Chapter
To read the full-text of this research, you can request a copy directly from the authors.

Abstract

The behavior of a system is studied through a simulation model. Once developed and validated, the simulation model can be used to investigate a wide variety of issues, as well as propose improvements. This research objective is to propose a novel simulation paradigm to improve the transmission of content in wireless telecommunication systems. The simulation environment employs a pre-coding process of bits based on the application of a technique relying on discrete events and signals before the modulation process. The signal transmission on the channel occurs in the discrete domain with the implementation of discrete entities in the process of bit generation applied at a low level of abstraction in a wireless telecommunication system. The simulation considered the advanced differential binary phase shift keying (DBPSK) as the modulation format for signal transmission in an AWGN channel, using different hardware platforms and in the studies. The results show improvements ranging from 9 to 35% in memory utilization, related to information compression, in the context of the research.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

... A UAV-CPS store data related to any types of objects/entities and maps for uses like objective recognition, mobile navigation, grasping, and manipulation (please refer to Figures 1.2 and 1.3) [36,37]. There exist several online data sets to appraise different algorithms' aspects. ...
... This physical layer technology permits transmission rates much higher than the ZigBee [42,82,83,96,97]. Some claim UWB as the ultimate solution for Wireless Multimedia VSNs (WMVSNs), MCLO will have to cogitate both the benefits and streaming challenges of ad hoc VSNs where UWB-enabled links interconnect intermediate nodes [37,57,59,[98][99][100][101][102]. ...
Chapter
Full-text available
The extensive Cloud pool of resources and infrastructure can deliver significant improvements to Unmanned Aerial Vehicle (UAV) Cyber-Physical Systems (UAV-CPSs) relying on data or code from a network to operate, but not all sensors, actuators, computation modules and memory depots from a single fixed structure. This chapter is organised around the potential benefits of the Cloud: (1) Big Data (BD) access to visual libraries containing representations/descriptive data, images, video, maps and flight paths, (2) Cloud Computing (CC) functionalities for Grid Computing (GC) on demand for statistical analysis, Machine Learning (ML) algorithms, Computational Intelligence (CI) applications and flight planning, (3) Collective UAV Learning (CUL) where UAVs share their trajectories, control guidelines and mission outcomes and (4) human-machine collaboration through crowdsourcing for analysing high-dimensional high-resolution (HDHR) images/ video, classification of scenes/objects/entities, learning and error correction/ concealment. The Cloud can also expand UAV-CPSs by offering (a) data sets, models, all sorts of literature, HDHR benchmarks and software/hardware simulators, (b) open competitions for UAV-CPS designs with Open Source Hardware (OSH) and (c) Open-Source Software (OSS). This chapter talks about some open challenges and new trends in UAV-CPSs. Chapter Contents: 1.1 Introduction 1.2 Cloud computing 1.3 Collective UAV learning 1.4 Human computation, crowdsourcing and call centres 1.5 Open-source and open-access resources 1.6 Challenges and future directions 1.7 Conclusions References Inspec keywords: public domain software; cyber-physical systems; statistical analysis; crowdsourcing; learning (artificial intelligence); cloud computing; industrial robots; autonomous aerial vehicles; grid computing; path planning; Big Data Other keywords: high-dimensional high-resolution video analysis; UAV-CPSs; object classification; machine learning algorithms; HDHR image analysis; sensors; collective UAV learning; actuators; CUL; computational intelligence; flight paths; open-source software; entities classification; UAV-CPS designs; Big Data; single fixed structure; descriptive data; high-dimensional high-resolution image analysis; human-machine collaboration; cloud computing; visual libraries; crowdsourcing; Unmanned Aerial Vehicle Cyber-Physical Systems; open source hardware; extensive cloud pool; scene classification; error concealment; statistical analysis; software-hardware simulators; Industry 5.0; ML algorithms; Grid Computing; computation modules; flight planning; error correction Subjects: Internet software; Other topics in statistics; Knowledge engineering techniques; Mobile robots; Data handling techniques; Spatial variables control; Grid computing; Aerospace control; Telerobotics
Chapter
