The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
By investigating the current situation of university library's digital and informational development, this paper analyzes the opportunities and challenges brought by cloud computing technology to the development of libraries. Two strategies of renting cloud services and building cloud platform are put forward to realize the cloud computing service of Digital Library in big data environment.
Most existing concepts for hardware implementation of reversible computing invoke an adiabatic computing paradigm, in which individual degrees of freedom (e.g., node voltages) are synchronously transformed under the influence of externally- supplied driving signals. But distributing these "power/clock" signals to all gates within a design while efficiently recovering their energy is difficult...
Simulation of human bipedal walking through muscle actuation presents an optimization problem with a substantial number of parameters. Calculation of the cost function for this optimization problem, which can be non-differentiable, necessitates significant computational power and resources. In addition, because of the redundant nature of the human musculoskeletal system, the problem is highly prone...
With the enhancement of informatization and automation, the capacity and efficiency of CBTC systems are increasing. However, the wide application of information technologies brings serious security threats on CBTC systems. Due to inherent characteristics of railway services, obtaining the security situation of CBTC systems is necessary. The methodlogy in this paper to evaluate the vulnerability of...
In the paper are analyzed articles that are indexed on Web of Science with the main topic of the conference “Communication and Information Technologies” (CIT). The articles were chosen the most cited ones. The first step of analysis summarizes statistics of the articles and the second step was oriented to detailed analysis using the software Tovek Tools. The contextual analysis was depicted in the...
The increasing amount of data being collected from simulations, instruments and sensors creates challenges for existing e-Science infrastructure. In particular, it requires new ways of storing, distributing and processing data in order to cope with both the volume and velocity of the data. The University of Queensland has recently designed and deployed MeDiCI, a data fabric that spans the metropolitan...
This paper presents one step toward creating the building blocks for machine intelligence that is inspired by its biological equivalent. The authors' quantum learning methods (deep quantum learning) are applied to quantum devices whose quantum bit (q-bit) activity is deliberately chosen to mimic the spiking behavior of biological neurons. Because of the "quantum" scale of these computers,...
The Computational Thinking (CT) conceptual framework is entering its second decade of research yet still lacks a cohesive definition by which the field can coalesce. The lack of clear definition makes assessment tool challenging to formulate, pedagogical efforts difficult to compare, and research difficult to synthesize. This paper looks to operationalize differing definitions of CT enhancing the...
The human immune system is incredibly efficient at identifying self- and non-self entities in our bodies. A non-self entity (malicious), once identified, is attacked by particular types of cells to remove the intruder before it can cause damage. Our immune system has components that identify not only non-self entities but also recall old entities that may not have been encountered for a very long...
Smart space is created by deploying a Semantic Information Broker (SIB) in a given Internet of Things (IoT) environment. The deployed SIB enables information sharing for many digital devices participating in the IoT environment. In this study, we consider CuteSIB — a new SIB implementation for the Smart-M3 platform, where the class of SIB host devices covers various embedded and mobile devices, in...
Simulation represents the major research method in all knowledge domains and a scientifically valid method of estimating the characteristics of complex systems used for decision making in different areas of engineering. The existing and projected systems can be explored effectively using mathematical models (analytical and simulation) implemented on high-performance computers, which act in this case...
We are in a time where trends and ICTs are capable of leading important educational changes and allowing an advance in flexible teaching environments, through innovation and collaboration between educational institutions. Teachers have a large number of technologies to use as an ally in the classroom, such as software agents in the teaching-learning process. The objective of this article is to make...
The direct impact of the use of information and communication technology products increases energy consumption, the long term impact is the increase of electronic waste and carbon foot print on the environment. This research focused on the design of green computing environment based on the behavior of the energy consumption in a government agency in Indonesia. The research model composed of six variables,...
Organizations are exposed to various cyber-attacks. When a component is exploited, the overall computed damage is impacted by the number of components the network includes. This work is focuses on estimating the Target Distribution characteristic of an attacked network. According existing security assessment models, Target Distribution is assessed by using ordinal values based on users' intuitive...
A data center is divided into three basic subsystems: information technology (IT), power, and cooling. Cooling plays an important role related to data center availability, and a failure in this subsystem may cause an interruption of services. Generally, a redundant cooling subsystem is implemented based on replacing the failed component by the standby one. However, it also can be based on a rotation...
Synthetic Aperture Radar(SAR) has been widely used in airborne remote sensing and satellite ocean observation fields to reduce the affect of weather condition and sun illumination. As technology developed, swath and resolution requirements are increased in terrain, which arouse a huge increase in the number of simulated points and simulated pulses and lead to a huge increase in simulated time. With...
Vehicle Management System (VMS) is onboard real-time network, which ensures the flight safety and economy by scheduling and managing the onboard resources. With the help of computers, local area network (LAN), simulation software and real-time operation system, we build a distributed computer simulation platform to simulate this onboard network. In this paper, we present a Simulink/RTX/Reflective...
Modern enterprises collect, process, and analyze security data from various system and network logs. Previous studies show that, handling large security datasets and detecting anomalies from those are key challenges faced by most of todays' enterprises. Unfortunately most security professionals are inexperienced at performing data analysis. In this paper, we study published works analyzing one publicly...
A remarkable characteristic of human beings is their tendency to form societies. That put themselves in a social position, where they interact with the environment and try to convince others of their own convictions. This study proposes a model for interactions among individuals of a society, accompanying the evolution of their opinions over time. We consider a situation where the individuals are...
Mobile-edge cloud computing is a new cloud platform to provide pervasive and agile computation augmenting services for mobile devices (MDs) at anytime and anywhere by endowing ubiquitous radio access networks with computing capabilities. Although offloading computations to the cloud can reduce energy consumption at the MDs, it may also incur a larger execution delay. Usually the MDs have to pay cloud...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.