A new approach for building student model in an
Adaptive and intelligent Web-Based Educational System
(AIWBES) is introduced. This approach utilizes a hybrid
algorithm based on Fuzzy-ART2 neural network and stochastic
method called Hidden Markov Model (HMM), in order to
evaluate and categorize students’ knowledge status in six levels:
Excellent, very good, good, fair, weak and very weak; depending
on 5 parameters collected through their interactions with the
system. The student model is initialized by presenting a pre-test
form to students and it is updated dynamically according to their
study times and assessment results. Students' knowledge status
are modeled through three phases, initialization, training and
recall phases. In the initialization phase, input vectors are
normalized before they are categorized using unsupervised
algorithm Fuzzy-ART2 in 6 clusters representing 6 knowledge
status. A HMM is created for each cluster and when new
students' parameters are collected, they are introduced to Baum-
Welch re-estimation algorithm to train the 6 HMMs and to
maximize the observed sequence that is associated with a
particular cluster. Forward algorithm evaluates then the
likelihood of this sequence with respect to each of the HMMs and
to determine the maximum value, which represents the actual
knowledge status of the student. Experiment results show that
the proposed approach is capable of categorizing student
parameter vectors to their corresponding cluster with good
accuracies. The result of such classifications would open new
horizons and applications in AIWBES.
Context-adaptive multichannel applications: a model and a case studyMatteo Barbero
The subject of this thesis is the development of a new approach for the creation of a family of adaptive multimedia applications, focused on finding the right balance between the quality of the final product and the efficiency of the authoring effort. This project considers the development of a specific class of applications, that is interactive museum guides. The process of creating multimedia applications that can be used in different scenarios is a complex operation, that is usually tackled with two opposite approaches: “recycling” - without a real method - the application for contexts, devices or user for which it was not initially designed or, on the other hand, the design and implementation from scratch of every new version. Both methods proven to be ineffective, since they lead to a poor quality of the final product or to excessive development costs. Starting from a real case study, that is design and development of a family of adaptive guides for the archaeological museum of Milan, we defined a model, 1001guides, that supports adaptivity for this class of applications. It’s focused on authoring efficiency and it’s designed to minimize the additional effort needed for content adaptation. We consider adaptivity depending on two main variables, context of use and channel, that are integrated in a unique dimension, called User eXperience. The idea is to create the adapted versions starting from a neutral basis of contents, always valid and produced only once (core contents), that can be re- organized and enriched with additional multimedia fragments, designed to adapt the information to the various UXs. Starting from the 1001guide model, developed for the case of interactive guides, we tried then to generalize the concept, by extending it to a wider class of applications. The approach proposed can bring benefits both for final users and content authors. The formers will get multimedia products really tailored to their specific needs and to the scenarios in which they will use them. Authors instead, thanks to the future development of an authoring tool based on the proposed model, will be able to create the adapted versions of the same application in a shorter span of time and with much more limited costs.
AMunro Europass CV Personal No Picture August 2016 V5.0Alistair Munro
Alistair Munro has over 30 years of experience in telecommunications systems as a subject matter expert. He has worked at both Airbus Defence and Space and the University of Bristol developing standards for secure networked communications, with a focus on aviation and unmanned systems. Currently, he provides independent consultancy and participates in standards committees for organizations such as EUROCAE and ICAO.
Short presentation of RINA and its associated European research activities, with a special emphasis in the IRATI project. Presented at the EU-Korea Workshop 2013.
The document provides an overview of TCP/IP, including its origins, standards groups, models, protocols, and analysis. Key points covered include TCP/IP's design goals of withstanding disruption and enabling interoperability, the transition from IPv4 to IPv6 to address limited addresses, and how protocol analyzers work to capture and decode network packets for troubleshooting.
This document contains information related to a Networks Laboratory course, including the lab manual, program objectives, outcomes, syllabus, and index. It provides:
1) An overview of the course contents, objectives to learn network commands, socket programming, analyze protocols, and use simulation tools.
2) Details on the program outcomes which focus on applying technical knowledge, lifelong learning, research, and total quality education.
3) A list of 12 experiments that will be conducted in the lab, including implementing various protocols using sockets and simulating protocols using a network simulator.
4) An index table to record details of experiments conducted like date, topic, outcomes and marks.
The document discusses the role of the IRTF ICNRG in developing platforms for information-centric networking (ICN) experimentation and identifying areas that may need standardization. The ICNRG works on specifications and produces open-source code but does not set standards. Any standardization should avoid premature decisions and learn from application prototypes. Information-centric networking could significantly benefit new 5G networks by enabling features like multi-path communication and local control loops, and initial deployment is possible in areas like data centers and the internet of things.
