Listing 1 - 10 of 16 | << page >> |
Sort by
|
Choose an application
Cloud computing is the practice of using a set of remote servers hosted on the internet to process, store and manage data, instead of doing it locally. This practice, widely used nowadays, has many advantages but also quite a few downsides, such as high latency, low bandwidth... To face these issues, cloud computing can be combined with another paradigm called edge computing which brings computation at the edge of the network. Edge computing has quite a few challenges, among which service management. Edge nodes are exposed to suffering from diverse type of failures, such a degradation, loss of connectivity... It is important to make sure that they offer highly available services, and are extremely resilient. This work explores the feasibility of grouping the edge nodes in order to offer high availability and resiliency, and does so by focusing on searching a solution that fits the constraints of a particular environment : the manufacturing sector. After having defined these constraints, an exploration of potential solutions and mechanisms is conducted. This explorations leads to the use of a leader-driven distributed system approach. The idea of this system is to always have a leader and a successor. The leader edge node can be seen as a directly available edge node, which receives data that needs to be processed, while the successor can be seen as hot standby edge node. The rest of the edge nodes in the system participate in elections in order to become successor. The elections take place when either the leader or the successor fails. In order to prove the feasibility and the interest of this solution, a small proof-of-concept has been implemented, using GNS3 (a network simulator) and Lubuntu virtual machines. This proof-of-concept, even though relatively simple, allows to simulate and test different failure scenarios. Those tests have proven that the approach used by the system is viable. However, it remains to be seen what the impact of such a system would be in a real-life environment, and how it would scale. Furthermore, the approach of grouping the edge nodes in a cluster is of interest and could potentially be used in other applications.
Choose an application
'Multisystemic Resilience' brings together for the first time in one volume a wide range of resilience experts. By placing side-by-side the writing of psychologists, epigeneticists, ecologists, architects, disaster specialists, engineers, sociologists and public health researchers (to name just a few of the disciplines represented), this innovative volume provides insights into how to research resilience across systems and the many possible solutions to problems that threaten the physical and mental health of individuals, the wellbeing of our communities and the sustainability of our planet. Every chapter provides a detailed review of resilience from one disciplinary perspective, then uses examples drawn from research and case studies to show that thinking about the resilience of multiple systems is a better way to understand processes of change and sustainability.
Resilience (Personality trait) --- Social aspects. --- Human resilience --- Resiliency (Personality trait) --- Personality
Choose an application
Resilience (Personality trait) --- Belonging (Social psychology) --- Belongingness (Social psychology) --- Connectedness (Social psychology) --- Social belonging --- Social connectedness --- Social psychology --- Social integration --- Human resilience --- Resiliency (Personality trait) --- Personality --- Developmentally disabled --- Disabled, Developmentally --- People with disabilities --- Developmental disabilities --- Psychology.
Choose an application
"Fear in Our Hearts examines Islamophobia in the United States, positing that rather than simply being an outcome of the 9/11 attacks, anti-Muslim activity grows out of a fear of difference that has always characterized US public life. Caleb Iyer Elfenbein examines the effects of this fear on American Muslims, as well as describing how it works to shape and distort American society. Drawing on over 1,800 news reports documenting anti-Muslim activity, Elfenbein pinpoints trends, draws connections to the broader histories of immigration, identity, belonging, and citizenship in the US, and examines how Muslim communities have responded to this discrimination. In the face of public fear and hate, American Muslim communities have developed connections with non-Muslims through community transparency, outreach, and public engagement efforts, offering a model for creating more welcoming conditions of public life for everyone. Arguing that anti-Muslim activity tells us as much about the state of core American values as it does about the particular experiences of American Muslims, this compelling book offers practical ideas about how we can create a more welcoming public life for all."--
Muslims --- Hate crimes --- Islamophobia --- Social conditions --- History --- United States. --- Allyship. --- American Muslims. --- Anti-Muslim Hostility. --- Belonging. --- Citizenship. --- Cultural Trauma. --- Equality. --- Ethics. --- Hate Crimes. --- Hate Speech. --- Hate. --- Immigration. --- Islam. --- Park 51. --- Public Engagement. --- Public Hate. --- Public Life. --- Public Outreach. --- Public Space. --- Race. --- Religious Liberty. --- Resiliency.
