In this paper we present an extended formalism of web services for developing a Remote Collaborative Manipulation system in Augmented Reality Environment. This system is an internet-based virtual 3D environment that p...
详细信息
ISBN:
(纸本)9781479982134
In this paper we present an extended formalism of web services for developing a Remote Collaborative Manipulation system in Augmented Reality Environment. This system is an internet-based virtual 3D environment that provides users a shared space and a collaborative platform for publishing, simulating and analyzing multidimensional data. In this paper, we have constructed our collaborative system using web services technology. The architecture and the system's working mechanisms based on the extended web services were elaborated. To demonstrate Remote Collaborative Manipulation system, we have examined a case study of automotive design.
The ever increasing popularity of cloud computing has relieved many consumers and businesses from the burden of acquiring, maintaining and monitoring expensive hardware and software infrastructure. In this paper, we f...
详细信息
ISBN:
(纸本)9781467381031
The ever increasing popularity of cloud computing has relieved many consumers and businesses from the burden of acquiring, maintaining and monitoring expensive hardware and software infrastructure. In this paper, we focus on Platform as a Service (PaaS) and Software as a Service (SaaS) clouds, where users submit their workflow applications in order to be executed within strict timing constraints. It is assumed that the target cloud platform is based on a multi-tenant approach, where applications of different users may share the same virtual machines. We propose a list scheduling heuristic for the scheduling of real-time workflow applications in a heterogeneous PaaS (or SaaS) cloud that incorporates imprecise computations and bin packing techniques. Our scheduling approach has two objectives: (a) to guarantee that all applications will meet their deadline, providing high quality results and (b) to minimize the execution time of each workflow application and thus the cost charged to the user. The proposed approach is compared to a baseline list scheduling algorithm via simulation, for workflow applications with various communication to computation ratios. The simulation results show that the proposed scheduling strategy outperforms the baseline policy, providing promising results.
In this study, we examined the relationships between the amount of effort identified in review processes and the total amount of effort in end of projects by using data accumulated by a company. We grouped the data by...
详细信息
ISBN:
(纸本)9781467396424
In this study, we examined the relationships between the amount of effort identified in review processes and the total amount of effort in end of projects by using data accumulated by a company. We grouped the data by the amount of effort in a review process, and a volume of target projects to find out the relationships. We analyzed the relationship using the Shapiro-Wilk test and Spearman's rank correlation coefficient. The results mean that a volume of the target project can create groups more efficiently to find out a relationship between the amount of effort in review processes and the total amount of effort. They indicate that the total amount of effort can probably be estimated by using the amount of effort in review processes which is grouped by a volume of target projects.
A distributed system consists of several autonomous nodes, where some of the nodes may be overloaded due to a large number of job arrivals while others nodes are idle without any processing. Load Balancing is used for...
详细信息
ISBN:
(纸本)9781479944453
A distributed system consists of several autonomous nodes, where some of the nodes may be overloaded due to a large number of job arrivals while others nodes are idle without any processing. Load Balancing is used for effectively distributing the load among the nodes. Centralized load balancing schemes are not scalable as the load balancing decision depends on a central server. In contrast fully distributed schemes are scalable but they do not produce a balanced load distribution as they use local information. In this paper we propose a clustered load balancing policy for a heterogeneous distributedcomputing system. Our algorithm estimates different system parameters like CPU Utilization, Memory Utilization, CPU Queue length, and Response time of the system to decide the workload of each node. The proposed strategy privileges local load balancing over global load balancing and thus reduces communication over global network. Simulation results show that the proposed algorithm performs well.
The proceedings contain 112 papers. The topics discussed include: spider-web topology: a novel topology for parallel and distributedcomputing;website design of EMS-SCADA for AC usage on a building;online learning and...
