The problem of test based diagnostics of distributed control system specified by a configuration graph is analyzed. The model of diagnosed system is designed as a linear periodically non-stationary dynamic system acco...
详细信息
The paper observes the mathematical model synthesis of a drilling rig procedure after adding pulse unit heaters into it. Fundamentals for construction of the mathematical model are the Green function and the classical...
详细信息
In parallel with big data processing and analysis dominating the usage of distributed and cloud infrastructures, the demand for distributed metadata access and transfer has increased. In many application domains, the ...
详细信息
ISBN:
(纸本)9781728127088
In parallel with big data processing and analysis dominating the usage of distributed and cloud infrastructures, the demand for distributed metadata access and transfer has increased. In many application domains, the volume of data generated exceeds petabytes, while the corresponding metadata amounts to terabytes or even more. In this paper, we propose a novel solution for efficient and scalable metadata access for distributed applications across wide-area networks, dubbed SMURF. Our solution combines novel pipelining and concurrent transfer mechanisms with reliability, provides distributed continuum caching and prefetching strategies to sidestep fetching latency, and achieves scalable and high-performance metadata fetch/prefetch services in the cloud. We also study the phenomenon of semantic locality in real trace logs which is not well utilized in metadata access prediction. We implement our predictor based on this observation and compare it with three existing state-of-the-art prefetch schemes on Yahoo! Hadoop audit traces. By effectively caching and prefetching metadata based on the access patterns, our continuum caching and prefetching mechanism greatly improves local cache hit rate and reduces the average fetching latency. We replayed approximately 20 Million metadata access operations from real audit traces, in which our system achieved 80% accuracy during prefetch prediction and reduced the average fetch latency 50% compared to the state-of-the-art mechanisms.
The study addresses the management of lowering the aquifer39;s potentiometric surface of the Kislovodskoye mineral water field in order to save the reserves and quality of mineral water. Successful controlling requi...
详细信息
The ubiquitous internetworking of devices in all areas of life is boosted by various trends for instance the Internet of Things. Promising technologies that can be used for such future environments come from Wireless ...
详细信息
ISBN:
(纸本)9781538691519
The ubiquitous internetworking of devices in all areas of life is boosted by various trends for instance the Internet of Things. Promising technologies that can be used for such future environments come from Wireless sensor Networks. It ensures connectivity between distributed, tiny and simple sensor nodes as well as sensor nodes and base stations in order to monitor physical or environmental conditions such as vibrations, temperature or motion. Security plays an increasingly important role in the coming decades in which attacking strategies are becoming more and more sophisticated. Contemporary cryptographic mechanisms face a great threat from quantum computers in the near future and together with Intrusion Detection systems are hardly applicable on sensors due to strict resource constraints. Thus, in this work a future-proof lightweight and resource-aware security concept for sensor networks with a processing stage permeated filtering mechanism is proposed. A special focus in the concepts evaluation lies on the novel Magic Number filter to mitigate a special kind of Denial-of-Service attack performed on CC1350 LaunchPad ARM Cortex-M3 microcontroller boards.
Cloud computing is now a popular field for indulging infrastructure-as-a-service (IaaS). IaaS defers, on demand virtualized computing resources through datacenters. Cloud users acquire computing infrastructure for the...
详细信息
作者:
Ivanov, DonatSouthern Fed Univ
Acad Kalyaev Sci Res Inst Multiprocessor Comp Sys 2 Chekhov StGSP-284 Taganrog 347928 Russia
In this paper, we consider the integration of intelligent mobile robots by various designs in a coalition that together solve a common group goal, consisting of a set of individual tasks, each of which is available to...
详细信息
ISBN:
(纸本)9783030018214
In this paper, we consider the integration of intelligent mobile robots by various designs in a coalition that together solve a common group goal, consisting of a set of individual tasks, each of which is available to some single robots of the coalition. A general approach is proposed for control such coalitions of robots, solving the problem of information exchange, integrating information about the environment from onboardsensorsystems of robots from the group, planning the actions of the coalition robots. The problem of forming a mobile reconfigured distributed artificial neural network is considered. A generalized algorithm for deploying such a network is proposed. A modification of the "method of spheres" for planning the actions of the coalition robots solving the formation task is proposed. That modification is necessary for the deployment of a mobile re-configurable distributed artificial neural network in a decentralized control strategy and limited communications is proposed. The results of computer simulation of the solution of the formation task in a group of quadrotors for deployment of an artificial neural network are presented.
In mobile computing era, human activity recognition is an important research area for eldercare and healthcare center. Activity recognition performance decrease while partial data are lost due to various reasons, such...
详细信息
ISBN:
(纸本)9781728107882
In mobile computing era, human activity recognition is an important research area for eldercare and healthcare center. Activity recognition performance decrease while partial data are lost due to various reasons, such as power limitation, sensors data transmission capacity, hardware failures, and network issues (e.g., packet collision, unreliable link, and unexpected damage). Therefore, data loss or missing is a realistic challenge. In this research, we evaluate the performance of algorithms to perform their ability to handling missing data. It is required to investigate the optimal missing percentage in the dataset and its effect on accuracy. In this case, missing data are implemented randomly in the dataset with incremental scaling. We evaluate the performance using two benchmark datasets named HASC dataset and Single Chest-Mounted accelerometer dataset with data missing at random pattern. Here, we classified using support vector machine and random forest classifiers with eleven statistical features. Initially in the original dataset, there are no missing data in the dataset. However, to evaluate the performance, we added various levels of missing data randomly and studied the performances. Our study demonstrated that over 8% missing data in the dataset greatly reduce recognition results. Moreover, this recognition result has impact on sampling rate during data collection time.
As democracy is seen as the best form of government to date, we consider that a similar approach should be taken in the case of the society of machines that begins to take shape in the context of Industry 4.0. For thi...
详细信息
ISBN:
(纸本)9781728106991
As democracy is seen as the best form of government to date, we consider that a similar approach should be taken in the case of the society of machines that begins to take shape in the context of Industry 4.0. For this matter, we propose a real-time architecture that allows for collaborative interaction between machines in IoT applications. The proposed solution aims to find the middle ground between the performance of centralized systems and the fully decentralized nature of Blockchain systems, while ensuring high reliability and autonomous operation. While the data storage and communication channel is handled by the central authority, the interaction and decision making is governed exclusively by end nodes. The system is designed based on a modern, push-based architecture and allows for exchanging messages as well as keeping track of the real-time status of end nodes. In the context of urban water management, the applications range from decentralized sensor networks to mobile robots.
Ubiquitous computing and sensor networks persuading the technological bars so firmly that its success is elevating in exponential manner. Along with all the prons that this technology is providing to our society in da...
详细信息
暂无评论