Academic literature on the topic 'Age-of-information (AoI)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Age-of-information (AoI).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Age-of-information (AoI)"

1

Salimnejad, Mehrdad, and Nikolaos Pappas. "On the Age of Information in a Two-User Multiple Access Setup." Entropy 24, no. 4 (April 12, 2022): 542. http://dx.doi.org/10.3390/e24040542.

Full text
Abstract:
This work considers a two-user multiple access channel in which both users have Age of Information (AoI)-oriented traffic with different characteristics. More specifically, the first user has external traffic and cannot control the generation of status updates, and the second user monitors a sensor and transmits status updates to the receiver according to a generate-at-will policy. The receiver is equipped with multiple antennas and the transmitters have single antennas; the channels are subject to Rayleigh fading and path loss. We analyze the average AoI of the first user for a discrete-time first-come-first-served (FCFS) queue, last-come-first-served (LCFS) queue, and queue with packet replacement. We derive the AoI distribution and the average AoI of the second user for a threshold policy. Then, we formulate an optimization problem to minimize the average AoI of the first user for the FCFS and LCFS with preemption queue discipline to maintain the average AoI of the second user below a given level. The constraints of the optimization problem are shown to be convex. It is also shown that the objective function of the problem for the first-come-first-served queue policy is non-convex, and a suboptimal technique is introduced to effectively solve the problem using the algorithms developed for solving a convex optimization problem. Numerical results illustrate the performance of the considered optimization algorithm versus the different parameters of the system. Finally, we discuss how the analytical results of this work can be extended to capture larger setups with more than two users.
APA, Harvard, Vancouver, ISO, and other styles
2

Hu, Huimin, Ke Xiong, Yu Zhang, Pingyi Fan, Tong Liu, and Shaoli Kang. "Age of Information in Wireless Powered Networks in Low SNR Region for Future 5G." Entropy 20, no. 12 (December 10, 2018): 948. http://dx.doi.org/10.3390/e20120948.

Full text
Abstract:
Wireless powered communication technology has a great potential to power low-power wireless sensor networks and Internet of Things (IoT) for real-time applications in future 5G networks, where age of information (AoI) plays a very important performance metric. This paper studies the system average AoI of a wireless powered network, where a wireless-powered user harvests energy from a wireless power source (WPS) and then transmits data packets to its access point (AP) by using the harvested energy. The user generates data packets with some probability and adopts the first-come-first-served (FCFS) service policy. For such a system, by using the queuing theory and the probability models, we derive a closed-form expression of the system average AoI. We also formulate an optimization problem to minimize the AoI by optimizing the data packet generating probability, and find its solution by simple calculation and search. Simulation results demonstrate the correctness of our obtained analytical results. It also shows that, when the total distance of the two hops is fixed, the system average AoI increases linearly with the increment of the distance of the first hop, and a smaller data packet generating probability should be selected to match a bigger first-hop distance for achieving a smaller system average AoI. Moreover, a smaller data packet size also contributes to a smaller system average AoI.
APA, Harvard, Vancouver, ISO, and other styles
3

Sawwan, Abdalaziz, and Jie Wu. "On Edge Pruning of Communication Networks under an Age-of-Information Framework." Algorithms 15, no. 7 (June 29, 2022): 228. http://dx.doi.org/10.3390/a15070228.

Full text
Abstract:
Effective non-repetitive routing among nodes in a network is an essential function in communication networks. To achieve that, pruning the links of the network is helpful with the trade-off of making the network less robust in transmitting messages while reducing redundancy to increase flow with limited network bandwidth, so we enhance the quality of service (QoS). In our paper, we study the case that if a link removal has either no effect or an insignificant effect on the Age of Information (AoI) of the messages delivered in the communication network. The pruning of such links can be applied to the k least significant links in terms of their impact on the AoI of the messages transmitted in the system. The objective of our work is to study the effect of pruning a number of links in a network on the AoI, in order to reduce the redundancy of the messages that may be received at the destination many times while transmitted only once. In our context, the objective of the communication system would be to maintain the information from the source as fresh as possible when it arrives at the destination while reducing the redundancy of messages. In this work, we introduce an efficient reduction method designed for series-parallel networks with links of exponentially distributed wait times. In addition, we consider the deterministic case and present the pruning technique when link removal would not affect the AoI. Lastly, we present a comprehensive simulation to study the effect of pruning the links on the AoI of the network and the redundancy of messages received by the destination.
APA, Harvard, Vancouver, ISO, and other styles
4

Wei, Kefeng, Lincong Zhang, and Shupeng Wang. "Intelligent Channel Allocation for Age of Information Optimization in Internet of Medical Things." Wireless Communications and Mobile Computing 2021 (August 30, 2021): 1–10. http://dx.doi.org/10.1155/2021/6645803.

