The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Day by day the use of memory is increases rapidly. A lot of data created every day so the data management is become a critical task. Most of time much amount of memory wastage because of same copies present on various locations. The process of eliminating the repeated or duplicates copies of data is called as Data deduplication. This data deduplication process is widely used in cloud storage to decrease...
Over the past few years, NAND flash-based Solid State Drives (SSDs) are progressively replacing Hard Disk Drives (HDDs) in various applications ranging from personal computers to large-scale storage servers, due to their high performance and low power consumption. However, SSDs suffer from limited endurance, which is a major concern for their utilization in the server domain. Based on the unique characteristics...
Internet of Things (IoT) connects a large volume of devices together, via different modes of wired and wireless communication interfaces. The existing transport layer protocols, like TCP and UDP as well as their variants, lack functionality to handle the diverge and heterogeneous communication standards while ensuring the IoT transport requirements like short-lived packet or message transfer, short...
Reliability of the computer network has been researched for improving the performance of the system and has gained more popularity in the past decade. This paper evaluates the reliability of the e-learning network of Mae Fah Luang University (MFU) in operation through main reliability network parameters by using OPNET. The reliability effects when increasing the number of user nodes are simulated...
HDFS has been widely used for storing massive scale data which is vulnerable to site disaster. The file system backup is an important strategy for data retention. In this paper, we present an efficient, easy- to-use Backup and Disaster Recovery System for HDFS. The system includes a client based on HDFS with additional feature of remote backup, and a remote server with a HDFS cluster to keep the backup...
The backbone of Internet of Things (IoT) is the communication protocols which seamlessly integrate thousands of nodes and enable a light weight data transfer process. This research is to analyze the efficiency and applicability of different M2M protocols that are available for IoT communication. For the purpose of evaluating the protocols a Raspberry-Pi with Raspbian OS and a temperature sensor are...
With the rapid development of portable mobile devices, crowd sensing systems have been recognized as a key technology to utilize the data collected by the portable mobile devices towards scalable and flexible mobile services. However, since the information provided by devices may not be reliable, the aggregated results of the collected data may not be accurate. To tackle this challenge, various truth...
Smart grids are considered as one of the most revolutionary technologies in the field of power and communication. However, security management of such a big infrastructure is a key challenge for the research community of the world. In this context, this paper provides the major security goals of smart grid systems along with classification of different vulnerabilities. Additionally, we also present...
In order to realize the function of accurate measurement, multipoint collection and wireless transmission on various environmental monitoring factors in the workshop, a workshop environment monitoring system is proposed based on the technology of internet of things. A number of wireless monitoring nodes are set up in each workshop to collect a variety of environmental information, then transmit the...
We present a resilient task-based domain-decomposition preconditioner for partial differential equations (PDEs) built on top of User Level Fault Mitigation Message Passing Interface (ULFM-MPI). The algorithm reformulates the PDE as a sampling problem, followed by a robust regression-based solution update that is resilient to silent data corruptions (SDCs). We adopt a server-client model where all...
The software defined networking is attracting significant attention from business and private end-users. With characteristic of virtualization and programmability, Service Providers (SPs) can pay for the resources in the term of virtual data centers (VDCs) to deploy their services without maintaining expertise. Despite advantages the new paradigm brings, offering VDCs as a service still faces a new...
Cloud computing has emerged as the primary and popular computing paradigm recently. Since cloud users move continuously, sustaining the required quality of service (QoS) in a cost effective manner is very challenging. For maintaining the required QoS for a moving user, the current cloud systems use some of the existing service replication or/and migration strategies. However, those policies become...
Precisely estimating the pose of an agent in a global reference frame is a crucial goal that unlocks a multitude of robotic applications, including autonomous navigation and collaboration. In order to achieve this, current state-of-the-art localization approaches collect data provided by one or more agents and create a single, consistent localization map, maintained over time. However, with the introduction...
Portable smart devices have become popular in recent years. These devices also produce a large number of data. In wireless environment, it is important for portable devices to keep reliability of data transmission. While it is difficult to keep portable devices stable in a wireless environment. Instability of wireless path may cause unreachability between the server and devices. In this state, some...
Access to information is predicated on the access to a digital infrastructure. However, access to electricity and the Internet remain elusive for a significant percentage of the world's population, let alone a sustainable access in one’s local language, local context, and relating to local culture. This paper examines the issues of resource constraints, and proposes a framework to classify them. It...
In this paper we propose a task based load distribution framework for Massively Multiplayer Online Games running in hybrid cloud environments. Our solution breaks down high level tasks into subtasks in such a way that i) core subtasks (those with strong timing constraints) are executed at private resources owned by game operators; while ii) background subtasks (those with looser timing/reliability...
In vehicular ad hoc network (VANET), vehicles are connected in a self-organized manner to collect and share various traffic data about the road condition, accidents, traffic congestions, and other related events, This data can be used to improve the driving quality, however VANET vehicles may receive unreliable data broadcasted by malicious vehicles which may result in unsafe driving and accidents...
This project arises from the need to redesign the main technological infrastructure of the mining company. Current centralized infrastructure is obsolete and is no longer reliable and productive for the company. Currently, it is not possible for the network to facilitate the design of new technological solutions (installation of new servers, virtualization, storage networks, the configuration of advanced...
In recent years, cloud service is developing rapidly with its advantages of on-demand service, elastic extension and low-cost. Although the development of the cloud service is rapidly, more and more accidents also occur. So reliability of cloud services becomes the important factor that hinders its development, and in recent years the reliability of cloud services is becoming a research hotspot. In...
The purpose of this paper is to illustrate the Internet of Everything based integrated security system designed for World War One commemorative Museum of Fogliano Redipuglia in Italy, capable of ensuring visitors security, cultural heritage préservâtion/protection and great usability for visitors, with particular reference to visitors with disabilities. Genetic Algorithms (GAs) have been used to design...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.