The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to ensure the safeties of high-speed train, a lot of sensors are installed in the train to real-time monitor its operation status. These sensors collect amounts of data which may be several GBs for one time operation of one train. Such big amount data need to be stored and managed with high efficiency. In this paper, a hybrid storage architecture by combine database and file system is proposed,...
The growing computing power on leadership HPC systems is often accompanied by ever-escalating failure rates. Checkpointing is a common defensive mechanism used by scientific applications for failure recovery. However, directly writing the large and bursty checkpointing dataset to parallel file systems can incur significant I/O contention on storage servers. Such contention in turn degrades bandwidth...
In this paper, we propose and implement a smart Electric Vehicle (EV) charging algorithm to control the EV charging infrastructures according to users' price preferences. Charging boxes, equipped with bi-directional communication devices and smart meters, can be remotely monitored by the proposed charging algorithm applied to EV control center and mobile app. On the server side, ARIMA model is utilized...
To better apply the researches on V2G technology, this paper designs a V2G prototype system in a client/server architecture, which includes an energy management server and smart charging pole. The server consists of a data processing module, a database, and a Man-Machine interface. The smart charging pole is composed of charging device and charging pole control system (CPCS), where a P-Q controlling...
Clustering is an important technology in data mining. Squeezer is one such clustering algorithm for categorical data and it is more efficient than most existing algorithms for categorical data. But Squeezer is time consuming for very large datasets which are distributed in different servers. Thus, we employ the distributed thinking to improve Squeezer and a distributed algorithm for categorical data...
The caching has been developed for shortest path queries. At present, existing methods for the shortest path caching include the dynamic cache method Least-Recently-Used (LRU), the static cache method Highest-Query-Frequency (HQF), as well as a recently proposed method Shortest "Path" Cache (SPC). It is commonly known that LRU and HQF are not efficient enough for the shortest path caching...
The paper designs a remote control system of robot fish that can be extended three layer architecture Based on the B/S model using Visual language C++. The system includes a network camera, the robot fish pool, wireless module, local decision host and remote control terminal. Network camera sends real-time image of the robot fish to the local decision host, and transports to the remote control terminal...
Memory failures are common in clusters, and their destructive effects (e.g., increasing downtime and losing data) make users suffer great loss. Current memory availability strategies mostly require extra expensive hardware. Software approaches based on check pointing technologies intend to reduce the expense, but their high overhead limits the practical usage. In this paper, we present a novel system...
Multi-server based network systems have been more and more popular with the increase of service demanded applications. The password based authentication schemes designed for multi-server network systems have also been developed from verification table required schemes to recent verification table free schemes. Although current existing protocols can resist most of malicious attacks, they have security...
A cloud-based, highly consumable queuing service must provide extreme scalability, flexible models of consistency, and high availability in the presence of network partitions. CAP theorem states that at most two of the three properties - Consistency, Availability, and Partition Tolerance - can be achieved at the same time for any shared data system. This paper presents the design and implementation...
Mobile users traveling over roads often issue KNN queries based on their current locations with their mobile terminals (e.g. where is the nearest gas station?). However, exact location information transmitted to an unsecure server will easily lead the mobile user to be tracked. Thus it is important to protect mobile users' location privacy while providing location-based services. People traveling...
The computing resource of animation-based rendering based on WAN are distributed, heterogeneous, dynamical, so resource management and scheduling are challenging task, the performance evaluation, performance analysis and performance prediction have become increasingly important. In this paper, rendering pretreatment mechanism is introduced at first, then based on a detailed analysis of computing NRD...
This paper presents the design and implementation of a web-based application for video content sharing in the driver assistance research domain. The domain has special needs for video such as the ability to zoom and the ability to play related clips concurrently. In addition, since large amounts of data (video contents) have to be transmitted over the network, network usage and efficiency are critical...
As the wide adoption of in-cloud services (e.g., software-as-a-service), some major identity related issues are brought up. For enterprises, it usually introduces additional cost and risk to manage identities in services. For service providers, typical pairwise identity federation solutions are not scalable to support single sign-on, service composition, etc. among services for large environment like...
Some of the traditional application on the Internet is experiencing the phase of scale expansion and sharp increase in traffic. In addition to expanding the capability of the server and building server clusters, making full use of P2P to solve the problems of bottlenecks, single point of failure and other issues is also a relatively new method. Based on the careful study of multimedia materials retrieval...
In this paper, data mining technology is adopted to find correlations from massive production data to predict burning through point (BTP) of sintering process. A hybrid BTP prediction model is presented which is based on artificial neural network and multi-linear regression error compensation algorithm. In this model, the final prediction result is calculated based on both the prediction value from...
The data security is one of the biggest problems which inhibit the further application of the ASP platform. This paper put forward an ASP-based security system strategy which includes infrastructure security, safeguard security boundary and computing environment protection. An ASP-oriented intrusion detection model was also proposed, and the intrusion detection subsystem function was analyzed in detail...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.