Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
High precision results in structural with the shortest time consumption are expected when methods are introduced to solve FEM(Finite element method). Solving of stiffness matrix assembled by isoparametric elements and solving the assembled stiffness matrix are the most time-consuming. In the previous serial algorithms, there is always a time limitation for some applications and it is hard to achieve...
In accordance with the resent advancement in Internet of Things (IoT), the needs for IoT experiment platform have been ever increasing. IoT system consists of various technologies such as networking, sensor controller, edge-side computing, server-side big data collections, analysis and their visualizations. An experimental environment that can handle the development and experiments of such an IoT...
Quantum memory-driven computing on the classical computers for design and test of black-box functionality is considered. A method for synthesis and minimization test for the black-box functionality, based on a qubit derivative matrix and sequencer for searching a quasi-optimum coverage, is proposed. Examples of quantum memory-driven design and test minimization of the Schneider logic circuit are presented...
Our society relies upon information processing at a scale never seen before in human history. We are indeed experiencing an exponential growth in processing demand, as more and more applications in the most disparate domains emerge. While continuous improvements in the manufacturing processes of microprocessors has been able so far to mitigate the ecological and economical costs this trend imposes,...
Chaos-based coded modulation (CCM) systems have been shown to be competitive against important wireless channels impairments, like fading. Nonetheless, these systems have not been tested yet in a real-world scenario, and their performance has only been explored using theoretical and numerical bounds, and validated by simulation. In this proposal, we take advantage of the availability of Software-Defined...
We address a well known problem of computer science, the problem of computing the probability that a given number of people m > 1 have the same birthday from among the members of a larger set of cardinality n ≥ m. The solution to this problem for m = 2 is well known and is usually referred to as the ‘birthday surprise probability’. A solution for m = 3 is also known and appears in the 2004 paper...
Software-Defined Networks (SDN) rely on flow tables to forward packets from different flows with different policies. To speed up packet forwarding, the rules in the flow table should reside in the forwarding plane as much as possible to reduce the chances of consulting the SDN controller, which is a slow process. The rules are usually cached in the forwarding plane with a Ternary Content Addressable...
Last year saw the first quantum computers realized that can be programmed from a high level user interface to run arbitrary quantum algorithms [1, 2]. While these devices are still small in scale, only comprising a handful of qubits each, they nevertheless allow the implementation of quantum circuits in a way that is basically blind to the underlying hardware itself. This constitutes a new level of...
The life expectancy of digital excitation systems is influenced by the availability of spare and replacement parts. Many factors affect the ability of manufacturers to continue producing these systems and providing replacement parts. Strategies exist for prolonging the life of existing digital equipment and minimizing the cost impact of complete replacement.
A Distributed File System (DFS) is a system where the files are stored and distributed on different computers connected via a communication network. The FlexA is a DFS integrated into the user space with fault tolerance, security, scalability and flexibility features. However, FlexA has limitations in the development of new resources to the system. This work made the reengineering of the FlexA aspects...
Stateful programmable dataplanes are emerging as a disruptive technology and an enabler factor for network function virtualization in SDN environments. In this demo paper we show three real world use cases with stateful forwarding requirements to validate both the hardware and software implementations of the Open Packet Processor data plane.
In this paper, the implementation of the K-means clustering algorithm on a Hadoop cluster with FPGA-based hardware accelerators is presented. The proposed design follows MapReduce programming model and uses Hadoop distribution file system (HDFS) for storing large dataset. The proposed FPGA-based hardware accelerator for speed up the K-means clustering algorithm is implemented on Xilinx VC707 evaluation...
This paper presents a series of experiments demonstrating the capacity of single-walled carbon-nanotube (SWCNT)/liquid crystal (LC) mixtures to be trained by evolutionary algorithms to act as classifiers on linear and nonlinear binary datasets. The training process is formulated as an optimisation problem with hardware in the loop. The liquid SWCNT/LC samples used here are un-configured and with nonlinear...
This article discusses the general structure of the CNC control system with the Soft PLC module which was implemented as an external unit. The advantages of reducing the EtherCAT cycle, increasing control system reliability and disadvantages associated with the additional cost of the proposed solution were investigated. The proposed solution also uses the external Soft PLC instead of the safety controller...
Information and communication technology, services and corporate security shape modern working places creating new added values. The development of technology markets and new innovations impose phrase how to lead IT and thereby be successful. The article describes and develops pragmatism and interdisciplinary of information systems of companies with the help of ITIL methodology. The construction of...
The purpose of this paper is to introduce a set of automatic feeding system in the tank area, to achieve a variety of material handling precision control. This paper introduces the composition and function of the system and describes the characteristics and application of PCS7 software in the automatic feeding control system. The system was designed and developed based on Siemens PCS7 software. The...
The implementation of RFID technology in computer systems gives access to quality information on the location or object tracking in real time, thereby improving workflow and lead to safer, faster and better business decisions. This paper discusses the quantitative indicators of the quality of the computer system supported by RFID technology applied in monitoring facilities (pallets, packages and people)...
Hash table is one of the most fundamental and critical data structures for membership query and maintenance. However, the performance of a standard hash table degrades greatly when the hash collision is large due to high load factor or unpredictable dynamic membership updates, especially per-packet updates in network processing. In this paper, we shape a hash table from the conventional slim-and-tall...
The urgent task of the organization of confidential calculations in crucial objects of informatization on the basis of domestic TPM technologies (Trusted Platform Module) is considered. The corresponding recommendations and architectural concepts of the special hardware TPM module (Trusted Platform Module) which is built in a computing platform are proposed and realize a so-called “root of trust”...
In this work, we propose a design flow for automatic generation of hardware sandboxes purposed for IP security in trusted system-on-chips (SoCs). Our tool CAPSL, the Component Authentication Process for Sandboxed Layouts, is capable of detecting trojan activation and nullifying possible damage to a system at run-time, avoiding complex pre-fabrication and pre-deployment testing for trojans. Our approach...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.