Full text
Abstract:
Along with the development of realtime applications, the freshness of information becomes significant because the overdue information is worthless and useless and even harmful to the right judgement of system. Therefore, The Age of Information (AoI) used for marking the freshness of information is proposed. In Internet of Medical Things (IoMT), which is derived from the requirement of Internet of Thins (IoT) in medicine, high freshness of medical information should be guaranteed. In this paper, we introduce the AoI of medical information when allocating channels for users in IoMT. Due to the advantages of Deep Q-learning Network (DQN) applied in resource management in wireless network, we propose a novel DQN-based Channel Allocation (DQCA) algorithm to provide the strategy for channel allocation under the optimization of the system cost considering the AoI and energy consumption of coordinator nodes. Unlike the traditional centralized channel allocation methods, the DQCA algorithm is distributed as each user performs the DQN process separately. The simulation results show that our proposed DQCA algorithm is superior to Greedy algorithm and Q-learning algorithm in terms of the average AoI, average energy consumption and system cost.
APA, Harvard, Vancouver, ISO, and other styles
5

Kallitsis, Georgios, Vasileios Karyotis, and Symeon Papavassiliou. "On the Potential of Enhancing Delay-Tolerant Routing Protocols via Age of Information." Future Internet 14, no. 8 (August 17, 2022): 242. http://dx.doi.org/10.3390/fi14080242.

Full text
Abstract:
In this paper, we study the potential of using the metric of Age of Information (AoI) for enhancing delay-tolerant routing protocols. The latter have been proposed for alleviating the impact of long roundtrip time in networks operating in harsh environments, e.g., in distributed applications deployed in a desert/sparsely populated area without infrastructure, a space network, etc. Delay-tolerant routing protocols can prevent excessive packet timer expiration, but do not provide any packet delivery time guarantee. Thus, they are unsuitable for time-sensitive applications that are more intensely desired nowadays in the next generation networking applications. By incorporating AoI into the operation of delay-tolerant routing protocols, we aim at devising routing protocols that can cope with both long propagation times and challenges related to time-sensitivity in packet delivery. More specifically, in this work, we modify the operation of a well-known delay-tolerant routing protocol, namely FRESH, to make AoI-based packet forwarding decisions, aiming at achieving specific delay guarantees regarding the end-to-end delivery time. We investigate the advantages and disadvantages of such an approach compared to the traditional FRESH protocol. This work serves as a cornerstone for successfully demonstrating the potential of exploiting AoI in delay-tolerant routing and its applications.
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, Dr Joy Iong Zong. "An Optimized Packet Transfer through Wireless Network Using Age of Information." IRO Journal on Sustainable Wireless Systems 2, no. 2 (May 18, 2020): 76–83. http://dx.doi.org/10.36548/jsws.2020.2.003.

Full text
Abstract:
The cost for sampling a packet from transmission and transmitting the updates of the status using the wireless channel changes depending on the Age of Information (AoI) constraints. If any error occurs during the process of transmission, the decision lies with the scheduling algorithm to either retransmit the packet or to sample the packet again. Either way, the cost will include both transmission as well as sampling costs. However the aspect of sampling a new packet because of the error will result in increasing the cost of the system. With time average AoI constraint, we have devised a novel optimization technique that uses time average cost. In order to tackle this issue, we propose a decision making algorithm that decides in slots. The proposed algorithm arrives at one of the three solutions based on optimization technique. Accordingly, the user can either remain silent or transmit the old pack or sample the new packet. With the use of simulation results, the optimum performance of the proposed work in terms of AoI and timer average cost is observed and recorded.
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Zijing, Mihai-Alin Badiu, and Justin P. Coon. "Relationship between Age and Value of Information for a Noisy Ornstein–Uhlenbeck Process." Entropy 23, no. 8 (July 23, 2021): 940. http://dx.doi.org/10.3390/e23080940.

