IARIA

Displaying 481-520 of 1223 results

  • White Papers // Jan 2012

    Semiautomatic Evaluation of Websites Usability

    This paper presents a semiautomatic evaluation method of usability in websites. Expert review is done in this case using a template based on the ISO 9241-151 guidelines that provides numerical and graphical results. Such results permit to observe the aspects of usability that are missed on the evaluated website. This...

    Provided By IARIA

  • White Papers // Jan 2012

    Motion-Sound Interaction Using Sonification Based on Motiongrams

    The paper presents a method for sonification of human body motion based on motiongrams. Motiongrams show the spatiotemporal development of body motion by plotting average matrices of motion images over time. The resultant visual representation resembles spectrograms, and is treated as such by the new sonifyer module for Jamoma for...

    Provided By IARIA

  • White Papers // Jan 2012

    Design Guidelines for Hybrid 2D/3D User Interfaces on Tablet Devices - A User Experience Evaluation

    There is a growing proliferation of 3D based applications in tablet devices, but there is a lack of studies evaluating user experiences of these user interfaces. In particular, most of these applications use a mix of overlaid 2D controls and embedded 3D controls for user interactions and there is little...

    Provided By IARIA

  • White Papers // Jan 2012

    Analysis of Volumetric Tactile Symbols Produced With 3D Printing

    The morphological elements of design used for designing tactile maps and symbols for visually impaired users are points, linear, and areal elements. One of the main characteristics of these elements is their two-dimensional and graphic nature. However, since three-dimensional design came to be a fourth group of elements, volumetric elements,...

    Provided By IARIA

  • White Papers // Jan 2012

    Accessibility Study of Rich Web Interface Components

    The use of the latest technologies to develop rich interfaces for websites could decrease one accessibility, making problematic the access for people with disabilities. Faced with this problem, this paper executed a study to evaluate the accessibility of rich components on the Web. The paper used WAI-ARIA recommendations as reference...

    Provided By IARIA

  • White Papers // Jan 2012

    Virtualization Technology for Multi-Display Systems

    The method for creation of multi-user multi-monitor systems designed for educational purposes is suggested. The method utilizes virtual machine technology which makes possible to create completely isolated user working environment, remote access to equipment and remote workstation administration. Standard interfaces like DVI, VGA or USB are used as data transmission...

    Provided By IARIA

  • White Papers // Jan 2012

    The Utility of Controlled Vocabularies Within Bookmark Management Tasks

    This research investigates the utility of adopting a controlled vocabulary approach to bookmark management. An initial user survey conducted for this research has shown that just over half the population use bookmarks to save important websites and that 75% of these people use up to three sub-levels only. The bookmark...

    Provided By IARIA

  • White Papers // Jan 2012

    Designing Multi-Modal Map-Based Interfaces for Disaster Management

    The access to current and reliable maps and data is a critical factor in the management of disaster situations. Standard user interfaces are not well suited to provide this information to crisis managers. Especially in dynamic situations conventional cartographic displays and mouse based interaction techniques fail to address the need...

    Provided By IARIA

  • White Papers // Jan 2012

    Multilingual Ontology Alignment Based on Visual Representations of Ontology Concepts

    Image search represents one of the most frequent user actions on the Internet. Existing image search engines do not understand the images they return, nor do they support multilingualism. These issues can be addressed with the introduction of a semantic layer. The semantics is encoded in ontologies, which contain structured...

    Provided By IARIA

  • White Papers // Jan 2012

    TsoKaDo: An Image Search Engine Performing Recursive Query Recommendation Based on Visual Information

    This paper tackles the problem of the user's incapability to describe exactly the image that he seeks by introducing an innovative image search engine called TsoKaDo. Until now the traditional web image search was based only on the comparison between metadata of the webpage and the user's textual description. In...

    Provided By IARIA

  • White Papers // Jan 2012

    Towards 3D Data Environments Using Multi-Touch Screens

    The increase in availability of multi-touch devices has motivated one to consider interaction approaches outside the limitations associated with the use of a mouse. The problem that the authors try to solve is how to interact in a 3D world using a 2D surface multi-touch display. Before showing their proposed...

    Provided By IARIA

  • White Papers // Jan 2012

    User Interface for Trust Decision Making in Inter-Enterprise Collaborations

    Trust decisions on inter-enterprise collaborations involve a trustor's subjective evaluation of its willingness to participate in the specific collaboration, given the risks and incentives involved. In earlier work, the authors have built support on automating routine trust decisions based on a combination of risk, reputation and incentive information. Non-routine cases...

