The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Constant ransomware attacks achieve to evade multiple security perimeters, because its strategy is based on the exploitation of users-the weakest link in the security chain-getting high levels of effectiveness. In this paper, an in-depth analysis of the anatomy of the ransomware is develop, and how they combine technology with manipulation, through social engineering, to meet their goals and compromise...
Protein sequence classification is increasingly crucial in the current “biological information sciences” epoch, where researchers hammer at functional genomics and proteomics technologies for predicting the function of large-scale new proteins. This has sparked interest in the methods which do not rely on traditional sequence alignment, but prefer machine learning approaches. In this paper, we present...
We provide a cloud-based journey planner for public transport built upon an efficient core routing engine that updates efficiently timetable information in case of delays. We describe our mobile application along with a service that allows users to assess the suggested journeys offered by the application, built on top of an IoT/FIRE+ infrastructure. Our journey planner contributes to the establishment...
Cloud computing depends critically on large data centers connected by a high-speed optical network. A fault-tolerant communication scheme to handle requests for communication in such a system is essential. In this paper we have proposed an optimal approach to the problem of developing a path-protection scheme to handle communication requests in data center (DC) networks. We have formulated our problem...
In this paper it is presented a new application of Levenshtein distance algorithm, for the selection of choices in a vocabulary quiz. Levenshtein distance is a measure for the similarity of two strings. In order to make the quiz more difficult, the choices for the correct word are selected using the calculated degree of similarity with the correct word. We developed a Java graphical application that...
In the large-scale Wireless Metropolitan Area Network (WMAN) consisting of many wireless Access Points (APs),choosing the appropriate position to place cloudlet is very important for reducing the user's access delay. For service provider, it isalways very costly to deployment cloudlets. How many cloudletsshould be placed in a WMAN and how much resource eachcloudlet should have is very important for...
Longest Prefix Match (LPM) is a basic and important function for current network devices. Hash-based approaches appear to be excellent candidate solutions for LPM with the capability of fast lookup speed and low latency. The number of hash table probes, i.e. the search path of a hash-based LPM algorithm, directly determines the lookup performance. In this paper, we propose Ω-LPM to improve the lookup...
Quadratic assignment problems one of combinatorial optimization problems that pays to number of facilities to number of places. The objective is to minimize the cost. QAP is one of the degree of complexity of hard problems deterministic algorithms are able to solve smaller sample problem. Fast local search used to solve qap. but despite the wider space exploration. There are not certain views for...
Survivability of contents/files in data centers, when a disaster occurs, is becoming a major challenge in designing cloud-based services. To handle such a situation, a robust communication protocol is needed, so that provisions can be made to allocate an alternative fault-free path, when a disaster disrupts the path used for data communication before the disaster occurs. In this work we have presented...
This paper presents a means of tuning an adaptive internal model principle based signal identification algorithm whose computational costs are low enough to allow a realtime implementation. The algorithm allows an instantaneous Fourier decomposition of nonstationary signals that have a strongly predictable component. Previous work showed how the dynamics of the algorithm could be chosen to be represented...
Cloud computing is a type of parallel and distributed system for dynamically provisioning on-demand services. Customers and enterprises can employ cloud services including software, platforms and infrastructure to improve the scalability of their services and handle stochastic demands from users. However, random arrival tasks from users have different load sizes and deadline requirements that need...
Recently, due to the popularity of Web 2.0, considerable attention has been paid to the opinion leader discovery in social network. By identifying the opinion leaders, companies or governments can manipulate the selling or guiding public opinion, respectively. Additionally, detecting the influential comments is able to understand the source and trend of public opinion formation. However, mining opinion...
We consider a class of mixed integer programs where the problem is convex except for a vector of discrete variables. Two methods based on the Alternating Direction Method of Multipliers (ADMM) are presented. The first, which has appeared in the recent literature, duplicates the discrete variable, with one copy allowed to vary continuously. This results in a simple projection, or rounding, to determine...
The School bus routing and scheduling can be treated as a multi-objective Vehicle Routing Problem (VRP) that helps to transport the students in the safest, most economical and convenient way. The objective of this paper is to optimize the overall transportation cost by minimizing the fleet of vehicles and time spent in the journey. In this research, a Geographical Information System (GIS) based solution...
In modern world, due to enormous demand for the cloud storage there are high chances of data duplication. Hence, redundancy create problem by increasing storage space and so storage cost. Inline Deduplication used to check duplicity before uploading data. Sometimes while restoring data failures or corrupting data can heavily create problem for users. Erasure coding can be used to encoding and storing...
We study the dynamic energy optimization problem in data centers. We formulate and solve the following offline problem: given a set of jobs to process, where the jobs are characterized by arrival instances, required processing time, and completion deadlines, and given the energy requirements of switching servers ON or OFF, in which time-slot which server has to be assigned to which job, and in which...
Finding an optimal block size for a given sparse matrix forms an important problem for storage formats that partition matrices into uniformly-sized blocks. Finding a solution to this problem can take a significant amount of time, which, effectively, may negate the benefits that such a format brings into sparse-matrix computations. A key for an efficient solution is the ability to quickly iterate,...
The paper presents the investigation of wave occurrences of two geometrically non-linear elastic coaxial cylindrical shells model of Kirchhoff-Love type, containing viscous incompressible liquid between them, as well as inside. The difference schemes of Crank-Nicholson type are obtained for the considered equations system by taking into account liquid impact and with the help of Gröbner bases construction...
Nowadays, big data problems are ubiquitous, which in turn creates huge demand for data-intensive computing. The advent of Cloud Computing has made data-intensive computing much more accessible and affordable than ever before. One of the crucial issues that can significantly affect the performance of data-intensive applications is the load balance among cluster nodes. In this paper, we address the...
In this paper, an Aggregation-Division Model (ADM) is proposed to simulate the clustering characteristics of nodes in cyberspace and to describe the dynamic evolution process of the community system structure. Based on Cluster-Cluster Aggregation (CCA) model, using the random walk and collision of discrete single particle to simulate the communication and relationship establishment of nodes in social...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.