Recent prognoses about the future of Cloud computing, internet of Things and internet Services show growing demand for an efficient processing of huge amounts of data within strict time limits. First of all, a real-ti...
详细信息
ISBN:
(纸本)9783319465357;9783319465340
Recent prognoses about the future of Cloud computing, internet of Things and internet Services show growing demand for an efficient processing of huge amounts of data within strict time limits. First of all, a real-time data store is necessary to fulfill that requirement. One of the most promising architecture that is able to efficiently store large volumes of data in distributed environment is SDDS (Scalable Distributed Data Structure). In this paper we present SDDS LHRT, an architecture that is suitable for real-time cloud applications. We assume that deadlines, defining the data validity, are associated with real time requests. In the data store a real-time scheduling strategy is applied to determine the order of processing the requests. Experimental results shows that our approach significantly improves the storage Quality-of-service in a real-time cloud environment.
With the rapid development of mobile terminal, mobile applications are gradually penetrated into all aspects of people's life and work. Mobile games, mobile streaming media, location services, mobile internet news...
详细信息
Service ontology models have been applied to many application domains to facilitate the semantic rich specifications of various types of services, including the business processes, health care, manufacturing processes...
详细信息
ISBN:
(纸本)9783319612409;9783319612393
Service ontology models have been applied to many application domains to facilitate the semantic rich specifications of various types of services, including the business processes, health care, manufacturing processes, etc. Recently, many service models for the internet of Things (IoT) domain have been proposed. However, these models are still mostly following the thoughts of software services. In this paper, we discuss some differences of the IoT services from the software services and the requirements in service modeling for IoT services due to these differences. We also extend the existing software service model to support the specification of the IoT services and things.
This research aims to find the best practice of logistic management for Electricity Generation Authority of Thailand (EGAT) Mae Mao Mining, Lampang. This research applied the use of RFID for lignite coal trucks and da...
详细信息
ISBN:
(纸本)9781467390774
This research aims to find the best practice of logistic management for Electricity Generation Authority of Thailand (EGAT) Mae Mao Mining, Lampang. This research applied the use of RFID for lignite coal trucks and data from REID proceed through a server and was stored into a private cloud computing. The equipment and tools used in research was a REID reader, UHF passive RFID tags, Arduino Mega 2 5 60 + Ethernet Shield, PHP, Jason, *** and Maria DB as a database system. The protocol used was MQTT. 27 trucks had UHF passive tags installed, 1 crusher (location number 3) had an RFID reader installed. This system has been operating 24 hours a day 7 days a week, from the beginning of 2015 to mid 2016. The results of the research show that officers who worked for related systems were satisfied. The system enhanced the best practice of lignite coal mining logistic in terms of information checking.
This paper presents a solution for filtering personally identifiable information for developments of augmented video coaching systems and exergames applied on a golf case study. Aligned with eWaste reduction, this stu...
详细信息
ISBN:
(纸本)9781538617212
This paper presents a solution for filtering personally identifiable information for developments of augmented video coaching systems and exergames applied on a golf case study. Aligned with eWaste reduction, this study included multiple low-cost video sources including new and obsolete video cameras, mobile devices, and Microsoft Kinect to capture and convert motion data as a silhouette-based video. The algorithm development combined computer vision techniques with design science. The silhouette-based video produced was sufficient for a coach to provide analysis of static and dynamic critical features of golf swings (e.g. stance, tempo and swing plane). In looking beyond eSport systems, the achieved outcomes (robustness to colours, contrast, diverse video resolutions and lightning intensity changes) and insights are universally applicable to enable human- or AI-based motion activity analytics. The next-generation of IoE/IoT and ubiquitous systems will benefit from presented algorithms integrated in smart homes, post-surgery/rehabilitation environments, elderly activity/safety monitoring, sport umpiring and other motion analysis contexts and environments where video privacy is considered paramount.
As a practical and valuable method, bibliometric analysis has been applied to many research fields. In this paper, we propose a Publication Analytics System for Services conference Federation (PAS4SCF). With SCF paper...
