Last 7 days
Bookmark and Share    
Full Text
Peer Reviewed
See detailEffects of cold stimulation on cardiac-vagal activation: Randomized controlled trial with healthy participants
Jungmann, Manuela; Vencatachellum, Shervin UL; van Ryckeghem, Dimitri UL et al

in Journal of Medical Internet Research (in press)

Background: The experience of psychological stress has not yet been adequately tackled with digital technology by catering to healthy individuals who wish to reduce their acute stress levels. For the ... [more ▼]

Background: The experience of psychological stress has not yet been adequately tackled with digital technology by catering to healthy individuals who wish to reduce their acute stress levels. For the design of digitally mediated solutions, physiological mechanisms need to be investigated that have the potential to induce relaxation with the help of technology. Research has shown that physiological mechanisms embodied in the face and neck regions are effective for diminishing stress related symptoms. The study described in this paper expands on these areas with the design for a wearable in mind. As this study charts new territory in research, it also represents a first evaluation of the viability for a wearables concept to reduce stress. We inquire into the effects of cold stimulation on heart rate (HR) and heart rate variability (HRV) in the neck region using a Thermode device. Objective: The objectives of this study were to assess whether (a) HRV is increased and (b) HR is decreased during a cold stimulation compared to a (non-stimulated) control condition. Effects were in particular expected in the neck and cheek regions and less in the forearm area (c). Methods: Participants were seated in a lab chair and tested with cold stimulation on the right side of the body. A Thermode was placed on the neck, cheek and forearm. Participants’ electrocardiogram was recorded and subsequently analyzed. The study was a fully randomized, within subject design. The cold stimulation was applied in 16 s intervals over 4 trials per testing location. The control condition proceeded exactly like the cold condition, except the thermal variable was manipulated to remain on the baseline temperature. HR was measured in msec IBI. rMSSD analyses were used to index HRV. Data were analyzed using a repeated measurements analysis of variance approach with two repeated measurements factors, i.e. Body Location (neck, cheek, forearm) and Condition (cold, control) Results: The data analysis of 61 participants (on exclusion of outliers) showed a main effect for body location for HR and HRV, a main effect for condition for HR and HRV and an interaction effect for condition and body location for HR and HRV. The results obtained demonstrate a pattern of cardiovascular reactivity to cold stimulation, suggesting an increase in cardiac-vagal activation. The effect was found to be significant for cold stimulation in the lateral neck area. Conclusion: The results confirmed our main hypothesis. This sets the stage for further investigations of the stress reduction potential in the neck region by developing a wearable prototype that can be used for cold application. Future studies should include a stress condition, test for a range of temperatures and durations, and collect self-report data on perceived stress levels to advance current findings. [less ▲]

Full Text
Peer Reviewed
See detailSimultaneous finite element analysis of circuit-integrated piezoelectric energy harvesting from fluid-structure interaction
Ravi, Srivathsan; Zilian, Andreas UL

in Mechanical Systems & Signal Processing (2019), 114

Flow-driven piezoelectric energy harvesting is a strongly coupled multiphysics phenomenon that involves complex three-way interaction between the fluid flow, the electromechanical effect of the ... [more ▼]

Flow-driven piezoelectric energy harvesting is a strongly coupled multiphysics phenomenon that involves complex three-way interaction between the fluid flow, the electromechanical effect of the piezoelectric material mounted on a deformable substrate structure and the controlling electrical circuit. High fidelity computational solution approaches are essential for the analysis of flow-driven energy harvesters in order to capture the main physical aspects of the coupled problem and to accurately predict the power output of a harvester. While there are some phenomenological and numerical models for flow-driven harvesters reported in the literature, a fully three-dimensional strongly coupled model has not yet been developed, especially in the context of flow-driven energy harvesting. The weighted residuals method is applied to establish a mixed integral equation describing the incompressible Newtonian flow, elastic substrate structure, piezoelectric patch, equipotential electrode and attached electric circuit that form the multiphysics fluid-structure interaction problem. A monolithic numerical solution method is derived that provides consistent and simultaneous solution to all physical fields as well as to fluid mesh deformation. The approximate solution is based on a mixed space-time finite element discretization with static condensation of the auxiliary fields. The discontinuous Galerkin method is utilized for integrating the monolithic model in time. The proposed solution scheme is illustrated in the example of a lid driven cavity with a flexible piezoelectric bottom wall, demonstrating quantification of the amount of electrical energy extractable from fluid flow by means of a piezoelectric harvester device. The results indicate that in order to make reliable predictions on the power output under varying operational states, the realization of strong multiphysics coupling is required for the mathematical model as well as the numerical solution scheme to capture the characteristics of flow-driven energy harvesters. [less ▲]