The internet of things (IoT) is characterized by devices that communicate without human interference, sending and receiving data online, to which they have shaped the way of connecting household appliances, machines, and equipment, cars, among other things, also arriving at the field through characterized by the communication between devices, sensors, drones, and machines. They have great potential to improve production processes, making agriculture increasingly digital, creating solutions, connectivity, and training for specialist labor. As well as irrigation systems and other intelligent machines with the ability to talk to each other enabling management in the use of energy, resources, and inputs making the production process more efficient. Precision agriculture encompasses a series of components and factors from which the best procedures can be chosen that are appropriate in a given agricultural operation that effectively meets your needs, also related to the application of inputs at the right time and in the right place, following the growth and productivity over the entire length of a plantation by controlling pests, among other technologies, providing a reduction in production costs and spending on inputs, reducing the pollution of nature by the pesticides used, making it possible to reduce operating costs, increasing precision in obtaining results in the same way as less variability in production. Therefore, this chapter aims to provide an updated overview and review of the use of the internet of things in the precision agriculture system showing and approaching its success relation, with a concise bibliographic background, categorizing and synthesizing the potential of both technologies.
Chapter
The IoT concept comes from products that go from the refrigerator to the washing machine, even smart sensors and smart devices that can be connected and regulated by mobile devices. In this sense, as the automotive industry continues to accelerate towards connected cars, more Internet of Vehicles (IoV) solutions, which technology would be similar to the IoT that is already known, but focused on connectivity in vehicles. Thus, the IoV is the possibility for vehicles to connect and exchange information, it is the possibility that vehicles communicate with each other automatically, consisting of a subarea of IoT applied to automobiles. Through IoT technology and mobile technology, people have the feeling of being connected all the time, and through IoV, this possibility is transformed into reality in solution integrated into data, device, and operations management through the implementation of secure and unified network access considering mass data collection and analysis. Representing the innumerable possibility of services can be explored with data and with Information Technology fully integrated with Automation Technology. Besides, IoV is an ecosystem that has an extensive field of intelligent transport systems, with a variety of traffic control solutions, transport management, emergency telecommunications cluster, secure, efficient, and ubiquitous wireless connections. Therefore, this chapter has the mission and objective of providing an updated overview of IoV, it is worth mentioning the novelty of this manuscript is in dealing with the approach to the theme focusing on the role of this technology in modern perspectives, categorizing and synthesizing the potential of the technique.
Chapter
Blockchain, in this innovative context of digital transformation, is nothing more than a chain of digital blocks, in which each block has a specific data and a code that connects to the previous block, and consequently, a chain is created that protects the information. The relationship between Blockchain and information security comes from the decentralization to store information with greater security, still considering the ability to enable the secure tracking of transactions, offering transparent access to information. Still evaluating the aspect of cybersecurity as one of the advantages of Blockchain, after all enabling the tracking of information, it also allows for a more secure decentralization of data storage than other known technologies. Still reflecting that in addition to authenticity, it is possible to optimize the signing of online contracts, thus preventing fraud in the registration of contracts from being made and generating losses. Guaranteeing the basic properties of Confidentiality, Integrity, and Availability (CIA) and concerning natural protection with blockchain distributed digital ledgers (once in the ledger, occurs after mining by users of the blockchain network validators) and consensus rules. Thus, Blockchain is a technology, and it is an efficient alternative to protect critical and sensitive information, capable of encrypting, tracking, and certifying any information, with potential in relation to cybersecurity that allows recording digital transactions. Therefore, this chapter aims to provide an updated overview of Blockchains, showing its relationship as well as approaching its success, with a concise bibliographic background, addressing its applications, and fundamental concepts, synthesizing the potential of technology.
