Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
The use of Virtual Environments in system control operation, in particular power systems (power generation and propagation), provides new paradigms to daily activities of monitoring and controlling. The existence of a three-dimensional geometric model, true to the real structures, when used to develop Virtual Reality systems, allows the acquisition of mental models that improve communication between...
Key point detection is still a challenging issue in pattern recognition. With the recent developments on complex network theory, pattern recognition techniques based on graphs have improved considerably. Key point detection can be approached by community identification in directed complex network because image is related with network model. This paper presents a complex network approach for key point...
Increasingly, the application providers are using a separate fault management system that offers out-of-the-box monitoring and alarms support for application instances. A fault management system is usually distributed in nature and consists of a set of management components that does both fault detection and can trigger actions, for example, automatic restart of monitored components. Such a distributed...
A hydrological sensor network is a comprehensive monitoring system which consists of varieties of hydrological stations. The spatial optimization of the deployment of these gauging stations is critical for obtaining hydrological information effectively, given that sensing resources are often limited. In this paper, we consider the hydrological station siting problem as a continuous location problem...
In this paper, we address the problem of fault detection (FD) of chemical processes using improved generalized likelihood ratio test. The improved GLRT is the method that combines the advantages of the exponentially weighted moving average (EWMA) filter with those of the GLRT method. The idea behind the developed EWMA-GLRT is to compute a new GLRT statistic that integrates current and previous data...
The use of ubiquitous devices on large environment such as smart-cities enables opportunities to solve more complex problems and react to changes quicker. Namely the use of computational resources to assist the management of environment through predicament of parameters based on sustainable indicators applied to smart-cities. This paper considers the creation of a computational sustainability archetype...
Cloud bank concept inspired from real-time commercial bank principals are a new dynamic virtual infrastructure resource management model. There are risks in cloud banking as a commercial bank even though cloud bank deals with intangible property. Both Cloud Bank Resource Providers (CBRP) and Cloud Bank Resource Consumers (CBRC) are concerned about liquidity. CBRP desire liquidity because they want...
In this paper we introduce the scientific issues related to deploying, in a multi-Cloud architecture, an infrastructure using the publish-subscribe paradigm for orchestrating the components of a framework that execute scientific workflows in highly heterogeneous and dynamic environments. More specifically we are in search of the adequate approaches to build deployment systems for heterogeneous and...
Organizations are exposed to various cyber-attacks. When a component is exploited, the overall computed damage is impacted by the number of components the network includes. This work is focuses on estimating the Target Distribution characteristic of an attacked network. According existing security assessment models, Target Distribution is assessed by using ordinal values based on users' intuitive...
Machine learning is an increasingly important form of cognitive computing, making progress in several application areas. Machine learning often involves big data sets and is computationally challenging, requiring efficient use of resources. The use of cloud computing as the platform for machine learning offers advantages of scalability and efficient use of hardware. It may, however, be difficult to...
Following the Service-Oriented Architecture, a large number of diversified Cloud services are exposed as Web APIs (Application Program Interface), which serve as the contracts between the service providers and service consumers. Due to their massive and broad applications, any flaw in the cloud APIs may lead to serious consequences. API testing is thus necessary to ensure the availability, reliability,...
Cloud computing provides an opportunity for individuals and organizations to extend their capabilities by offering elastic computing resources. Trust is a major challenge in cloud computing. With trust, cloud users (trustees) can select the best available resources from cloud service providers (trustors) who in turn can evaluate users' behaviors and recommend users to other services. In this paper,...
The advances in virtual engineering brought about the creation of models of physical systems. This has been enhanced by the use of relevant standards and web technologies to develop interfaces for monitoring and controlling industrial systems at the shop floor or remotely over the internet. However, owing to the open nature of the internet as well as vulnerabilities associated with internet-based...
Satellite can provide remote sensing data for disaster monitoring, and various sensors are generating huge volumes of remote sensing data for disaster management. It is urgent to store and process massive data acquired by satellite as fast as possible. A flexible and rapid service platform can realize integrated services from data acquisition, data production and product visualization. This article...
Reproducibility of the execution of scientific applications on parallel and distributed systems is a growing interest, underlying the trustworthiness of the experiments and the conclusions derived from experiments. Dynamic loop scheduling (DLS) techniques are an effective approach towards performance improvement of scientific applications via load balancing. These techniques address algorithmic and...
Current Nyiragongo Volcano observatory systems yield poor monitoring quality due to unpredictable dynamics of volcanic activities and limited sensing capability of existing sensors (seismometers, acoustic microphones, GPS, tilt-meter, optical thermal, and gas flux).The sensor node has limited processing capacity and memory. So if some tasks from the sensor nodes can be uploaded to the server of cloud...
Cloud environments are criticized for their volatility in performance aspects, making it extremely difficult for time- critical applications owners to perform the decisive step for migration and owners of SaaS to present performance vs cost tradeoffs to their customers when acting as IaaS customers. The aim of this work is to present an architectural approach based on which a)IaaS providers may enhance...
This research focuses on improving business process worked under workflow simulation. In the business process, there are several properties to be considered such as person, cost, time. The current workflow simulation cannot combine these properties to simulate the situation for business decision making. In this paper, the improving business workflow simulation is proposed by adding the business properties...
Several approaches to protect data and code, and ensure execution in a secure environment without getting infected from malwares, such as isolation, sandboxing, trust-based execution, application oriented access control have been proposed. In recent times, hardware-based solutions like ARM TrustZone and Intel SGX Enclave have been introduced to protect code and data from being infected or modified...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.