A fast and accurate coupled meshless algorithm for the 2D/3D Gross–Pitaevskii equations on two GPUs
This paper first presents a high-efficient and accurate coupled meshless algorithm for solving the multi-dimensional Gross–Pitaevskii equation (GPE) in unbounded domain, which is implemented on CUDA-program-based two-GPUs cards. The proposed novel ...
Decentralized control architecture for multi-authoring microgrids
A prosumer is a consumer who uses tiny, renewable electricity generation units and, in addition to consumption, can also generate electricity. With the increase in the number of prosumers in a power grid, it is expected that the paradigm of ...
A novel technique for flit traversal in network-on-chip router
With booming intricacy in applications, optimizing latency is a key requirement in Network-on-Chip (NoC). Bypassing the routers in the intermediate path, the Single Cycle Multi-Hop Asynchronous Repeated Traversal (SMART) NoC is offered as a ...
Fuzzy intelligence based V2V routing protocol in Internet of Vehicles: a cross-layer approach
Internet of Vehicles (IoV), a vital component in intelligent transportation systems, supports diverse applications ranging from periodic safety message exchanges to on-demand multimedia streaming, gaming, and infotainment. Unicast routing is one ...
Evaluation of mobile autonomous robot in trajectory optimization
- Rodrigo Henrique Cunha Palácios,
- João Paulo Scarabelo Bertoncini,
- Gabriel Henrique Oliveira Uliam,
- Márcio Mendonça,
- Lucas Botoni de Souza
The demand for mobile robotics applications has grown considerably in recent years, especially due to the advent of industry 4.0, which has as one of its pillars the autonomous robotics field, the subject of this research. In this context, ...
Adaptive configuration of IoT applications in the fog infrastructure
Internet of Things (IoT) applications have invaded several domains (supply chain, healthcare, etc.). To enhance the quality of the provided service in terms of latency, response time, etc., service providers such as Amazon, Google, and Microsoft ...
Design, implementation and evaluation of a network-oriented service with environmental adaptability based on core/periphery structure
Many new network-oriented services have been developed in recent years, and they are expected to be virtualized in multi-access edge computing (MEC) environments, which are being standardized along with fifth generation (5 G). Because many new ...
Unboxing fog security: a review of fog security and authentication mechanisms
Due to the massive advancement of the Internet of Things in our day-to-day lives, there is a strong need to bring connectivity to a very accessible level. To enable the execution of real-time applications at the device end or network edge for ...
The missing piece: a distributed system-level diagnosis model for the implementation of unreliable failure detectors
Reliable systems require effective monitoring techniques for fault identification. System-level diagnosis was originally proposed in the 1960s as a test-based approach to monitor and identify faulty components of a general system. Over the last ...