Design of underlying network infrastructure of smart buildings

Author(s):  
A. McGibney ◽  
M. Klepal ◽  
J.T. O'Donnell
Sensors ◽  
2022 ◽  
Vol 22 (2) ◽  
pp. 426
Author(s):  
Grigorios Kakkavas ◽  
Maria Diamanti ◽  
Adamantia Stamou ◽  
Vasileios Karyotis ◽  
Faouzi Bouali ◽  
...  

The ongoing transition towards 5G technology expedites the emergence of a variety of mobile applications that pertain to different vertical industries. Delivering on the key commitment of 5G, these diverse service streams, along with their distinct requirements, should be facilitated under the same unified network infrastructure. Consequently, in order to unleash the benefits brought by 5G technology, a holistic approach towards the requirement analysis and the design, development, and evaluation of multiple concurrent vertical services should be followed. In this paper, we focus on the Transport vertical industry, and we study four novel vehicular service categories, each one consisting of one or more related specific scenarios, within the framework of the “5G Health, Aquaculture and Transport (5G-HEART)” 5G PPP ICT-19 (Phase 3) project. In contrast to the majority of the literature, we provide a holistic overview of the overall life-cycle management required for the realization of the examined vehicular use cases. This comprises the definition and analysis of the network Key Performance Indicators (KPIs) resulting from high-level user requirements and their interpretation in terms of the underlying network infrastructure tasked with meeting their conflicting or converging needs. Our approach is complemented by the experimental investigation of the real unified 5G pilot’s characteristics that enable the delivery of the considered vehicular services and the initial trialling results that verify the effectiveness and feasibility of the presented theoretical analysis.


2019 ◽  
Vol 28 (2) ◽  
pp. 197-213
Author(s):  
Sławomir Studniarz

The premise of the article is the contention that Beckett studies have been focused too much on the philosophical, cultural and psychological dimensions of his established canon, at the expense of the artistry. That research on Beckett's work is issue-driven rather than otherwise, and the slender extant body of criticism specifically on his poetic achievements bears no comparison with the massive exploration of the other facets of Beckett's artistic activity. The critical neglect of Beckett's poetry may not be commensurate with the quality of his verse. And it is in the spirit of remedying this oversight that the present article is offered, focusing on ‘Enueg I’, a representative poem from Echo's Bones, which exhibits all the salient features of Beckett's early poetry. It is argued that Beckett's early verse display the twofold influence, that of the transatlantic Modernism of Eliot and Pound, and of French poetry, specifically the visionary and experimental works of Rimbaud, Apollinaire, and the surrealists. Furthermore, the article also demonstrates that ‘Enueg I’ testifies to Beckett's ambition to compose a complex long Modernist poem in the vein of The Waste Land or The Cantos. Beckett's ‘Enueg I’ has much in common with Eliot's exemplary disjunctive Modernist long poem. Both poems are premised on the acutely felt cultural crisis and display the similar tenor in their ending. Finally, they both close with the vision of the doomed and paralyzed world, and the prevalent sense of sterility and dissolution. In the subsequent analysis, which takes up the bulk of the article, careful attention is paid to the patterning of the verbal material, including also the most fundamental level, that of the arrangements of phonemes, with a view to uncovering the underlying network of sound patterns, which contributes decisively to the semantic dimension of the poem.


2015 ◽  
Vol 10 (6) ◽  
pp. 764 ◽  
Author(s):  
José Álvarez-Alvarado ◽  
Mario Trejo-Perea ◽  
Maria de los Ángeles Herrera-Arellano ◽  
José Gabriel Ríos-Moreno

2020 ◽  
Author(s):  
Dean Sumner ◽  
Jiazhen He ◽  
Amol Thakkar ◽  
Ola Engkvist ◽  
Esben Jannik Bjerrum

<p>SMILES randomization, a form of data augmentation, has previously been shown to increase the performance of deep learning models compared to non-augmented baselines. Here, we propose a novel data augmentation method we call “Levenshtein augmentation” which considers local SMILES sub-sequence similarity between reactants and their respective products when creating training pairs. The performance of Levenshtein augmentation was tested using two state of the art models - transformer and sequence-to-sequence based recurrent neural networks with attention. Levenshtein augmentation demonstrated an increase performance over non-augmented, and conventionally SMILES randomization augmented data when used for training of baseline models. Furthermore, Levenshtein augmentation seemingly results in what we define as <i>attentional gain </i>– an enhancement in the pattern recognition capabilities of the underlying network to molecular motifs.</p>


Author(s):  
Alma Delia Gonzalez-Ramos ◽  
Juan Pablo Ibañez-Bautista ◽  
Nayeli Zamacona-Prado ◽  
Edebaldo Peza-Ortiz

The purpose of this document is to develop a method for assigning IP v4 addressing subnets within a simulated network scenario, using the binary-decimal numbering systems according to the ICN 1 CNACO CCNA curriculum, which will make it possible to streamline times in the allocation of IPs as well as the correct administration of them, The above will allow students of the Higher University Technical Degree in Information Technology in the area of Digital Network Infrastructure at the Fidel Velázquez Technological University to understand the theoretical concepts that They should be used in this area and they are used correctly for their professional performance, this will help them to fulfill the professional competences that are the skills and attitudes that allow the student to develop activities in their professional area, specific competencies such as developing media technology solutions nte the application of network fundamentals, which meet the needs of organizations and the generic competences that their professional profile requires.


2020 ◽  
Vol 14 ◽  
Author(s):  
Amreen Ahmad ◽  
Tanvir Ahmad ◽  
Ishita Tripathi

: The immense growth of information has led to the wide usage of recommender systems for retrieving relevant information. One of the widely used methods for recommendation is collaborative filtering. However, such methods suffer from two problems, scalability and sparsity. In the proposed research, the two issues of collaborative filtering are addressed and a cluster-based recommender system is proposed. For the identification of potential clusters from the underlying network, Shapley value concept is used, which divides users into different clusters. After that, the recommendation algorithm is performed in every respective cluster. The proposed system recommends an item to a specific user based on the ratings of the item’s different attributes. Thus, it reduces the running time of the overall algorithm, since it avoids the overhead of computation involved when the algorithm is executed over the entire dataset. Besides, the security of the recommender system is one of the major concerns nowadays. Attackers can come in the form of ordinary users and introduce bias in the system to force the system function that is advantageous for them. In this paper, we identify different attack models that could hamper the security of the proposed cluster-based recommender system. The efficiency of the proposed research is validated by conducting experiments on student dataset.


Author(s):  
James Moody ◽  
Ryan Light

This chapter provides an overview of social network visualization. Network analysis encourages the visual display of complex information, but effective network diagrams, like other data visualizations, result from several best practices. After a brief history of network visualization, the chapter outlines several of those practices. It highlights the role that network visualizations play as heuristics for making sense of networked data and translating complicated social relationships, such as those that are dynamic, into more comprehensible structures. The goal in this chapter is to help identify the methods underlying network visualization with an eye toward helping users produce more effective figures.


Sign in / Sign up

Export Citation Format

Share Document