The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Database is nowadays a crucial data storage for application needs. Currently, there are several existing popular databases such as relational database like SQL and non-relational database (i.e. NoSQL). However, both types have their own drawbacks which could not be utilized in both online and offline modes concurrently. Therefore, the authors develop a database that supports both modes especially...
In this paper finite element method for 3D DC resistivity modeling accelerated using multi-GPU (Graphics Processing Unit). Solution of the large system of linear equations is the most expensive computation in finite element method performed in GPUs to reduce the computational time. Conjugate gradient solver used to solve large system of linear equations. We developed kernel for conjugate gradient...
SPEA2 (Strength Pareto Evolutionary Algorithm 2) is an evolutionary algorithm based on population, which is solutions to resolve Multi-objective Optimization Problems (MOPs). It has selection process that to select from dataset or objective problem benchmarking such as DTLZ. Our aim is to improve SPEA2 performance to process a population using parallelism in GPU. By optimization fitness and distance...
Congestion because of increasing demand of air transportation occurs at several airports in Indonesia especially Soekarno-Hatta International Airport. In 2013, Soekarno-Hatta International Airport ranked 25th busiest airports in the world by Airports Council International. One of several ways to enlarge capacity of airports is to improve efficiency current infrastructure utilization with optimizing...
XTEA algorithm has been used as one of the solutions for securing digital data based on cryptosystem. The algorithm was developed by researchers from the University of Cambridge UK known as a lightweight, low cost and fast algorithm. However, such an attack impossible differential and related-key differential proved able to break through to the XTEA algorithm. XTEA algorithm weaknesses in the key...
Since the last decade, the growth of computing power and parallel computing has resulted in significant needs of efficient cryptosystem. Elliptic Curve Cryptography (ECC) offers faster computation and stronger security over other asymmetric cryptosystems such as RSA. ECC can be used for several cryptography activities: secret key sharing, message encryption, and digital signature. This paper gives...
The need of scalable databases has raised rapidly in these past few years. Researchers and developers have tried to develop several techniques to create replications and partitions in non-relational databases. However, high latency between distributed data centers has imposed a costly bottleneck to the system's performance. In this paper, we present a system design for nonrelational database — TippyDB...
Memcached is a data caching system which well known as in-memory database that provide faster data access compare with on-disk database. Persistency support in Memcached can be built by unification between Memcached as in-memory database and BerkeleyDB as the persistency backend store. However, MemcacheDB had lower performance compare to Memcached, due to the persistency overhead. This paper explored...
Specifications of safety-critical real-time systems which are made with natural language has many disadvantages, such as contradictory, vague, ambiguous, and incomplete. The weakness in this specification will continue to the next stages, and will result the system failure. Formal methods allow the designer to determine the specifications of the system at different abstraction levels and verify the...
The efficiency of weather forecasting model is determined by the speed of its execution process. However, for about 50 years, its increasing performance has come from the underlying processor improvements, not due to large scale parallelism. This work aimed to evaluate whether a low-cost heterogeneous CPU/GPU computing architecture using hybrid parallelization method of CUDA and OpenMP will increase...
Research on P2P based on Video on Demand (VoD) recently has been expanding, with the main objective is to gain effectiveness in distribution of VoD content in network. Probabilistic caching schema is one of caching schemas that is built in the top of P2P architecture, which provide means to store segments in the local buffer of peers. Beside for pre-buffering mechanism, this cache also keep segment...
Web service is becoming a widely solution used to realize Service Oriented Architecture (SOA). It enables application's business logics interoperable with each other by extending XML flexibility. Current early standardized web service technologies show significant progress in functional aspects interaction, but they are lack of data aspect considerations, such as transferring and integrating large...
Spectrum analyzer is used to support laboratory activity for students, and also used by company providing telecommunication service and government agencies to monitor frequency utilization. Today, the price of spectrum analyzer is relatively expensive, leading universities and companies in need of such tools are generally able to provide in a limited amount. Based on these problems, the authors propose...
In this research, numbers of modifications have been made in INET Framework on OMNeT++ in order to fully support the traffic engineering simulation. Modifications include: improvement in CSPF algorithm, accommodation of centered and distributed taxonomy, automation of RSVP protocol & FEC component, improvement in CSPF to accommodate parallel routes, correction in RSVP path message termination,...
Intrusion detection system is the process to monitor network traffic to detect possible attacks. In recent time, network traffic increasing rapidly. There are plenty of research today focused on feature selection or reduction, as some of the features are irrelevant and degrade the performance of an intrusion detection system. By eliminating some of features, we can improve the performance of classification...
Developing mobile applications with social networking features often requires application specific server-side code to handle interactions and communication among users. This paper proposes a model for mobile applications with social networking features that are developed on top of commonly available publish/subscribe service, thus alleviating the need of developing application specific server to...
Nowadays, due to diversity of devices and mode of application, similar functionalities of software must be implemented in more than one application software. Each functionality can be represented by an agent, and the application that activates the agent can be considered as input/output, which we called a multi i/o agent based system. As example, a client of a banking system can have access to his...
This paper presents an evaluation of the implementation Content Delivery Networks system to improve the performance of content-based mobile application. The evaluation of the proposed system is performed by simulation, utilizing the access data history from an actual content-based mobile application. Based on the simulation result, the performance of the content-based mobile application can be increased...
Every Real Time Operating System (RTOS) has different characteristics. Testing is needed to determine which criteria of real time application is suitable to be implemented using an RTOS. In this research, benchmarking is performed on two Linux based RTOS; Real Time Patch Linux and Xenomai. Benchmarking is done by running encryption application on each RTOS. RTOS performance assessed through encryption...
There are many kinds of Real Time Operating System (RTOS) can be found at the present time. This research aims to benchmark and analyze two kinds of RTOS; kernel based and embedded RTOS. Benchmarking information about performance of a RTOS is really important in order to choose appropriate RTOS. We use Xenomai and RT Patch Linux for kernel based RTOS and eCos for embedded RTOS. Benchmarking is done...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.