The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Flash memories are gaining prominence for utilizing in large scale data centers (DCs) due to their high memory density, low power consumption and heat dissipation, and high access speed characteristics. The rate of degradation for a flash memory is largely affected by the amount and frequency of the erase/write operations, which is a challenge in the DC context that serves dynamically changing workloads...
A binary neural associative memory concept comprising nanoelectronic resistive switches and non-linear selector devices used as binary connection elements is proposed for the realization of logic and arithmetic functions. Based on the consideration of device variability an error detecting 2-out-of-n-code for the representation of operands is developed. The connection structure of an associative memory...
This work is about recognizing human activities occurring in videos at distinct semantic levels, including individual actions, interactions, and group activities. The recognition is realized using a two-level hierarchy of Long Short-Term Memory (LSTM) networks, forming a feed-forward deep architecture, which can be trained end-to-end. In comparison with existing architectures of LSTMs, we make two...
Object detection is a challenging task in visual understanding domain, and even more so if the supervision is to be weak. Recently, few efforts to handle the task without expensive human annotations is established by promising deep neural network. A new architecture of cascaded networks is proposed to learn a convolutional neural network (CNN) under such conditions. We introduce two such architectures,...
Energy interconnection (EI) is a logical consequence when ideas of open source and distributed scheme from the information field are introduced into the energy field. EI is essentially a typical cyber-physical system. This paper studies the new capabilities in sensing, computation, communication and control by analyzing its characteristics and demand. Firstly, we analyze the system architecture of...
In this paper, we address the problem of evaluating the aggregated services offered to the user through a multimodal travel planner. The effective design of a multimodal travel planner is considered a complex task since it requires the identification of the best possible route that combines segments of different transport modes. We describe a novel architecture and its respective connectivity infrastructure...
High reliability is an important characteristic of Cyber-Physical Systems (CPS). New CPS components/subsystems have to be developed for the detection, isolation, recovery and prevention of failures and external attacks. To address this challenge, we propose a multi-agent-based subsystem architecture that can detect and prevent CPS hardware components' failures. The architecture comprises of several...
This article discusses some of the important structures of the area covered by cellular communications; the following concepts are introduced: achievable, useful coverage and efficiency of use of the reception base station coverage area (BS); the proposed formula for calculating the area of coverage. The aim of the article is to determine the most effective structure of the coverage area of mobile...
Distributed file systems enable the reliable storage of exabytes of information on thousands of servers distributed throughout a network. These systems achieve reliability and performance by storing multiple copies of data blocks in different locations across the network. The management of these copies of data is commonly handled by intermediate servers that track and coordinate the placement of data...
Communication-based Train Control (CBTC) technologies are gradually adopted in urban rail transit systems, which can supply high efficiency, safety and capacity and use the bidirectional train ground wireless communication to transfer control data between trains and wayside equipment. However, there are some challenges due to the inherent characteristics of wireless communications. Although the redundant...
Critical applications require reliable processors that combine performance with low cost and energy consumption. Very Long InstructionWord (VLIW) processors have inherent resource redundancy not constantly used due to application’s fluctuating Instruction Level Parallelism (ILP). Reliability through idle slots utilization is explored either at compile-time, increasing code size and storage requirements,...
Providing the new power system with well-tailored communication architecture is a key factor to guarantee expected smart grid capabilities. Among many requirements, quality of service awareness is a relevant feature for the smart grid communication system. Indeed, various data flows are to be exchanged in order to ensure smart grid services, having each different resilience, bandwidth and latency...
Highly reliable data compression technique. Flash Reliability Boost Huffman coding (FRBH) is proposed for TLC NAND Flash memory. By decreasing the write data size and optimizing the memory cell Vth distribution at the same time, FRBH decreases data-retention errors by 92% and increases data-retention time by over 2900 times.
Network Function Virtualization (NFV) is becoming more prevalent in Data Center, Telecommunication and Enterprise networks, enabling the Virtual Network Functions (VNFs) to fast replace the traditional dedicated hardware based middleboxes. Ensuring high availability and fault tolerance of VNFs is cardinal to meet the performance and service level agreement requirements. Also, with the increasing electricity...
The fabric architecture, which can realize massive packet forwarding even with small switches/routers, has been widely used as a network infrastructure in data centers in order to achieve high scalability and low cost. In carrier networks, large scale routers have been adapted as core routers due to the requirement of high density for accommodating a large number of users. Furthermore, the redundant...
Safety is one of the main guidelines for critical systems design. Designers are in charge of developing architectures that comply with the safety requirements. Thus they must ensure that qualitative safety indicators such as the minimal size of failures scenario leading to a failure condition fc and quantitative indicators such as the probability to reach fc after a certain time interval, are kept...
The crossbar resistive random access memory (RRAM) has been studied extensively due to its low-power, low-cost, high density and nonvolatile characteristics. However, the dependence of RRAM performance parameters on temperature, from cell to array level, is less explored. Particularly, thin-film based RRAM that is integrated into 3D ICs is subject to severe thermal conditions. Hence, temperature dependence...
Distributed Storage Systems (DSS) have seen increasing levels of deployment in data centers and in cloud storage provider networks. They provide efficient and cost-effective ways to store large amounts of data and ensure resilience to failures by using mirroring and coding schemes at the block and file level. While mirroring techniques provide an efficient way to recover lost data, they require excess...
Cloud data provenance is metadata that records the history of the creation and operations performed on a cloud data object. Secure data provenance is crucial for data accountability, forensics and privacy. In this paper, we propose a decentralized and trusted cloud data provenance architecture using blockchain technology. Blockchain-based data provenance can provide tamper-proof records, enable the...
We present an architecture for software-defined multicast that provides scalable and reliable multicast services. We consider the Bit Indexed Explicit Replication (BIER) architecture and Traffic Engineering for BIER (BIER-TE) for packet transport to mitigate scalability concerns of traditional IP multicast. We briefly discuss the advantages of an SDN-based multicast architecture leveraging BIER and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.