In resource-flow systems, e.g. production lines, agents are processing resources by applying capabilities to them in a given order. Such systems profit from self-organization as they become easier to manage and more r...
In resource-flow systems, e.g. production lines, agents are processing resources by applying capabilities to them in a given order. Such systems profit from self-organization as they become easier to manage and more robust against failures. This paper proposes a decentralized coordination process that restores a system's functionality after a failure by propagating information about the error through the system until a fitting agent is found that is able to perform the required function. The mechanism has been designed by combining a top-down design approach for self-organizing resource-flow system and a systemic modeling approach for the design of decentralized, distributed coordination mechanisms. The systematic conception of the inter-agent process is demonstrated. Evaluations of convergence as well as performance are performed by simulations.
Julia sets are considered one of the most attractive fractals and have wide range of applications in science and engineering. Jrgyris et al. [4] have studied the ef fect of dynamic noise on Julia sets and concluded th...
详细信息
This paper focus on the development of Expediency Fuel Consumption Cost Simulator (EFCCS). EFCCS is automated software that calculates the total amount of fuel cost for a car to travel based on the distance given, dri...
详细信息
This paper focus on the development of Expediency Fuel Consumption Cost Simulator (EFCCS). EFCCS is automated software that calculates the total amount of fuel cost for a car to travel based on the distance given, driving speed, weight capacity and current market fuel price cost. This software simulator has been developed by using Visual *** language and SQL Server database system. By deploying EFCCS, users obtain a summary and the best solution to estimate the minimum cost towards the desired destination.
This research proposes a new artificial intelligence strategy to enhance software games based on heart rate variability. The model consists of two modules (visual learning and IQ test) that will conjoined with a biofe...
详细信息
This research proposes a new artificial intelligence strategy to enhance software games based on heart rate variability. The model consists of two modules (visual learning and IQ test) that will conjoined with a biofeedback device connected to a computer to monitor student heart rate and record its changes in a stressful situation and generate appropriate reports. By playing these two games student will be able to improve their learning capability and control their heart rate variability.
The birth of remarkable advance in the development of computer and hardware in computer world has enables us to access information anytime and anywhere regardless of the geography factor. Therefore, replication in dis...
详细信息
The birth of remarkable advance in the development of computer and hardware in computer world has enables us to access information anytime and anywhere regardless of the geography factor. Therefore, replication in distributed system environment has become increasingly popular due to its high degree of availability, fault tolerance and enhance the performance of a system. Read-One-Write-All Monitoring Synchronization Transaction System (ROWA-MSTS) has been developed to monitor data replication and transaction perform in distributed system environment. This paper presents a new algorithm to manage replication and transaction using ROWA-MSTS. The propose algorithm through ROWA-MSTS by deploying real time application in distributed systems environment. The propose algorithm implementation shows that ROWA-MSTS able to monitor the replicated data distribution while maintaining the data consistency over multiple sites.
Real time application with replicated data in grid environment has received particular attention for providing efficient access, fault tolerance and enhance the performance of the system. This paper presents the new f...
详细信息
Real time application with replicated data in grid environment has received particular attention for providing efficient access, fault tolerance and enhance the performance of the system. This paper presents the new failure semantic to manage neighbour replication data in distributed environment. The failure semantic classes include the transaction abort and system failures. We address how to build reliable system for managing replication and transaction based on Neighbour Replication Grid (NRG) Transaction Model in terms to preserve the data consistency and support fault tolerance when exists the neighbour replica failure in quorum. In addition, we present an implementation of the propose failure semantic through NRG daemon by deploying real time application in distributed systems. The implementation shows that managing transactions on NRG through the failure semantic provides fault tolerance capabilities that allow it to withstand failure both in handling quorum locking and the transaction execution.
Replication in distributed environment has become increasingly popular due to its high degree of availability, fault tolerance and enhance the performance of a system. These advantages of replication are important bec...
详细信息
ISBN:
(纸本)9781424469925;9780769540436
Replication in distributed environment has become increasingly popular due to its high degree of availability, fault tolerance and enhance the performance of a system. These advantages of replication are important because it enables organizations to provide users with access to current data where and when user needed at anytime or anywhere, even if the users are geographically remote. However, this way of data organization introduces low data consistency among replicas when changes are made during transactions. Therefore, a system to monitor data replication in distributed system environment arises. Read-One-Write-All Monitoring Synchronization Transaction System (ROWA-MSTS) has been developed to solve this problem. By using this system, it helps to monitor the replicated data distribution over multiple sites while maintaining the data consistency.
This research paper discussed the usage of watermarking in medical images to ensure the authenticity and integrity of the image and reviewed some watermarking schemes that had been developed. A design of a reversible ...
详细信息
This research paper discussed the usage of watermarking in medical images to ensure the authenticity and integrity of the image and reviewed some watermarking schemes that had been developed. A design of a reversible tamper detection and recovery watermarking scheme was then proposed. The watermarking scheme uses a 640x480x8 bits ultrasound grayscale image as a sample. The concept of ROI (Region Of Interest) and RONI (Region Of Non Interest) were applied. Watermark embedded can be used to detect tampering and recovery of the image can be done. The watermark is also reversible.
This research paper discussed the usage of watermarking in medical images to ensure the authenticity and integrity of the image and reviewed some watermarking schemes that had been developed. A design of a reversible ...
详细信息
This research paper discussed the usage of watermarking in medical images to ensure the authenticity and integrity of the image and reviewed some watermarking schemes that had been developed. A design of a reversible tamper detection and recovery watermarking scheme was then proposed. The watermarking scheme uses a 640×480×8 bits ultrasound grayscale image as a sample. The concept of ROI (Region Of Interest) and RONI (Region Of Non Interest) were applied. Watermark embedded can be used to detect tampering and recovery of the image can be done. The watermark is also reversible.
Watermarking had been proven to be able to protect medical images from unauthorized tampering and modification. Numerous watermarking schemes are available for different purposes depending on the security needs. Water...
详细信息
ISBN:
(纸本)9781424469925;9780769540436
Watermarking had been proven to be able to protect medical images from unauthorized tampering and modification. Numerous watermarking schemes are available for different purposes depending on the security needs. Watermark embedding and detection process need to be performed in an efficient manner so that the operation of the health institution is not affected. This paper will focus on the development of a watermark embedding and detection application using existing tools from the design point of view to operate in a PACS (Picture Archiving and Communication systems) environment.
暂无评论