    Provided By IARIA

  • White Papers // Jan 2012

    Human Operator Perspective to Autonomic Network Management

    Autonomic Communications is a promising approach for the management of future networks, based on providing self-management and other self-x capabilities to the network elements. Network Governance approach aims to develop new methods for operators to efficiently manage this intelligent infrastructure, ensuring human-to-network communication. This paper presents an interview-based analysis of...

    Provided By IARIA

  • White Papers // Jan 2012

    Contents Enforme: Automatic Deformation of Content for Multi-Features Without Information Loss

    The authors introduce a deformation technique that enlarges the feature areas in an image while retaining the information in the non-feature areas. Their main purpose is to provide an effective thumbnail that is useful for practical use in small display devices (e.g., cellular phones, digital cameras, and game devices). Even...

    Provided By IARIA

  • White Papers // Jan 2012

    Authenticated Tangible Interaction Using RFID and Depth-Sensing Cameras

    Interactive large screen displays like tabletops or walls can enhance the interaction between humans and computers. A major topic is the collaboration between multiple simultaneous interacting people. However, most systems suffer from the problem that a distinction of different users is not possible. Hence, in this paper the authors present...

    Provided By IARIA

  • White Papers // Jan 2012

    Generic Brain-Computer Interface for Social and Human-Computer Interaction

    After suffering a more severe disease like spinal cord injury or stroke patients are often not able to interact or even communicate with their environment anymore, especially at the beginning of rehabilitation. Brain-Computer Interfaces (BCIs) can substitute this temporarily lost communication channels and might support rehabilitation by providing an alternative...

    Provided By IARIA

  • White Papers // Jan 2012

    Web Personalization Implications and Challenges

    Companies are under the pressure to provide tailor-made products or services that match customers' preferences better. Personalization from web mining is a significant tool to accommodate this trend by extracting patterns of customer's preferences and connecting them directly to production line and supply chain. However, with exception of companies like...

    Provided By IARIA

  • White Papers // Jan 2012

    Shadow IT Management and Control of Unofficial IT

    Shadow IT describes the supplement of \"Official\" IT by several, autonomous developed IT systems, processes and organizational units, which are located in the business departments. These systems are generally not known, accepted and supported by the official IT department. From the perspective of IT management and control it is necessary...

    Provided By IARIA

  • White Papers // Jan 2012

    Alteration Method of Schedule Information on Public Cloud for Preserving Privacy

    The authors are currently experiencing an explosion of cloud technologies. However, a cloud service administrator may be an untrustworthy third party. Therefore, companies dealing with confidential information cannot use a public cloud. In this paper, they propose a method for preventing the leakage of private information on a cloud schedule...

    Provided By IARIA

  • White Papers // Jan 2012

    Active Mechanisms for Cloud Environments

    Cloud computing has become more and more popular. Many companies (viz., cloud providers) are outsourcing their IT resources into clouds so that users can hire those resources only if they really need the resources and give the resources back when they do not need the resources any longer. This creates...

    Provided By IARIA

  • White Papers // Jan 2012

    Web Services Integration with Regard to the Metrics of Data Believability

    The paper is concerned with estimating the believability of data acquired from web services. In the paper, a new method for believability estimation is introduced. The method is designed for integrating web services. The believability estimation is based on the following metrics: quantity, reputation, approval, independence, traceability, maturity, authority and...

    Provided By IARIA

  • White Papers // Jan 2012

    Mastering Security Anomalies in Virtualized Computing Environments Via Complex Event Processing

    To protect computer systems and their users against security attacks, all potential security related incidents should be detected by monitoring system behavior. In this paper, a novel approach to detect, analyze and handle security anomalies in virtualized computing systems is presented. Adequate sensors on different virtualization layers monitor relevant events,...

    Provided By IARIA

  • White Papers // Jan 2012

    An Overview of Norwegian Linked Open Data - Applications in Regional Development and Environmentally Friendly Behavior

    With Norway being one of the few countries outside of the English speaking world with a clear governmental strategy and commitment to open data, combined with one of the highest Internet penetration and mobile access in Europe, it offers interesting opportunities for becoming a great testbed for consuming Linked Open...