A new approach for building student model in an
Adaptive and intelligent Web-Based Educational System
(AIWBES) is introduced. This approach utilizes a hybrid
algorithm based on Fuzzy-ART2 neural network and stochastic
method called Hidden Markov Model (HMM), in order to
evaluate and categorize students’ knowledge status in six levels:
Excellent, very good, good, fair, weak and very weak; depending
on 5 parameters collected through their interactions with the
system. The student model is initialized by presenting a pre-test
form to students and it is updated dynamically according to their
study times and assessment results. Students' knowledge status
are modeled through three phases, initialization, training and
recall phases. In the initialization phase, input vectors are
normalized before they are categorized using unsupervised
algorithm Fuzzy-ART2 in 6 clusters representing 6 knowledge
status. A HMM is created for each cluster and when new
students' parameters are collected, they are introduced to Baum-
Welch re-estimation algorithm to train the 6 HMMs and to
maximize the observed sequence that is associated with a
particular cluster. Forward algorithm evaluates then the
likelihood of this sequence with respect to each of the HMMs and
to determine the maximum value, which represents the actual
knowledge status of the student. Experiment results show that
the proposed approach is capable of categorizing student
parameter vectors to their corresponding cluster with good
accuracies. The result of such classifications would open new
horizons and applications in AIWBES.
Context-adaptive multichannel applications: a model and a case studyMatteo Barbero
The subject of this thesis is the development of a new approach for the creation of a family of adaptive multimedia applications, focused on finding the right balance between the quality of the final product and the efficiency of the authoring effort. This project considers the development of a specific class of applications, that is interactive museum guides. The process of creating multimedia applications that can be used in different scenarios is a complex operation, that is usually tackled with two opposite approaches: “recycling” - without a real method - the application for contexts, devices or user for which it was not initially designed or, on the other hand, the design and implementation from scratch of every new version. Both methods proven to be ineffective, since they lead to a poor quality of the final product or to excessive development costs. Starting from a real case study, that is design and development of a family of adaptive guides for the archaeological museum of Milan, we defined a model, 1001guides, that supports adaptivity for this class of applications. It’s focused on authoring efficiency and it’s designed to minimize the additional effort needed for content adaptation. We consider adaptivity depending on two main variables, context of use and channel, that are integrated in a unique dimension, called User eXperience. The idea is to create the adapted versions starting from a neutral basis of contents, always valid and produced only once (core contents), that can be re- organized and enriched with additional multimedia fragments, designed to adapt the information to the various UXs. Starting from the 1001guide model, developed for the case of interactive guides, we tried then to generalize the concept, by extending it to a wider class of applications. The approach proposed can bring benefits both for final users and content authors. The formers will get multimedia products really tailored to their specific needs and to the scenarios in which they will use them. Authors instead, thanks to the future development of an authoring tool based on the proposed model, will be able to create the adapted versions of the same application in a shorter span of time and with much more limited costs.
AMunro Europass CV Personal No Picture August 2016 V5.0Alistair Munro
Alistair Munro has over 30 years of experience in telecommunications systems as a subject matter expert. He has worked at both Airbus Defence and Space and the University of Bristol developing standards for secure networked communications, with a focus on aviation and unmanned systems. Currently, he provides independent consultancy and participates in standards committees for organizations such as EUROCAE and ICAO.
Short presentation of RINA and its associated European research activities, with a special emphasis in the IRATI project. Presented at the EU-Korea Workshop 2013.
The document provides an overview of TCP/IP, including its origins, standards groups, models, protocols, and analysis. Key points covered include TCP/IP's design goals of withstanding disruption and enabling interoperability, the transition from IPv4 to IPv6 to address limited addresses, and how protocol analyzers work to capture and decode network packets for troubleshooting.
This document contains information related to a Networks Laboratory course, including the lab manual, program objectives, outcomes, syllabus, and index. It provides:
1) An overview of the course contents, objectives to learn network commands, socket programming, analyze protocols, and use simulation tools.
2) Details on the program outcomes which focus on applying technical knowledge, lifelong learning, research, and total quality education.
3) A list of 12 experiments that will be conducted in the lab, including implementing various protocols using sockets and simulating protocols using a network simulator.
4) An index table to record details of experiments conducted like date, topic, outcomes and marks.
The document discusses the role of the IRTF ICNRG in developing platforms for information-centric networking (ICN) experimentation and identifying areas that may need standardization. The ICNRG works on specifications and produces open-source code but does not set standards. Any standardization should avoid premature decisions and learn from application prototypes. Information-centric networking could significantly benefit new 5G networks by enabling features like multi-path communication and local control loops, and initial deployment is possible in areas like data centers and the internet of things.
A Kuriakidou, E Filtzantzidou, P Balaouras,I Roussakis, C. Mouzakis, I Stavra...hmouzak
This document provides an evaluation report of distance learning trials conducted by the University of Athens. It describes four scenarios that were tested: 1) encoding features utilizing MPEG formats to deliver lectures to remote classrooms and desktop users, 2) transcoding features, 3) rate adaptation, and 4) testing system performance boundaries. Scenario 1 involved three trials using MPEG-1, MPEG-2, and MPEG-4 formats to stream lectures at different rates. The trials engaged over 120 students and staff. User feedback was collected through questionnaires to evaluate the pedagogical and technical aspects.
