The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
For the convenience of collaborative design, virtual construction, construction process simulation and management, Building Information Modeling (BIM) is becoming an important tool in civil engineering. The current BIM team seems to neglect the geotechnical aspect of the model, which can result in costly mistakes, especially when the project is infrastructure based. The barrier between the BIM team...
Nowadays with booming of sensor technology, location big data exhibit as high complexity, massive volume, real-time and stream-based characteristic. The current workflow systems are facing the challenge hardly to efficiently process the real-time location big data like trajectory stream. Online compression method is an available solution to preprocess these trajectory data in order to speed up the...
Today, data-intensive applications rely on geographically distributed systems to leverage data collection, storing and processing. Data locality has been seen as a prominent technique to improve application performance and reduce the impact of network latency by scheduling jobs directly in the nodes hosting the data to be processed. MapReduce and Dryad are examples of frameworks which exploit locality...
Dependability is an important quality attribute for today’s software systems, and the decisions made at the architectural design stage play a key role in the dependability of software products. Architecture-level dependability evaluation techniques are effective only if they support a practical architecture modelling notation and consider the impact of execution environment, error propagation and...
Recommender systems were first conceived to provide suggestions of interesting items to users. The evolution of such systems provided an understanding that a recommender system is currently used to diverse objectives. One of the current challenges in the field is to have approaches of recommendation that go beyond accuracy metrics. Since it is a very recent interest of the community, this review,...
We address in this paper the task-scheduling in cloud computing. This problem is known to be $${\mathcal {NP}}$$ NP -hard due to its combinatorial aspect. The main role of our model is to estimate the time needed to run a set of tasks in cloud and in turn reduces the processing cost. We propose a genetic approach for modelling and optimizing a task-scheduling problem in cloud computing. The experimental...
With the natural characteristics of Opportunistic networks (OppNets) where delivery is delayed with frequent disconnections between mobile nodes in dynamically changing routes to destinations, malicious nodes can perform selective packet dropping attacks easily without been identified easily. This is why securing the data flow without any loss becomes challenging in OppNets. In this paper, we present...
The cloud brings new possibilities to run traditional HPC applications, giving its flexibility and reduced cost. However, running MPI applications in the cloud can reduce appreciably its performance, because the cloud hides its internal network topology information, and existing topology-aware techniques to optimize MPI communications cannot be directly applied to virtualized infrastructures. In this...
In many applications of Wireless Sensor Networks (WSNs), the network has a few mobile sinks in addition to a large number of static sensor nodes that gather information from their surrounding environment. The static sensor nodes in such applications use a location service to find the location of a mobile sink. Most of the proposed location services are useful in mobile ad hoc networks and are not...
Wireless Body Area Network (WBAN) constitutes a set of sensor nodes responsible for monitoring human physiological activities and actions. The increasing demand for real time applications in such networks stimulates many research activities in quality-of-service (QoS) based routing for data delivery. Designing such scheme of critical events while preserving the energy efficiency is a challenging task...
Keyword search on XML document has received wide attention. Many search semantics and algorithms have been proposed for XML keyword queries. But the existing approaches fall short in their abilities to support keyword queries over fuzzy XML documents. To overcome this limitation, in this paper, we discuss how to obtain and evaluate top-k smallest lowest common ancestor (SLCA) results of keyword queries...
Most of recent research in multicore processor architectures has been shifted towards reconfigurable architectures due to increasing complexity of computing systems. These systems provide better application-specific energy and throughput balance with their reconfigurable behavior. They perform automatic run time resource allocation for an application as per its needs. But in terms of performance,...
A novel approach to generation of parallel synchronization-free tiled code for the loop nest is presented. It is derived via a combination of the Polyhedral and Iteration Space Slicing frameworks. It uses the transitive closure of loop nest dependence graphs to carry out corrections of original rectangular tiles so that all dependences of the original loop nest are preserved under the lexicographic...
In the big data era, servitization becomes one of the important development trends of the IT world. More and more software resources are developed and existed in the format as services on the Internet. These services from multi-domains and multi-networks are converged as a huge complicated service network or ecosystem, which can be called as Big Service. How to reuse the abundant open service resources...
The high sensitivity, stability, selectivity and adaptivity of mailman olfactory system is a result of a large number of olfactory receptors feeding into extensive layers of neural processing units. Olfactory receptor cells (ORC) contribute significantly in the sense of smells. Bloodhounds have 4 billion ORC making them ideal for tracking while human has about 30 million ORC. E-nose stability, sensitivity...
With the development of e-commerce, online shopping becomes increasingly popular. Very often, online shopping customers read reviews written by other customers to compare similar items. However, the number of customer reviews is typically too large to look through in a reasonable amount of time. To extract information that can be used for online shopping decision support, this paper investigates a...
Time-course correlation patterns can be positive or negative, and time-lagged with gaps. Mining all these correlation patterns help to gain broad insights on variable dependencies. Here, we prove that diverse types of correlation patterns can be represented by a generalized form of positive correlation patterns. We prove a correspondence between positive correlation patterns and sequential patterns,...
Hierarchical clustering with data field can find clusters with various shape and filter the noises in data set without input parameters. However, its clustering process is complex and cannot effectively deal with complex and high dimensional data. In this paper, a novel clustering algorithm is proposed by differencing potential (DP) of data field. The potential difference specifies the nearest object...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.