Detailed reference viewed: 22 (1 UL)
Full Text
See detailReductions of elliptic curves
Perucca, Antonella UL

in Proceedings of the Roman Number Theory Association (2019), 4

Detailed reference viewed: 28 (1 UL)
Peer Reviewed
See detailStriking a balance between competitiveness and social fairness: what can we expect from the European Pillar of Social Rights?
Muñoz, Susana UL

in Chiocchetti, Paolo; Allemand, Frédéric (Eds.) Competitiveness and Solidarity in the European Union: Interdisciplinary Perspectives (2019)

The solemnly proclaimed European Pillar of Social Rights provides a meaningful response to the process of building a deeper, fairer European Union in the aftermath of the crisis. This chapter aims to ... [more ▼]

The solemnly proclaimed European Pillar of Social Rights provides a meaningful response to the process of building a deeper, fairer European Union in the aftermath of the crisis. This chapter aims to provide a critical assessment of the nature, scope, rationale, purpose, content and effectiveness of the Pillar in the light of its potential contribution to foster social fairness and competitiveness in the EU. The Pillar complements and develops the EU’s social acquis and reinforces standards which may provide a fairer and more socially-balanced competitiveness in the EU. Progress has been made, but further efforts are needed to build a sense of common purpose to strengthen the social foundations of the Union. [less ▲]

Detailed reference viewed: 14 (0 UL)
Full Text
Peer Reviewed
See detailSocial Change for Sustainable Localized Food Sovereignty. Convergence between Prosumers and Ethical Entrepreneurs.
Reckinger, Rachel UL

in Sociologia del Lavoro (2018), 152(4),

Recently, some resourceful community-driven initiatives for local food production and retail have arisen in Luxembourg, where low organic agricultural rates are paradoxically paired with high consumer ... [more ▼]

Recently, some resourceful community-driven initiatives for local food production and retail have arisen in Luxembourg, where low organic agricultural rates are paradoxically paired with high consumer demands. This niche of social innovators is combining agro-ecology with circular economy practices. Four cases of alternative food networks are of interest – studied with qualitative interviews and participant observation. One has been established since the 1980s with 200 employees, partly in social insertion measures. The more recent and smaller initiatives are characterized by a cooperative governance, a community-supported agricultural outlook, hands-on workshops and time-banks, all enabled by social media. These initiatives are more radical in their agro-ecological or permaculture practices, focusing on regenerative land use without relying on imports and fostering the integration of consumers with varying degrees of prosumer involvement, as a politicized step further than mere (possibly industrialized) organic production. [less ▲]

Detailed reference viewed: 42 (0 UL)
Full Text
Peer Reviewed
See detailSequential Resource Distribution Technique for Multi-User OFDM-SWIPT based Cooperative Networks
Gautam, Sumit UL; Lagunas, Eva UL; Chatzinotas, Symeon UL et al

Scientific Conference (2018, December)

In this paper, we investigate resource allocation and relay selection in a dual-hop orthogonal frequency division multiplexing (OFDM)-based multi-user network where amplify-and-forward (AF) enabled relays ... [more ▼]

