Abstract: This article deals with geographical conditions in
terrain and their effect on the movement of vehicles, their effect on
speed and safety of movement of people and vehicles. Finding of the
optimal routes outside the communication is studied in the Army
environment, but it occur in civilian as well, primarily in crisis
situation, or by the provision of assistance when natural disasters
such as floods, fires, storms etc., have happened. These movements
require the optimization of routes when effects of geographical
factors should be included. The most important factor is the surface
of a terrain. It is based on several geographical factors as are slopes,
soil conditions, micro-relief, a type of surface and meteorological
conditions. Their mutual impact has been given by coefficient of
deceleration. This coefficient can be used for the commander`s
decision. New approaches and methods of terrain testing,
mathematical computing, mathematical statistics or cartometric
investigation are necessary parts of this evaluation.
Abstract: In this paper, we propose an automatic verification
technology of software patches for user virtual environments on IaaS
Cloud to decrease verification costs of patches. In these days, IaaS
services have been spread and many users can customize virtual
machines on IaaS Cloud like their own private servers. Regarding to
software patches of OS or middleware installed on virtual machines,
users need to adopt and verify these patches by themselves. This task
increases operation costs of users. Our proposed method replicates
user virtual environments, extracts verification test cases for user
virtual environments from test case DB, distributes patches to virtual
machines on replicated environments and conducts those test cases
automatically on replicated environments. We have implemented the
proposed method on OpenStack using Jenkins and confirmed the
feasibility. Using the implementation, we confirmed the effectiveness
of test case creation efforts by our proposed idea of 2-tier abstraction
of software functions and test cases. We also evaluated the automatic
verification performance of environment replications, test cases
extractions and test cases conductions.
Abstract: Currently, there is excessively growing information
about places on Facebook, which is the largest social network but
such information is not explicitly organized and ranked. Therefore
users cannot exploit such data to recommend places conveniently and
quickly. This paper proposes a Facebook application and an Android
application that recommend places based on the number of check-ins
of those places, the distance of those places from the current location,
the number of people who like Facebook page of those places, and
the number of talking about of those places. Related Facebook data is
gathered via Facebook API requests. The experimental results of the
developed applications show that the applications can recommend
places and rank interesting places from the most to the least. We have
found that the average satisfied score of the proposed Facebook
application is 4.8 out of 5. The users’ satisfaction can increase by
adding the app features that support personalization in terms of
interests and preferences.
Abstract: This article is to review and understand the new
generation of students to understand their expectations and attitudes.
There are a group of students on school projects, creative work,
educational software and digital signal source, the use of social
networking tools to communicate with friends and a part in the
competition. Today's students have been described as the new
millennium students. They use information and communication
technology in a more creative and innovative at home than at school,
because the information and communication technologies for
different purposes, in the home, usually occur in school. They
collaborate and communicate more effectively when they are at
home. Most children enter school, they will bring about how to use
information and communication technologies, some basic skills and
some tips on how to use information and communication technology
will provide a more advanced than most of the school's expectations.
Many teachers can help students, however, still a lot of work,
"tradition", without a computer, and did not see the "new social
computing networks describe young people to learn and new ways of
working life in the future", in the education system of the benefits of
using a computer.
Abstract: Job Scheduling plays an important role for efficient
utilization of grid resources available across different domains and
geographical zones. Scheduling of jobs is challenging and NPcomplete.
Evolutionary / Swarm Intelligence algorithms have been
extensively used to address the NP problem in grid scheduling.
Artificial Bee Colony (ABC) has been proposed for optimization
problems based on foraging behaviour of bees. This work proposes a
modified ABC algorithm, Cluster Heterogeneous Earliest First Min-
Min Artificial Bee Colony (CHMM-ABC), to optimally schedule
jobs for the available resources. The proposed model utilizes a novel
Heterogeneous Earliest Finish Time (HEFT) Heuristic Algorithm
along with Min-Min algorithm to identify the initial food source.
Simulation results show the performance improvement of the
proposed algorithm over other swarm intelligence techniques.
