Non-negative matrix factorization (NMF) has been a popular data analysis tool and has been widely applied in computer vision. However, conventional NMF methods cannot adaptively learn grouping structure froma *** pape...
详细信息
Principal component analysis (PCA) projects data on the directions with maximal variances. Since PCA is quite effective in dimension reduction, it has been widely used in computer vision. However, conventional PCA suf...
详细信息
Today cloud security and privacy concerns pose significant challenges. One particular challenge consists in how to take into consideration the user's security policies while accessing the outsourced data. In fact,...
详细信息
Today cloud security and privacy concerns pose significant challenges. One particular challenge consists in how to take into consideration the user's security policies while accessing the outsourced data. In fact, for a given application, we may have a set of rules, as high level security policy, which needs to hold prior to any query execution. Therefore, the main problem that we tackle in this ongoing project is how to enforce this high level security policy in the cloud storage layer without conflicts. To address this challenges, we propose a middleware denoted curlX which consists of two main processes: the security policy enforcement process and the verification process.
The saturation of Emergency departments, due to the increasing demand of the service, is a current problem in the healthcare system. We propose an analytical model to obtain information from data obtained through the ...
详细信息
ISBN:
(纸本)9781467397414
The saturation of Emergency departments, due to the increasing demand of the service, is a current problem in the healthcare system. We propose an analytical model to obtain information from data obtained through the simulation of a Hospital Emergency department. The model defines how to calculate the theoretical throughput of a particular sanitary staff configuration, that is, the number of patients it can attend per unit time given its composition. This index is a reference to measure indicators concerning to performance and emergency response capacity of the system. The data for the analysis will be generated by the simulation of any possible scenario of the real system, taking into account all valid sanitary staff configurations and different number of patients entering into the emergency service.
Due to the complexity and crucial role of an Emergency department(ED) in the healthcare system. The ability to more accurately represent, simulate and predict performance of ED will be invaluable for decision makers t...
详细信息
Due to the complexity and crucial role of an Emergency department(ED) in the healthcare system. The ability to more accurately represent, simulate and predict performance of ED will be invaluable for decision makers to solve management problems. One way to realize this requirement is by modeling and simulating the emergency department, the objective of this research is to design a simulator, in order to better understand the bottleneck of ED performance and provide ability to predict such performance on defined condition. Agent-based modeling approach was used to model the healthcare staff, patient and physical resources in ED. This agent-based simulator provides the advantage of knowing the behavior of an ED system from the micro-level interactions among its components. The model was built in collaboration with healthcare staff in a typical ED and has been implemented and verified in a Netlogo modeling environment. Case studies are provided to present some capabilities of the simulator in quantitive analysis ED behavior and supporting decision making. Because of the complexity of the system, high performance computing technology was used to increase the number of studied scenarios and reduce execution time.
Mobile Ad hoc NETwork (MANET) is a type of wireless network consisting of a set of self-configured mobile hosts that can communicate with each other using wireless links without the assistance of any fixed infrastruct...
详细信息
Mobile Ad hoc NETwork (MANET) is a type of wireless network consisting of a set of self-configured mobile hosts that can communicate with each other using wireless links without the assistance of any fixed infrastructure. This has made possible to create a distributed mobile computing application and has also brought several new challenges in distributed algorithm design. Checkpointing is a well explored fault tolerance technique for the wired and cellular mobile networks. However, it is not directly applicable to MANET due to its dynamic topology, limited availability of stable storage, partitioning and the absence of fixed infrastructure. In this paper, we propose an adaptive, coordinated and non-blocking checkpointing algorithm to provide fault tolerance in cluster based MANET, where only minimum number of mobile hosts in the cluster should take checkpoints. The performance analysis and simulation results show that the proposed scheme performs well compared to works related.
In healthcare environments we can find several microorganisms causing nosocomial infection, and of which one of the most common and most dangerous is Methicillin-resistant Staphylococcus Aureus. Its presence can lead ...
详细信息
In healthcare environments we can find several microorganisms causing nosocomial infection, and of which one of the most common and most dangerous is Methicillin-resistant Staphylococcus Aureus. Its presence can lead to serious complications to the *** work uses Agent Based Modeling and Simulation techniques to build the model and the simulation of Methicillin-resistant Staphylococcus Aureus contact transmission in emergency departments. The simulator allows us to build virtual scenarios with the aim of understanding the phenomenon of MRSA transmission and the potential impact of the implementation of different measures in propagation rates.
Recently, some general frameworks have been proposed as unifying theories for processes combining non-determinism with quantitative aspects (such as probabilistic or stochastically timed executions), aiming to provide...
详细信息
Complex cloud services rely on different elasticity control processes to deal with dynamic requirement changes and workloads. However, enforcing an elasticity control process to a cloud service does not always lead to...
详细信息
Regarding energy efficiency, resource management in complex hard- And software systems that is based on the information typically available to the OS alone does not yield best results. Nevertheless, general-purpose re...
详细信息
ISBN:
(纸本)9781450332323
Regarding energy efficiency, resource management in complex hard- And software systems that is based on the information typically available to the OS alone does not yield best results. Nevertheless, general-purpose resource management should stay independent of application-specific information. To resolve this dilemma, we propose a generic, ontologybased approach to resource scheduling that is context-aware and takes information of running applications into account. The central task here is to recognize situations that might necessitate an adaptation of resource scheduling. This task is performed by logical reasoning over OWL ontologies. Our initial study shows that current OWL 2 EL reasoner systems can perform recognition of exemplary situations relevant to resource management within 4 seconds. Copyright 2014 ACM.
暂无评论