Full text
Abstract:
The age of information (AoI) has been widely used to quantify the information freshness in real-time status update systems. As the AoI is independent of the inherent property of the source data and the context, we introduce a mutual information-based value of information (VoI) framework for hidden Markov models. In this paper, we investigate the VoI and its relationship to the AoI for a noisy Ornstein–Uhlenbeck (OU) process. We explore the effects of correlation and noise on their relationship, and find logarithmic, exponential and linear dependencies between the two in three different regimes. This gives the formal justification for the selection of non-linear AoI functions previously reported in other works. Moreover, we study the statistical properties of the VoI in the example of a queue model, deriving its distribution functions and moments. The lower and upper bounds of the average VoI are also analysed, which can be used for the design and optimisation of freshness-aware networks. Numerical results are presented and further show that, compared with the traditional linear age and some basic non-linear age functions, the proposed VoI framework is more general and suitable for various contexts.
APA, Harvard, Vancouver, ISO, and other styles
8

Ni, Yuanzhi, Lin Cai, and Yuming Bo. "Vehicular beacon broadcast scheduling based on age of information (AoI)." China Communications 15, no. 7 (July 2018): 67–76. http://dx.doi.org/10.1109/cc.2018.8424604.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Oğuz, Tahir Kerem, Elif Tuğçe Ceran, Elif Uysal, and Tolga Girici. "Implementation and Evaluation of Age-Aware Downlink Scheduling Policies in Push-Based and Pull-Based Communication." Entropy 24, no. 5 (May 11, 2022): 673. http://dx.doi.org/10.3390/e24050673.

Full text
Abstract:
As communication systems evolve to better cater to the needs of machine-type applications such as remote monitoring and networked control, advanced perspectives are required for the design of link layer protocols. The age of information (AoI) metric has firmly taken its place in the literature as a metric and tool to measure and control the data freshness demands of various applications. AoI measures the timeliness of transferred information from the point of view of the destination. In this study, we experimentally investigate AoI of multiple packet flows on a wireless multi-user link consisting of a transmitter (base station) and several receivers, implemented using software-defined radios (SDRs). We examine the performance of various scheduling policies under push-based and pull-based communication scenarios. For the push-based communication scenario, we implement age-aware scheduling policies from the literature and compare their performance with those of conventional scheduling methods. Then, we investigate the query age of information (QAoI) metric, an adaptation of the AoI concept for pull-based scenarios. We modify the former age-aware policies to propose variants that have a QAoI minimization objective. We share experimental results obtained in a simulation environment as well as on the SDR testbed.
APA, Harvard, Vancouver, ISO, and other styles
10

Pappalardo, Martina, Antonio Virdis, and Enzo Mingozzi. "Energy-Optimized Content Refreshing of Age-of-Information-Aware Edge Caches in IoT Systems." Future Internet 14, no. 7 (June 28, 2022): 197. http://dx.doi.org/10.3390/fi14070197.

Full text
Abstract:
The Internet of Things (IoT) brings internet connectivity to everyday devices. These devices generate a large volume of information that needs to be transmitted to the nodes running the IoT applications, where they are processed and used to make some output decisions. On the one hand, the quality of these decisions is typically affected by the freshness of the received information, thus requesting frequent updates from the IoT devices. On the other hand, the severe energy, memory, processing, and communication constraints of IoT devices and networks pose limitations in the frequency of sensing and reporting. So, it is crucial to minimize the energy consumed by the device for sensing the environment and for transmitting the update messages, while taking into account the requirements for information freshness. Edge-caching can be effective in reducing the sensing and the transmission frequency; however, it requires a proper refreshing scheme to avoid staleness of information, as IoT applications need timeliness of status updates. Recently, the Age of Information (AoI) metric has been introduced: it is the time elapsed since the generation of the last received update, hence it can describe the timeliness of the IoT application’s knowledge of the process sampled by the IoT device. In this work, we propose a model-driven and AoI-aware optimization scheme for information caching at the network edge. To configure the cache parameters, we formulate an optimization problem that minimizes the energy consumption, considering both the sampling frequency and the average frequency of the requests sent to the device for refreshing the cache, while satisfying an AoI requirement expressed by the IoT application. We apply our caching scheme in an emulated IoT network, and we show that it minimizes the energy cost while satisfying the AoI requirement. We also compare the case in which the proposed caching scheme is implemented at the network edge against the case in which there is not a cache at the network edge. We show that the optimized cache can significantly lower the energy cost of devices that have a high transmission cost because it can reduce the number of transmissions. Moreover, the cache makes the system less sensitive to higher application-request rates, as the number of messages forwarded to the devices depends on the cache parameters.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Age-of-information (AoI)"