Chapter
The Semantic Web supports a set of technologies that exploit the standardization of the semantic representation of informational resources available on the web, representing the evolution of the current web. It provides a mechanism for formatting data in a machine-readable manner. Helping people in certain activities are done manually and end up consuming a lot of time in human daily life, linking individual properties of these data with globally accessible schemes. Since with so much information evolution in digital searches is inevitable, which with this technology provides ease and provides inferences about sates in scalable activities and modes. Therefore, this chapter aims to provide an overview of the semantic web and technology behind the semantic web search Engines, showing and approaching its success relation, with a concise bibliographic background, categorizing and synthesizing the potential of both technologies.
Chapter
Most of the decisions taken in and around the world are based on data and information. Therefore, the chapter aims to develop a method of data transmission based on discrete event concepts, being such methodology named CBEDE, and using the MATLAB software, where the memory consumption of the proposal was evaluated, presenting great potential to intermediate users and computer systems, within an environment and scenario with cyber-physical systems ensuring more speed, transmission fluency, in the same way as low memory consumption, resulting in reliability. With the differential of this research, the results show better computational performance related to memory utilization with respect to the compression of the information, showing an improvement reaching 95.86%.
Chapter
The internet of things (IoT) is characterized by devices that communicate without human interference, sending and receiving data online, to which they have shaped the way of connecting household appliances, machines, and equipment, cars, among other things, also arriving at the field through characterized by the communication between devices, sensors, drones, and machines. They have great potential to improve production processes, making agriculture increasingly digital, creating solutions, connectivity, and training for specialist labor. As well as irrigation systems and other intelligent machines with the ability to talk to each other enabling management in the use of energy, resources, and inputs making the production process more efficient. Precision agriculture encompasses a series of components and factors from which the best procedures can be chosen that are appropriate in a given agricultural operation that effectively meets your needs, also related to the application of inputs at the right time and in the right place, following the growth and productivity over the entire length of a plantation by controlling pests, among other technologies, providing a reduction in production costs and spending on inputs, reducing the pollution of nature by the pesticides used, making it possible to reduce operating costs, increasing precision in obtaining results in the same way as less variability in production. Therefore, this chapter aims to provide an updated overview and review of the use of the internet of things in the precision agriculture system showing and approaching its success relation, with a concise bibliographic background, categorizing and synthesizing the potential of both technologies.
Chapter
Full-text available
The public corruption and illicit market correspond to the greatest global challenges to be overcome by governments worldwide (Transparency International 2017). According to the Corruption Perceptions Index 2017, for 180 countries/territories studied, most of them are making little or no progress in ending corruption in the public sector. The public money laundered affects direct investments in infrastructure to improve the city’s performance. The corruption encourages directly the illicit activities formation and the Organization for Economic Cooperation and Development (OECD) estimates that hundreds of billions of dollars of revenue from illicit activities are handled globally every year and was identified in the context of National Risk Assessments as part of the major risks that could affect countries in development. These practices have generated negative effects in society and the cities are the context in which all these issues occur. Then, this paper has aimed to conduct a qualitative reflection of how smart cities, which represent efficiency and effectiveness places, can contribute through your intelligent environment to mitigate the corruption process and illicit market operations.
Chapter
With the population growth, the Petrobras modernization REPLAN (Paulinia Refinery), the progressive region development and the shortage of resources from new wellsprings, there was a need to increase the water availability of the region of Campinas—SP and with that will be implanted two dams, one in the municipality of Quarry—SP and another in the district of Two Bridges in the municipality of Amparo—SP. The construction of the dams occurred for many reasons, one of which is to benefit many cities through water reserves serves to about 5.5 million inhabitants are that downstream of the reservoirs. These concepts, the present work AIMS to present all the criteria and principles that are related to the construction of the dams. Through research and consultations will be all the characteristics presented, direct and indirect information
Chapter
Autonomous cars range from those with a slightly higher degree of driving assistance to those capable of driving without human interference, since the technologies are the same in both, further changing the way they are integrated into the on-board computer. Contributing from a number of components that work together to ensure that a self-driving car has the insight and guidance, it needs to drive safely, from cameras, sensors, and radars working like the eyes of the vehicle to detecting obstacles, road signs, traffic lights, pedestrians, relief among other aspects. The great advantage is that these devices do a real scan around the vehicle, allowing it to see in 360 degrees. In this way, he can perceive situations that the human eye could hardly catch, considerably increasing the safety of autonomous cars. In this sense, the fascination of humanity by car automation is the study of this paper. This research presents a detailed discussion along with historical review regarding the development of autonomous cars from the beginning to the present day and provides a perspective regarding the future of urban mobility.
