Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 19, Issue 1March 2016
Reflects downloads up to 16 Oct 2024Bibliometrics
article
Dynamic load balancing on heterogeneous clusters for parallel ant colony optimization

Ant colony optimisation (ACO) is a nature-inspired, population-based metaheuristic that has been used to solve a wide variety of computationally hard problems. In order to take full advantage of the inherently stochastic and distributed nature of the ...

article
A decentralized fault tolerance model based on level of performance for grid environment

Computational grids have the potential for solving large-scale scientific problems using heterogeneous and geographically distributed resources. At this scale, computer resources and network failures are no more exceptions, but belong to the normal ...

article
An efficient approach to collaborative simulation of variable structure systems on multi-core machines

Complex variable-structure systems (CVSSs) are a common type of complex systems that exhibit changes both at structural and behavior levels. Simulations of CVSSs challenge current collaborative execution methods with increasingly big and complex models. ...

article
Efficient chameleon hashing-based privacy-preserving auditing in cloud storage

Cloud storage is an important application service in cloud computing, it allows data users to store and access their files anytime, from anywhere and with any device. To ensure the security of the outsourced data, data user needs to periodically check ...

article
Similarity (range and kNN) queries processing on an Intel Xeon Phi coprocessor

Nowadays, the evolution of information technologies requires fast similarity search tools for analyzing new data types as audio, video, or images. The usual search by keys or records is not possible and to search on these databases is a compute-...

article
Face recognition from a single image per person using deep architecture neural networks

Implementing an accurate face recognition system requires images in different variations, and if our database is large, we suffer from problems such as storing cost and low speed in recognition algorithms. On the other hand, in some applications there ...

article
Distributed denial-of-service attacks against HTTP/2 services

HTTP/2 is the second major version of the HTTP protocol published by the internet engineering steering group. The protocol is designed to improve reliability and performance Such enhancements have thus delineated the protocol as being more vulnerable to ...

article
Scrutiny of unruly and abuse in wireless networks to mitigate physical layer threats using discriminate based misbehavior prevention

The open nature of communication medium in wireless networks becomes easy for the attackers to indulge in jamming attack. Jamming blocks the communication channel with the intent of preventing the flow of useful information. Jammers effectively and ...

article
Automatic facial emotion recognition using weber local descriptor for e-Healthcare system

For an e-Healthcare system, detecting the emotion of a patient is vital for initial assessment of the patient. This paper proposes an emotion recognition system from face using for an e-Healthcare system. For features, Weber local descriptors (WLD) are ...

article
Efficient top-k similarity document search utilizing distributed file systems and cosine similarity

Document similarity has important real life applications such as finding duplicate web sites and identifying plagiarism. While the basic techniques such as k-similarity algorithms have been long known, overwhelming amount of data, being collected such ...

article
IPad: ID-based public auditing for the outsourced data in the standard model

Cloud storage is an important cloud computing service, it allows data users to store and access their files anytime, from anywhere and with any device. To ensure the security of the outsourced data, it also must allow data user to periodically verify ...

article
Geographical information system parallelization for spatial big data processing: a review

With the increasing interest in large-scale, high-resolution and real-time geographic information system (GIS) applications and spatial big data processing, traditional GIS is not efficient enough to handle the required loads due to limited ...

article
PEDAL: a dynamic analysis tool for efficient concurrency bug reproduction in big data environment

Concurrency bugs usually manifest under very rare conditions, and reproducing such bugs can be a challenging task. To reproduce concurrency bugs with a given input, one would have to explore the vast interleaving space, searching for erroneous ...

article
Elastic resource provisioning for scientific workflow scheduling in cloud under budget and deadline constraints

With the popularization and development of cloud computing, lots of scientific computing applications are conducted in cloud environments. However, current application scenario of scientific computing is also becoming increasingly dynamic and ...

article
A grid based simulation environment for agent-based models with vast parameter spaces

Agent-based simulation models with large experiments for a precise and robust result over a vast parameter space are becoming a common practice, where enormous runs intrinsically require highly intensive computational resources. This paper proposes a ...