1

Flor, Alexander G. "The information rich and the information poor two faces of the information age in a developing country /." 1987. http://catalog.hathitrust.org/api/volumes/oclc/27664092.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Halbert, Debora J. "Weaving webs of ownership intellectual property in an information age /." 1996. http://catalog.hathitrust.org/api/volumes/oclc/36573234.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hughes, Joy Reed. "A clash of cultures libraries and computer services in an information age /." 1989. http://catalog.hathitrust.org/api/volumes/oclc/23086300.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Age-of-information (AoI)"

1

Leach, Neil. Architecture in the Age of Artificial Intelligence. Bloomsbury Publishing Plc, 2021. http://dx.doi.org/10.5040/9781350165557.

Full text
Abstract:
Artificial intelligence is everywhere – from the apps on our phones to the algorithms of search engines. Without us noticing, the AI revolution has arrived. But what does this mean for the world of design? The first volume in a two-book series, Architecture in the Age of Artificial Intelligence introduces AI for designers and considers its positive potential for the future of architecture and design. Explaining what AI is and how it works, the book examines how different manifestations of AI will impact the discipline and profession of architecture. Highlighting current case-studies as well as near-future applications, it shows how AI is already being used as a powerful design tool, and how AI-driven information systems will soon transform the design of buildings and cities. Far-sighted, provocative and challenging, yet rooted in careful research and cautious speculation, this book, written by architect and theorist Neil Leach, is a must-read for all architects and designers – including students of architecture and all design professionals interested in keeping their practice at the cutting edge of technology.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Age-of-information (AoI)"

1

Sergi, Bruno S., Elena G. Popkova, Aleksei V. Bogoviz, and Tatiana N. Litvinova. "Future Outlines in the Sphere of Education in the Age of the Information Economy." In Understanding Industry 4.0: AI, the Internet of Things, and the Future of Work, 73–78. Emerald Publishing Limited, 2019. http://dx.doi.org/10.1108/978-1-78973-311-220191022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Véliz, Carissa. "Governing Privacy." In The Oxford Handbook of AI Governance, C9.P1—C9.N6. Oxford University Press, 2022. http://dx.doi.org/10.1093/oxfordhb/9780197579329.013.9.

Full text
Abstract:
Abstract This chapter explores the nature of privacy and the right to privacy, their value, and ways to protect them. According to the hybrid account of privacy offered, privacy amounts to being personally unaccessed, and enjoying the right to privacy amounts to not losing (negative) control involuntarily over one’s personal information or sensorial space. The hybrid account captures the advantages of both access and control-based accounts of privacy. The chapter goes on to investigate the value of privacy. I argue that privacy is important because it shields citizens from harms that arise from exposure to others; it especially protects people from abuses of power. Privacy, I argue, is not only important for individuals, but also for society, and for liberal democracy in particular. Privacy is as collective as it is personal. Finally, I propose three effective measures to minimize losses of privacy and violations of the right to privacy in the digital age: data minimization, storage limitation, and banning the trade in personal data. The chapter ends by exploring the limits of consent in the context of AI and big data.
APA, Harvard, Vancouver, ISO, and other styles
3

Smith, Gary. "Introduction." In The AI Delusion. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198824305.003.0002.

Full text
Abstract:
The Democratic Party’s 2008 presidential nomination was supposed to be the inevitable coronation of Hillary Clinton. She was the most well-known candidate; had the most support from the party establishment, and had, by far, the most financial resources. Two big names (Al Gore and John Kerry) considered running, but decided they had no hope of defeating the Clinton machine. That left an unlikely assortment of lesser-knowns: a U.S. Representative from Ohio (Dennis Kucinich), the Governor of New Mexico (Bill Richardson), and several U.S. Senators: Joe Biden (Delaware), John Edwards (North Carolina), Chris Dodd (Connecticut), Mike Gravel (Alaska), and Barack Obama (Illinois). The nomination went off script. Obama was a first-term senator, a black man with an unhelpful name, but he excited voters. He raised enough money to be competitive in the Iowa caucuses and he persuaded Oprah Winfrey to campaign for him. Obama defeated Clinton by eight percentage points in Iowa and the race was on. Obama won the Democratic nomination and, then, the presidential election against Republican John McCain because the Obama campaign had a lot more going for it than Obama’s eloquence and charisma: Big Data. The Obama campaign tried to put every potential voter into its data base, along with hundreds of tidbits of personal information: age, gender, marital status, race, religion, address, occupation, income, car registrations, home value, donation history, magazine subscriptions, leisure activities, Facebook friends, and anything else they could find that seemed relevant. Some data were collected from public data bases, some from e-mail exchanges or campaign workers knocking on front doors. Some data were purchased from private data vendors. Layered on top were weekly telephone surveys of thousands of potential voters which not only gathered personal data, but also attempted to gauge each person’s likelihood of voting—and voting for Obama. These voter likelihoods were correlated statistically with personal characteristics and extrapolated to other potential voters based on their personal characteristics. The campaign’s computer software predicted how likely each person its data base was to vote and the probability that the vote would be for Obama. This data-driven model allowed the campaign to microtarget individuals through e-mails, snail mail, personal visits, and television ads asking for donations and votes.
APA, Harvard, Vancouver, ISO, and other styles
4