In this paper, we investigate resource allocation and relay selection in a dual-hop orthogonal frequency division multiplexing (OFDM)-based multi-user network where amplify-and-forward (AF) enabled relays facilitate simultaneous wireless information and power transfer (SWIPT) to the end-users. In this context, we address an optimization problem to maximize the end-users’ sum-rate subjected to transmit power and harvested energy constraints. Furthermore, the problem is formulated for both time-switching (TS) and power-splitting (PS) SWIPT schemes.We aim at optimizing the users’ SWIPT splitting factors as well as sub-carrier–destination assignment, sub-carrier pairing, and relay–destination coupling metrics. This kind of joint evaluation is combinatorial in nature with non-linear structure involving mixed-integer programming. In this vein, we propose a sub-optimal low complex sequential resource distribution (SRD) method to solve the aforementioned problem. The performance of the proposed SRD technique is compared with a semi-random resource allocation and relay selection approach. Simulation results reveal the benefits of the proposed design under several parameter values with various operating conditions to illustrate the efficiency of SWIPT schemes for the proposed techniques. [less ▲]

Detailed reference viewed: 20 (1 UL)
Full Text
Peer Reviewed
See detailHITECS: A UML Profile and Analysis Framework for Hardware-in-the-Loop Testing of Cyber Physical Systems
Shin, Seung Yeob UL; Chaouch, Karim UL; Nejati, Shiva UL et al

in Proceedings of ACM/IEEE 21st International Conference on Model Driven Engineering Languages and Systems (MODELS’18) (2018, October)

Hardware-in-the-loop (HiL) testing is an important step in the development of cyber physical systems (CPS). CPS HiL test cases manipulate hardware components, are time-consuming and their behaviors are ... [more ▼]

Hardware-in-the-loop (HiL) testing is an important step in the development of cyber physical systems (CPS). CPS HiL test cases manipulate hardware components, are time-consuming and their behaviors are impacted by the uncertainties in the CPS environment. To mitigate the risks associated with HiL testing, engineers have to ensure that (1) HiL test cases are well-behaved, i.e., they implement valid test scenarios and do not accidentally damage hardware, and (2) HiL test cases can execute within the time budget allotted to HiL testing. This paper proposes an approach to help engineers systematically specify and analyze CPS HiL test cases. Leveraging the UML profile mechanism, we develop an executable domain-specific language, HITECS, for HiL test case specification. HITECS builds on the UML Testing Profile (UTP) and the UML action language (Alf). Using HITECS, we provide analysis methods to check whether HiL test cases are well-behaved, and to estimate the execution times of these test cases before the actual HiL testing stage. We apply HITECS to an industrial case study from the satellite domain. Our results show that: (1) HITECS is feasible to use in practice; (2) HITECS helps engineers define more complete and effective well-behavedness assertions for HiL test cases, compared to when these assertions are defined without systematic guidance; (3) HITECS verifies in practical time that HiL test cases are well-behaved; and (4) HITECS accurately estimates HiL test case execution times. [less ▲]

Detailed reference viewed: 91 (20 UL)
Full Text
Peer Reviewed
See detailEnabling Model Testing of Cyber-Physical Systems
Gonzalez Perez, Carlos Alberto UL; Varmazyar, Mojtaba UL; Nejati, Shiva UL et al

in Proceedings of ACM/IEEE 21st International Conference on Model Driven Engineering Languages and Systems (MODELS’18) (2018, October)

Applying traditional testing techniques to Cyber-Physical Systems (CPS) is challenging due to the deep intertwining of software and hardware, and the complex, continuous interactions between the system ... [more ▼]

Applying traditional testing techniques to Cyber-Physical Systems (CPS) is challenging due to the deep intertwining of software and hardware, and the complex, continuous interactions between the system and its environment. To alleviate these challenges we propose to conduct testing at early stages and over executable models of the system and its environment. Model testing of CPSs is however not without difficulties. The complexity and heterogeneity of CPSs renders necessary the combination of different modeling formalisms to build faithful models of their different components. The execution of CPS models thus requires an execution framework supporting the co-simulation of different types of models, including models of the software (e.g., SysML), hardware (e.g., SysML or Simulink), and physical environment (e.g., Simulink). Furthermore, to enable testing in realistic conditions, the co-simulation process must be (1) fast, so that thousands of simulations can be conducted in practical time, (2) controllable, to precisely emulate the expected runtime behavior of the system and, (3) observable, by producing simulation data enabling the detection of failures. To tackle these challenges, we propose a SysML-based modeling methodology for model testing of CPSs, and an efficient SysML-Simulink co-simulation framework. Our approach was validated on a case study from the satellite domain. [less ▲]

