The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Behavior of stochastic Petri net can be approximated by difference equation resulting after fluidification. Vásquez et al. have introduced Gaussian noise to reduce approximation error. We suggest a method to reduce the number of additions of noise while keeping errors as small as Vasquez's method.
We derive a simple, closed, equation for the delay caused by random outages or downtimes that affect a node in a communications network. The model is an M/G/1 queue with nonexhaustive interruptions, in which the server goes on and off successively, at random times, no matter whether the current job is finished or not. The arrival process is Poisson; while the distributions of service and on/off times...
A direct coupling coherent observer is constructed for a linear quantum plant which has oscillatory solutions. It is shown that a finite time moving average of the quantum observer output can provide an estimate of the quantum plant output without disturbing this plant signal. By choosing a sufficiently small averaging time and a sufficiently large observer gain, the observer tracking error can be...
Religious Courts of South Jakartais responsible for managing the filing of cases. However, the submission process uses manual and semi-automated systems that cause some problems, such as difficulties when requiring the exchange and accessing information between units in real-time. With regard to this problem, the performance of the system needs to be analyzed. In order to find the optimal modeling...
The paper deals with the contact center modeling with emphasis on the optimal number of agents. The contact center belongs to the queueing systems and its mathematical model can be described by various important parameters. The Erlang C formula tends to be suitable tool for the modeling of QoS parameters of contact centers. In our paper, we propose two parameters: downtime and administrative task...
Most of latency-sensitive mobile applications require computational resources provided through a cloud computing service. The problem of relying on cloud computing is that, sometimes, the physical locations of cloud servers are distant from mobile users and the communication latency is long. As a result, the concept of distributed cloud service, called mobile edge computing (MEC), is being introduced...
Web Security Gateway (WSG) is a new type of network security product that maintains the security of trusted networks. In this paper, a WSG model for evaluating WSG performance is presented. This paper advances discussion of previous studies on series services under multiple service windows. The proposed model consists of a two-stage queuing system. The first stage is a network layer simulation. The...
In the past few years, datacenter (DC) energy consumption has become an important issue in technology world. Server consolidation using virtualization and virtual machine (VM) live migration allows cloud DCs to improve resource utilization and hence energy efficiency. In order to save energy, consolidation techniques try to turn off the idle servers, while because of workload fluctuations, these offline...
The finite input source queueing system has been widely used to solve many problems appearing on machine maintenance and repair systems, client-server computing, and production line operations, etc. In classical queueing models, arrival intensity is assumed to be a poisson distribution and the service times of all servers follow a independent and identically exponential distribution, in which the...
To address the challenges raised by the Internet usage evolution over the last years, the Content-Centric Networking (CCN) has been proposed. One key feature provided by CCN to improve the efficiency of content delivery is the in-network caching, which has major impact on the system performance. In order to improve caching effectiveness in such systems, studying the functioning of CCN in-network storage...
The offers on cloud computing infrastructure have focused on providing computing and storage resources, and consider the network mostly as a required add-on and not truly as a resource itself. However, the need to have more robust solutions is becoming clearer. This paper argues that cloud infrastructure services will evolve and allow the definition of complete infrastructures that comprise both computing...
This paper considers a written communication system based on a multilateral teleoperation using robust control. First, a pen equipment as an interface of the written communication system is developed. By using the pen equipment, the proposed written communication system based on sharing haptic information is indicated. Next, the non-passive approach is applied to the written communication system....
Device synchronization is a new technology integrated into the cloud which has seen widespread implementation from major cloud vendors but has not been spared of attacks by MITC attacks directed towards cloud synchronization achieved via a myriad of attack vectors. These target the synchronization token which lacks authenticity validation of the token bearer. We explore MITC in Linux systems by partitioning...
The security protocol is proposed as a security solution for end-to-end communication between smart grid applications in the EU FP7 project C-DAX. Since the importance and widespread use of the security protocol, it is of great significance to formally analyze and verify relevant security properties of this security protocol. In this paper, we apply Communicating Sequential Processes (CSP) to model...
Today, in the cloud computing context, the network is starting to arise as a true resource itself and not just as a required connectivity add-on. The ability to define network resources (e.g. routing/switching elements, bandwidth) in this context is still scarce, but there are clear evidences that this is a future reality. In this article, we consider that cloud infrastructure services will allow...
This paper deals with an actual topic concerning the diagnosis of Internet of Things (IoT) controlled flexible manufacturing systems (FMS). We focus on models realized with Markov chains of FMS with stochastic and not equal throughput rates. Discrete-event models assume that FMS is decomposed, and we study the following events: an Internet server fails, an Internet server is repaired, an Internet...
A multitude of issues affect the broader adoption of Cloud computing, with security arguably being amongst the most significant. To address security concerns, the process of threat analysis is advocated to assess potential attacks that can undermine the security goals. However, conducting threat analysis for the Cloud is a non-trivial task given the plethora of attack surfaces entailed in the multiple...
Coded caching has gained a lot of interest recently. It jointly optimizes placement and delivery phases to create network-coded multicast opportunities to attain performance that surpasses conventional uncoded caching schemes. To the best of our knowledge, all coded caching systems studied in the literature are based on content popularity distributions as seen from the server's point of view. In this...
We have proposed a distributed storage system which dynamically makes storage tiers and optimizes location of data blocks autonomously. This aims to enhance the I/O performance of the storage system without remarkable network overhead. Our system dynamically organizes storage tiers considering device characteristics. And the data blocks will be placed in a suitable storage tier according to their...
Coded caching is a technique that promises huge reductions in network traffic in content-delivery networks. However, the original formulation and several subsequent contributions in the area, assume that the file requests from the users are synchronized, i.e., they arrive at the server at the same time. In this work we formulate and study the coded caching problem when the file requests from the users...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.