Sham Rizal Ramlee is a 40-year-old Malaysian male with a Bachelor's degree in Computer Science from University Putra Malaysia. He has over 10 years of experience in network troubleshooting, planning, and administration. His most recent role is as a Network Solution Architect at PETRONAS CARIGALI IRAQ, where he has worked since January 2012.
This document provides an overview of Chapter 7 from a management information systems textbook. The chapter discusses telecommunications, computer networks, the Internet, and wireless technologies. It covers topics such as the components of telecommunications networks, different types of networks, how the Internet works, Internet protocols, wireless networking, radio frequency identification, and uses of these technologies in business. The chapter also examines issues around network neutrality and provides examples of how various digital technologies function.
This document provides an overview of an IEEE ICME tutorial on streaming media delivery held in San Diego in July 2018. The tutorial covered principles of HTTP adaptive streaming and omnidirectional media delivery. It discussed content generation, distribution and consumption workflows for traditional and omnidirectional media. Standards and emerging technologies in adaptive streaming were also covered. The second part of the tutorial focused on 5G radio access and core networks as well as emerging multimedia use cases. Presenters included researchers and industry experts from academia and companies like Cisco, InterDigital and Bitmovin.
I am an experienced senior software engineer with a PhD degree in Computer Science, by several years of experience in software developing, coding, problem-solving, and research. In 2017, I started a permanent position at British SKY Broadcasting, London UK, working on cutting edge wireless mesh technologies. My previous role was associated software engineer in Nokia Corporation working in the wireless and mobile department. Also, I was a researcher and developer at the Institute of Telecommunication (IT) in Portugal and worked as a technical member of several European telecommunication projects.
This document provides an overview of the IRATI project which aims to advance the RINA (Recursive Internet Architecture) model and specifications through the design and implementation of a prototype. The goals are to validate RINA theory through experimentation, produce requirements for RINA, and compare it to TCP/IP. A key focus is implementing RINA over Ethernet and validating functionality on UNIX-like operating systems and Juniper JunOS. Experiments will be conducted using the OFELIA open network testbed.
The document describes a Professional Masters program in Electronics and Telecommunication offered by Cairo University. It provides details on the program structure, objectives, admission requirements, courses offered, and industry partnerships. The program aims to produce industry-ready professionals and comprises three specialization tracks: Telecommunication Networks, Embedded Systems, and Electronics and MEMS Design. It requires completion of 30 credit hours within 3 years, including engineering and non-engineering courses as well as a masters project. The program partners with leading electronics and telecom firms who collaborate in various ways including curriculum design, teaching, and funding.
Standardization is important for enabling interoperability, reducing costs, and promoting innovation. The document discusses the evolution of standardization from national monopolies to today's global, collaborative process. It outlines the basic principles and value of standardization, as well as the standards development process. In particular, it describes the key role of the International Telecommunication Union (ITU) in facilitating consensus-based standards development through its study groups and recommendations.
The GEN6 project aims to pilot IPv6 upgrades of eGovernment services across Europe. It has a budget of 6 million euros and involves organizations from 8 countries. The project will provide guidelines for IPv6 deployment and document national pilot projects upgrading networks, services, and applications in areas like eGovernment, secure clouds, education, and emergency response. Outcomes will include technical documentation of the pilots and estimates of transition costs and benefits to support broader IPv6 adoption. Dissemination efforts will spread the results to public administrations and other stakeholders.
How to (Help to) Save Our Planet with Green CodingMindtrek
The document discusses how software and coding can help reduce greenhouse gas emissions and energy consumption. It notes that the ICT sector accounts for 4-10% of global energy use and growing. Practical solutions proposed include reducing the amount of data transferred by using caching and compression, removing unnecessary code, and improving coding efficiency by focusing on optimizing hotspots. The key message is that reducing energy use in software is an ongoing journey that requires incremental improvements over time.
Level up your career with a Post Master's Degree in C-ITS (Connected Vehicles)Caroline HANRAS
You are interested in the high tech field of Connected cars and wish to take your career to the next level? The Post Master's degree may be the right option for you!
EURECOM's Post Master's degree offers the necessary knowledge required by engineers and managers to design connected cars / connected mobility applications and the related mechanisms to understand the innovations and seize the unique opportunities of the booming Vehicular Communications industry.
Using Future Internet testbeds in the classroomFIBRE Testbed
The document discusses using the Future Internet testbed FIBRE to teach networking classes. It provides an overview of FIBRE, including its goals of experimenting with new Internet architectures, worldwide initiatives in teaching with testbeds, and plans to develop exercises and lessons to deploy in FIBRE. The summary highlights that FIBRE allows researchers to validate new proposals for the Future Internet through experimentation in its large-scale facilities, and that developing educational materials for its use can help train the next generation of networking researchers.
