The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
IoT is a computational notion where each of the tangible objects around are termed as things, which will be connected to other things through the web and will communicate or transfer data between each other. But if the focus is just on the things or devices, than there may be a key ingredient missing, that is all these internet of things are connected to each other. What this entitled is that all...
Hadoop is a Java-based programming framework used by enterprises for management and analysis of large scale data originating from heterogeneous sources. To support the analysis of large scale data, different SQL-on-Hadoop systems are being utilized due to their ease of use for the people familiar with SQL. This study performs a comparative analysis of the SQL-on-Hadoop systems by comparing their performance...
Energy saving is rapidly becoming one of the hottest topics in technology field within recent decades. With the development of technology, it brings a sheer increasing trend of data and the growth scale of clusters and data centers. Meanwhile, it also raises another essential issue into the path: energy cost. In this paper, we are diving into this key issue and evaluating energy- efficiency based...
Many Geographic Information Systems (GIS) are currently built according to the N-Tier architectural style. Despite the advantages of this style in terms of simplicity for the GIS business domain, it lacks many capabilities related to several key characteristics that might affect reusability and extensibility of GIS systems. Service-oriented architecture (SOA), on the other hand, can better serve the...
PubMed mining is currently at the epicenter of intense interdisciplinary research. Text mining methodologies provide a way to retrieve and analyze emotionally charged words, punctuation, and syntax. Moreover, they can analyze scientific literature and process document collections. Moving beyond traditional document-term matrix representation, an architecture for content based retrieval from PubMed...
Fractal dimension is an extremely important tool in shape analysis and characterization, including tasks from signal processing to image processing. One of the reasons for such great interest is the power of the fractal dimension to properly express the intricacy and self-similarity of signals. One of the best methods to obtain the fractal dimension is the Minkowski-Bouligand. However, this method...
The comparison of DNA sequences is a classic problem in molecular biology. Forensic applications uses this comparison for personal identication. For instance, in the USA, the CODIS system has today 14.9 million DNA proles stored on its database. To accelerate the recurrent task to query into similar databases, this work presents a hardware acderator for the parallel alignment of multiple DNA sequences,...
We describe in this paper the architecture of a modular neural network (MNN) for pattern recognition. More recently, the study of modular neural network techniques theory has been receiving significant attention. The design of a recognition system also requires careful attention. The paper aims to use the Ant Colony paradigm to optimize the architecture of this Modular Neural Network for pattern recognition...
In this paper a Modular Neural Network (MNN) with a granular approach optimization is proposed, where a firefly optimization is proposed to design a optimal MNN architecture. The proposed method can perform the optimization of some parameters such as; number of sub modules, percentage of information for the training phase and number of hidden layers (with their respective number of neurons) for each...
The field of artificial neural networks has a long history of several decades, where the theoretical contributions have progressed with advances in terms of power and memory in present day computers. Some old methods are now rebranded or represented, taking advantage of the power of present day computers. More particularly, we consider the current trend of Random Vector Functional Link Networks, which...
The smart mobile terminals and mobile broadband communications become more and more popular. Access control systems using traditional mechanical lock, IC card authentication and password authentication technology exposes more and more security issues. This paper describes the design and implementation of server authentication module. The server system used JAVA language development and JDBC technology...
More and more cloud services emerging because of increased demand, but there is significant room for improvement. We propose architecture to integrate public cloud services for reducing costs. We consider three issues: (1) The general cloud storage services are unsuitable for large and complex data. A NoSQL datastore, the most common type of database for big data, can process operational information...
With the advent of cloud computing and the virtualisation of computer systems, challenges exist in managing resources and Virtual Machines (VMs) effectively. Cloud computing platform services offer scalable and resilient platforms, but are still not without complexity to the end user community; this paper proposes an alternative solution for the deployment of an intelligent private or public cloud...
Attempts to secure the enterprise network, even when using strong AAA (authentication, authorization and accounting) schemes, meet the user box spoofing and security middle boxes (firewalls and other filtering tools) bypassing problems. Seeking to strengthen the network security level, the names (users, addresses) and user machines must be bound tightly to the unambiguously defined network appliances...
The purpose of this study is to propose an approach to recommend classification algorithms for real-world classification problems. First, the extension rhombus thinking mode is used to construct performance indicators of the classification algorithm. Second, an extension-based recommendation method about classification algorithm is proposed. Third, a recommendation system is designed to implement...
The Satellite Simulation Technology today is widely used by many famous space researching organizations in the world, almost each of them has its customized simulation system which has been contributing much on various of successful satellite designs, however, there hasn't been a generic framework to simplify complicated satellite design, this leads to significant investment on R & D costs, on...
The Northbound Interface (NBI) plays a crucial role in promoting the adoption of SDN as it allows developers the freedom of developing their revenue-generating applications without being affected and constrained by the complexities of the underlying networks. To do so the NBI has to allow applications to express their requirements and constraints in their own application specific language, and the...
We describe disaster protection and recovery of cloud-hosted enterprise applications both at the cloud infrastructure level and at the application level. We explore scenarios which favor one option over the other, and scenarios where a combination of both are required for effective and end-to-end protection. Through case studies grounded in the experience of implementing disaster recovery for IBM's...
The Public Cloud has enabled the provisioning & management of an organisations IT infrastructure to be handled by a third-party, otherwise referred to Infrastructure as a Service (IaaS). This offers the potential to create cost effective & scalable IT solutions. However, little work has been done on the processes involved in cloud migration of existing infrastructure. Specifically, there has...
In Software Defined Infrastructure (SDI), a network topology consists of many converged heterogeneous resources, both physical and virtual, for computing and networking. However, the network topology is dynamic due to various physical and logical activities such as addition of new racks, VM addition/deletion/migration, and network creation/modification/deletion. In this paper we propose SDIGraph,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.