The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With development of Multicore clusters the taskscheduling problem in heterogeneous cluster has become hot point of research. The method to solve this problem in Cloud computing is virtualization, which can make the heterogeneous nodes being isomorphic and then using MapReduce model for task scheduling in isomorphic nodes. But the approach has some shortcomings: virtualization itself will cause the...
The Information technology (IT) plays a key role in the functioning of the modern era. The evolution of computer is very fast. It improves the efficiency of processing, the capacity of memory and the transmission rate of network. The procurement department will procure the new resources. They did not know that equipment suit any budget because they may not track changes or the development of a computer...
Researchers frequently have to execute simulations that are computationally expensive. Instead of using dedicated computers to execute extensive simulations, our HTCondor system assigns these jobs to a pool of undedicated computing nodes. These computing nodes work on the submitted tasks and report the results back to the user. This paper examines the performance of an HTCondor system at our university...
Learner's knowledge assessment is very important in the e-learning system. Knowledge assessment is effective for knowledge gap discovery. Knowledge gap, Causes the learners do not understand educational content correctly. This paper presents a new method for learner's knowledge modeling based on knowledge gap discovery for concepts of educational content. There are two methods for learner's knowledge...
Network security analysts presently lack tools for routinely screening large collections of network traffic for structures of interest. This is particularly the case when the structures of interest are embodied as summaries of sets of related traffic, essentially behaviour descriptions. This paper sketches a methodology to provide such capability, in the context of flow data. The methodology generates...
FTP protocol is the application layer protocol which is to control two-way transmission of files between two computers on the Internet, It's a common approach to copy the file from the client to server within the enterprise network. However, traditional audit work is facing enormous challenges, though FTP protocol brings convenience to the operator, it may exist ultravires during the operation and...
Network security is being payed more and more attention nowadays, especially in the protection of enterprise intranet security has become the current research focus. This paper provides a method of monitoring illegal extra-connection of enterprise terminal devices based on flexible policy configuration, in the process, all the terminals that access to corporate intranet hosts and other devices will...
An important aspect of clinical work, especially in the intensive care unit (ICU) is the vigilant observation of patients' vital data on a various number of monitors and displays to allow for rapid decision-making which is often required in critical conditions. Most often, the presented data cannot be collected and used as a whole to aid the decision making by availability and comparison of all relevant...
Most of the detection approaches like Signature based, Anomaly based and Specification based are not able to analyze and detect all types of malware. Signature-based approach for malware detection has one major drawback that it cannot detect zero-day attacks. The fundamental limitation of anomaly based approach is its high false alarm rate. And specification-based detection often has difficulty to...
This paper proposes low-cost saline droplet measurement system (SDMS). The system can be used to check saline droplet of patients in each patient's bed in rural public hospital. By installing the measuring modules in all patients' beds, the system will show saline droplet status of each patient. So, nurses can accurately check saline droplet status of their patients on a computer including saline...
Currently, the amount of data is huge. Not only is the quantity of data growing in size, it is also becoming much more diverse and complex, significantly complicating the issues around its creation. It is increasingly important to improve and maintain infrastructure services for a long time. Therefore, this study uses an automated approach in which digital policies and strategies are represented as...
The recent proliferation of multi-constellation Global Navigation Satellite Systems (GNSS) is offering a great opportunity for ionosphere scintillation studies. Since 2009, our research team has established permanent and temporary portable ionosphere scintillation monitoring and data collection systems in Alaska, Ascension Island, Hong Kong, Peru, and Singapore to collect multi-constellation multi-frequency...
An input/output (I/O) device can incorporate mechanical devices that require physical movements, such as a hard drive seeking a track for a data read or write. Hence I/O operations on a computer can be extremely slow compared to data processing. When a program conducts many I/O operations, the processor often spends most idling as it waits for the I/O operations to complete. The same holds true for...
This paper presents the comparison study of different multiple-choice web-based formative assessment, namely peer driven assessment module of the web-based assessment and test analysis system (PDA-WATA), one of the most recent web-based assessment system, web-based quiz-game-like formative assessment system, named GAM-WATA, and Formative Assessment Module of WATA system FAM-WATA with traditionaly...
The betweenness centrality of a node is a measure related to the number of shortest path the node is involved with. It is, indeed, a measure of the importance of the node in the network, and in the recent years has been used intensively for network analysis. The major drawback of this measure is its high computational cost, and thus in the literature several works appeared providing ways of approximating...
India has many numbers of colleges and teaching is one of the major activities providing employment to number of people who like to give knowledge to the people. Today many colleges of rural area are facing common problem like bunking the college lectures also meet with the accidents. Indian department of education arises question to the department for their irresponsibility. Education department...
Computing grid are a set of unsymmetrical systems have provided a ground for sharing the computing resources. Regarding the facilities of grid and advantages of mobile agents and also the present problems reduction on distributed systems, the grid ground of “Alchemi” has been applied that is a low capacity system fixed with windows operating system. In this paper, changes have been made in Alchemi...
Due to the deficiency of data transmission speed and capacity of the GSM / GPRS network, in this paper we present the design of a data transmission system in the remote monitoring system of composite insulators, which is based on 3G and embedded technology. The program uses OK6410ARM11 as a controller, and uses AD3812_V2 as a 3G communication module. This paper briefly describes the hardware design,...
This project aimed to create a new communication system with high permeability, expandability reliability and which scope was appropriate to the environment of the distribution networks, enabling the implementation of monitoration, measurement and control of the devices on electricity distribution networks. The project was completed with field installation of a wireless mesh network fully functional,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.