Notice of Violation of ieee Publication Principles “Energy-efficient Approaches to Cloud computing” by N. Asha, G. Raghavendra Rao in the Proceedings of the internationalconference on Contemporary computing and Inf...
Notice of Violation of ieee Publication Principles “Energy-efficient Approaches to Cloud computing” by N. Asha, G. Raghavendra Rao in the Proceedings of the internationalconference on Contemporary computing and informatics (IC3I), November 2014, pp. 337-342 After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of ieee’s Publication Principles. This paper is a duplication of the original text from the paper cited below. The original text was copied without attribution (including appropriate references to the original author(s) and/or paper title) and without permission. Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following article: “A Survey on Techniques for Improving the Energy Efficiency of Large Scale Distributed Systems” by Anne-Cecile Orgerie, Marcos Dias de Assuncao and Laurent Lefevre in ACM computing Surveys,Volume 46, Issue 4, December 2014 Enterprises are looking forward to adopt cutting edge innovative technologies that could cut costs and maximize value. Cloud is getting into every Business, Industry and Enterprise applications ensuring economic and agility benefits. While Cloud seems to be disruptive, it's still a long way to go to completely materialize the Cloud. Cloud computing envisions that services, platforms and computing resources can be provided, on-demand, in a self-service fashion by a set of cooperating and/or competing providers to clients over the Internet. The emergence of cloud computing stems from the availability of numerous massive data centers, improvements in virtualization technologies and the availability and abundance of high speed networks. A large-scale computing infrastructure consumes enormous amounts of electrical power leading to operational costs not only exceed the cost of the infrastructure, also r
Self-efficacy is defined as a person's subjective confidence in their capability of executing an action and has been shown to be one of the most powerful motivators of human action predicting performance across a ...
详细信息
Self-efficacy is defined as a person's subjective confidence in their capability of executing an action and has been shown to be one of the most powerful motivators of human action predicting performance across a variety of domains. Self-efficacy has been associated with brain level neural processes and efficacy-like confidence mechanisms are incorporated into decision making in many cognitive informatics and cognitive computing models. Current computational implementations, however, do not directly model self-efficacy at either the theoretical or neural level. This paper reports on the computational modeling of self-efficacy based on principles derived from the Unified Learning Model (ULM) as instantiated in the multi-agent Computational ULM (C-ULM). Description of the modeling of self-efficacy within the C-ULM is provided. Results from simulations of self-efficacy evolution due to teaching and learning, task feedback, and knowledge decay are presented. The C-ULM simulation is unique in tying self-efficacy directly to the evolution of knowledge itself, consistent with recent neurological findings, and in dynamically updating self-efficacy at each step during learning and task attempts. Implications for research into human motivation and learning and for cognitive computing are discussed.
This paper presents an intelligent, stable, low cost farming control system to solve automatic farming issues. It promotes the development of intelligent farming by detecting animal feed and animal waste and applying ...
详细信息
ISBN:
(纸本)9781479960590
This paper presents an intelligent, stable, low cost farming control system to solve automatic farming issues. It promotes the development of intelligent farming by detecting animal feed and animal waste and applying different treatments in different conditions. RFID, Auto-transport units, temperature and humidity detectors are added to extend the system's functions.
This paper presents algorithms to detect animal feed and animal waste for farming management. For the animal feed detection, the algorithms use color and Canny's edge feature to detect animal feed and obtain the a...
详细信息
ISBN:
(纸本)9781479960590
This paper presents algorithms to detect animal feed and animal waste for farming management. For the animal feed detection, the algorithms use color and Canny's edge feature to detect animal feed and obtain the animal feed detection area by morphological processes. For the animal waste detection, the contaminated area is calculated by using median filter together with Hough's straight line transformation.
We present a novel fast method based on computer vision toidentify microbe. The proposed method is simple but absolutely effective. It combines approximate parallel light source and industrial camera, toautomatically ...
详细信息
We present a novel fast method based on computer vision toidentify microbe. The proposed method is simple but absolutely effective. It combines approximate parallel light source and industrial camera, toautomatically accomplish the bacteria identification and monitor the growing states of bacteria during the progress of a drug sensitive test. Based on this method, the color information and turbidity information, which reflect the primary information of drug sensitive tests, can be obtained fast, while processing efficiency can be as high as hundreds of milliseconds per frame. The performance of our method is significantly accurate and robust.
Home healthcare presents important advantages and benefits over traditional hospitalization, supported by the contemporary scientific and technological achievements. The ubiquitous computing paradigm is considered sui...
详细信息
Home healthcare presents important advantages and benefits over traditional hospitalization, supported by the contemporary scientific and technological achievements. The ubiquitous computing paradigm is considered suitable to support nursing at home provided that the distributed computing devices participate in the commonly interpreted context. Wirelessly and ad-hoc connected large numbers of disseminated sensors and computing devices in the home environment present problems related to energy limitations and the patients' mobility resulting in the introduction of systemic complexity, uncertainty, and ambiguity. In addition, describing such a system with analytical mathematics requires and includes extensive details becoming tedious if not impractical. Denotational mathematics provides an alternative formal methodological framework capable to describe the important components, the operation, and the behavior of such complicated systems. With the employment of denotational mathematics an attempt is made to design a system that develops medically valid contextual contents to support patients hospitalized at home. The developed design provides the contents of the medical context enriched by the rules of the current state of medical knowledge. The technically evolved context is compared against predetermined medical contexts to obtain valid interpretation. The presented design has the ambition to support efficiently the cooperation of the discrete software applications looking for the development of a commonly interpreted medical context at home.
Cross-layer models are becoming popular in various wireless networking domains due to their realistic predictions and for fundamental understanding of the interaction between adjacent networking layers. A combined PHY...
详细信息
Cross-layer models are becoming popular in various wireless networking domains due to their realistic predictions and for fundamental understanding of the interaction between adjacent networking layers. A combined PHY/MAC layer energy consumption model is considered here for short range ieee 802.15.4 networks for non-beacon-enable mode in case of dual hop transmission under Rayleigh fading channel. For both AF and DF relays this cross layer model is developed and a comparison of energy efficiency is done for this two type of relays. In particular, we focus on how the new model differs from single-layer models (either PHY or MAC) in terms of energy efficiency.
In this study, we proposed an approach for constructing directed, regulatory gene set networks to reveal novel relationships among gene sets. Results from this study showed that regulatory gene set networks can provid...
详细信息
In this study, we proposed an approach for constructing directed, regulatory gene set networks to reveal novel relationships among gene sets. Results from this study showed that regulatory gene set networks can provide complementary information to existing types of gene set networks and explain underlying mechanisms of a disease.
The aim of this work is to construct a predictive algorithm based on linguistic computation to predict Post Traumatic Stress Disorder (PTSD) and comorbid conditions. Most contemporary work in psychometrics, concerns i...
详细信息
The aim of this work is to construct a predictive algorithm based on linguistic computation to predict Post Traumatic Stress Disorder (PTSD) and comorbid conditions. Most contemporary work in psychometrics, concerns itself with the construction and validation of instruments in an attempt to measure personality, attitudes, sentiment and beliefs. Measurement of these phenomena is difficult and largely subjective. We try to assign a numerical estimation to feeling expression according to one quantity relative to another. The model analyses natural language using the Mind State Indicator algorithm (MSI). MSI may be able to diagnose PTSD and specify differential diagnosis from comorbid disorders. Future work using this method could potentially predict PTSD symptom severity and treatment-related changes in these symptoms.
暂无评论