The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
ROV operations are expensive and there is an urge to improve on their efficiency and speed. The EU project “Effective Dexterous ROV Operations in Presence of Communications Latencies (DexROV)” proposes a solution to those needs by developing a set of hardware and software tools to support the teleoperation of ROVs over a satellite link, i.e., from remote locations including off-shore sites. A core...
Existence of several application specific network technologies like Sensor Networks, Cloud, Personal Area Networks (WPANs), Vehicular Networks (VANETs), Content Delivery Networks and Wifi operating oblivious to each other in the same ISM band creates numerous problems like contention for the same bandwidth leading to excessive collisions and hence lower throughput. This calls for a hybrid mesh framework...
The nature of Internet traffic has changed dramatically within the last few years, where a large volume of traffic is originated from mobile applications (known as apps), web based multimedia streaming, computation offloading like cloud computing and Internet of Things (IoT) etc. These types applications generate multiple parallel short lived end-to-end connections. However, the three major requirements...
A Physical Unclonable Function (PUF) is a random cryptographic function which could be implemented using a complex process-based physical system. PUF is a good inexpensive candidate for producing signature keys for cloud-based reliable communication within Internet of Things (IoT) devices in future. PUF made from on-chip Ring Oscillator (RO) is popular due to random physically induced frequency behavior...
Internet connection is essential for daily life, however not all areas are covered by Internet access due to historical reasons. For example, with 3.7 million daily passengers, London underground system has no WiFi or cellular signal provided during travelling due to legacy reasons. Deploy new access infrastructure need to consider the integrating problem with the current environment, also bring a...
Maximum-distance-separable (MDS) codes are a class of erasure codes that are widely adopted to enhance the reliability of distributed storage systems (DSS). In this paper, we develop a new approach to construction of simple (5, 3) MDS codes. With judiciously block-designed generator matrices, we show that the proposed MDS codes have a minimum stripe size α = 2 and can be constructed over a small (Galois)...
Erasure codes are widely used in practical storage systems to prevent disk failure and data loss. However, these codes require excessive disk I/Os and network traffic for recovering unavailable data. As a result, the recovery performance of erasure codes is suboptimal. Among all erasure codes, Minimum Storage Regenerating (MSR) codes can achieve optimal repair bandwidth under the minimum storage during...
Erasure coding has been widely adopted to protect data storage against failures in production data centers. Given the hierarchical nature of data centers, characterizing the effects of erasure coding and redundancy placement on the reliability of erasure-coded data centers is critical yet largely unexplored. This paper presents a comprehensive simulation analysis of reliability on erasure-coded data...
Scale-out distributed storage systems have recently gained high attentions with the emergence of big data and cloud computing technologies. However, these storage systems sometimes suffer from performance degradation, especially when the communication subsystem is not fully optimized. The problem becomes worse as the network bandwidth and its corresponding traffic increase. In this paper, we first...
The paper presents the design and implementation of an integrated wireless network that support to the multiparametric geophysical monitoring network of the Campi Flegrei volcanic area. The wireless network is equipped with a tool for real-time monitoring and fault detection. The enhancement of the transmission system with respect to the previously existing one has been realized in view of the increased...
Large-scale disasters (such as earthquake, flood, tornado) may cause severe network failures, leading to massive disruptions and data loss. Particularly, the aftermaths of disasters may further threaten the residual network and impact the existing/survived service connections. In this paper, we study a reliability based restoration scheme for recovering the impacted (disrupted and/or reliability-decreased)...
In this paper, the practical verification of Active Disturbance Rejection Controller (ADRC) implementation for pneumatic setup is investigated. Apart from experimental results, the inverse half-rule is suggested to support ADRC tuning for the second order processes by adjusting the value of the scaling factor. This rule is based only on the approximation of the process step response by First Order...
Parity declustering is widely deployed in erasure coded storage systems so as to provide fast recovery and high data availability. However, to perform scaling on such RAIDs, it is necessary to preserve the parity declustered data layout so as to guarantee the RAID performance after scaling. Unfortunately, existing scaling algorithms fail to achieve this goal so they can not be applied for scaling...
Distributed storage systems are composed by many unreliable storage nodes over a network. A data file is redundantly stored in multiple storage nodes to provide high reliability. Recently erasure codes with Maximum Distance Separable (MDS) property are gradually employed in distributed storage systems to reduce the cost of reliably storing large amounts of data. Regenerating codes are a class of erasure...
Disasters, such as earthquake, tsunami, tornado, and malicious attack, may cause large-area, geographically correlated and/or cascading failures in telecom networks, leading to massive connection disruptions and instability of network state. In this paper, we study survivability strategies to alleviate the effect of disasters to telecom networks, e.g., Wavelength-Division-Multiplexing (WDM) optical...
The integrated avionics system is a platform that integrates a series of flexible, reusable, interoperable hardware and software resources. It enables to implement the decoupled isolation of task software and physical resources under the premise of versatility of hardware resources and configuration of system applications, which can meet the requirements of software system updates and task changes...
Distributed file systems enable the reliable storage of exabytes of information on thousands of servers distributed throughout a network. These systems achieve reliability and performance by storing multiple copies of data blocks in different locations across the network. The management of these copies of data is commonly handled by intermediate servers that track and coordinate the placement of data...
In this paper, we address the need for motivating applications, such as mission critical industrial control and medical applications, to operate under the Ultra-Reliable Communication (URC) mode in the future 5th Generation (5G) cellular wireless networks, while also under strict Quality of Service (QoS) constraints such as ultra-low latency. Reliability has been shown to improve by using Hybrid Automatic...
The commonly existing employed centralized algorithms fail to be adaptive to the new storage pattern on mobile edge cloud. To address this issue, we propose an alternating-direction-method-of-multipliers-based collaborative storage algorithm called MECCAS (Mobile Edge Cloud Collaborative Storage). The proposed MECCAS is able to minimize the delay of task execution and total costs for the overall operation,...
We consider the broadcasting of a single Gaussian source over a two-user Gaussian broadcast channel with bandwidth expansion. In addition to the source broadcasting the encoder sends a message reliably to the “higher quality” user. Conditioned on the message rate, we derive an outer bound on the set of attainable mean-squared error distortion pairs at the two users which extends the Reznic-Feder-Zamir...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.