The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We introduce manylogs, a simple and novel concept of logging that deploys many scattered logs on disk such that small random writes can be appended into any log near the current disk head position (e.g., the location of last large I/O). The benefit is two-fold: the small writes attain fast durability while the large I/Os still sustain large bandwidth.
In this paper, a symmetric encryption approach with key distribution based on artifitial neural networks (ANN) has been investigated and implemented. We have used the ANN synchronization scheme with the tree parity machine for secret key exchange through a public channel. We developed the software for training the TPM and establishing the secure channel between two parties. We also made some experiments...
The increasing number of connected devices with extremely diverse requirements in terms of data exchange rate, form factor, computing, or communication capabilities is a real challenge to device management. The Lightweight M2M protocol simplifies the management of constrained devices and reduces the cost of cloud-device connections. In the paper, behavioral models of LWM2M server and client for connectivity...
We developed a push-content delivery method for integrated broadcasts on the Internet. To provide services that are highly synchronized between the broadcast programs and push content, we propose a new push-content delivery method that enables simultaneous reception of push content on all terminals.
In this paper, we introduce a method for synchronization of multiple devices based on context sharing and system design for multimodal contents service. A main advantage we can expect from our system environment is eliciting abundant function features of each device and exploiting them for rendering multimodal information in more efficient ways. To make it feasible, context s haring takes a significant...
Moving Target Defense (MTD) has been proposed as a new revolutionary technology to alter the asymmetric situation between attacks and defences. Network address shuffling is an important branch of MTD technology. However, there is no systematic introduction to network address shuffling. In this paper, we present a brief introduction to the research achievements of network address shuffling according...
The usage of smartphone nowadays has been increasingly and most of people in the world use it. Following this development a wide variety of applications for mobile phones have been created. After all, most people use the smartphone to browse social networks, listen to music, play games, make memos upload photos to Instagram, accessing banking services, as well as data sharing through cloud system...
Software as a Service (SaaS) is a software delivery and business model widely used by Cloud computing. Instead of purchasing and maintaining a software suite permanently, customers only need to lease the software on-demand. The domain of high assurance distributed systems has focused greatly on the areas of fault tolerance and dependability. In a multi-tenant context, it is particularly important...
A geographically isolated disaster-tolerant system for Distributed File System (DFS) is essential for its enhancement in data security. However, the plain disaster tolerant model performs poor quality while a switch happens in hot-backup. In this study, we proposed a Direct Data Fetch (DDF) technology for the hybrid model. The DDF can fetch data directly from the data chunk server while the main server...
Time synchronization in the intelligent lighting control system is essential to ensure the correct data collection time and the accurate transmission of the control commands. NTP clients on the remote management device and the center control device are proposed for the intelligent lighting control system in this paper. Different from most current NTP clients, time synchronization in the proposed NTP...
Network Function Virtualization (NFV) brings a cloud service automation paradigm to demand-driven elastic flexing of infrastructure resources. Thus, it is essential to characterize the impact of hardware and virtualization options on the virtual network function (VNF) performance, and on the load on underlying infrastructure. In this paper, we present VNF characterization case studies with three sample...
Face to face hand-holding is the main Inheritance method of traditional Chinese medical science (TCMS). But famous traditional-Chinese doctors are very rare, it's almost impossible to learn face-to-face for the youth who are thirsty for traditional Chinese diagnosis. In order to resolve the contradiction, this paper develops a video recording system to record the diagnostic procedure of famous traditional...
Time synchronization is a critical and vital piece of infrastructure for any distributed system or sensor network design or real time simulation. Sensor network have many of the same requirements as traditional distributed systems. Distributed wireless sensor networks make extensive use of synchronized time stamps in swarm navigation. Our target is to investigate the time synchronization in the network...
The ability to provide isolate or standalone device data synchronization to the remote users is becoming more and more challenging for organizations nowadays. Several years ago, the term network was explicitly termed for wired-network but nowadays the accessibility of very high-speed broadband networks, small sized mobile devices, and easy carrying tabs have reduced dependency over wired-networks...
CAN (Controller Area Network) and TIA-485 are two of the most used standards in fieldbus systems. While CAN ISO IS-11898 includes complete data link layer specifications on top of its physical layer, TIA-485 only addresses the physical layer of the 7-layer OSI model. Other communication parameters like speed, format, and data transmission protocol are not specified by RS-485 in order to provide interoperability...
The portion of video traffic in the total amount of Internet traffic has been increased. As the number of users and volume of content are increased, the content providers had been suffered for processing and transferring media and they have adopt CDN technology into their service so that their burden can be alleviated. The CDN technology can be classified into three different types; ‘server farm CDN’,...
Nowadays, an individual uses multiple ICT devices such as PCs, laptops, smart phones and others. And the content files are not dedicated to a specific device, but shared by the devices. One of the sharing services is the personal cloud computing. Users can backup, synchronize, share and manage their files with it. But most cloud systems have their own dedicated interfaces and it is not easy to use...
Iterative-convergent algorithms represent an important family of applications in big data analytics. These are typically run on distributed processing frameworks deployed on a cluster of machines. On the other hand, we are witnessing the move towards data center operating systems (OS), where resources are unified by a resource manager and processing frameworks coexist with each other. In this context,...
For datacenter applications that require tight synchronization, transactions are commonly employed for achieving concurrency while preserving correctness. Unfortunately, distributed transactions are hard to scale due to the decentralized lock acquisition and coordination protocols they employ. We investigate the use of a centralized lock broker architecture to improve the efficiency/scalability for...
The Wide-Area Control and Operation System for stabilizing renewable energy generations utilizing averaging effect was proposed to reduce capacity of battery energy storage system and a demonstrative project supported by Ministry of Environment of Japan was conducted in order to verify effects of the proposed system. In this paper, concept and configuration of the system are introduced and verification...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.