The stockyard management problem in a cargo assembly terminal mainly focuses on finding an efficient allocation of limited resources such as stockyard space, stacking and reclaiming machines to stockpiles such that th...
详细信息
ISBN:
(纸本)9783319459394;9783319459400
The stockyard management problem in a cargo assembly terminal mainly focuses on finding an efficient allocation of limited resources such as stockyard space, stacking and reclaiming machines to stockpiles such that the waiting time of a vessel fleet at port can be minimized. This highly complex problem involves scheduling with resource constraints in a dynamic environment and is a typical NP-hard problem in general. In this study, we present a constraint programming (CP) based approach to address the problem with utilizing the strength of CP in its flexibility in formulating various complex and nonlinear constraints for industrial applications. In addition, we explore the ability of the CP solver with trying different combinations of constraint propagation and constructive search strategies and report our best findings from an extensive computational study.
The devices are becoming ubiquitous and interconnected due to rapid advancements in computing and communication technology. The internet of Vehicles (IoV) is one such example which consists of vehicles that converse w...
详细信息
ISBN:
(纸本)9783319519692;9783319519685
The devices are becoming ubiquitous and interconnected due to rapid advancements in computing and communication technology. The internet of Vehicles (IoV) is one such example which consists of vehicles that converse with each other as well as with the public networks through V2V (vehicle-to-vehicle), V2P (vehicle-to-pedestrian) and V2I (vehicle-to-infrastructure) communications. The social relationships amongst vehicles create a social network where the participants are intelligent objects rather than the human beings and this leads to emergence of Social internet of Vehicles (SIoV). The big data generated from these networks of devices are needed to be processed intelligently for making these systems smart. The security and privacy issues such as authentication and recognition attacks, accessibility attacks, privacy attacks, routing attacks, data genuineness attacks etc. are to be addressed to make these cyber physical network systems very reliable. This paper presents a comprehensive survey on SIoV and proposes a novel social recommendation model that could establish links between social networking and SIoV for reliable exchange of information and intelligently analyze the information to draw authentic conclusions for making right assessment. The future Intelligent IoV system which should be capable to learn and explore the cyber physical system could be designed.
Today authentication has become a major challenge in mobile cloud computing. Using a static password for authentication in cloud provider presents several security drawbacks: passwords can be forgotten, guessed, writt...
详细信息
Due to the fast growth of the internet of Things (IoT), many concepts of distributed systems need to be adapted to this new paradigm. Due to the large size of these networks, it is important that such systems present ...
详细信息
ISBN:
(纸本)9783319324678;9783319324661
Due to the fast growth of the internet of Things (IoT), many concepts of distributed systems need to be adapted to this new paradigm. Due to the large size of these networks, it is important that such systems present autonomic characteristics. In this context, this paper performs the implementation of an autonomic system emphasizing the self-configuration of devices, aided by cloud computing through a Web-API that was developed for this purpose. The initial results were obtained from tests performed on the Z1 device with the help of the ContikiOS, running inside the Cooja simulator. The results revealed that there is an overflow of the code developed for the tested devices, but after deep analysis, and more development, we can get a good level of energy consumption and it is possible to reach the self-configuration of devices on the IoT environment.
All-optical networks (AON) based on optical burst switching (OBS) are rapidly becoming the ultimate backbone network solution for next (future) generation networks because of their potential ultra high bandwidth capac...
详细信息
ISBN:
(纸本)9781509025763
All-optical networks (AON) based on optical burst switching (OBS) are rapidly becoming the ultimate backbone network solution for next (future) generation networks because of their potential ultra high bandwidth capacities both at transmission and switching levels. The OBS switching paradigm was conceptualized and ultimately designed using the good features of both optical circuit switching (OCS) and optical packet switching (OPS) and thus provides improvements over wavelength routing in terms of bandwidth efficiency, at the same time eliminating the need for huge buffers at the network edges as well as optical -to-electronic conversions and vice-versa of the data bursts at the core (switching) nodes. With such networks end to end light channels will transmit users data, transparently i.e. without being aware of its bit rate, modulation format as well as network protocol thus enhancing capacity, flexibility and scalability of the network. A buffer less / limited buffered lead OBS network would mean high contention and blocking, hence to guarantee and end-to-end consistent QoS in would require that the resources are properly managed. Effective management of both control and data planes is a key issue in this regard. Thus in this paper, we propose and analyse a partial distributed resource management scheme for OBS networks. We describe the concept, followed by routing and wavelength selection procedures.
Significance of cloud computing is getting popular in industrial and scientific communities for its numerous advantages and it is not free from its drawbacks. However, it has been observed that major issues such as se...
详细信息
There are various types of GPS vehicle terminal protocols and the data transmission is with high concurrency. Since it39;s of great significance to supervise logistics vehicle for centralized information management,...
详细信息
ISBN:
(纸本)9783319459394;9783319459400
There are various types of GPS vehicle terminal protocols and the data transmission is with high concurrency. Since it's of great significance to supervise logistics vehicle for centralized information management, it's imperative to develop a distributed logistics vehicle monitoring system with high load, which is compatible with multi-type terminal protocols. First, this paper formulates a unified communication protocol for the unitive data transmission. Next, a segmentation database is designed to deal with high load. And then three distributed architectures are designed. Through experiments, an optimal one has been selected and implemented by comparing the three architectures.
The tiger is bearing as the Power of the Gain and displays India39;s wildlife wealth. The Bengal Tiger was declared as the enclosing-embracing zoological of India in April 1973, adjacent to the beginning of Movement...
详细信息
ISBN:
(纸本)9789380544199
The tiger is bearing as the Power of the Gain and displays India's wildlife wealth. The Bengal Tiger was declared as the enclosing-embracing zoological of India in April 1973, adjacent to the beginning of Movement Tiger, to defend the tigers in India. The protection of wildlife and forests is a major responsibility of human being. The guidance of wildlife and forests is a prime culpability of sensual being. Material's power narrative to leave alone run after of all about movements by each tiger. They used radio collars on tiger shoulder and micro chips which is in tiger body to trace the tiger. These both are quite tough jobs. Another method is to track tiger is through their pugmarks. Additional approximate is to run after tiger is look over their pugmarks. Consent to Forest next of kin underpinning stamp the tiger by identifies their pugmarks. But all this distinction is culminate manually which is war cry nearly to that level of correctness. This paper is presenting method for identifying tiger through their pugmarks using image processing techniques. The pugmarks for many different tigers will be collected from the forest. The identification is based on matching of parameters stored in database.
The ubiquity of sensor infrastructures in urban environments poses new challenges in managing the vast amount of data being generated and even more importantly, deriving insights that are relevant and actionable to it...
详细信息
Unlike centralized databases, watermarking of distributed databases faces serious challenges for various reasons, e.g. (i) Distribution of data (ii) Existence of replication (iii) Preservation of watermarks while part...
详细信息
ISBN:
(数字)9783319480572
ISBN:
(纸本)9783319480572;9783319480565
Unlike centralized databases, watermarking of distributed databases faces serious challenges for various reasons, e.g. (i) Distribution of data (ii) Existence of replication (iii) Preservation of watermarks while partitioning and distributing databases, etc. In this paper, we propose a novel watermarking technique for distributed relational databases considering a generic scenario that supports database outsourcing and hybrid partitioning. Our approach addresses the above challenges in an effective way by maintaining meta-data and by making the detection phase partition independent. To the best of our knowledge, this is the first proposal on watermarking of distributed relational databases that supports database outsourcing and its partitioning and distribution in a distributed setting.
暂无评论