The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The data transfer in the Grid at CERN (the European Organization for Nuclear Research) has seen constant improvement, be it through optimizing the existing tools, GridFTP and GFAL2 or by adding new tools such as XRootd. Unfortunately, all these have reached the maximum limit in terms of throughput. They are limited not by the network infrastructure, but by the fact that they use a single source for...
The need for systems capable of conducting inferential analysis and predictive analytics is ubiquitous in a global information society. With the recent advances in the areas of predictive machine learning models and massive parallel computing a new set of resources is now potentially available for the computer science community in order to research and develop new truly intelligent and innovative...
Disk Pool Manager is a lightweight software which offers a simple way of creating a disk-based grid storage system. Its new, experimental features allow the deployment of very large file caches, which aim to provide a better experience for the users by storing previously accessed data in volatile disk pools and using them to serve subsequent requests much faster. After the disk pools are filled with...
The main issue with big data in cloud is the processed or used always need to be by third party. It is very important for the owners of data or clients to trust and to have the guarantee of privacy for the information stored in cloud or analyzed as big data. The privacy models studied in previous research showed that privacy infringement for big data happened because of limitation, privacy guarantee...
In context of manufacturing, numerous models are designed to appropriately represent the facility layout problem (FLP) and a variety of optimization methods have been applied to solve these models. The ultimate goal of these methods is to find optimal solutions, In regard to Swarm Intelligence (SI), Ant Colony Optimization (ACO) and Particle Swarm Optimization (PSO) are regarded as the most important...
In this paper we discuss the potential of the integrated GPU to accelerate sorting by performing a partial sort prior to a comparison based CPU sort. We experiment along with several CPU comparison based sorting algorithms and outline the performance gain for a random input data set. We then analyze different x86 SoC architectures, and show that by sorting chunks stored inside the onchip GPU memory,...
This paper presents how the throughput of a server is influenced by the applying a vertical scalability. The paper studies the results obtained in measuring the response time of the server and the processing time of the server when dealing with a large number of requests by modifying the configuration of the machine, increasing the number of cores the machine has and increasing the RAM capacity. This...
On-demand computing, Software-as-a-Service, Platform-as-a-Service, and in general Cloud Computing is currently the main approach by which both academic and commercial domains are delivering systems and content. Nevertheless there still remains a huge segment of legacy systems and application ranging from accounting and management information systems to scientific software based on classic desktop...
Good patient care means safe record-keeping practices. Never forget that the electronic health record (EHR) represents a unique and valuable human being: it is not just a collection of data that you are guarding, it is a life. Malicious codes are one of the significant reasons for the rising number of security violations of systems associated with the web or worked in an open domain. Some security...
The advances in internet innovation have made possible techniques for the conveyance of healthcare. Networking infrastructure and common access can encourage sharing of patient data and clinical information; make the internet a perfect tool for remote patient observing applications. In this paper, we portray an experimental model designed for monitoring and checking the health condition of the patients...
Physicians as the most important tool in the diagnosis of acute and chronic heart conditions leverage the Electrocardiogram (ECG) data. The huge volume of data that needs to be gathered; processed as well as transmitted burdens the communication channel by obstructing the implementation of the ECG applications in telemedicine and remote monitoring scenarios. This has triggered the need for computationally...
This paper presents a server-centric system used to gather and analyze the data coming from sensor nodes. We propose a general, easy-to-extend architecture that can be used in a seamless manner on any types of data, helping to mitigate failure and detect abnormal behavior. In order to decrease risks, the server side will analyze the data, modify trust values for each node and notify an administrator...
Important for cloud services the cloud computing share throw multiple clients, and it is more important to allocate resources for cloud service provider, cloud computing is an infrastructure that provides on demand network services, in relation, the most important feature of the cloud services is that user's data are hosted in remote. While taking benefit of this new emerging technology, users' fear...
Computer hardware is currently moving towards heavily parallelized architectures with multiprocessors, multicore and chip multithreaded designs. Cache memory, the fastest component of the memory hierarchy, adapts to this new kind of parallel systems in order to provide the promised performance increase. Current cache designs have limitations that can be transformed into optimization opportunities...
This paper introduces the design and implementation of a minimal system for Distributed Pair Programming applied in project based assignments for programming courses. The application allows for projects to be developed by random formed teams with completely anonymous members.
Multicore and multiprocessor based solutions are nowadays on an ascending path; the software tool-chain should keep the pace and design solutions that lead to the best use of the hardware. Cache memory is one hardware component, which evolved in the multicore context. Even so, the current cache designs have limitations that can be transformed into optimization opportunities on the compiler side. This...
As hardware becomes more flexible in terms ofprogramming, software APIs must expose hardware features ina portable way. Additions in the OpenCL 2.0 API expose threadcommunication through the newly defined work-group functions. In this paper we focus on two implementations of the work-groupfunctions in the OpenCL compiler backend for Intel's GPUs. Wefirst describe the particularities of Intel's GEN...
As hardware becomes more flexible in terms of programming, software APIs must expose hardware features in a portable way. Thread to thread communication is being exposed in OpenCL 2.0 through the newly defined work-group functions. In this paper we analyze the work-group broadcast functionality in the OpenCL compiler backend for Intel's GPUs. We first describe the particularities of Intel's GEN GPU...
Mathematicians have always been fascinated by the subject of finding the prime numbers of large composite numbers. They have studied various methods and have focused on developing several theories. Nowadays, this problem is of practical importance because the security of the public key cryptosystems depends on the difficulty of factoring public keys. The integer factorization algorithms have rapidly...
A lot of research has been carried out in the field of healthcare monitoring. In recent years, development of patient monitoring system has been emerged as an area of research. In this article, a patient monitoring system is proposed. The proposed framework integrated web services with multiple sensors controlled by Arduino Uno. Therefore, the Service Oriented Architecture (SOA) with Rich Internet...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.