article
Task scheduling for MapReduce in heterogeneous networks

In this paper, the task scheduling in MapReduce is considered for geo-distributed data centers on heterogeneous networks. Adaptive heartbeats, job deadlines and data locality are concerned. Job deadlines are divided according to the maximum data volume ...

article
SIMPLE: a simplifying-ensembling framework for parallel community detection from large networks

Community detection is a classic and very difficult task in complex network analysis. As the increasingly explosion of social media, scaling community detection methods to large networks has attracted considerable recent interests. In this paper, we ...

article
A methodology for developing clinical collaborative communication systems

As healthcare organizations are struggling to enhance healthcare qualities and efficiencies, they focus on secure and efficient sharing of clinical information among healthcare providers including doctors, nurses, medical laboratories, and informal ...

article
Meta-operation conflict resolution for human---human interaction in collaborative feature-based CAD systems

Conflicts resolution is one of the key issues in maintaining consistency and in supporting smooth human---human interaction for real-time collaborative systems. This paper presents a novel approach of meta-operation conflict resolution for feature-based ...

article
Consistency maintenance of Do and Undo/Redo operations in real-time collaborative bitmap editing systems

In real-time collaborative graphical editing systems, bitmap-based graphical editing systems are particularly special and practically useful ones, and Do and Undo/Redo operations are intricate problems in this field. However, existing researches on ...

article
Frequent pagesets from web log by enhanced weighted association rule mining

Mining frequently visited web pages from web logs have become an imminent need for web usage mining to understand the behavior of users. Frequent pageset mining and association rule mining (ARM) algorithms existing in the literatures suffer from storage ...

article
An energy-efficient load balancing scheme to extend lifetime in wireless sensor networks

The role of load balancing in wireless sensor networks is to provide a constant and reliable service. Applications with periodic data generation for wireless sensor networks require the maximum lifetime of the network. Most research imposes mainly on ...

article
Detecting for high speed flying object using image processing on target place

In this paper, we research the target system using an Image processing methods for measuring the moving object at a high speed. Measuring a fast-moving object is very difficult. Currently, Car, CCTV, plant factory has already utilized the advantage of ...

article
Dynamic multimedia transmission control virtual machine using weighted Round-Robin

This paper addresses the problem caused by the large amount of traffic generated and dynamically changing traffic patterns and Round-Robin scheduling algorithm applied Weighted to provide the best service to the user requests. Currently the network has ...

article
Multiple-domain marine data utilization structure for e-navigation

In the maritime field, e-navigation, a new-paradigm information service framework that provides proper, accurate and timely information related to various marine activities at sea, has been widely discussed. For consistent exchange, sharing, and use of ...

article
Belief propagation decoding assisted on-the-fly Gaussian elimination for short LT codes

Belief propagation (BP) decoding has been widely used for decoding Luby transform (LT) codes which perform very well for a large number of input symbols. However, in reality, small numbers of input symbols are often encountered. In this paper, an ...

article
Robust audio fingerprinting using peak-pair-based hash of non-repeating foreground audio in a real environment

In this paper, we propose a high-performance audio fingerprinting system used in real-world query-by-example applications for acoustic audio-based content identification, especially for use in heterogeneous portable consumer devices or on-line audio ...

article
A feature selection approach to find optimal feature subsets for the network intrusion detection system

The performance of network intrusion detection systems based on machine learning techniques in terms of accuracy and efficiency largely depends on the selected features. However, choosing the optimal subset of features from a number of commonly used ...

article
Fast implementation of block ciphers and PRNGs in Maxwell GPU architecture

GPU is widely used in various applications that require huge computational power. In this paper, we contribute to the cryptography and high performance computing research community by presenting techniques to accelerate symmetric block ciphers (AES-128, ...

article
Data security rules/regulations based classification of file data using TsF-kNN algorithm

Personal and organizational data are getting larger in volume with respect to time. Due to the importance of data for organisations, effective and efficient management and categorization of data need a special focus. Understanding and applying data ...

Comments