Cloud computing is a model that resources such as storage, applications and networking infrastructures can be offered as services over the internet. Cloud applications are becoming ever larger and more complex with hi...
详细信息
Cloud computing is a model that resources such as storage, applications and networking infrastructures can be offered as services over the internet. Cloud applications are becoming ever larger and more complex with high availability requirement. This paper presents a modeling strategy based on a hierarchical and heterogeneous modeling for planning of cloud infrastructures. The modeling strategy allows the selection of cloud infrastructures according to dependability and cost requirements. A case study based on virtual learning environments hosted on Eucalyptus platform is adopted to demonstrate the feasibility of the proposed modeling strategy.
This paper puts forward a kind of intrusion detection algorithm based on wavelet cluster, this algorithm consists of quantify the eigenvector dimension, wavelet transform, clustering, build the lookup table, and detec...
详细信息
This paper puts forward a kind of intrusion detection algorithm based on wavelet cluster, this algorithm consists of quantify the eigenvector dimension, wavelet transform, clustering, build the lookup table, and detecting the intrusion behavior according tocertain proportion parameter. The experiment result proves that the results are not affected by noise and the method is not sensitive tothe order of input objects tobe processed, and a priori knowledge about the exact number of cluster is not required in wavelet cluster, this method can effectively enhance the detection rate and reduce the false alarm rate.
Nowadays Internet has become a major public opinion formation and diffusion platform. How toacquire the public hotspots and trends by collecting and analyzing the massive data on the Internetis an important research t...
详细信息
Nowadays Internet has become a major public opinion formation and diffusion platform. How toacquire the public hotspots and trends by collecting and analyzing the massive data on the Internetis an important research topic in public opinion analysis. In this paper, we firstly introduce the definition and framework of Internet public opinion mining, then focus on the comparison and analysis of key techniques used in different layers, and finally make a summary and outlook.
Multiset operation and data transmission are the key operations for privacy preserving data integration because they involve the interaction of participants. This paper proposes an approach which contains anonymous mu...
详细信息
Multiset operation and data transmission are the key operations for privacy preserving data integration because they involve the interaction of participants. This paper proposes an approach which contains anonymous multiset operation and distributed noise generation based on the existing researches and we apply itin data integration. Analysis shows that the improved approach provides security for data integration and has lower overhead than the existing researches.
Traditional mass production of cell phone manufacturers can not meet customer requirements and market competition needs. Mass customization becomes a main production mode. This paper introduce a mass customization mod...
详细信息
ISBN:
(纸本)9781479960590
Traditional mass production of cell phone manufacturers can not meet customer requirements and market competition needs. Mass customization becomes a main production mode. This paper introduce a mass customization mode for cell phone which has a lot of advantages such as reasonable cost, high quality, customized products, high efficiency, short product life cycle and so on. Under this model, this paper also uses an order schedule method to find an optimal solution of sorting orders, improving the production efficiency. The result has a larger improvement than processing orders one by one.
This paper proposes the concept of application software compatibility and highlights its importantimplication tohigh-reliable information application system. Aiming at the issues of typical of software compatibility, ...
详细信息
This paper proposes the concept of application software compatibility and highlights its importantimplication tohigh-reliable information application system. Aiming at the issues of typical of software compatibility, an analysis method of software compatibility is presented based on hardware virtualization. Compatibility of twotypical information security software is analyzed and the results are evaluated. The proposed analysis method can alsobe an illumination in other scenarios.
Service composition involves combining many existing services to solve a complex task in the service-oriented environment. Due to the progress in modern smart devices, mobile devices can now act as service providers. ...
详细信息
Service composition involves combining many existing services to solve a complex task in the service-oriented environment. Due to the progress in modern smart devices, mobile devices can now act as service providers. The mobility of mobile service providers and the dynamism of the mobile environment are unique features. As a result, there are two issues with service composition in mobile environments: (1) how to use the mobility of devices as an non-functional Quality of Service (QoS) criterion, and (2) how to deal with the dynamism of the mobile environment to realize the optimal service composition. In order to deal with above issues, we proposed a QoS-aware service composition model for service composition in mobile environments considering the feature of mobility in the mobile environment. Moreover, we proposed an adaptive approach called k-neighbor. The main idea of k-neighbor approach is to decompose the composite service into smaller elementary composite services then to set up a solution plan for those elementary composite services based on the available provider set. The evaluation shows that the way of decomposing a composite service adapts to different dynamism of the environment.
This paper introduces the concept of the Logistics Service Map, a modular service construction system with an inherent catalog function. Specialized service providers, so called logistics integrators are to use this c...
详细信息
This paper introduces the concept of the Logistics Service Map, a modular service construction system with an inherent catalog function. Specialized service providers, so called logistics integrators are to use this concept to integrate subsidiary service providers into logistics networks. The main purpose of the Service Map is to enable and to foster the development of atomic as well as composite logistics services used by the integrator to fulfill customers' requirements. After a brief presentation of the applied research methodology, the current progress of research is outlined and a draft of future research activities and discussion points is given.
Using the special wavelength and given power LED light as the detected object, through irradiating human face with a given distance, observing the effect of face heating-up and the blood flow raise, to obtain the best...
详细信息
ISBN:
(纸本)9781479960590
Using the special wavelength and given power LED light as the detected object, through irradiating human face with a given distance, observing the effect of face heating-up and the blood flow raise, to obtain the best irradiation time based on a comprehensive analysis. This will lay the foundation for the research and application in therapy products.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
暂无评论