    Provided By IARIA

  • White Papers // Jan 2012

    Comparison of Stacking Methods Regarding Processing and Computing of Geoscientific Depth Data

    This paper presents a comparison of different stacking methods available for processing and computing of geo-scientific depth data for use with various high level applications and computing architectures. These methods are used with seismics and comparable geophysical techniques for example. Today's resources enable to use these methods for more than...

    Provided By IARIA

  • White Papers // Jan 2012

    Mapping OBI and XPDL to a MDE Framework for Laboratory Information Processing

    Biomedical analyses are becoming increasingly complex, both for the type of data produced and the procedures necessary to obtain them. This trend is expected to continue; therefore the development of suitable systems for information and protocol management is becoming essential for the full exploitation of the field. Custom-built applications obtained...

    Provided By IARIA

  • White Papers // Jan 2012

    Modular Verification of Inter-Enterprise Business Processes

    In this paper, the authors propose to adapt the Symbolic Observation Graphs (SOG) based approach in order to abstract, to compose and to check Inter-Enterprise Business Processes (IEBP). Each component (local process) is represented by a SOG where only the collaboration actions of the process are visible while its local...

    Provided By IARIA

  • White Papers // Jan 2012

    Intranet 2.0 Based Knowledge Production: An Exploratory Case Study on Barriers for Social Software

    The evolution of static intranets to dynamic web 2.0 based information systems is one way to provide space for the collaborative production of knowledge within an enterprise. Despite the fact that social software is now commonly provided for intra-company usage, this usage is below expectations in many cases. This paper,...

    Provided By IARIA

  • White Papers // Jan 2012

    Semantic Search in a Process-Oriented Knowledge Base

    MinaBASE, a process-oriented knowledge management system, currently features a simple full-text search as well as a more sophisticated expert search. While the former is much easier to use, the latter has much higher precision and recall characteristics due to a more content-aware filter-mechanism. In this paper, the authors present a...

    Provided By IARIA

  • White Papers // Jan 2012

    Knowledge Discovery Using a Service Oriented Web Application

    The paper proposes a novel platform for knowledge discovery, which is based on modern web technologies, and is implemented as a web application. It is based on the principles of service-oriented knowledge discovery, and features interactive scientific workflows. In contrast to the few existing comparable platforms, their environment is suitable...

    Provided By IARIA

  • White Papers // Jan 2012

    Critical Dimension in Data Mining

    Data mining is an increasingly important means of knowledge acquisition for many applications in diverse fields such as biology, medicine, management, engineering, etc. When tackling a large-scale problem that involves a multitude of potentially relevant factors but lacking a precise formulation or mathematical characterization to allow formal approaches to solution,...

    Provided By IARIA

  • White Papers // Jan 2012

    Digital Investigations for Enterprise Information Architectures

    In this paper, the authors highlight the role of digital forensics in the enterprise information architecture. It presents a framework for embedding digital forensics analysis techniques at various stages of corporate Information and Communication Technologies (ICT) lifecycle. A set of best practices for the corporate ICT security policy is also...

    Provided By IARIA

  • White Papers // Jan 2012

    Identifying Potentially Useful Email Header Features for Email Spam Filtering

    Email spam continues to be a major problem in the Internet. With the spread of malware combined with the power of botnets, spammers are now able to launch large scale spam campaigns causing major traffic increase and leading to enormous economical loss. In this paper, the authors identify potentially useful...

    Provided By IARIA

  • White Papers // Jan 2012

    Cloud Computing and Data Jurisdiction: A New Challenge for Digital Forensics

    Although it has become clear that digital forensics - the practical analysis of digital data following the acquisition of a bit-stream image of a suspect's hard disk - suffered a setback with the wide adoption of mobile devices and the increasing use of flash memory and encryption systems, it is...

    Provided By IARIA

  • White Papers // Jan 2012

    Users' Trust and Secure Feeling Towards Cloud Services

    In this paper, the authors describe the study in which end users' trust and feeling of security in regard to cloud services are examined. Trust and security are one of the key issues within cloud where people use a shared pool of computing resources for the storage of their data...

    Provided By IARIA

  • White Papers // Jan 2012

    Evaluation of Distributed SOAP and Restful Mobile Web Services

    Even mobile Web Services are still provided using servers that usually reside in the core networks. Main reason for not providing large and complex Web Services from resource limited mobile devices is not only the volatility of wireless connections and mobility of mobile hosts, but also, the often limited processing...

