Opportunistic computing(OC) being a new paradigm of computing exploits the chance of acquiring the devices and service required for computing with the principle, sharing of resources with resource utilization at high ...
详细信息
ISBN:
(纸本)9781479966295
Opportunistic computing(OC) being a new paradigm of computing exploits the chance of acquiring the devices and service required for computing with the principle, sharing of resources with resource utilization at high priority. Among the multitude of challenges faced by OC, routing and security factors are the urgent issues to be attended. The paper provides a review of various routing protocols taxnomised based on the smartness they accomplish and security protocols designed around the OC principles.
Cloud computing is a very fast emerging technology as every enterprise is moving fast towards this system. Cloud computing is known as a provider of dynamic services. It optimizes a very large, scalable and virtualize...
详细信息
Cognitive computing is an emerging method which helps to analyse the human brain behaviour and simulate it mathematically. Cognitive computing systems learn and interact naturally with people to extend what either hum...
详细信息
ISBN:
(纸本)9781479966295
Cognitive computing is an emerging method which helps to analyse the human brain behaviour and simulate it mathematically. Cognitive computing systems learn and interact naturally with people to extend what either humans or machine could do on their own. Cognitive science consists of multiple research disciplines, including psychology, artificial intelligence, philosophy, neuroscience, linguistics, and anthropology. Cognitive computing helps autonomous systems to work as human Brain. COMPASS is a simulator which simulates the working of cognitive computing. It is fully based on the architecture TrueNorth developed by IBM. COMPASS enables to simulate brain like functions in a hardware platform[1].
This paper aims at studying the problem of face recognition using very few examples. Face recognition is a tough problem yet is important for several practical applications. contemporary techniques require thousands o...
详细信息
Information is the third essence in modeling the natural world. This paper attempts to explore an emerging discipline know as cognitive informatics. Cognitive informatics is a profound interdisciplinary research area ...
详细信息
ISBN:
(纸本)0769517242
Information is the third essence in modeling the natural world. This paper attempts to explore an emerging discipline know as cognitive informatics. Cognitive informatics is a profound interdisciplinary research area that tackles the common root problems of modern informatics, computation, software engineering, artificial intelligence (AI), neural psychology, and cognitive science. Cognitive informatics studies the internal information processing mechanisms and natural intelligence of the brain. This paper describes historical development of informatics from the classical information theory, contemporaryinformatics, to cognitive informatics. The domain of cognitive informatics and its interdisciplinary nature are explored. Foundations of cognitive informatics, particularly the brain vs. the mind, the acquired life functions vs. the inherited ones, and generic relationships between information, mater and energy are investigated. The potential engineering applications of cognitive informatics and perspectives on future research are discussed. It is expected that the investigation into cognitive informatics will result in fundamental findings towards the development of next generation IT and software technologies, such as neural computers, bioinformatics, quantum information processing, new software development approaches, and new architectures of information systems.
Cloud computing is a hotly debated and researched topic amongst all group of users ranging from industry to academia. It has highly raised the expectations of small, medium and large enterprises beyond measure. Many o...
详细信息
ISBN:
(纸本)9781479966295
Cloud computing is a hotly debated and researched topic amongst all group of users ranging from industry to academia. It has highly raised the expectations of small, medium and large enterprises beyond measure. Many organizations have migrated to cloud. The progressive use of cloud resources in the entire IT sector urged the need for better management of cloud infrastructure. Cloud infrastructure needs most efficient management techniques to cater to increasingly growing demands of users. Cloud computing has evolved tremendously and is still constantly undergoing changes. This paper gives the overview of cloud orchestration software along with their features.
An increasing number of elderly people leads to demand for social robots to support health care and independent life. An overview of various potential applications of social robots is provided in this paper. In additi...
详细信息
ISBN:
(纸本)9781479966295
An increasing number of elderly people leads to demand for social robots to support health care and independent life. An overview of various potential applications of social robots is provided in this paper. In addition, the latest research progress in our institute is presented, i.e., multi-party interaction, gesture recognition, affective computing, and attention capture. All the research and applications demonstrate that social robots are good assistive robots for people with special needs.
The distributed systems are highly fault prone environment to work with. Thus, fault tolerance is a major concern in distributed computing. The available failure resiliency techniques mitigate only the failures that a...
详细信息
ISBN:
(纸本)9781479966295
The distributed systems are highly fault prone environment to work with. Thus, fault tolerance is a major concern in distributed computing. The available failure resiliency techniques mitigate only the failures that are limited in some way. However, it is extremely difficult to limit the failures because the autonomous nodes may suffer autonomous failures. Nevertheless, in mission critical applications, the uncontrolled failures are unaffordable. Hence, it is highly desirable that the system survives such failures. The survivability of computer networks is a popular research topic. However, the survivability of computing systems has not been in focus. In this illustration, we have attempted to raise this issue and bring out certain requirements and features related to survivable computing systems. To the best of my knowledge, it is the first attempt in the direction.
The paper develops ontology for cyber security to provide information from huge collection of structured and unstructured web data. It deals with identification of several aspects related to cyber security including v...
详细信息
In recent times there has been significant advances in managing different types of sensors and industrial devices by IoT (Internet of Things) protocol. Along with the availability of massive amount of processing power...
详细信息
ISBN:
(纸本)9781509052561
In recent times there has been significant advances in managing different types of sensors and industrial devices by IoT (Internet of Things) protocol. Along with the availability of massive amount of processing power provided by the Cloud new opportunities have emerged for complete automation of industrial devices. IoT has a vast application in different sectors and domains which are yet to be explored. In industry domain, industrial automation is need of the hour to increase the time to market with high grade quality and enhanced productivity. In this paper we explain proven ways to utilize the capabilities of Cloud and IoT to control the device and analyze the data generated by them.
暂无评论