Detailed reference viewed: 39 (4 UL)
Peer Reviewed
See detailSecurity, reliability and regulation compliance in Ultrascale Computing System
Bouvry, Pascal UL; Varrette, Sébastien UL; Wasim, Muhammad Umer UL et al

in Carretero, J.; Jeannot, E. (Eds.) Ultrascale Computing Systems (2018)

Ultrascale Computing Systems (UCSs) are envisioned as large-scale complex systems joining parallel and distributed computing systems that will be two to three orders of magnitude larger than today’s ... [more ▼]

Ultrascale Computing Systems (UCSs) are envisioned as large-scale complex systems joining parallel and distributed computing systems that will be two to three orders of magnitude larger than today’s systems (considering the number of Central Process Unit (CPU) cores). It is very challenging to find sustainable solutions for UCSs due to their scale and a wide range of possible applications and involved technologies. For example, we need to deal with heterogeneity and cross fertilization among HPC, large-scale distributed systems, and big data management. One of the challenges regarding sustainable UCSs is resilience. Another one, which attracted less interest in the literature but becomes more and more crucial with the expected convergence with the Cloud computing paradigm, is the notion of regulation in such system to assess the Quality of Service (QoS) and Service Level Agreement (SLA) proposed for the use of these platforms. This chapter covers both aspects through the reproduction of two articles: [1] and [2]. [less ▲]

Peer Reviewed
See detailA Full-Cost Model for Estimating the Energy Consumption of Computing Infrastructures
Orgerie, Anne-Cecile; Varrette, Sébastien UL

in Carretero, J.; Jeannot, E. (Eds.) Ultrascale Computing Systems (2018)

Since its advent in the middle of the 2000’s, the Cloud Computing (CC) paradigm is increasingly advertised as a price-effective solution to many IT problems. This seems reasonable if we exclude the pure ... [more ▼]

Since its advent in the middle of the 2000’s, the Cloud Computing (CC) paradigm is increasingly advertised as a price-effective solution to many IT problems. This seems reasonable if we exclude the pure performance point of view as many studies highlight a non-negligible overhead induced by the virtualization layer at the heart of every Cloud middleware when subjected to an High Performance Computing (HPC) workload. When this is the case, traditional HPC and Ultrascale computing systems are required, and then comes the question of the real cost-effectiveness, especially when comparing to instances offered by the Cloud providers. In this section, and inspired by the work proposed in [1], we propose a Total Cost of Ownership (TCO) analysis of an in-house academic HPC facility of medium-size (in particular the one operated at the University of Luxembourg since 2007, or within the Grid’5000 project [2]), and compare it with the investment that would have been required to run the same platform (and the same workload) over a competitive Cloud IaaS offer. [less ▲]

See detailPreventing and Resolving Conflicts of Jurisdiction in EU Criminal Law
Ligeti, Katalin UL; Robinson, Gavin UL; European Law Institute

Book published by Oxford University Press (2018)

Detailed reference viewed: 12 (2 UL)
Full Text
Peer Reviewed
See detailTUNA: TUning Naturalness-based Analysis
Jimenez, Matthieu UL; Cordy, Maxime UL; Le Traon, Yves UL et al

in 34th IEEE International Conference on Software Maintenance and Evolution, Madrid, Spain, 26-28 September 2018 (2018, September 26)

Natural language processing techniques, in particular n-gram models, have been applied successfully to facilitate a number of software engineering tasks. However, in our related ICSME ’18 paper, we have ... [more ▼]

Natural language processing techniques, in particular n-gram models, have been applied successfully to facilitate a number of software engineering tasks. However, in our related ICSME ’18 paper, we have shown that the conclusions of a study can drastically change with respect to how the code is tokenized and how the used n-gram model is parameterized. These choices are thus of utmost importance, and one must carefully make them. To show this and allow the community to benefit from our work, we have developed TUNA (TUning Naturalness-based Analysis), a Java software artifact to perform naturalness-based analyses of source code. To the best of our knowledge, TUNA is the first open- source, end-to-end toolchain to carry out source code analyses based on naturalness. [less ▲]

