Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Mathematics  (25)
  • SA 4270  (25)
Type of Medium
Publisher
Language
Years
Subjects(RVK)
  • Mathematics  (25)
RVK
  • SA 4270  (25)
  • 1
    Online Resource
    Online Resource
    Wiley ; 2021
    In:  Concurrency and Computation: Practice and Experience Vol. 33, No. 7 ( 2021-04-10), p. 1-1
    In: Concurrency and Computation: Practice and Experience, Wiley, Vol. 33, No. 7 ( 2021-04-10), p. 1-1
    Abstract: Real‐time edge computing is forging its place in cloud computing rapidly, and requirements for high‐performance edge devices are becoming increasingly complex. Multiprocessor edge devices are an attractive choice to meet these higher performance requirements. However, multiprocessor devices encounter inherent challenges when handling on‐chip shared resources. The concurrent access to these resources by the tasks requesting more than one shared resource and running on multiple processors may face huge blocking times, which can lead to missed hard real‐time deadlines and cause a catastrophic system failure. To reduce the task blocking time, we propose a task allocation algorithm that takes advantage of inter‐resource affinity and allocates all the tasks accessing multiple shared resources having inter‐resource affinity on the same processor of the multiprocessor. The proposed algorithm reduces global resources and remote blocking, which subsequently increase schedulability of task sets and reduce the processor utilization. In our experiments, we compare the proposed task allocation algorithm SRTA with existing well‐known task allocation strategies SPA, ROP, and blocking‐agnostic FFD. The experimental results reveal that the SRTA, on the average, can allocate 1.80, 2.34, and 3.14 times more task sets as compared to ROP, SPA, and FFD, respectively and reduces the number of globally shared resources significantly.
    Type of Medium: Online Resource
    ISSN: 1532-0626 , 1532-0634
    URL: Issue
    RVK:
    Language: English
    Publisher: Wiley
    Publication Date: 2021
    detail.hit.zdb_id: 2052606-4
    SSG: 11
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Wiley ; 2023
    In:  Concurrency and Computation: Practice and Experience Vol. 35, No. 16 ( 2023-07-25)
    In: Concurrency and Computation: Practice and Experience, Wiley, Vol. 35, No. 16 ( 2023-07-25)
    Abstract: Lung cancer is mainly caused by malignant lung nodules. Early detection and diagnosis of lung nodules can diagnose the disease in time and significantly improve the survival rate of the patients. With the rapid development of deep learning networks in the field of medical aid diagnosis, many deep networks have been applied to lung nodule detection. Statistical distribution shows that most of the lung nodule radii are too small to be well detected. Therefore, 3D feature pyramid network (FPN) for single‐stage pulmonary nodule detection is proposed to solve this problem by combining the 3D characteristics of computed tomography (CT) image data. In addition, the squeeze‐and‐excitation (SE)‐attention module is added to improve detection performance. The validity of the network is verified on the public pulmonary nodule dataset LUNA16. The competition performance metric (CPM) value reaches 0.8934. Compared with other pulmonary nodule detection networks, the detection performance of this network improved by 2%.
    Type of Medium: Online Resource
    ISSN: 1532-0626 , 1532-0634
    URL: Issue
    RVK:
    Language: English
    Publisher: Wiley
    Publication Date: 2023
    detail.hit.zdb_id: 2052606-4
    SSG: 11
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Wiley ; 2022
    In:  Concurrency and Computation: Practice and Experience Vol. 34, No. 3 ( 2022-02)
    In: Concurrency and Computation: Practice and Experience, Wiley, Vol. 34, No. 3 ( 2022-02)
    Abstract: Delta compression, which is efficient in removing repeated string among similar chunks, can be used as a complement to data deduplication in backup storage for extra space savings. The process of detecting similar candidates to use as the base for delta compression is called resemblance detection. Several indexes are required for resemblance detection. Maintaining them in RAM would limit the system scalability and increase system cost. Storing them on the disk suffers from low throughput due to poor random I/O performance of the disk. In this article, we present the history‐aware resemblance detection (HARD), a cost‐efficient resemblance detection approach that captures most of the similar chunks with a limited memory footprint. HARD is based on the observation that, for chunks in a backup, most of their similar chunks can be found in the most recent backups. HARD thus only indexes super‐features in the most recent backups for resemblance detection to reduce the memory footprint of resemblance indexes while captures most of the potential similar chunks for delta compression. Experimental results based on three real‐world datasets show that HARD achieves higher compression than the state‐of‐the‐art approach.
