The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software Defined Networking (SDN) is the new promise towards an easily configured and centrally controlled network. Based on this centralized control, SDN technology has proved its positive impact in the world of network communications from different aspects. Consistency in SDN, as in any rule-based network, is an essential feature that every communication system should possess. In this paper, we...
Network Functions Virtualization (NFV) is a key technology to reduce management costs as well as to improve scalability and elasticity of computer networks. Still, recent research efforts have been exposing additional management challenges. Concerning monitoring in particular, new types of entities and requirements are underexploited. To address these issues, we propose DReAM, a resource management...
Managing the extremely large volume of information generated by Internet-of-Things (IoT) devices, estimated to be in excess of 400 ZB per year by 2018, is going to be an increasingly relevant issue. Most of the approaches to IoT information management proposed so far, based on the collection of IoT-generated raw data for storage and processing in the Cloud, place a significant burden on both communications...
Network Functions Virtualization (NFV) enables the rapid development, flexible management, and the dynamic placement of new, innovative Virtualized Network Functions (VNFs), such as load balancers, firewalls, and Intrusion Detection Systems (IDSes). Furthermore, NFV along with Software-Defined Networking (SDN) allows VNFs and physical middleboxes to be dynamically composed into service chaining graphs...
In the last years we have experienced a growing industrial interest in Mobile Cloud Networking (MCN) as the opportunity to exploit the cloud computing paradigm through Network Function Virtualization (NFV), primarily with the goal to reduce CAPEX/OPEX for future mobile networks deployment and operation. The gain from the point of view of infrastructure costs reduction is almost clear and recognized,...
Mechanisms to detect and analyze malicious software are essential to improve security systems. Current security mechanisms have limited success in detecting sophisticated malicious software. More than to evade analysis system, many malwares require specific conditions to activate their actions in the target system. The flexibility of Software-Defined Networking (SDN) provides an opportunity to develop...
To accelerate research and development of the autonomous capabilities of micro aerial vehicles we have developed flight control framework, ROSflight, as a research tool. ROSflight makes development of autopilot code easier and more efficient by minimizing the use of embedded systems, incorporating the Robot Operating System and using off-the-shelf and open-source hardware and software. Motivation...
A problem of porting of parallel applications from one reconfigurable computer system to another is considered in the paper. The reconfigurable computer systems can have different soft-architectures and different configurations, which are used for implementation of the application. A new method of porting of parallel applications, which allows estimation of possibility of porting from an initial soft-architecture...
Sensus Ekonomi 2016 (SE2016-Economy Census 2016) which will be held in 2016 is an important and massive activity. Badan Pusat Statistik (BPS-Statistics Indonesia) taking main responsibility needs to arrange strategic and appropriate actions for the success of the event. One of the actions that can be used to support SE2016 implementation is by providing information about progress of SE2016. Therefore...
In the recent trends the need for low power and less on-chip area is on high note for the portable devices. To cope up with the arising need, a new Magnitude Comparator is proposed with low power and less on-chip area for different range of lower supply voltages using Modified GDI technique implemented in 45nm process technology using CADENCE VIRTUSO. There is 95% and 67% reduction in power at lower...
Content distribution applications allows personal computers to search and download the digital content from the Internet. This can be done with help of P2P (Peer-to-Peer) mechanism. In P2P network, efficient mechanism is needed to locate the content. One mechanism is to form P2P Group based on the similarity interest among the peer. In this paper, a fuzzy based conceptual analysis of P2P group management...
A large number of computer applications(like Computer Graphics, Control Systems, Modeling System, Simulators etc.) needed floating point arithmetic. However, most of the presently available methods are slow and inefficient because of sequential design however the recent development in the field of programmable logic devices such as FPLA and CPLD opens the new area of parallel and high speed floating...
The efficiency of a System — On — Chip (SoC) depends upon the arrangement of different components on the chip. In order to get full operational capability, the communication between these components must incur less cost: latency and delay. Traditionally these components are connected via shared bus, which becomes a bottleneck. To overcome this bottleneck a new era has begun called the Network — on...
Antivirus is most widely used to detect and stop malware and other unwanted files. Cloud antivirus is a malware detector architecture where virus definitions and other behaviors of suspicious files is analyzed on cloud and controlled by a light weight Agent on client system. We suggest using two-way caching scheme where local-cache is stored on client system and cloud-cache is present on network cloud,...
Signed digit representation is vital for implementation of fast arithmetic algorithm and efficient hardware realization. Redundant binary (RB) number representation is the most widely used technique for representation of signed digit number. Again RB representation has ability to provide carry propagation free addition. In this paper we have presented an efficient modified redundant binary (MRB) adder...
The dedicated short-range communication (DSRC) plays important role in modern intelligent transportation system. The DSRC standards generally adopt FM0 and Manchester encoding technique to reach dc balance and enhance the signal reliability. Same properties are possessed by Miller and inverted Manchester encoding. Therefore, this two techniques can be added in existing FM0/Manchester encoding module...
In the daily use of computer applications, large quantities of data are being written and read. Central Processing Unit, Random Access Memory and computer Hard Disk Drive are involved in that process. In 2008 / 2009 the massive commercial use of hard drives based on Solid State technology began, which are now rapidly replacing mechanical hard drives, made up of mechanical and electronic components...
The popularity of computer science classes offered through Massive Open On-line Courses (MOOCs) creates both opportunities and challenges. Programming-based classes need to provide consistent development infrastructures that are both scalable and user friendly to students. The "Heterogeneous Parallel Programming" class offered through Coursera teaches GPU programming and encountered these...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.