详细信息
ISBN:
(纸本)9781538619964
As a practical and valuable method, bibliometric analysis has been applied to many research fields. In this paper, we propose a Publication Analytics System for Services conference Federation (PAS4SCF). With SCF paper published from 2004 to 2016, the paper illustrates feature extraction methods used in the PAS4SCF and conducts citation analysis and topic analytics to explore the panorama of PAS4SCF as well as SCF publications. The PAS4SCF offers many interesting results which can help paper reviewers check plagiarism, build author credit and predict technology trends. We expect more researchers and engineers to participate in the discipline of services computing and discover more technologies, trends and methodologies based on or related to services computing, thus improving the overall scientific and social impact.
In this paper, we study AMR-to-text generation, framing it as a translation task and comparing two different MT approaches (Phrasebased and Neural MT). We systematically study the effects of 3 AMR preprocessing steps ...
详细信息
A revolutionary trustable sharable computing outcome, the blockchain is essentially a distributed database of records or public ledger of all transactions originated from digital events and shared among participating ...
详细信息
ISBN:
(纸本)9781509030125
A revolutionary trustable sharable computing outcome, the blockchain is essentially a distributed database of records or public ledger of all transactions originated from digital events and shared among participating parties within a computing framework. Each transaction of the chain in the public ledger is verified by consensus of a majority of the participants in the system and its constituents. Once recorded, information can never be erased and neither altered. The blockchain contains a certain and verifiable record of every single transaction ever made during the business operations. In general sense, the blockchain could be described simply as being a way of storing the information of a transaction, between multiple parties in a trustable way. Recording, sharing, storing and redistributing contents in a secure and decentralized way. Being owned, run and monitored by everybody and without anyone controlling it. Besides, avoiding any kind of modifications or abuses from a central authority. Blockchain technology is non-controversial and has worked flawlessly over the last few years and is being successfully applied to both financial and non-financial world applications and listed as as the most important invention since the internet itself. Besides, digital transformation is taking off as rapid agent for change as part of the global business convergence. In this article, detail of blockchain technologies is presented from the perspectives of digital business transformation along with its future evolutions.
While Cloud computing has become an important topic in research and practice in recent years and widely adopted by consumers and companies around the globe, especially German small and medium-sized enterprises (SME) a...
详细信息
While Cloud computing has become an important topic in research and practice in recent years and widely adopted by consumers and companies around the globe, especially German small and medium-sized enterprises (SME) are reluctant with the respect to using cloud services. Scientific literature on cloud adoption in German SMEs is still scarce, in particular with respect to the use of PaaS solutions. Therefore, in this paper a research model for the organizational adoption of Cloud computing and especially PaaS solutions is proposed, which is based on the Diffusion of Innovation (DOI) and Technology, Organization and Environment (TOE) theories. The proposed model is derived from an explorative qualitative empirical study among German SMEs. Within this model, security and privacy concerns and fast broadband internet access have been identified as the most important technological influencing factors for cloud adoption. Copyright 2017 for this paper by its authors.
Most enterprise organizations need a robust IP technology that creates a safe and encrypted connection tunnel over the less secure internet. In order to allow remote users and branch offices to securely access corpora...
详细信息
ISBN:
(纸本)9781509064229
Most enterprise organizations need a robust IP technology that creates a safe and encrypted connection tunnel over the less secure internet. In order to allow remote users and branch offices to securely access corporate applications and other resources, joint location problem (JLP) and link connectivity problems (LCP) need to be assured. This guarantees safety as data travels through secure tunnels. Though IP based VPN has been developed, the full characterization of JLP and LCP for VPN customer edge devices as well as provider edge nodes have not fully explored. The aim of this paper is to apply advanced perspectives to IP-VPN design which could be applied in cloud computing IP multi-protocol label switching (MPLS-VPN) infrastructure. Mathematical formulations are introduced in the system architecture. Riverbed Modelerl7.5 is used to simulate VPN-IP tunneling for a typical enterprise scenario (Non-MPLS aware). Sixteen (16) Ethernet4_Slip8_gatway, i.e., integrated service routers (ISR) which runs on Cisco IOS release 15.4 are employed at both the customer and provide edge. Also, six (6) customer nodes are introduced. Reachability metrics using the Ping command showed the various response times for each site. For IP tunneling, end to end delay, throughput and resource utilization behavior are observed to be moderate for low scale workloads. The challenges of the VPN-IP tunneling are discussed while highlighting the merits of an IP based MPLS-VPN infrastructure. In other to avoid complex problems in VPN-IP tunneling, this work recommends cloud based MPLS-VPN as a viable alternative for optimal performance.
暂无评论