The rapid digitalization across industries comes with many challenges. One key problem is how the ever-growing and volatile data generated at distributed locations can be efficiently processed to inform decision makin...
详细信息
ISBN:
(纸本)9781450371322
The rapid digitalization across industries comes with many challenges. One key problem is how the ever-growing and volatile data generated at distributed locations can be efficiently processed to inform decision making and improve products. Unfortunately, wide-area network capacity cannot cope with the growth of the data at the network edges. Thus, it is imperative to decide which data should be processed in-situ at the edge and which should be transferred and analyzed in data centers. In this paper, we study two families of proactive online data replication strategies, namely ski-rental and machine learning algorithms, to decide which data is processed at the edge, close to where it is generated, and which is transferred to a data center. Our analysis using real query traces from a Global 2000 company shows that such online replication strategies can significantly reduce data transfer volume-in many cases up to 50% compared to naive approaches-and achieve close to optimal performance. After analyzing their shortcomings for ease of use and performance, we propose a hybrid strategy that combines the advantages of both competitive and machine learning algorithms.
The proceedings contain 18 papers. The special focus in this conference is on Smart Transportation systems. The topics include: Traffic Safety Assessment of Deceleration Function Area Based on TTC Model;Realistic 5.9&...
ISBN:
(纸本)9789811552694
The proceedings contain 18 papers. The special focus in this conference is on Smart Transportation systems. The topics include: Traffic Safety Assessment of Deceleration Function Area Based on TTC Model;Realistic 5.9 GHz DSRC Vehicle-to-Vehicle Wireless Communication Protocols for Cooperative Collision Warning in Underground Mining;real-Time Data Processing in Autonomous Vehicles Based on distributed Architecture: A Case Study;injury Severity Analysis of Secondary Incidents;Communication and Localization Techniques in VANET Network for Intelligent Traffic System in Smart Cities: A Review;modelling the Relationships Between Headway and Speed in Saturation Flow of Signalised Intersections;shore Power Price Competition Between Ports;emission Evaluation of Marine Traffic;existing and Future Investigation of Charging Technology for Electric Bus;vehicle Scheduling Model for an Electric Bus Line;how to Model the Influence of In-vehicle Crowding on Travel Behavior: A Comparison Among Moderation, Independent Variable and Interaction;accessing the Influences of Weather and Environment Factors on Traffic Speed of Freeway;multivariate Time Series Analysis Using Recurrent Neural Network to Predict Bike-Sharing Demand;influencing Factor Analysis of Logistics Service Satisfaction in China: A Binary Logit Model Approach;to Investigate the Hidden Gap between Traffic Flow Fundamental Diagrams and the Derived Microscopic Car Following Models: A Theoretical Analysis;a Leader-Based Vehicle Platoon Control Strategy at Signalized Intersections Considering Efficiency.
In this work, we study heuristic and randomized approaches for parallel jobs execution in high performance computing environments with heterogeneous resources. Traditional process of a job-flow scheduling implies many...
详细信息
The proceedings contain 9 papers. The special focus in this conference is on Vehicular Ad-hoc Networks for Smart Cities. The topics include: Performance Evaluation of Speed Platoon Splitting Algorithm;AVEC: A Statisti...
ISBN:
(纸本)9789811537493
The proceedings contain 9 papers. The special focus in this conference is on Vehicular Ad-hoc Networks for Smart Cities. The topics include: Performance Evaluation of Speed Platoon Splitting Algorithm;AVEC: A Statistical Framework for Adaptive Vehicular Edge Data Cleaning;software-Defined Networking for Emergency Traffic Management in Smart Cities;Towards a Reliable Machine Learning-Based Global Misbehavior Detection in C–ITS: Model Evaluation Approach;A RINA-Based Security Architecture for Vehicular Networks;networks of Trusted Execution Environments for Data Protection in Cooperative Vehicular systems.Vehicular Ad Hoc Networks Security for Smart Cities Based on 2D ZCC/MD Optical CDMA Code.
To adequately take an interest in the current coordinated partnerships, associate companies ought to have the capacity to impart computerized resources to different collaborators, while guaranteeing their advanced res...
详细信息
ISBN:
(纸本)9789813296909;9789813296893
To adequately take an interest in the current coordinated partnerships, associate companies ought to have the capacity to impart computerized resources to different collaborators, while guaranteeing their advanced resources is shielded from unseemly access. In the current literature, a significant measure of research on unified access control with regards to one company has been completed. Be that as it may, investigation on decentralized access control in a shared domain is rare. A model of a decentralized access control framework is implemented, which strengthens auditability, unchanging nature, and uniformity in a cooperation domain utilizing the multi-chain blockchain. The model was created to assess two essential measurements: throughput and response. To accomplish this, various analyses have been performed to quantify the two measurements on Amazon Web Services.
