the report presents an algorithmic approach to simulate electromagnetic fields in complex environments such as high density cities or areas with irregular topography. Many small reflecting and refracting objects, anis...
详细信息
the report presents an algorithmic approach to simulate electromagnetic fields in complex environments such as high density cities or areas with irregular topography. Many small reflecting and refracting objects, anisotropic media of wave propagation may produce complex maps of coverage by electromagnetic signals. Large amounts of these objects may result in large amounts of computations needed to perform an accurate simulation. A common approach of averaging those irregularities into virtual macro objects may not always be applicable when a detailed coverage map is needed, e.g. to study effects of an electromagnetic transmitter to other transmissions or to health of population in urbanized areas. A parallel simulation algorithm was developed to mitigate those issues. Assessment of the efficiency of the algorithm and its implementation also presented in the article shows high occupancy of parallelcomputing units and almost linear speedup of such simulation with an increase of the total processors involved.
Pervasive sensing technologies are promising for increasing one-person households (OPH), where the sensors monitor and assist the resident to maintain healthy life rhythm. Towards the practical use, the recognition of...
详细信息
ISBN:
(纸本)9781509055043
Pervasive sensing technologies are promising for increasing one-person households (OPH), where the sensors monitor and assist the resident to maintain healthy life rhythm. Towards the practical use, the recognition of activities of daily living (ADL) is an important step. Many studies of the ADL recognition have been conducted so far, for real-life and human-centric applications such as eldercare and healthcare. However, most existing methods have limitations in deployment cost, privacy exposure, and inconvenience for residents. To cope withthe limitations, this paper presents a new indoor ADL recognition system especially for OPH. To minimize the deployment cost as well as the intrusions to user and house, we exploit an IoT-based environment-sensing device, called Autonomous Sensor Box (SensorBox) which can autonomously measure 7 kinds of environment attributes. We apply machine-learning techniques to the collected data, and predicts 7 kinds of ADLs. We conduct an experiment within an actual apartment of a single user. the result shows that the proposed system achieves the average accuracy of ADL recognition with more than 88%, by carefully developing the features of environment attributes.
In the last decade blockchain technology become mainstream research topic because of its decentralized, peer to peer transaction, distributed consensus, and anonymity properties. the blockchain technology overshadows ...
详细信息
In the last decade blockchain technology become mainstream research topic because of its decentralized, peer to peer transaction, distributed consensus, and anonymity properties. the blockchain technology overshadows regulatory problem and technical challenges. A smart contract is a set of programs which are self-verifying, self-executing and tamper resistant. Smart contract withthe integration of blockchain technology capable of doing a task in real time with low cost and provide a greater degree of security. this paper firstly, explains the various components and working principle of smart contract. Secondly, identify and analyse the various use cases of smart contract along withthe advantage of using smart contract in blockchain application. Lastly, the paper concludes with challenges lie in implementing smart contract the future real-life scenario.
the proceedings contain 84 papers. the topics discussed include: a CKAN plugin for data harvesting to the Hadoop distributed file system;a computation- and network-aware energy optimization model for virtual machines ...
ISBN:
(纸本)9789897582431
the proceedings contain 84 papers. the topics discussed include: a CKAN plugin for data harvesting to the Hadoop distributed file system;a computation- and network-aware energy optimization model for virtual machines allocation;cost optimization on public cloud provider for big geospatial data;reconfigurable and adaptive spark applications;managing and unifying heterogeneous resources in cloud environments;an ontological template for context expressions in attribute-based access control policies;highly reconfigurable computing platform for high performance computing infrastructure as a service: Hi-IaaS;combining TOSCA and BPMN to enable automated cloud service provisioning;anything to topology - a method and system architecture to topologize technology-specific application deployment artifacts;ROP defense in the cloud through live text page-level re-ordering - the LITPR system;a framework for certification of large-scale component-based parallelcomputing systems in a cloud computing platform for HPC services;recovery-oriented resource management in hybrid cloud environments;component-wise application migration in bidimensional cross-cloud environments;uncertainty-aware optimization of resource provisioning, a cloud end-user perspective;DISCO: a dynamic self-configuring discovery service for semantic web services;and Internet of things out of the box: using TOSCA for automating the deployment of IoT environments.
We developed a sensor node to support inter-node distances of up to 1 km, low-power consumption and low cost hardware. the design is modular and application specific sensors can be attached. It provides a flexible sol...
