957 resultados para swd: Ubiquitous Computing


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Data perturbation is a popular method to achieve privacy-preserving data mining. However, distorted databases bring enormous overheads to mining algorithms as compared to original databases. In this paper, we present the GrC-FIM algorithm to address the efficiency problem in mining frequent itemsets from distorted databases. Two measures are introduced to overcome the weakness in existing work: firstly, the concept of independent granule is introduced, and granule inference is used to distinguish between non-independent itemsets and independent itemsets. We further prove that the support counts of non-independent itemsets can be directly derived from subitemsets, so that the error-prone reconstruction process can be avoided. This could improve the efficiency of the algorithm, and bring more accurate results; secondly, through the granular-bitmap representation, the support counts can be calculated in an efficient way. The empirical results on representative synthetic and real-world databases indicate that the proposed GrC-FIM algorithm outperforms the popular EMASK algorithm in both the efficiency and the support count reconstruction accuracy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

When using linguistic approaches to solve decision problems, we need the techniques for computing with words (CW). Together with the 2-tuple fuzzy linguistic representation models (i.e., the Herrera and Mart´ınez model and the Wang and Hao model), some computational techniques for CW are also developed. In this paper, we define the concept of numerical scale and extend the 2-tuple fuzzy linguistic representation models under the numerical scale.We find that the key of computational techniques
based on linguistic 2-tuples is to set suitable numerical scale with
the purpose of making transformations between linguistic 2-tuples
and numerical values. By defining the concept of the transitive
calibration matrix and its consistent index, this paper develops an optimization model to compute the numerical scale of the linguistic term set. The desired properties of the optimization model are also presented. Furthermore, we discuss how to construct the transitive calibration matrix for decision problems using linguistic preference relations and analyze the linkage between the consistent index of the transitive calibration matrix and one of the linguistic preference relations. The results in this paper are pretty helpful to complete the fuzzy 2-tuple representation models for CW.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We assert that companies can make more money and research institutions can improve their performance if inexpensive clusters and enterprise grids are exploited. In this paper, we have demonstrated that our claim is valid by showing the study of how programming environments, tools and middleware could be used for the execution of parallel and sequential applications, multiple parallel applications executing simultaneously on a non-dedicated cluster, and parallel applications on an enterprise grid and that the execution performance was improved. For this purpose an execution environment, and parallel and sequential benchmark applications selected for, and used in, the experiments were characterised.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The functionality of MediaWiki ensures it is a valuable learning repository for sharing and storing information. Constructivist learning can be promoted alongside a wiki repository and various wireless u-learning tools such as mobile phones and digital cameras, to encourage students to gather and share a range of primary and secondary information in a variety of subject areas. This paper outlines one initiative adopted at an Australian University specialising in distance education, which uses a MediaWiki as the primary method for content delivery. Over a period of three-years, the Drugs, Crime and Society wiki has evolved into an organic information repository for storing and accessing current research, press and drug agency material that supplements core themes examined in each topic of the curriculum. A constructivist approach has been employed to encourage students to engage in a range of assessable and non-assessable information sharing activities. The paper also demonstrates how the Drugs, Crime and Society wiki can be accessed through various wireless u-learning technologies, which enables students undertaking field placements to add and share primary information with other students and practitioners working in the drugs field.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cloud computing is offering utility-oriented IT services to users worldwide. Based on a pay-as-you-go model, it enables hosting of pervasive applications from consumer, scientific, and business domains. However, data centers hosting Cloud applications consume huge amounts of energy, contributing to high operational costs and carbon footprints to the environment. Therefore, we need Green Cloud computing solutions that can not only save energy for the environment but also reduce operational costs. This paper presents vision, challenges, and architectural elements for energy-efficient management of Cloud computing environments. We focus on the development of dynamic resource provisioning and allocation algorithms that consider the synergy between various data center infrastructures (i.e., the hardware, power units, cooling and software), and holistically work to boost data center energy efficiency and performance. In particular, this paper proposes (a) architectural principles for energy-efficient management of Clouds; (b) energy-efficient resource allocation policies and scheduling algorithms considering quality-of-service expectations, and devices power usage characteristics; and (c) a novel software technology for energy-efficient management of Clouds. We have validated our approach by conducting a set of rigorous performance evaluation study using the CloudSim toolkit. The results demonstrate that Cloud computing model has immense potential as it offers significant performance gains as regards to response time and cost saving under dynamic workload scenarios.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

