Search results

Filters

  • Journals
  • Authors
  • Keywords
  • Date
  • Type

Search results

Number of results: 8
items per page: 25 50 75
Sort by:
Download PDF Download RIS Download Bibtex

Abstract

Confidential algorithm for the approximate graph vertex covering problem is presented in this article. It can preserve privacy of data at every stage of the computation, which is very important in context of cloud computing. Security of our solution is based on fully homomorphic encryption scheme. The time complexity and the security aspects of considered algorithm are described.
Go to article

Authors and Affiliations

Daniel Waszkiewicz
Aleksandra Horubała
Piotr Sapiecha
Michał Andrzejczak
Download PDF Download RIS Download Bibtex

Abstract

With the rapid development of remote sensing technology, our ability to obtain remote sensing data has been improved to an unprecedented level. We have entered an era of big data. Remote sensing data clear showing the characteristics of Big Data such as hyper spectral, high spatial resolution, and high time resolution, thus, resulting in a significant increase in the volume, variety, velocity and veracity of data.This paper proposes a feature supporting, salable, and efficient data cube for timeseries analysis application, and used the spatial feature data and remote sensing data for comparative study of the water cover and vegetation change. In this system, the feature data cube building and distributed executor engine are critical in supporting large spatiotemporal RS data analysis with spatial features. The feature translation ensures that the geographic object can be combined with satellite data to build a feature data cube for analysis. Constructing a distributed executed engine based on dask ensures the efficient analysis of large-scale RS data. This work could provide a convenient and efficient multidimensional data services for many remote sens-ing applications.
Go to article

Authors and Affiliations

Yassine Sabri
1
Fadoua Bahja
1
Henk Pet
2

  1. Laboratory of Innovation in Management and Engineering for Enterprise (LIMIE), ISGA Rabat, 27 Avenuel Oqba, Agdal, Rabat, Morocco
  2. Terra Motion Limited, 11 Ingenuity Centre, Innovation Park, Jubilee Campus, University of Nottingham, Nottingham NG7 2TU, UK
Download PDF Download RIS Download Bibtex

Abstract

The problem of performing software tests using Testing-as-a-Service cloud environment is considered and formulated as an~online cluster scheduling on parallel machines with total flowtime criterion. A mathematical model is proposed. Several properties of the problem, including solution feasibility and connection to the classic scheduling on parallel machines are discussed. A family of algorithms based on a new priority rule called the Smallest Remaining Load (SRL) is proposed. We prove that algorithms from that family are not competitive relative to each other. Computer experiment using real-life data indicated that the SRL algorithm using the longest job sub-strategy is the best in performance. This algorithm is then compared with the Simulated Annealing metaheuristic. Results indicate that the metaheuristic rarely outperforms the SRL algorithm, obtaining worse results most of the time, which is counter-intuitive for a metaheuristic. Finally, we test the accuracy of prediction of processing times of jobs. The results indicate high (91.4%) accuracy for predicting processing times of test cases and even higher (98.7%) for prediction of remaining load of test suites. Results also show that schedules obtained through prediction are stable (coefficient of variation is 0.2‒3.7%) and do not affect most of the algorithms (around 1% difference in flowtime), proving the considered problem is semi-clairvoyant. For the Largest Remaining Load rule, the predicted values tend to perform better than the actual values. The use of predicted values affects the SRL algorithm the most (up to 15% flowtime increase), but it still outperforms other algorithms.

Go to article

Authors and Affiliations

J. Rudy
C. Smutnicki
Download PDF Download RIS Download Bibtex

Abstract

In the paper, a noise map service designated for the user interested in environmental noise is presented. Noise prediction algorithm and source model, developed for creating acoustic maps, are working in the cloud computing environment. In the study, issues related to the noise modelling of sound propagation in urban spaces are discussed with a particular focus on traffic noise. Examples of results obtained through a web application created for that purpose are shown. In addition, these are compared to results obtained from the commercial software simulations based on two road noise prediction models. Moreover, the computing performance of the developed application is investigated and analyzed. In the paper, a flowchart simulating the operation of the noise web-based service is presented showing that the created application is easy to use even for people with little experience in computer technology.
Go to article

Authors and Affiliations

Karolina Marciniuk
Bożena Kostek
Maciej Szczodrak
Download PDF Download RIS Download Bibtex

Abstract

The article is devoted to generation techniques of the new public key crypto-systems, which are based on application of indistinguishability obfuscation methods to selected private key crypto-systems. The techniques are applied to symmetric key crypto-system and the target system is asymmetric one. As an input for our approach an implementation of symmetric block cipher with a given private-key is considered. Different obfuscation methods are subjected to processing. The targetsystem would be treated as a public-key for newly created public crypto-system. The approach seems to be interesting from theoretical point of view. Moreover, it can be useful for information protection in a cloud-computing model.
Go to article

Authors and Affiliations

Aleksandra Horubała
Daniel Waszkiewicz
Michał Andrzejczak
Piotr Sapiecha
Download PDF Download RIS Download Bibtex

Abstract

The purpose of the study is to analyze the opportunities and the challenges associated with the adoption of Information technology in the Indian SMEs. The significant usage of Information Technology in the SME sector and the factors that influence the business are discussed. SME industry in India has shown substantial growth over the past few years. The implementation of new technologies tends to offer better opportunities to the companies particularly for SME sector in India. However, there are a few challenges associated with technology adaptation that needs attention. This research is focused on improved business quality and responsiveness towards market opportunities while using the latest technologies available. This study is based on a review of research journals and articles including news magazines concerning current SME market situation in India. The current market scenario of Indian SMEs, as well as several policy interventions and new trends in the market were discussed.
Go to article

Authors and Affiliations

Ibrahim Khan
Stefan Trzcieliński
Download PDF Download RIS Download Bibtex

Abstract

Strategic Informatics is a monograph of the field of computer science in the field of; Its strategic development waves, the challenges of technological progress in the context of the strategic role of computer science, the main strategy-oriented applications in business, healthcare, agriculture, education and private home, strategic challenges of computer science in the humanities, digital state and city, sustainable development and information ethics, morality, and rights.
Go to article

Authors and Affiliations

Kazimierz Kowalski
1

  1. Professor Emeritus, California State University, Dominguez Hills

This page uses 'cookies'. Learn more