The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Due to the advances of wireless sensor networks, radiofrequency identification (RFID) and Web-based services, large volume of devices have been interconnected to the Internet of Things (IoT). In addition, the tremendous number of IoT services provided by service providers arises an urgent need to propose effective recommendation methods to discover suitable services to users. In this paper, we propose...
Cheetah flows, which are high-rate flows, can cause increased packet delays and losses in other flows. Leveraging the flexibility offered by the NFV paradigm, our proposed Cheetah Flow Identification Network Function (CFINF) uses a novel method in which a new measure, short-duration flight rate, which is the rate of a flight of packets received over a fixed (short) time interval, is computed and compared...
We present a novel input sensitive analysis of a deterministic online algorithm \cite{r_approx16} for the minimum metric bipartite matching problem. We show that, in the adversarial model, for any metric space \metric and a set of n servers S, the competitive ratio of this algorithm is O(\mu_{\metric}(S)\log^2 n); here \mu_{\metric}(S) is the maximum ratio of the traveling salesman tour and the diameter...
Failure modes and effects analysis (FMEA) is a powerful and proactive quality tool for defining, detecting, and identifying potential failure modes and their effects. However, conventional FMEA process is sometimes difficult to implement due to workload required and subjectivity of the evaluations performed. Hence, automation of this tool can be useful for some application domains to objectively evaluate...
Cluster computing combines the resources of multiple computers as they act like a single high-performance computer. In this study, a computer cluster consisting of Lustre distributed file system with one cluster server based on Slurm resource management system and thirteen calculation nodes were built by using available and inert computers that have different processors. Different bioinformatics algorithms...
The twenty most visited museums in Italy (over the total number of 4.976) attract one third of the entire visitors population. This results into a small number of very famous overcrowded museums (with an average waiting time of two hours) and a myriad of still beautiful but empty museums. In order to reduce the queuing time outside one of those famous museums, we have been asked to produce a mobile...
Dynamic Proof of Storage (PoS) is a conducive cryptographic rudimentary technology that empowers a client to cohere the respectability of outsourced and in addition insourced records and to proficiently refresh the documents in a server. A multi-client needs the protected customer side cross-client replica method, enabling a client to avoid the transferring procedure, when different proprietors of...
In this era, the web usage mining plays one of the important role in analyzing and improving performance of web applications. Initially in this paper, the concept of web usage mining has been introduced along with Improved AprioriAll algorithm which is the base algorithm for the proposed tool along with its limitation. The improved approach is discussed which integrates sequential pattern mining with...
The article is devoted to the search for ways to protect the data privacy for Internet of things. Different technologies and algorithms of privacy protection are considered, their computing and energy intensity is investigated. Prototyping is performed on the FPGA of the Internet of things. Searching for ways to minimize energy consumption and computing costs of the Internet of things with algorithms...
Mobile e-health is one of the Internet of Things application that assists the healthcare organization in providing better healthcare services. Development of wireless sensor networking area has greatly increased the feasibility of a mobile e-health system since it provides wireless communication technology with promising sensor network applications. However, mobile e-health is subjected to a lot of...
The weighted k-server problem is a natural generalization of the k-server problem where each server has a different weight. We consider the problem on uniform metrics, which corresponds to a natural generalization of paging. Our main result is a doubly exponential lower bound on the competitive ratio of any deterministic online algorithm, that essentially matches the known upper bounds for the problem...
This paper deals with the ofï-line route planning of Automated Guided Vehicles (AGVs). We propose a conflict-free route planning approach for the AGVs' control system in a warehouse system. The candidate routes are determined by using the improved Dijkstra's algorithm. The potential conflicts are detected and classified upon the comparison of node coordinates and occupancy times. A self-adaptive strategy...
Blockchain is the basic technology of bitcoin. With the value appreciation and stable operation of bitcoin, blockchain is attracting more and more attention in many areas. Blockchain has the characteristics of decentralization, stability, security, and non-modifiability. It has the potential to change the network architecture. The consensus algorithm plays a crucial role in maintaining the safety...
With the development of cloud computing, storage of whole world started shifting to the cloud. Management and security of such a large data was very difficult, to lower the security issues, Tokenization was developed, but for maintaining the security and safety of the Tokenization servers, there was need of a strong encryption algorithm. This paper presents Next Generation Encryption Algorithm, a...
The Development of technological system have grown up rapidly including how to vote. In general, people are accustomed to vote by using ballot paper. In Indonesia, this way is considered ineffective both in terms of cost, time, and governance. Due to this, the creation of an electronic voting system or known as e-voting based on android for the voting system implemented can be performed more easily...
Fuelled by the proliferation of smartphones, wireless traffic has experienced huge growth, which will continue with the emergence of ultra-broadband 5G applications, and exacerbate the capacity strain in cellular networks. Deployment of pico access points, reducing cell sizes and allowing more efficient reuse of limited radio spectrum, provides a powerful approach to cope with traffic hot spots and...
The problem of energy consumption is topical in every sphere of human activity nowadays. This problem is especially important for IT (information technologies), where the amount of data that needs to be processed is growing every day. In this paper PCPB (Power Consumption and Performance Balance) algorithm has been proposed. It is an energy-aware scheduling algorithm which is aimed at reducing power...
We discuss our submission to the HPEC 2017 Static Graph Challenge on k-truss decomposition and triangle counting. Our results use an algorithm called PKT (Parallel k-truss) designed for multicore systems. We are able to process almost all Graph Challenge datasets in under a minute on a 24-core server with 128 GB memory. For a synthetic Graph500 graph with 17 million vertices and 523 million edges,...
The possibilities of the analysis of structure of the corporate network structure based on the preliminary analysis of its information structure are shown. Methods of the description of hierarchical structure of the network and computation of its characteristics are offered.
Article presents method of storing and processing Big Data using object-oriented datatype in commercial relational database server. Methodology was presented based on genomic data. Additionally, some methods of pattern matching implemented in the object were described and commented. Due to set of numerical experiments based on real data the efficiency of the system was testified. Obtain results shows...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.