) EP/V012053/1 for The Active Building  ... 
doi:10.1002/spy2.150 fatcat:mcrafuc2tnbqnmsywuniygcbcq

Abstracts from the Energy Informatics.Academy Asia 2021 conference and PhD workshop

2021 Energy Informatics  
Acknowledgements The authors would like to thank Obayashi Corporation for useful discussions and comments on the manuscript.  ...  Acknowledgements The authors would like to acknowledge Dinel for supplying data to the research project.  ...  The proposed measure uses multivariate statistics to detect faults and anomalies at room level in smart buildings.  ... 
doi:10.1186/s42162-021-00145-9 fatcat:mtuzl5gq6bgdndbwfhew2vvmem

Lessons From the Pacific Ocean Portal: Building Pacific Island Capacity to Interpret, Apply, and Communicate Ocean Information

Molly Powers, Zulfikar Begg, Grant Smith, Elaine Miles
2019 Frontiers in Marine Science  
Via a user-friendly interface, the portal serves up data from a variety of sources including near real-time observations, historical information and forecast data.  ...  , community leaders, and many more.  ...  It is comprehensive, including detailed historical, near-real time, and forecast data, resulting in a high bandwidth requirement.  ... 
doi:10.3389/fmars.2019.00476 fatcat:lev4ekeainfwjk7ejyizd7rauy


2020 2020 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE)  
A working prototype was created and tested to verify its functionality.  ...  This road cracks detection system can be implemented in UAV or vehicle to detect road cracks using camera vision in Real-Time for the inspection of road.  ...  Using real class-A electricity consumer demand data, we show that our algorithm module is more consistent from day to day and provides a solution to peak demand problems.  ... 
doi:10.1109/ccece47787.2020.9255763 fatcat:mpf7smikpfc77bu73ciqstdagm

A Qualitative Study on the United States Internet of Energy: A Step towards Computational Sustainability

Nazmus Sakib, Eklas Hossain, Sheikh Iqbal Ahamed
2020 IEEE Access  
Internet-of-energy (IoE)-leveraging IoT to smart grids associated with advanced analytics-is one of the prominent efforts in this regard.  ...  INDEX TERMS Computational sustainability, Internet of Things, smart grid, Internet of Energy, big data, transferable computational techniques.  ...  grid to make it more interactive and resilient.  ... 
doi:10.1109/access.2020.2986317 fatcat:vjvk7oxfbvdi3je55ity7ghifu


2020 2020 IEEE Conference on Cognitive and Computational Aspects of Situation Management (CogSIMA)  
Landauer is a mathematician (Ph.D. 1973, Caltech) and co-founder of Topcy House Consulting, working on new theories, methods, practices, and tools for software and system integration.  ...  In this contribution, an approach is developed based on fuzzy-Random Forest (fuzzy-RF) for recognizing human driving intentions in real time.  ...  The study shows that the presence of the predictive elements facilitated more correct responses to situational awareness probes, particularly those requiring projection.  ... 
doi:10.1109/cogsima49017.2020.9216091 fatcat:2e62pqu3zrhwzkzs2j6uzdkfju

D2.6 Participating vertical industries planning

Rodolphe Legouable, Kostas Trichias, Yiouli Kritikou, Despina Meridou, Evangelos Kosmatos, A. Skalidi, George Loukas, Nikos Kostopoulos, Konstantinos Kravariotis, Andreas Tzoulis, Emmanouil Paraskevakis, Georgos Agapiou (+27 others)
2019 Zenodo  
So, a short description of the ICT-19/22 projects is carried out by detailing their respective use-cases they want to integrate. For each use-case, the KPIs and main features requested are detailed.  ...  roadmap of their integration, test and validation in the 5G EVE facility.  ...  The infrastructure shared by the verticals, will host important innovations: slicing as a service; resource orchestration in access/core and cloud/edge segments with live user environments.  ... 
doi:10.5281/zenodo.3628261 fatcat:624o55sj4jecnllwi7jd6yk33u

State of the art of cyber-physical systems security: An automatic control perspective

Yuriy Zacchia Lun, Alessandro D'Innocenzo, Francesco Smarra, Ivano Malavolta, Maria Domenica Di Benedetto
2019 Journal of Systems and Software  
Cyber-physical systems are integrations of computation, networking, and physical processes.  ...  It presents a powerful comparison framework for existing and future research on this hot topic, important for both industry and academia.  ...  Martínez (2014) ; ; Fawzi et al. (2014) ; Zhu and Ba ¸s ar (2015) ; ; Kwon et al. (2014) ; Teixeira et al. (2012) Foroush and Martínez (2013) ; Zhu et al. (2018) ; Shoukry et al. (2013  ... 
doi:10.1016/j.jss.2018.12.006 fatcat:dv2hrhfhevfofgh57mvdq3gvbm

Reducing Efficiency of Connectivity-Splitting Attack on Newscast via Limited Gossip [chapter]

Jakub Muszyński, Sébastien Varrette, Pascal Bouvry
2016 Lecture Notes in Computer Science  
This can be used for anomaly detection: query points are classed as anomalies if their density is below some threshold.  ...  This paper introduces the architecture of a distributed intrusion detection framework and in particular, the detector module based on a meta-ensemble, which is used to cope with the problem of detecting  ... 
doi:10.1007/978-3-319-31204-0_20 fatcat:27rnwllk75cv5kncys2u7utreq


Lena Schenke, Kyra Hoevenaars, Tamás Bardócz
2020 Zenodo  
In order to create new policies on adaption, policy makers must have detailed and accurate information about likely impact chains and about the costs and benefits of possible resilience strategies corresponding  ...  The project is developing a thorough understanding on how Climate Change will impact the particularly vulnerable EU islands located in different regions and focuses on Blue Growth sectors.  ...  Authors also thanks to Corporacion Andina de Fomento (CAF), the Centre for Climate and Resilience Research (CR2)(ANID/FONDAP 15110009). and the Centre of Climate Action of the PUCV(Esr2095).  ... 
doi:10.5281/zenodo.4775788 fatcat:oszlppnfnraw7oez4kpl2saidq

Behavioural Observation for Critical Infrastructure Security Support

William Hurst, Madjid Merabti, Paul Fergus
2013 2013 European Modelling Symposium  
., propose the use of ADWICE (Anomaly Detection With fast Incremental ClustEring), a clustering algorithm, for the detection of anomalies in real-time.  ...  When the classifiers are trained, they are able to operate autonomously and detect anomalies in data collected from the network in real-time.  ...  Page | 159 APPENDIX B -FEATURE COMPONENTS COMPONENTS & FEATURES The following, Table 15 , details an explanation of the abbreviations used to refer to the specific components.  ... 
doi:10.1109/ems.2013.6 dblp:conf/ems/HurstMF13 fatcat:hicghybntjcmbeu3vt2z6ito2u
« Previous Showing results 1 — 15 out of 143 results