Theoretical Investigation of Dependable Computing

نویسندگان

  • TINGYAO JIANG
  • DONG REN
  • SIMON X. YANG
  • Chunyan Hou
چکیده

This issue includes fifteen papers selected from the 2010 Conference on Dependable Computing (CDC2010). The papers in this issue mainly focus on the theoretical investigation of Dependable Computing. Thorough theoretical investigation is the cornerstone of successful applications. It is an excitement to have all experts, professionals and scholars share their creative thoughts and inspirations on the theoretical aspects of dependable computing. In the first paper, Junqing Liu et al. proposed a blotch identification algorithm for archive film restoration based on edge detection, where the blotch identification area is limited to edge pixels and pixels nearby. In addition, a non-blotch edge removal approach is proposed to remove partial non-blotch edge points and a scanning method is used to identify all blotches from remaining edge points. Xinsai Wang et al. presented an adaptive algorithm with automatic estimation of gradient histogram threshold for segmentation of infrared images. Yuan Tian et al. proposed a new combination strategy for high-accuracy recognition of wheat leaf diseases, which is based on supervised vector machine for pattern recognition of wheat leaf diseases. Zhang Jingcheng et al. presented spectral feature selection method for winter wheat yellow rust detection based on continuous wavelet analysis. It was found that the variation of chlorophyll content is closely associated with the yellow rust infection. Four spectral features are identified by the continuous wavelet analysis, which are proved to be powerful in discriminating the yellow rust infected and non-infected winter wheat plants.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Special Issue of Intelligent Automation and Soft Computing - Guest Editorial

This issue includes fourteen papers that are selected from the 2010 Conference on Dependable Computing (CDC2010) through a peer review process. The papers in this issue mainly incline to practical applications of dependable computing theories. The concept of dependable computing not only appears in the fault tolerant computer system, but also in the communication system, networking and so on. A...

متن کامل

Dependable systems for Sentient Computing

Dependable Systems for Sentient Computing Andrew Rice Computers and electronic devices are continuing to proliferate throughout our lives. Sentient Computing systems aim to reduce the time and effort required to interact with these devices by composing them into systems which fade into the background of the user’s perception. Failures are a significant problem in this scenario because their occ...

متن کامل

Dependable Computing for National Security: A Position Paper

This paper examines various security threats and then discusses the applications of dependable computing for national security. By a dependable computing system we mean a flexible system that enforces quality of service policies between security, real-time processing, integrity and fault tolerance. We also discuss infrastructures and business objects for counter-terrorism.

متن کامل

Use of Structure Codes (Counts) for Computing Topological Indices of Carbon Nanotubes: Sadhana (Sd) Index of Phenylenes and its Hexagonal Squeezes

Structural codes vis-a-vis structural counts, like polynomials of a molecular graph, are important in computing graph-theoretical descriptors which are commonly known as topological indices. These indices are most important for characterizing carbon nanotubes (CNTs). In this paper we have computed Sadhana index (Sd) for phenylenes and their hexagonal squeezes using structural codes (counts). Sa...

متن کامل

Cloud Computing; A New Approach to Learning and Learning

Introduction: The cloud computing and services, as a technological solution for developing educational services, can accelerate the provision and expansion of these highly useful services. This study intended to provide an overall picture of practical areas of learning services based on cloud computing teaching and learning equipment. Methods: This was a theoretical hybrid research study in whi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011