Gómez, Carlos, Roberto Hornero, Daniel Abásolo, Alberto Fernández, and Javier Escudero. "Regularity Analysis of the Magnetoencephalogram Background Activity in Alzheimer's Disease Patients Using Auto Mutual Information." In Encyclopedia of Healthcare Information Systems, 1146–52. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-889-5.ch143.

Full text
Abstract:
Magnetoencephalograpy (MEG) is a noninvasive technique that allows recording the magnetic fields produced by brain activity. SQUID (Superconducting QUantum Interference Device) sensors immersed in liquid helium at 4.2 K are used to detect the extremely weak brain magnetic signals. MEG provides an excellent temporal resolution, orders of magnitude better than in other methods for measuring cerebral activity, as magnetic resonance imaging, single-photon-emission computed tomography and positron-emission tomography (Hämäläinen, Hari, Ilmoniemi, Knuutila, & Lounasmaa, 1993). A good spatial resolution is also provided, although this depends on the source configuration (Hari & Forss, 1999). Moreover, this technique is independent of any reference point. In addition, magnetic fields are not distorted by the resistive properties of the skull (Hämäläinen et al., 1993). Nevertheless, the recordings are very sensitive to external artifacts. Thus, the signals must be acquired in a magnetically shielded room. In this preliminary study, we examined the MEG background activity in patients with probable AD, and in age-matched control subjects using auto mutual information (AMI). Our purpose is to test the hypothesis that an abnormal type of nonlinear dynamics is associated with AD.
APA, Harvard, Vancouver, ISO, and other styles
5

Begum, Jamila. "Husnara Begum." In The Silence That Speaks, 110—C11.P19. Oxford University PressDelhi, 2022. http://dx.doi.org/10.1093/oso/9780190132613.003.0012.

Full text
Abstract:
Abstract Jamila Begum’s Urdu short-story “Husnara Begum” appeared in December 1915 in the Urdu journal Tehzeeb-e-Niswan, which was founded by Mumtaz Ali (1860-1935) in 1898 in partnership with his wife Muhammadi Begum (1878-1908). This story highlights the plight of an abandoned wife, whose husband deserts her and his daughter Husnara to get married to the daughter of a rich trader. This is a fictional account of the misery and struggles of a Muslim woman, who opens an elementary school to eke out her living and educate her daughter. The success of their enterprise and consequent prosperity delivers the radical message of women’s empowerment, demonstrating how education can be used as a tool to battle economic adversity. The story ends in the marriage of Husnara to a barrister as a reward for their hard-work. This woman’s narrative rewrites the traditional concept of sharafat in order to accommodate the idea of women’s economic independence. “Husnara Begum” demolishes the stereotypes about Muslim women as mere victims of Muslim patriarchy and raises the issue of women’s agency in the age of feminism. No information is available about the author of the story except that she published this short-story in Tehzeeb-e-Niswan in 1915. The translation of this story from an Urdu women’s journal is aimed at recovering the lost voices of Indian Muslim women in the early twentieth-century.
APA, Harvard, Vancouver, ISO, and other styles
6

Gbolagade Akeem, Lameed, and Lateef Funmilayo Lewiska. "Hunting and Deforestation: A Threat to the Existence of the Niger Delta Red Colobus Monkey (Procolobus epieni)." In Environmental Management [Working Title]. IntechOpen, 2021. http://dx.doi.org/10.5772/intechopen.96885.

