To be successful a cloud service provider has to target a preferably large customer group to leverage economies of scale. Therefore an application offered as a service in the cloud is often configurable regarding non-...
详细信息
To be successful a cloud service provider has to target a preferably large customer group to leverage economies of scale. Therefore an application offered as a service in the cloud is often configurable regarding non-functional qualities, such as location or availability. Since many of these qualities depend on the resources on which the service is hosted, a large number of computing environments has to be managed by the service provider. This paper analyses the challenges arising from such a scenario and identifies several optimization opportunities originating from an intelligent distribution of users among the functionally equal resources with different quality of services. A framework enabling the development of distribution strategies exploiting these opportunities is defined. It allows modeling of resources, their deployment dependencies, and users with specific demands. An architecture and prototype of a management system is introduced to handle the required resource provisioning and user request routing. Several optimization strategies are defined and their performance is evaluated using statistical data of an existing cloud service provider.
Recently, because of the competitive environment, Taiwan39;s high-technology industries have undergone enormous change in a series of enterprise mergers and acquisitions. The enterprise mergers and acquisitions led ...
详细信息
ISBN:
(纸本)9781424467082
Recently, because of the competitive environment, Taiwan's high-technology industries have undergone enormous change in a series of enterprise mergers and acquisitions. The enterprise mergers and acquisitions led us to study the e-business integration impact issues on continuous assurance. Our study found that the information technology integration strategies and assurance process integration methods had an impact on their continuous assurance performances and effectiveness. We used case study research methodology that including data collection, case attendant interview, data analysis and summary finding steps for creating new model applications of information technology integrations. The information technology integration assurance (ITIS) model steps include information technology infrastructure building, assurance process integrations, database immigration and analytic and alarm methods. Our findings close the literature theory gaps between IT integrations and continuous assurance; it will be applicable for information technology integration and continuous assurance about post-enterprise mergers and acquisitions.
This document presents the new model of distributed consumers of electricity powering - named Power Modes. There is presented a conceptual model of an IT hierarchical distributed system for dataacquisition and eviden...
详细信息
ISBN:
(纸本)9781424448814
This document presents the new model of distributed consumers of electricity powering - named Power Modes. There is presented a conceptual model of an IT hierarchical distributed system for dataacquisition and evidence the state of the controlled distributed object - the electric energy consumption. The authors will try to show that the proposed model of the IT system is accurate to solve the problem of the electric energy consumption management. In this context the proposed solutions are written into the DSM methods of power system balancing [1]. The competency of the paper is the presentation of the prototype system of intelligent metering which is developed and claimed for a patent protection [2, 3].
In classification systems like eCl@ss [1], UNSPSC [2], or Nato Code [3] the number of classes grows and the number of properties to describe the products of given classes grows. New ontologies following ISO 13584 [4, ...
详细信息
ISBN:
(纸本)9781424448814
In classification systems like eCl@ss [1], UNSPSC [2], or Nato Code [3] the number of classes grows and the number of properties to describe the products of given classes grows. New ontologies following ISO 13584 [4, 5] with better data models for the classification are prepared and will be installed within the next years to manage the classification of commodities and to support e-commerce. Opportunities of the new ontologies are discussed and problems we meet in the transition from the old data models to the new ontologies.
This article deals with the concept development methodological principles of conceptualization of the economic systems using ontological modelling. Proposed approach enables to build ontology of any economic system on...
详细信息
ISBN:
(纸本)9781424448814
This article deals with the concept development methodological principles of conceptualization of the economic systems using ontological modelling. Proposed approach enables to build ontology of any economic system on micro- and macro levels, to form the set of problem situations and set of ways of their overcoming which are the basis for designing the knowledge base of the intelligence system.
in the paper interdependence between the basic project resources and requirements to it execution quality is described. Graphic visualization of these resources of optimal values choice is shown. Also the experimental...
详细信息
ISBN:
(纸本)9781424448814
in the paper interdependence between the basic project resources and requirements to it execution quality is described. Graphic visualization of these resources of optimal values choice is shown. Also the experimental data for expenses minimizations at specified project duration are presented.
Many scenarios for indoor positioning require position estimation not only in two dimensions but in the third dimension as well. This paper presents the expansion of two two-dimensional WLAN fingerprinting localizatio...
详细信息
ISBN:
(纸本)9781424448814
Many scenarios for indoor positioning require position estimation not only in two dimensions but in the third dimension as well. This paper presents the expansion of two two-dimensional WLAN fingerprinting localization algorithms based on received signal strength indication (RSSI) to the third dimension. The third dimension is regarded discretely as the floor level. Both algorithms were evaluated in two different test beds. Evaluation results will be presented and discussed.
Fault diagnosis in digital hardware using AI techniques is good domain for basic and applied research. An intelligent frame work for fault detection and isolation in Philips 89v52 rd2 Microcontroller based system is d...
详细信息
ISBN:
(纸本)9781424448814
Fault diagnosis in digital hardware using AI techniques is good domain for basic and applied research. An intelligent frame work for fault detection and isolation in Philips 89v52 rd2 Microcontroller based system is discussed in this paper. The main feature includes intelligent diagnostic assessment and effective management of the testing process using Fuzzy approaches. Fuzzy modeling is used to derive nonlinear models for the diagnosis process for every fault. Fuzzy decision factors are derived to isolate faults. The unit under test (UUT) consist of 89c51-rd2 microcontroller, external memory and other peripherals like decoders, TTL gates etc. The framework consist of knowledge base, inference mechanism and graphical user interface. The knowledge base consist of three distinct parts such as, the experiential knowledge, fundamental knowledge and the symptoms. The knowledge base consist of a procedural description of the test, expressed in a hierarchical manner using visual prolog rules and declarative knowledge represented using frames. The system uses both deep and Shallow knowledge about troubleshooting process. The frame work performs inference in the similar manner in which an electronic engineer traces a logic circuit. The diagnosis determines the causes of the differences between a system's expected behavior and its observed behavior under same input vectors. The User interface is developed using visual programming aspects which graphically shows the diagnostic process carried out. The user interface permits the user to enter observed symptoms as and when required by the system.
In this paper, we looked around the application of the lens distortion correction and 3D posture correction algorithm which is preferentially to be performed for three dimensional information extraction and visibility...
详细信息
ISBN:
(纸本)9781424448814
In this paper, we looked around the application of the lens distortion correction and 3D posture correction algorithm which is preferentially to be performed for three dimensional information extraction and visibility of the object material using stereo camera. Regarding the part of lens distortion correction, distortion due to the spherical aberration of the lens was corrected by obtaining the pattern image of each camera and calculating k(1), k(2), p(1), p(2). It could be confirmed that more stereoscopic perception output of an image is possible through convergence control according to the distance of the object material.
The neural network based method of individual conversion characteristic identification of multisensor using reduced number of its calibration/testing results is proposed in this paper. The proposed method is based on ...
详细信息
ISBN:
(纸本)9781424448814
The neural network based method of individual conversion characteristic identification of multisensor using reduced number of its calibration/testing results is proposed in this paper. The proposed method is based on reconstruction of surface points of multisensor conversion characteristic by modular neural network. Each neural network module reconstructs separate point of the surface. The simulation results show high reconstruction accuracy of the first approximation phase of the method.
暂无评论