468,519 research outputs found

    Web-based CBR (case-based reasoning) as a tool with the application to tooling selection

    Get PDF
    Over the past few years, manufacturing companies have had to deal with an increasing demand for feature-rich products at low costs. The pressures exerted on their existing manufacturing processes have lead manufacturers to investigate internet-based solutions, in order to cope with growing competition. The decentralisation phenomenon also came up as a reason to implement networked-application, which has been the starting point for internet/intranet–based systems. Today, the availability of powerful and low cost 3D tools, database backend systems, along with web-based technologies, provides interesting opportunities to the manufacturing community, with solutions directly implementable at the core of their businesses and organisations. In this paper a web-based engineering approach is presented to developing a design support system using case-based reasoning (CBR) technology for helping in the decision-making process when choosing cutting tools. The system aims to provide on-line intelligent support for determining the most suitable configuration for turning operations, based on initial parameters and requirements for the cutting operation. The system also features a user-driven 3D turning simulator which allows testing the chosen insert for several turning operations. The system aims to be a useful e-manufacturing tool being able to quickly and responsively provide tooling data in a highly interactive way

    Next Generation Marine Data Networks in an IoT Environment

    Get PDF
    Packet data networks at sea offer the potential for increased safety, connectivity and meteorological data acquisition. Existing solutions including satellite communication are expensive and prohibitive to most small vessels. In this paper, an Internet of Things (IoT) application is proposed as a marine data acquisition and cartography system over Ship Ad-hoc Networks (SANET). Ships are proposed to communicate over Very High Frequency (VHF) which is already available on the majority of ships and are equipped with several sensors such as sea depth, temperature, wind speed and direction, etc. On shore, 5G base station nodes represent sinks for the collected data and are equipped with Mobile Edge Computing (MEC) capabilities for data aggregation and processing. The sensory data is ultimately aggregated at a central cloud on the internet to produce public up to date cartography systems. We discuss the deployment limitations and benefits of the proposed system and investigate it's performance using four different MANET routing protocols which are Ad hoc On-Demand Distance Vector (AODV), Ad hoc On-Demand Multipath Distance Vector (AOMDV), Destination-Sequenced Distance Vector (DSDV) and Dynamic Source Routing (DSR) protocols. Simulation results illustrate the efficiency of the proposed system with packet delivery rates of up to 60 percent at shore base stations

    An On-Line Personalized Promotion Decision Support System for Electronic Commerce

    Get PDF
    With the development of the Internet and Electronic Commerce (EC), enterprises have overcome the space and time barriers and are now capable of serving customers electronically. However, it is a great challenge to attract and retain the customers over Internet. One approach is to provide the responsive personalized service to satisfy the customer demand and promote sales at the first time. Hence, in this paper, we propose a decision support system which develops best promotion products based on combinations of different marketing strategies, pricing strategies, and customer behaviors evaluated in terms of multiple criteria. Data mining techniques are utilized to help the business discover patterns to develop on-line sales promotion products for each customer for enhancing customer satisfaction and loyalty. The proposed system consists of four components: (1) establishing marketing strategies, (2) promotion pattern model, (3) personalized promotion products, and (4) on-line transaction model. A simple example is given to illustrate the implementation and application of proposed decision support system

    When to Utilize Software as a Service

    Get PDF
    Cloud computing enables on-demand network access to shared resources (e.g., computation, networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort. Cloud computing refers to both the applications delivered as services over the Internet and the hardware and system software in the data centers. Software as a service (SaaS) is part of cloud computing. It is one of the cloud service models. SaaS is software deployed as a hosted service and accessed over the Internet. In SaaS, the consumer uses the provider‘s applications running in the cloud. SaaS separates the possession and ownership of software from its use. The applications can be accessed from any device through a thin client interface. A typical SaaS application is used with a web browser based on monthly pricing. In this thesis, the characteristics of cloud computing and SaaS are presented. Also, a few implementation platforms for SaaS are discussed. Then, four different SaaS implementation cases and one transformation case are deliberated. The pros and cons of SaaS are studied. This is done based on literature references and analysis of the SaaS implementations and the transformation case. The analysis is done both from the customer‘s and service provider‘s point of view. In addition, the pros and cons of on-premises software are listed. The purpose of this thesis is to find when SaaS should be utilized and when it is better to choose a traditional on-premises software. The qualities of SaaS bring many benefits both for the customer as well as the provider. A customer should utilize SaaS when it provides cost savings, ease, and scalability over on-premises software. SaaS is reasonable when the customer does not need tailoring, but he only needs a simple, general-purpose service, and the application supports customer‘s core business. A provider should utilize SaaS when it offers cost savings, scalability, faster development, and wider customer base over on-premises software. It is wise to choose SaaS when the application is cheap, aimed at mass market, needs frequent updating, needs high performance computing, needs storing large amounts of data, or there is some other direct value from the cloud infrastructure.Siirretty Doriast

    PVN-LOT-128-AC-043

    Get PDF
    Computer Networks, 5/e is appropriate for Computer Networking or Introduction to Networking courses at both the undergraduate and graduate level in Computer Science, Electrical Engineering, CIS, MIS, and Business Departments. Tanenbaum takes a structured approach to explaining how networks work from the inside out. He starts with an explanation of the physical layer of networking, computer hardware and transmission systems; then works his way up to network applications. Tanenbaum\u27s in-depth application coverage includes email; the domain name system; the World Wide Web (both client- and server-side); and multimedia (including voice over IP, Internet radio video on demand, video conferencing, and streaming media. Each chapter follows a consistent approach: Tanenbaum presents key principles, then illustrates them utilizing real-world example networks that run through the entire book—the Internet, and wireless networks, including Wireless LANs, broadband wireless and Bluetooth. The Fifth Edition includes a chapter devoted exclusively to network security. The textbook is supplemented by a Solutions Manual, as well as a Website containing PowerPoint slides, art in various forms, and other tools for instruction, including a protocol simulator whereby students can develop and test their own network protocols