Full text
Abstract:
The Niger Delta in Nigeria is the largest wetland in Africa and the third largest mangrove forest in the world. The region is known for its richness in biodiversity as well as its oil and gas resources. Due to the high level of oil exploration, deforestation, hunting and insecurities in these areas, the wildlife especially endemic species like the Niger Delta red colobus becomes vulnerable to extinction. Most researches on their range have noted a significant reduction in their population and range distribution. Hence, up-to-date information on their current status is paramount to ensure proper and urgent conservation measures. Data was obtained through the use of field survey and secondary data. The species was recently discovered endemic to Niger delta region in Nigeria for about 23 years ago and recent studies observed that there has been a drastic reduction in their population and a shift in the range they formally occupied faulting this to anthropogenic activities. This study revealed that the location is under intense timber extraction and hunting and as a result, one of the location in the Apoi creek where it was reported to be present, record no species of Red colobus monkey. Only the red capped mangabey monkey (3) were sighted at the location with some evidence of alligator (10). Result also revealed that most of the communities (age ≤ 30) do not know or have seen the species. The situation at the location is exacerbated because of the level of poverty and insecurity in the areas. Going by the evidence of intense timber extraction and hunting at the location, the number of this species may have drastically reduced compared to what it was formally projected (±200 individuals). It is therefore strongly recommended that a follow up of the research is done in other location where it was reported to be present.
APA, Harvard, Vancouver, ISO, and other styles
7

Jovanovski, Diana, and Konstantine K. Zakzanis. "On the Use of Virtual Reality as an Outcome Measure in Neuropsychological Rehabilitation." In The Role of Technology in Clinical Neuropsychology. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190234737.003.0009.

Full text
Abstract:
Despite the prevalence of executive dysfunction across multiple neurological and psychiatric conditions, there have been few validated rehabilitative interventions targeting it. One intervention holding promise for patients with executive dysfunc­tion is Robertson’s Goal Management Training (GMT; Robertson, 1996). GMT is based on Duncan’s (1986) theory of goal neglect (or failure to execute intentions), in which disorganized behavior is attributed to impaired construction and use of “goal lists,” considered to direct behavior by controlling actions that promote or oppose task completion. GMT attempts to ameliorate goal neglect through verbally mediated, metacognitive strategies that systematically target planning abilities by teach­ing individuals to structure their intentions. Through presentations, discussions, exercises, and homework assignments, GMT trains participants to use strategies like stopping and orienting to relevant information, partitioning goals into more easily managed subgoals, encoding and retaining goals, and monitoring performance. Investigations into the efficacy of GMT have been promising in both normal older adults and in patients with acquired brain injury (ABI). In order to investigate the efficacy of GMT for older adults with cognitive complaints, van Hooren and colleagues (2007) randomly assigned 69 normal, community-dwelling adults age 55 years or older to a six-week GMT program or to a waitlist control group. After the intervention, participants from the GMT group reported significantly fewer anxiety symptoms, were significantly less annoyed by their cognitive failures, and reported improved ability to manage their executive failures as com­pared to control participants. Though this study reported positive results for subjective outcome measures, the intervention showed no effect on the Stroop Colour Word Test (Houx, Jolles, & Vreeling, 1993; Stroop, 1935). Levine and colleagues (2000) reported on 30 traumatic brain injury (TBI) patients who were randomly assigned to receive a brief trial (1-hour session) of GMT or motor skills training. Upon completion of the intervention, the GMT group, but not the motor skills group, showed significant improvement on paper-and-pencil tasks designed to mimic everyday executive tasks that are problematic for patients with goal neglect.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Age-of-information (AoI)"

1

Ildiz, M. Emrullah, Orhan T. Yavascan, Elif Uysal, and O. Tugberk Kartal. "Query Age of Information: Optimizing AoI at the Right Time." In 2022 IEEE International Symposium on Information Theory (ISIT). IEEE, 2022. http://dx.doi.org/10.1109/isit50566.2022.9834897.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

"INFOCOM WKSHPS AoI 2021: IEEE INFOCOM WKSHPS: AoI 2021: IEEE INFOCOM Age of Information Workshop - Program." In IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE, 2021. http://dx.doi.org/10.1109/infocomwkshps51825.2021.9484432.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Prandel, Paulo César, and Priscila Solis Barreto. "Um Simulador para o Cálculo e Otimização da Age of Information (AoI) em Sistemas Ciberfísicos." In Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação - SBC, 2022. http://dx.doi.org/10.5753/sbrc_estendido.2022.223491.

