Results (1696)
Search Parameters:
Keyword: FFFrameworks for Performing on Cloud Automated Software Testing Using Swarm Intelligence Algorithm: Brief Survey
This paper surveys on Cloud Based Automated Testing Software that is able to perform Black-box testing, White-box testing, as well as Unit and Integration Testing as a whole. In this paper, we discuss few of the available automated software testing frameworks on the cloud. These frameworks are found to be more efficient and cost effective…
Read MoreAn Overview of Data Center Metrics and a Novel Approach for a New Family of Metrics
Data centers’ mission critical nature, significant power consumption, and increasing reliance on them for digital information, have created an urgent need to monitor and adequately manage these facilities. Metrics are a key part of this effort as their indicators raise flags that lead to optimization of resource utilization. A thorough review of existing data center…
Read MoreAn Aggregation Model for Energy Resources Management and Market Negotiations
Currently the use of distributed energy resources, especially renewable generation, and demand response programs are widely discussed in scientific contexts, since they are a reality in nowadays electricity markets and distribution networks. In order to benefit from these concepts, an efficient energy management system is needed to prevent energy wasting and increase profits. In this…
Read MoreThe impact of Big Data on the Android Mobile Platform for Natural Disaster Situations
This application developing for the project OCEMA comes as result of architecture building in Android, then the development of a professional modeling in Talend Open Studio for Big Data, which enabled the integration of data from many data sources. One of its uses is the quick identification of people found in areas affected by natural…
Read MorePerformance Analysis of NLMS Channel Estimation for AMC-COFDM System
In this paper we focus on the adaptive modulation and coding (AMC) techniques, makes use of the channel state information (CSI) to improve the spectral efficiency (SE) in wireless communication systems. To achieve higher data rates and lower bit error rate (BER’s) channel coding can be carried out in OFDM, called COFDM. The NLMS channel…
Read MorePredicting Smoking Status Using Machine Learning Algorithms and Statistical Analysis
Smoking has been proven to negatively affect health in a multitude of ways. As of 2009, smoking has been considered the leading cause of preventable morbidity and mortality in the United States, continuing to plague the country’s overall health. This study aims to investigate the viability and effectiveness of some machine learning algorithms for predicting…
Read MoreA Model for Optimising the Deployment of Cloud-hosted Application Components for Guaranteeing Multitenancy Isolation
Tenants associated with a cloud-hosted application seek to reduce running costs and minimize resource consumption by sharing components and resources. However, despite the benefits, sharing resources can affect tenant’s access and overall performance if one tenant abruptly experiences a significant workload, particularly if the application fails to accommodate this sudden increase in workload. In cases…
Read MoreImproving Patient Outcomes Through Untethered Patient-Centered Health Records
Patient generated data, or personal clinical data, is considered an important aspect in improving patient outcomes. However, personal clinical data is difficult to collect and manage due to its distributed nature. For example, they can be located in multiple places such as doctors’ offices, radiology centers, hospitals, or some clinics. Another factor that can make…
Read MoreMission-Critical Systems Design Framework
Safety-critical systems are well documented and standardized (e.g. IEC 61508, RTCA DO-178B) within system design cycles. However in Defence and Security, systems that are critical to the success of a Mission are not defined within the literature nor are there any guidelines in defining criticality in their design or operational capabilities. When it comes to…
Read MoreAutomated Text Annotation for Social Media Data during Natural Disasters
Nowadays, text annotation plays an important role within real-time social media mining. Social media analysis provides actionable information to its users in times of natural disasters. This paper presents an approach to a real-time two layer text annotation system for social media stream to the domain of natural disasters. The proposed system annotates raw tweets…
Read MorePerformance of Location and Positioning Systems: a 3D-Ultrasonic System Case
The necessity of navigation in people and mobile robots (MR) through specific environments (indoors or outdoors) has become more and more relevant nowadays. For indoors, generally speaking, the positioning systems can be divided into 2D (two dimensions) or 3D (three dimensions) approaches, where Ultrasonic Local Positioning Systems (ULPS) are often a common solution for MRs…
Read MoreEstimating short time interval densities in a CTM-KF model
On-ramping is being widely used as e method to increase the freeway operational efficiency. The main traffic parameter that must be taken in consideration for the implementation of the feedback control strategies for the on-ramp metering is density on the main section of road. In this paper is given discretized model of traffic which is…
Read MoreTPMTM: Topic Modeling over Papers’ Abstract
Probabilities topic models are active research area in text mining, machine learning, information retrieval, etc. Most of the current statistical topic modeling methods, such as Probabilistic Latent Semantic Analysis (pLSA) and Latent Dirichlet Allocation (LDA). They are used to build models from unstructured text and produce a term-based representation to describe a topic by choosing…
