The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The proliferation of cameras and personal devices results in a wide variability of imaging conditions, producing large intra-class variations and a significant performance drop when images from heterogeneous environments are compared. However, many applications require to deal with data from different sources regularly, thus needing to overcome these interoperability problems. Here, we employ fusion...
This paper presents a development of a handheld device for single-channel ambulatory ECG measurements. Our ECG device is designed for easy-to-use. ECG signal will be recorded for 1 minute by placing both thumbs on two dry electrodes and we have used this device to collect ECG signals from 50 volunteers. An ECG database is created from the collected ECG signals with self-annotated locations of QRS...
Performance-based quality evaluation of database conceptual schemas is an important aspect of database design process. Performance of user applications strongly depends on the logical and physical database structures derived from the conceptual schemas. This work presents a complete process of performance-based quality evaluation of conceptual schemas. It shows how to express a conceptual database...
This paper focuses on research device management mechanisms such as routers and switches, based on the NETCONF protocol, considered user authentication mechanisms using RADIUS-server and implementation of these mechanisms in currently being developed Eltex Network OS. Reflected the main features of NETCONF protocol — Network Configuration Protocol, produced theoretical and experimental comparison...
Bloom filters have been employed in various fields because of its simple and effective structure in identifying the membership of an input. Since a Bloom filter can produce false positives, the positive results of a Bloom filter should be identified whether the positives are true or not by accessing the original database. A complement Bloom filter (C-BF) was introduced to identify the true positiveness...
We propose a novel IoT directory service for storing, updating, and providing records of mobile IoT devices or objects. The IoT directory service is designed to manage a massive number of records (about one billion) and support fast lookup (latency of less than 10ms). It performs proactive caching of the records in various replicas (following the movement of mobile IoT devices or application clients)...
Thanks to its 1-cycle lookup performance, the Ternary Content Addressable Memory (TCAM) is considered an essential hardware component for the deployment of high-performance Software-Defined Networks (SDN). Unfortunately, in many network scenarios, TCAMs can quickly fill due to their limited memory size, thus preventing the installation of new flow-rules and leading to inefficient traffic forwarding...
Solid State Drives (SSD) are integrated together with Hard Disk Drives (HDD) in Hybrid Storage Systems (HSS) for Cloud environment. When it comes to storing data, some placement strategies are used to find the best location (SSD or HDD). These strategies should minimize the cost of data placement while satisfying Service Level Objectives (SLO). This paper presents two Cost based Object Placement Strategies...
Computer architectures continue to develop rapidly towards massively parallel and heterogeneous systems. Thus, easily extensible yet highly efficient parallelization approaches for a variety of platforms are urgently needed. In this paper, we present SWhybrid, a hybrid computing framework for large-scale biological sequence database search on heterogeneous computing environments with multi-core or...
We optimize and compare the performance of different deep learning architectures for awareness on a sidewalk using small form factor devices such as Raspberry Pi 3. Our main objective is to find deep learning architecture that is complex enough to accurately classify a set obstacles on the sidewalk. Out selection criteria are: minimum number of parameters, lower power consumption, and robustness against...
Network monitoring system plays an important role in ensuring network security and maintaining network stability. Based on the thorough study of the application of the simple network management protocol (SNMP), a network intelligent monitoring model for test internet protocol (IP) network is designed, and a network monitoring system is developed. The system can realize the network equipment operation...
This paper describes methods for evaluating automatic speech recognition (ASR) systems in comparison with human perception results, using measures derived from linguistic distinctive features. Error patterns in terms of manner, place and voicing are presented, along with an examination of confusion matrices via a distinctive-feature-distance metric. These evaluation methods contrast with conventional...
The goal of reaching exascale computing is made especially challenging by the highly heterogeneous nature of modern platforms and the energy they consume. As compute nodes typically utilize multiple multi-core CPU and are increasingly equipped with PCIe based accelerators, both are contributing to an ever more dynamic power consumption. In our study we evaluate our target application on a variety...
As the technological needs increase there is an increase in the necessity for information of users using the internet that has lead to the development of real-time web services. This paper analyses the differences of Node.js compared to traditional web server-IIS. Node provides a high performance, asynchronous event-based server. Node.js is event-based and uses single thread for its event loop, which...
The Internet of Things (IoT) will connect billions of devices deployed around the world in a near future by embedding mobile network and processing power capabilities into a wide range of physical computing devices used in everyday life of many people. Recent studies concerning IoT have addressed not only the interoperability of devices, but also the context awareness feature which makes easy to discover,...
To achieve the automotive quality for semiconductor devices represented by “zero defect”, “PAT” is actively applied to outgoing test. “PAT” has been generally used on wafer level test. This time we expanded it to package level test and established the method to detect the characteristic variations and to screen out the outliers.
Exchange of image information is one of the main features of a camera network. In order to exchange a large amount of information, a platform with good communication speed is needed. In this study, we designed and implemented a specialized camera network platform using Wi-Fi Direct devices. This platform can provide various services to other devices within the same network. We designed the platform...
A novel approach for fast iris recognition on mobile devices is presented in this paper. Its key features are: (i) the use of a combination of classifiers exploiting the iris colour and texture information; (ii) its limited computational time, particularly suitable for fast identity checking on mobile devices; (iii) the high parallelism of the code, making this approach also appropriate for identity...
This paper deals with an online evaluation tool for application of electric vehicles for everyday utilization. The tool takes respect of the user defined range demands as well as the possible charging periods required due to the battery. In addition, customer parameters such as the load capacity and number of seats are taken into account. The tool is able to not only evaluate pure battery electric...
Electronic passport is one of the hottest research fields nowadays due to reported different attacks against various countries. Several attacks such as brute force attack, guessing machine readable zone's information are performed on Basic Access Control Protocol (BAC) due to its low entropy. This paper presents two proposed authentication enhancement techniques for seed key of BAC. The first proposed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.