作者:
Garrett, M. A.ASTRON
Netherlands Inst Radio Astron NL-7990 AA Dwingeloo Netherlands
The days of the lone astronomer with his optical telescope and photographic plates are long gone: Astronomy in 2025 will not only be multi-wavelength, but multi-messenger, and dominated by huge data sets and matching ...
详细信息
The days of the lone astronomer with his optical telescope and photographic plates are long gone: Astronomy in 2025 will not only be multi-wavelength, but multi-messenger, and dominated by huge data sets and matching data rates. Catalogues listing detailed properties of billions of objects will in themselves require a new industrial-scale approach to scientific discovery, requiring the latest techniques of advanced data analytics and an early engagement with the first generation of cognitive computing systems. Astronomers have the opportunity to be early adopters of these new technologies and methodologies - the impact can be profound and highly beneficial to effecting rapid progress in the field. Areas such as SETI research might favourably benefit from cognitive intelligence that does not rely on human bias and preconceptions.
Drug repositioning is one of emerging approaches dedicated to find alternative usages of existing drugs efficiently and economically, especially with the advance in computational technology. The current progress made ...
详细信息
Charging of large-scale electric vehicles will have a significant impact on the grid so that their charging schedule needs to be optimized. The traditional centralized scheduling method requires high performance in in...
详细信息
ISBN:
(纸本)9781479920327
Charging of large-scale electric vehicles will have a significant impact on the grid so that their charging schedule needs to be optimized. The traditional centralized scheduling method requires high performance in information exchange and computing. Based on the analysis of the features of electric vehicle charging load and the research of cloud computing, we propose a cloud computing based schedule platform for optimal charging of electric vehicles. In addition, the function and implementation of the three basic modules of the platform (the data collection module, the cloud computing center and the control center) are exposed. The platform performs well in optimal scheduling for electric vehicles. In addition, the platform can also make full use of the computing resource and reduce the communication congestion.
The proceedings contain 87 papers. The topics discussed include: an LMI approach for observer design for Takagi-Sugeno descriptor models;fault-tolerant predictive control for Markov linear systems;synthesis of train t...
ISBN:
(纸本)9781479937318
The proceedings contain 87 papers. The topics discussed include: an LMI approach for observer design for Takagi-Sugeno descriptor models;fault-tolerant predictive control for Markov linear systems;synthesis of train traffic control system with evolutionary computing;optimistic planning with long sequences of identical actions for near-optimal nonlinear control;internal model control for a hydraulically driven robotic arm;linear quadratic optimal control of an inverted pendulum using the artificial bee colony algorithm;digitization of continuous interval transfer functions: a revisited method and its application on a case study;and fuzzy-based gain scheduling of exact feedforward linearization control and sliding mode control for magnetic ball levitation system: a comparative study.
Data center networks are becoming increasingly important for computing industry. By exploiting millimeter wavelength wireless technology (e.g., 60GHz), data centers are going to be more convenient for the interconnect...
详细信息
Internet of Things (IoT), is an interconnection of heterogeneous devices in terms of computational, communication, energy efficient competences over public insecure communication channel called Internet. Through advan...
详细信息
ISBN:
(纸本)9781479966295
Internet of Things (IoT), is an interconnection of heterogeneous devices in terms of computational, communication, energy efficient competences over public insecure communication channel called Internet. Through advancement in mobile and communication technologies, users can connect to remote servers ubiquitously through a 'thing' or device which is a part of IoT. Insecure nature of Internet and resource constrained nature of devices or things which are part of IoT demands for remote user authentication protocols which are extremely secure, light weight and energy efficient. In this context, C. G MA et al proposed a new dynamic ID based authentication scheme. In this manuscript we will illustrate that C. G MA et al. scheme cannot preserve user anonymity under their hypothesis and susceptible to stolen verifier attack. In addition, we will confirm that their scheme is heavy weight and needs more energy. We then present our improved scheme which is a generalized one, which is secure, light weight and energy efficient, while protecting the merits of different dynamic identity based authentication schemes.
Cloud computing became a popular computing technology, that provides efficient resource utilization to deliver IT services. Each user requests cloud computing system for use of resources. If the system is busy, then u...
详细信息
This paper presents dispel4py, a new Python framework for describing abstract stream-based workflows for distributed data-intensive applications. The main aim of dispel4py is to enable scientists to focus on their com...
详细信息
An approach is suggested for automating fish identification and measurement using stereo Baited Remote Underwater Video footage. Simple methods for identifying fish are not sufficient for measurement, since the snout ...
详细信息
First responders and others operating in crisis environments increasingly make use of handheld devices to help with tasks such as face recognition, language translation, decision-making and mission planning. These res...
详细信息
ISBN:
(纸本)9781450327688
First responders and others operating in crisis environments increasingly make use of handheld devices to help with tasks such as face recognition, language translation, decision-making and mission planning. These resource-constrained edge environments are characterized by dynamic context, limited computing resources, high levels of stress, and intermittent network connectivity. Cyber-foraging is the leverage of external resourcerich surrogates to augment the capabilities of resource-limited devices. In cloudlet-based cyber-foraging, resource-intensive computation is offloaded to cloudlets -discoverable, generic servers located in single-hop proximity of mobile devices. This paper presents several strategies for cloudlet-based cyber-foraging and encourages research in this area to consider a tradeoff space beyond energy, performance and fidelity of results.
暂无评论