Chapter
Human papillomavirus, commonly referred to as HPV, is a virus with tropism by differentiating tissues. Its pathogenesis is related to the disorder of genes that inhibit cell apoptosis and cell suppression, this fact favors its action and spread by an organism. Due to these characteristics, HPV is associated with cervical, anus, head, and neck cancer. Based on this, the present work has as objective the accomplishment of a bibliographical revision study of the main characteristics of this virus as well as its effects on the human organism. Studies such as this can be seen as key elements for understanding and preventing this sexually transmitted disease (STD), which has its highest incidence rates in underdeveloped and developing countries, where health and education policies are often scarce or nonexistent.
Chapter
Information security is essential for any company that uses technology in its daily routine. Cybersecurity refers to the practices employed to ensure the integrity, confidentiality, and availability of information, consisting of a set of tools, risk management approaches, technologies, and methods to protect networks, devices, programs, and data against attacks or non-access authorized. Big Data becomes a barrier for network security to understand the true threat landscape, considering effective solutions that differ from reactive “collect and analyze” methods, improving security at a faster pace. Through Machine Learning it is possible to address unknown risks including insider threats, being an advanced threat analytics technology. Big data analytics, in conjunction with network flows, logs, and system events, can discover irregularities and suspicious activities, can deploying an intrusion detection system, which given the growing sophistication of cyber breaches. Cybersecurity is fundamental pillars of digital experience, so organizations’ digital initiatives must consider, from the beginning, the requirements in cyber and privacy, concerning the security and privacy of this data. So, Big data analytics plays a huge role in mitigating cybersecurity breaches caused by the most diverse means, guaranteeing data security and privacy, or supporting policies for secure information sharing in favor of cybersecurity. Therefore, this chapter has the mission and objective of providing an updated review and overview of Big Data, addressing its evolution and fundamental concepts, showing its relationship with Cybersecurity on the rise as well as approaching its success, with a concise bibliographic background, categorizing and synthesizing the potential of technology.
Chapter
It is extremely important to point out that through quantum computing, it is possible to obtain results previously unachievable until then by traditional computing. Based on this, this paper aims to give an overview and glimpse of the potential horizon of this area of study that has become increasingly robust in computing over the recent past. It is beyond our scope to address deep concepts of quantum mechanics on which quantum computing is based and reveals. It is rather to form a simple, comprehensive and consistent intellectual scope, not only for specialists but targeted common interest. Thus, this research was built on the latest studies on the subject recognized within the scientific and academic fields.
Chapter
Industry 4.0 brings with it a lot of technology in the areas of communication, artificial intelligence, Internet of Things (IoT), and others. One of the great challenges for all these activities is in the design of the hardware including not only the electronic electron project but also the printed circuit board (PCB) design. Working with signals in gigahertz all the tracks of signals, paths, layers, place of components, and processes involved affecting the final product that the Industry 4.0 so longs for. This research presents a detailed discussion along with a description modeling of the main topics that are faced in relation to the challenges of PCB design and manufacturing techniques.
Chapter
The Internet of Things (IoT) has grown wildly in the last years but the security of the generated data has not improved at the same proportion as the number of devices connected to the Internet has multiplied, and this is very worrying because privacy is one of the most important topics when a private IoT application is developed. As the growing number of IoT application is taking place more strategies for data security is required to deal with different scenarios of the wide and vast type of IoT applications. An investigation in order to find proper solutions to common IoT applications that have been challenged for improvements in data security is the goal of this paper. Through blockchain technology that offers security naturally without any expensive investment, the data security that is required by IoT devices become reachable. This paper presents a discussion in order to clarify how the security on Internet of Things applications can be enhanced using blockchain providing a correlation between the capabilities of both technologies.
