Abstract: Visibility problems are central to many computational geometry applications. One of the typical visibility problems is computing the view from a given point. In this paper, a linear time procedure is proposed to compute the visibility subsets from a corner of a rectangular prism in an orthogonal polyhedron. The proposed algorithm could be useful to solve classic 3D problems.
Abstract: Information technology has been gaining more and
more space whether in industry, commerce or even for personal use,
but the misuse of it brings harm to the environment and human health
as a result. Contribute to the sustainability of the planet is to
compensate the environment, all or part of what withdraws it. The
green computing also came to propose practical for use in IT in an
environmentally correct way in aid of strategic management and
communication. This work focuses on showing how a mobile
application can help businesses reduce costs and reduced
environmental impacts caused by its processes, through a case study
of a public company in Brazil.
Abstract: When evaluating the capacity of a generation park to
cover the load in transmission systems, traditional Loss of Load
Expectation (LOLE) and Expected Energy not Served (EENS)
indices can be used. If those indices allow computing the annual
duration and severity of load non covering situations, they do not take
into account the fact that the load excess is generally shifted from one
penury state (hour or quarter of an hour) to the following one. In this
paper, a sequential Monte Carlo framework is introduced in order to
compute adjusted LOLE and EENS indices. Practically, those
adapted indices permit to consider the effect of load excess transfer
on the global adequacy of a generation park, providing thus a more
accurate evaluation of this quantity.
Abstract: Common Platform for Automated Programming
(CPAP) is defined in details. Two versions of CPAP are described:
Cloud based (including set of components for classic programming,
and set of components for combined programming); and Knowledge
Based Automated Software Engineering (KBASE) based (including
set of components for automated programming, and set of
components for ontology programming). Four KBASE products
(Module for Automated Programming of Robots, Intelligent Product
Manual, Intelligent Document Display, and Intelligent Form
Generator) are analyzed and CPAP contributions to automated
programming are presented.
Abstract: The use of Computer Aided Design (CAD)
technologies has become pervasive in the Architecture, Engineering
and Construction (AEC) industry. This has led to its inclusion as an
important part of the training module in the curriculum for
Architecture Schools in Nigeria. This paper examines the ethical
questions that arise in the implementation of Computer Aided Design
(CAD) Content of the curriculum for Architectural education. Using
existing literature, it begins this scrutiny from the propriety of
inclusion of CAD into the education of the architect and the
obligations of the different stakeholders in the implementation
process. It also examines the questions raised by the negative use of
computing technologies as well as perceived negative influence of
the use of CAD on design creativity. Survey methodology was
employed to gather data from the Department of Architecture,
Chukwuemeka Odumegwu Ojukwu University Uli, which has been
used as a case study on how the issues raised are being addressed.
The paper draws conclusions on what will make for successful ethical
implementation.
Abstract: For the last decade, researchers have started to focus
their interest on Multicast Group Key Management Framework. The
central research challenge is secure and efficient group key
distribution. The present paper is based on the Bit model based
Secure Multicast Group key distribution scheme using the most
popular absolute encoder output type code named Gray Code. The
focus is of two folds. The first fold deals with the reduction of
computation complexity which is achieved in our scheme by
performing fewer multiplication operations during the key updating
process. To optimize the number of multiplication operations, an
O(1) time algorithm to multiply two N-bit binary numbers which
could be used in an N x N bit-model of reconfigurable mesh is used
in this proposed work. The second fold aims at reducing the amount
of information stored in the Group Center and group members while
performing the update operation in the key content. Comparative
analysis to illustrate the performance of various key distribution
schemes is shown in this paper and it has been observed that this
proposed algorithm reduces the computation and storage complexity
significantly. Our proposed algorithm is suitable for high
performance computing environment.
Abstract: The analytical bright two soliton solution of the 3-
coupled nonlinear Schrödinger equations with variable coefficients in
birefringent optical fiber is obtained by Darboux transformation
method. To the design of ultra-speed optical devices, Soliton
interaction and control in birefringence fiber is investigated. Lax pair
is constructed for N coupled NLS system through AKNS method.
Using two-soliton solution, we demonstrate different interaction
behaviors of solitons in birefringent fiber depending on the choice of
control parameters. Our results shows that interactions of optical
solitons have some specific applications such as construction of logic
gates, optical computing, soliton switching, and soliton amplification
in wavelength division multiplexing (WDM) system.
Abstract: The education sector is constantly faced with rapid
changes in technologies in terms of ensuring that the curriculum is up
to date and in terms of making sure that students are aware of these
technological changes. This challenge can be seen as the motivation
for this study, which is to examine the factors affecting computing
students’ awareness of the latest Information Technologies (ICTs).