    Provided By IARIA

  • White Papers // Nov 2011

    Locating Zigbee Devices in a Cluster-Tree Wireless Sensor Network: an ESD-Based Integrated Solution

    Recent advances in the technology of wireless electronic devices have made possible to build ad-hoc Wireless Sensor Networks (WSNs) using inexpensive nodes consisting of low power processors, a modest amount of memory and simple wireless transceivers. Over the last years, many novel applications have been envisaged for distributed WSNs in...

    Provided By IARIA

  • White Papers // Nov 2011

    An Adaptative Broadcast Scheme for VANET Applications in a High Density Context

    The efficient broadcast of messages in Vehicular Ad-hoc NETwork (VANET) still faces many challenges in current research. In this paper, the authors are interested in multihop broadcast communication for neighborhood discovery applications which increase driver visibility. These applications need to send information with a high rate causing congestion in the...

    Provided By IARIA

  • White Papers // Nov 2011

    Learning Enhanced Environment Perception for Cooperative Power Control

    The vast proliferation of wireless networking devices, coupled with the trend for short-range communications in dense residential environments, imposes new challenges for the efficient addressing of problems resulting from co-existence of heterogeneous devices (e.g., interference) under capacity and energy constraints. This paper proposes and evaluates a cooperative distributed algorithm for...

    Provided By IARIA

  • White Papers // Nov 2011

    Study on Secure Mobile Communication Based on the Hardware Security Module

    This paper presents a survey of information protection methods for secure mobile communication. Most existing software-based information protection systems have a greater risk for the loss or theft and have difficulty in maintaining. In order to solve these problems, the authors considered methods of information protection method based on hardware...

    Provided By IARIA

  • White Papers // Nov 2011

    MergeIA: A Service for Dynamic Merging of Interfering Adaptations in Ubiquitous System

    The composition of adaptations with system's application does not always yield to the desired behavior. Each adaptation occurs correctly when it is separated but it may interact with other adaptations when they are combined. These interactions can affect the final behavior after adaptation; the authors call this an interference. This...

    Provided By IARIA

  • White Papers // Jul 2011

    ASIA: An Access Control, Session Invocation and Authorization Architecture for Home Energy Appliances in Smart Energy Grid Environments

    With the advent of the smart energy grid - an energy transportation and distribution network being combined with an IT network for its monitoring and control - information security has gained tremendous importance for energy distribution and energy automation systems. Integrated security functionality is crucial to ensure a reliable and...

    Provided By IARIA

  • White Papers // Jul 2011

    Exploiting Demand Response in Web-Based Energy-Aware Smart Homes

    Energy conservation is a global issue with tremendous environmental implications. By 2030, the global energy demand will double. High demands and environmental concerns, force the transformation of electricity grids into smart grids, towards more rational utilization of energy. Residential smart metering transforms homes into energy-aware environments, allowing residents to make...

    Provided By IARIA

  • White Papers // Jul 2011

    Using Multitasking and SSD Disks for Optimising Computing Cluster Energy-Efficiency

    The authors tested how Solid-State Drives (SSD) and multitasking, i.e., running more than one task per CPU core, affect performance and energy consumption in I/O intensive data analysis jobs in High-Energy Physics (HEP) computing. Their motivation for the study comes from the LHC experiment at CERN producing up to 15...

    Provided By IARIA

  • White Papers // Jul 2011

    Monitoring IT Power Consumption in a Research Center: Seven Facts

    The authors analyze the power consumption of several IT devices placed in a research center affiliated to the University. The data collection lasted about one year and the analysis let one identify: the average instant power consumption of each type of device, trends of the instant power consumption curves, usage...

    Provided By IARIA

  • White Papers // Jul 2011

    Optimal Scheduling of Smart Homes Energy Consumption With Microgrid

    Microgrid is taken as the future Smart Grid, and can work as a local energy provider to domestic buildings and reduce energy expenses. To further lower the cost, a Smart Homes idea is suggested. Smart Homes of the future will include automation systems and could provide lower energy consumption costs...

    Provided By IARIA

  • White Papers // Jul 2011

    Smard Grid Software Applications for Distribution Network Load Forecasting

    This paper describes three software applications for distribution network load forecasting in a Smart Grid environment: short-term feeder load forecasting, short-term substation transformer load forecasting and transformer rating, and next-year load pocket forecasting. The short-term feeder load forecasting allows a utility to reduce the possibility of feeder overloading. The substation...

