Cloud computing is a collection of distributed services, application, information and infrastructure. Cloud computing may be defined as the set of services that provide infrastructure resources using internet and data...
详细信息
ISBN:
(纸本)9781467394178
Cloud computing is a collection of distributed services, application, information and infrastructure. Cloud computing may be defined as the set of services that provide infrastructure resources using internet and data storage on a third server. It is one of the latest developments in IT industry. It provides its user scalability, reliability, high performance and low cost solution as compared to the other infrastructure. In this paper I am going to review algorithms of cloud computing security.
To solve the problem of automatically drawing landmark areas for nice vista points, in this paper, photos metadata of popular urban landmarks or natural landscapes are collected and extracted from Flickr and Google Ma...
详细信息
ISBN:
(纸本)9781509009848
To solve the problem of automatically drawing landmark areas for nice vista points, in this paper, photos metadata of popular urban landmarks or natural landscapes are collected and extracted from Flickr and Google Map. The Landmark Area Recognition System (LARS) is proposed to efficiently recognize astonishing regions of landmarks for exploring nice visiting and photographic POIs (Point of Interests) of these landmarks. Based on crowdsourcing photos and tags obtained from social networks, LARS implements LBSE (Location-Based Search Engine) for searching near objects efficiently. Next, DBCGM (Density-Based Clustering with Greedy Method) is proposed to cluster the landmark photos into regions. Based on crowdsourcing verifications on the photo-landmark relevance, the data set for experiments were collected for experimental evaluations. The result shows that DBCGM outperforms other density-based clustering methods. Finally, LARS employs the Concave Hull algorithm to draw the landmark area on Google Map as the demonstration of LARS applications.
The proceedings contain 36 papers. The special focus in this conference is on DataMod, GCM, HOFM, MELO, SEMS and VeryComp. The topics include: Separating topological noise from features using persistent entropy;an acc...
ISBN:
(纸本)9783319502298
The proceedings contain 36 papers. The special focus in this conference is on DataMod, GCM, HOFM, MELO, SEMS and VeryComp. The topics include: Separating topological noise from features using persistent entropy;an accelerated MapReduce-based K-prototypes for big data;refinement mining;using data to sift plausible models;towards platform independent database modelling in enterprise systems;a personal data model for musical preferences;a high-level model checking language with compile-time pruning of local variables;probabilistic modelling of station locations in bicycle-sharing systems;on the definition of parallel independence in the algebraic approaches to graph transformation;SPO-rewriting of constrained partial algebras;attributed graph transformation via rule schemata;church-Rosser theorem;visual notation and patterns for abstract state machines;Spatio-temporal models for formal analysis and property-based testing;model-based generation of natural language specifications;formal model-based development in industrial automation with reactive blocks;towards model-based optimisation;using domain knowledge explicitly;context-aware design of reflective middleware in the internet of everything and pure edge computing platform for the future internet.
Human39;s computation power can be harnessed using the so-called Cyber-Physical-Social System (CPSS), which contains a mix of human-based and machine-based compute units. The inherent problem of human-based computat...
详细信息
ISBN:
(纸本)9781509056712
Human's computation power can be harnessed using the so-called Cyber-Physical-Social System (CPSS), which contains a mix of human-based and machine-based compute units. The inherent problem of human-based computation is its exposure to inevitable human errors;hence, it is not trivial to obtain a reliable CPSS. In contrast, many works for obtaining reliable machine-based system have been carried out for decades. In this paper, we employ the concept of reliability in CPSSs, and exemplify the concept in the context of data analytic scenarios. We present typical coordination patterns of such CPSSs, and study the reliability of different patterns using our existing reliability analysis framework. We experiment with several different coordination patterns of machine-based and human-based compute units in data analytic scenarios and study how certain patterns may potentially increase the reliability of the CPSS.
During big data transmission, information loss occurs due to distinct single or multiple bits discrete or continuous transportation errors. The other causes are extra overhead and delays, triggered by diverse highly c...
