Data is ubiquitously generated each microsecond from heterogeneous sources. These sources are connected devices in the form of mobiles, telemetry machines, sensors, clickstreams, weather forecasting devices, and many ...
详细信息
The proceedings contain 14 papers. The topics discussed include: investigating airplane crash data with watson analytics and Cognos analytics;a comparative analysis of the impact of Taobao image reviews on the sales o...
ISBN:
(纸本)9781450387866
The proceedings contain 14 papers. The topics discussed include: investigating airplane crash data with watson analytics and Cognos analytics;a comparative analysis of the impact of Taobao image reviews on the sales of search products and experience products;design and implementation of a distributed container-deployed web business traffic generator;research on the recognition of opinion leaders in social media based on social network analysis theory;dynamic android malware analysis with de-identification of personal identifiable information;an empirical study of multi-threading paradigms: reactive programming vs continuation-passing style;an annotated union catalog of local history resources on region 8: basis for an enhanced computerized database;and backpropagation neural network with feature sensitivity analysis: a pothole prediction model for flexible pavements using traffic and climate – associated factors.
The proceedings contain 75 papers. The special focus in this conference is on Smart computing and Informatics. The topics include: Enterprise of Future: Leveraging Information, Communication and Technology (ICT) and S...
ISBN:
(纸本)9789813296893
The proceedings contain 75 papers. The special focus in this conference is on Smart computing and Informatics. The topics include: Enterprise of Future: Leveraging Information, Communication and Technology (ICT) and Social Interactions (SI) for Growth;A Socio-economic Study of Entrepreneurial Abilities of Rural and Urban Women in Ranchi District, Jharkhand and Need of ICT for Transforming Their Abilities;digital Modes of Payment: Usage of Plastic Money and Virtual Wallet in India;awareness of Mediclaim Insurance Among the Bank Customers with Special Reference to Ranchi;assessing Global Environmental Sustainability: Second-Order Effect of Information and Communication Technology;cyberspace: A Contemporary Path for Religious Education;The Impact of ICT on Feminism: A Global Phenomenon;tracing the Evolution of Information and Communication Technologies in Cinema;benefit and Risk Factors Influencing Organizations to Migrate from On-Premise to Cloud computing Model of Software Product;an Exploration of distributed Access Control Mechanism Using BlockChain;ICT and ELT: The Pedagogical Perspective;exploratory Study on Success of Mythological Serials;Leveraging the Benefits of ICT Usage in Teaching of English Language and Literature;geometric Multi-Way Frequent Subgraph Mining Approach to a Single Large Database;gideon—An Artificial Intelligent Companion;keyBoard-Less Online Shopping for the Visually Impaired Using Natural Language Processing and Face Recognition Mechanism;knowledge Mining for Faculty Appraisal Based on Students Feedback Using Classification Techniques in R;automatic Image Annotation: A Review of Recent Advances and Literature;scrambling and Descrambling of Document Image for Data Security in Cloud computing;Machine Learning and Its Implications on Educational Data Base (U-DISE).
In the distributed stream processing, data skew and dynamics can result in imbalanced load distribution at downstream tasks and affect the throughput of the systems. Efficient data distribution method is urgently need...
详细信息
The proceedings contain 82 papers. The topics discussed include: inferring SQL queries using interactivity;considering the environments characteristics in wireless networks simulations and emulations: case of popular ...
ISBN:
(纸本)9781450376341
The proceedings contain 82 papers. The topics discussed include: inferring SQL queries using interactivity;considering the environments characteristics in wireless networks simulations and emulations: case of popular simulators and WSN;post-fall time accounting for fall detection using a portable camera;fireworks algorithm for frequency assignment problem;motion detection using the dynamic color texture;big data solutions proposed for cluster computingsystems.challenges: a survey;le of information technologies in supply chain management;sensors transposing technique for minimizing the path loss effect and enhancement of battery lifetime in wireless body area sensor networks;unified process to design and develop serious games for schoolchildren;study and analysis of data analysis systems.(reconstruction of a learning data from the initial data);and contribution of artificial neural network in predicting completeness through the impact and complexity of its improvement.
The loitering munition cooperative combat tasks such as target detection, cooperative recognition and real-time damage assessment can be achieved by formation flight, and the combat effectiveness can be improved. The ...
详细信息
ISBN:
(数字)9781728180250
ISBN:
(纸本)9781728180250
The loitering munition cooperative combat tasks such as target detection, cooperative recognition and real-time damage assessment can be achieved by formation flight, and the combat effectiveness can be improved. The distributed formation control architecture based on virtual leader, allows any number of sub formation leaders to exist in the loitering munition formation, and coordination variables can be transferred between adjacency loitering munition. The formation flight of loitering munition can he realized by using the distributed consensus algorithm with bounded control input. The digital simulation is carried out considering the limited control ability of the loitering munition, the simulation results show that the loitering munition can fly in formation and keep the formation stable.
This paper presents a developing method for effective implementation of large-scale distributed sensing systems. Use of occam-pi programming language for simulation is yet implemented by code generator from a high-lev...
详细信息
ISBN:
(纸本)9781450366120
This paper presents a developing method for effective implementation of large-scale distributed sensing systems. Use of occam-pi programming language for simulation is yet implemented by code generator from a high-level tool. A complete program has local activities for sensing and distributed activities for data collection and distributed control. distributed algorithms are developed and fine-tuned by simulators. To validate and evaluate our proposed method, node local behavior was interpreted on target hardware for the practical deployment of wireless sensor networks.
With the new designs of Vertical Axis Wind Turbines, producing electrical energy from wind has never been so promising at small scale. The connection of any distributed generation unit has its benefits as well as its ...
详细信息
The proceedings contain 18 papers. The special focus in this conference is on Architecture of computingsystems. The topics include: Engineering an optimized instruction set architecture for amidar processors;scaling ...
ISBN:
(纸本)9783030527938
The proceedings contain 18 papers. The special focus in this conference is on Architecture of computingsystems. The topics include: Engineering an optimized instruction set architecture for amidar processors;scaling logic locking schemes to multi-module hardware designs;exploration of power domain partitioning with concurrent task mapping and scheduling for application-specific multi-core socs;scalable, decentralized battery management system based on self-organizing nodes;security improvements by separating the cryptographic protocol from the network stack onto a multi-mcu architecture;equally distributed bus-communication access rights for inter mcu communication using multimaster spi;on the evaluation of seu effects on axi interconnect within ap-socs;satellite onboard data reduction using a risc-v core inside an rtg4-based data processing pipeline;accelerating real-time applications with predictable work-stealing;evaluating dynamic task scheduling with priorities and adaptive aging in a task-based runtime system;an architecture for solving the eigenvalue problem on embedded fpgas;ECC memory for fault tolerant risc-v processors;3D optimisation of software application mappings on heterogeneous mpsocs;towards a priority-based task distribution strategy for an artificial hormone system;*** db: A concept for parallel data processing on heterogeneous hardware;investigating transactional memory for high performance embedded systems.
This paper focuses on closed loop operational mode of Volt-VAr control (VVC) algorithm, as well as the power flow (PF) methods that can successfully be used to implement VVC. Two methods to implement efficient PF are ...
详细信息
暂无评论