The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The computing systems used by LHC experiments has historically consisted of the federation of hundreds to thousands of distributed resources, ranging from small to mid-size re-source. In spite of the impressive scale of the existing distributed computing solutions, the federation of small to mid-size resources will be insufficient to meet projected future demands. This paper is a case study of how...
We consider a mobile-CDN system where base stations (BSs) are equipped with storage for replicating and distributing content. In such a system, BSs cooperation in replying user requests is a widely adopted mechanism. For such cooperative caching, a key issue is the joint optimization of content placement and request redirection, which has been intensively investigated in the literature. However, optimizing...
Event logging is a key source of information on a system state. Reading logs provides insights on its activity, assess its correct state and allows to diagnose problems. However, reading does not scale: with the number of machines increasingly rising, and the complexification of systems, the task of auditing systems' health based on logfiles is becoming overwhelming for system administrators. This...
We consider the conditions of functioning of the distributed measurement system according to the strict schedule. The system consists of several local stations integrated into the computer network with the ring structure. Sensors of measurement system have different polling periods (polled with different frequencies) with frequencies ratios are natural numbers. Design method for the operation of that...
With the Internet becoming the dominant channel for business and life, web proxies are also increasingly used for illegal purposes such as propagating malware, impersonate phishing pages to steal sensitive data or redirect victims to other malicious targets.,,,,In this paper, using thousands of web proxy URLs crawled, we performed a large-scale study on the DOM (Document Object Model) structure features...
Nowadays cloud services have become a cost-effective platform for sharing data and performing large scale computations. As outsourcing data to a third party involves security and privacy concerns, data should be sent to the cloud in encrypted form. To handle access control on encrypted cloud data, Ciphertext-Policy Attribute-based Encryption (CP-ABE) has become very popular. In this scheme data can...
The current ecosystem of network elements, such as switches and appliances, is largely dominated by devices supplied and sold with a bundled operating system, and software dedicated to manage the device's forwarding hardware, however, these platforms are not open-source and cannot be arbitrarily customized, and there is no cost transparency or flexibility in choosing software different to the bundled...
The latest approaches for flexible assembly and process-integrated quality control of large components require global metrologic reference systems for various tasks, e.g. navigation of mobile transport units, control of cooperating robots or local inspection with handheld devices. While cooperative and competitive approaches for data fusion of multi-sensor metrologic systems already exist, a reference...
DC distribution is emerging as a solution for data centers, however the optimal system architectures have not been established in the industry. This paper first reviews the most recent studies, products and activities of DC distribution in data centers. A hybrid AC and DC distribution architecture is introduced by using both 415V AC and 380V DC together to achieve the data center reliability requirements...
This study aims to design a web technology based Emergency System (SmartER) system, which will enable the doctors and nurses to perform the patient related procedures more quickly and smoothly in the emergency departments. SmartER is not just software, it is planned as a system that includes a monitor screen to be mounted on the wall, a barcode bracelet for the patients, mobile devices to be used...
Long transactions, high concurrency, and frequent activity situations occur in many areas. The intermediate process of long transactions in the process of execution is more, in the process, therefore, can not avoid frequent access to the data, the system overhead of the data access process is relatively large, which reduces the efficiency of the system and increase the pressure of the server. The...
Cluster computing combines the resources of multiple computers as they act like a single high-performance computer. In this study, a computer cluster consisting of Lustre distributed file system with one cluster server based on Slurm resource management system and thirteen calculation nodes were built by using available and inert computers that have different processors. Different bioinformatics algorithms...
For safe and reliable operation of lithium-ion batteries on electric vehicles (EVs), the online monitoring and states estimation of the batteries is necessary. To make it convenient for every vehicle owner to monitor the battery status of their vehicles anytime and anywhere, we designed a real-time Android-based monitoring system for lithium-ion batteries on EVs, which achieves an integration monitoring...
With the rapid development of the Internet, especially in recent years, the development of mobile Internet is increasingly rapid. Message push, which is an important way for mobile client to publish information and make communication, plays a significant role in mobile Internet. MQTT protocol is one of the implementation technologies of message push in Android system with low power consumption and...
In order to improve the quality of teaching of Japanese intensive reading courses, improve the quality of higher education, improve the quality of personnel training, and improve the level of scientific research, strengthen the social service ability, optimize the Japanese intensive reading courses in discipline. Put forward the curriculum design of Web network based on the teaching of Japanese intensive...
In today's highly competitive market, the industry must focus on production yield to keep a competitive advantage. Through Automatic Optical Inspection (AOI) or Automated Visual Inspection (AVI), products can be monitored the situation and improved the quality of production. With the development of network technology, operators can use the graphical user interface (GUI) to capture remote visual images...
With the continuous development of communication technology, Unified Communication (UC) has also attracted much attention. At present, most of the Unified Communication servers are deployed on virtual machines, but virtual machines have the characteristics of large resource occupation, slow startup speed, poor flexibility and low efficiency, which brings some problems. In contrast, container technology...
Precision agriculture relies on real-time data gathering and analysis to maximize yield, minimize environmental impact and reduce cost, which has been envisioned as a new paradigm to revolutionize modern agriculture. However, the collection of farming data, especially geospatial data, raises concerns about potential privacy leakage. In this paper, we propose a novel scalable and private continual...
In most existing remote-control services for ECHONET Lite devices, a controller outside the home network can be used to control ECHONET Lite devices in the home network using a remote-control support server installed on the Internet. However, if the service provider ends the service, a user cannot control these devices from outside the house. This paper proposes a secure end-to-end remote-control...
A content delivery network (CDN) is composed of several edge servers which are distributed in different regions and provide web objects locally. If a web client sends one request to an edge server that has no available cache, i.e., cache miss, this edge server must download web objects from other edge servers or the origin server and then store into the cache. In this paper, we study and implement...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.