Rina korea-eu-ws-2013-sergi figuerola-last version_uploadi2CAT Foundation
This document summarizes RINA research activities funded by the European Commission, including the IRATI, PRISTINE, and IRINA projects. IRATI developed an initial RINA prototype and specifications and experimented with use cases like corporate VPNs and cloud networking. PRISTINE aims to build an SDK for the prototype to enable programmable DIF policies and trial use cases like distributed cloud and datacenter networking. IRINA performs a comparative analysis of network architectures and trials a use case study involving research network operators. The projects contribute to advancing the RINA reference model, specifications, policies, use cases, and experimentation to develop the technology toward deployment.
In the growing trend of technology, it is important to keep up with user expectation and his level of satisfaction. Thus, there is high demand for Quality of Experience (QoE) in the research domain. The Quality of Experience is defined as the degree of delight or annoyance of the user of an application or service. It results from the fulfillment of his or her expectations with respect to the utility and/or enjoyment of the application or service in the light of the user’s personality and current state. In the context of communication services, it is influenced by content, network, device, application, user expectations and context of use.QoE is a subjective measure whereas QoS is objective. Thus, it is interesting to analyze the behavior of QoE rather than QoS.
The document outlines lessons learned from improved sharing of network and flight information globally. Key points include:
- Benefits of increased integration and harmonization of airspace usage across borders were recognized.
- Further work is needed to fully trace data origins and ensure quality of metadata being shared.
- National regulators sometimes require all notices to pilots to be physically on board aircraft, which does not align with automated sharing of updates.
- Global adoption of SWIM is occurring, and a registry is needed to help discover services, though current registries have limitations.
- Standards like FIXM, AIXM, and WXXM help achieve interoperability, but some inconsistencies between implementations remain.
- Architecture approaches
Apoorv V. Joshi is seeking a job as a software engineer. He has a Master's degree in Computer Engineering from North Carolina State University and a Bachelor's degree in Electronics and Telecommunication from Pune Institute of Computer Technology in India. His technical skills include programming languages like Java, Python, C, C++, and network tools. He has internship experience developing an electro retino graphy system. His projects involve creating a handover application for VoIP calls on Android and modifying Linux kernel modules to prioritize emergency network traffic. He also has experience with simulation tools and analyzing variants of TCP congestion control.
This document discusses a study that compared the performance of multimedia traffic (voice, video, data) over MPLS VPN networks versus traditional IP networks. The study found that MPLS VPN networks offered better performance for multimedia traffic propagation based on key metrics like throughput, utilization, and packet delay variation. Specifically, the MPLS VPN scenario had higher throughput (2.44% vs 97.56%) and utilization (34.09% vs 65.91%), but lower packet delay variation (37.5% vs 62.5%) compared to the traditional IP network model. The results show that MPLS VPN is better suited for real-time multimedia applications due to its ability to provide guaranteed services, traffic engineering, and predictable minimum delays.
Muhammad Adil Raja is a researcher interested in machine learning and its applications. He has a PhD from University of Limerick and has worked as a post-doctorate researcher at Orange Labs. His research focuses on developing machine learning models for tasks like speech quality estimation, network impairment characterization, and computational neuroscience. He has extensive experience developing machine learning software and has authored several research proposals applying machine learning.
Slides for the presentation given at the Webist 2021 conference
Abstract:
A research team that wants to validate a new IoT solution has to implement a testbed. It is a complex step
since it must provide a realistic environment, and this may require skills that are not present in the team. This
paper explores the requirements of an IoT testbed and proposes an open-source solution based on low-cost
and widely available components and technologies. The testbed implements an architecture consisting of a
collector managing several edge devices. Security levels and duty-cycle are tunable depending on the specific
application. After analyzing the testbed requirements, the paper illustrates a template that uses WiFi for the
link layer, HTTPS for structured communication, an ESP8266 board for edge units, and a RaspberryPi for the
collector.
A Kuriakidou, E Filtzantzidou, P Balaouras,I Roussakis, C. Mouzakis, I Stavra...hmouzak
This document provides an evaluation report of distance learning trials conducted by the University of Athens. It describes four scenarios that were tested: 1) encoding features utilizing MPEG formats to deliver lectures to remote classrooms and desktop users, 2) transcoding features, 3) rate adaptation, and 4) testing system performance boundaries. Scenario 1 involved three trials using MPEG-1, MPEG-2, and MPEG-4 formats to stream lectures at different rates. The trials engaged over 120 students and staff. User feedback was collected through questionnaires to evaluate the pedagogical and technical aspects.
Sham Rizal Ramlee is a 40-year-old Malaysian male with a Bachelor's degree in Computer Science from University Putra Malaysia. He has over 10 years of experience in network troubleshooting, planning, and administration. His most recent role is as a Network Solution Architect at PETRONAS CARIGALI IRAQ, where he has worked since January 2012.
This document provides an overview of Chapter 7 from a management information systems textbook. The chapter discusses telecommunications, computer networks, the Internet, and wireless technologies. It covers topics such as the components of telecommunications networks, different types of networks, how the Internet works, Internet protocols, wireless networking, radio frequency identification, and uses of these technologies in business. The chapter also examines issues around network neutrality and provides examples of how various digital technologies function.