Chapter
This work aims to total the reality of cities through some Brazilian electronic data e-Gov, and other research conducted and counteracted with the latest assumptions proposed by smart cities governance models (CI) and intelligent governance (IG) increasingly imposed by the information society and network, realizing the new social engineering of collaboratively and ICT. Data were collected through reports of their research and also the theoretical literature review concerning the issue. This paper presents a discussion in order to clarify how the small municipalities still need to mature to achieve a reality of smart city governance.
Chapter
Full-text available
Metaheuristics have proven to be a powerful tool for roughly solving optimization problems, applied to find answers to problems about which there is little information. In general, meta-heuristics use a combination of random choices and historical knowledge of the previous results acquired by the method to guide and search the search space in neighborhoods within the search space, avoiding premature stoppages in optimal locations. A strategy that guides or modifies a heuristic to produce solutions that surpass the quality of those commonly encountered. The discrete event simulation (DES) is a representation of a system as a sequence of operations by state transactions (entities), where these entities are discrete and may be relative to various types depending on the context of the problem that is being sought. In this way is brought to the eyes of interest, the union of discrete events simulation with metaheuristic science, whether direct or not, is successful.
Chapter
Full-text available
The growing use of digital image processing techniques focused on health is explicit, helping in the solution and improvements in diagnosis, as well as the possibility of creating new diagnostic methods. The blood count is the most required laboratory medical examination, as it is the first examination made to analyze the general clinical picture of any patient, due to its ability to detect diseases, but its cost can be considered inaccessible to populations of less favored countries. In short, a metaheuristic is a heuristic method for generally solving optimization problems, usually in the area of combinatorial optimization, which is usually applied to problems for which no efficient algorithm is known. Digital Image Processing allows the analysis of an image in the various regions, as well as extract quantitative information from the image; perform measurements impossible to obtain manually; enable the integration of various types of data. Metaheuristic techniques have come to be great tools for image segmentation for digitally segmenting containing red blood cells, leukocytes, and platelets under detection and counting optics. Metaheuristics will benefit to computational blood image analysis but still face challenges as cyber-physical systems evolve, and more efficient big data methodologies arrive.
Chapter
Smart telecoms will deliver lasting improvements to business productivity and enduring consumer benefits that raise the quality of life by enabling telecommuting, telemedicine, entertainment, access to e-government, and a wealth of other online services. And we'll need next-generation digital platforms on which telecom providers can create and deliver all kinds of services. Therefore, this chapter develops a method of data transmission based on discrete event concepts. This methodology was named CBEDE. Using the MATLAB software, the memory consumption of the proposed methodology was evaluated, presenting the great potential to intermediate users and computer systems, ensuring speed, low memory consumption, and reliability. With the differential of this research, the use of discrete events applied in the physical layer of a transmission medium, the bit itself, being this to low-level of abstraction, the results show better computational performance related to memory utilization, showing an improvement of up to 79.89%.
Conference Paper
Full-text available
A simulação a eventos discretos (SED) vem sendo utilizada de forma crescente para auxílio a tomada de decisão nas mais diversas áreas do conhecimento. Este artigo faz uma aplicação real de um projeto de simulação em um ambiente de saúde, no qual a direção do hospital necessitava conhecer seu processo e identificar o tempo de permanência do cliente na fila, visando melhorias no processo. Dessa maneira, a simulação foi a ferramenta utilizada pelos analistas para atingir o objetivo deste trabalho. O método de pesquisa utilizado foi a Modelagem e Simulação, e as três etapas do projeto de simulação foram seguidas, concepção, implementação e análise. Ao final do trabalho, os resultados obtidos com a simulação permitiram direcionar os gestores do hospital, a fim de melhorar seu processo sem perder a qualidade do atendimento. PALAVRAS-CHAVE: Simulação a eventos discretos, aplicação, sistemas de saúde. Área principal:SIM, Simulação. Discrete event simulation (DES) has been used increasingly to aid decision making in various fields of knowledge. This article is a real application of a simulation project in a healthcare environment, in which the hospital board needed to know your process and identify the permanence of the customer in the queue, in order to improve the process. Thus, the simulation was the tool used by analysts to achieve our objective. The research method used was the Modeling and Simulation, and the three stages of the simulation project were followed, design, implementation and analysis. At the end of the work, the results obtained with the simulation allowed direct managers of the hospital to improve its process without losing the quality of care.
