Results (2349)
Search Parameters:
Keyword: ARClean Energy Use for Cloud Computing Federation Workloads
Cloud providers seek to maximize their market share. Traditionally, they deploy datacenters with sufficient capacity to accommodate their entire computing demand while maintaining geographical affinity to its customers. Achieving these goals by a single cloud provider is increasingly unrealistic from a cost of ownership perspective. Moreover, the carbon emissions from underutilized datacenters place an increasing…
Read MoreAnalytical and Algorithmic Approaches to Determine the Number of Sensor Nodes for Minimum Power Consumption in LWSNs
A Linear Wireless Sensor Network (LWSN) is a kind of wireless sensor network where the nodes are deployed in a line. Since the sensor nodes are energy restricted, energy efficiency becomes one of the most significant design issues for LWSNs as well as wireless sensor networks. With the proper deployment, the power consumption could be…
Read MoreScalability Dilemma and Statistic Multiplexed Computing — A Theory and Experiment
The For the last three decades, end-to-end computing paradigms, such as MPI (Message Passing Interface), RPC (Remote Procedure Call) and RMI (Remote Method Invocation), have been the de facto paradigms for distributed and parallel programming. Despite of the successes, applications built using these paradigms suffer due to the proportionality factor of crash in the application…
Read MoreCAM-Infrastructure: a novel solution for service advertisement in Cooperative Intelligent Transportation Systems
Cooperative Intelligent Transportation Systems (C-ITS) are gaining ground and currently are almost part of our everyday life. A C-ITS environment can provide numerous services that soon will become essential to roads’ users. The latter resides in improvement of road safety, entertainment, and commercial services. However, in order to provide such services, the C-ITS environment needs…
Read MoreTwo-axis Gimbal with Passive Revolute Joints for Motion Isolation of a Stabilizing Mechanism
Energy efficiency is a salient design consideration for stabilization mechanisms when assembled on a battery-powered vehicle. In this paper we study the implementation of a two-axis gimbal with passive revolute joints for motion isolation of an inertially stabilized platform (ISP) mounted on a host vehicle. The objective is for the ISP to maintain a steady…
Read MoreRadiation Hybrid Mapping: A Resampling-based Method for Building High-Resolution Maps
Abstract— The process of mapping large numbers of markers is computationally complex, as the increase of numbers of markers results in an exponential increase in the mapping runtime. Also, having unreliable markers in the dataset adds more complexity to the mapping process. In this research, we have addressed these two issues and proposed our solution.…
Read MoreA Way for Measuring the Temperature Transients of Capacitors
With the increasing integration level of electronic circuits management of the generated heat became one of the most important design aspects. Beside the semiconductor components capacitors are also affected by the elevated temperature. In this paper a new thermal characterization method is proposed adopting the thermal transient measurement technique for capacitors utilizing the capacitance itself…
Read MoreHybrid Ontology-based knowledge with multi-objective optimization model framework for Decision Support System in intercropping
The problem of multi-criteria or multi-objective intercropping crop planning makes it vital to consider all related factors under the constraints that will produce the highest revenue and minimum cost. Principles of intercropping elements including soil type, plant area, plant diseases, planting and harvesting time and economics factors (e.g. price, cost) are some of the factors…
Read MoreCompact wireless control network protocol with fast path switching
Sensor network protocol stacks require the addition or adjustment of functions based on customer requirements. Sensor network protocols that require low delay and low packet error rate (PER), such as wireless control networks, often adopt time division multiple access (TDMA). However, it is difficult to add or adjust functions in protocol stacks that use TDMA…
Read MoreThe effect of employing knowledge workers from technologically advanced countries: The knowledge spillover caused by the mobility of knowledge workers in electronic industries in Asia
This paper is an extension of work originally presented in 2017 6th International Conference on Industrial Technology and Management (ICITM) [53]. This research focuses on the mobilization of human resources in the Asian electrical industry and analyzes the impact of engineers’ international mobility on the innovation of enterprises in the host countries. I examine the…
Read MoreA Category Based Threat Evaluation Model Using Platform Kinematics Data
Command and control (C2) systems direct operators to make accurate decisions in the stressful atmosphere of the battlefield at the earliest. There are powerful tools that fuse various instant piece of information and brings summary of those in front of operators. Threat evaluation is one of the important fusion method that provides these assistance to…
Read MoreMulti-attribute Reverse Auction Design Based on Fuzzy Data Envelopment Analysis Approach
Multi-attribute reverse auction is widely used for the procurements of enterprises or governments. To overcome the difficulty of identifying bidding attribute weight and score function of the buyer, the multi-round auction and bidding models with multiple winners are established based on fuzzy data envelopment analysis. The winner determination model of the buyer considers the integrated…
Read MoreContent Reordering Based on Mouse-tracking for Web Applications
