The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This study focuses on the understanding of moisture diffusion physics under use conditions (UC) and its impact on definition of qualification requirements. It uses computational modeling and detailed measurements of UC to challenge some long held assumptions used in moisture risk assessments. It introduces the quantity called "Stable Wetness" to account for moisture amount present in the...
Deep Learning (DL) algorithms have become ubiquitous in data analytics. As a result, major computing vendors — including NVIDIA, Intel, AMD and IBM — have architectural road-maps influenced by DL workloads. Furthermore, several vendors have recently advertised new computing products as accelerating DL workloads. Unfortunately, it is difficult for data scientists to quantify the potential of these...
Delay Tolerant Network is a buzz word in Mobile Adhoc Network. Research in this direction started with the approach for interplanetary communication. Delay Tolerant Network (in short) DTN is an evolving research area. A way to store, carry and forward messages over the underlying existing infrastructure. The intermittent connectivity and limited resources of a DTN node make the routing difficult to...
The advent of modern forms of information and communication technologies (ICTs), such as social media, has modified the ways people communicate and enables an inimitable way of connectivity promoting the advancement and diffusion of information. Given that, individuals within social movements bringing influence from other movements makes the study of spillover within social movements an important...
Topic modeling is a widely used approach for analyzing large text collections. In particular, Latent Dirichlet Allocation (LDA) is one of the most popular topic modeling approaches to aggregate vocabulary from a document corpus to form latent "topics". However, learning meaningful topic models with massive document collections which contain millions of documents, billions of tokens is challenging,...
Attribute Based Access Control (ABAC) models are designed with the intention to overcome the shortcomings of classical access control models (DAC, MAC and RBAC) and unifying their advantages. In ABAC, the access control is provided based on generic attributes of entities. Many organizational security policies condition access decisions on attributes. OWL can be used to formally define and process...
Path tracing is a key requirement in providing various functionalities in a Static Timing Analysis (STA) tool. With growing design sizes and advancements in STA techniques like statistical timing analysis, path tracing techniques need to be more efficient and accurate. Naïve extensions of path tracing techniques for statistical timing analysis are found to be inefficient and inaccurate. In this paper,...
To overcome the challenges emerged in adoption of cloud computing technologies, many countries has conceived and designed data privacy and confidentiality protection regulations. The objective of this paper is to identify privacy issues and design a framework pertaining to privacy and confidentiality concerns in adopting cloud computing. It is imperative to note that privacy concern is increasingly...
Channel simulation in wireless link-level OFDM network simulators involves a computationally intensive non-uniform discrete Fourier transform. In this paper, we propose a parallel scan based method to speed up this computation in GPU without restricting the scope of the simulations. We further utilize the DFT properties in scan method to reduce register usage and hence the computation overhead of...
Time tracking for Mobile Broadcast Single Frequency Network (MBSFN) subframes is known to be difficult due to very long delay spread channels. These kinds of channels induce several issues, e.g., Inter Symbol Interference (ISI), Inter Carrier Interference (ICI), Channel Estimation (CE) errors, which limit the throughput performance. In this paper, we propose an approach for timing correction, estimating...
Software testing is considered to be the ultimate obstacle before software can be released. Traditional approaches to testing the software revolves around capabilities of a system using various types of testing (e.g., black-box) at various level of software development process. Testing the software for system-wide qualities such as portability is very rare. The research work in this area is very limited...
Duplication has proved to be a vital technique for scheduling task graphs on a network of unrelated parallel machines. Few attempts have been made to model duplication in a Mixed Integer Linear Program (MILP) to reduce schedule length. Other known optimal MILPs duplicate a job on all the available processing elements and this increases their complexities. This paper proposes a new REStricted Duplication...
Measuring an individual's potential to accomplish a goal has key implications in organizational studies, behavioral analysis, business and management among other areas. This relative potential, which is dependent on a myriad of factors, e.g., experience, resource management, cooperation, etc., could shape the individual's performance, motivation, leadership, and likely success. The increasing prevalence...
The concept of fuzzy regression model with fuzzy regression coefficients was first introduced in \cite{[1]}, \cite{[2]} and \cite{[3]}. A fuzzy number can be uniquely determined through its position and entropy as described in \cite{[4]}. Hence, by using the concept of fuzzy entropy the estimators of the fuzzy regression coefficients may be estimated. In the present communication, we develop a newer...
In the present communication, we have implemented the concept of intuitionistic trapezoidal fuzzy numbers (ITFNs) to the study of multiple criteria decision making (MCDM) problem for evaluating the best vendor/supplier whose information take the form of ITFNs. We propose a new algorithm for ITF-MCDM problem where the weights of the involved attributes are supposed to be completely unknown. These weights...
To improve their performance, scientific applications often use loop scheduling algorithms as techniques for load balancing data parallel computations. Over the years, a number of dynamic loop scheduling (DLS) techniques have been developed. These techniques are based on probabilistic analyses, and are effective in addressing unpredictable load imbalances in the system arising from various sources,...
EigenTrust (ET) is a renowned algorithm for reputation management in adversarial P2P systems. It incorporates the opinions of all peers in the network to compute a global trust score for each peer based on its past behavior, and relies on a set of pre-trusted nodes to guarantee that malicious nodes cannot subvert the system. In this paper, we show that ET is vulnerable to community structure and a...
Deregulation of Power market has initiated a multitude of reforms in the electricity sector aiming to make it more efficient, transparent and friendly to both the consumers and the suppliers. Accurate forecasting of the future electricity prices has become the most important management goal since it forms the basis of maximizing profits for the market participants. Electricity price forecasting however...
Cloud computing is leading to transformational changes with stringent requirements on usability, performance and security over very heterogeneous workloads. Their run-time management requires realistic algorithms and techniques for sampling, measurement and characterization for load prediction. Due to the expectation of elasticity, large swings in their demand are common, which cannot be modeled accurately...
Strongly promoted by the leading industrial companies, cloud computing becomes increasingly popular in recent years. Cloud Computing allows us to abstract distributed elastic IT resources behind an interface that promotes scalability and dynamic resource allocation. The terminology applied to this kind of processing, when describing shared resources, Such resources are available on demand and at a...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.