The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the large-scale Wireless Metropolitan Area Network (WMAN) consisting of many wireless Access Points (APs),choosing the appropriate position to place cloudlet is very important for reducing the user's access delay. For service provider, it isalways very costly to deployment cloudlets. How many cloudletsshould be placed in a WMAN and how much resource eachcloudlet should have is very important for...
Although fuzzy c-means algorithm has shown great capability to spherical clusters, it can not perform very well on non-spherical data sets yet. To deal with this problem, kernel-based fuzzy clustering has been presented by mapping data points into a high-dimensional Hilbert space with kernel functions. However, the computational complexity of kernel matrix is always quadratic, usually makes kernel...
Memory error protection is increasingly important as memory density and capacity continue to scale. This paper presents a memory SEP (Selective Memory Protection) design that enables SEP for commodity memory modules, with no change to the modules or devices. Memory error protection is provided through embedded ECC, a recently proposed, energy-efficient ECC memory organization. The memory SEP design...
Memory system reliability is increasingly a concern as memory cell density and capacity continue to grow. The conventional approach is to use redundant memory bits for error detection and correction, with significant storage, cost and power overheads. In this paper, we propose a novel, system-level scheme called MemGuard for memory error detection. With OS-based checkpointing, it is also able to recover...
Data security has become a major subject in the cloud computing. Data integrity verification allows clients know whether the data storing in the cloud is secure or not. And data recovery also provides a reliable guarantee for the clients. However, the pre-processing for the files such as the works of hash, blocks' signature, and redundancy generation and data recovery causes a great challenge to the...
In the traditional school education, learning group promotes learning well, so people want personalized learning system to have the function of group learning automatically. Learning from cognitive psychology, learning style theory and constructivist learning theory, this paper selects learning interest, learning capability, learning style, learning activity, sex and age as the factors of user personality...
In this paper, a novel P2P network model for cloud computing is proposed to prevent the "calculation capacity" from being controlled by a few tycoons. The common users can become a part of "cloud" by joining as nodes. To solve "free-ride" and "the tragedy of commons" arising from p2p network model, "cloud" is divided into many clusters, and the incentive...
To solve the problem of urban congestion, various vehicles management technology have been developed vigorously, such as the parking management system development is relatively mature, also using of the varied technology. This paper focuses on edge detection which are based on the static image preprocessing. Edge detection makes use of Roberts operator mostly, and the operator has been improved in-depth...
In this paper, a formal description of knowledge element is given. On the basis of the formal description, a preliminary research about knowledge element acquisition method of emergency management system is proposed. For the characteristics of emergency management knowledge which is multi-field, multidisciplinary, multi-granularity and multi-dimensional, the knowledge element acquisition method is...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.