Rising usage of web applications in every aspect of life has created intense need of enhancement of user experience and formation of intelligent web applications. This research work was conducted with a view to do so. This paper focuses on the reorganization of web application content based on user’s specific interests while browsing any web…
Read MoreA Secure Communication Framework for ECUs
Electronic Control Units (ECUs) generate diagnostic and telemetric data that is communicated over the internal vehicular network. ECUs are resource constraint devices and have limited resources to devote for data security. In recent times, threats against vehicular networks have emerged that require attention of the research community. In this paper, we demonstrate data security threats…
Read MorePublic transportation network design: a geospatial data-driven method
The paper explores an issue of efficient public transportation network design as a part of the urban developing process. Having data about everyday residents travelling inside of an urban area, we can consider this data as people’s requirements for the public transport system. We propose a novel method for initial public transportation network design based…
Read MoreProposal for a Visualization System of Purchase Relationship Using ID-POS Data
In recent years, big data analysis is gaining immense credence in the fields of academics and business. Businesses such as management and marketing have demonstrated a strong inclination and interest in data analytics. However, many businesses are unable to utilize data even if they have access to it. The main reason for that is the…
Read MoreSolving the SAT problem using Genetic Algorithm
In this paper we propose our genetic algorithm for solving the SAT problem. We introduce various crossover and mutation techniques and then make a comparative analysis between them in order to find out which techniques are the best suited for solving a SAT instance. Before the genetic algorithm is applied to an instance it is…
Read MoreEfficient Tensor Strategy for Recommendation
The era of big data has witnessed the explosion of tensor datasets, and large scale Probabilistic Tensor Factorization (PTF) analysis is important to accommodate such increasing trend of data. Sparsity, and Cold-Start are some of the inherent problems of recommender systems in the era of big data. This paper proposes a novel Sentiment-Based Probabilistic Tensor…
Read MoreOn-Chip Testing Schemes of Through-Silicon-Vias (TSVs) in 3D Stacked ICs
This paper presents on-chip testing structures to characterize and detect faulty Through Silicon Vias (TSVs) in 3D ICs technology. 3D Gunning Transceiver Logic (GTL) I/O testing is proposed to characterize the performance of 3D TSVs in high speed applications. The GTL testing circuit will fire different data patterns at different frequencies to characterize the transient…
Read MoreModel-based Development of Safety-critical Functions and ISO 26262 Work Products using modified EAST-ADL
Safety is becoming more and more important with the ever increasing level of safety related E/E Systems built into the cars. Increasing functionality of vehicle systems through electrification of power train, in future even more by autonomous driving, leads to complexity in designing system, software and safety architecture. ISO 26262 aims to reduce the complexity…
Read MoreEfficiency of Photovoltaic Maximum Power Point Tracking Controller Based on a Fuzzy Logic
This paper examines the efficiency of a fuzzy logic control (FLC) based maximum power point tracking (MPPT) of a photovoltaic (PV) system under variable climate conditions and connected load requirements. The PV system including a PV module BP SX150S, buck-boost DC-DC converter, MPPT, and a resistive load is modeled and simulated using Matlab/Simulink package. In…
Read MoreFace Recognition and Tracking in Videos
Advancement in computer vision technology and availability of video capturing devices such as surveillance cameras has evoked new video processing applications. The research in video face recognition is mostly biased towards law enforcement applications. Applications involves human recognition based on face and iris, human computer interaction, behavior analysis, video surveillance etc. This paper presents face…
Read MoreIoT: Their Conveniences, Security Challenges and Possible Solutions
The build-in internet-controlled functions of smart devices such as smart phone, smart television, home healthcare gadget, etc., have made them quite attractive to many segments of consumers. In recent years mankind has witnessed an upsurge usage of such devices for numerous purposes. In this paper, the author is going to show how previously forecasted security…
Read MoreEffect of Cold Drawing Pass Schedule on Mechanical Properties and Microstructure of ST 52 during Cold Drawing of Seamless Tubes and its Influence on Springback
In-elastic recovery behavior of seamless tube material has been investigated by uniaxial tensile tests. Unloading Stress–Strain curves obtained under different passes of cold drawing process shows that the percentage of in-elastic recovery to the total recovery increased with plastic deformation. This paper is an experimental study that shows Young’s Modulus decreases with plastic strain for…
Read MoreIncremental Control Techniques for Layout Modification of Integrated Circuits
Analog layout is created in integrated circuits (IC) computer aided design (CAD) environment and during realization requires a lot of modifications of database objects. Because database objects modification is time consuming, then any improvement and simplification of modification flow in IC CAD environment can increase layout productivity. A proposed new modification concept can speed-up layout…
Read More
