The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Many works have attempted to characterize the complexity of classification problems by measures extracted from their learning datasets. These indexes provide indicatives of the inherent difficulty in solving a given classification problem. Although regression problems are equally frequent, there is a lack of studies in Machine Learning dedicated to understanding their complexity. This paper proposes...
This paper addresses a problem of Leader Election in a distributed system. Basically Leader Election Algorithms choose a process or node among the number of processes or nodes as a Coordinator to manage the use of shared resources in an optimal manner, construct the fault-tolerant distributed systems. A good leader election algorithm should take less time, less message passing to elect a leader or...
Coordinated downlink multi-point transmission with joint processing is considered for weighted sum rate maximization with limited backhaul connectivity. The cooperating base stations are assumed to form a network with a tree topology. The limited backhaul capacity is modeled as the maximum number of active users per base station. The combinatorial user admission problem is solved via a novel approach...
Infrastructure as a service (IaaS) has attracted significant attention from cloud research communities. While compute and storage resource management has been developed and studied to a greater extent, the use of network resource management in the context of IaaS is still in its early stages. There is a need for a comprehensive virtualization framework capable of providing users with low-level network...
Since traffic diversity and volume increase with growing popularity of mobile applications, there is the strong need to manage the traffic carried by networks. Software defined networks can simplify network management while enabling new services by employing traffic management including routing whose goal is to maximize the given utility while satisfying capacity requirements. In this paper, we propose...
Society's' growth of use on mobile devices makes the study of batteries a really important subject. Mobile phones and electric vehicles are, among others, battery dependent devices. Li-ion cells are the main choice for battery dependent applications. Different charging of cells as they age put the balancing management systems on the spotlight as a study subject. This paper proposes a balancing management...
Using Network Functions Visualization (NFV), network functionality can be virtualized and deployed on generic servers. This increases network flexibility, and makes it possible to allocate network services in multiple locations throughout the network. Virtual Network Functions Placement (VNF-P) solves the problem of where network functions must be allocated within the network, and makes use of the...
Hospital, as one of the most complex public sectors that currently exist, has problems with structuring and organizing its IT capabilities. The applications in hospital information system usually work independently, making clinical data spread heterogeneously in the system. Failure in IT implementation has increased due to the lack of integration and alignment with the organization goal. Enterprise...
This paper demonstrates the physical and logical topological slicing in computer networks through Software Defined Networks (SDN) with the added benefit of data privacy. To deal with the complex requirements of the modern networks, a sudden re-configuration of a network is often required. Modern applications require the configuration of networks on a fly and according to dynamically changing requirements,...
In this paper, the notion of the cumulative time varying graph (C-TVG) is proposed to model the high dynamics and relationships between ordered static graph sequences for space-based information networks (SBINs). In order to improve the performance of management and control of the SBIN, the complexity and social properties of the SBIN's high dynamic topology during a period of time is investigated...
Although the importance of Disaster Response Networks (DRNs) has been highlighted in many researches, the requirement of spectrum agility has not been well addressed. In this paper, we focus on using all-spectrum cognitive radio for DRNs to fulfill this requirement. We consider a DRN constructed by Cognitive Radio Base Stations (CRBSs), which are deployed in the disaster affected area. Each CRBS is...
Deployment of portable access points (APs) in disaster affected areas has been heralded by many contemporary researchers as a key technique to formulate disaster recovery networks. However, existing research works do not effectively address one of its key problems, i.e., the low capacity of the backbone network (constructed by the APs) which is unable to satisfy the high user demands emanating from...
To overcome the shortcomings of traditional static (wired) data center architectures, we recently proposed FireFly, a fully-flexible and fully-wireless data center network fabric based on free space optical (FSO) links. To facilitate a clear line-of-sight between the FSO devices placed on racks, FireFly uses a full-ceiling mirror for beam redirection. Use of a full-ceiling mirror imposes significant...
Multilevel inverters are used in several applications such as renewable sources, industrial drives, laminators, blowers, fans, and conveyors based power generation. The proposed multilevel inverter with boost converter plays a major role to minimize power demand and scarcity also provides desired Peak voltage. It synthesizes the desired ac output waveform from dc sources. This project focuses on reducing...
In the paper a multi-agent network system of different computing nodes is considered. A problem of load balancing in the network is addressed. The problem is formulated as consensus achievement problem and solved via local voting protocol. Agents exchange information about their states in presence of noise in communication channels. At certain moment network system topology changes and new step size...
This paper presents a general and yet fast multilevel space-vector modulation technique, based on orientation of reference point in terms of hexagon lines. The main advantage of the proposed algorithm is the reduced volume of calculations that consequently makes it possible for implementing on cheaper microprocessors. The introduced technique in finding the reference vector location is extended to...
This paper introduces a new topology for parallel balancing of serially connected batteries string. The main advantage of the balancing concept is that energy is transferred only when the cells are unbalanced. As a result, the power losses are significantly reduced since no current circulates through the system when balanced. This has been enabled by a modification of an isolated series-resonant converter...
Haruspex is a suite of tools that assesses ICT risk through a scenario approach. Each scenario includes the target system and some threat agents that compose the attacks enabled by the system vulnerabilities to reach some predefined goals. The suite applies a Monte Carlo method with multiple simulations of the agent attacks against the target system. The simulation applies a formal model of the target...
Haruspex is a suite of tools that assesses ICT risk through a scenario approach. Each scenario includes the target system and some threat agents that compose the attacks enabled by the system vulnerabilities to reach some predefined goals. The suite applies a Monte Carlo method with multiple simulations of the agent attacks against the target system. The simulation applies a formal model of the target...
The execution-simulation gap (ESG) is a fundamental property of public physical unclonable function (PPUF), which exploits the time gap between direct IC execution and computer simulation. ESG needs to consider both advanced computing scheme, including parallel and approximate computing scheme, and IC physical realization. In this paper, we propose a novel PPUF design, whose execution is equivalent...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.