The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
User experience of the vehicles’ telematics services depends on quality of bidirectional network connection between the vehicle and stationary high-performance computing system. In this case, there is a task of ensuring continuous data transmission between the vehicle and stationary computing system in the conditions of highly dynamic networks. The answer is to retrieve data about surrounding networks...
The problem of inferring proteins from complex peptide samples in shotgun proteomic workflow sets extreme demands on computational resources in respect of the required very high processing throughputs, rapid processing rates and reliability of results. This is exacerbated by the fact that, in general, a given protein cannot be defined by a fixed sequence of amino acids due to the existence of splice...
Fingerprint authentication is one of the most reliable and widely used personal identification method. However, manual fingerprint authentication is tedious, inaccurate, time-consuming and costly that it is not capable of meeting today's increasing performance necessities. An automatic fingerprint authentication system (AFAS) is widely needed. It plays a very essential role in forensic and civilian...
Virtual Memory is quite an old concept in computer science. Virtual memory management has been long implemented even in hardware. Despite the many advantages it brings into the table, virtual memory poses a few challenges that must be tackled. These challenges are better observed when machines come close to their physical or virtual memory limits. In this article, we will be pushing our machine to...
Cloud computing is one of the emerging fields in both the academics and the IT Industry. It offers different service models and provides an on-demand, pay-per-use, multitenant, pervasive model which makes it suitable to adapt in the fast growing industries. But this new technology suffers from some of the security concerns, since our data and computations are handled by third party infrastructure...
TV white space (TVWS) geolocation database is being used for the protection of the terrestrial TV broadcast receivers, and the coexistence of secondary devices. To the best of our knowledge, though TV White Space calculations are available, an active online database does not exist for India. In this paper, the development of the first TVWS database for India is detailed and is released for public...
This paper identifies a new opportunity for improving the efficiency of a processor core: memory access phases of programs. These are dynamic regions of programs where most of the instructions are devoted to memory access or address computation. These occur naturally in programs because of workload properties, or when employing an in-core accelerator, we get induced phases where the code execution...
We present Swarm, a novel architecture that exploits ordered irregular parallelism, which is abundant but hard to mine with current software and hardware techniques. In this architecture, programs consist of short tasks with programmer-specified timestamps. Swarm executes tasks speculatively and out of order, and efficiently speculates thousands of tasks ahead of the earliest active task to uncover...
The mapping of reads, i.e. short DNA base pair strings, to large genome databases has become a critical operation for genetic analysis and diagnosis. The underlying alignment operation essentially is a string search tolerating some character mismatches and possibly character deletions or insertions with respect to a reference genome. Its output comprises the locations within the reference that are...
In this paper, we address the problem of transition of IT operations from one service provider to another. We present analytics-driven solutions to generate a transition plan while addressing various aspects such as coverage, risk, time, and cost. We model the IT operations through graphs and use the well defined problems in graph theory to build solutions for transition planner. We demonstrate the...
Software as a Service (SaaS) providers can serve thousands of customers, which have hundreds of thousands of overlapping requirements, using a single application instance to offer service at a lower price. Even with a potentially large number of customers with varying requirements, a multitenant application should make co-tenancy transparent to the tenants, which means that every tenant must appear...
Performance of modern day computer systems greatly depends on the wide range of workloads, which run on the systems. Thus, a representative set of workloads, representing the different classes of real-world applications, need to be used by computer designers and researchers for processor design-space evaluation studies. While a number of different benchmark suites are available, a few common benchmark...
Valuable information from acoustic signals has not been fully considered into real applications associated with assisting people. In fact, the assessment of acoustic signals as an input parameter for localization techniques has useful applications in detecting the presence of living beings trapped in emergency situations by processing any type of sound emitted in face of danger. Indeed, acoustic signals...
This manuscript is focused on scalability of Spiking Neural Network (SNN) for acceleration of its learning time. Simulation of SNN algorithm was implemented on GPUs devices Ge Force 9400M and Ge Force650 GTX in order to compare the learning time. Multiclass database are used for classification and the results are compared.
Data loading is a crucial and well standardized procedure of the usage of modern relational database management systems (RDBMS). If data arises highly frequently and intensive real time analyses are required, single rows need to be imported as soon as they are generated, e.g., By monitoring applications, into a columnar table layout. The experiment described and conducted in this paper, evaluates...
Managing different variants and configurations of complex embedded systems consisting of multiple exchangeable hardware modules is a difficult task. This is in particular true when selecting a certain variant and configuration affects several aspects of development, deployment and operation. In this paper, we describe our approach for product line development of a highly flexible, modular embedded...
This paper presents a combination of programming languages and web technologies used to deploy a modern remote controlled system. The hardware part of the system is a parallel port interface board that contains different types display devices, user-input components and some relays. The system functionality is based on some software applications developed using different techniques: the communication...
The upcoming generation of computer hardware brought several new challenges for underling software. The number of cores on a chip grows exponentially, allowing for an ever-increasing number of processes to execute in parallel. Therefore, how to efficiently utilize all of the concurrent processing ability provided by multi-core platform becomes critical for achieving good system performances. We propose...
While confronting the global IPv4 address exhaustion, it is important and crucial for the entire Internet environment to smoothly upgrade to the next generation Internet Protocol, IPv6. Due to the budget constraints, different organizations should decide the priority of the IPv6 upgrade among all the provided services according to the degree of the necessity and the difficulty of the upgrade. Our...
Handwritten Signature Verification (HSV) systems have been introduced to automatically verify the authenticity of a user signature. In offline systems, the handwritten signature (represented as an image) is taken from a scanned document, while in online systems, pen tablets are used to register signature dynamics (e.g., its position, pressure and velocity). In online HSV systems, signatures (including...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.