    Type of Medium: Online Resource
    ISSN: 1532-0626 , 1532-0634
    URL: Issue
    RVK:
    Language: English
    Publisher: Wiley
    Publication Date: 2022
    detail.hit.zdb_id: 2052606-4
    SSG: 11
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Wiley ; 2022
    In:  Concurrency and Computation: Practice and Experience Vol. 34, No. 17 ( 2022-08)
    In: Concurrency and Computation: Practice and Experience, Wiley, Vol. 34, No. 17 ( 2022-08)
    Abstract: The diagnosis of pulmonary nodules by clinicians depends not only on radiological imaging but also on the patient's own clinical record information and other factors. However, exploring the guiding role of clinical information is a major challenge. In this article, an intelligent personalized diagnosis decision‐making model is proposed, which combines radiology images with patient information. First, the 3D image cube of the pulmonary nodule is constructed. Then, a 3D multi‐level fusion ResNet is designed to extract the features of the nodule by making full use of the spatial context information. Finally, a kind of classification model based on feature‐related analysis was proposed, which fused clinical information features and image features and realized a nonlinear radial basis feature mapping. We tested this method on the public dataset and a cooperation hospital dataset. Experiments show that this method can effectively improve the classification accuracy of unstable nodules at the classification boundary. Our model showed significant improvements in sensitivity, specificity, and accuracy. Meanwhile, compared with other deep learning diagnosis methods, our method achieves better discriminative results and is highly suited to be used for pulmonary nodule diagnosis.
    Type of Medium: Online Resource
    ISSN: 1532-0626 , 1532-0634
    URL: Issue
    RVK:
    Language: English
    Publisher: Wiley
    Publication Date: 2022
    detail.hit.zdb_id: 2052606-4
    SSG: 11
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Wiley ; 2019
    In:  Concurrency and Computation: Practice and Experience Vol. 31, No. 9 ( 2019-05-10)
    In: Concurrency and Computation: Practice and Experience, Wiley, Vol. 31, No. 9 ( 2019-05-10)
    Abstract: In the past decades, China has experienced rapid industrialization and urbanization, which has caused severe environmental pollution issues and hampered the sustainable development. To cope with these problems, a plethora of environmental protection policies has been presented by the Chinese government. Thus, determining the most reasonable environmental performance indicators is becoming an essential requirement for evaluating the effectiveness and efficiency of governmental management policy to the sustainable development of the ecological system. In this paper, we propose a group of environmental indicators including air quality index, water quality index, and soil quality index that are constructed specifically for evaluating the severity of environment pollution, and the implementation of corresponding governance policy as the pollution issue is one of the most severe risks to population health among all of the current existing problems in China. The proposed indicators are composed of the indices, which were selected by leveraging on the data acquired from China National Bureau of Statistics. Based on the proposed environmental quality indicators, we provide recommendations of governmental policy for improving the environmental performance in mining regions.
    Type of Medium: Online Resource
    ISSN: 1532-0626 , 1532-0634
    URL: Issue
    RVK:
    Language: English
    Publisher: Wiley
    Publication Date: 2019
    detail.hit.zdb_id: 2052606-4
    SSG: 11
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Wiley ; 2021
    In:  Concurrency and Computation: Practice and Experience Vol. 33, No. 9 ( 2021-05-10)
    In: Concurrency and Computation: Practice and Experience, Wiley, Vol. 33, No. 9 ( 2021-05-10)
    Abstract: This paper presents a whale optimization algorithm (WOA) based on forward looking sonar to achieve two‐dimensional optimal path planning for an autonomous underwater vehicle. The purpose of path planning is not only to effectively avoid threat regions and safely reach the intended target with minimum fuel cost but also to obtain an optimal or near‐optimal path in a complex ocean battlefield environment. The WOA, based on the bubble‐net attacking behavior of humpback whales, mimics encircling the prey, attacks with a bubble‐net method, and search for prey to effectively determine the global optimal solution in the search space. The WOA not only has fast convergence speed and high calculation accuracy but can also effectively balance exploration and exploitation to avoid falling into a local optimum and obtain the global optimal solution. Five sets of experiments are applied to verify the superiority and stability of the WOA. Compared with other algorithms, such as artificial bee colony, bat algorithm, cuckoo search, flower pollination algorithm, moth‐flame optimization algorithm, particle swarm optimization, and water wave optimization, the WOA exhibits better optimization performance and stronger robustness. The experimental results reveal that the WOA can find the shortest path compared with all the other algorithms, and it is an effective and feasible method for solving the path planning problem.
    Type of Medium: Online Resource
    ISSN: 1532-0626 , 1532-0634
    URL: Issue
    RVK:
    Language: English
    Publisher: Wiley
    Publication Date: 2021
    detail.hit.zdb_id: 2052606-4
    SSG: 11
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Wiley ; 2019
    In:  Concurrency and Computation: Practice and Experience Vol. 31, No. 23 ( 2019-12-10)
    In: Concurrency and Computation: Practice and Experience, Wiley, Vol. 31, No. 23 ( 2019-12-10)
    Abstract: Small social groups based on kinship or friendships are ubiquitous in human crowds. Therefore, the effect of social groups on crowd evacuations and that of crowd evacuations on social groups must be investigated. To simulate the group phenomenon when an emergency occurs, we propose an improved social force model that takes into account the social group relationship among the population, and based on our proposed model, a novel grouping algorithm predicated on non‐uniform binary grid partitioning is put forward. The approach initially maps the individuals into the plane space, and then it adopts top‐down binary grid partitioning iteratively until the divided grid contains only the individuals with relations; then, the values of the relation and density of the non‐empty grid cells are calculated, and the grids are sorted according to these values. After sorting, selecting, merging, and forming the core grids, the other grids are merged to the core grids. We have compared the algorithm with the hierarchical classification algorithm and the grid‐based algorithm. The results show that the accuracy, speed, and scalability are all advantages. We also establish a simulation platform to illustrate the proposed grouping algorithm and the improved social force model for crowd evacuation simulation.