This document provides an overview of an IEEE ICME tutorial on streaming media delivery held in San Diego in July 2018. The tutorial covered principles of HTTP adaptive streaming and omnidirectional media delivery. It discussed content generation, distribution and consumption workflows for traditional and omnidirectional media. Standards and emerging technologies in adaptive streaming were also covered. The second part of the tutorial focused on 5G radio access and core networks as well as emerging multimedia use cases. Presenters included researchers and industry experts from academia and companies like Cisco, InterDigital and Bitmovin.
I am an experienced senior software engineer with a PhD degree in Computer Science, by several years of experience in software developing, coding, problem-solving, and research. In 2017, I started a permanent position at British SKY Broadcasting, London UK, working on cutting edge wireless mesh technologies. My previous role was associated software engineer in Nokia Corporation working in the wireless and mobile department. Also, I was a researcher and developer at the Institute of Telecommunication (IT) in Portugal and worked as a technical member of several European telecommunication projects.
This document provides an overview of the IRATI project which aims to advance the RINA (Recursive Internet Architecture) model and specifications through the design and implementation of a prototype. The goals are to validate RINA theory through experimentation, produce requirements for RINA, and compare it to TCP/IP. A key focus is implementing RINA over Ethernet and validating functionality on UNIX-like operating systems and Juniper JunOS. Experiments will be conducted using the OFELIA open network testbed.
The document describes a Professional Masters program in Electronics and Telecommunication offered by Cairo University. It provides details on the program structure, objectives, admission requirements, courses offered, and industry partnerships. The program aims to produce industry-ready professionals and comprises three specialization tracks: Telecommunication Networks, Embedded Systems, and Electronics and MEMS Design. It requires completion of 30 credit hours within 3 years, including engineering and non-engineering courses as well as a masters project. The program partners with leading electronics and telecom firms who collaborate in various ways including curriculum design, teaching, and funding.
Standardization is important for enabling interoperability, reducing costs, and promoting innovation. The document discusses the evolution of standardization from national monopolies to today's global, collaborative process. It outlines the basic principles and value of standardization, as well as the standards development process. In particular, it describes the key role of the International Telecommunication Union (ITU) in facilitating consensus-based standards development through its study groups and recommendations.
The GEN6 project aims to pilot IPv6 upgrades of eGovernment services across Europe. It has a budget of 6 million euros and involves organizations from 8 countries. The project will provide guidelines for IPv6 deployment and document national pilot projects upgrading networks, services, and applications in areas like eGovernment, secure clouds, education, and emergency response. Outcomes will include technical documentation of the pilots and estimates of transition costs and benefits to support broader IPv6 adoption. Dissemination efforts will spread the results to public administrations and other stakeholders.
How to (Help to) Save Our Planet with Green CodingMindtrek
The document discusses how software and coding can help reduce greenhouse gas emissions and energy consumption. It notes that the ICT sector accounts for 4-10% of global energy use and growing. Practical solutions proposed include reducing the amount of data transferred by using caching and compression, removing unnecessary code, and improving coding efficiency by focusing on optimizing hotspots. The key message is that reducing energy use in software is an ongoing journey that requires incremental improvements over time.
Level up your career with a Post Master's Degree in C-ITS (Connected Vehicles)Caroline HANRAS
You are interested in the high tech field of Connected cars and wish to take your career to the next level? The Post Master's degree may be the right option for you!
EURECOM's Post Master's degree offers the necessary knowledge required by engineers and managers to design connected cars / connected mobility applications and the related mechanisms to understand the innovations and seize the unique opportunities of the booming Vehicular Communications industry.
Using Future Internet testbeds in the classroomFIBRE Testbed
The document discusses using the Future Internet testbed FIBRE to teach networking classes. It provides an overview of FIBRE, including its goals of experimenting with new Internet architectures, worldwide initiatives in teaching with testbeds, and plans to develop exercises and lessons to deploy in FIBRE. The summary highlights that FIBRE allows researchers to validate new proposals for the Future Internet through experimentation in its large-scale facilities, and that developing educational materials for its use can help train the next generation of networking researchers.
Rina korea-eu-ws-2013-sergi figuerola-last version_uploadi2CAT Foundation
This document summarizes RINA research activities funded by the European Commission, including the IRATI, PRISTINE, and IRINA projects. IRATI developed an initial RINA prototype and specifications and experimented with use cases like corporate VPNs and cloud networking. PRISTINE aims to build an SDK for the prototype to enable programmable DIF policies and trial use cases like distributed cloud and datacenter networking. IRINA performs a comparative analysis of network architectures and trials a use case study involving research network operators. The projects contribute to advancing the RINA reference model, specifications, policies, use cases, and experimentation to develop the technology toward deployment.
In the growing trend of technology, it is important to keep up with user expectation and his level of satisfaction. Thus, there is high demand for Quality of Experience (QoE) in the research domain. The Quality of Experience is defined as the degree of delight or annoyance of the user of an application or service. It results from the fulfillment of his or her expectations with respect to the utility and/or enjoyment of the application or service in the light of the user’s personality and current state. In the context of communication services, it is influenced by content, network, device, application, user expectations and context of use.QoE is a subjective measure whereas QoS is objective. Thus, it is interesting to analyze the behavior of QoE rather than QoS.
