The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Smart space is created by deploying a Semantic Information Broker (SIB) in a given Internet of Things (IoT) environment. The deployed SIB enables information sharing for many digital devices participating in the IoT environment. In this study, we consider CuteSIB — a new SIB implementation for the Smart-M3 platform, where the class of SIB host devices covers various embedded and mobile devices, in...
The advance of artificial intelligence in general and machine learning in particular has resulted in the need to pay more attention to the provision of privacy to the data being anlyzed. An example of sensitive data analysis might be in the analysis of individuals' medical records. In such a case, there might be a need to draw insights from data while at the same time maintaining privacy of the participants...
We define the Superstrider architecture and report simulation results that show it could be key to achieving HIVE hardware goals. Superstrider's performance comes from a novel sparse-to-dense stream converter, which relies on 3D manufacturing to tightly couple DRAM to an internal network so operations like merging and parallel prefix can be performed quickly and efficiently. With the ability to use...
This paper introduces xDCI, a Data Science Cyber-infrastructure to support research in a number of scientific domains including genomics, environmental science, biomedical and health science, and social science. xDCI leverages open-source software packages such as the integrated Rule Oriented Data System and the CyVerse Discovery Environment to address significant challenges in data storage, sharing,...
The reconstruction of a target image from its diffraction pattern is referred to as “diffractive imaging,” and this has been focused as a new microscopy. Fourier phase retrieval is required during the imaging process by means of numerical computations using computers. However, it is difficult to establish a complete convergence using an incomplete diffraction pattern such as experimental data in the...
Increased interest in security has resulted in greater demand for automated test systems to comply with security standards. Automated test systems have traditionally been operated in isolated environments because of their unique characteristics. However, changes in United States defense acquisition regulations require that defense contractors bring these test systems into compliance with National...
The paper proposes the solution of the actual scientific problem of load balancing and efficient use of distributed system resources. The proposed method is based on the calculation of the load of the central processor, memory and bandwidth fractal information streams of different classes of service for each server and the entire distributed system. The method allows calculating the imbalance of all...
Simulation represents the major research method in all knowledge domains and a scientifically valid method of estimating the characteristics of complex systems used for decision making in different areas of engineering. The existing and projected systems can be explored effectively using mathematical models (analytical and simulation) implemented on high-performance computers, which act in this case...
This electronic document is a “live” template and already defines the components of your paper [title, text, heads, etc.] in its style sheet. The paper considers the possibility and necessity of using in modern control and training systems with a natural language interface methods and mechanisms, characteristic for knowledge processing systems. This symbiosis assumes the introduction of specialized...
In the open source community such as GitHub, developers usually need to find projects similar to their work, with the aim to reuse their functions and explore ideas of features that could be possibly added into their project at hand. Traditional text search engine can help detect similar resources. However, it is difficult for developers to use in open source community because a few query words cannot...
A quadrotor Micro Aerial Vehicle (MAV) is designed to navigate a track using neural network approach to identify the direction of the path from a stream of monocular images received from a downward-facing camera mounted on the vehicle. Current autonomous MAVs mainly employ computer vision techniques based on image processing and feature tracking for vision-based navigation tasks. It requires expensive...
In accordance with the resent advancement in Internet of Things (IoT), the needs for IoT experiment platform have been ever increasing. IoT system consists of various technologies such as networking, sensor controller, edge-side computing, server-side big data collections, analysis and their visualizations. An experimental environment that can handle the development and experiments of such an IoT...
In this paper, a variant of the recently introduced whale optimization algorithm (WOA) was proposed based on adaptive switching of random walk per individual search agent. WOA is recently proposed bio-inspired optimizers that employ two different random walks. The original optimizer stochastically switches between the two random walk at each iteration regardless of the search agents performance and...
Since computing infrastructure has intrinsically a redundant logic, budget saving practices or understaffing of IT departments lead to an “emergency room” service paradigm. However, a treasure of information that could facilitate preemptive maintenance is buried in the logs and messages that are automatically generated by regular processes. Such information is typically ignored because of the shear...
Individual handwriting is an important feature of a person, reflecting his personality, cultural and intellectual level. The possibility of using in the cyberspace a unique manner of writing the text, which is inherent in every person, promotes the strengthening of the personal principle, emphasizes the uniqueness of the individual. The article deals with the problem of constructing individual digital...
Quantum memory-driven computing on the classical computers for design and test of black-box functionality is considered. A method for synthesis and minimization test for the black-box functionality, based on a qubit derivative matrix and sequencer for searching a quasi-optimum coverage, is proposed. Examples of quantum memory-driven design and test minimization of the Schneider logic circuit are presented...
A majority-dynamic method of reconfiguring the on-board computer system in the time slot required for the control and diagnostics system performance is described. The described method provides fault tolerance of multiprocessor supercomputer rack in accordance with the concept of the integration of on-board equipment IMA. Using the control automat with implemented algorithm of self-diagnostic makes...
One from the most difficult tasks for Natural Language Processing (NLP) is to analyze poetry, which uses a different genre of language than that considered by computer-based techniques. Therefore, computational analysis is an interesting task when we use NLP in poetry, but it is also challenging. There are a number of researchers that entered this field from NLP and they got promising results using...
Routine Activity Theory (RAT) is used by criminologists to explain the situational factors that influence crime in the physical world. RAT states that crime is most likely when a motivated offender, a vulnerable victim, and a lack of capable guardianship converge. We hypothesize that the time of cybercriminal actions will align with the principles of RAT. We analyzed data from over 20,000 intrusions...
The main issue with big data in cloud is the processed or used always need to be by third party. It is very important for the owners of data or clients to trust and to have the guarantee of privacy for the information stored in cloud or analyzed as big data. The privacy models studied in previous research showed that privacy infringement for big data happened because of limitation, privacy guarantee...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.