Social activities have great impact for human beings in psychological health and social relationship. the recognition of social activities can unobtrusively recognize and record users' daily social activities, ena...
详细信息
ISBN:
(纸本)9781467345750;9781467345736
Social activities have great impact for human beings in psychological health and social relationship. the recognition of social activities can unobtrusively recognize and record users' daily social activities, enabling users to better manage their life. Existing work of social activity recognition focus on recognizing a limited set of social activities and are mainly based on the patterns of individual user such as location pattern, vocal pattern, or others. However, social activities inherently exhibit the patterns with respect to multiple users rather individual user. In this paper, we introduce the concept of social circle, to extract social patterns associated with multiple users in a generic set of social activities. A social circle refers to a set of users frequently gathering to conduct certain social activities. Based on social circle, we design a system called CircleSense that supports accurate recognition of a generic set of social activities. We validate the effectiveness of CircleSense through the real trace collected by 10 volunteers. the result shows that CircleSense outperforms existing methods in terms of accuracy of social activity recognition.
In most Service-Oriented frameworks service selection is based on provider-centric information despite well-known shortcomings (trustworthiness, incompleteness, subjectivity). We propose to allow consumers and third-p...
详细信息
On-demand resource provisioning is with great challenge in cloud systems. the key problem is how to learn about the future workload in advance to help determine resource allocation. there are various prediction models...
详细信息
In this paper, utilization of hybrid computational approach is evaluated for the joint estimation of amplitude and Direction of Arrival of far field sources impinging on a uniform linear array. In this hybrid approach...
详细信息
ISBN:
(纸本)9781467344265;9781467344258
In this paper, utilization of hybrid computational approach is evaluated for the joint estimation of amplitude and Direction of Arrival of far field sources impinging on a uniform linear array. In this hybrid approach, swarm intelligence based on Particle swarm optimization is exploited as a global optimizer assisted withpattern search technique as a rapid local search technique. the optimization of adaptive parameters depending upon the amplitudes and direction of arrival is performed using the fitness function based on Mean Square Error that defines an error between desired response and estimated response. the interest in this function is due to its ease in implementation, efficiency and simplicity of concept. It is derived from Maximum Likelihood and requires only single snapshot to converge. the proposed algorithm is robust enough to produce fairly good results even in the presence of low signal-to-Noise Ratio and requires relatively less number of antenna elements in the array. the results of hybrid technique are much better as compared to Particle Swarm Optimization and pattern search alone. A number of test cases are discussed on the basis of different number of sources impinging on the array with different number of sensors in the array. the accuracy and reliability of the proposed scheme is tested on the basis of Monte-Carlo simulations and its superior statistical analysis.
Fault tolerance in mobile cloud computing is highly important aspect, even more than a conventional cloud computing because of the mobile nature of devices i.e. mobility. Mobile cloud computing (MCC) combines cloud co...
详细信息
ISBN:
(纸本)9781467359979;9781467359993
Fault tolerance in mobile cloud computing is highly important aspect, even more than a conventional cloud computing because of the mobile nature of devices i.e. mobility. Mobile cloud computing (MCC) combines cloud computing and mobile devices to provide the benefits for mobile users, network operators and cloud providers also. Mobile devices have various problems like enter and leave the connection unpredictably, Limitation of battery power, frequent location changes, network signal loss, hardware failures and other common factors. Mobile devices appear and disappear in the network unpredictably. the proposed technique reduces the faults of mobile devices by using the past pattern of states and making the decision for predicting the future states of mobile devices. In this paper we have proposed a fault monitoring technique which is based on Hidden Markov Model (HMM) and Baum-Welch algorithm for analyzing and predicting the future resource state.
In real human crowds, diversification is caused by many factors such as gender, age, skin color, clothing, walking style, psychology etc., yet most crowd simulation systems rely only on appearance related variables fo...
详细信息
this paper proposes an architectural solution that allows organizations to rely on cloud-based services to securely operate their business processes. the solution is built upon a thick client and thin server architect...
