In this paper, we address the problem of virtual machine (VM) placement in an InterCloud with regard to the reduction of carbon footprint in such computing environment. In order to minimize the data center Greenhouse ...
详细信息
In this paper, we address the problem of virtual machine (VM) placement in an InterCloud with regard to the reduction of carbon footprint in such computing environment. In order to minimize the data center Greenhouse Gas (GhG) emissions, this paper proposes a new mathematical formulation, where the placement approach is stated as a mixed integer programming problem which aims at minimizing the overall carbon footprint of the InterCloud. The proposed formulation presents an accurate carbon footprint evaluation based on joint optimization techniques, such as workload consolidation and cooling efficiency maximization, while considering the greenness of the data centers and the dynamic behavior of the IT equipment cooling fans. Simulation results showed that our model leads to optimal configurations with minimal carbon footprint in the InterCloud environment.
Search-based software project management is a hot research point in softwareengineering. Based on the event-based scheduler (EBS) we have proposed in previous work [1], this paper intends to further propose a two-pha...
详细信息
ISBN:
(纸本)9781450328814
Search-based software project management is a hot research point in softwareengineering. Based on the event-based scheduler (EBS) we have proposed in previous work [1], this paper intends to further propose a two-phase particle swarm optimization approach which uses a set-based representation for task scheduling and an integer representation for workload assignment scheduling to improve planning performance. Experimental results on 83 instances demonstrate the effectiveness of the proposed approach.
Requirements written in multiple languages can lead to error-proneness, inconsistency and incorrectness. In a Malaysian setting, software engineers are exposed to both Malay and English requirements. This can be a cha...
详细信息
The main theme of this paper is performing online handwriting recognition for Arabic character using back propagation neural network and it experiments the performance of it using online features of characters as inpu...
详细信息
The main theme of this paper is performing online handwriting recognition for Arabic character using back propagation neural network and it experiments the performance of it using online features of characters as input to the BPNN in comparison with combining online and offline character features as the input. That's done through the following stages : online data acquisition, online & offline preprocessing, online & offline feature extraction (directional & geometric features), classification using back propagation neural network to classify the character to one of 15 character classes and finally, delayed strokes handling using logic programming to recognize the character according to the character class and its delayed strokes accounts and positions.
This is Part II in a two-part series discussing the development of investigative support for information confidentiality. In Part I, we proposed a technique based on relation algebra to detect confidential information...
详细信息
This is Part II in a two-part series discussing the development of investigative support for information confidentiality. In Part I, we proposed a technique based on relation algebra to detect confidential information leakage via protocol-based covert channels. In this paper, we continue developing investigative support for information confidentiality. We examine the application of the technique for detecting confidential information leakage proposed in Part I in cryptanalysis and digital forensics to highlight its usefulness beyond the scope of covert channel analysis. By way of a short case study, we show the automation of the cryptanalysis application of the technique for detecting confidential information leakage using a prototype tool and a known-plaintext attack.
This is Part I in a two-part series discussing the development of investigative support for information confidentiality. In this paper, we propose a technique to detect confidential information leakage via protocol-ba...
详细信息
This is Part I in a two-part series discussing the development of investigative support for information confidentiality. In this paper, we propose a technique to detect confidential information leakage via protocol-based covert channels based on relation algebra. It provides tests to verify the existence of an information leakage via a monitored covert channel as well as computations which show how the information was leaked if a leakage exists. We also report on a prototype tool that allows for the automation of the proposed technique. Our focus is limited to protocol-based covert channels and instances where covert channel users modulate the sent information by some form of encoding such as encryption.
In this paper, we propose a new learning algorithm, named as the Cooperative and Geometric Learning Algorithm (CGLA), to solve problems of maneuverability, collision avoidance and information sharing in path planning ...
详细信息
The objective behind building domain-specific visual languages (DSVLs) is to provide users with the most appropriate concepts and notations that best fit with their domain and experience. However, the existing DSVL de...
详细信息
The objective behind building domain-specific visual languages (DSVLs) is to provide users with the most appropriate concepts and notations that best fit with their domain and experience. However, the existing DSVL designers do not support integrating environment and user context information when modeling, editing or viewing DSVL models at different locations, permissions, devices, etc. In this paper, we introduce HorusCML, a context-aware DSVL designer, which supports DSVL experts in integrating necessary context details within their DSVLs. The resultant DSVLs can reflect different facets, layouts, and behaviours according to context it is used in. We show a case study on developing a context-aware data flow diagram DSVL tool using HorusCML.
Facial expressions form a significant part of our nonverbal communications and understanding them is essential for effective human computer interaction. Due to the diversity of facial geometry and expressions, automat...
详细信息
ISBN:
(纸本)9781479949847
Facial expressions form a significant part of our nonverbal communications and understanding them is essential for effective human computer interaction. Due to the diversity of facial geometry and expressions, automatic expression recognition is a challenging task. This paper deals with the problem of person-independent facial expression recognition from a single 3D scan. We consider only the 3D shape because facial expressions are mostly encoded in facial geometry deformations rather than textures. Unlike the majority of existing works, our method is fully automatic including the detection of landmarks. We detect the four eye corners and nose tip in real time on the depth image and its gradients using Haar-like features and AdaBoost classifier. From these five points, another 25 heuristic points are defined to extract local depth features for representing facial expressions. The depth features are projected to a lower dimensional linear subspace where feature selection is performed by maximizing their relevance and minimizing their redundancy. The selected features are then used to train a multi-class SVM for the final classification. Experiments on the benchmark BU-3DFE database show that the proposed method outperforms existing automatic techniques, and is comparable even to the approaches using manual landmarks.
This report summarises recent progress in the research of its co-authors towards the construction of links between algebraic presentations of the principles of programming and the exploitation of concurrency in modern...
详细信息
暂无评论