The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
2016 IEEE Intl Conference on Computational Science and Engineering (CSE) and IEEE Intl Conference on Embedded and Ubiquitous Computing (EUC) and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES)
Named Data Networking (NDN) is a promising future Internet architecture which retrieves the content using their names. Content names composed of strings separated by '/' are stored in the NDN Forwarding Information Base (FIB) to forward the incoming packets further. To retrieve content through their names poses two main challenges for the NDN FIB: high memory consumption and high lookup time. Therefore,...
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
The application of cyber-physical systems (CPSs) in safety-critical applications requires rigorous verification of their functional correctness and safety-relevant properties. We propose a practical verification framework which enables to fill the gaps between model-based development and the formal verification process seamlessly connecting them. The verification framework consists of (a) a model...
As distributed systems such as automotive, medical, manufacturing automation become larger and more complex, it is difficult to test these systems. Also, the synchronization of distributed applications make the testing more difficult. In the Software-in-the-Loop (SiL) simulation, a synchronization method among clock of applications is provided for virtual hardware devices and environment. A typical...
This paper firstly introduces the background and significance of the communication management system in power system, and expounds the necessity of the construction of communication management system .view a whole solution of the system from the technical point, describes the physical architecture, logical architecture, and security architecture of communication management system, analyses the design...
For several years, we have seen a significative increase of building-operation data acquisition solutions that have their own particularity or their own specificities. The implementation of most of them represents a significant cost in the overall balance sheet of energy diagnostic study and heavily impact their Return On Investment. Setting up and data analysis are also complex and requires a expertise...
The progresses of the biological data acquisition technologies permit access to more massive, diverse, reliable, and less expensive data. The advent of these new technologies should provide to biologists, answers more accurate and more comprehensive. However, modeling biological systems able to process and analyze these overstaffed data in order to respond to the biological problems is a real bioinformatics...
Cloud Computing has emerged as a viable alternative to in-house computing resources for many organisations. It offers an alternative solution for many enterprise applications, particularly large-scale legacy applications. In addition, it can offer a cost effective strategy for small and medium-sized enterprises (SMEs) where the high set-up and maintenance cost of computing resources can be prohibiting...
In this paper, we present and analyze parallel substructuring methods based on conjugate gradient method, a iterative Krylov method, for solving sparse linear systems on GPUs. Numerical experiments performed on a set of matrices coming from the finite element analysis of large scale engineering problems, show the efficiency and robustness of substructuring methods based on iterative Krylov method...
As technology moves from being an enabler to become the lifeblood of businesses in the digital era, so does the data used to support the implementation of these technological shifts. In order for the data to be an asset and not a liability, it is primordial to ensure that the data captured and maintained over time is accurate, traceable, reliable and current. However, very often, in order to complete...
No study has investigated the current state andpotential impact of using infectious disease management systems in the Gulf Region. In this paper, we aim to investigatethe current published literature to identify the studies and the potential impact of these technologies on improving infectious disease management. This study reviews the published papers (1975-2014) using a systematic approach. This...
To guarantee the integrity and security of data transmitted through the Internet, hash functions are fundamental tools. But recent researches have shown that security flaws exist in the most widely used hash functions. So a new way to improve their security performance is urgently demanded. In this article, we propose new hash functions based on chaotic iterations, which have chaotic properties as...
This paper investigates numerically the Galerkin Least Square method for time-harmonic acoustic simulation within the virtual church of Royaumont abbey. The church's history is here reviewed. Since this church was destroyed after the french revolution, the methodology to build an accurate computer aided design model of the church of Royaumont abbey is clearly detailed. The Helmholtz equation is considered...
After a decade evolving in the High Performance Computing arena, GPU-equipped supercomputers have conquered the top500 and green500 lists, providing us unprecedented levels of computational power and memory bandwidth. This year, major vendors have introduced new accelerators based on 3D memory, like Xeon Phi Knights Landing by Intel and Pascal architecture by Nvidia. This paper reviews hardware features...
In this work, we consider the usage of wireless sensor networks (WSN) to monitor an area of interest, in order to diagnose on real time its state. Each sensor node forwards information about relevant features towards the sink where the data is processed. Nevertheless, energy conservation is a key issue in the design of such networks and once a sensor exhausts its resources, it will be dropped from...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.