Article
Full-text available
A major trend in industrial systems is the application of communication networks technologies, such as CAN (Controller Area Network), in distributed control systems. A challenging problem in the development of distributed system based on communication networks is the network delay effects in the performance of the system. This fact has motivated the development of simulation tools and models to calculate these delays, to simulate the timing behavioral and evaluate the performance of these systems. This work presents the development of a mathematical model and a Colored Petri Nets model to the simulation of CAN-based distributed systems. The flexibility and potential obtained with the developed models allow determining and analyzing several performance parameters related to communication network and the distributed control. An example of a CAN-based distributed system applied to perform the control of a mobile robot demonstrates the functionalities of the models and its applicability to the analysis of any CAN application.
Article
Este trabalho apresenta um modelo de simulação a eventos discretos para análise do processamento de um servidor de email. São analisados o envio e o recebimento de mensagens, levando em consideração o período do lead time dos mesmos. O modelo de simulação considerou todo processamento do servidor, desde a chegada de emails até o envio para os destinatários. Assim, o modelo proporcionou a visualização dos tempos gastos em cada processo, a utilização dos recursos e, em especial, o principal problema enfrentado pela empresa, que é o alto lead time das mensagens no servidor. As simulações foram realizadas utilizando o software livre de simulação Ururau. Os resultados mostraram que o software livre obteve resultados equivalentes aos de outro software comercial tradicionalmente utilizado, sem diferença estatística significativa entre eles.
Article
A modeling and simulation environment supporting scalable network system analysis and design is described. The environment, called DEVS/DOC, enables simulation modeling of network systems where hardware and software layers of the system are modeled separately and combined based on the concept of quantum Distributed Object Computing. The key benefit of this reengineered simulation environment is support for scalability. Of particular interest is the ability to evaluate alternative network configurations where many software and hardware components of a system can be accounted for and analyzed simultaneously. A series of simulations are developed to show the capabilities of distributed object computing modeling and its realization using the DEVSJAVA modeling and simulation environment.
Article
Industrial dynamics, described as the application of feedback concepts to social systems, is evolving toward a theory of structure in systems as well as being an approach to corporate policy design. In high-order, nonlinear systems, with multiple loops and both positive and negative feedback, are found the modes of behavior which have been so puzzling in management and economics. The time is at hand when more sharply defined concepts and principles can form a core through management education to interrelate the functional areas and to move from static to dynamic understanding of systems. To do so should help close the gap between what the management school can now teach and what the manager must understand if he is to successfully cope with the increasing complexity of our society.
Conference Paper
This paper discusses a discrete event simulation model developed to identify and understand the impact of different failures on the overall production capabilities in a chemical plant. The model will be used to understand key equipment components that contribute towards maximum production loss and to analyze the impact of a change policy on production losses. A change policy can be classified in terms of new equipment installation or increasing the stock level for the failure prone components. In this paper, we present the approach used and some preliminary results obtained from available data.
Article
Texto introductorio a la telecomunicación. Desglosa este campo de la ingeniería electrónica y de comunicación en las ramas de transmisión y de la interconexión o conmutación.
Discrete event simulation and dynamical systems: a study of art
  • R Padilha
  • B I Martins
  • E Moschim
Standard Handbook of Broadcast Engineering
  • C J Whitaker
Simulação de Sistemas de Comunicação Óptica Baseada em Simulação a Eventos Discretos
  • N K Sasaki
  • E Moschim