Title: Green cloud computing schemes based on networks: a survey
Authors: N Xiong , W Han A Vandenberg
Abstract: The authors are particularly aware that green cloud computing (GCC) is a broad range and a hot ?eld. The distinction between ?consumer of? and ?provider of? cloud-based energy resources may very important in creating a world-wide ecosystem of GCC. A user simply submits its service request to the cloud service provider with the connection of Internet or wired/wireless networks. The result of the requested service is delivered back to the user in time, whereas the information storage and process, interoperating protocols, service composition, communications and distributed computing, are all smoothly interactive by the networks. In this study, this is a survey on GCC schemes based on networks. The concept and history of Green computing were introduced ?rst, and then focus on the challenge and requirement of cloud computing. Cloud computing needs to become green, which means provisioning cloud service while considering energy consumption under a set of energy consumption criteria and it is called GCC. Furthermore, the recent work done in GCC based on networks, including microprocessors, task scheduling algorithms, virtualisation technology, cooling systems, networks and disk storage were introduced. After that, the works on GCC from their research group was presented in Georgia State University. Finally, the conclusion and some future works were given.
Title: Design of Command, Data and Telemetry HandlingSystem for a Distributed Computing Architecture CubeSat
Authors: Sharan A Asundi Norman G FitzCoy
Abstract: Among the size, weight and power constraints im-posed by the CubeSat specification, the limitation associatedwith power can be addressed through a distributed computingarchitecture. This paper describes such a distributed com-puting architecture and its operational design in the form ofcommand and data handling system and telemetry formulation,adapted for a CubeSat whose power requirements for provingthe mission are significantly larger than the on-orbit averagepower generated. The 1U CubeSat with the mission objective ofprecision three axes attitude control is composed of a low powerflight computer and a high power, high speed auxiliary processor(CMG controller), along with a high capacity battery. Theprecision sensors, actuators and complex computing algorithms,are interfaced and implemented on the high speed auxiliaryprocessor, which is operated intermittently. Health monitoringsensors, transceiver and other housekeeping tasks are interfacedand implemented on the flight computer, which is in continuousoperation. To facilitate effective operation and telemetry pack-aging, each computing unit is designed to host a storage device.The flight software, designed as operating modes, is distributedacross the two computing platforms. Distributed operationsare initiated through the flight computer and executed on theauxiliary processor. The paper describes in detail the distributeddesign of these operating modes as flowcharts and the associatedtelemetry budget as tables.
Title: Quantum Cryptography: A New Generation of Information Technology Security System
Authors: Sharbaf, M.S.
Abstract: Quantum cryptography is an emerging technology in which two parties can secure network communications by applying the phenomena of quantum physics. The security of these transmissions is based on the inviolability of the laws of quantum mechanics. Quantum cryptography was born in the early seventies when Steven Wiesner wrote _bstagConjugate Coding_bstag, which took more than ten years to end this paper. The quantum cryptography relies on two important elements of quantum mechanics - the Heisenberg Uncertainty principle and the principle of photon polarization. The Heisenberg Uncertainty principle states that, it is not possible to measure the quantum state of any system without distributing that system. The principle of photon polarization states that, an eavesdropper can not copy unknown qubits i.e. unknown quantum states, due to no-cloning theorem which was first presented by Wootters and Zurek in 1982. This research paper concentrates on the theory of quantum cryptography, and how this technology contributes to the network security. This research paper summarizes the current state of quantum cryptography, and the real-world application implementation of this technology, and finally the future direction in which the quantum cryptography is headed forwards.
Abstract: In this paper we have proposed Noise Induced HSI model based noisy and blurred colour image segmentation technique. This approach uses additive noise to suppress the effect of internal noise present in an image for proper detection of objects from such images. In this algorithm we decompose a given image in Hue, Saturation and Intensity (HSI) components and then apply processing on intensity component of the decomposed image. We measured performance of proposed algorithm in terms of correlation coefficient and number of mismatch pixels. The effectiveness of the proposed algorithm is compared with the different existing techniques. It is observed that the computational complexity of our algorithm is less in comparison with several existing techniques, because it deals only with intensity component of the decomposed image. Furthermore, an additional advantage, our technique of segmentation gives better performance as compared to SSR based segmentation using RGB model, SR-extended, integrated region matching, watershed and marker controlled watershed based segmentation method.
