The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Cognitive Radio (CR) is a fully-reconfigurable wireless device that can intelligently sense, manage, and exploit temporarily-vacant licensed spectrum bands during the absence of incumbent users. Broadly, the IEEE 802.22 is the first complete Wireless Regional Area Network (WRAN) standard that utilizes CR technology in the opportunistic access of white spaces in the television (TV) bands. Intrinsically,...
Cooperating with trustworthy suppliers is one of effective methods for enterprise to improve competitiveness in the global economy. A lot of evaluation methods for selecting suppliers have been presented in academic literatures, but a few considered the supplier's reputation as an evaluation index. As reputation plays a critical role in human social activities, it is similarly regarded as an important...
Cloud outages, no matter how long, are responsible for large financial losses. Cloud providers look for solutions that provide high availability even in failure cases. Redundancy has been often used as an alternative; however it has a cost, and depending on the redundancy model, we can have different levels of availability. Beyond that, adding more resources also means adding more complexity and more...
Realization of accurate real-time predictions of infectious diseases is an important but challenging task, because spatial transmission among networked populations is stochastic and time-varying. In this paper, we propose a new algorithm to predict the susceptible subpopulations which will be infected in the next time step at the early stage of an epidemic on a metapopulation network by using data...
Service recommendation for Location-based Social Networks (LBSNs) has been received much attention mainly in the field of large-scale Wireless Communication Networks. It is a promising solution to guarantee service reliability and improve quality of experience (QoE) of users. Many schemes have been proposed to provide the reliable and personalized services for users, such as collaborative filtering...
Speech Recognition System is a system that listens human speech and compares the speech with words or phrases that have been prepared in advance in order to obtain the data. To optimize the model we employ fireflies to search λ = (A, B, π) that produce maximum log-likelihood. We evaluate the performance we compare the technique with PSO. Firefly algorithm outperforms PSO on constructing HMM for speech...
Self-suspension is becoming a prominent characteristic in real-time systems such as: (i) I/O-intensive systems (ii) multi-core processors, and (iii) computation offloading systems with coprocessors, like Graphics Processing Units (GPUs). In this work, we study self-suspension systems under fixed-priority (FP) fixed-relative-deadline (FRD) algorithm by using release enforcement to control self-suspension...
Throughout the last decade, the microprocessor industry has been struggling to preserve the benefits of Moore's Law scaling. The persistent scaling of CMOS technology no longer yields exponential performance gains due in part to the growth of dark silicon. With each subsequent technology node generation, power constraints resulting from factors such as sub-threshold leakage currents are projected...
In this paper, a general model for cyber-physical systems (CPSs), that captures the diffusion of attacks from the cyber layer to the physical system, is studied. In particular, a game-theoretic approach is proposed to analyze the interactions between one defender and one attacker over a CPS. In this game, the attacker launches cyber attacks on a number of cyber components of the CPS to maximize the...
In the present paper, we have attempted to process indeterminate data through imprecise queries from a database using neutrosophic set which is based on truth, indeterminacy and false membership values. Firstly, we have introduced a similarity measure formula to measure closeness of two neutrosophic data which in turn is used to get the similarity value for each tuple with the uncertain query for...
Sentence clustering is often used as the first step in various information retrieval tasks like automatic text summarization, topic detection and tracking etc. Researchers face difficulty to cluster sentences because a single sentence is less informative compared to document. We present a sentence Feature Based Sentence Clustering, FBSC, which incorporates some sentence level relationship features...
A piezoresistive silicon based stress sensor has been demonstrated successfully as an effective tool to monitor the stresses inside electronic packages during various production processes. More recently, the sensor has been evaluated as a sensor for Prognostics and Health Monitoring (PHM) systems. This paper presents a systematic approach that evaluates its performance from the perspective of failure...
The knowledge of possible impairments due to atmospheric propagation is of importance in the framework of future 5G mobile networks that use spectrum resource up to the W band. Here, the authors propose the scalar Scattering Indicator (SI), defined as the difference between the simulated TB at 72 GHz and the TB value estimated at the same frequency from a nonlinear combination of TB's values at 23...
Carbon nanotubes (CNTs) are strong potential replacements for silicon in VLSI due to their extraordinary capabilities. We review the theory of operation of CNT-based FETs (CNFETs), the issues regarding its modern fabrication techniques, performance parameters yielded by the latest research, and finally, we present an overview of some applications employing the unique properties of these devices.
It is critical to reduce the electric energy consumed in information systems, especially server clusters. In this paper, we extend the multi-level power consumption (MLPC) model and the multi-level computation (MLC) model to a server with multiple CPUs. In this paper, we newly propose a totally energy-aware (TEA) algorithm to select a server for a process in a cluster. Here, servers in a cluster are...
It is now critical to reduce electric energy consumed in a cluster of servers, especially scalable systems like cloud computing systems. In clusters, most application processes like web applications use not only CPU resources but also files and databases. In this paper, we consider storage processes which read and write data in files in addition to computation processes. We propose a PCS model (power...
Physical encounter is the most common vehicle for the spread of infectious diseases, but detailed information about said encounters is often unavailable because expensive, unpractical to collect or privacy sensitive. The present work asks whether the friendship ties between the individuals in a social network can be used to successfully predict and contain epidemic risk. Using a dataset from a popular...
In enterprises, timed compatibility (i. e., temporal constraint satisfiability) have become an important factor to guarantee the timely completion of service composition so that meet the requirements of customers and ensure the success execution of enterprises. However, existing researches do not fully investigate the mixture situations where distributions of service durations are complex and diverse,...
In this article, we propose a new dynamic reliability management (DRM) techniques at the system level for emerging low power dark silicon manycore microprocessors operating in near-threshold region. We mainly consider the electromigration (EM) failures. To leverage the EM recovery effects, which was ignored in the past, at the system-level, we propose a new equivalent DC current model to consider...
To represent complex structure, graph data is widely used in diverse applications. Among various techniques to extract meaningful information in graph data, graph clustering is an important task for the discovery of an underlying graph structure. However, the volume of graph data becomes large and increases fast recently as well as traditional clustering algorithms become computationally expensive...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.