The aim of this study is divided into two sub-objectives which are:
the selection of relevant theories and the design of a conceptual
model to support it as well as the empirical testing of the designed
model. The first objective is achieved by a review of existing
literature on technology adoption theories and models. The second
objective is achieved using a survey of computing students in the four
universities of the KwaZulu-Natal province of South Africa. Data
collected from this survey is analyzed using Statistical package for
the Social Science (SPSS) using descriptive statistics, ANOVA and
Pearson correlations. The main hypothesis of this study is that there is
a relationship between the demographics and the prior conditions of
the computing students and their awareness of general ICT trends and
of Digital Switch Over (DSO) a new technology which involves the
change from analog to digital television broadcasting in order to
achieve improved spectrum efficiency. The prior conditions of the
computing students that were considered in this study are students’
perceived exposure to career guidance and students’ perceived
curriculum currency. The results of this study confirm that gender,
ethnicity, and high school computing course affect students’
perceived curriculum currency while high school location affects
students’ awareness of DSO. The results of this study also confirm
that there is a relationship between students prior conditions and their
awareness of general ICT trends and DSO in particular.
Abstract: As computing technology advances, smartphone
applications can assist student learning in a pervasive way. For
example, the idea of using mobile apps for the PA Common Trees,
Pests, Pathogens, in the field as a reference tool allows middle school
students to learn about trees and associated pests/pathogens without
bringing a textbook. While working on the development of three heterogeneous mobile
apps, we ran into numerous challenges. Both the traditional waterfall
model and the more modern agile methodologies failed in practice.
The waterfall model emphasizes the planning of the duration for each
phase. When the duration of each phase is not consistent with the
availability of developers, the waterfall model cannot be employed.
When applying Agile Methodologies, we cannot maintain the high
frequency of the iterative development review process, known as
‘sprints’. In this paper, we discuss the challenges and solutions. We
propose a hybrid model known as the Relay Race Methodology to
reflect the concept of racing and relaying during the process of
software development in practice. Based on the development project,
we observe that the modeling of the relay race transition between any
two phases is manifested naturally. Thus, we claim that the RRM
model can provide a de fecto rather than a de jure basis for the core
concept in the software development model. In this paper, the background of the project is introduced first.
Then, the challenges are pointed out followed by our solutions.
Finally, the experiences learned and the future works are presented.
Abstract: In this paper a very simple and effective user
administration view of computing clusters systems is implemented in
order of friendly provide the configuration and monitoring of
distributed application executions. The user view, the administrator
view, and an internal control module create an illusionary
management environment for better system usability. The
architecture, properties, performance, and the comparison with others
software for cluster management are briefly commented.
Abstract: This paper evaluates the accrual based scheduling for
cloud in single and multi-resource system. Numerous organizations
benefit from Cloud computing by hosting their applications. The
cloud model provides needed access to computing with potentially
unlimited resources. Scheduling is tasks and resources mapping to a
certain optimal goal principle. Scheduling, schedules tasks to virtual
machines in accordance with adaptable time, in sequence under
transaction logic constraints. A good scheduling algorithm improves
CPU use, turnaround time, and throughput. In this paper, three realtime
cloud services scheduling algorithm for single resources and
multiple resources are investigated. Experimental results show
Resource matching algorithm performance to be superior for both
single and multi-resource scheduling when compared to benefit first
scheduling, Migration, Checkpoint algorithms.
Abstract: This paper presents an extensive review of literature
relevant to the modelling techniques adopted in sediment yield and
hydrological modelling. Several studies relating to sediment yield are
discussed. Many research areas of sedimentation in rivers, runoff and
reservoirs are presented. Different types of hydrological models,
different methods employed in selecting appropriate models for
different case studies are analysed. Applications of evolutionary
algorithms and artificial intelligence techniques are discussed and
compared especially in water resources management and modelling.
This review concentrates on Genetic Programming (GP) and fully
discusses its theories and applications. The successful applications of
GP as a soft computing technique were reviewed in sediment
modelling. Some fundamental issues such as benchmark,
generalization ability, bloat, over-fitting and other open issues
relating to the working principles of GP are highlighted. This paper
concludes with the identification of some research gaps in
hydrological modelling and sediment yield.
Abstract: Cloud Computing refers to applications delivered as
services over the internet, and the datacenters that provide those
services with hardware and systems software. These were earlier
referred to as Software as a Service (SaaS). Scheduling is justified by
job components (called tasks), lack of information. In fact, in a large
fraction of jobs from machine learning, bio-computing, and image
processing domains, it is possible to estimate the maximum time
required for a task in the job. This study focuses on Trust based
scheduling to improve cloud security by modifying Heterogeneous
Earliest Finish Time (HEFT) algorithm. It also proposes TR-HEFT
(Trust Reputation HEFT) which is then compared to Dynamic Load
Scheduling.