While the nascent Cloud Computing paradigm supported by virtualization has the upward new notion of edges, it lacks proper security and trust mechanisms. Edges are like on demand scalability and infinite resource provisioning as per the `pay-as-you-go' manner in favour of a single information owner (abbreviated as INO from now onwards) to multiple corporate INOs. While outsourcing information to a cloud storage controlled by a cloud service provider (abbreviated as CSP from now onwards) relives an information owner of tackling instantaneous oversight and management needs, a significant issue of retaining the control of that information to the information owner still needs to be solved. This paper perspicaciously delves into the facts of the Cloud Computing security issues and aims to explore and establish a secure channel for the INO to communicate with the CSP while maintaining trust and confidentiality. The objective of the paper is served by analyzing different protocols and proposing the one in commensurate with the requirement of the security property like information or data confidentiality along the line of security in Cloud Computing Environment (CCE). To the best of our knowledge, we are the first to derive a secure protocol by successively eliminating the dangling pitfalls that remain dormant and thereby hamper confidentiality and integrity of information that is worth exchanging between the INO and the CSP. Besides, conceptually, our derived protocol is compared with the SSL from the perspectives of work flow related activities along the line of secure trusted path for information confidentiality.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Ben Schneider’s ASA framework and the associated idea of homogeneity is a theoretical cornerstone on which most organisational person-environment (PE) fit studies are built. However, whilst it is commonly used to justify studies and to explain empirical findings, very few PE fit studies have moved the underlying ASA framework forward. More than 20 years on, the theory remains intact and has barely evolved. This paper begins with a short citation review that illustrates how the ASA framework is used in empirical studies. Following this, the body of the paper explores the reasons why the empirical studies that use the ASA framework as their theoretical underpinning are ineffective in revising Schneider’s ideas. The paper concludes with a discussion of the ASA framework’s rhetorical role and its inappropriateness as a theoretical justification of empirical PE fit studies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Atomically thin sheets of carbon known as “graphene” have captured the imagination of much of the scientific world during the past few years. Although these single sheets of graphite were under our noses for years—within technologies ranging from the humble pencil, which has been around since at least 1565 (Petroski, H. The Pencil: A History of Design and Circumstance; Alfred A. Knopf: New York, 1993), to modern nuclear reactors—graphene was merely considered as part of graphite’s crystal structure until 2004, when Novoselov, Geim, and colleagues (Science 2004, 306, 666−669) first presented some of the surprising electrical properties of graphene layers they had isolated by mechanically peeling sheets off graphite crystals. Today, graphene’s unique electronic structures and properties, bolstered by other intriguing properties discovered in the intervening years, threaten the dominance of carbon nanotubes, a more mature allotrope of carbon, in potential applications from electronics to sensors. In this review, we will consider the promise of graphene for producing small-scale gas sensors for environmental monitoring.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Content provision via ubiquitous technology platforms such as smart mobile phones and personal digital assistants raises interesting practical and research challenges. Many current theoretical frameworks and models are based on assumptions which may not necessarily be valid in the case of ubiquitous technologies, which users employ in a variety of contexts and for different reasons. In this research-in-progress paper we explore how content providers can better conceptualize the content requirements of ubiquitous technology users. We introduce the principle of Continuous Quality of Life Optimization as a theoretical concept to understand the content requirements of these users. We put forth a number of propositions to guide further research and provide details about our own research approach, in which we are exploring ubiquitous content provision from the perspective of content providers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mobile information technologies (IT) are transforming individual work practices and organizations. These devices are extending not only the boundaries of the ‘office’ in space and time, but also the social context within which use occurs. In this paper, we investigate how extra-organizational influences can impact user satisfaction with mobile systems. The findings from our longitudinal study highlight the interrelatedness of different use contexts and their importance in perceptions of user satisfaction. The data indicate that varying social contexts of individual use (individual as employee, as professional, as private user, and as member of society) result in different social influences that affect the individual’s perceptions of user satisfaction with the mobile technology. While existing theories explain user satisfaction with IT within the organizational context, our findings suggest that future studies of mobile IT in organizations should accommodate such extra-organizational contextual influences.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The general idea of cloud computing is offering computational resources as scalable, on demand services accessible over the internet. However, this new realisation of on demand computing is hindered by the amount of user involvement. Currently, high level abstractions in cloud computing only exist in the form of services. In particular, there is no effective means to publish, discover and finally use required services in clouds. In response, we propose a user level abstraction on top of already available cloud abstraction layers, present its concept using the resources via web services (RVWS) framework and demonstrate its feasibility by simplifying the exposure and use of clusters, a commonly used resource in cloud computing.