The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The growing popularity of high performance computing has led to a new focus on bypassing or eliminating traditional I/O operations that are usually the bottlenecks for fast processing of large data volumes. One such solution uses a new network communication protocol called InfiniBand (IB) which supports remote direct memory access without making two copies of data (one in user space and the other...
In an effort to offset the rapidly increasing data volume processed by large data centers today, their architects have increasingly been exploring unconventional architectures like FPGAs. Large-scale RC systems like Novo-G# show promise for both big-data processing and HPC, but are limited by a lengthy and difficult design process. In this paper we present a mixed MPI/OpenCL framework that enables...
In this paper we present a novel writer-independent on-line signature verification system. The proposed system obtains a universal signature representation in dissimilarity space, but remains able to compensate for the personal variability of an individual's handwriting by subsequently employing a writer-specific dissimilarity normalisation strategy. Signature modelling is achieved by utilising either...
Nowadays, the ethernet is developing much faster than memory and CPU technologies, protocol processing has become the bottleneck of TCP performance on end systems. Modern NICs usually support offload techniques such as checksum offload and TCP Segmentation Offload(TSO), allowing the end system to offload some processing work onto the NIC hardware. In this paper, we propose an implementation of Large...
This paper demonstrates the application of electromyography (EMG) signals for controlling home devices. To achieve this we have used an armband called MYO® that has an array of eight sEMG sensors around the forearm. We have studied 15 different hand gestures to create a dictionary of gesture control. We have achieved gesture recognition using Support Vector Machines (SVMs) as a classification method...
Traditionally, fieldbus networks are operated in closed environments, where all communication nodes are assumed to be trustworthy. Therefore, the corresponding standards do not consider any security requirements. New technology trends, such as the upcoming Internet of Things (IoT), demand an interconnection between all components of an industrial infrastructure. As a consequence of this, there is...
EURECA architectures have been proposed as an enhancement to existing FPGAs, to enable cycle-by-cycle reconfiguration. Applications with irregular data accesses, which previously cannot be efficiently supported in hardware, can be efficiently mapped into EURECA architectures. One major challenge to apply the EURECA architectures to practical applications is the intensive design efforts required to...
Most of security measures for network computing are provided by service provider itself. However, this kind of methods cannot be trusted radically by the user for lacking the ability to control the resource directly. The computing environment for the user is unable to know what software will be provided. To address this problem, we present a security scheme, named Cleanroom Monitoring System (CMS),...
This paper presents an application of Internet Protocol Options for enhancing self-authenticated feature to the Internet Protocol. The options consist of Keyed-Hash Message Authentication Code and timestamp. In the network access control system, local network devices needing to access protected networks have to attach the options to packet header before sending to destination through a network access...
To meet the people to the environmental monitoring data transmission in a timely manner, without geographic restrictions and other requirements, the advantages of ARM technique and 4 G network will be combined together in the paper, The data received will be processed by the embedded systems and timely sended out to monitor center through the 4G network, achieving remote data real-time transmission...
In recent years, the Internet Protocol (IP) has become a common basis for communication in several automation domains. For smart grids, it is even more beneficial because it brings a unification aspect into a field characterized by a variety of heterogeneous communication protocols which are in use today for various functions and services inside a smart grid. Besides, IP offers a convenient approach...
To make use of big data, various NOSQL data stores have been deployed, such as key-value stores and column-oriented stores. NOSQL data stores typically achieve a high degree of scalability, while specialized for some specific purposes; thus, Polyglot persistence that employs multiple NOSQL data stores complementally is a practical choice toward a high diversity of application demands. We assume various...
Nowadays, many industrial synchronization systems rely on the Precise Time Protocol (PTP or IEEE1588) that provides sub-microsecond precision time transfer. However, there are some applications such as next generation of telecommunication systems (LTE-A & 5G) or scientific infrastructures that have stricter timing requirements that must guarantee the timing service regardless of traffic load conditions...
This paper proposes a new way of managing the cache by exploiting the difference of behavior in the memory system between read-only data and read-write data. A division of the existing cache-based memory hierarchy is proposed in order to create a dedicated data path for read-only data. In order to justify this approach, an analysis performed on a set of benchmarks shows that read-only data count for...
This paper proposes a new way of managing the cache by exploiting the difference of behavior in the memory system between read-only data and read-write data. A division of the existing cache-based memory hierarchy is proposed in order to create a dedicated data path for read-only data. In order to justify this approach, an analysis performed on a set of benchmarks shows that read-only data count for...
The next generation, 5G wireless access, is going to support a wide range of new applications and use cases, with the capabilities including very high achievable data rate, very low latency, ultra-high reliability and the possibility to handle extreme device densities. To avoid the costly deployment, operation and maintenance of future mobile network, Radio Access Network (RAN) virtualization or Cloud...
Studying cyber-physical system (CPS) for a given network protocol and processor schedules is a challenging task. This investigation illustrates the role of TrueTime a MATLAB package for simulating CPS encapsulating information on processor schedules, and network protocols. Properties of CPS such as temporal behaviors, performance and stability can be studied using the TrueTime tool. Furthermore, these...
Most resource control protocols such as IPCP (Immediate Priority Ceiling Protocol) require a kernel system call to implement the necessary control over any shared data. This call can be expensive, involving a potentially slow switch from CPU user-mode to kernel-mode (and back). In this paper we look at two anticipatory schemes (IPCP and DFP - Deadline Floor Protocol) and show how they can be implemented...
Network emulation strikes the balance between using real machines on full-fledged networks and running software models of applications and networks in simulation environments. Advanced Linux features make it possible to emulate entire networks on a single machine, enabling experiments that are much easier to run and repeat. However, some of these features were not designed with the primary purpose...
Many IoT applications ingest and process time series data with emphasis on 5Vs (Volume, Velocity, Variety, Value and Veracity). To design and test such systems, it is desirable to have a high-performance traffic generator specifically designed for time series data, preferably using archived data to create a truly realistic workload. However, most existing traffic generator tools either are designed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.