Title: Automatic Abstract Service Generation from Web Service Communities
Authors: Xumin Liu,Hua Liu
Abstract: The concept of abstract services has been widelyadopted in service computing to specify the functionality ofcertain types of Web services. It significantly benefits keyservice management tasks, such as service discovery andcomposition, as these tasks can be first applied to a smallnumber of abstract services and then mapped to the large scaleactual services. However, how to generate abstract services isnon-trivial. Current approaches either assume the existenceof abstract services or adopt a manual process that demandsintensive human intervention. We propose a novel approach tofully automate the generation of abstract services from a servicecommunity that consists of a set of functionally similar services.A set of candidate outputs are first discovered based on prede-fined support ratio, which determines the minimum number ofservices that produce the outputs. Then, the matching inputsare identified to form the abstract services. We propose a setof heuristics to effectively prune a large number of candidateabstract services. An comprehensive experimental study onreal world web service data is conducted to demonstrate theeffectiveness and efficiency of the proposed approach.
Title: Tracking On-line Radicalization Using Investigative Data Mining
Authors: Pooja Wadhwa, MPS Bhatia
Abstract: The increasing complexity and emergence of Web 2.0 applications have paved way for threats arising out of the use of social networks by cyber extremists (Radical groups). Radicalization (also called cyber extremism and cyber hate propaganda) is a growing concern to the society and also of great pertinence to governments & law enforcement agencies all across the world. Further, the dynamism of these groups adds another level of complexity in the domain, as with time, one may witness a change in members of the group and hence has motivated many researchers towards this field. This proposal presents an investigative data mining approach for detecting the dynamic behavior of these radical groups in online social networks by textual analysis of the messages posted by the members of these groups along with the application of techniques used in social network analysis. Some of the preliminary results obtained through partial implementation of the approach are also discussed.
Title: Query-Specific Visual Semantic Spaces for Web Image Re-ranking
Authors: Xiaogang Wang,Ke Liu,Xiaoou Tang,
Abstract: Image re-ranking, as an effective way to improve the re-sults of web-based image search, has been adopted by cur-rent commercial search engines. Given a query keyword, apool of images are first retrieved by the search engine basedon textual information. By asking the user to select a queryimage from the pool, the remaining images are re-rankedbased on their visual similarities with the query image. Amajor challenge is that the similarities of visual features donot well correlate with images_ semantic meanings whichinterpret users_ search intention. On the other hand, learn-ing a universal visual semantic space to characterize highlydiverse images from the web is difficult and inefficient.In this paper, we propose a novel image re-rankingframework, which automatically offline learns different vi-sual semantic spaces for different query keywords throughkeyword expansions. The visual features of images are pro-jected into their related visual semantic spaces to get se-mantic signatures. At the online stage, images are re-rankedby comparing their semantic signatures obtained from thevisual semantic space specified by the query keyword. Thenew approach significantly improves both the accuracy andefficiency of image re-ranking. The original visual featuresof thousands of dimensions can be projected to the seman-tic signatures as short as 25 dimensions. Experimental re-sults show that 20% - 35% relative improvement has beenachieved on re-ranking precisions compared with the state-of-the-art methods.
Abstract: The use of camera as a biometric sensor is desir-able due to its ubiquity and low cost, especially for mo-bile devices. Palmprint is an effective modality in suchcases due to its discrimination power, ease of presen-tation and the scale and size of texture for capture bycommodity cameras. However, the unconstrained na-ture of pose and lighting introduces several challengesin the recognition process. Even minor changes in poseof the palm can induce significant changes in the vis-ibility of the lines. We turn this property to our ad-vantage by capturing a short video, where the naturalpalm motion induces minor pose variations, providingadditional texture information. We propose a method toregister multiple frames of the video without requiringcorrespondence, while being efficient. Experimental re-sults on a set of different 100 palms show that the use ofmultiple frames reduces the error rate from 12.75% to4.7%. We also propose a method for detection of poorquality samples due to specularities and motion blur,which further reduces the EER to 1.8%.
Title: Agile and Efficient MIMO System for Smart Phone Terminals
Authors: Osama N Alrabad, Elpiniki P Tsakalaki, Mauro Pelosi, Gert F Pedersen
Abstract: The paper proposes a novel multi-input multi-output (MIMO) system architecture that covers most of the high L TE bands. The system is comprised of four small loop antennas. Each antenna has two ports, one for communication and one for control. The control port is used for tuning the loop antenna where impressive frequency agility using a single capacitor is obtained. A good level of inherent isolation among the four loop antennas is maintained over the different frequency bands. The MIMO performance of the proposed system is evaluated through its spectral efficiency versus frequency. Finally, the information bandwidth of the MIMO system can be defined by comparing its spectral efficiency against the spectral efficiency of three ideal MIMO antennas.
لینک ابتدا ما
را با عنوان
دانلود مقاله ISI
خود را در زیر
نوشته . در صورت
وجود لینک ما در
لینکتان به طور
خودکار در سایت
ما قرار میگیرد.
خبرنامه وب سایت:
بازدید امروز : 101
بازدید دیروز : 114
بازدید هفته : 460
بازدید ماه : 5214
بازدید کل : 36916
تعداد مطالب : 143
تعداد نظرات : 692
تعداد آنلاین : 1