The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Multistage Interconnection Networks (MINs) remain interesting for research and are continuously being improved as they are essential devices for constructing scalable parallel computers or for connecting networks. In this paper a new idea - new architecture - is introduced. The proposed construction uses switch elements connected with redundancy internal paths and fan out at the end of the construction...
In this paper, we address the problem of evaluating the aggregated services offered to the user through a multimodal travel planner. The effective design of a multimodal travel planner is considered a complex task since it requires the identification of the best possible route that combines segments of different transport modes. We describe a novel architecture and its respective connectivity infrastructure...
Database driven IP geolocation is a convenient and common way to determine geographic location of an IP address. However, the underlying problem is that it is often difficult for users to determine which provider is reliable enough to meet their own scenarios. In this paper, we tackle this challenge in a data fusion perspective. We first evaluate the consistency degree of data entries among 5 free...
Mathematical dependencies for calculation of main parameters of vacuum gripping devices have been derived with the purpose of increasing efficiency of devices developed for handling of flexible containers during filling with free-flowing products. Computer modelling of the process of gripping and holding of flexible containers made with air-penetrating materials with the help of vacuum gripping devices...
Usage of industrial networks of Internet with net-centric control is the driving trend of the future material manufacturing of goods and services. The bright future of this approach is out of doubt provided these complex net-centric systems will use adaptive approach to planning of manufacturing scenarios and function with high reliability. The issue here is that such systems are characterized by...
By taking both CMF (Common Mode Failure) and middle states into account, numerical analysis of availability of cluster system is analyzed. Firstly, a CTMC (Continuous Time Markov Chain) model of cluster system containing three cluster nodes is constructed with failure rate (λ), repair rate (μ), CMF rate (7), reconfiguration rate (β) and reset rate (á) etc. Then the steady state solution of the CMTC...
Along with the widespread use of technology, there have been many studies on human-computer relation recently. Study of the effects of computer systems on human education can be shown as an example of this. In this paper, a reliable and real time tangible user interface system developed for the air drum game which is used both for game and computer based training programs is presented. A user can...
Conventional power network capabilities have improved and enhanced by the smart grid but at the same time making it more vulnerable to different types of attacks. These vulnerabilities allow an attacker to breakdown integrity and confidentiality and permit access to the network. Intrusion Detection System (IDS) is one of the significant ways to provide secure and reliable services in a smart grid...
Remote control of grid tied converters has become important with an increasing number of grid connected energy storage systems. Hence, it is crucial point for utilities to outline the requirements of the communication methods and to find the best communication infrastructure to handle the remotely located converters in a reliable and cost effective manner throughout the operation. The purpose of this...
Health monitoring without a priori knowledge can save a significant amount of design and implementation time. However, for smaller devices with limited available resources, this is not feasible using most conventional methods. For small footprint sensor and actuator devices, we propose a health monitoring architecture and algorithm, which uses context-awareness to assess the health status of an “Injective-function...
Operator situational awareness in Nuclear Power Plant (NPP) control rooms is quintessential in ensuring plant safe operation. Towards improving situational awareness, a novel framework of the EYE - Expert Supervisory System capable of visually monitoring human machine interfaces (HMI) in cyber physical system (CPS) is proposed with target application in NPP control room environment. EYE applied on...
Reliable storage is central component of data centers that support private or public cloud. Erasure coding has becoming increasingly popular alternative to replication for its capability in substantially cutting disk cost while delivering the same reliability. This paper reports the comprehensive results of using FPGA for accelerating erasure encoding and decoding algorithms. In particular, to accomplish...
Efficient execution of applications on heterogeneous many-core platforms requires mapping solutions that address different aspects of run-time dynamism like resource availability, energy budgets, and timing requirements. Hybrid mapping methodologies employ a static design space exploration (DSE) to obtain a set of mapping alternatives termed operating points that trade off quality properties (compute...
We consider binary voting in a replica voting setup with a small number of redundant components. Seeking to understand the implications of corrupted components on voting schemes, we consider a simplified setup where one node is highly compromised and the remaining nodes are functionally homogenous. We show that if the homogenous nodes are slightly better than average at voting correctly and the highly...
Internet addiction also called as "internet dependency" is a disorder related to excessive or poorly controlled preoccupations regarding computer use and internet access. Although the advantages of internet are undeniable, however, from the pathological perspective its excessive usage is creating disturbances not only in family and relationships but also in health, academics and memory recall...
Application of e-commerce has become an integral part of marketing due to an increasing diffusion of information and communication technology (ICT) throughout the world including Bangladesh. Due to its growing significance to the economy, it is critical to identify factors affecting customers' intention to use e-commerce in Bangladesh. This study used Technology Acceptance Model (TAM) to determine...
By taking common mode failure (CMF) into account, the availability of multiple cluster systems is investigated. Firstly, a Markov model of system with three cluster nodes is constructed with failure rate (λ), repair rate (µ) and CMF rate (γ). Then, the availability of system is formulated with related parameters by solving related equations. Furthermore, derivative analysis of the formula's property...
In Volunteer Computing resources are provided by the own users, instead of by a single institution. One of its drawbacks is the unreliability of the provided resources, so their selection becomes a main point. In this paper we deal with the suitable selection of resources considering this kind of Volunteer Computing system. As the resources choice may be needed in a reduced amount of time, we cannot...
Knowledge Management methods, techniques and experience can bring a considerable help in preventing all kind of risks. The current economic context amplified the existing risks and introduced new ones such as environmental, political and social. Among the most critical risks of this century is this of lost of knowledge and “memory” in particular in industry involved in long-term activities. After...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.