ISBN:
(纸本)9781479977529
The proceedings contain 112 papers. The topics discussed include: spider-web topology: a novel topology for parallel and distributedcomputing;website design of EMS-SCADA for AC usage on a building;online learning and socratic method in increasing self-motivation: a literature review;permutation codes via fragmentation of group orbits;feature extraction analysis on Indonesian speech recognition system;watermarking scheme for authenticity and integrity control of digital medical image using Reed-Muller codes and hash block chaining;differential evolution for the cryptanalysis of transposition cipher;comparative study of grammatical evolution and adaptive neuro-fuzzy inference system on rainfall forecasting in Bandung;an overview and implementation of extraction-transformation-loading (ETL) process in data warehouse;big data analytics on large-scale socio-technical software engineering archives;and analysis and implementation of graph indexing for graph database using GraphGrep algorithm.
With the continuous improvement of the level of China’s economy, scientific and technological information is stimulated accordingly. Of that, cloud computing is an internet-based supercomputers, a large number of app...
详细信息
In embedded internet of Things(IOT) environment, there are the troubles such as complex background, illumination changes, shadows and other factors for detecting moving object, so we put forward a new detection servic...
详细信息
In embedded internet of Things(IOT) environment, there are the troubles such as complex background, illumination changes, shadows and other factors for detecting moving object, so we put forward a new detection service method through mixing Gaussian Mixture Model(GMM), edge detection service method and continuous frame difference method in this paper. In time domain, the new method uses GMM to model and updates the background. In spatial domain, it uses the hybrid detection service method which mixes edge detection service method, continuous frame difference method and GMM to get initial contour of moving object, and gets ultimate moving object. This method not only can well adapt to the illumination gradients and background disturbance occurred on scene, but also can well solve some problems such as inaccurate target detection, incomplete edge detection, cavitation and ghost which usually appears in traditional method. As experimental result showing, this method holds better real-time and robustness. It is not only easily implemented, but also can accurately detect moving object.
Cloud computing has been targeted as the future on demand architecture of IT enterprise. Cloud computing can be used with trustworthy mechanism to provide greater data resources in comparison to the traditional limite...
详细信息
ISBN:
(纸本)9783319120126;9783319120119
Cloud computing has been targeted as the future on demand architecture of IT enterprise. Cloud computing can be used with trustworthy mechanism to provide greater data resources in comparison to the traditional limited resource computing. But the security challenges can stop the feasibility in the use of IT enterprises. In this paper, our aim is to provide a trustworthy solution for the cloud computing. Our proposed methodology provides secure centralized control and alert system. We are applying the same token with distributed verification with the centralized data scheme. Our approach achieves the integration of storage correctness insurance and data error localization, i.e., the identification of misbehaving clients and it can be control by the servers. It can support data updating, deletion and visualization on demand with the restrictive tokenization. Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even colluding attacks.
This article describes the numerical methods of mathematical modeling of traffic flows to meet the challenges of optimizing the traffic light phases at signal-controlled road intersections. The flow of vehicles on mul...
详细信息
This article describes the numerical methods of mathematical modeling of traffic flows to meet the challenges of optimizing the traffic light phases at signal-controlled road intersections. The flow of vehicles on multilane roads is described by Poisson process. The paper introduced, justified and calculated concept "effective number of lanes", characterized by a maximum flow of vehicles with different phases of traffic lights. (C) 2015 Published by Elsevier B.V.
With the increased connectivity of computer devices including mobile devices to the internet, the volume as well as the type of information that moved through organization network perimeter are also growing significan...
详细信息
ISBN:
(纸本)9781467386562
With the increased connectivity of computer devices including mobile devices to the internet, the volume as well as the type of information that moved through organization network perimeter are also growing significantly. Consequently, this has heightened information security threats to organizations that rely on the internet to do their businesses. On the other hand, Intrusion Detection System (IDS) being used today to detect these threats is limited by a single threaded application, limiting its capability to cope with the growing network traffic. This research introduced a parallel intrusion detection system based on GPGPU and Open computing Language (OpenCL), that processes incoming packets concurrently, thus increasing system capacity in a high throughput environment. The experiment result shows that performance of GPU-based design is improved on the average of 58.73x against a single-thread central processing unit (CPU) implementation, and on the average of 13.53x against a multi-thread implementation. At the same time, GPGPU-based system has a performance gain of 29.92 compared with CPU-based system implementation.
暂无评论