The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The most critical requirements for the lifetime value of a system are its nonfunctional requirements (NFRs) such as reliability, security, maintainability, changeability, etc. These are collectively known as the “ilities,” and they are typically not addressed in system design until the functional architecture has been completed. In this paper, we propose the use of quality-based design that modifies...
Dedicated hardware accelerators enable energy-efficient implementations of radio and imaging basebands. Multistandard, multi-mode radio basebands require an on-the-fly reconfigurable fast Fourier transform (FFT) accelerator that implements many different FFT sizes. An instance of a runtime-reconfigurable 2n3m5k FFT accelerator was generated by a custom hardware generator to meet the requirements of...
We propose a column-based split cell-VSS (CS-CVSS) data-aware write-assisted (DAW A) 9T ultra-low voltage SRAM with enhanced read sensing margin in 28nm FDSOI technology. The proposed write-assist technique (CS-CVSS and DAWA) improve both half-select SNM and write margin. The proposed 3T low leakage read port enhances read sensing margin by minimizing bitline leakage through negative gate to source...
In this paper an efficient fused three operand floating point add-subtract unit is designed using Binary Signed Digit (BSD) adder. BSD adder-subtractor improves overall speed of addition due to its carry limited operation. BSD adder delay reduces by 28% and 17% compared to carry save adder (CSA) and ripple carry adder (RCA) respectively. Three operand adder performs two additions in a single unit...
The deployment of modular virtual network functions (VNFs) in software defined infrastructures (SDI) enables cloud and network providers to deploy integrated network services across different resource domains. It leads to a large interleaving between network configuration through software defined network controllers and VNF deployment within this network. Most of the configuration management tools...
This demo showcases some of the capabilities foreseen for the security infrastructure designed by the H2020 SHIELD project. SHIELD exploits NFV for adaptive monitoring of an IT infrastructure and for feeding the data to an analytics engine to detect attacks in real time. An intelligent reaction system is then activated to reconfigure the SDN/NFV infrastructure so that the attacks are thwarted. The...
We present RDCL 3D, a “model agnostic” web framework for the design and composition of NFV services and components. The framework allows editing and validating the descriptors of services and components both textually and graphically and supports the interaction with external orchestrators or with deployment and execution environments. RDCL 3D is open source and designed with a modular approach, allowing...
SDN aims to facilitate the management of increasingly complex, dynamic network environments and optimize the use of the resources available therein with minimal operator intervention. To this end, SDN controllers maintain a global view of the network topology and its state. However, the extraction of information about network flows and other network metrics remains a non-trivial challenge. Network...
MEC or Multi-Access Edge Computing is a network service delivery architecture that enables cloud computing capabilities at the edge of the access network. Realisation of the MEC vision is challenging with current network technologies: service discovery and routing, secure network slicing and distributed mobility management require complex capabilities in the network. This demo features an OMEC use...
During the last years, many companies established fast IT or digital IT units dedicated to build and operate digital customer-facing services. These units adopted agile methods, new tool chains as well as new organizational settings like BizDevOps teams. BizDevOps teams are responsible for continuously (re-)defining business functionality of certain (micro-)services, (re-)developing and running them...
Since its foundation in 2009, the SoEA4EE workshop complements well-established topics of the EDOC conferences such as service-oriented architectures and enterprise service architectures by addressing the coupling of business processes and services and the alignment of business and it. The SoEA4EE workshop also shows relationships to topics of the EDOC such as Business Process Management, Enterprise...
Digital innovation (DI), Internet of Things (IoT) and Cyber-Physical Systems (CPS) offer new opportunities for enterprises but also cause new challenges for Enterprise Architecture Management. Based on an industrial case from power garden products illustrating potentials and challenges of DI and IoT, this paper investigates the integration of product-IT into enterprise architectures. Product-IT includes...
In recent years, there has been an increasing interest among researchers and practitioners concerning Enterprise Architecture (EA). Despite this increase, several studies have reported a lack of common understanding in EA. Some specific expressions like lack of common terminology, lack of shared meaning and fragmented literature have been frequently used to describe this lack. However, very few systematic...
This paper gives a brief overview of the 12th Workshop on Trends in Enterprise Architecture Research (TEAR) held at EDOC 2017. The paper introduces the Workshop research topics and presents the accepted papers.
As a result of growing complexities in business processes, information systems, and the technical infrastructure, a key challenge for enterprise architecture management (EAM) is to guide stakeholders from different hierarchical levels with heterogeneous concerns. EA deliverables, such as models or frameworks, are often highly comprehensive and standardized. However, these can hardly be applied without...
VGG 16 and Inception-v3 networks were trained using a texture dataset of muddied and clean cows. A new dataset with 600 images that is similar to the actual texture dataset was introduced and used to train the networks. The method used to train the networks was transfer learning. ImageNet weights were trained using the similar dataset, then the newly trained weights were trained again using the actual...
Web service is a popular solution to integrate components when building a software system, or to allow communication between a system and third-party users, providing a flexible and reusable mechanism to access its functionalities. Various web service based systems are prevailing in health service provision. We propose a framework of construction, searching and protection of typed health resources...
Vehicle-to-Everything (V2X) communications encapsulate significant challenges as a result of the vast number of wireless technologies deployed, nodes mobility and large applications range. One of the greatest challenges is to provide adequate QoS guarantees even in this demanding environment. State-of-the-art solutions for QoS provisioning over wireless links are based on cross-layering packet schedulers...
This paper describes our blockchain architecture as a new system solution to supply a reliable mechanism for secure and efficient medical record exchanges. The Advanced Block-Chain (ABC) approach was designed to meet the demands in healthcare growth as well as in the new form of social interactive norms. It is going to revolutionize the e-Health industry with greater efficiency by eliminating many...
In this paper, we present a simple and modularized neural network architecture, named interleaved group convolutional neural networks (IGCNets). The main point lies in a novel building block, a pair of two successive interleaved group convolutions: primary group convolution and secondary group convolution. The two group convolutions are complementary: (i) the convolution on each partition in primary...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.