Detailed reference viewed: 21 (1 UL)
Full Text
Peer Reviewed
See detailVerlet buffer for broad phase interaction detection in Discrete Element Method
Mainassara Chekaraou, Abdoul Wahid UL; Rousset, Alban UL; Besseron, Xavier UL et al

Poster (2018, September 24)

The Extended Discrete Element Method (XDEM) is a novel and innovative numerical simulation technique that extends the dynamics of granular materials or particles as described through the classical ... [more ▼]

The Extended Discrete Element Method (XDEM) is a novel and innovative numerical simulation technique that extends the dynamics of granular materials or particles as described through the classical discrete element method (DEM) by additional properties such as the thermodynamic state, stress/strain for each particle. Such DEM simulations used by industries to set up their experimental processes are complexes and heavy in computation time. Therefore, simulations have to be precise, efficient and fast in order to be able to process hundreds of millions of particles. To tackle this issue, such DEM simulations are usually parallelized with MPI. One of the most expensive computation parts of a DEM simulation is the collision detection of particles. It is classically divided into two steps: the broad phase and the narrow phase. The broad phase uses simplified bounding volumes to perform an approximated but fast collision detection. It returns a list of particle pairs that could interact. The narrow phase is applied to the result of the broad phase and returns the exact list of colliding particles. The goal of this research is to apply a Verlet buffer method to (X)DEM simulations regardless of which broad phase algorithm is used. We rely on the fact that such DEM simulations are temporal coherent: the neighborhood only changes slightly from the last time-step to the current time-step. We use the Verlet buffer method to extend the list of pairs returned by the broad phase by stretching the particles bounding volume with an extension range. This allows re-using the result of the broad phase for several time-steps before an update is required once again and thereby its reduce the number of times the broad phase is executed. We have implemented a condition based on particles displacements to ensure the validity of the broad phase: a new one is executed to update the list of colliding particles only when necessary. This guarantees identical results because approximations introduced in the broad phase by our approach are corrected in the narrow phase which is executed at every time-steps anyway. We perform an extensive study to evaluate the influence of the Verlet extension range on the performance of the execution in terms of computation time and memory consumption. We consider different test-cases, partitioners (ORB, Zoltan, METIS, SCOTCH, ...), broad phase algorithms (Link cell, Sweep and prune, ...) and grid configurations (fine, coarse), sequential and parallel (up to 280 cores). While a larger Verlet buffer increases the cost of the broad phase and narrow phase, it also allows skipping a significant number of broad phase execution (> 99 \%). As a consequence, our first results show that this approach can speeds up the total .execution time up to a factor of 5 for sequential executions, and up to a factor of 3 parallel executions on 280 cores while maintaining a reasonable memory consumption. [less ▲]

Peer Reviewed
See detailKünstliche Intelligenz - die nächste Revolution (The Artificial Intelligence Revolution)
Glauner, Patrick UL

in Plugmann, Philipp (Ed.) Innovationsumgebungen gestalten (2018)

Es vergeht mittlerweile kein Tag, an welchem wir nicht von künstlicher Intelligenz (KI) (Artificial Intelligence (AI)) hören: autonom fahrende Autos, Spamfilter, Siri, Schachcomputer, Killerroboter und ... [more ▼]

Es vergeht mittlerweile kein Tag, an welchem wir nicht von künstlicher Intelligenz (KI) (Artificial Intelligence (AI)) hören: autonom fahrende Autos, Spamfilter, Siri, Schachcomputer, Killerroboter und vieles mehr. Was genau steckt jedoch hinter KI? In diesem Kapitel bieten wir einen Überblick zu KI und stellen moderne KI-Anwendungen vor. Anschließend stellen wir ein Innovationsökosystem vor, in dem wir momentan ein Forschungsprojekt zur Erkennung von Elektrizitätsdiebstahl in Entwicklungs- und Schwellenländern mit Hilfe von KI betreiben. [less ▲]

Detailed reference viewed: 22 (8 UL)
Full Text
Peer Reviewed
See detailOn the impact of tokenizer and parameters on N-gram based Code Analysis
Jimenez, Matthieu UL; Cordy, Maxime UL; Le Traon, Yves UL et al