    Technological Issues: Closing the Digital Divide Through Resource Allocation Techniques

    Get PDF
    It is only after access to technology is assured that computer literacy can begin. Access is not simply having access to up-to-date technology; it should also include access to qualified teachers, appropriate software and Web content. Vital to this issue is the quality and quantity of the access. The optimisation of the bandwidth use, obtained by implementing bandwidth allocation schemes and suited protocol solutions, will allow providing improved quality of service and reduced cost of broadband Internet access. This technology will allow the provision of QoS-based broadband services in hazardous environments and in areas where the technological development is less spread and the Internet isn\u27t well delivered. Resource allocation has become the most important technology in satellite and wireless networks. All satellite systems are limited by bandwidth and power, which are both expensive resources. Operators of satellite systems receive fixed allocations of these resources and as a result, are limited in the number of users they can support on one system. To combat this problem and to lower the costs for system operators, certain power and bandwidth conservation methods have been developed. In the past, satellite systems were used to deliver telephony or transaction-based applications. Since telephony is a single application with a predefined bandwidth requirement, a simple resource allocation technique such as Demand Assigned Multiple Access (DAMA) is sufficient. A transaction-based application requires a simple ALOHA channel. The development of Two-Way IP access systems, which support a variety of protocols and applications, has created the need for more complex resource allocation algorithms. Faced with a combination of real-time applications, such as Voice over IP, and non real-time applications that still require high bandwidth, such as e-mail transmission, resource allocation algorithms have had to work with two conflicting issues: Quality of Service and bandwidth consumption. As a result, Bandwidth On Demand (BOD) algorithms were developed to manage resource allocation and Quality of Service mechanisms were developed to identify the needs of different applications. This paper discusses the application of different resource allocation algorithms to different type of traffic. Using mathematical formulation it presents the bandwidth saving achieved by BOD for IP type of traffic

    Automatic Scaling of Internet Applications for Cloud Computing Services

    Get PDF
    Abstract-Many Internet applications can benefit from an automatic scaling property where their resource usage can be scaled up and down automatically by the cloud service provider. We present a system that provides automatic scaling for Internet applications in the cloud environment. We encapsulate each application instance inside a virtual machine (VM) and use virtualization technology to provide fault isolation. We model it as the Class Constrained Bin Packing (CCBP) problem where each server is a bin and each class represents an application. The class constraint reflects the practical limit on the number of applications a server can run simultaneously. We develop an efficient semi-online color set algorithm that achieves good demand satisfaction ratio and saves energy by reducing the number of servers used when the load is low. Experiment results demonstrate that our system can improve the throughput by 180% over an open source implementation of Amazon EC2 and restore the normal QoS five times as fast during flash crowds. Large scale simulations demonstrate that our algorithm is extremely scalable: the decision time remains under 4 s for a system with 10 000 servers and 10 000 applications. This is an order of magnitude improvement over traditional application placement algorithms in enterprise environments

    A Review on an Authentication System using Secret Sharing

    Get PDF
    Security using Authentication system is an important concern in the field of information technology. It is an important thing as per as concern to the ruling of internet over people today. The growth in the usage of internet has increased the demand for fast and accurate user identification and authentication. This New threats, risks and vulnerabilities emphasize the need of a strong authentication system. The cryptography is a secret sharing scheme where a secret data gets divided into number of pieces called shares and not a single share discloses any information about secret data. There are some automated methods to identify and verify the user based on the physiological characteristics. To deal with such methods, there is a technology called biometrics which measures and statistically analyses the biological data. The biometric samples which are stored in the database as a secret are unique for each user so that no one can predict those samples. A biometric authentication system provides automatic authentication of an individual on the basis of unique features or characteristics possessed by an individual. The authentication system can be stronger using multiple factors for authentication process. The application like Aadhar Card uses more than one factor for authentication. There is some difficulty with authentication systems such as user privacy considerations in case of multiple biometric features, huge size databases and centralized database which may create security threats. To address such tribulations, the Authentication System using Secret Sharing is proposed, Secret sharing splits the centralized database across the different locations. This helps in reducing the database size and removal of threats in centralized database. Also user privacy is maintained due to the decentralized database

    Authentication System using Secret Sharing

    Get PDF
    Security using Authentication system is an important concern in the field of information technology. It is an important thing as per as concern to the ruling of internet over people today. The growth in the usage of internet has increased the demand for fast and accurate user identification and authentication. This New threats, risks and vulnerabilities emphasize the need of a strong authentication system. The cryptography is a secret sharing scheme where a secret data gets divided into number of pieces called shares and not a single share discloses any information about secret data. There are some automated methods to identify and verify the user based on the physiological characteristics. To deal with such methods, there is a technology called biometrics which measures and statistically analyses the biological data. The biometric samples which are stored in the database as a secret are unique for each user so that no one can predict those samples. A biometric authentication system provides automatic authentication of an individual on the basis of unique features or characteristics possessed by an individual. A cover image is fused with secret image; fused image is divided into n shares. k possible shares able to construct secret image. PSNR parameter are used for image quality The authentication system can be stronger using multiple factors for authentication process. The application like Aadhar Card uses more than one factor for authentication. There is some difficulty with authentication systems such as user privacy considerations in case of multiple biometric features, huge size databases and centralized database which may create security threats. To address such tribulations, the Authentication System using Secret Sharing is proposed, Secret sharing splits the centralized database across the different locations. This helps in reducing the database size and removal of threats in centralized database. Also user privacy is maintained due to the decentralized database
    • …
    corecore