Abstract: Wireless mesh networking is rapidly gaining in
popularity with a variety of users: from municipalities to enterprises,
from telecom service providers to public safety and military
organizations. This increasing popularity is based on two basic facts:
ease of deployment and increase in network capacity expressed in
bandwidth per footage; WMNs do not rely on any fixed
infrastructure. Many efforts have been used to maximizing
throughput of the network in a multi-channel multi-radio wireless
mesh network. Current approaches are purely based on either static or
dynamic channel allocation approaches. In this paper, we use a
hybrid multichannel multi radio wireless mesh networking
architecture, where static and dynamic interfaces are built in the
nodes. Dynamic Adaptive Channel Allocation protocol (DACA), it
considers optimization for both throughput and delay in the channel
allocation. The assignment of the channel has been allocated to be codependent
with the routing problem in the wireless mesh network and
that should be based on passage flow on every link. Temporal and
spatial relationship rises to re compute the channel assignment every
time when the pattern changes in mesh network, channel assignment
algorithms assign channels in network. In this paper a computing
path which captures the available path bandwidth is the proposed
information and the proficient routing protocol based on the new path
which provides both static and dynamic links. The consistency
property guarantees that each node makes an appropriate packet
forwarding decision and balancing the control usage of the network,
so that a data packet will traverse through the right path.
Abstract: Cloud computing (CC) has already gained overall
appreciation in research and practice. Whereas the willingness to
integrate cloud services in various IT environments is still unbroken,
the previous CC procurement processes run mostly in an unorganized
and non-standardized way. In practice, a sufficiently specific, yet
applicable business process for the important acquisition phase is
often lacking. And research does not appropriately remedy this
deficiency yet. Therefore, this paper introduces a field-tested
approach for CC procurement. Based on an extensive literature
review and augmented by expert interviews, we designed a model
that is validated and further refined through an in-depth real-life case
study. For the detailed process description, we apply the event-driven
process chain notation (EPC). The gained valuable insights into the
case study may help CC research to shift to a more socio-technical
area. For practice, next to giving useful organizational instructions
we will provide extended checklists and lessons learned.
Abstract: In this work, neural networks methods MLP type were
applied to a database from an array of six sensors for the detection of
three toxic gases. The choice of the number of hidden layers and the
weight values are influential on the convergence of the learning
algorithm. We proposed, in this article, a mathematical formula to
determine the optimal number of hidden layers and good weight
values based on the method of back propagation of errors. The results
of this modeling have improved discrimination of these gases and
optimized the computation time. The model presented here has
proven to be an effective application for the fast identification of
toxic gases.
Abstract: Cloud computing has provided the impetus for change
in the demand, sourcing, and consumption of IT-enabled services.
The technology developed from an emerging trend towards a ‘musthave’.
Many organizations harnessed on the quick-wins of cloud
computing within the last five years but nowadays reach a plateau
when it comes to sustainable savings and performance. This study
aims to investigate what is needed from an organizational perspective
to make cloud computing a sustainable success. The study was
carried out in Germany among senior IT professionals, both in
management and delivery positions. Our research shows that IT
executives must be prepared to realign their IT workforce to sustain
the advantage of cloud computing for today and the near future.
While new roles will undoubtedly emerge, roles alone cannot ensure
the success of cloud deployments. What is needed is a change in the
IT workforce’s business behaviour, or put more simply, the ways in
which the IT personnel works. It gives clear guidance on which
dimensions of an employees’ working behaviour need to be adapted.
The practical implications are drawn from a series of semi-structured
interviews, resulting in a high-level workforce enablement plan.
Lastly, it elaborates on tools and gives clear guidance on which
pitfalls might arise along the proposed workforce enablement
process.