    Provided By IARIA

  • White Papers // Jul 2011

    Non-Intrusive Appliance Monitoring Now: Effective Data, Generative Modelling and LETE

    Monitoring energy consumption at appliance level is a necessary condition for many energy efficient applications. In this paper, the authors have identified Non-Intrusive Load Monitoring (NILM) as a transitional technology, and competing NILM methods must be evaluated not only on performance, but also economical feasibility and user usability of now....

    Provided By IARIA

  • White Papers // Jul 2011

    Energy Coupling Control of Telecommunication Network and Power Grid

    In this paper, the authors present a control architecture that allows to operate the energy storage facilities integrated into the wide area telecommunication network as mediators between the optimality criteria of the Smart Grid and the energy consumption modeling of the telecommunication network itself. Different control modes are discussed. In...

    Provided By IARIA

  • White Papers // Jul 2011

    Digital Complexity in DSL: An Extrapolated Historical Overview

    Digital Subscriber Line (DSL) technology for copper twisted pair access networks has been evolving to meet the ever growing demand for higher data rates. This evolution has gone hand in hand with the roll out of fiber deep in the access network. The most recent technology is vectored VDSL2, able...

    Provided By IARIA

  • White Papers // Jul 2011

    Supporting L3 Femtocell Mobility Using the MOBIKE Protocol

    Femtocells can be used to improve the indoor coverage and bandwidth of 3G cellular networks in homes and buildings. The authors are designed to be placed in a fixed location. However, their use would also be interesting in mobile environments such as public transportation systems. This paper studies the mobility...

    Provided By IARIA

  • White Papers // Jul 2011

    Towards Neutrality in Access Networks: A NANDO Deployment With OpenFlow

    A next step in the evolution of Access Networks introduces a scenario in which the fair competition among service providers is enabled through the sharing of access infrastructure. CAPEX savings or regulatory aspects are currently promoting such a scenario. By adding neutrality, the positive feedback loop includes customers, service providers...

    Provided By IARIA

  • White Papers // Jul 2011

    Adaptive Resource Allocation Scheme for TETRA Networks With Multi-Operators

    In this paper, the authors evaluate various aspects of packet data transmission in TErrestrial Trunked RAdio (TETRA) networks giving particular emphasis on the performance of applications transmitting data between a number of radio terminals and a fixed server. The utilization of such applications is constantly increasing in public safety networks...

    Provided By IARIA

  • White Papers // Jul 2011

    A Service-Based Model for the Internet Value Chain

    The exponential growth of Internet traffic is generating revenues which are not fairly distributed among all the actors involved in the value chain. In spite of the increasing returns for over-the-top service providers, application developers, and device producers, network operators and content right owners are not taking advantage of Internet...

    Provided By IARIA

  • White Papers // Jul 2011

    Debugging PVS Specifications of Control Logics Via Event-Driven Simulation

    In this paper, the authors present a framework aimed at simulating control logics specified in the higher-order logic of the Prototype Verification System. The framework offers a library of predefined modules, a method for the composition of more complex modules, and an event-driven simulation engine. A developer simulates the specified...

    Provided By IARIA

  • White Papers // Jul 2011

    Euclides - A JavaScript to PostScript Translator

    Offering an easy access to programming languages that are difficult to approach directly dramatically reduces the inhibition threshold. The Generative Modeling Language is such a language and can be described as being similar to Adobe's PostScript. A major drawback of all PostScript dialects is their unintuitive reverse Polish notation, which...

    Provided By IARIA

  • White Papers // Jul 2011

    PS-NET - A Predictable Typed Coordination Language for Stream Processing in Resource-Constrained Environments

    Stream processing is a well-suited application pattern for embedded computing. This holds true even more so when it comes to multi-core systems where concurrency plays an important role. With the latest trend towards more dynamic and heterogeneous systems there seems to be a shift from purely synchronous systems towards more...

    Provided By IARIA

  • White Papers // Jul 2011

    An Application of a Domain-Specific Language Facilitating Abstraction and Secure Access to a Crime and Ballistic Data Sharing Platform

    Crime investigation requires controlled sharing, secure access and formalized reporting on heterogeneous datasets. This paper will focus on encapsulating data structures and services, whilst exposing abstraction, relevant only to the End-User through the application of a domain-specific language. The language is used for all interactions with the platform, enabling non-technical...