Human activity recognition (HAR) targets the methodologies to recognize the different actions from a sequence of observations. Vision-based activity recognition is among the most popular unobtrusive technique for acti...
详细信息
ISBN:
(纸本)9789813292918;9789813292901
Human activity recognition (HAR) targets the methodologies to recognize the different actions from a sequence of observations. Vision-based activity recognition is among the most popular unobtrusive technique for activity recognition. Caring for the elderly who are living alone from a remote location is one of the biggest challenges of modern human society and is an area of active research. The usage of smart homes with an increasing number of cameras in our daily environment provides the platform to use that technology for activity recognition also. The omnidirectional cameras can be utilized for fall detection activity which minimizes the requirement of multiple cameras for fall detection in an indoor living scenario. Consequently, two vision-based solutions have been proposed: one using convolutional neural networks in 3D-mode and another using a hybrid approach by combining convolutional neural networks and long short-term memory networks using 360-degree videos for human fall detection. An omnidirectional video dataset has been generated by recording a set of activities performed by different people as no such 360-degree video dataset is available in the public domain for human activity recognition. Both, the models provide fall detection accuracy of more than 90% for omnidirectional videos and can be used for developing a fall detection system for indoor health care.
Cloud-based deep learning (DL) solutions have been widely used in applications ranging from image recognition to speech recognition. Meanwhile, as commercial software and services, such solutions have raised the need ...
详细信息
ISBN:
(纸本)9781728190747
Cloud-based deep learning (DL) solutions have been widely used in applications ranging from image recognition to speech recognition. Meanwhile, as commercial software and services, such solutions have raised the need for intellectual property rights protection of the underlying DL models. Water-marking is the mainstream of existing solutions to address this concern, by primarily embedding pre-defined secrets in a model's training process. However, existing efforts almost exclusively focus on detecting whether a target model is pirated, without considering traitor tracing. In this paper, we present SecureMark_DL, which enables a model owner to embed a unique fingerprint for every customer within parameters of a DL model, extract and verify the fingerprint from a pirated model, and hence trace the rogue customer who illegally distributed his model for profits. We demonstrate that SecureMark_DL is robust against various attacks including fingerprints collusion and network transformation (e.g., model compression and model fine-tuning) Extensive experiments conducted on MNIST and CIFAR10 datasets, as well as various types of deep neural network show the superiority of SecureMark_DL in terms of training accuracy and robustness against various types of attacks.
The modern process automation plants are changing into flexible designs, which raises the requirements for distributively controlled logic, a high degree of interoperability, dynamic reconfiguration and software reusa...
详细信息
The 3d laser scanner for mine can obtain 3d point cloud data of many areas, such as cavity, ore pass and so on, which provides the data basis for the digital mine. However, the point cloud data often exist holes and o...
详细信息
The proceedings contain 35 papers. The special focus in this conference is on Data Management, Analytics and Innovation. The topics include: Automated Scheduling of Hostel Room Allocation Using Genetic Algorithm;Evalu...
ISBN:
(纸本)9789813299481
The proceedings contain 35 papers. The special focus in this conference is on Data Management, Analytics and Innovation. The topics include: Automated Scheduling of Hostel Room Allocation Using Genetic Algorithm;Evaluation of ASTER TIR Data-Based Lithological Indices in Parts of Madhya Pradesh and Chhattisgarh State, India;Analyzing Linear Relationships of LST with NDVI and MNDISI Using Various Resolution Levels of Landsat 8 OLI and TIRS Data;automatic Robot Processing Using Speech Recognition System;banking and FinTech (Financial Technology) Embraced with IoT Device;GRNN++: A Parallel and distributed Version of GRNN Under Apache Spark for Big Data Regression;an Entropy-Based Technique for conferences Ranking;MapReduce mRMR: Random Forests-Based Email Spam Classification in distributed Environment;the Impact of Sustainable Development Report Disclosure on Tax Planning in Thailand;ASK Approach: A Pre-migration Approach for Legacy Application Migration to Cloud;clustering and Labeling Auction Fraud Data;big Data Security Challenges and Preventive Solutions;role and Challenges of Unstructured Big Data in Healthcare;zip Zap Data—A Framework for ‘Personal Data Preservation’;a Systematic Mapping Study of Cloud Large-Scale Foundation—Big Data, IoT, and Real-Time Analytics;studies on Radar Imageries of Thundercloud by Image Processing Technique;PURAN: Word Prediction System for Punjabi Language News;Implementation of hDE-HTS Optimized T2FPID Controller in Solar-Thermal System;Design of Sigma-Delta Converter Using 65 nm CMOS Technology for Nerves Organization in Brain Machine Interface;Performance Comparison of Machine Learning Techniques for Epilepsy Classification and Detection in EEG Signal;novel Approach for Plant Disease Detection Based on Textural Feature Analysis.
暂无评论