Prestack reverse time migration(RTM) requires extensive data storage since it computes wavefields in forward time and accesses wavefields in reverse *** first review several successful schemes that have been proposed ...
详细信息
Prestack reverse time migration(RTM) requires extensive data storage since it computes wavefields in forward time and accesses wavefields in reverse *** first review several successful schemes that have been proposed to reduce data storage,but require more computational *** propose two effective strategies to reduce data storage during *** first strategy is based on the Nyquist sampling theorem,which involves no extra computational *** fact is that the time sampling intervals required by numerical algorithms or given by field records is generally several times smaller than that satisfied by the Nyquist sampling ***,we can correlate the source wavefields with the receiver wavefields at the Nyquist time step,which helps decrease storage of time *** second strategy is based on a lossless compression algorithm,which is widely used in computer science and information *** compression approach reduces storage significantly at a little computational *** examples show that the two proposed strategies are effective and efficient.
A cost effective, easy to manage, elastic and powerful resources over the internet is provided to the users by cloud environment. The resource pooling allows the use of same pool by multiple users through multi tenanc...
详细信息
ISBN:
(纸本)9781509012787
A cost effective, easy to manage, elastic and powerful resources over the internet is provided to the users by cloud environment. The resource pooling allows the use of same pool by multiple users through multi tenancy and virtualization technology. The VM Migration is the process of relocating a VM to another physical machine without shutting down the VM. The Virtual Migration is carried out for the number of reasons such as load balancing, fault tolerance and maintenance with respect to pooling and memory space management Memory space prediction method used to predict the free memory space and allocate the memory to the new processes or the requested user. Memory allocation then becomes a selection function of selecting appropriate memory space according to the user needs a capacity. The free memory spaces are listed in the free list It's helpful for easy allocation. During the migration phase, the contents of the VM are exposed to the network that might lead to data privacy and integrity concerns. Besides data, the space used by VM for storage and communication is also vulnerable to attackers during migration. To reduce the data loss due to attack on memory space to increase the confidentiality of the data which is migrated, here it is designed and implemented a new scheme for Virtual Machine Migration using Memory Space Prediction with compression method for storage using a cryptic methodology. The prediction based compression algorithm used to transfer data in compressed manner, it also decreases the migration time and down time and the hash algorithm used to increases the data confidentiality and security.
Current text messaging protocols over the world allow a rigid limit of 160 characters per SMS,using the default messaging system of the *** this limit is often found to be too less under ordinary circumstances and ver...
详细信息
Current text messaging protocols over the world allow a rigid limit of 160 characters per SMS,using the default messaging system of the *** this limit is often found to be too less under ordinary circumstances and very often,to communicate effectively,a concatenated message needs to be ***,coupled with exorbitant messaging rates adds to the reduced effectiveness and decrease in potential users of the Short Messaging *** Zip It Up SMS (ZIUS),we have developed our own algorithm,and been successful in compressing more data into the same message. Now every SMS can carry up to an average-best case of 250 characters,which can bring about a change in standards and prove to be a massive boost to the mobile industry.
Human vision is roughly composed of two distinct but integrated functional pathways: vision-for-recognition and vision-for-action. Likewise, display form factors can be categorized as passive viewing (e.g., office wor...
详细信息
Human vision is roughly composed of two distinct but integrated functional pathways: vision-for-recognition and vision-for-action. Likewise, display form factors can be categorized as passive viewing (e.g., office work on a computer or movie viewing on a TV) and active interaction (e.g., VR and AR in gaming). Theoretical and empirical findings suggest the encoding of visual inputs can affect by task demands. Here we evaluated two corresponding methods of measuring image quality for visual consumption. The method of measuring vision-for-recognition involves direct visual comparison to discern any degraded visual quality. Visual attention is critical in such paradigm. Conversely, a novel method of assessing visual quality for vision-for-action is to assess how visuomotor responses are facilitated or altered independent of conscious detection. We reported empirical data obtained with a gaze-contingent flicker paradigm to measure the rate of detecting visual degradation and altered eye movements. These findings show that consciously invisible changes in visual image can alter viewing eye movements and conscious decision; conversely, the possibility of detecting visual degradation can be overestimated because of artificially manipulated attention. These findings call for a new approach to measure visual quality for different form factors and task requirements.
暂无评论