    Provided By IARIA

  • White Papers // Sep 2011

    Balanced Reduction of an IDE-Based Spatio-Temporal Model

    Spatio-temporal models have the potential to represent a wide variety of dynamic behaviour such as the growth of bacteria, the dispersion of a pollutant or the changing spatial patterns in house prices. Classical methods for the simulation of such behaviours suffer from large computational demands due to their high dimensionality....

    Provided By IARIA

  • White Papers // Sep 2011

    A Tool for Signal Probability Analysis of FPGA-Based Systems

    The authors describe a model of Field Programmable Gate Array based systems realised with the Stochastic Activity Networks formalism. The model can be used to debug the circuit design synthesised from the high level description of the system, and to calculate the signal probabilities and transition densities of the circuit...

    Provided By IARIA

  • White Papers // Sep 2011

    Formal Verification of Parameterized Multi-Agent Systems Using Predicate Diagrams

    This paper presents a formal diagram-based verification technique for multi-agent systems. A multi-agent system is a collection of intelligent agents that interact with each others and work together to achieve a goal. The authors view multiagent systems as parameterized systems which are systems that consist of several similar processes whose...

    Provided By IARIA

  • White Papers // Sep 2011

    A Tool for the Evaluation of the Complexity of Programs Using C++ Templates

    The authors investigate the relationship between C++ template metaprogramming and computational complexity, showing how templates characterize the class of polynomial-time computable functions, by means of template recursion and specialization. Hence, standard C++ compilers can be used as a tool to certify polytime-bounded programs. According to, template metaprograms consist of classes...

    Provided By IARIA

  • White Papers // Jul 2011

    Smart Beijing: Correlation of Urban Electrical Energy Consumption With Urban Environmental Sensing for Optimizing Distribution Planning

    This paper focuses on consumer-side activities and investigates the environmental impact of the electrical energy consumer (transportation, buildings, street lighting, etc.), in order to improve the operational efficiency of the city as a whole. To achieve the goal, the authors propose a two-layer approach which consists of a sensing layer...

    Provided By IARIA

  • White Papers // Jul 2011

    Synchronisation Challenges Within Future Smart Grid Infrastructure

    Synchronisation of computer systems is a challenging task when the systems communicate across a dynamic and variable latency network but becomes especially challenging when the network contains wireless communication links. The success of the evolving smart grid project will depend hugely on Information and Communication Technologies to revolutionise the traditional...

    Provided By IARIA

  • White Papers // Jul 2011

    Developing Methods for the Detection of High Impedance Faults in Distribution

    High Impedance Faults are known to be extremely hard to detect. At the same time the efficient detection of them is very important to electric power providers. One of the challenges belonging to a Smart Grid paradigm is how to use new data not available before to improve methodology of...

    Provided By IARIA

  • White Papers // Jul 2011

    Sensors and IEDs Required by Smart Distribution Applications

    In order to meet the electric energy needs at the beginning of this new millennium, utilities need to provide high quality power over a reliable grid, to satisfy customer's growing service quality expectations and to support, as well, a wide array of additional new services. One of the solutions is...

    Provided By IARIA

  • White Papers // Jul 2011

    Optimal Control of Residential Energy Storage Under Price Fluctuations

    An increasing number of retail energy markets exhibit price fluctuations and provide home users the opportunity to buy energy at lower than average prices. However, such cost savings are hard to realize in practice because the people require human users to observe the price fluctuations and shift their electricity demand...

    Provided By IARIA

  • White Papers // Jul 2011

    Energy-Aware Data Stream Management

    With the increasing use of Data Stream Management Systems (DSMS's) in energy-critical areas the energy consumption of the DSMS itself is gaining growing importance. However, processing data streams in an energy-aware manner is still an open research question. In this paper, the authors propose a very first concept for a...

    Provided By IARIA

  • White Papers // Mar 2012

    Short-Term Energy Pattern Detection of Manufacturing Machines With In-Memory Databases - A Case Study

    Today's energy companies mainly use generalized demand sets to predict the required amount of energy of their customers on a high aggregation level. This is sufficient in an energy consumption oriented power grid, having enough resources to produce and transmit the requested and produced amount of energy. With the increasing...

    Provided By IARIA

  • White Papers // Mar 2012

    MIMO-OFDM Based Broadband Power Line Communication Using Antenna and Fading Diversity

    The authors present multiple-input multiple-output orthogonal frequency division multiplexing (MIMO-OFDM) based Broadband Power Line Communication (BPLC) using antenna and fading diversity. They evaluate the proposed MIMO-OFDM system over multi-conductor power line channels, with or without cross-talk between the antenna paths. The proposed scheme employs Maximum Ratio Combining (MRC) that effectively...