Full text
Abstract:
A Age of Information (AoI) surge como um novo conceito e conjunto de métricas que representam o grau de atualização da informação que um monitor possui em relação a uma entidade ou processo remoto que envia atualizações periodicamente. Essas métricas podem ser aplicadas na avaliação de Sistemas Ciberfísicos (Cyber Physical Systems CPS), como por exemplo um sistema de monitoramento composto por diversos sensores, uma rede e um monitor. Na revisão da literatura verifica-se que a maior parte dos trabalhos explora a abordagem analítica para obter expressões exatas para o cálculo da AoI. Essa abordagem, no entanto, é limitada pelas dificuldades encontradas na modelagem à medida em que o CPS em estudo se torna mais complexo, o que motiva a utilização de outros métodos de avaliação, como o uso de simulações. Dessa forma, este trabalho propõe uma ferramenta de simulação baseada em um modelo computacional para a avaliação da AoI em CPS. Tal ferramenta é capaz de avaliar qualquer modelo de sistema, ao aplicar ainda diversas técnicas de gerenciamento de pacotes presentes na literatura para a otimização da AoI. Por fim, a ferramenta prova a sua qualidade ao retornar uma análise estatística da precisão dos resultados da simulação.
APA, Harvard, Vancouver, ISO, and other styles
4

Prandel, Paulo César, and Priscila Solis Barreto. "Preempção Condicional de Pacotes baseada na Vida Média Residual para Otimização da Age of Information em Sistemas Ciberfísicos." In Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação, 2022. http://dx.doi.org/10.5753/sbrc.2022.222346.

Full text
Abstract:
No estudo de Sistemas Ciberfísicos, a Age of Information (AoI) surge como um novo conceito ao representar o grau de atualização da informação que um monitor possui em relação a uma entidade ou processo remoto que envia atualizações periodicamente. O gerenciamento de pacotes é um conjunto de técnicas e políticas que priorizam, bloqueiam ou executam a preempção (descarte e substituição) de pacotes que chegam a um servidor e que pode ser utilizada para otimização da AoI. As técnicas no estado da arte, como a LGFS (do inglês Last Generated First Served) possuem comportamento estático, executando a mesma ação para todos os pacotes: LGFS-S executa a preempção em serviço e LGFS-W e executa na fila de espera. O presente estudo propõe uma nova técnica de preempção condicional chamada LGFS-C, a qual utiliza o conceito de vida média residual para decidir a política a ser aplicada a um pacote em serviço ou na fila de espera. Para um modelo de fila simples, demonstra-se que a técnica LGFS-C alcança sempre resultados iguais ou superiores aos das outras técnicas, para qualquer distribuição de tempo de serviço para o servidor. A técnica proposta foi validada através de simulações, com o uso de uma ferramenta computacional especialmente desenvolvida para esse propósito.
APA, Harvard, Vancouver, ISO, and other styles
5

Changthong, Jutharat, Lampang Manmart, and Chollabhas Vongprasert. "Information Behavior of Thai Adolescents in the Electronic Age." In 2012 IIAI International Conference on Advanced Applied Informatics (IIAIAAI). IEEE, 2012. http://dx.doi.org/10.1109/iiai-aai.2012.14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mo, Zhiwei. "On the Product Service System Design of Diabetes Management for Patients." In Human Interaction and Emerging Technologies (IHIET-AI 2022) Artificial Intelligence and Future Applications. AHFE International, 2022. http://dx.doi.org/10.54941/ahfe100922.

Full text
Abstract:
The increasing number of chronic patients is still a problem for the Italian medical system. In the age of digitalization, digital technology offers many opportunities for helping these patients solve problems, through advanced technologies such as the Internet of Things, big data, and cloud computing, smart devices can be used to collect and analyze the health information of diabetic patients, and transmit it to medical institutions in a form of visual models for obtaining reasonable treatment recommendations timely. This smart product can analyze the patient's health data in real time, meet the needs of the patient, and facilitate the connection between the patient and various medical institutions. This paper studies the product service system centered on diabetic patients, designs a smart device with blood sugar testing, and provides an Italian localized solution.
APA, Harvard, Vancouver, ISO, and other styles
7

Wood, Chris, Fernando Merotto, Brian Kerrigan, Ramon Loback, and Pedro Gea. "Getting to Know Your Bends to Support SCC Management." In 2020 13th International Pipeline Conference. American Society of Mechanical Engineers, 2020. http://dx.doi.org/10.1115/ipc2020-9578.

