The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud computing is becoming increasingly popular and can be for used for education purposes. We propose an educational cloud based on the supersaturation method. In cloud computing, the supersaturation method is a method of assigning many more logic resources than physical resources. The cost is more important in a supersaturated cloud than the performance. Linux containers such as LXC have recently...
For network managers, it is important to find the burst network traffic as soon as possible. However, most network monitoring system can not find the source of the problematic flow in a short time. In this paper, we design an efficient realtime deep packet inspection (DPI) monitoring system, which can help us observe not only the topology but also the protocol such as Facebook or Google. To make the...
Advances in computer science prompt the creation of new economic models. One of them in urban life is Sharing Economy. This new economic model receives high attentions and has been applied to a wide range of fields in recent years. We argue that sharing economy, and its applications, may be taken as a way for researchers to understand human behavior, and thus this paper targets a growing issue on...
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
In the last few years, the diffusion of the Internet of Things (IoT) architectures is at the basis of the explosive growth of data and information useful to build adaptive, intelligent, autonomous and non-intrusively systems. In this work, we explore the Cultural Heritage domain and propose an innovative methodology for adaptive and context-aware system design, presenting a semantic model of intelligent...
Nowadays the security of computer devices is growing significantly. This is due to more and more devices areconnected to the network. For this reason, optimize the performance of systems able to detect intrusions (IDS) is a goalof common interest. The following work consists of use thegeneralizing power of neural networks to classify the attacks. In particular, we will use multilayer perceptron (MLP)...
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
The popularization of Long Term Evolution (LTE) leads to the issues of mobile data usage monitoring and prediction. The analyses of these issues can be referred for the deployment of mobile network and the recommendation of customer solutions. However, a great deal of statistical computing power and time is needed for several previous mobile data usage prediction methods. Because large variances may...
Several vendors are developing sports clouds as part of recent developments in sports science and cloud computing. Currently available sports clouds focus on physical and technical data but not mental data. We propose a sports mental cloud, which manages mental data. The sports mental cloud stores big data collected in various psychological tests and analyzes the data in various ways. The sports mental...
In this paper, we consider a MIMO system with two transmit ports and receiver ports in the power-line communications (PLC), and we propose two space time block codes (STBCs) Finite Feedback Schemes (FFSs) for PLC. In each scheme, the transmitter equips with two STBCs, one corresponding to each of the feedback values, to encode the information bits. Because of the impulsive noise in PLC channels, the...
Device-to-Device (D2D) communication enables a directdata transmission between User Equipment (UE) without the relayby Base Station (BS). When D2D communication is employedunderlying the Long Term Evolution (LTE) cellular network, it canenhance the spectrum utilization, power-saving efficiency andnetwork capacity. However, it might also cause inter-interferenceswhich degrade the system performance...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.