Scientific Conference (2018, September)

Recent research shows that language models, such as n-gram models, are useful at a wide variety of software engineering tasks, e.g., code completion, bug identification, code summarisation, etc. However ... [more ▼]

Recent research shows that language models, such as n-gram models, are useful at a wide variety of software engineering tasks, e.g., code completion, bug identification, code summarisation, etc. However, such models require the appropriate set of numerous parameters. Moreover, the different ways one can read code essentially yield different models (based on the different sequences of tokens). In this paper, we focus on n- gram models and evaluate how the use of tokenizers, smoothing, unknown threshold and n values impact the predicting ability of these models. Thus, we compare the use of multiple tokenizers and sets of different parameters (smoothing, unknown threshold and n values) with the aim of identifying the most appropriate combinations. Our results show that the Modified Kneser-Ney smoothing technique performs best, while n values are depended on the choice of the tokenizer, with values 4 or 5 offering a good trade-off between entropy and computation time. Interestingly, we find that tokenizers treating the code as simple text are the most robust ones. Finally, we demonstrate that the differences between the tokenizers are of practical importance and have the potential of changing the conclusions of a given experiment. [less ▲]

Detailed reference viewed: 20 (0 UL)
Full Text
Peer Reviewed
See detailModel-driven Run-time Enforcement of Complex Role-based Access Control Policies
Ben Fadhel, Ameni UL; Bianculli, Domenico UL; Briand, Lionel UL

in Proceeding of the 2018 33rd ACM/IEEE International Conference on Automated Software Engineering (ASE ’18) (2018, September)

A Role-based Access Control (RBAC) mechanism prevents unauthorized users to perform an operation, according to authorization policies which are defined on the user’s role within an enterprise. Several ... [more ▼]

A Role-based Access Control (RBAC) mechanism prevents unauthorized users to perform an operation, according to authorization policies which are defined on the user’s role within an enterprise. Several models have been proposed to specify complex RBAC policies. However, existing approaches for policy enforcement do not fully support all the types of policies that can be expressed in these models, which hinders their adoption among practitioners. In this paper we propose a model-driven enforcement framework for complex policies captured by GemRBAC+CTX, a comprehensive RBAC model proposed in the literature. We reduce the problem of making an access decision to checking whether a system state (from an RBAC point of view), expressed as an instance of the GemRBAC+CTX model, satisfies the constraints corresponding to the RBAC policies to be enforced at run time. We provide enforcement algorithms for various types of access requests and events, and a prototype tool (MORRO) implementing them. We also show how to integrate MORRO into an industrial Web application. The evaluation results show the applicability of our approach on a industrial system and its scalability with respect to the various parameters characterizing an AC configuration. [less ▲]

Detailed reference viewed: 54 (10 UL)
Full Text
Peer Reviewed
See detailAn Imperialist Competitive Algorithm for a Real-World Flexible Job Shop Scheduling Problem
Tessaro Lunardi, Willian UL; Voos, Holger UL; Cherri, Luiz Henrique

in 23rd IEEE International Conference on Emerging Technologies and Factory Automation, Torino, Italy, September 4-7, 2018 (2018, September)

Traditional planning and scheduling techniques still hold important roles in modern smart scheduling systems. Realistic features present in modern manufacturing systems need to be incorporated into these ... [more ▼]

Traditional planning and scheduling techniques still hold important roles in modern smart scheduling systems. Realistic features present in modern manufacturing systems need to be incorporated into these techniques. The real-world problem addressed here is an extension of flexible job shop scheduling problem and is issued from the modern printing and boarding industry. The precedence between operations of each job is given by an arbitrary directed acyclic graph rather than a linear order. In this paper, we extend the traditional FJSP solutions representation to address the parallel operations. We propose an imperialist competitive algorithm for the problem. Several instances are used for the experiments and the results show that, for the considered instances, the proposed algorithm is faster and found better or equal solutions compared to the state-of-the-art algorithms. [less ▲]

Detailed reference viewed: 31 (5 UL)