Abstract: As enterprise computing becomes more and more
complex, the costs and technical challenges of IT system maintenance
and support are increasing rapidly. One popular approach to managing
IT system maintenance is to prepare and use a FAQ (Frequently Asked
Questions) system to manage and reuse systems knowledge. Such a
FAQ system can help reduce the resolution time for each service
incident ticket. However, there is a major problem where over time the
knowledge in such FAQs tends to become outdated. Much of the
knowledge captured in the FAQ requires periodic updates in response
to new insights or new trends in the problems addressed in order to
maintain its usefulness for problem resolution. These updates require a
systematic approach to define the exact portion of the FAQ and its
content. Therefore, we are working on a novel method to
hierarchically structure the FAQ and automate the updates of its
structure and content. We use structured information and the
unstructured text information with the timelines of the information in
the service incident tickets. We cluster the tickets by structured
category information, by keywords, and by keyword modifiers for the
unstructured text information. We also calculate an urgency score
based on trends, resolution times, and priorities. We carefully studied
the tickets of one of our projects over a 2.5-year time period. After the
first 6 months we started to create FAQs and confirmed they improved
the resolution times. We continued observing over the next 2 years to
assess the ongoing effectiveness of our method for the automatic FAQ
updates. We improved the ratio of tickets covered by the FAQ from
32.3% to 68.9% during this time. Also, the average time reduction of
ticket resolution was between 31.6% and 43.9%. Subjective analysis
showed more than 75% reported that the FAQ system was useful in
reducing ticket resolution times.
Abstract: Tumor is an uncontrolled growth of tissues in any part
of the body. Tumors are of different types and they have different
characteristics and treatments. Brain tumor is inherently serious and
life-threatening because of its character in the limited space of the
intracranial cavity (space formed inside the skull). Locating the tumor
within MR (magnetic resonance) image of brain is integral part of the
treatment of brain tumor. This segmentation task requires
classification of each voxel as either tumor or non-tumor, based on
the description of the voxel under consideration. Many studies are
going on in the medical field using Markov Random Fields (MRF) in
segmentation of MR images. Even though the segmentation process
is better, computing the probability and estimation of parameters is
difficult. In order to overcome the aforementioned issues, Conditional
Random Field (CRF) is used in this paper for segmentation, along
with the modified artificial bee colony optimization and modified
fuzzy possibility c-means (MFPCM) algorithm. This work is mainly
focused to reduce the computational complexities, which are found in
existing methods and aimed at getting higher accuracy. The
efficiency of this work is evaluated using the parameters such as
region non-uniformity, correlation and computation time. The
experimental results are compared with the existing methods such as
MRF with improved Genetic Algorithm (GA) and MRF-Artificial
Bee Colony (MRF-ABC) algorithm.
Abstract: This paper describes a logical method to enhance
security on the grid computing to restrict the misuse of the grid
resources. This method is an economic and efficient one to avoid the
usage of the special devices. The security issues, techniques and
solutions needed to provide a secure grid computing environment are
described. A well defined process for security management among
the resource accesses and key holding algorithm is also proposed. In
this method, the identity management, access control and
authorization and authentication are effectively handled.
Abstract: In the cloud computing hierarchy IaaS is the lowest
layer, all other layers are built over it. Thus it is the most important
layer of cloud and requisite more importance. Along with advantages
IaaS faces some serious security related issue. Mainly Security
focuses on Integrity, confidentiality and availability. Cloud
computing facilitate to share the resources inside as well as outside of
the cloud. On the other hand, cloud still not in the state to provide
surety to 100% data security. Cloud provider must ensure that end
user/client get a Quality of Service. In this report we describe
possible aspects of cloud related security.
Abstract: Apps are today the most important possibility to adapt
mobile phones and computers to fulfill the special needs of their
users. Location- and context-sensitive programs are hereby the key to
support the interaction of the user with his/her environment and also
to avoid an overload with a plenty of dispensable information. The
contribution shows, how a trusted, secure and really bi-directional
communication and interaction among users and their environment
can be established and used, e.g. in the field of home automation.
Abstract: Cloud service brokering is a new service paradigm that
provides interoperability and portability of application across multiple
Cloud providers. In this paper, we designed Cloud service brokerage
system, anyBroker, supporting integrated service provisioning and
SLA based service lifecycle management. For the system design, we
introduce the system concept and whole architecture, details of main
components and use cases of primary operations in the system. These
features ease the Cloud service provider and customer’s concern and
support new Cloud service open market to increase Cloud service
profit and prompt Cloud service echo system in Cloud computing
related area.
Abstract: This study proposes the transformation of nonlinear
Magnetic Levitation System into linear one, via state and feedback
transformations using explicit algorithm. This algorithm allows
computing explicitly the linearizing state coordinates and feedback
for any nonlinear control system, which is feedback linearizable,
without solving the Partial Differential Equations. The algorithm is
performed using a maximum of N-1 steps where N being the
dimension of the system.
