The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless ad-hoc networks which do not use network infrastructure are getting more important in various types of applications like vehicle-to-vehicle (V2V) networks. Here, neighbor nodes with which each node can directly communicate may be changed, e.g. due to movement of nodes and faults of networks and nodes. Messages are forwarded to destination nodes by wireless node-to-node communication in ad-hoc...
Application processes like Web applications use not only CPU but also storages like HDD. In our previous studies, the algorithms to select a server in a cluster are proposed to energy efficiently perform processes which use either CPU or storages. In this paper, we consider a more general type of processes which do both the computation and access to storages. In this paper, we propose a computation...
In this paper, we discuss a peer-to-peer (P2P) model of a topic-based publish/subscribe (PS) system (P2PPS model) where each peer process (peer) can both subscribe and publish event messages with topics and there is no centralized coordinator. Each peer has to causally deliver event messages in which the peer is interested. In our previous studies, the TBC (topic-based causally delivery) protocol...
In the peer-to-peer type of topic-based publish/subscribe (P2PPS) model, each peer (process) can publish and receive event messages with no centralized coordinator. A peer is allowed to publish and subscribe an event message with topics which are in the publication and subscription topics of the peer. Some information may flow from a peer to another peer if the peer publishes an event message to the...
The I(JP)=12(12−), 12(32−), and 12(52−) uudcc‾ pentaquarks are investigated by the quark cluster model. This model, which reproduces the mass spectra of the color-singlet S-wave q3 baryons and qq‾ mesons, also enables us to evaluate the quark interaction in the color-octet uud configurations. It is shown that the color-octet isospin-12 spin-32 uud configuration gains an attraction. The uudcc‾ states...
Information systems have to be consistent and secure in presence of multiple conflicting transactions. The role-based access control model is widely used to keep information systems secure. Here, a role is a set of access rights, i.e. permissions. A subject is granted a family of roles, i.e. one or more than one role. A subject s is allowed to issue a method op to an object o only if an access right...
In distributed applications, a group of multiple objects are cooperated to achieve some objectives. The objects may suffer from kinds of faults. If some object o is faulty, o is rolled back to the checkpoint and objects which have received messages from o are also required to be rolled back. In this paper, on the basis of the message semantics, we define influential messages whose receivers are required...
In fault-tolerant information systems, application processes have tobe reliably performed in presence of server faults. Server clustersystems are widely used to realize not only high performance but alsofault-tolerant service. In order to reliably perform applicationprocesses, multiple replicas of each application process are performedon multiple servers in a server cluster system. On the other hand,...
It is critical to reduce the electric energy consumed in information systems, especially server clusters. In ourprevious studies, the MLPCM (multi-level power consumption with multiple CPUs) and MLCM (multi-level computation with multiple CPUs) models are proposed with server selection algorithms. In the server selection algorithms, a server is selected to perform a process issued by a client by estimating...
In this paper, we present the application of Neural Networks (NNs) for user identification in Tor networks. We used the Back-propagation NN and constructed a Tor server, a Deep Web browser (Tor client) and a Surface Web browser. Then, the client sends the data browsing to the Tor server using the Tor network. We used Wireshark Network Analyzer to get the data and then used the Back-propagation NN...
An event-driven publish/subscribe (PS) model of a distributed system is used in various applications. In this paper, we discuss a peer-to-peer (P2P) model of a topic-based PS system (P2PPS model) where each peer process (peer) can both subscribe interesting topics and publish event messages with topics. In our previous studies, we propose the TBC (topicbased causally delivery) protocol an homogeneous...
It is critical to reduce the electric energy consumed by servers in clusters. In cloud computing systems, computation resources like CPU, memory, and storages are virtualized so that applications can use the resources without being conscious of which physical servers supports which service. Virtual machine technologies are now used to support applications with virtual computation service. Virtual...
In a peer-to-peer (P2P) type of topic-based publish/subscribe (P2PPS) model, each peer (process) can be a publisher and subscriber. Here, a peer publishes an event message and then the event message is notified to a target peer which is interested in the event message. Publications and subscriptions are specified in terms of topics. In the topic-based access control (TBAC) model proposed in our previous...
In this paper, we evaluate the performance of two Wireless Mesh Networks (WMNs) architectures considering throughput, delay, jitter and fairness index metrics. For simulations, we used ns-3, Distributed Coordination Function (DCF) and Optimized Link State Routing (OLSR). We compare the performance for Transmission Control Protocol (TCP) Tahoe, Reno and NewReno for uniform distribution of mesh clients...
In order to realize eco-society, we have to reduce the electric energy consumed by servers in a cluster in addition to satisfying performance requirements. Virtual machines are now widely used to support applications with virtual computation service in clusters like cloud computing systems. Here, a virtual machine on a host server can migrate to a guest server while processes are being performed on...
It is now critical to reduce electric energy consumed by servers in a cluster, especially scalable systems like cloud computing systems. In a cluster of servers, most application processes like Web applications use not only CPU but also storages like HDD. In our previous studies, the power consumption MLPCS model and computation MLCMS model are proposed. Ways to energy-efficiently perform processes...
In this paper, a conflict-graph basedpower control scheme for spectrum underlay incognitive radio networks is proposed, which helpsavoiding the interference and saving power whenthe primary and secondary users share the samechannel simultaneously. Simulations results usingthe OMNet++ simulator are provided, showing theeffectiveness of the proposed approach in terms ofnumber of users in the network,...
Wireless Mesh Networks (WMNs) are attracting a lot of attention from wireless network researchers, because of their potential use in several fields such as collaborative computing and communications. In this paper, we present the implementation of a testbed for WMNs using OpenWRT OS. We analyze the performance of Optimized Link State Routing (OLSR) protocol in an indoor environment considering Line-of-Sight...
This publication presents a review of medical image analysis systems. The paradigms of cognitive information systems will be presented by examples of medical image analysis systems. The semantic processes present as it is applied to different types of medical images. Cognitive information systems were defined on the basis of methods for the semantic analysis and interpretation of information – medical...
A publish/subscribe (PS) model is an event-driven model of a distributed system. In this paper, we consider a peer-to-peer (P2P) type of PS model where each peer (process) can publish and subscribe events. Here, a peer publishes an event message and then the event message is notified to a target peer which is interested in the event. Publications and subscriptions are specified in terms of topics...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.