The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Modern mining approaches should be able to properly deal with the increased availability of structured data. Here we focus on the problem of processing streams of trees. Specifically, we cope with classification tasks. We show that by adopting a double concept drifting reaction mechanism in the context of a kernel-based ensemble of classifiers, it is actually possible to have an effective and efficient...
Due to the inherent property of the processing resource request from mobile active or passive devices as part of internet of things (IoT), processing capacity as well as latency become major optimization criteria. To achieve overall optimized uses of cloud resources - having dynamic tracking, monitoring as well as orchestration framework is one of the key challenges to overcome. In the same context,...
This paper reports a development of a statistical approach for fault detection and diagnosis in a PV system. Specifically, the overarching goal of this work is to early detect and identify faults on the DC side of a PV system (e.g., short-circuit faults; open-circuit faults; and partial shading faults). Towards this end, we apply exponentially-weighted moving average (EWMA) control chart on the residuals...
The enormous growth of information on the Internet makes finding information challenging and time consuming. Recommender systems provide a solution to this problem by automatically capturing user interests and recommending related information the user may also find interesting. In this paper, we present a novel recommender system for the research paper domain using a Dynamic Normalized Tree of Concepts...
In this paper a novel partition-based state prediction method is proposed for interconnected stochastic systems using sensor networks. Each sensor locally computes a prediction of the state of the monitored subsystem based on the knowledge of the local model and the communication with neighboring nodes of the sensor network. The prediction is performed in a distributed way, not requiring a centralized...
False and nuisance alarms are major problems in the process industry. Generalized delay-timer is an effective technique to improve the performance of an alarm system. However, due to the increasing intermediate states, computation of the performance indices, false alarm rate (FAR), missed alarm rate (MAR) and expected detection delay (EDD), is hard and unsolved for generalized delay-timer. In this...
In the process of large-scale chemical engineering, more useful industrial process information can be obtained by increasing measuring variables, defined as system features. However, the increase in amount of features will lead to the high computation cost and reduce the efficiency of the process monitoring system. To solve this issue, those features that are redundant or bring an incorrect result...
Estimations show that the worldwide carbon footprint produced by communication networks is 2percent in 2007 and is expected to grow to 4 percent by 2020. Choosing effective green computing hardware and software resources can reduce carbon footprint, save money and improve the reuse cycle. There are many studies conducted globally to motivate people to monitor energy consumption by computing resources...
Today the technology advancement in communication technology permits a malware author to introduce code obfuscation technique, for example, Application Programming Interface (API) hook, to make detecting the footprints of their code more difficult. A signature-based model such as Antivirus software is not effective against such attacks. In this paper, an API graph-based model is proposed with the...
Mobile cloud computing (MCC) has emerged as a solution to overcome the resource constraints of mobile devices by using computation offloading to execute mobile application tasks on remote servers, thus enhancing performance and reducing the energy consumption of mobile devices. Nevertheless, the effectiveness of an offloading solution is determined by its ability to infer when offloading will improve...
Illegal dumping has been a chronicle problem in many cities in the world. The odors and contaminants caused by abandoned household items and dumped garbage, and construction leftovers not only ruin the city view but also threaten citizens health. To reduce the illegal dumping, a few cities have designed community-based voluntary reporting systems and surveillancecamera-based monitoring systems. However,...
In this paper, we propose and study the problem of top-m rank aggregation of spatial objects in streaming queries, where, given a set of objects O, a stream of spatial queries (kNN or range), the goal is to report the m objects with the highest aggregate rank. The rank of an object with respect to an individual query is computed based on its distance from the query location, and the aggregate rank...
Flood affects crucially in most of the countries every year. Hence, there is a need to develop mechanism to control flood in order to save precious lives, property, and to improve economic condition of a country. This work presents the use of Wireless Sensor and Actor Networks (WSANs) to monitor continuously and control the flood. This is because sensors have a capability to sense the environment...
Cloud computing has become in few years one of the major and important research direction and development area in IT (Information Technology) and Computer Science because of the implication of both technology teams (Engineers, Researchers, etc.) and Business Stakeholders in several and various domains (Health, Communication, Finance and so forth). Lot of IT infrastructure, assets and business processes...
Containers are rapidly replacing Virtual Machines (VMs) as the compute instance of choice in cloud-based deployments. The significantly lower overhead of deploying containers (compared to VMs) has often been cited as one reason for this. We analyse performance of the Kubernetes system and develop a Reference net-based model of resource management within this system. Our model is characterised using...
This paper considers the problem of quickest detection of a change in distribution under the assumption that the pre-change distribution π is known, and the post-change distribution μ is unknown and belongs to a general class of distributions. Using the knowledge of the pre-change distribution π, the sample space is partitioned into equiprobable intervals and the number of samples falling into each...
Automatic tracking of rodents' behaviors over time in their home cages is of great interest in psycho-physiological studies. The commercially-available animal monitoring systems use RGB videos or bio-potential signals to monitor behaviors of animals when exploring their surroundings. The based models of these devices starts from several thousands of dollars and the cost would increase if extra analysis...
Nutrition related health conditions can seriously decrease quality of life; a system able to monitor the kitchen activities and eating behaviour of patients could provide clinicians with important indicators for improving a patient's condition. To achieve this, the system has to reason about the person's actions and goals. To address this challenge, we present a behaviour recognition approach that...
The distributed shared memory (DSM)-based computation offloading scheme allows collaborative multiple threads to dynamically migrate and execute across a mobile device and computing nodes. Despite this strong advantage, it misses a significant portion of the potential performance gain because the traditional DSM model is suboptimal for computation offloading. This paper proposes an enhanced DSM model...
Exascale computing represents the next leap in the HPC race. Reaching this level of performance is subject to several engineering challenges such as energy consumption, equipment-cooling, reliability and massive parallelism. Model-based optimization is an essential tool in the design process and control of energy efficient, reliable and thermally constrained systems. However, in the Exascale domain,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.