Read MoreCancer Mediating Genes Recognition using Multilayer Perceptron Model- An Application on Human Leukemia
In the present article, we develop multilayer perceptron model for identification of some possible genes mediating different leukemia. The procedure involves grouping of gene based correlation coefficient and finally select of some possible genes. The procedure has been successfully applied three human leukemia gene expression data sets. The superiority of the procedure has been demonstrated…
Read MoreTwo-Stage Performance Engineering of Container-based Virtualization
Cloud computing has become a compelling paradigm built on compute and storage virtualization technologies. The current virtualization solution in the Cloud widely relies on hypervisor-based technologies. Given the recent booming of the container ecosystem, the container-based virtualization starts receiving more attention for being a promising alternative. Although the container technologies are generally considered to be…
Read MoreAdaptive and Non Adaptive LTE Fractional Frequency Reuse Mechanisms Mobility Performance
Mobile broadband has gained momentum with the growing demand of user data rates. Long Term Evolution (LTE) technology is the step in mobile communications evolution, developed to satisfy high data rate demand, and meet better spectral efficiency requirements. Effective radio resource management and inter cell interferences are the major challenges. Fractional Frequency Reuse (FFR) is…
Read MoreComputation of Viability Kernels on Grid Computers for Aircraft Control in Windshear
This paper is devoted to the analysis of aircraft dynamics in the cruise flight phase under windshear conditions. The study is conducted with reference to a point-mass aircraft model restricted to move in a vertical plane. We formulate the problem as a differential game against the wind disturbances: The first player, autopilot, manages, via additional…
Read MoreAn Analysis of K-means Algorithm Based Network Intrusion Detection System
In this modern age, information technology (IT) plays a role in a number of different fields. And therefore, the role of security is very important to control and assist the flow of activities over the network. Intrusion detection (ID) is a kind of security management system for computers and networks. There are many approaches and…
Read MoreStructure-Preserving Modeling of Safety-Critical Combinational Circuits
In this work, a representative combinational circuit is visualized in various ways. It is abstracted (concretized) from transistor level to gate level and a structure-preserving transition is carried out into a signal flow graph. For creating a signal flow plan it is necessary to swap the nodes and the edges in the signal flow graph.…
Read MoreTracking and Detecting moving weak Targets
Detect and tracking of moving weak targets is a complicated dynamic state estimation problem whose difficulty is increased in case of high clutter conditions or low signal to noise ratio (SNR). In this case, the track-before-detect filter (TBDF) that uses unthresholded measurements considers as an effective method for detecting and tracking a single target under…
Read MorePerformance Analysis of Regenerative Braking in Permanent Magnet Synchronous Motor Drives
This paper describes the design and analysis of a regenerative braking system for a permanent magnet synchronous motor (PMSM) drive for electric vehicle (EV) applications. First studied is the principle for electric braking control of a PMSM motor under field-oriented control (FOC). Next, the maximum braking torque in the regeneration mode as well as the…
Read MoreInnovative Research on the Development of Game-based Tourism Information Services Using Component-based Software Engineering
In recent years, a number of studies have been conducted exploring the potential of digital tour guides, that is, multimedia components (e.g., 2D graphic, 3D models, and sound effects) that can be integrated into digital storytelling with location-based services. This study uses component-based software engineering to develop the content of game-based tourism information services. The…
Read MoreActuator Fault Reconstruction based Adaptive Polytopic Observer for a Class of Continuous-Time LPV Systems
This paper is an extension of work originally presented in conference name. The goal is to propose new fault detection and fault isolation techniques for a polytypic linear parameter-varying system (LPV). In this work, an adaptive observer design is formulated for a given polyquadratic Lyapunov function. Subsequently, new sufficient conditions are given in terms of…
Read MoreA Smart Mobile Application for Assisting Parents in Anti-Drug Support
Drug abuse problem is not a new problem, but it is still serious in Hong Kong. The emergence of hidden drug abuse youth has brought more difficulties to them and their parents. The usual ways of providing anti-drug abuse assistance are not sufficient to these types of young people. Intelligent methods have been developed to…
Read MoreCo-designed accelerator for homomorphic encryption applications
Fully Homomorphic Encryption (FHE) is considered as a key cryptographic tool in building a secure cloud computing environment since it allows computing arbitrary functions directly on encrypted data. However, existing FHE implementations remain impractical due to very high time and resource costs. These costs are essentially due to the computationally intensive modular polynomial multiplication. In…
Read More