Abstract: The growth of wireless devices affects the availability
of limited frequencies or spectrum bands as it has been known that
spectrum bands are a natural resource that cannot be added.
Meanwhile, the licensed frequencies are idle most of the time.
Cognitive radio is one of the solutions to solve those problems.
Cognitive radio is a promising technology that allows the unlicensed
users known as secondary users (SUs) to access licensed bands
without making interference to licensed users or primary users (PUs).
As cloud computing has become popular in recent years, cognitive
radio networks (CRNs) can be integrated with cloud platform. One of
the important issues in CRNs is security. It becomes a problem since
CRNs use radio frequencies as a medium for transmitting and CRNs
share the same issues with wireless communication systems. Another
critical issue in CRNs is performance. Security has adverse effect to
performance and there are trade-offs between them. The goal of this
paper is to investigate the performance related to security trade-off in
CRNs with supporting cloud platforms. Furthermore, Queuing
Network Models with preemptive resume and preemptive repeat
identical priority are applied in this project to measure the impact of
security to performance in CRNs with or without cloud platform. The
generalized exponential (GE) type distribution is used to reflect the
bursty inter-arrival and service times at the servers. The results show
that the best performance is obtained when security is disabled and
cloud platform is enabled.
Abstract: In this paper the vibration of a synchronous belt drive
during start-up is analyzed and discussed. Besides considering the
belt elasticity, the model here proposed also takes into consideration
the electromagnetic response of the DC motor. The solution of the
motion equations is obtained by means of the modal analysis in
state space, which allows to obtain the decoupling of all equations,
without introducing the hypothesis of proportional damping. The
mathematical model of the transmission and the solution algorithms
have been implemented within a computing software that allows the
user to simulate the dynamics of the system and to evaluate the effects
due to the elasticity of the belt branches and to the electromagnetic
behavior of the DC motor. In order to show the details of the
calculation procedure, the paper presents a case study developed with
the aid of the above-mentioned software.
Abstract: Data Grid is a geographically distributed environment that deals with data intensive application in scientific and enterprise computing. Data replication is a common method used to achieve efficient and fault-tolerant data access in Grids. In this paper, a dynamic data replication strategy, called Enhanced Latest Access Largest Weight (ELALW) is proposed. This strategy is an enhanced version of Latest Access Largest Weight strategy. However, replication should be used wisely because the storage capacity of each Grid site is limited. Thus, it is important to design an effective strategy for the replication replacement task. ELALW replaces replicas based on the number of requests in future, the size of the replica, and the number of copies of the file. It also improves access latency by selecting the best replica when various sites hold replicas. The proposed replica selection selects the best replica location from among the many replicas based on response time that can be determined by considering the data transfer time, the storage access latency, the replica requests that waiting in the storage queue and the distance between nodes. Simulation results utilizing the OptorSim show our replication strategy achieve better performance overall than other strategies in terms of job execution time, effective network usage and storage resource usage.
Abstract: As an emerging business model, cloud computing has been initiated to satisfy the need of organizations and to push Information Technology as a utility. The shift to the cloud has changed the way Information Technology departments are managed traditionally and has raised many concerns for both, public and private sectors.
The purpose of this study is to investigate the possibility of cloud computing services replacing services provided traditionally by IT departments. Therefore, it aims to 1) explore whether organizations in Oman are ready to move to the cloud; 2) identify the deciding factors leading to the adoption or rejection of cloud computing services in Oman; and 3) provide two case studies, one for a successful Cloud provider and another for a successful adopter.
This paper is based on multiple research methods including conducting a set of interviews with cloud service providers and current cloud users in Oman; and collecting data using questionnaires from experts in the field and potential users of cloud services.
Despite the limitation of bandwidth capacity and Internet coverage offered in Oman that create a challenge in adopting the cloud, it was found that many information technology professionals are encouraged to move to the cloud while few are resistant to change.
The recent launch of a new Omani cloud service provider and the entrance of other international cloud service providers in the Omani market make this research extremely valuable as it aims to provide real-life experience as well as two case studies on the successful provision of cloud services and the successful adoption of these services.