Choose an application
Processes of post-war reconstruction, peacebuilding and reconciliation are partly about fostering stability and adaptive capacity across different social systems. Nevertheless, these processes have seldom been expressly discussed within a resilience framework. Similarly, although the goals of transitional justice - among them (re)establishing the rule of law, delivering justice and aiding reconciliation - implicitly encompass a resilience element, transitional justice has not been explicitly theorised as a process for building resilience in communities and societies that have suffered large-scale violence and human rights violations. The chapters in this unique volume theoretically and empirically explore the concept of resilience in diverse societies that have experienced mass violence and human rights abuses. They analyse the extent to which transitional justice processes have - and can - contribute to resilience and how, in so doing, they can foster adaptive peacebuilding. This book is available as Open Access.
Atrocities --- Peace-building. --- Transitional justice. --- Victims of violent crime --- Resilience (Personality trait) --- Ethnic conflict --- Psychological aspects. --- Psychology. --- Social aspects. --- Conflict, Ethnic --- Ethnic violence --- Inter-ethnic conflict --- Interethnic conflict --- Ethnic relations --- Social conflict --- Human resilience --- Resiliency (Personality trait) --- Personality --- Justice --- Human rights --- Building peace --- Peacebuilding --- Conflict management --- Peace --- Peacekeeping forces --- Military atrocities --- Cruelty --- War crimes --- Victims of violent crimes --- Victims of crimes --- Violent crimes --- Victims of violence --- peace and conflict studies --- transitional justice --- humanitarian intervention. resilence studies --- area studies
Choose an application
The Psychology of Covid-19 explores how the coronavirus pandemic is giving rise to a new order in our personal lives, societies, and politics. Rooted in systematic research on Covid-19 and previous pandemics, this book describes how people perceive and respond to Covid-19, and how it has impacted a broad range of domains, including lifestyle, politics, science, mental health, media, and meaning in life. Building on this, the book then sets out how we can improve our psychological and social resilience, to safeguard ourselves against the psychological effects of future pandemics.
COVID-19 (Disease) --- Resilience (Personality trait) --- Psychological aspects. --- Human resilience --- Resiliency (Personality trait) --- Personality --- 2019-nCoV disease --- 2019 novel coronavirus disease --- Coronavirus disease-19 --- Coronavirus disease 2019 --- COVID-19 virus disease --- COVID19 (Disease) --- Novel coronavirus disease, 2019 --- SARS coronavirus 2 disease --- SARS-CoV-2 disease --- Coronavirus infections --- Respiratory infections --- COVID-19 Pandemic, 2020 --- -COVID-19 (Disease) --- Epidemics --- Disease outbreaks --- Diseases --- Outbreaks of disease --- Pestilences --- Communicable diseases --- Outbreaks --- COVID-19 (Disease) - Psychological aspects.
Choose an application
Computing and communication capabilities are increasingly embedded in diverse objects and structures in the physical environment. They will link the ‘cyberworld’ of computing and communications with the physical world. These applications are called cyber physical systems (CPS). Obviously, the increased involvement of real-world entities leads to a greater demand for trustworthy systems. Hence, we use "system trustworthiness" here, which can guarantee continuous service in the presence of internal errors or external attacks. Mobile CPS (MCPS) is a prominent subcategory of CPS in which the physical component has no permanent location. Mobile Internet devices already provide ubiquitous platforms for building novel MCPS applications. The objective of this Special Issue is to contribute to research in modern/future trustworthy MCPS, including design, modeling, simulation, dependability, and so on. It is imperative to address the issues which are critical to their mobility, report significant advances in the underlying science, and discuss the challenges of development and implementation in various applications of MCPS.
