X
تبلیغات
دکتر وقردوست

دانلود مقالات ISI

IranSci.IR
چهارشنبه 9 مرداد‌ماه سال 1392

محاسبات ابری

به نام خدا

Title: Green cloud computing schemes based on networks: a survey

Authors: N Xiong , W Han A Vandenberg

Abstract: The authors are particularly aware that green cloud computing (GCC) is a broad range and a hot ?eld. The distinction between ?consumer of? and ?provider of? cloud-based energy resources may very important in creating a world-wide ecosystem of GCC. A user simply submits its service request to the cloud service provider with the connection of Internet or wired/wireless networks. The result of the requested service is delivered back to the user in time, whereas the information storage and process, interoperating protocols, service composition, communications and distributed computing, are all smoothly interactive by the networks. In this study, this is a survey on GCC schemes based on networks. The concept and history of Green computing were introduced ?rst, and then focus on the challenge and requirement of cloud computing. Cloud computing needs to become green, which means provisioning cloud service while considering energy consumption under a set of energy consumption criteria and it is called GCC. Furthermore, the recent work done in GCC based on networks, including microprocessors, task scheduling algorithms, virtualisation technology, cooling systems, networks and disk storage were introduced. After that, the works on GCC from their research group was presented in Georgia State University. Finally, the conclusion and some future works were given.   

Publish Year: 2012

Published in: IET Communications

Number of Pages: 7

موضوع: محاسبات ابری

مشاهده صفحه اول مقاله

دانلود مقاله

لینک مقاله در سایت ناشر

 

ایران سای – مرجع مقالات علمی فنی مهندسی

حامی دانش بومی ایرانیان

برچسب‌ها: دانلود مقاله، دانلود رایگان مقاله ISI، دانلود رایگان مقاله، دانلود مقاله آی اس آی، دانلود مقاله از IEEE
سه‌شنبه 8 مرداد‌ماه سال 1392

پردازش توزیع شده، محاسبات توزیع شده

به نام خدا

Title: Design of Command, Data and Telemetry HandlingSystem for a Distributed Computing Architecture CubeSat

Authors: Sharan A Asundi Norman G FitzCoy

Abstract: Among the size, weight and power constraints im-posed by the CubeSat specification, the limitation associatedwith power can be addressed through a distributed computingarchitecture. This paper describes such a distributed com-puting architecture and its operational design in the form ofcommand and data handling system and telemetry formulation,adapted for a CubeSat whose power requirements for provingthe mission are significantly larger than the on-orbit averagepower generated. The 1U CubeSat with the mission objective ofprecision three axes attitude control is composed of a low powerflight computer and a high power, high speed auxiliary processor(CMG controller), along with a high capacity battery. Theprecision sensors, actuators and complex computing algorithms,are interfaced and implemented on the high speed auxiliaryprocessor, which is operated intermittently. Health monitoringsensors, transceiver and other housekeeping tasks are interfacedand implemented on the flight computer, which is in continuousoperation. To facilitate effective operation and telemetry pack-aging, each computing unit is designed to host a storage device.The flight software, designed as operating modes, is distributedacross the two computing platforms. Distributed operationsare initiated through the flight computer and executed on theauxiliary processor. The paper describes in detail the distributeddesign of these operating modes as flowcharts and the associatedtelemetry budget as tables.   

Publish Year: 2013

Published in: Aerospace - IEEE

Number of Pages: 14

موضوع: پردازش توزیع شده، محاسبات توزیع شده

مشاهده صفحه اول مقاله

دانلود مقاله

لینک مقاله در سایت ناشر

 

ایران سای – مرجع مقالات علمی فنی مهندسی

حامی دانش بومی ایرانیان

 

برچسب‌ها: دانلود مقاله، دانلود رایگان مقاله ISI، دانلود رایگان مقاله، دانلود مقاله آی اس آی
دوشنبه 7 مرداد‌ماه سال 1392

رمزنگاری کوانتوم

به نام خدا

Title: Quantum Cryptography: A New Generation of Information Technology Security System

Authors: Sharbaf, M.S.

