The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The increasing amount of data being collected from simulations, instruments and sensors creates challenges for existing e-Science infrastructure. In particular, it requires new ways of storing, distributing and processing data in order to cope with both the volume and velocity of the data. The University of Queensland has recently designed and deployed MeDiCI, a data fabric that spans the metropolitan...
The main issue with big data in cloud is the processed or used always need to be by third party. It is very important for the owners of data or clients to trust and to have the guarantee of privacy for the information stored in cloud or analyzed as big data. The privacy models studied in previous research showed that privacy infringement for big data happened because of limitation, privacy guarantee...
Modern enterprises collect, process, and analyze security data from various system and network logs. Previous studies show that, handling large security datasets and detecting anomalies from those are key challenges faced by most of todays' enterprises. Unfortunately most security professionals are inexperienced at performing data analysis. In this paper, we study published works analyzing one publicly...
Data outsourcing has become quite popular in recent years. While the rapid development of cloud storage service, it brings about many new security challenges. One of the biggest concerns with cloud data storage is that of data integrity at untrusted cloud servers. For example, when individual users store important data files in cloud servers, the data files may be damaged or corrupted because of cloud...
Virtual worlds and avatar-based interactive computer games are a hype among consumers and researchers for many years now. In recent years, such games on mobile devices also became increasingly important. However, most virtual worlds require the use of proprietary clients and authoring environments and lack portability, which limits their usefulness for targeting wider audiences like e.g. in consumer...
In this paper, we analyze the three bottlenecks that limit the large-scene in virtual reality applications and especially in the Web-based applications. We also analyze the technical characteristics and defects of the LOD strategy and then propose a novel partitioning model. Based on the proposed model and XML, we present a scheme to overcome the three bottlenecks regarding CPU, memory and network...
The paper deals with the modeling of computer subsystems, such as the input-output, direct memory access controller, memory of multiprocessor, multicore processor. For each model the input and output data sets are given. The modes of operation and functions of simulation models are described. The screen forms samples for the simulation models are shown.
A robust semi-supervised concept factorization (RSSCF) method is proposed in this paper, which not only makes good use of the available label information, but also addresses noise and extracts meaningful information simultaneously. In the proposed method, a constraint matrix is embedded into the basic concept factorization model to guarantee data with the same label share the same new representation...
Nowadays, the total power consumed by data centers is increasing more and more. In particular, the power consumed by data center facilities accounts for about half of total input power. In this paper, a hierarchical control structure is proposed for efficient management of an indirect adiabatic cooling system, which utilizes fresh air. Data center cooling needs can be met with various combinations...
In order to improve the safety factors of MSV (Manned Submersible Vehicle) and shorten the pilot training cycle, the real hardware and software system combine with the modelling and simulation calculation of its sensors, equipment, actuators submersible ontology and motion status in deep sea environment, realizing the semi physical simulation system. First of all, the system model is built and hardware...
Online reviews are becoming one of the vital components of e-commerce in recent years as so many people consider having different opinions prior to buying online products or apprehending any online service. Nowadays, in the era of web 2.0, it is completely understandable that people rely on online reviews more than ever while taking a decision. However, guaranteeing the authenticity of these sensitive...
A MapReduce system gradually becomes a popular platform for developing cloud applications while MapReduce is the de facto standard programming model of the applications. However, a MapReduce system may suffer intermediate data skew to degrade performances because input data is unpredictable and the Map function of the application may generate different quantities of intermediate data according to...
There is millions of users in the social networking sites including the users with criminal mentality. The criminals always use sophisticated technology in order to evade detection and perform criminal acts. But any criminal activities can be revealed through forensic science tools and techniques where potential legal evidence can be extracted and presented to the legal authorities. The major concern...
ERP application performance can be complicated, as it's ought to satisfy the prerequisite and desires of some of the greatest and most refined enterprises inside the world. Odoo is in vogue ERP application comes into picture, Odoo-ORM framework written in python. This paper concentrates on essential component of Odoo-ORM i.e. caching. Caching can be one of the important parts of an ORM application...
In this paper we present a new Smart Online Vehicle Tracking System for Security Applications (AMOTSSA) and we describe how it can be modelled and implemented as a Big data application. In order to model AMOTSSA as a big data application, we argue our design choices that meets its specific data and processing needs and we present a set of data analytic algorithms that would achieve a set of investigation...
This tutorial discusses in depth the operational validation of simulation models after a brief overview of verification and validation of simulation models. The discussion of operational validation first covers the different approaches used for observable and non-observable systems. Next, various types of graphical displays of model output behavior are presented; this is followed by how these displays...
Hardware in-the-loop simulation test has the advantage of live test, digital simulation test, which can build the lifelike test environment. This kind of test can carry through repeated test of multi-sample. The key technique of the hardware in-the-loop simulation test is real-time algorithmic and communication technology. In this paper, based on reflective memory network, the design for hardware...
Deep Neural Networks have become a state of the art approach in perception processing like speech recognition, image processing and natural language processing. Many state of the art benchmarks for these algorithms are using deep learning techniques. The deep neural networks in today's applications need to process very large amount of data. Different approaches have been proposed to solve scaling...
Real time is one of fundamental characteristics for hardware in the loop simulation (HILS). In this paper, we adopt the fiber reflective memory net (RMN) strategy to ensure the real-time data transmission and propose a clock synchronization method based on reflective memory card (RFM) interruption to make the simulation process stable. The character of RFM is real-time, delay determinacy and reliability...
This paper presents a data-driven approach towards the modeling of agent behaviors in a full-fledged, commercial off-the-shelf simulation milieu for tactical military training. The modeling approach employs machine learning to identify behavioral rules and patterns in data. Potential advantages of this approach are that it may improve modeling efficiency and, perhaps more importantly, increase the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.