AUTOSAR --- DAG --- runnable scheduling --- control-scheduling codesign --- lagrange multiplier --- Mobile Cyber-Physical Systems (MCPS) --- industry --- Mobile Sink Groups (MSG) --- group mobility --- real-time data delivery --- Intelligent Transportation System (ITS) --- deep neural network --- Red Light Runner (RLR) --- dynamic signal control --- intersection safety --- mixed-criticality --- power-aware --- real-time scheduling --- DVFS --- security taxonomies --- event-based systems --- mobile cyber physical systems --- security flaws --- searchable encryption --- PEKS --- forward privacy --- trusted execution environment --- SGX --- data quality --- large-scale --- high-dimensionality --- linear discriminant analysis --- random projection --- bootstrapping --- controller area network bus --- authentication --- authenticity --- resiliency --- sustainability --- formal verification --- model checking --- in-vehicle network --- model compression --- adversarial robustness --- weight pruning --- adversarial training --- distillation --- embedded system --- secure AI --- n/a
Choose an application
This book brings together recent research related to urban resilience, in particular, taking into account climate change impacts and hydrological hazards. Due to the complexity of our cities, which are vulnerable and continuously evolving systems, urban resilience should be considered as a transversal and multi-sectorial issue, affecting different urban services, several hazards, and all the steps of the risk management cycle. Within this context, the different pieces of research that form this book deal with the topics of multi-risk and urban resilience assessment, analysis of cascading effects, and the proposal and prioritization of adaptation measures and strategies to cope with climate-related hazards through multi-criteria analysis.
Research & information: general --- RESCCUE project --- Electrical distribution network --- Flooding --- Risk Assessment --- city resiliency --- GIS model --- drought --- water scarcity --- water availability --- climate change --- hydrological modeling --- resilience --- flooding --- hazard mapping --- risk identification --- sustainability --- urban resilience --- traffic modelling --- resilience assessment --- urban services --- cities --- Ecosystem Services (ES) --- Nature-Based Solutions (NBS) --- Resilience Assessment Framework (RAF) --- stakeholders' validation --- stormwater management and control --- depth‒damage curves --- urban floods --- properties --- claims --- flood expert surveyor --- fluvial --- pluvial --- tidal --- sewer --- flood --- risk --- modelling --- cascading effects --- urban flood --- water quality --- cost-benefit analysis --- combined sewer overflows --- climate change adaptation --- climate risk --- socio-economic assessment --- flood risk assessment --- 1D/2D hydrodynamic model --- Metro system --- subway --- urban mobility --- pluvial floods --- 1D/2D coupled models --- impact assessment --- adaptation strategies --- RESCCUE project --- Electrical distribution network --- Flooding --- Risk Assessment --- city resiliency --- GIS model --- drought --- water scarcity --- water availability --- climate change --- hydrological modeling --- resilience --- flooding --- hazard mapping --- risk identification --- sustainability --- urban resilience --- traffic modelling --- resilience assessment --- urban services --- cities --- Ecosystem Services (ES) --- Nature-Based Solutions (NBS) --- Resilience Assessment Framework (RAF) --- stakeholders' validation --- stormwater management and control --- depth‒damage curves --- urban floods --- properties --- claims --- flood expert surveyor --- fluvial --- pluvial --- tidal --- sewer --- flood --- risk --- modelling --- cascading effects --- urban flood --- water quality --- cost-benefit analysis --- combined sewer overflows --- climate change adaptation --- climate risk --- socio-economic assessment --- flood risk assessment --- 1D/2D hydrodynamic model --- Metro system --- subway --- urban mobility --- pluvial floods --- 1D/2D coupled models --- impact assessment --- adaptation strategies
Choose an application
Computing and communication capabilities are increasingly embedded in diverse objects and structures in the physical environment. They will link the ‘cyberworld’ of computing and communications with the physical world. These applications are called cyber physical systems (CPS). Obviously, the increased involvement of real-world entities leads to a greater demand for trustworthy systems. Hence, we use "system trustworthiness" here, which can guarantee continuous service in the presence of internal errors or external attacks. Mobile CPS (MCPS) is a prominent subcategory of CPS in which the physical component has no permanent location. Mobile Internet devices already provide ubiquitous platforms for building novel MCPS applications. The objective of this Special Issue is to contribute to research in modern/future trustworthy MCPS, including design, modeling, simulation, dependability, and so on. It is imperative to address the issues which are critical to their mobility, report significant advances in the underlying science, and discuss the challenges of development and implementation in various applications of MCPS.
