The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Many commercial and open-source network simulators are available; however, most of them are not suited for novices in college and school education or learning. Moreover, although Ethernet has recently become much more important, simulators that can be used for this purpose is rare because most simulators suited for education and learning are designed for IP communication. The author developed a simple...
Nowadays various companies are arousing in our surroundings for customer or owner need in an area. To compete with the modern computer based technology, every company installs the computer in their office. In first case, some company at first design the map of computer network from some observation like company area, what will be the best design practice of the network?, what will be the amount of...
While all computation generates electromagnetic (EM) side-channel signals, some of the strongest and farthest-propagating signals are created when an existing strong periodic signal (e.g. a clock signal) becomes stronger or weaker (amplitude-modulated) depending on processor or memory activity. However, modern systems create emanations at thousands of different frequencies, so it is a difficult, error-prone,...
The Smart Grid, with its explosion of distributed intellect, field mechanization, remote sensors and its deluge of new endpoint data, is driving the efficient combination of new distribution management capabilities into existing Energy Management Centres. Business benefits include greater efficiencies, more productive operations, improved service reliability, better asset management and more insightful...
In this paper, we have evaluated the dynamic communication performance of the mesh and torus networks using a open source TOPAZ simulator using virtual cut through switching under uniform traffic pattern. It is found that the torus network yields low latency and high throughput than that of mesh network. Therefore, The dynamic communication performance of the torus network is better than that of the...
An electric wheelchair is basically acknowledged for mobility improvement in disability patients. In some cases, their hand could not well function. They may tire easy before reaching to the desired destination. Furthermore, the safety is the most concerned issue for wheelchair control in disability patients. Therefore, this work tries to develop the prototype of the automated navigation system that...
Adaptive open learning technology provides adaptive methods of interacting with the technology used in open learning. Since most of online learning systems are computer-based, adapting the keyboard for people with special needs will be of great effectiveness. This article presents an adaptive keyboard technology based on Morse code that will enable users with physical disability or functional limitations...
Described in the article are the multiaccess systems on the basis of the algorithmic language BASIC, developed in the N.I. Lobachevski's Nizhny Novgorod state university in the period of 1969-1978. The first of them was the BASIC- batch-processing system that was introduced on an M-20 type ECM (BESM-3, BESM-4, M-220, M-222) in early 1970. It was actively used in academic processes and, unlike other...
Behavior Trees (BTs) have become a popular framework for designing controllers of in-game opponents in the computer gaming industry. In this paper, we formalize and analyze the reasons behind the success of the BTs using standard tools of robot control theory, focusing on how properties such as robustness and safety are addressed in a modular way. In particular, we show how these key properties can...
The general purpose Automatic Test System included the general purpose instruments and the special purpose Test Unit Adapter (TUA). With the increasing types of the unit under test, the number of the TUA was increasing too, eventually leading to huge automatic test system. The main idea of this research is removing TUA and connecting the instrument and the equipment under test directly. So the volume...
During the last decade, VME, VXS, VPX and cPCI became the leading interfaces among those are used especially in military computers. Due to this fact, there exists a large variety of boards which contain one of the listed interfaces. The power specifications of these interfaces are similar. In addition to this, physical dimensions are also standardized (i.e. 3U and 6U standards). Especially for ASELSAN,...
The hardware implementation of massive Recurrent Neural Networks to efficiently perform time dependent signal processing is an active field of research. In this work we review the basic principles of stochastic logic and its application to the hardware implementation of Neural Networks. In particular, we focus on the implementation of the recently introduced Reservoir Computer architecture. We show...
This paper focuses on ARP attacks in switched networks, from ARP protocol perspective, analyses the principle of ARP attacks and the exceptional interrupt occurs they cause when the terminal users access the servers. To quickly and effectively detect ARP spoofing, this paper proposes a WinP cap based detection system of ARP spoofing. Using Win Pcap driver development monitoring software, implements...
This paper presents the applicability of neural networks and graph structuring methods in the field of computer networks administration. As data transmission infrastructures have become large technology interconnected domains, the utilizations and performances of these networks, are having various influential factors that act on their overall well functioning and impose a constant tuning of the communication...
Foreground object detection in video is a fundamental step for automated video surveillance system and many computer vision applications. Mostly moving foreground object is detected by background subtraction techniques. In dynamic background, Gaussian Mixture Model (GMM) performs better for object detection. In this work, a GMM based Basic Background Subtraction (BBS) model is used for background...
The communication subsystem of distributed embedded systems (DES) that must operate continuously and satisfy unpredictable requirement changes must be reliable and flexible. Recently the Flexible Time-Triggered Replicated Star for Ethernet (FTTRS) has been proposed as a communication subsystem that satisfies these two attributes. It is based on the master/multi-slave Flexible-Time Triggered (FTT)...
Power policies are widely applied at computer systems such as desktops, notebooks, and smartphones. For example, the timeout policy to turn off the display. A power management policy must be tested by measuring the power consumption of an experimental platform running workloads. Such tests must be fast enough to feedback the development process with valuable information about the power policy performance...
The methodology for the electronic networks optimization was elaborated by means of the optimal control theory approach. In this case the problem of the electronic system design is formulated as a classical problem of functional minimization of the optimal control theory. The minimal time system design algorithm was defined as a controllable dynamic process with an optimal control vector. By this...
Performance of software is increasingly restricted by the Memory Wall instead of CPU. Many studies focus on alleviating the DRAM latency by improving the row-buffer hit rate. But most of them treat the Kernel and User equally. Data used by Operating System and User applications spread in different rows of the same bank, leading to the contentions for the row-buffer when they access the bank successively...
In this paper, we propose a distributed storage system which relocates data blocks autonomously among the storage nodes. In the system which is composed of heterogeneous storage nodes, there are performance gaps among the storage devices. The storage tiers are made by such gaps in the system. When frequently accessed data blocks are placed on improper storage tier, system performance may decline....
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.