The document outlines lessons learned from improved sharing of network and flight information globally. Key points include:
- Benefits of increased integration and harmonization of airspace usage across borders were recognized.
- Further work is needed to fully trace data origins and ensure quality of metadata being shared.
- National regulators sometimes require all notices to pilots to be physically on board aircraft, which does not align with automated sharing of updates.
- Global adoption of SWIM is occurring, and a registry is needed to help discover services, though current registries have limitations.
- Standards like FIXM, AIXM, and WXXM help achieve interoperability, but some inconsistencies between implementations remain.
- Architecture approaches
Apoorv V. Joshi is seeking a job as a software engineer. He has a Master's degree in Computer Engineering from North Carolina State University and a Bachelor's degree in Electronics and Telecommunication from Pune Institute of Computer Technology in India. His technical skills include programming languages like Java, Python, C, C++, and network tools. He has internship experience developing an electro retino graphy system. His projects involve creating a handover application for VoIP calls on Android and modifying Linux kernel modules to prioritize emergency network traffic. He also has experience with simulation tools and analyzing variants of TCP congestion control.
This document discusses a study that compared the performance of multimedia traffic (voice, video, data) over MPLS VPN networks versus traditional IP networks. The study found that MPLS VPN networks offered better performance for multimedia traffic propagation based on key metrics like throughput, utilization, and packet delay variation. Specifically, the MPLS VPN scenario had higher throughput (2.44% vs 97.56%) and utilization (34.09% vs 65.91%), but lower packet delay variation (37.5% vs 62.5%) compared to the traditional IP network model. The results show that MPLS VPN is better suited for real-time multimedia applications due to its ability to provide guaranteed services, traffic engineering, and predictable minimum delays.
Muhammad Adil Raja is a researcher interested in machine learning and its applications. He has a PhD from University of Limerick and has worked as a post-doctorate researcher at Orange Labs. His research focuses on developing machine learning models for tasks like speech quality estimation, network impairment characterization, and computational neuroscience. He has extensive experience developing machine learning software and has authored several research proposals applying machine learning.
Similar to TIP: a course about IP convergence technology (20)
Slides for the presentation given at the Webist 2021 conference
Abstract:
A research team that wants to validate a new IoT solution has to implement a testbed. It is a complex step
since it must provide a realistic environment, and this may require skills that are not present in the team. This
paper explores the requirements of an IoT testbed and proposes an open-source solution based on low-cost
and widely available components and technologies. The testbed implements an architecture consisting of a
collector managing several edge devices. Security levels and duty-cycle are tunable depending on the specific
application. After analyzing the testbed requirements, the paper illustrates a template that uses WiFi for the
link layer, HTTPS for structured communication, an ESP8266 board for edge units, and a RaspberryPi for the
collector.
Lezione tenuta nel corso di Mobile and Cyber Physical Systems della Laurea Magistrale di Informatica a Pisa.
- Le App per l'integrazione con altri servizi: ThingTweet e ThingHTTPi
- Le App per l'innesco di azioni: TimeControl, TweetControl e React
- Esercizi pratici in Python
Lezione tenuta nel corso di Mobile and Cyber Physical Systems della Laurea Magistrale di Informatica a Pisa.
- Introduzione a ThingSpeak
- Pubblicazione e recupero di dati
- Pubblicazione e recupero di comandi CallBack
- Esercizi pratici in Python
Slides of the presentation at IEEE WiMob/SEUNet 2017, in Rome.
We exploit an overlooked feature of the ESP8266 WiFi chip, i.e. the AT commands interpreter, to implement a sensor/actuator that meets the above specifications. To test our design, we implement a library that provides a transparent wrapper for AT commands. Hardware and software are available on bitbucket.
The document describes an OCCI extension for monitoring cloud resources from both an administrator and user perspective. It proposes representing monitoring entities like sensors and collectors as OCCI resource and link types. Sensors would aggregate and deliver measurements, while collectors produce measurements. These would be further described through mixins that detail their specific monitoring functionality. The proposal aims to provide on-demand, scalable monitoring as a service to users through a standardized and customizable OCCI interface.
The document discusses the Open Cloud Computing Interface (OCCI), which aims to provide an open standard interface for cloud computing. It describes OCCI's goals of allowing interoperability between different cloud providers and preventing vendor lock-in. The core OCCI model defines basic resource and link entity types and supports extensions for additional types and functionality. OCCI uses a RESTful API and represents entities with URIs to allow their creation, retrieval, updating and deletion. Implementations of OCCI have been made for various programming languages and cloud platforms.