详细信息
ISBN:
(数字)9783319675978
ISBN:
(纸本)9783319675978;9783319675961
We developed a sensor node to support inter-node distances of up to 1 km, low-power consumption and low cost hardware. the design is modular and application specific sensors can be attached. It provides a flexible solution to a wide range of applications. An optimized MAC and routing layer (based on RPL and Trickle) supports interoperability among heterogeneous networks and low energy consumption over long distance transmissions of up to 1 km.
Cloud computing based Software as a Service (SaaS) combines multiple Web Services to satisfy a SaaS request. SaaS is based on Service-Oriented Architecture and Web Service technology which are popular paradigm to desi...
详细信息
ISBN:
(纸本)9781538617595
Cloud computing based Software as a Service (SaaS) combines multiple Web Services to satisfy a SaaS request. SaaS is based on Service-Oriented Architecture and Web Service technology which are popular paradigm to design new generation of applications. One of the advantages of Web Services technology is to building distributed application on demand using existing service oriented application. Web Services Composition (WSC) in Cloud computing is necessary when a single service is unable to satisfy all the customers requirements. WSC is a complex task in the SaaS which involves several steps like discovery, compatibility checking, selection and deployment. To reduce the complexity of WSC, we model Web Services and their composition using Boolean satisfiability problem so that a specific property of their structures is looked into behavioral compatibility. the aim of this work is the modelling and verification of Web Services Composition using a formal method based on Satisfiability (SAT). However, in some cases it may be preferable to use variations of the general SAT problem. Specifically, using the Minimally Unsatisfiable Subformula (MUS), we formally define a Web Services Composition and its validation. When we have a multiple Web Services Compositions that meet the users needs, a QoS of the resulting WSC is maximized or, in some cases, minimized.
the Cloud computing (CC) paradigm introduces a highly efficient environment based on the aggregation of novel technologies. the cloud-based services are characterized by enhanced behavior and unique features due to th...
详细信息
ISBN:
(纸本)9781538637319
the Cloud computing (CC) paradigm introduces a highly efficient environment based on the aggregation of novel technologies. the cloud-based services are characterized by enhanced behavior and unique features due to the capabilities facilitated by the particularities of the CC environment such as the scalability. However, because of these particularities, new threats and vectors of attacks emerge. this surface of cloud attacks, is distributed and covered in nature, which can be utilized to stage fraudulent activities. the cyber-incidents that entail fraudulent activities lead to negative effects such as the nefarious usage of CC resources and the abuse of the cloud-based services. To this end, the information security challenges, which are associated to fraud, lead to restrictions and barriers concerning the operational as well as the financial activities performed by the Cloud Service Provider (CSP). To counterbalance these security challenges, a Cloud Information Security (InfoSec) Framework should be incorporated in the operation of the CSPs' infrastructure. the proposed framework imposes the implementation of a series of phases oriented towards the entanglement with fraud threats so as to mitigate them and therefore secure the provision of the end-services, as well as protect the collected data.
Actually, huge amounts of data are generated at distributed heterogeneous sources, to create and to share information on several domains. thus, data scientists need to develop appropriate and efficient management stra...
详细信息
End-user systems are increasingly impacted by the exponential growth of data volumes and their processing. Moreover, post-processing operations, essentially dedicated to ergonomic features, require more and more resou...
详细信息
ISBN:
(数字)9783319629117
ISBN:
(纸本)9783319629117;9783319629100
End-user systems are increasingly impacted by the exponential growth of data volumes and their processing. Moreover, post-processing operations, essentially dedicated to ergonomic features, require more and more resources. Improving overall performances of embedded relational database management systems (RDBMS) can contribute to deliver better responsiveness of end-user systems while increasing the energy efficiency. In this paper, it is proposed to upgrade SQLite, the most-spreaded embedded RDBMS, with a hybrid CPU/GPU processing engine combined with appropriate data management. Withthe proposed solution, named CuDB, massively parallel processing is combined with strategic data placement, closer to computing units. Experimental results revealed, in all cases, better performances and power efficiency compared to SQLite with an in-memory database.
this paper describes the model, methods and tools to find rational ways of the energy development with regard to energy security requirements. As known, energy security is directly related to the uninterrupted energy ...
详细信息
ISBN:
(纸本)9783319570990;9783319570983
this paper describes the model, methods and tools to find rational ways of the energy development with regard to energy security requirements. As known, energy security is directly related to the uninterrupted energy supply. It is important to choose rational ways of the energy development with ensuring energy security in the future. A number of the specific external condition combinations of energy sector operation and development taking into account uncertainties and other factors leads to a huge possible energy sector states set. therefore it cannot be processed in reasonable time. To overcome this issue an approach of combinatorial modeling is applied to manage the growing size of the energy sector states set.
暂无评论