    Type of Medium: Online Resource
    ISSN: 1532-0626 , 1532-0634
    URL: Issue
    RVK:
    Language: English
    Publisher: Wiley
    Publication Date: 2019
    detail.hit.zdb_id: 2052606-4
    SSG: 11
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Wiley ; 2013
    In:  Concurrency and Computation: Practice and Experience Vol. 25, No. 12 ( 2013-08-25), p. 1798-1812
    In: Concurrency and Computation: Practice and Experience, Wiley, Vol. 25, No. 12 ( 2013-08-25), p. 1798-1812
    Abstract: Earth observation applications are now facing the challenges of managing and processing massive data sets from multiple sources from large‐scale distributed data centers (DCs). To solve this research problem, this paper presents an infrastructure of multiple data centers (MDC) for managing and processing massive remote sensing images. The proposed system is built on both groups of distributed DCs/clusters, which are equipped with DC or cluster resource manager. Access security and information service are introduced to support this architecture of MDC. We collaboratively organized the algorithm, and data belonged to the MDC in the manner of workflow. In practice, we succeeded in working out the concrete problems regarding procedures in processing applications collaboratively and transfer the massive remote sensing dataset fast and with stable cross‐MDC. On the basis of the previously mentioned research work, we will investigate the platform integration of MDC. Copyright © 2012 John Wiley & Sons, Ltd.
    Type of Medium: Online Resource
    ISSN: 1532-0626 , 1532-0634
    URL: Issue
    RVK:
    Language: English
    Publisher: Wiley
    Publication Date: 2013
    detail.hit.zdb_id: 2052606-4
    SSG: 11
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Wiley ; 2019
    In:  Concurrency and Computation: Practice and Experience Vol. 31, No. 21 ( 2019-11-10)
    In: Concurrency and Computation: Practice and Experience, Wiley, Vol. 31, No. 21 ( 2019-11-10)
    Abstract: Securely performing nearest neighbor query over encrypted data in cloud is an important topic in the area of cloud computing, for which Wang et al recently put forward a scheme (ie, CloudBI‐II) to address the challenging security problem: resisting the collusion of cloud server and query users. In this paper, we propose an efficient attack method that indicates CloudBI‐II will reveal the difference vectors under the collusion attack. Furthermore, we show that the difference vector disclosure will result in serious privacy breach and, thus, attain an efficient attack method to break CloudBI‐II. Namely, CloudBI‐II cannot achieve their declared security. Through theoretical analysis and experiment evaluation, we confirm that our proposed attack approach can fast recover the original data from the encrypted data set in CloudBI‐II. Finally, we provide an enhanced scheme that can efficiently resist the collusion attack.
    Type of Medium: Online Resource
    ISSN: 1532-0626 , 1532-0634
    URL: Issue
    RVK:
    Language: English
    Publisher: Wiley
    Publication Date: 2019
    detail.hit.zdb_id: 2052606-4
    SSG: 11
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Wiley ; 2012
    In:  Concurrency and Computation: Practice and Experience Vol. 24, No. 17 ( 2012-12-10), p. 2040-2054
    In: Concurrency and Computation: Practice and Experience, Wiley, Vol. 24, No. 17 ( 2012-12-10), p. 2040-2054
    Abstract: The open radio frequency identification (RFID) air interface may suffer from severe threats that make security problem become a critical issue for RFID systems and applications. This paper proposes a dual cryptography authentication protocol (DCAP) for RFID systems. DCAP partitions randomly the tag identifier into two partial identifiers that are used in the forward link and in the backward link, respectively. The protocol applies hash function and shared‐key encryption algorithm to safeguard both forward and backward links and provides a three‐round authentication mode on each tag and reader in a session. Then, authentication is carried out by the primary, secondary, and final verifications. For a formal analysis, a graphical method Colored Petri Nets is applied to model and analyze the correctness of DCAP. We prove that the protocol owns tag anonymity and forward security and has the capability to resist major attacks such as replay, reader forgery, and tag forgery. Finally, the performance in terms of storage, communication overhead, and computation load is evaluated to demonstrate that the protocol has modest complexity and high efficiency. Copyright © 2011 John Wiley & Sons, Ltd.
    Type of Medium: Online Resource
    ISSN: 1532-0626 , 1532-0634
    URL: Issue
    RVK:
    Language: English
    Publisher: Wiley
    Publication Date: 2012
    detail.hit.zdb_id: 2052606-4
    SSG: 11
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages