The ever growing necessity for Big Data processing within the industry, government, and specially within defense applications causes the need and requirement for the fast development of new technologies. In addition, ...
ISBN:
(纸本)9781450311137
The ever growing necessity for Big Data processing within the industry, government, and specially within defense applications causes the need and requirement for the fast development of new technologies. In addition, the protection of Big Data can be a serious problem because security is commonly an afterthought during technology development, and the exponentially increasing rate at which new data is generated presents many challenges. Although conventional Turing computation has been remarkably successful, it does not scale well and is failing to adapt to novel application domains in cyberspace. Fortunately, Turing formalism for computation represents only a subset of all possible computational possibilities. Unconventional computing - the quest for new algorithms and physical implementations of novel computing paradigms based on and inspired by principles of information processing in physical and biological systems.- may help to solve some of the information overflow problems facing the Defense community. These and other topics will be covered by our diverse panel of experts.
Network bandwidth and hardware technology are developing rapidly, resulting in the vigorous development of the Internet. A new concept, cloud computing, uses low-power hosts to achieve high reliability. The cloud comp...
详细信息
Network bandwidth and hardware technology are developing rapidly, resulting in the vigorous development of the Internet. A new concept, cloud computing, uses low-power hosts to achieve high reliability. The cloud computing, an Internet-based development in which dynamically scalable and often virtualized resources are provided as a service over the Internet has become a significant issue. The cloud computing refers to a class of systems.and applications that employ distributed resources to perform a function in a decentralized manner. Cloud computing is to utilize the computing resources (service nodes) on the network to facilitate the execution of complicated tasks that require large-scale computation. Thus, the selecting nodes for executing a task in the cloud computing must be considered, and to exploit the effectiveness of the resources, they have to be properly selected according to the properties of the task. However, in this study, a two-phase scheduling algorithm under a three-level cloud computing network is advanced. The proposed scheduling algorithm combines OLB (Opportunistic Load Balancing) and LBMM (Load Balance Min-Min) scheduling algorithms that can utilize more better executing efficiency and maintain the load balancing of system.
Power system protection is one important work which relate to security and stability of the power system. Power system relay protection is a very important part of power system and it relates to the power system secur...
详细信息
Power system protection is one important work which relate to security and stability of the power system. Power system relay protection is a very important part of power system and it relates to the power system security and stability. The time for fault reaction of power system protection determines the reliability of system protection and sensitivity. This paper mainly for the malfunctions of power system, we used the techniques of big data to reduce the size of the power network. We used the distributed computation and parallel computing to calculate fault calculation, topology analysis and setting calculation, which can shorten the operation time of protection equipment. At the same time, it also can improve the quality of the power and it can reduce the time harming the equipment and ensure the stable operation of the system.
Data consistency protocol for supporting client coherency and data integrity imposes great impacts on the performance of distributed file systems. This paper proposes a new form of data consistency protocol which aims...
详细信息
Data consistency protocol for supporting client coherency and data integrity imposes great impacts on the performance of distributed file systems. This paper proposes a new form of data consistency protocol which aims to enhance I/O performance of various applications. Different from the past works, multiple acquisition functions are adopted to establish a desirable lock schedule, according to the application-sensitive hint. Also, this paper presents how the basic idea of our scheme could be adopted to maintain replica consistency for the geographically distributed data. A series of measurements were conducted to verify our scheme.
Software health management is defined as a technology that applies the principles and techniques similar to the one used for system heath management to software systems. The goal of software health management is to ma...
详细信息
Software health management is defined as a technology that applies the principles and techniques similar to the one used for system heath management to software systems. The goal of software health management is to maintain software system function and performance and improve software system availability and reliability, even when software system meets health problem. System health management has been a well-established discipline in aerospace systems. and many systems.called health management systems.have been developed on board. But software health management has not been a formal discipline yet and the concept of ‘software health' has not been formed. This paper mainly takes the Hadoop distributed file system as the research object, analyzes and studies some health issues including the definition and connotation of software health. HDFS health assessment framework is also presented, which is based on the analysis of the design principles.
The authenticity and transparency of voting methods must be guaranteed in today39;s digitally linked society. The power of blockchain technology and sophisticated optimization methods are combined in this research a...