Technology: general issues --- AUTOSAR --- DAG --- runnable scheduling --- control-scheduling codesign --- lagrange multiplier --- Mobile Cyber-Physical Systems (MCPS) --- industry --- Mobile Sink Groups (MSG) --- group mobility --- real-time data delivery --- Intelligent Transportation System (ITS) --- deep neural network --- Red Light Runner (RLR) --- dynamic signal control --- intersection safety --- mixed-criticality --- power-aware --- real-time scheduling --- DVFS --- security taxonomies --- event-based systems --- mobile cyber physical systems --- security flaws --- searchable encryption --- PEKS --- forward privacy --- trusted execution environment --- SGX --- data quality --- large-scale --- high-dimensionality --- linear discriminant analysis --- random projection --- bootstrapping --- controller area network bus --- authentication --- authenticity --- resiliency --- sustainability --- formal verification --- model checking --- in-vehicle network --- model compression --- adversarial robustness --- weight pruning --- adversarial training --- distillation --- embedded system --- secure AI --- AUTOSAR --- DAG --- runnable scheduling --- control-scheduling codesign --- lagrange multiplier --- Mobile Cyber-Physical Systems (MCPS) --- industry --- Mobile Sink Groups (MSG) --- group mobility --- real-time data delivery --- Intelligent Transportation System (ITS) --- deep neural network --- Red Light Runner (RLR) --- dynamic signal control --- intersection safety --- mixed-criticality --- power-aware --- real-time scheduling --- DVFS --- security taxonomies --- event-based systems --- mobile cyber physical systems --- security flaws --- searchable encryption --- PEKS --- forward privacy --- trusted execution environment --- SGX --- data quality --- large-scale --- high-dimensionality --- linear discriminant analysis --- random projection --- bootstrapping --- controller area network bus --- authentication --- authenticity --- resiliency --- sustainability --- formal verification --- model checking --- in-vehicle network --- model compression --- adversarial robustness --- weight pruning --- adversarial training --- distillation --- embedded system --- secure AI
Choose an application
Computing and communication capabilities are increasingly embedded in diverse objects and structures in the physical environment. They will link the ‘cyberworld’ of computing and communications with the physical world. These applications are called cyber physical systems (CPS). Obviously, the increased involvement of real-world entities leads to a greater demand for trustworthy systems. Hence, we use "system trustworthiness" here, which can guarantee continuous service in the presence of internal errors or external attacks. Mobile CPS (MCPS) is a prominent subcategory of CPS in which the physical component has no permanent location. Mobile Internet devices already provide ubiquitous platforms for building novel MCPS applications. The objective of this Special Issue is to contribute to research in modern/future trustworthy MCPS, including design, modeling, simulation, dependability, and so on. It is imperative to address the issues which are critical to their mobility, report significant advances in the underlying science, and discuss the challenges of development and implementation in various applications of MCPS.
Technology: general issues --- AUTOSAR --- DAG --- runnable scheduling --- control-scheduling codesign --- lagrange multiplier --- Mobile Cyber-Physical Systems (MCPS) --- industry --- Mobile Sink Groups (MSG) --- group mobility --- real-time data delivery --- Intelligent Transportation System (ITS) --- deep neural network --- Red Light Runner (RLR) --- dynamic signal control --- intersection safety --- mixed-criticality --- power-aware --- real-time scheduling --- DVFS --- security taxonomies --- event-based systems --- mobile cyber physical systems --- security flaws --- searchable encryption --- PEKS --- forward privacy --- trusted execution environment --- SGX --- data quality --- large-scale --- high-dimensionality --- linear discriminant analysis --- random projection --- bootstrapping --- controller area network bus --- authentication --- authenticity --- resiliency --- sustainability --- formal verification --- model checking --- in-vehicle network --- model compression --- adversarial robustness --- weight pruning --- adversarial training --- distillation --- embedded system --- secure AI --- n/a
Listing 1 - 10 of 16 | << page >> |
Sort by
|