    Provided By IARIA

  • White Papers // Mar 2012

    A Privacy Preserving and Secure Authentication Protocol for the Advanced Metering Infrastructure With Non-Repudiation Service

    In the smart grid, smart meters play an important role in keeping a real-time balance between energy production and energy consumption. The advanced metering infrastructure is responsible of collecting, storing, analyzing and providing metering data from smart meters to the authorized parties, and also carrying commands, requests, messages and software...

    Provided By IARIA

  • White Papers // Mar 2012

    Optimization of Energy and Emissions in High-Performance Grid Computing Data Centres

    At an early stage of information and communications technology and high-performance computing, performance and reliability were two important factors in research and development. It was highly essential that the hardware was able to function adequately, performing strategic operations. Energy consumption was not considered as a serious topic, since the technical...

    Provided By IARIA

  • White Papers // Mar 2012

    Reducing Power Consumption Using the Border Gateway Protocol

    In this paper, the authors propose a framework to reduce the aggregate power consumption of the Internet using a collaborative approach between Autonomous Systems (AS). They identify the low-power paths between the AS and then use Traffic Engineering techniques to route packets along the paths. Such low-power paths can be...

    Provided By IARIA

  • White Papers // Mar 2012

    Energy Efficiency of Server Virtualization

    The need for computing power keeps on growing. The rising energy expenses of data centers have made server consolidation and virtualization important research areas. Virtualization and its performance have received a lot of attention and several studies can be found on performance. So far researches have not studied the overall...

    Provided By IARIA

  • White Papers // Jul 2011

    Knowledge-Based Tool for Software Process Assessment and Improvement

    Although many organizations are aware of the importance of using well-defined and organized software development process, they face the problem of how to define and institutionalize it in practice. In order to solve these problems, several process models, maturity models and quality standards have been developed, but the variety of...

    Provided By IARIA

  • White Papers // Jul 2011

    Implementing a VoIP SIP Server and User Agent on a Bare PC

    Bare PC applications run on ordinary desktops and laptops without the support of an operating system or kernel. The authors provide immunity against attacks targeting an underlying operating system, and have been shown to perform better than applications running on conventional systems due to their reduced overhead. They describe a...

    Provided By IARIA

  • White Papers // Jul 2011

    A Dendritic Cell Inspired Security System in Wireless Sensor Networks

    The authors describe a scalable distributed methodology for increasing the rate of real packets received by the Base Station (BS) in a Wireless Sensor Network (WSN) and to limit the inimical impacts of intruders in the network. First, the authors utilize a Dynamic Dendritic Cell Algorithm (DDCA) that effectively detects...

    Provided By IARIA

  • White Papers // Jul 2011

    Study on the Improved D-S Evidence Theory and Its Application on Gas Outburst Prediction

    This paper introduces improved combination rules for the D-S Evidence Theory for dealing with the evidence conflicts which considers the coherence evidence and the conflicts evidences together and allocate the conflicts to various focal elements according to the credibility of the coherence evidence. Also after introduce the similarity degree to...

    Provided By IARIA

  • White Papers // Jul 2011

    An Optimal Resource Assignment Problem in Smart Grid

    The paper describes a resource allocation problem in a smartgrid application formulated and solved as a binary integer programming model. For handling power outages from the main distribution circuit, the intelligent agents in the smart grid have to utilize and negotiate with DER (Distributed Energy Resource) agents that act on...

    Provided By IARIA

  • White Papers // Sep 2011

    Efficient Swarm Algorithms to Constrained Resource Allocation

    Resource management is the effective deployment for an organization's resources. It deals with classification, allocation, stocking, processing, storage, and valuation for the shared resources when they are needed. Among many managerial tasks, the constrained resource allocation problem has challenging many practitioners involved in manufacturing operations. This problem seeks to find...

    Provided By IARIA

  • White Papers // Sep 2011

    Agent-Oriented Computing: Agents as a Paradigm for Computer Programming and Software Development

    The notion of agent more and more appears in different contexts of computer science, often with different meanings. The main acceptation is the AI (Artificial Intelligence) and Distributed AI one, where agents are essentially exploited as a technique to develop special-purpose systems exhibiting some kind of intelligent behavior. In this...

    Provided By IARIA