The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the quest for energy efficiency of Information and Communication Technology, so far research has mostly focused on the role of hardware. However, as hardware technology becomes more sophisticated, the role of software becomes crucial. Recently, the impact of software on energy consumption has been acknowledged as significant by researchers in software engineering. In spite of that, measuring the...
Databases as a service (DBaaS) transfer the advantages of cloud computing to data management systems, which is important for the big data era. The allocation in a DBaaS system, i.e., the mapping from databases to nodes of the infrastructure, influences performance, utilization, and cost-effectiveness of the system. Modeling databases and the underlying infrastructure as weighted graphs and using graph...
In recent years, the demand for agarwood oil has increased tremendously. Agarwood oil is being used widely in fragrance, incense and religious ceremony. The quality of agarwood oil will determine the price of the oil. However, there are some limitations on using standard approach to classify its quality as they are time consuming, expensive and the results is questionable. This paper presents on the...
Network Functions Visualization (NFV) replaces physical middleboxes with software instances running network functions in cloud environments. To support this new paradigm, it is necessary to port the code basis from highly specialized hardware devices to virtual machines running on COTS hardware. In order to fully exploit the inherent capabilities of cloud environments it is further necessary to redesign...
Security verification relies on using direct tests manually prepared. Test preparation often requires intensive efforts from experts with in-depth domain knowledge. This work presents an approach to learn from direct tests written by an expert. After the learning, the learned model acts as a surrogate for the expert to produce new tests. The learning software comprises a database for accumulating...
Snapshot Isolation (SI) is an established model in the database community, which permits write-read conflicts to pass and aborts transactions only on write-write conflicts. With the Write Skew anomaly correctly eliminated, SI can reduce the occurrence of aborts, save the work done by transactions, and greatly benefit long transactions involving complex data structures. GPUs are evolving towards a...
Civil Supply distribution system in today's scenario faces loads of challenges as lots of controversial issues like illegal smuggling of goods, corruption and adulterations in goods happens here in the distribution centers in both rural and urban parts of India. These controversies include irregular measurement of the goods, wrong entries in the manual stock register of centers containing wrong stock...
The proliferating usage of cloud environments to store databases poses new challenges. Traditional encryption protects the user's data privacy, but prevents the server from executing computations on behalf of the user (client). By contrast, Partially Homomorphic Encryption schemes, such as the Paillier cryptosystem, facilitate some server queries but involve heavy computations that make them relatively...
Two open source distributed machine learning/deep learning platforms, namely H2O and Apache SINGA, compared their deep learning performances using multilayer perceptron on the classic MNIST database for hand written digits recognition. However, the results reported by both parties differ and neither of them can repeat the results reported by the other side. This paper is an independent study of the...
With the explosive growth of data capacity, large enterprises increasingly rely on business information systems. A highly informational and data-centralized grid company that engages in high-frequency businesses will face major business failures, incalculable impacts and irreparable damages once data errors occur. The development of an effective high-availability information system has become a hot...
Address Resolution Protocol (ARP) traffic typically makes up a very significant amount of broadcast traffic in a wide range of networks. A common approach to reduce the network overhead of ARP in the context of Software Defined Networks (SDN) is via Proxy ARP, where the SDN controller answers ARP requests on behalf of the hosts. In this paper, we present a significant improvement of this approach,...
Exchange of image information is one of the main features of a camera network. In order to exchange a large amount of information, a platform with good communication speed is needed. In this study, we designed and implemented a specialized camera network platform using Wi-Fi Direct devices. This platform can provide various services to other devices within the same network. We designed the platform...
The purpose of the research is to make a unique drone which is capable to move autonomously through any environment by interacting with server by itself. The main uniqueness is that it can move through air, land and water. Nowadays various drones are seem to be available. But such a drone which can move through every environment is never seen before. The main motive is to get accuracy in rescue missions...
This paper discusses user behaviour and interactions for multimodal authentication system. Multimodal means, multiple authentication methods are provided for user to access a web application. The supported methods are password, digital certificate, and one-time password (OTP). Users are able to select any methods based on user's preference; personalizing authentication. Nevertheless, the availability...
Entity Resolution (ER), the process of finding identical entities across different databases, is critical to many information-integration applications. As sizes of databases explode in the big-data era, it becomes computationally expensive to recognize identical entities among all records with variations allowed across multiple databases. Profiling results show that approximate matching is the primary...
Memcached is an in-memory key-value caching system, which is used to resolve the principal contradiction of the disk-based database between the CPU and input/output, has been widely used as an effective way to solve the distance and improve the capacity of the source server. We optimize the performance of Memcached memory access through two ways: improve the density of memory storage and ameliorate...
Our cloud-based IT world is founded on hyper-visors and containers. Containers are becoming an important cornerstone, which is increasingly used day-by-day. Among different available frameworks, docker has become one of the major adoptees to use containerized platform in data centers and enterprise servers, due to its ease of deploying and scaling. Further more, the performance benefits of a lightweight...
We will be discussing how using robotics in two university courses helped students relate the topics learned in class to applications in real life of those topics. The changes introduced in the course structure created a different atmosphere in class and the way the students faced the newly learned topics.
For the requisite of verifying the MIKME advanced microphone during serial production, an automated test system for hardware testing was developed. The system, that comprises a specially designed test fixture — bed-of-nails, the PXI instrumentation and a LabVIEW application, is presented in the paper with all of its features related to the MIKME product. The proposed solution is up to 20 times faster,...
This paper introduces an FPGA-based scheme to accelerate mpiBLAST, which is a parallel sequence alignment algorithm for computational biology. Recent rapidly growing biological databases for sequence alignment require high-throughput storage and network rather than computing speed. Our scheme utilizes a specialized hardware configured on an FPGA-board which connects flash storage and other FPGA-boards...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.