详细信息
ISBN:
(纸本)9783642362859;9783642362842
this paper proposes an architectural solution that allows organizations to rely on cloud-based services to securely operate their business processes. the solution is built upon a thick client and thin server architectural pattern, where security constructs such as public-key and symmetric cryptographic systems are used to maintain confidentiality between the participants while keeping the server unaware of their participations and business process instances.
Efficacies of the charging strategy and electrified pattern dominate the functionality and lifespan of Lithium-ion (Li-ion) batteries intensely. In order to maximize the available performance of the Li-ion batteries, ...
详细信息
ISBN:
(纸本)9781467317924;9781467317900
Efficacies of the charging strategy and electrified pattern dominate the functionality and lifespan of Lithium-ion (Li-ion) batteries intensely. In order to maximize the available performance of the Li-ion batteries, in this paper, a searching strategy based on the particle swarm optimization (PSO) conducted with a fuzzy-deduced fitness evaluator (FDFE) is proposed to find the best multistage charging current pattern. the objective function is to maximize the cost benefit of the applied prospective charging pattern based on the nonlinear weightings' allocation of the charge time (CT) and normalized discharge capacity (NDC) in the objective function. Rules of the weighting allocation are derived from the fuzzy logic inference. the fitness value of each candidate particle (charging pattern) is figured out by the FDFE to guide the searching path of the PSO algorithm for finding the optimal solution out. Experimental findings show that the resulted pattern is capable of charging the batteries to over 90% available capacity within 50 minutes. Comparing withthe conventional constant current-constant voltage (CC-CV) method, the devised scheme has the performance enhancements of more than 80% charging time reduction, 21% more life cycles, and over 0.4% charging efficiency increase.
Undergraduate CS courses involve a range of design and development experiences which are often brought together in a comprehensive way as a capstone project in a student's senior year. the goal of a capstone exper...
详细信息
ISBN:
(纸本)9780769549675
Undergraduate CS courses involve a range of design and development experiences which are often brought together in a comprehensive way as a capstone project in a student's senior year. the goal of a capstone experience is to help students demonstrate that they can integrate various CS skills they have been taught in a practical way. the importance of being able to apply what a student has learned in a practical way as a student prepares to graduate and enter the workforce cannot be overstated. We have developed a Capstone Course project where students build a social networking application using ASP. NET MVC to integrate skills learned in Programming Principles, Software Engineering, Database Design and Web Design courses. And we believe this type of project can serve as a model that can be applied in many different schools and contexts. Because the MVC pattern is used, each part of the system is modular, withthe model, the view and the controller requiring different sets of skills. Students can apply their skills to implementing the entire framework themselves as it is presented to them, or they can redesign portions of the framework and integrate their redesign into the original architecture. Either way, students experience the integration of a wide variety of skills in a compelling way since they are doing so while building a social networking application that they can test on their friends.
the main focus of the CBM experiment (FAIR, Germany) is the measurement of very rare probes at interaction rates of up to 10 MHz. the experiment will operate with a data flow of up to 1 TB/s and requires full online e...
详细信息
the main focus of the CBM experiment (FAIR, Germany) is the measurement of very rare probes at interaction rates of up to 10 MHz. the experiment will operate with a data flow of up to 1 TB/s and requires full online event reconstruction and selection. this is a task of the First Level Event Selection (FLES). A standalone FLES package has been developed for the CBM experiment. It contains modules for all reconstruction stages: track finding, track fitting, short-lived particle finding and selection. Reconstruction of about 50 types of particle decay channels is currently implemented. the algorithms are local with respect to data and their implementation is both vectorized (SIMD) and parallelized between CPU cores. For the track reconstruction the Cellular Automaton (CA) and the Kalman filter (KF) algorithms are used, that allows to achieve a high track reconstruction efficiency of up to 97% and a track parameters quality with 1% momentum resolution. the KF particle finder has a high efficiency with an optimal signal to background ratio. the FLES package shows a strong scalability on many-core systems and a processing speed of 1700 events per second on an Intel based computer with 80 cores. the investigation was done based on simulated minimum bias Au-Au UrQMD collisions at 25 AGeV with a realistic detector response.
暂无评论