Automated deployment of a microservice based monitoring architectureAugusto Ciuffoletti
The document discusses two topics: microservices and cloud monitoring. Microservices involve breaking applications into small, independent components. Cloud monitoring allows users to monitor cloud resources. The author proposes an "on demand monitoring" approach using a microservices-based infrastructure that provides scalable and configurable monitoring as a service. It automatically deploys a monitoring system that can be tailored to the user's needs and scales from simple to complex setups.
The extension of the OCCI framework to describe a monitoring infrastructure.
A demo explains how the infrastructure is generated starting from the OCCI specification.
The source of the demo (in Java) is available in the repository of the OCCI working group.
A tutorial about the API for the description of a monitoring infrastructure currently discussed inside the OCCI working group.
The slides start by giving the basic concepts, proceed with a description of the entities that implement the monitoring infrastructure, and conclude with a step by step definition of a non-trivial monitoring infrastructure.
The document discusses extending the OCCI API with monitoring capabilities. It proposes adding two new types: Collector and Sensor. The Collector would be a link that extracts operational parameters from a source resource and delivers them to a target resource. The Sensor would be a resource that processes or aggregates output from one or more Collectors, such as by filtering, interpolating, or combining monitoring data. Plugins would provide different options for parameters, transport methods, and ways to aggregate and process data.
Monitoring a virtual network infrastructure - An IaaS perspectiveAugusto Ciuffoletti
The document discusses the challenges of providing network resources as part of an Infrastructure as a Service (IaaS) cloud computing model. While IaaS has traditionally focused on storage and computing resources, the networking capabilities now exist to provision virtual network infrastructure as well. However, IaaS providers still typically only offer flat local area networks rather than composite network topologies that some users require. The key technology that enables virtual private networks is virtual bridging using VLAN tagging, which allows flexible virtual network configurations. For network monitoring in IaaS, a proxy that interacts with users is proposed to dynamically configure monitoring while maintaining provider control over network devices.
Collision avoidance using a wandering token in the PTP protocolAugusto Ciuffoletti
Slides presented during the 2010 WIGOWIN Workshop at the Department of Computer Science in Pisa - May 26.
Full paper available at http://eprints.adm.unipi.it
Algorithms based on the circulation of a unique token are often indicated in the coordination of distributed systems. We introduce the design of the token passing operation at application level, that exhibits the requirements of security, since the token is a sensitive resource, and scalability, since the token passing protocol must not implement security at expense of scalability. These
characteristics make our solution suitable for large scale distributed infrastructures.
1) The document describes a "wandering token" approach for coordinating access to shared resources among thousands of agents in a scalable way.
2) A simulation of the approach for a video on demand application showed that it protected the resource from overload while still granting regular access.
3) The wandering token circulates randomly among members, with a randomized timer governing when new tokens are generated to replace lost tokens. This provides a robust, distributed solution to coordinating access.
The paper explores network virtualization issues related with the Cloud Computing paradigm (mainly intended as IaaS). Finally, we consider this framework from a network monitoring perspective.
The paper is an outcome of the CoreGRID working group at ERCIM.
Grid Infrastructure Architecture A Modular Approach from CoreGRIDAugusto Ciuffoletti
The document discusses a modular approach to grid infrastructure architecture proposed by CoreGRID. It identifies five key functional components of a grid middleware: 1) a workflow analyzer for user interfaces and task monitoring, 2) a checkpoint manager for fault tolerance, 3) a user/account manager for authentication and accounting, 4) a resource monitor for observing resource performance, and 5) a grid information service as the backbone. These components interact through exchanging data structures published via the grid information service while addressing issues like scalability, fault tolerance and security.
The document summarizes research on scalable concurrency control in dynamic distributed systems using a multi-token approach. The approach proposes using a mesh overlay topology and random routing of tokens to control access to a shared resource among a large number of dynamic nodes. Experimental results showed the process converges quickly but with more tokens and worse performance than expected, requiring further tuning of the control loop dynamics.
Prototype Implementation of a Demand Driven Network Monitoring ArchitectureAugusto Ciuffoletti
The document summarizes a prototype implementation of an on-demand network monitoring architecture. The architecture features clients that submit monitoring requests, sensors that perform the monitoring, and agents that route requests and streams. The prototype implements the key components in Java and uses SOAP, UDP, and LDAP. It was developed over three months as a proof of concept for an on-demand approach to network monitoring at Internet scale.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
"Scaling RAG Applications to serve millions of users", Kevin GoedeckeFwdays
How we managed to grow and scale a RAG application from zero to thousands of users in 7 months. Lessons from technical challenges around managing high load for LLMs, RAGs and Vector databases.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
This talk will cover ScyllaDB Architecture from the cluster-level view and zoom in on data distribution and internal node architecture. In the process, we will learn the secret sauce used to get ScyllaDB's high availability and superior performance. We will also touch on the upcoming changes to ScyllaDB architecture, moving to strongly consistent metadata and tablets.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
The Department of Veteran Affairs (VA) invited Taylor Paschal, Knowledge & Information Management Consultant at Enterprise Knowledge, to speak at a Knowledge Management Lunch and Learn hosted on June 12, 2024. All Office of Administration staff were invited to attend and received professional development credit for participating in the voluntary event.
