The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mimicking the collaborative behavior of biological swarms, such as bird flocks and ant colonies, Swarm Intelligence algorithms provide efficient solutions for various optimization problems. On the other hand, a computational model of the human brain, spiking neural networks, has been showing great promise in recognition, inference, and learning, due to recent emergence of neuromorphic hardware for...
We consider an infrastructure of networked systems with discrete components that can be reinforced at certain costs to guard against attacks. The communications network plays a critical, asymmetric role of providing the vital connectivity between the systems. We characterize the correlations within this infrastructure at two levels using (a) aggregate failure correlation function that specifies the...
In this paper, the problem of flocking of MultiAgent Systems (MAS) in presence of system uncertainties and unknown disturbances is investigated. A biologically-inspired novel distributed resilient controller based on a computational model of emotional learning in mammalian brain is proposed. The methodology, known as Brain Emotional Learning Based Intelligent Controller (BELBIC), embeds a resilience...
Designing a group key management scheme for group communication in wireless sensor network is a challenging task given the limited energy, computational power and memory of the sensor nodes. A group key management scheme should satisfy backward secrecy and forward secrecy security requirements in case of sensor revocation and new sensor join respectively. All the existing schemes are analyzed for...
As the demand of power converter for higher power density is increasing, bonding wire failure of IGBT module becomes more severe. Accordingly, it is of great significance to investigate the reliability of bonding wire under operating condition for improving the reliability of IGBT module. In this paper, the finite element model of IGBT module was established, and a two-step indirect coupling electro-thermal-mechanical...
Quantum photonic technologies have the potential to revolutionise our information and communication systems, enabling ultra-secure communication and advanced computation with applications in quantum simulation and machine learning. Here we overview the potential of silicon photonics to realise such a technology platform.
In computing systems, a job/process/task/thread may suspend itself when it has to wait for some other internal or external activities, such as computation offloading or memory accesses, to finish before it can continue its execution. In the literature, there are two commonly adopted self-suspending sporadic task models in real-time systems: 1) the dynamic self-suspension model and 2) the segmented...
1To tackle the unavoidable self-suspension behavior due to I/O-intensive interactions, multi-core processors, computation offloading systems with coprocessors, etc., the dynamic and the segmented self-suspension sporadic task models have been widely used in the literature. We propose new self-suspension models that are hybrids of the dynamic and the segmented models. Those hybrid models are capable...
In this paper, we contribute in solving the systemlevel fault diagnosis (SLD) problem under the symmetric invalidation rules. The SLD aims at determining faulty nodes based on an input syndrome that is generated comparing the outputs from the different nodes. The symmetric comparison diagnosis model assumes that tasks are assigned to pairs of nodes and the results of executing these tasks are compared...
This paper proposes a procedure for estimating the location of open or short defects in a Through Silicon Via daisy-chain structure. The equivalent inductance and capacitance are extracted, at low frequency, through the measured and/or computed Z11 parameter of a three dimensional model in which the short and open defects are intentionally created in specific points.
Power consumption and high compute density are the key factors to be considered when building a compute node for the upcoming Exascale revolution. Current architectural design and manufacturing technologies are not able to provide the requested level of density and power efficiency to realise an operational Exascale machine. A disruptive change in the hardware design and integration process is needed...
Aiming at the performance evaluation on image captioning and video captioning, this paper discusses the existing performance metrics and then suggests a novel overall performance metric based on grey relational analysis of Grey System Theory. In our metric, all the available performance metrics of each captioning model is used to extract a comparative sequence. Meanwhile, a reference sequence is constructed...
Zakat is one of the five pillars of Islam. The person who entitled to receive zakah called mustahiq. BAZIS is one of the (Islamic) board which oversees the collection of alms. Its main task is to receive zakah from muzaki and distribute it to the right mustahiq. To determine the mustahiq, BAZIS commitee perform interviews and observation (field surveys) to the mustahiq candidates which could lead...
A phased-mission system (PMS) is usually consisting of a number of non-overlapping phases, and the phases should be completed sequentially to achieve a successful mission. In practice, imperfect fault coverage (IPC) plays an important effect on the system reliability. In this paper, stochastic multi-value (SMV) models are proposed to predict the system reliability of a multi-stated PMS consisting...
In this paper, we study the problem of identifying the source of network diffusion processes by using the contact networks and sampled infections. The dynamic processes are described by the susceptible-infected (SI) model and a maximum likelihood (ML) estimator is formulated for identification of the source. We propose a two-stage method that first locates a set of suspected source nodes and then...
We consider an infrastructure consisting of a network of systems each composed of discrete components that can be reinforced at a certain cost to guard against attacks. The network provides the vital connectivity between systems, and hence plays a critical, asymmetric role in the infrastructure operations. We characterize the system-level correlations using the aggregate failure correlation function...
Shah, Rashmi and Ramchandran recently considered a model for Private Information Retrieval (PIR) where a user wishes to retrieve one of several Ä-bit messages from a set of n non-colluding servers. Their security model is information-theoretic. Their paper is the first to consider a model for PIR in which the database is not necessarily replicated, so allowing distributed storage techniques to be...
Identity management (IDM) refers to a security discipline that employs technologies to manage information about the identity of users and control their access to organization resources. Various IDM products are in the market to offer corporate customers productivity and security while lowering costs of identity management. System integrators who implement the IDM solutions for their corporate customers...
The results of the energy submodel development for the optical-electronic device of a two spectral ratios are given in article. The adaptation of the generalized technique of an energy calculation was executed. The basic data for the energy submodel building were selected. The algorithm of the computer program which allow to calculate the spectral ratios in case of a different values of the diameter...
Small-scale clouds (SCs) often suffer from resource under-provisioning during peak demand, leading to inability to satisfy service level agreements (SLAs) and consequent loss of customers. One approach to address this problem is for a set of autonomous SCs to share resources among themselves in a cost-induced cooperative fashion, thereby increasing their individual capacities (when needed) without...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.