The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Internet is one of the most rapidly developing technologies. New protocols for the Internet are always developing. This article focuses on the way to simplify development process of new protocols and modeling of network devices. In this paper there is presented general solution architecture and main functional blocks are described. The main objective of this work was to create a general-purpose...
By taking common mode failure (CMF) into account, the availability of multiple cluster systems is investigated. Firstly, a Markov model of system with three cluster nodes is constructed with failure rate (λ), repair rate (µ) and CMF rate (γ). Then, the availability of system is formulated with related parameters by solving related equations. Furthermore, derivative analysis of the formula's property...
In this paper, we aimed to guide about latest development and studies about students' performance analysis and Learning Analytics in Massively Open Online Courses (MOOCs) for researchers related with the topics. For this purpose short review for usage of performance prediction and Learning Analytics in MOOCs is investigated In our study, to help readers get familiar with our topic, firstly literature...
This tutorial discusses in depth the operational validation of simulation models after a brief overview of verification and validation of simulation models. The discussion of operational validation first covers the different approaches used for observable and non-observable systems. Next, various types of graphical displays of model output behavior are presented; this is followed by how these displays...
Simulation is experimentation with a model. The behavior of the model imitates some salient aspect of the behavior of the system under study and the user experiments with the model to infer this behavior. This general framework has proven a powerful adjunct to learning, problem solving, and design. In this tutorial, we focus principally on discrete-event simulation—its underlying concepts, structure,...
Modeling and Simulation methods have been used to better analyze the behavior of complex physical systems and it is now common to use simulation as a part of the scientific and technological discovery process. Formal M&S proved to be successful in providing a sound base for the development of discrete-event simulation models, improving the ease of model definition and enhancing application development...
This work presents a multi-agent-based computational model of an artificial fractional reserve banking system. The model is implemented in NetLogo. The computational experiments and simulations we performed to analyse the proposed model show that different scenarios can lead to bank insolvency. We show that both the minimum reserve rate and the loss of confidence have large contributions to the insolvency...
Methods of Computer Algebra have shown to be useful when formally verifying data-centric hardware designs. This has been demonstrated especially for cases where complex arithmetic computations are tightly coupled with the system's control structures at the bit level. As a consequence of current design trends, however, more and more functionality that was traditionally implemented in hardware is now...
The IP Multimedia Subsystem (IMS) is a standard network technology merging voice, data, and multimedia services. IMS is well integrated with existing voice and data in wire and wireless networks. To ease the integration with the Telecom and Internet networks, IMS use SIP (Session Initiation Protocol). The main components of IMS are CSCF's and HSS servers. They are responsible of processing and routing...
Risk analysis of security threats in computer networks is one of the most challenging fields in network management. Security risk analysis is usually done by security experts. Although they utilize analysis tools such as scanners and analyzers, the need for expert is still inevitable. To reduce the need of security expertise for network administrator, yet performing security risk management, this...
For modern websites currently available web page segmentation algorithms are not yet of practical use. This is what is observed from recent studies. In this paper, a Webpage Segmenter Using Block Function Tree has been described as a new approach for web page segmentation. It uses the fact that every block in the webpage plays a specific function that web designer designs the block for this function...
with the expanding of large-scale computing and the undate of computer equirments, energy utiliztion of computer has increasingly exposed the problem of high energy waste. Saving energy in using computer service has become a significant topic. There are lots of factors that can affect energy consumption of computers. Now, people have done much reasearch on how to evalute energy consumption of computer...
This article considers the basic methods of telecommunication networks modelling, along with the relevant software tools. The expediency of using UNetLab, a new software product for simulation modelling, has been proven. This software is used for the creation and analysis of virtual laboratory-oriented experimental testing benches of telecommunication networks. The article formulates general basic...
Qubit models for defining the structures and functionalities are developed to improve the performance of the analysis of digital devices by increasing the dimension of the data and memory structures. The basic concepts, terminology, definitions, necessary for the implementation of quantum computation in the practice of modeling computer structures, are introduced. The examples proving the efficiency...
We evaluate the performance of a cloud system using ahysteresis queueing system with phase-type and batch arrivals. To represent the dynamic allocation of the resources, the hysteresis queueactivates and deactivates the virtual machines according to the threshold values of the queue length. We suppose a variable traffic intensity as the client requests (or jobs) arrive by batches, and follow a phase-type...
We present TerrainLOS, an outdoor propagation model that uses Digital Elevation Models to determine whether two nodes can communicate. We have implemented TerrainLOS in the sensor network simulator COOJA and used it to evaluate how the roughness of terrain, which we classify using Average Cumulative Visibility, affects the number of edges, connectedness, latency, and power of a network. We compare...
The chunk fragmentation problem inherently associated with deduplication systems significantly slows down the restore performance, as it causes the restore process to assemble chunks which are distributed in a large number of containers as a result of storage indirection. Existing solutions attempting to address the fragmentation problem either sacrifice deduplication efficiency or require additional...
Recent computer systems research has proposed using redundant requests to reduce latency. The idea is to replicate a request so that it joins the queue at multiple servers. The request is considered complete as soon as any one copy of the request completes. Redundancy is beneficial because it allows us to overcome server-side variability – the fact that the server we choose might be temporarily slow...
Live Virtual Machine (VM) migration across data centers is an important support technology which will bring benefits to both cloud providers and users. At present, VM storage migration becomes the bottleneck of this technology as it explores only the static data feature of image files without much consideration on data semantics. In this paper, we propose a new space-efficient VM image structure–three-layer...
In digital game based learning (DGBL), game mechanics and learning mechanics define the interactivity possibilities between the player and the game. While game and learning mechanics can facilitate the design and development of DGBL activities, they have not yet been analyzed from the perspective of the learning theories underlying the type of interactions between the player and the game. This study...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.