نتایج جستجو برای: intelligent computation

تعداد نتایج: 217419  

2017
Amandeep Kaur

Cloud computing used for task scheduling which guided by broker and computer by virtual machine, but cost of computation will increase if use random task localization and this problem exponential high when use workflow which have huge number of task with dependency, so in this paper optimize the cost and time by intelligent and colony optimization which give decision to broker.

Journal: :CoRR 2002
Ajith Abraham

The integration of different learning and adaptation techniques to overcome individual limitations and to achieve synergetic effects through the hybridization or fusion of these techniques has, in recent years, contributed to a large number of new intelligent system designs. Computational intelligence is an innovative framework for constructing intelligent hybrid architectures involving Neural ...

2004
Fang-Chung Chen Foad Dabiri Roozbeh Jafari Eren Kursun Vijay Raghunathan Thomas Schoellhammer Doug Sievers Deborah Estrin Glenn Reinman Majid Sarrafzadeh Mani Srivastava Ben Wu Yang Yang

1 Author names appear in alphabetical order. This paper is based on work funded by the National Science Foundation ABSTRACT In the past few years exciting advances in the development of pervasive computing technologies have taken place, in particular the field of flexible electronics is emerging: electronic components such as transistors and wires can be built on a thin flexible material, and p...

2004
Ales Keprt Václav Snásel

Binary factor analysis (BFA, also known as Boolean Factor Analysis) is a nonhierarchical analysis of binary data, based on reduction of binary space dimension. It allows us to find hidden relationships in binary data, which can be used for data compression, data mining, or intelligent data comparison for information retrieval. Unfortunately, we can’t effectively use classical (i.e. non-binary) ...

2014
Walter S. Lasecki

Human computation provides a new resource for creating intelligent systems that are able to go beyond the capabilities of fully-automated solutions. Currently, machines struggle in many real-world settings because problems can be almost entirely unconstrained and can vary greatly between instances. Solving problems such as natural language understanding require artificial intelligence to first ...

2012
Adil SAYOUTI Hicham MEDROMI

Computer science spans a range of topics from theoretical studies of algorithms and the limits of computation to the practical issues of implementing computing systems in hardware and software, this discipline contain the treatment of theory of computation, algorithms and data structures, parallel computation, computer networking and remote control over Internet of distributed intelligent syste...

Journal: :CoRR 2013
Mark Burgin Gordana Dodig-Crnkovic

We need much better understanding of information processing and computation as its primary form. Future progress of new computational devices capable of dealing with problems of big data, internet of things, semantic web, cognitive robotics and neuroinformatics depends on the adequate models of computation. In this article we first present the current state of the art through systematisation of...

2007
Miguel Ángel Sotelo Ramón Flores Ricardo García Manuel Ocaña Miguel Angel García Ignacio Parra David Fernández Miguel Gavilán José Eugenio Naranjo

In this paper, we present a method for computing velocity using a single camera onboard a road vehicle, i.e. an automobile. The use of computer vision provides a reliable method to measure vehicle velocity based on egomotion computation. By doing so, cumulative errors inherent to odometrybased systems can be reduced to some extent. Road lane markings are the basic features used by the algorithm...

2004
Fábio Calhau Lino Pereira Paulo Roberto Costa Luís Miguel Botelho

This paper presents framework that can be used for improving working conditions. We have extended intelligent agents technology for the Internet with cell phone technology. This extension allows the mobile worker to have access to the full power of server based computation using cheaper, smaller mobile devices. The most demanding part of the computation is performed by agents running on Interne...

2000
Yu-Lun Huang Shiuh-Pyng Shieh Jian-Chyuan Wang

This paper presents three key distribution schemes for channel protection. With the proposed schemes, encryption keys of the ordered programs can be distributed to the authorized subscribers efficiently and securely. In these schemes, for key updates, at most two messages are transmitted and simpler computation functions, including one-way hash function and XOR operation, are used to reduce the...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید