The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Modern e-learning systems offer students many interactive learning elements such as videos or quiz questions. For the optimization of the teaching, the learning elements themselves and the prediction of student performance, it is important for educators to figure out how student interactions can be tracked and how the tracked data can be used. Modern learning courses can consist of different Software-as-a-Service...
The recent deployment of novel network concepts, such as M2M communication or IoT, has undoubtedly stimulated the placement of a new set of services, leveraging both centralized resources in Cloud Data Centers and distributed resources shared by devices at the edge of the network. Moreover, Fog Computing has been recently proposed having as one of its main assets the reduction of service response...
Remote experimentation has long conflicted with security policies imposed by networks administrators. To provide external access to experiment servers in a university, security measures are demanded. Such leads to an excessive dependency on the IT departments for services configuration and maintenance. In the present work, modifications in ISA/ELSA architecture are proposed to circumvent those problems...
Network renumbering in the IP world is a complicated and expensive procedure that has to be carefully planned and executed to avoid routing, security (firewall, ACLs) and transport connection integrity problems. The source of most of these issues is in the lack of a complete naming and addressing architecture in the TCP/IP protocol suite. This paper analyses the issues related to IP networks renumbering,...
Data is the new natural resource of this century. As data volumes grow and applications aimed at monetizing the data continue to evolve, data processing platforms are expected to meet new scale, performance, reliability and data retention requirements. At the same time, storage hardware continues to improve in performance and price-performance. In this paper, we present TOKVS - Trillion Operation...
Excessive electric energy consumption results in high costs for consumers, and often on using non-renewable resources. Additionally, in many cases, it is difficult for the consumer or for the energy provider to determine if one or more equipment is being used efficiently. Therefore, the main objective of this work is to promote awareness about energy consumption. For that purpose, a mobile application...
Deep learning is widely used in computer vision. In this study, we present a new method based on Convolutional Neural Networks (CNN) and subspace learning for face recognition under two circumstances. A very deep CNN architecture called VGG-Face, which learned on a large scale database, is used as feature extractor to extract the activation vector of the fully connected layer in the CNN architecture...
Despite their proliferation as a dominant computing paradigm, cloud computing systems lack effective mechanisms to manage their vast amounts of resources efficiently. Resources are stranded and fragmented, ultimately limiting cloud systems' applicability to large classes of critical applications that pose non-moderate resource demands. Eliminating current technological barriers of actual fluidity...
In this paper we propose to consider a study aimed at improving the Honeypot system performance. There is observed architecture of the designed service of collecting and updating common database of exploits, which is necessary for this study, necessary for building and further Honeypot system maintenance. The data obtained using this service are analyzed in order to determine the free server software...
We propose caching mechanism in the form of a library named mysqlj capable of returning database results as an offline data file for further use by both server and client. The unique feature of this work & library is its transparency for developers and its versatility for use both at server and client level. The cache offloads application from querying database servers in the event valid data...
Educational systems of IT-companies typically provide a network space in which students and teachers can come together for teaching and learning. Using the microservice architecture offers advantages in application development.
The features of construction engineering are analyzed based on references to a large number of literatures. By the study of key technologies of project management system, the total design based on PMJ is provided. The system adopts B/S architecture and .NET technology as the technical specification for development. The enterprise business information management and enterprise resource management are...
The next technological disruption in the field of Internet of Things (IoT) is the predictive analytics on IoT. The predictive analytics on IoT not only helps us in achieving the goal of smart IoT devices but also reduces the time required to configure the IOT appliances. The branch of predictive analytics came into existence very recently after extensive research in the field of Data Analytics. Although...
In this paper, a hardware resource management method based on virtualized modeling is designed for the problem of difficult hardware resource management in heterogeneous signal processing platform. Firstly, the hardware architecture of heterogeneous signal processing platform is introduced. Secondly, the hardware virtualization modeling method is given. Finally, the model of resource management based...
This experience paper describes the process of leveraging the NFV orchestration platform built in the EU FP7 project UNIFY to deploy a dynamic network service exemplified by an elastic router. Elasticity is realized by scaling dataplane resources as a function of traffic load. To achieve this, the service includes a custom scaling logic and monitoring capabilities. An automated monitoring framework...
The Domain Name Service (DNS) is a vital service in the Internet. Much more than a simple translation mechanism, it also allows higher profile functionalities such as load balancing and enhanced content distribution. In the scope of cloud computing, DNS is foreseen as an elastic and robust service, supporting failover mechanisms, decentralised configuration and multi-tenant isolation.
We propose a novel pipeline for detecting, localizing, and recognizing trees with a quadcoptor equipped with monocular camera. The quadcoptor flies in an area of semidense plantation filled with many trees of more than 5 meter in height. Trees are detected on a per frame basis using state of the art Convolutional Neural Networks inspired by recent rapid advancements showcased in Deep Learning literature...
The development of optimization algorithms for combinatorial problems is a complicated process, both guided and validated by the computational experiments over the different scenarios. Since the number of experiments can be very large and each experiment can take substantial execution time, distributing the load over the cloud speeds up the whole process significantly. In this paper we present the...
MOBA (Multiplayer Online Battle Arena) games are currently one of the most popular online video game genres. This paper discusses implementation of a typical MOBA game prototype for Windows platform in a popular game engine Unity 5. The focus is put on using the built-in Unity components in a MOBA setting, developing additional behaviours using Unity's Scripting API for C# and integrating third party...
The paper deals with the problem of designing and implementing an inexpensive wide area sensors network for environmental radiological monitoring. To this aim, the measurement node takes advantage from a low-cost, Linux based, development platform, and some new open-source software tool, which are pushed towards a network-oriented vision of Internet of Things (IoT).
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.