Abstract: In this paper, we present a comparative study of three
methods of 2D face recognition system such as: Iso-Geodesic Curves
(IGC), Geodesic Distance (GD) and Geodesic-Intensity Histogram
(GIH). These approaches are based on computing of geodesic
distance between points of facial surface and between facial curves.
In this study we represented the image at gray level as a 2D surface in
a 3D space, with the third coordinate proportional to the intensity
values of pixels. In the classifying step, we use: Neural Networks
(NN), K-Nearest Neighbor (KNN) and Support Vector Machines
(SVM). The images used in our experiments are from two wellknown
databases of face images ORL and YaleB. ORL data base was
used to evaluate the performance of methods under conditions where
the pose and sample size are varied, and the database YaleB was used
to examine the performance of the systems when the facial
expressions and lighting are varied.
Abstract: Many existing amusement parks have been operated
with assistance of a variety of information and communications
technologies to design friendly and efficient service systems for
tourists. However, these systems leave various levels of decisions to
tourists to make by themselves. This incurs pressure on tourists and
thereby bringing negative experience in their tour. This paper
proposes a smart amusement park system to offer each tourist the
GPS-based customized plan without tourists making decisions by
themselves. The proposed system consists of the mobile app
subsystem, the central subsystem, and the detecting/counting
subsystem. The mobile app subsystem interacts with the central
subsystem. The central subsystem performs the necessary computing
and database management of the proposed system. The
detecting/counting subsystem aims to detect and compute the number
of visitors to an attraction. Experimental results show that the
proposed system can not only work well, but also provide an
innovative business operating model for owners of amusement parks.
Abstract: A new approach has been developed to estimate the
load share and distribution of worm gear drives, and to calculate the
instantaneous tooth meshing stiffness. In the approach, the worm gear
drive was modelled as a series of spur gear slices, and each slice was
analyzed separately using the well-established formulae of spur gear
loading and stresses. By combining the results obtained for all slices,
the entire envolute worm gear set loading and stressing was obtained. The geometric modelling method presented allows tooth elastic
deformation and tooth root stresses of worm gear drives under
different load conditions to be investigated. Based on the slicing
method introduced in this study, the instantaneous meshing stiffness
and load share are obtained. In comparison with existing methods,
this approach has both good analysis accuracy and less computing
time.
Abstract: E-retailing is the sale of goods online that takes place
over the Internet. The Internet has shrunk the entire World. World eretailing
is growing at an exponential rate in the Americas, Europe
and Asia. However, e-retailing costs require expensive investment,
such as hardware, software, and security systems. Cloud computing
technology is internet-based computing for the management and
delivery of applications and services. Cloud-based e-retailing
application models allow enterprises to lower their costs with their
effective implementation of e-retailing activities. In this paper, we
describe the concept of cloud computing and present the architecture
of cloud computing, combining the features of e-retailing. In
addition, we propose a strategy for implementing cloud computing
with e-retailing. Finally, we explain the benefits from the
architecture.
Abstract: Wireless Sensor Networks (WSNs) enable new
applications and need non-conventional paradigms for the protocol
because of energy and bandwidth constraints, In WSN, sensor node’s
life is a critical parameter. Research on life extension is based on
Low-Energy Adaptive Clustering Hierarchy (LEACH) scheme,
which rotates Cluster Head (CH) among sensor nodes to distribute
energy consumption over all network nodes. CH selection in WSN
affects network energy efficiency greatly. This study proposes an
improved CH selection for efficient data aggregation in sensor
networks. This new algorithm is based on Bacterial Foraging
Optimization (BFO) incorporated in LEACH.
Abstract: Workflow scheduling is an important part of cloud
computing and based on different criteria it decides cost, execution
time, and performances. A cloud workflow system is a platform
service facilitating automation of distributed applications based on
new cloud infrastructure. An aspect which differentiates cloud
workflow system from others is market-oriented business model, an
innovation which challenges conventional workflow scheduling
strategies. Time and Cost optimization algorithm for scheduling
Hybrid Clouds (TCHC) algorithm decides which resource should be
chartered from public providers is combined with a new De-De
algorithm considering that every instance of single and multiple
workflows work without deadlocks. To offset this, two new concepts
- De-De Dodging Algorithm and Priority Based Decisive Algorithm -
combine with conventional deadlock avoidance issues by proposing
one algorithm that maximizes active (not just allocated) resource use
and reduces Makespan.
Abstract: In this paper, the secure BioSemantic Scheme is
presented to bridge biological/biomedical research problems and
computational solutions via semantic computing. Due to the diversity
of problems in various research fields, the semantic capability
description language (SCDL) plays and important role as a common
language and generic form for problem formalization. SCDL is
expected the essential for future semantic and logical computing in
Biosemantic field. We show several example to Biomedical problems
in this paper. Moreover, in the coming age of cloud computing, the
security problem is considered to be crucial issue and we presented a
practical scheme to cope with this problem.