Network configuration, performance, and congestion impact the Quality of Service (QoS) of Moodle Learning Management System (LMS). Moreover, LMSs composing modules have different QoS demands for each activity. Upon a ...
详细信息
Software-Defined Networking (SDN) paradigm has decoupled data and control planes on traditional networks. In this context, a logically-centralized controller, with full knowledge on network resources and traffic loads...
详细信息
Water supply utilities have been increasingly looking for solutions to reduce water wastage. Many efforts have been made aiming to promote a better management of this resource. Fraud detection is one of these actions,...
详细信息
ISBN:
(纸本)9781450344869
Water supply utilities have been increasingly looking for solutions to reduce water wastage. Many efforts have been made aiming to promote a better management of this resource. Fraud detection is one of these actions, as the irregular violations are usually held precariously, thus, causing leaks. In this context, the use of technology in order to automate the identification of potential frauds can be an important support tool to avoid water waste. Thus, this research aims to apply pattern recognition techniques in the implementation of an automated detection of suspected irregularities cases in water meters, through image analysis. The proposed computer vision system is composed of three steps: the detection of the water meter location, obtained by OPF classifier and HOG descriptor, detecting the seals through morphological image processing and segmentation methods;and the classification of frauds, in which the condition of the water meter seals is assessed. We validated the proposed framework using a dataset containing images of water meter inspections. At the last step, the proposed framework reached an average accuracy up to 81.29%. We concluded that a computer vision system is a promising strategy and has potential to benefit the analysis of fraud detection. Copyright 2017 ACM.
The use of fragment insertion in the protein structure prediction problem can be considered one of the most successful strategies to add problem-dependent information. The well known Rosetta suite provides two protoco...
详细信息
Internet of Things, or IoT, is a new revolution of the Internet, supporting a connection between objects and humans yet more strong. This area is known by the huge quantity of data that can be generated from the RFID ...
详细信息
One of the main objectives in multimodal optimization is to find multiple optima solutions in a search space. Hence, population-based metaheuristics are suitable for this class of problems but their loss of diversity ...
详细信息
Virtual infrastructures (VIs) consolidated the dynamic provisioning of computing and communication resources. A VI is a set of virtual machines interconnected by virtual links and switches/routers. Infrastructure prov...
详细信息
Data centers have networks that provide, for a large number of users, various services such as video streaming, financial services, file storage, among others. Like any network-based system, a Data Center (DC) is subj...
详细信息
Infrastructure-as-a-service clouds enable customers to use computing resources in a flexible manner to satisfy their needs, and pay only for the allocated resources. One challenge for IaaS customers is the correct pro...
详细信息
Infrastructure-as-a-service clouds enable customers to use computing resources in a flexible manner to satisfy their needs, and pay only for the allocated resources. One challenge for IaaS customers is the correct provisioning of their resources. Many users end up underprovisioning, hurting application performance, or overprovisioning, paying for resources that are not really necessary. Memory is an essential resource for any computing system, and is frequently a performance-limiting factor in cloud environments. In this work, we propose a model that enables cloud customers to determine whether the memory allocated to their virtual machines is correctly provisioned, underprovisioned, or overprovisioned. The model uses two metrics collected inside a VM, resident and committed memory, and defines thresholds for these metrics that characterize each provisioning level. Experimental results with Linux guests on Xen, running four benchmarks with different workloads and varying memory capacity, show that the model was able to accurately diagnose memory provisioning in 98% of the scenarios evaluated. Copyright 2013 by the Authors.
The mobile games market has grown in relevancy compared to traditional gaming platforms. The standard architecture for these games requires the processing of game logic and graphics using the device's own hardware...
详细信息
暂无评论