详细信息
Horizontally scalable applications can potentially run very efficiently over IaaS environments. For that, application providers need to appropriately plan the resource capacity that is to be acquired from the cloud pr...
详细信息
There is a continuing problem of automobile theft which is a greater challenge that needs to be solved. Traditional security system needs many sensors and it is costlier. Modern security system needs to be implemented...
详细信息
ISBN:
(纸本)9788132227571;9788132227564
There is a continuing problem of automobile theft which is a greater challenge that needs to be solved. Traditional security system needs many sensors and it is costlier. Modern security system needs to be implemented which uses biometric verification technology in the vehicles. In the proposed method the GSM controlled by the Renesas Microcontroller is used to find the location of the vehicle. The vehicle ignition will on only when the person accessing the vehicle authorises with the three phase security system. An SMS alert is sent to the authorised person if an unauthorised person accesses the vehicle who fails in the three phase security system. In this paper, Haar features are used to detect the face and Adaboost classifier is used to combine all weak classifiers into strong classifiers for deciding whether the captured image from the video is face or not. Principal Component Analysis method is used to recognize the detected face in the video. The proposed system provides an inexpensive security system for the automobiles using Face Detection and Recognition technology. This is an efficient method to authenticate the person in the vehicle security system.
In a crowded city, directions and speed of vehicles are usually changed arbitrarily. Analyzing travel preferences of vehicle has become a focus of research as it helps to classify region of interest in city and can be...
详细信息
ISBN:
(纸本)9783319459394;9783319459400
In a crowded city, directions and speed of vehicles are usually changed arbitrarily. Analyzing travel preferences of vehicle has become a focus of research as it helps to classify region of interest in city and can be used in personalized recommendation and many other areas of application. In this paper, a travel identification method based on vehicle speed and Accessory (ACC) State is proposed. Continuously classifying and merging the trajectory points in GPS data stream, the travel activities of vehicle is extracted. It can provide a basis of data for the research on hot spots and support the research and application of vehicle trajectory data mining in areas of intelligent transportation and logistics.
Cloud computing offers distributed, virtualized, and elastic resources as utilities to end users, which has the potential to support full realization of "computing as a utility" in the near future. Cloud com...
详细信息
ISBN:
(纸本)9781315657912;9781138028777
Cloud computing offers distributed, virtualized, and elastic resources as utilities to end users, which has the potential to support full realization of "computing as a utility" in the near future. Cloud computing uses Virtual Machine (VM) instead of physical machine to host, store, and interconnect the different components. Load balancing is being used to assign massive amount of requests to different VMs in such a way that none of the nodes can get loaded heavily or lightly. Thus, it can be considered as an optimization problem. In this paper, a load balancing strategy based on Tabu Search has been proposed which balances the load of the cloud infrastructure. The proposed algorithm is tested and evaluated on universal datasets using an existing simulator known as CloudAnalyst. The overall performance of the proposed algorithm is compared with the existing approaches like First Come First Serve (FCFS), Round Robing (RR), and a local search algorithm i.e. Stochastic Hill Climbing (SHC).
Cloud computing has emerged as one of the most promising and challenging technologies at present. Cloud Service Broker (CSB) creates a governed and secure cloud management platform to simplify the delivery of complex ...
详细信息
ISBN:
(纸本)9781315657912;9781138028777
Cloud computing has emerged as one of the most promising and challenging technologies at present. Cloud Service Broker (CSB) creates a governed and secure cloud management platform to simplify the delivery of complex cloud services to cloud service customers. They enable customers to realize the full potential that cloud provider has to offer. CSB leads to creation of a system of highly distributed, task-oriented, modular, and collaborative cloud services managed by a broker. In order to effectively manage the complexity inherent in such systems, enterprises are anticipated to crucially depend upon CSB mechanisms. Here in this paper, an improved approach is proposed that serves secure brokerage in multi-cloud environment.
暂无评论