The objectives of the Lunch and Learn presentation were to:
- Review what KM ‘is’ and ‘isn’t’
- Understand the value of KM and the benefits of engaging
- Define and reflect on your “what’s in it for me?”
- Share actionable ways you can participate in Knowledge - - Capture & Transfer
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
Session 1 - Intro to Robotic Process Automation.pdfUiPathCommunity
👉 Check out our full 'Africa Series - Automation Student Developers (EN)' page to register for the full program:
https://bit.ly/Automation_Student_Kickstart
In this session, we shall introduce you to the world of automation, the UiPath Platform, and guide you on how to install and setup UiPath Studio on your Windows PC.
📕 Detailed agenda:
What is RPA? Benefits of RPA?
RPA Applications
The UiPath End-to-End Automation Platform
UiPath Studio CE Installation and Setup
💻 Extra training through UiPath Academy:
Introduction to Automation
UiPath Business Automation Platform
Explore automation development with UiPath Studio
👉 Register here for our upcoming Session 2 on June 20: Introduction to UiPath Studio Fundamentals: https://community.uipath.com/events/details/uipath-lagos-presents-session-2-introduction-to-uipath-studio-fundamentals/
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
AppSec PNW: Android and iOS Application Security with MobSF
TIP: a course about IP convergence technology
1. University of Pisa
IP Converging Technologies
(TIP)
http://www.di.unipi.it/~augusto/tip
A course of the
Dept. of Computer Science
Teacher
Augusto Ciuffoletti
2. Framing the course
● Convergence is a strategic issue for the development
of an infrastructure and of the services it provides,
since it enables the utilization of the same
infrastructure for many purposes.
● One of the many instances of convergence centers
around IP: the pervasive diffusion of Internet makes
this protocol as an ideal point of convergence for
many services that are based upon communication
● The course explains why Internet is an appropriate
target for convergence, and how applications
requiring a guaranteed quality of service can
converge onto it.
3. Background of the course
● The course addresses students pursuing the second
cycle degree in Computer Science
● Knowledge of the TCP/IP stack fundamentals are
required
● The course does not make use of programming
languages
● A reasonable knowledge of technical English is
required to read documentation
4. Purpose of the course
● At the end of the course, the student:
– Has a clear understanding of IP Networking
– Understands the limits of the “best effort” attitude
in face of applications that require a guaranteed
quality of service
– Knows the technologies that have been
introduced to overcome such limits
– Appreciates the role of standards in the
advancement of a technology
– Has a basic understanding of the Voice over IP
technology and of other converging technologies
5. Program of the Course
(part one)
Exploring the Internet:
– Internet routing: we understand the topology of the
Internet through the study of routing protocols,
both Internal and External to Autonomous
Systems (BGP and OSPF resp.)
– Congestion control: congestion is tightly bound to
the “best effort” policy that characterizes the
Internet. This phenomenon can be to some extent
controlled, improving Internet reliability.
6. Program of the course
(part two)
Differentiated traffic management for IP convergence
– Traffic with distinct requirements regarding quality
of service can be managed separately
– The Differentiated Services approach. Traffic
aggregation and traffic class management. Multi
Protocol Label Switching (MPLS)
– The Integrated Services Approach. Flow control
and the Reservation Protocol (RSVP).
– ATM as a point of convergence
– IPv6 aspects related with flow control.
7. Program of the course
(part three)
Converging applications (case studies)
– Multimedia in the Internet. Real Time Protocol
(RTP) and the Internet Group Membership
Protocol (IGMP).
– Browsing from GSM phones. The Wireless
Access Protocol (WAP)
– Telephony over IP. The session initiation protocol
(SIP)
8. Extras
● Students are invited to prepare a short seminar about
a related topic, in change of a small bonus.
● One or two lectures are given in teleconference (VoIP
experiment).
● Not on a regular basis, but a laboratory about routing
using emulated networks (thanks to the NETKIT from
RomaTre University) have been proposed.
9. ● The course has been given from year 2002-03 until
2009-10.
● The slides of the course (in html) are found in the
reference web page:
http://www.di.unipi.it/~augusto/tip/index.html
● The course now should be updated with relevant
technologies:
– TDM over IP: ultimate convergence?
– PON: the ideal carrier
– Timing: transversal
“The road goes ever on and on...”
(from... ok, you know)
10. Profile of the teacher
● I am an active researcher in the field of network
monitoring, and I covered a leading position on the
topic in a EU project, with many published papers
and implementations;
● Another topic of interest is clock synchronization, with
reference to the NTP and IEEE1588 standards;
● As a teacher, I have given the course in Computer
Networks just before creating the TIP (and the
companion TQI);
11. Students feedback
● As a general rule I evaluated the preparation of the
students as good. Only in a few cases the
preparation was deemed unacceptable.
● The TIP course has never been perceived as
“difficult” from the students, however I noticed a
progressive diminuition of their preparation.
● Three students decided to prepare a master thesis on
related topics under my supervision.