The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
An Agent-based Computational Economics Model based on Classical Economics, the ACE-CE model for short, is established through a combined approach of the theoretical method and computational method. This model has successfully conducted several applications in China, which has proven the feasibility of mixed methods for large-scale computation in economics. It also verifies the theoretical rationality...
Recent advances in energy transfer technology is boosting the development of renewable sensor networks. To sustain such a network, a mobile robot travels from node to node to recharge each sensor before its battery runs out. To solve this problem, we propose a spatial dependent task scheduling algorithm, which quantifies the impact of scheduling proximate tasks on the other tasks. Our evaluation results...
The database-driven spectrum access system recentlyattracted increasing amounts of attention. It has more benefits compared to the traditional sensing-based systems. To build a more practical and reliable system, a hybrid sensing-based and database-driven spectrum access system is a promising solution. In this paper, we consider the integration problem of the database information and sensing results,...
Police departments and other law enforcement agencies have integrated a greater number of video cameras into their daily routines. This has introduced with it the problem of moving and processing vast amounts of video data. In this work, we take a look at some of the associated problems and our own attempts to address them. We first analyze the physical network and infrastructure at Temple University's...
Existing Data Center Network (DCN) architectures are classified into two categories: switch-centric and server-centric architectures. In switch-centric DCNs, routing intelligence is placed on switches, each server usually uses only one port of the Network Interface Card (NIC) to connect to the network. In server-centric DCNs, switches are only used as cross-bars, and routing intelligence is placed...
At present, MapReduce is the most popular programming model for big data processing. As a typical open source implementation of MapReduce, hadoop is divided into map, shuffle, and reduce. In the mapping phase, according to the principle moving computation towards data, the load is basically balanced and network traffic is relatively small. However, shuffle is likely to result in the outburst of network...
Due to unpredictable node mobility and the easily-interrupted connections, routing protocols in DTNs commonly utilize multiple message copies to improve the delivery ratio. A store-carry-and-forward paradigm is also designed to assist routing messages. However, excessive message copies lead to rapid consumption of the limited storage and bandwidth. The spray and Wait routing protocol has been proposed...
A wideband planar array antenna is proposed for Ka-band wireless communication applications in this paper. It consists of several rectangular radiating cavities and a stripline feeding network. Metalized posts are employed to improve the impedance matching. Besides, higher harmonic mode can be suppressed by these metalized posts. A transition from a standard waveguide to a strip line is designed based...
Video-on-demand (VoD) service has been explosively growing since its first appearance. For maintaining an acceptable buffering delay, the bandwidth costs have become a huge burden for the service providers. Complementing the conventional client-server architecture with a peer-to-peer system(P2P) can significantly reduce the central server's bandwidth demands. However, the previous works focus on establishing...
A wideband planar array antenna is proposed for Ka-band wireless communication applications in this paper. It consists of several rectangular radiating cavities and a stripline feeding network. Metalized posts are employed to improve the impedance matching. Besides, higher harmonic mode can be suppressed by these metalized posts. A transition from a standard waveguide to a strip line is designed based...
The rise of malware attack and data leakage is putting the Internet at a higher risk. Digital forensic examiners responsible for cyber security incident need to continually update their processes, knowledge and tools due to changing technology. These attack activities can be investigated by means of Digital Triage Forensics (DTF) methodologies. DTF is a procedural model for the crime scene investigation...
There is a great potential to boost the performance of mobile devices by offloading computation-intensive parts of mobile applications to the cloud. However, this potential is hindered by a gap between how individual mobile devices demand computational resources and how cloud providers offer them: offloading requests from a mobile device usually require a quick response, which may be infrequent, and...
In recent years, cloud computing is no doubt one of the most-talked-about terms in both the industry and academic worlds. In clouds, resources are delivered as services over the Internet in a pay-as-you-go fashion. By leasing cloud platforms to run their business, startups can achieve cost-saving and scale-up elasticity without being concerned about over-provisioning or under-provisioning for a service...
Pocket Switched Networks (PSN) utilize both human mobility and occasional connectivity to transfer messages between mobile humans' devices. Recently, a large number of mobile phones have come into our daily lives. Therefore, the PSN composed of human-carried mobile phones will be an ubiquitous network environment in the near future. In this paper, it is proposed that the WiFi hotspot mode of a mobile...
This paper studies the node degree snowballing effects (i.e., degree growth effects) in the age-sensitive preferential attachment model, where nodes are iteratively added one by one to a growing network. Upon entering the network, each new node connects to a suitably chosen set of existing nodes, while the attachment probability for an existing node to get connected depends on both its node degree...
Ubiquitous and resilient Internet connection access is becoming a necessity of life. Moreover, the amount of data requested by mobile users is increasing rapidly. Cooperative mobile Internet access is a promising approach to addressing these demands, by giving the mobile devices the opportunity to use the help of other devices to access the Internet. The helpers can download the data requested by...
In the largely populated city of a developing country, the ambulance service usually sends an emergent patient to the available hospital with shortest pre-consultation delay. The problem is, a life-critical patient may encounter the lack of treatment resource, such as sickbed, in desired hospitals, and the delay to a next appropriate hospital would cause his death, because non-critical patients already...
We propose a novel Data Center Network (DCN) architecture, named FCell, which is a tradeoff design in three aspects. First, FCell reflects a tradeoff between DCN power consumption and network performances, which mainly include end-to-end delays and bisection bandwidth. We propose a unified path length definition to characterize end-to-end delays in general DCNs. Comparisons with existing DCN architectures...
This paper aims to model system of ordinary differential equations by using a new hybrid gene expression programming algorithm. Gene expression programming is a recently developed evolutionary computation method for model learning and knowledge discovery. The hybrid algorithm combined immune clonal selection algorithm and memetic algorithm with gene expression programming to find not only the structure...
In trust-based recommendation systems, if a user is predicted to have a high rating of a product, then this product is recommended to that user for shopping potential. Therefore, rating predictions are critical for qualified recommendations. In this paper, based on the fluid dynamics theory, we propose a novel rating prediction scheme called DynFluid. The key observation is that the rating of a user...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.