The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
To optimize datacenter energy efficiency, SimWare analyzes the power consumption of servers, cooling units, and fans as well as the effects of heat recirculation and air supply timing. Experiments using SimWare show a high loss of cooling efficiency due to the nonuniform inlet air temperature distribution across servers. The Web extra at http://youtu.be/tmGHffCfveU is a video interview with Sungkap...
NS-2 is the most famous simulator among other network simulators. Most of researchers use NS-2 to evaluate their new protocols/architectures. Although NS-2 has much resource and many available tools to generate different characteristics and network scenarios, source codes created on NS-2 is not able to be reused for real implementation. The releasing of NS-3 changes the way researchers work. NS-3...
In this paper we present a novel reversible implementation of a square-root circuit with an array structure. In scientific computations such as numerical analysis, computer graphics, complex number computations, square root is an important operation. In classical irreversible arena we find different realizations of square root circuit. Since reversible circuit is emerging as an alternative to classical...
Reduction of power consumption for any computer system is now an important issue, although this should be done in a manner that is not detrimental to the user base. We present a number of policies that can be applied to multi-use clusters where computers are shared between interactive users and high-throughput computing. We evaluate policies by trace-driven simulations in order to determine the effects...
The development of urban public service (such as education) is usually uneven in the space in metropolitan region. This phenomenon has a profound impact on urban economy. This paper bases study on the New Economic Geography and urban economics theories, after structuring the conceptual model of the public service system in a monocentric metropolitan region, using simulation to realize the basic operation...
Entropy is defined as a measure of how much information can be retrieved from a message or information sources. In data communications, entropy from information sources is described in the form of bits and closely related to the probability of arriving message to receiver and depends on the period of light spectrum, therefore information source rates affected. The problem faced is how to describe...
We introduced the localization algorithm to find the coordinates of nodes in WSN. The proposed algorithm starts at measuring the angle and distance at the landmark and their neighbors and then finding their azimuths and incident angles. In this paper, four kinds of the method to calculate and update the coordinates of nodes are proposed. The simulation results show that to utilize more data obtained...
Nowadays the use of the Internet has become something massive and indispensable. But, how protected are internet users from cyber attacks? It is very difficult to see the impact of worm viruses in real networks. One of the best ways is to run attacking tools for intruding real networks and to get sufficient information on phenomena occurred in the networks during the attacks. However, it is impossible...
Iterative learning control (ILC), an approach to achieve perfect trajectory tracking for uncertain dynamic systems that are periodic or repetitive, can be viewed as a kind of coordination or planning algorithm. This paper exploits this view to provide two coordination algorithms for distributed multi-agent systems. First we show how to achieve formation control for a class of nonholonomic mobile agents...
The aim of this work is to describe the design, implementation and evaluation of an e-learning course focused on scheduling jobs in a computer grid. These topics belong to applied informatics master's study program. Themes of grid scheduling are part of courses, term and research projects. Our course titled Research project uses inter-subject relations among distributed operating systems, optimization,...
One dimensional SIMD array which is PIM-based data parallel computer architectural has been proposed for multimedia processing application. This paper describes the implementation of a controller for one dimensional SIMD array. The main components of the controller and the instruction format are presented. PE array control is introduced in detail. Finally, the results of simulation are given to show...
This paper compares two different approaches, followed by our research group, to efficiently run NEPs on parallel platforms, as general and transparent as possible. The vague results of jNEP (our multithreaded Java simulator for multicore desktop computers) suggests the use of massively parallel platforms (clusters of computers). The good results obtained show the scalability and viability of this...
With the development of computer science, large-scale distributed simulation is becoming mature. As an outstanding network simulation software, OPNET can simulate on single machine. In order to be one of large-scale distributed simulation,it need to be controlled. HLA can construct new complicated simulation applications with the reusable simulation module conveniently according to communication simulation...
This paper is a study of the “Character and Object Repetition” problem in crowded scenes. A detailed technique is presented in comparison to alternative previous solutions from different researchers.
Testability is a significant design feature for system, which has gong through five stages such as External Test, BIT (Build-in Test), Intelligent BIT, Comprehensive Diagnosis and PHM (Prognostics and Health Management), has greatly improved the maintainability, reliability and availability of the modern weapons especially in electronic systems [1]. Meanwhile, in the process of the researches on systems...
The experimental simulation system is visually modeled and designed with UML, and realized on DOTNET development platform. Practice shows that the use of Unified Modeling Language not only can have good system scalability and reusability, but also can improve the efficiency of the system.
Fault tolerance is a central issue in the design and implementation of interconnection networks for large parallel systems. Connection probability of a network is a good network fault tolerance measure. For a mesh of given size and node failure probability, the gap between the known upper and lower bounds on the connection probability is often very large. In this paper we design algorithms to estimate...
Based on the heralded pair-coherent states sources, the Vacuum+Weak decoy state protocol focused on BB84 is presented. Combining the passive decoy state method and the active decoy state method, we use the triggered and nontriggered components to estimate the fraction of single-photon counts and quantum bit-error rate of single-photon and to generate the secure key. From the simulation results of...
Since Gode and Sunder had introduced zero intelligence with budget constraint (ZI-C) agents in the double auction experiments, there has much controversy in whether the pure market discipline in ZI-C system has the ability to let the transaction prices converge to the competitive equilibrium. In this paper, we introduce a probability model to simulate the ZI experiences and try to gauge the power...
In this paper, snoopy cache coherence protocols with update strategy have been studied, since description of protocols is apparently different in references, so we offer a common description in order to show simplicity and comparability protocols. Evaluating of protocols is in simulation level By limes simulator tools. Limes includes dragon protocol [1], that we added WTU and firefly protocols to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.