The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We present here the initial results of our investigation of a system architecture for location-based publish/subscribe services utilizing a graph-based model for managing data and computations. This architecture is implemented on a cluster computer using the facilities and the computation model provided by the Beehive framework which supports a transactional model of parallel computing on dynamic...
During recent years, we have witnessed an explosion in the Internet of Thing (IoT) in terms of the number and types of physical devices. However, there are many limitations of these devices regarding their computing power, storage, and connection capabilities. They affect on-device processing of sensed data significantly. Centralized treatment of IoT data has proven challenging for many use cases...
Multi-level clustering offers the scalability that is essential to large-scale ad hoc and sensor networks in addition to supporting energy-efficient strategies for gathering data. The optimality of a multi-level network largely depends on two design variables: 1) The number of levels, and 2) The number of nodes operating at each level. We characterize these variables within a multi-hop, multi-level...
During the development and expansion of Internet of Things (IoT), main challenges needing to be addressed are the heterogeneity, interoperability, scalability, flexibility and security of IoT applications. In this paper, we view IoT as a large-scale distributed cyber-physical-social complex network. From that perspective, the above challenges are analyzed. Then, we propose a distributed multi-agent...
Heterogeneous vehicular networks (HetVNets) are a promising approach to meet the various communication requirements of vehicular networks' services using a variety of available access networks. However, due to their inherited characteristics, HetVNets are rigid, difficult to manage and suffer from a lack of programmability, flexibility, and scalability. In this paper, we first highlight the limits...
In recent years, a lot of computer simulation codes have been developed as open-source software. Meanwhile major processors adopt a concept of a vector processing in high performance computing. Hence, the computer simulation codes need to follow a vector processing manner to have a benefit of a computational potential of the vector processing. Our study is evaluation and analysis of performance of...
The availability and amount of sequenced genomes have been rapidly growing in recent years because of the adoption of next-generation sequencing (NGS) technologies that enable high-throughput short-read generation at highly competitive cost. Since this trend is expected to continue in the foreseeable future, the design and implementation of efficient and scalable NGS bioinformatics algorithms are...
Vehicular communications are gaining one of the largest share of the automotive IoT market. The combination of the automotive sector with the transportation resulted in the emergence of the concept of connected vehicles. Therefore, motivating new proposals for real-time applications for managing traffic and incident alerts to improve the overall mobility and road safety. The growing demand for new...
Software Defined Networks (SDNs) is the latest technique that has made the existing networks more efficient in terms of scalability, performance and economical. However, SDNs are more vulnerable to different attacks and vulnerabilities. SDNs security is a major concern for all the stakeholders. The SDNs have centralized controller that is resilient to many security threats but the security attack...
Automated warehouse systems play a key role in manufacturing systems and are currently controlled using hierarchical and centralized control architectures. The Interface system between the picking and storage area represents the most critical subsystem in automated warehouse systems and needs breakdown robustness and scalability. These requirements suggests the development of decentralized control...
The scalable extension (SHVC) of the High Efficiency Video Coding (HEVC) allows encoding in layers a video with multiple quality level such as resolution, bit-depth or Signal to Noise Ratio (SNR). Compared to the equivalent HEVC simulcast, the SHVC extension provides inter-layer prediction mechanisms enabling significant bit-rate savings. Moreover these inter-layer prediction mechanisms are less complex...
Meeting the exponential increase in the global demand for bandwidth has become a major concern for today's data centers. The scalability of any data center is defined by the maximum capacity and port count of the switching devices it employs, limited by total pin bandwidth on current electronic switch ASICs. Optical switches can provide higher capacity and port counts, and hence, can be used to transform...
Ethernet based VPLS (Virtual Private LAN Service) networks are now becoming attractive in many enterprise applications due to simple, protocol-independent and cost efficient operation. However, new VPLS applications demand additional requirements, such as elevated security, enhanced scalability and improved flexibility. This paper summarized the results of a thesis which focused to increase the scalability,...
Traditional relational database management systems (RDBMS) have shown limitations in storing and analyzing big data. For example, a RDBMS is suitable for transactional operations yet not good at large-scale data analysis and processing, since a large-scale record scan or full table scan is often time-consuming. An efficient storage method for reading and writing big geospatial data is still needed...
Peer-to-peer (P2P) design offers many benefits over a single-master or a multi-master architecture in terms of scalability, reliability and independence. The Clondike project is being converted from a grid computing system into a universal non-dedicated P2P cluster where every participating node can benefit from its membership in the cluster. But different design requires different types of algorithms...
FONCODES is the public body in charge of financing and managing the execution of social-productive projects throughout the Peruvian territory. The objective of social-productive projects within the framework of the National Strategy of the Ministry of Development and Social Inclusion is to generate economic opportunities for rural households living in poverty and extreme poverty. The key processes...
The Internet of Things (IoT) offers challenges that are being met by the convergence of multiple technologies, which have matured rapidly over the past decade. Broadband communication and mobile platforms enable raw data collection and its transmission to the cloud. Data science, e.g., deep learning, transforms large amounts of data from the Internet-connected sensors and personal devices in meaningful...
In Software Defined Networks (SDN), the switches are statically assigned to controllers, which cause load imbalance among controllers. Among other problems, congestion, delay in SDN control messages, and controller overload are usually risen, especially in high traffic networks like data centers. In this work, we consider a distributed SDN controlling switches running OpenFlow protocol. We propose...
5G wireless networks aim to achieve seamless mobile broadband services, machine to machine and ultra-reliable low latency communications. These goals require massive improvements in terms of capacity, reliability, latency reduction, and scalability. Besides software defined networks and network function virtualization, self organizing networks (SON) is another enabling technology which makes 5G feasible...
Finding an appropriate resource to host the next application to be deployed in a Cloud environment can be a non-trivial task. To deliver the appropriate level of service, the functional requirements of the application must be met. Ideally, this process involves filtering the best resource from a number of possible candidates, whilst simultaneously satisfying multiple objectives. If timely responses...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.