Abstract: Quantum cryptography is an emerging technology in which two parties can secure network communications by applying the phenomena of quantum physics. The security of these transmissions is based on the inviolability of the laws of quantum mechanics. Quantum cryptography was born in the early seventies when Steven Wiesner wrote _bstagConjugate Coding_bstag, which took more than ten years to end this paper. The quantum cryptography relies on two important elements of quantum mechanics - the Heisenberg Uncertainty principle and the principle of photon polarization. The Heisenberg Uncertainty principle states that, it is not possible to measure the quantum state of any system without distributing that system. The principle of photon polarization states that, an eavesdropper can not copy unknown qubits i.e. unknown quantum states, due to no-cloning theorem which was first presented by Wootters and Zurek in 1982. This research paper concentrates on the theory of quantum cryptography, and how this technology contributes to the network security. This research paper summarizes the current state of quantum cryptography, and the real-world application implementation of this technology, and finally the future direction in which the quantum cryptography is headed forwards.   

Publish Year: 2009

Published in: ITNG - IEEE

Number of Pages: 5

موضوع: رمزنگاری کوانتوم

مشاهده صفحه اول مقاله

دانلود مقاله

لینک مقاله در سایت ناشر

 

ایران سای – مرجع مقالات علمی فنی مهندسی

حامی دانش بومی ایرانیان

 

 

برچسب‌ها: دانلود مقاله، دانلود رایگان مقاله IEEE، رایگان مقاله آی اس آی، دانلود رایگان مقاله، یوزرنیم و پسورد سایتهای علمی، رمزنگاری کوانتوم
یکشنبه 6 مرداد‌ماه سال 1392

کاربرد پردازش تصویر

به نام خدا

Title: Noise Induced Segmentation of Noisy Color Image

Authors: Onkar Krishna, Rajib Kumar Jha, Anil Kumar Tiwari, Badal Soni

Abstract: In this paper we have proposed Noise Induced HSI model based noisy and blurred colour image segmentation technique. This approach uses additive noise to suppress the effect of internal noise present in an image for proper detection of objects from such images. In this algorithm we decompose a given image in Hue, Saturation and Intensity (HSI) components and then apply processing on intensity component of the decomposed image. We measured performance of proposed algorithm in terms of correlation coefficient and number of mismatch pixels. The effectiveness of the proposed algorithm is compared with the different existing techniques. It is observed that the computational complexity of our algorithm is less in comparison with several existing techniques, because it deals only with intensity component of the decomposed image. Furthermore, an additional advantage, our technique of segmentation gives better performance as compared to SSR based segmentation using RGB model, SR-extended, integrated region matching, watershed and marker controlled watershed based segmentation method.   

Publish Year: 2013

Published in: NCC - IEEE

Number of Pages: 5

موضوع: کاربرد پردازش تصویر

مشاهده صحفه اول مقاله

دانلود مقاله

لینک مقاله در سایت ناشر

 

ایران سای – مرجع مقالات علمی فنی مهندسی

حامی دانش بومی ایرانیان

برچسب‌ها: دانلود مقاله، دانلود مقاله آی اس آی، دانلود رایگان مقاله، دانلود رایگان مقاله ISI، یوزرنیم و پسورد سایتهای علمی، پردازش تصویر
شنبه 5 مرداد‌ماه سال 1392

کاربرد وب سرویسها

به نام خدا

Title: Automatic Abstract Service Generation from Web Service Communities

Authors: Xumin Liu,Hua Liu

Abstract: The concept of abstract services has been widelyadopted in service computing to specify the functionality ofcertain types of Web services. It significantly benefits keyservice management tasks, such as service discovery andcomposition, as these tasks can be first applied to a smallnumber of abstract services and then mapped to the large scaleactual services. However, how to generate abstract services isnon-trivial. Current approaches either assume the existenceof abstract services or adopt a manual process that demandsintensive human intervention. We propose a novel approach tofully automate the generation of abstract services from a servicecommunity that consists of a set of functionally similar services.A set of candidate outputs are first discovered based on prede-fined support ratio, which determines the minimum number ofservices that produce the outputs. Then, the matching inputsare identified to form the abstract services. We propose a setof heuristics to effectively prune a large number of candidateabstract services. An comprehensive experimental study onreal world web service data is conducted to demonstrate theeffectiveness and efficiency of the proposed approach.   

Publish Year: 2012

Publisher: ICWS - IEEE

Number of Pages: 8

موضوع: کاربرد وب سرویسها

مشاهده صحفه اول مقاله

دانلود مقاله

لینک مقاله در سایت ناشر

 

ایران سای – مرجع مقالات علمی فنی مهندسی

حامی دانش بومی ایرنیان

برچسب‌ها: دانلود مقاله، دانلود رایگان مقاله، دانلود رایگان مقاله ISI، دانلود مقاله آی اس آی، دانلود مقاله از IEEE، دانلود رایگان مقالات آی اس آی
   1       2       3       4       5       ...       29    صفحه بعدی