The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Emerging large-scale distributed storage systems such as content delivery networks (CDNs) are faced with the task of distributing peta-bytes of requested data from mobile service users. In this paper, we present a novel cache architecture with enhanced performance that aims to reduce the data distribution load on CDNs for large-scale storage systems. Our proposed architecture is located between a...
This paper presents an adaptation of the Brousseau method. The concepts of didactic variations and interactions are introduced by using didactic and a-didactic situations. With the main aim of guaranteeing alumni improvement and evaluation processes, a case study application was development founded on a cloud architecture, which is also based in previous research, curricular organization and interaction...
The future of hardware development lies in massively parallel hardware architectures as used in embedded as well as high-performance systems, for instance streaming-based, real-time and database applications. Especially field-programmable gate arrays provide a platform for the rapid development of integrated circuits and the accompanied software. For reasons of energy efficiency, it is increasingly...
Although migrating library applications to Cloud environment is not an easy task, many libraries are interested in using Cloud infrastructure services broadly across their businesses, whether is about a Public, Private or Hybrid Cloud. One of the migration expectations is the scalability of digital preservation architectures in Cloud environments. In this paper we address the scalability and portability...
This paper designed a typical task oriented adjustable autonomy architecture for autonomy control of unmanned surface vehicle (USV). First a two-dimensional classify method of an adjustable autonomy control level is presented, which is applied to the USV system. Then an index system is established for the autonomy control level assessment of USV, which includes the performance of USV, environmental...
This paper describes one of the first experiences of an e-learning based remote course taught between two premier institutes in India namely IIT Delhi and IIT Ropar. By using state of the art infrastructure, and by adopting an approach that advocates continuous monitoring of the quality of the learning experience, it was possible for the instructor to seamlessly conduct remote courses over a span...
The paper introduces the basal principles of Vector Space Model, the architecture of Hbase cluster, and relational conceptions, makes a science and technology dissertation retrieval system based on cloud computing technology, and gives steps of realization. The application experiment shows it can deal with search requests rapidly, advances a little precision ratio, and has effective application value.
A. Holonic multi-agent systems Koestler also defines a holarchy as a hierarchy of self-regulating holons which function as follows: 1) As autonomous entities that have the power on their parts, 2) as dependent parts under the command of their superiors, 3) in coordination with the local environment.
“Big Data” traditionally refers to some combination of high volume of data, high velocity of change, and/or wide variety and complexity of the underlying data. Solving such problems has evolved into using paradigms like MapReduce on large clusters of compute nodes. More recently, a growing number of “Deep Data” problems have arisen where it is the relationships between objects, and not necessarily...
In this paper, we propose a texture matching approach based on a new decomposing architecture. First, the main window starting from the converging point a to the bottom-right corner of the image is considered. For each iteration, the main window's size is reduced by a distance d and other windows with the same main window's size are generated if possible. The Local Binary Pattern (LBP) technique,...
We present our approach in conducting an OBTL-based (Outcomes-Based Teaching and Learning) software engineering course that incorporated many constructively aligned TLA (Teaching, Learning and Assessment) techniques. This course is offered in the fourth semester of the Bachelor of Engineering (Honors) degree program in the Computer Science and Engineering Department at the University of Moratuwa....
Security and data integrity are the two primary pillars of a first-rate network. Attack is defined as an assault on the safety that derives from an intellectual peril that is an intentional attempt to elude security services and breach the security of the system. Nowadays, the new kind of network that is rising in popularity is the Peer-to-Peer networks. It is a self-sufficient network in which all...
The least recently used (LRU) replacement policy performs poorly in the last-level cache (LLC) because temporal locality of memory accesses is filtered by first and second level caches. We propose a cache segmentation technique that adapts to cache access patterns by predicting the best number of not-yet-referenced and already-referenced blocks in the cache. The technique is independent from the LRU...
This paper introduces a new kind of hybrid Cache coherence protocol-MECSIF, which applicants for multiprocessor environment, based on hybrid cache line write strategy. Through the introduction of a small dictionary-D-Cache in system architecture, protocol overcomes the shortcoming of snoopy coherence protocol that data request was undifferentiated broadcasted. Protocol extends data block state so...
In multi-processor network device??C distributed communication between lincecards is very important??B Distributed communication protocol between linecards for distributed multi-processor architecture is proposed for multi-processor network device control data transmission channel is the control center of the network devices. This paper analyzes the communication protocol between the distributed linecards...
To ensure the software's trustworthiness when it receives data from outside during its execution, an information-flow-based dynamic measurement model is proposed which expands the traditional Biba model. Differing from Biba model, our integrity policy defines when subjects accept low integrity input data, a control-flow-jump function is given to determine whether the input data will impact on the...
Using robots for teaching is one approach that has gathered good results on Middle-School, High-School and Universities. Robotics gives chance to experiment concepts of a broad range of disciplines, principally those from Engineering courses and Computer Science. However, there are not many kits that enables the use of robotics in classroom. This article describes the methodologies to implement tools...
This paper presents the development of E - School System Architecture (ESSA), the architecture for an E-Learning System. This architecture is introduced for the purpose of providing flexibility, scalability and modularity to the E-Learning system. Its main objective is to propose an architecture under which different e-learning software modules can be developed and integrated. During the course of...
IP Spoofing is a problem without an easy solution, since it's inherent to the design of the TCP/IP suite. Understanding how and why spoofing attacks are used, combined with a few simple prevention methods, can help protect your network from these malicious cloaking and cracking techniques.. Intrusion Detection System (IDS) has been used to secure these environments for sharing their data over network...
This paper presents a disaster preventive scheme, which is based on the specific circumstances of Tonglu county. The scheme includes three-tier plans among county, township and villages. The system architecture uses the model of Browser/Server, which only need be deployed on server and the client could easily perform its plans, updating and maintenance without installation of any other software. Adopting...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.