Full text
Abstract:
Abstract Nova Transportadora do Sudeste (NTS) own and operate a gas transmission system in Brazil constructed in 1996. One of the confirmed primary integrity threats to this system is axial stress corrosion cracking. The pipelines vary in diameter, weld type, manufacturer and age. One of the pipelines failed in 2015 due to an axial stress corrosion crack. Since the failure, NTS have executed an intense inspection campaign to detect and size axial cracking within their network. The 2015 failure occurred on a field bend. The inspection campaign and following dig campaign has confirmed that cracking (both axial and circumferential) within field bends is the primary integrity threat. Brazil has a challenging terrain and approximately 40% of joints within the network were subject to cold field bending. The influences of the pipeline geometry within these areas have resulted in localised elevated stresses where the axial stress corrosion cracking colonies are initiating and growing. To date, no cracking (axial or circumferential) has been verified within their straight pipe joints. NTS initially took a conservative baseline assessment approach using API 579 Part 9, due to the limited information regarding the pipe material and complex stress state. In addition to the hoop stress from internal pressure, the baseline assessment also considered weld residual stress and bending stress due to ovalization to determine immediate and future integrity. An intensive dig campaign is underway following a crack detection in-line inspection campaign using electromagnetic acoustic transducer technology. A large number of deep cracks were reported by the in-line inspection system, these were verified to be deep and repaired with a type B sleeve. However, at one site an entire joint was removed for further analysis, to investigate the crack morphology, confirm material properties and refine the predictive failure pressure modelling. This paper outlines how NTS have combined a burst test, mechanical testing, FEA modelling, fractography and metallographic examination to further understand the feature morphology and stresses within these areas and how they have been able to reduce conservatism from their baseline assessment with confidence and adopt a plastic collapse approach to accurately predict failure.
APA, Harvard, Vancouver, ISO, and other styles
8

Cohn, Marvin J., Michael T. Cronin, Fatma G. Faham, David A. Bosko, and Erick Liebl. "Optimization of NDE Reexamination Locations and Intervals for Grade 91 Piping System Girth Welds." In ASME 2015 Pressure Vessels and Piping Conference. American Society of Mechanical Engineers, 2015. http://dx.doi.org/10.1115/pvp2015-45630.

Full text
Abstract:
It has become apparent with the development of creep strength enhanced ferritic steels, the mandatory ASME B31.1 Chapter VII and the non-mandatory ASME B31.1 Appendix V guidelines require a more rigorous method to manage the Grade 91 piping integrity at Genesee Unit 3. Given the relatively young age of Genesee Unit 3, three questions have been asked: 1) when do the examinations start, 2) what locations should be examined first, and 3) how often should the same location be reexamined? To ensure that the best value is obtained from the reexamination budget, a five-step process can be effectively used to define and categorize the scope of each set of reexaminations in the girth weld integrity management program. The five processes are performing the following analyses: 1) an evaluation of the historical information, 2) piping system hot and cold walkdowns, 3) as-designed and as-found piping stress analyses, 4) creep life consumption evaluations, including elastic and inelastic axial and radial stress redistributions, and 5) creep crack growth curve analyses. Reexaminations of the few critical lead-the-fleet weldments are performed with lower examination costs and higher confidence. Evaluations of the Genesee Unit 3 main steam (MS) piping system revealed that the applicable weldment stress is probably the most significant parameter in determining the Grade 91 girth weld critical reexamination locations and intervals. ASME B31.1 piping stress analyses of the MS piping system have sustained load stress variations of more than 100% among the girth welds. The lower bound American Petroleum Institute (API) 579 creep rupture equation for Grade 91 operating at 1,060°F (571°C) indicates that the creep life is a function of stress to the power of 8.9; consequently, a 15% stress increase results in about 2/3 reduction of creep rupture life. Creep crack growth analyses of several of the MS piping system weldments revealed that the creep crack growth time to grow from 1/8 inch to through-wall is a function of stress to the power of 8.8; consequently, a 15% stress increase results in about 2/3 reduction of time for a 1/8-inch crack to grow through-wall. This evaluation reveals that a few critical lead-the-fleet locations should be reexamined most frequently and justification can be provided for much longer reexamination intervals of the remaining girth welds with much lower applied stresses.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography