Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
2016 IEEE Intl Conference on Computational Science and Engineering (CSE) and IEEE Intl Conference on Embedded and Ubiquitous Computing (EUC) and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES)
Modern transport systems rely on an increasing number of sensors to control their operation including orientation, speed, arrival and departure times, fuel consumption, passenger count etc. These have become important parts of the echo system with their availability and performance playing a key role in daily commuting. However, they produce data in high volume and frequency that need to be processed...
The article will explore the philosophical consequence on the notion of meaning of the adoption of a quantum geometry-based approach in linguistic disciplines such Information Retrieval, which importance grew with Internet and big data. The paper reconstructs an archaeology of the turn to probabilistic and a quantum perspectives in language research and its reasons, we considers some linguistic features...
This paper studies the pricing decision-making for recycling used home appliances when wholesale and retail prices for the green home appliances have already been determined by other methods. In consideration of the influences of the effective recycle behavior of the used home appliances to the whole supply chain, the paper proposes three game models about the recycle pricing for the used home appliances...
The impact of infectious disease on the humanpopulation is very dangerous as it could cause severe damage, disruption in human life and can result in many deaths. There isan immediate need for effectively managing the infectiousdiseases and stop their spreading across other regions. TheInfectious Disease management (IDM) process in a country likethe Kingdom of Saudi Arabia (KSA), which is one of thedeveloping...
In this work, we have done power analysis of Data Encryption Standard (DES) algorithm using Xilinx ISE software development kit. We have analyzed the amount of power utilized by selective components on board i.e., FPGA Artix-7, where DES algorithm is implemented. The components taken into consideration are clock power, logic power, signals power, IOs power, leakage power and supply power (dynamic...
We propose the TEMPORANA framework foranalysis of integrated scenarios aiming at studying the possibleeffects on the society of sustainable innovation policies. Theframework consists of a set of advanced temporal queries forscenario analysis and a software application. Integrated scenariosare possible future states of different aspects of the world(e.g., energy, environment, technology, economy, societal...
Automatic cell nuclei detection is a real challenge in medical imagery. The Marked Point Process (MPP) is one of the most promising scalable and paralellizable method. To handle large histopathology images, the algorithm has to be distributed. A new parallelization paradigm called Ordered Read-Write Locks (ORWL) is presented as a possible solution for solving some of the unwanted side effects of the...
In the context of a virtual reconstitution of the destroyed Royaumont abbey church, this paper investigates computer sciences issues intrinsic to the physically-based image rendering. First, a virtual model was designed from historical sources and archaeological descriptions. Then some materials physical properties were measured on remains of the church and on pieces from similar ancient churches...
Marine geologists use seismic tomography techniques to determine the 3D geophysical structure of the ocean floor. At the heart of seismic tomography methods is a forward solver used to compute minimum travel times from all locations in a earth model to sensors used in seismic experiments. The Stingray seismic raytracer was originally based on an adaption of Dijkstra's single-source shortest-path algorithm...
With the advent of clustered systems, more and more parallel computing is required. However a lot of programming skills is needed to write a parallel codes, especially when you want to benefit from the various parallel architectural resources, with heterogeneous units and complex memory organizations. We present in this paper a method that generates automatically, step by step, a task-parallel distributed...
This paper presents a method for the automatic tuning of the computation-communication overlap for a parallel one-dimensional fast Fourier transform (FFT). Parallel FFTs require intensive all-to-all communication, which affects their performance. Therefore, in the present study, an automatic tuning facility for selecting the optimal parameters of the computationcommunication overlap, the radices,...
In this paper, we propose a collaborative painting system based on the Peer-to-Peer (P2P) technology. The proposed system is built on top of the replica-based P2P file sharing system which uses a protocol called SMART as the underlying consistency maintenance mechanism. The shared space is divided into several canvases associate with files, where each user can insert a new canvas adjacent to the current...
The rapid development of Internet of Things and the current capabilities of high performance embedded systems have made them more attractive for the replacement of human personnel in hazardous or tedious duties. One such application is for guarding certain areas, such as the entrance of a warehouse for example. The aim of this work is to design an autonomous embedded security system for surveillance...
Traditionally, HPC workloads are characterized by different requirements in CPU and memory resources, which in addition vary over time in unpredictable manner. For this reason, HPC system designs, assuming physical co-location of CPU and memory on a single motherboard, strongly limit scalability, while leading to inefficient resources over-provisioning. Also, peripherals available in the system need...
Global advanced countries are committed to layout and integration wireless communication technology, platform integration, instant analysis, data add value, etc. These are the Key issues that directly affect the development of internet device. In terms of service usage situation, the service application situation of terminal consumers in the future will be connected by a ubiquitous network to all...
Maximising the network lifetime is a challenging problem in sensor networks. This paper proposes an evolutionary clustering routing algorithm for heterogeneous wireless sensor networks (WSN). The method combines genetic algorithms (GA), ant colony optimisation algorithms (ACO) and clustering method. It explores the tradeoff between the algorithm complexity and transmitted energy. Experiment results...
BUGs algorithms are navigation algorithms that have been designed to seek of a target in a plane that contains obstacles. Many new navigation algorithms have been inspired from them and their applications can be found in autonomous mobile robots, e.g., self driving vehicles. These algorithms are inspired from insects and are comparable to the motion of ants, which yields motion strategies for the...
In the era of the internet of things and full database interconnectivity, various sensitive information is gathered, stored and processed for every individual from many companies. Sometimes these datasets are made available to selected groups or to the internet users for further processing, yielding the term opened-data. However, if the dataset is not properly anonymized then sensitive information...
The Trustful Space-Time Protocol (TSTP) is an application-oriented protocol designed to resource-efficiently deliver authenticated, encrypted, timed, georeferenced, SIcompliant data communication support to IoT devices interacting with an IoT gateway, effectively defining a new API and paradigm for programming WSNs and the IoT. In this work, we describe TSTP's MAC in detail and show how it is a fundamental...
In mobile user interaction scenarios, gesture recognition applications often process inertial sensor data and run continuously to reduce latency. In this paper, we evaluate real-life efficiency gains of gesture detection on-loading onto microcontroller-based sensor subsystems (sensor hubs). To this end, we implement smartphone wakeup gestures in two ways: (1) running on the Application Processing...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.