The authenticity and transparency of voting methods must be guaranteed in today's digitally linked society. The power of blockchain technology and sophisticated optimization methods are combined in this research article to suggest a fresh strategy for overcoming these difficulties. The suggested voting system uses blockchain's decentralized structure to provide a safe and impenetrable platform for holding elections. Blockchain's built-in immutability and cryptographic capabilities are used by the proposed system to ensure voting process secrecy and transparency. The whole blockchain acts as an auditable and verifiable ledger, with each vote being recorded as a transaction inside a block. The system optimizes the distribution of resources, such as polling booths and staff, to save costs and maximize efficiency. It does this by using cutting-edge optimization algorithms. On the basis of a test dataset, a thorough simulation study is carried out to assess the efficacy of the suggested solution. The results show the system's capacity to maintain vote integrity while enhancing resource allocation generally and lowering the risk of fraud or manipulation. By offering a safe, open, and effective method, the research's results advance the area of voting systems. The suggested approach might completely alter how elections are run, fostering faith and confidence in the democratic system.
Guidance assistance systems.are expected to have a fundamental role in the near future ITS scenario. This paper describes the fundamental differences between the automated system and guidance system design. Solutions ...
详细信息
Guidance assistance systems.are expected to have a fundamental role in the near future ITS scenario. This paper describes the fundamental differences between the automated system and guidance system design. Solutions to these problems adopted in the parking assistance system development is described. The solution includes the proposal of human guidance system based on path generation and human interface. The proposed scheme implementation, the performed experiments and obtained experimental results are also reported.
Sensor network troubleshooting is a notoriously difficult task, further exacerbated by resource constraints, unreliable components, unpredictable natural phenomena, and experimental programming paradigms. This paper p...
详细信息
ISBN:
(纸本)9783540730897
Sensor network troubleshooting is a notoriously difficult task, further exacerbated by resource constraints, unreliable components, unpredictable natural phenomena, and experimental programming paradigms. This paper presents SNTS (Sensor Network Troubleshooting Suite), a tool that performs automated failure diagnosis in sensor networks. SNTS can be used to monitor network conditions using simple visualization techniques as well as to troubleshoot deployed distributed sensor systems.using data mining approaches. It is composed of (i) a data collection front-end that records events internal to the network and (ii) a data processing back-end for subsequent analysis. We use data mining techniques to automate failure diagnosis on the back-end. The assumption is that the occurrence of execution conditions that cause failures (e.g., traversal of an execution path that contains a "bug" or occurrence of a sequence of events that a protocol was not designed to handle) will have a measurable correlation (by causality) with the resulting failure itself. Hence, by mining for network conditions that correlate with failure states the root causes of failure are revealed with high probability. To evaluate the effectiveness of the tool, we have used it to troubleshoot a tracking system called EnviroTrack [4], which, although performs well most of the time, occasionally fails to track targets correctly. Results show that SNTS can identify the major causes of the problem and give developers useful hints on improving the performance of the tracking system.
Kanerva39;s sparse distributed memory (SDM) is an associative-memory model based on the mathematical properties of high-dimensional binary address spaces. Holland39;s genetic algorithms are a search technique for ...
Kanerva's sparse distributed memory (SDM) is an associative-memory model based on the mathematical properties of high-dimensional binary address spaces. Holland's genetic algorithms are a search technique for high-dimensional spaces inspired by evolutionary processes of DNA. "Genetic Memory" is a hybrid of the above two systems. in which the memory uses a genetic algorithm to dynamically reconfigure its physical storage locations to reflect correlations between the stored addresses and data. For example, when presented with raw weather station data, the Genetic Memory discovers specific features in the weather data which correlate well with upcoming rain, and reconfigures the memory to utilize this information effectively. This architecture is designed to maximize the ability of the system to scale-up to handle real-world problems.
We have developed a three dimensional movable robot of an ultrasound probe for remote echographic diagnosis to apply between hospital, clinic and home. The probe movable mechanism is carefully designed not to damage t...
详细信息
We have developed a three dimensional movable robot of an ultrasound probe for remote echographic diagnosis to apply between hospital, clinic and home. The probe movable mechanism is carefully designed not to damage the human body since miniature force sensors detect not only the total contact force to body surface but also the angle of probe. The angle and position of probe are controlled not to exceed a dangerous contact force. We tried to control it via a network by using a two-axis joystick.. The remote control software is developed under ORB (object request broker) technique which has recently been used in the majority of distributed object systems. We applied it to control the robot via LAN and 128K ISDN (integrated services digital network). We found that real time control was possible with an image stream by setting the priority for image and control signals to the ISDN router. Though delay time of the image causes stress to the examiner, we confirmed that remote diagnosis of the human abdomen is useful.
暂无评论