Gridifying Neuroscientific Pipelines

2010 ◽  
pp. 129-151
Author(s):  
David Manset

In recent times, innovative new e-Infrastructures have materialized all around the globe to address the compelling and unavoidably increasing demand on computing power and storage capacity. All fields of science have entered an era of digital explosion and thus need to face it with appropriate and scalable instruments. Amongst century’s cutting-edge technologies, the grid has become a tangible candidate which several initiatives have harnessed and demonstrated the added value of. Turning the concept into a concrete solution for Neurosciences, the neuGRID project aims to establish a grid-based e-Infrastructure providing neuroscientists with a powerful tool to address the challenge of developing and testing new markers of neurodegenerative diseases. In order to optimize the resulting grid and to deliver a user-friendly environment, neuGRID has engaged the process of migrating existing imaging and data mining toolkits to the grid, the so-called gridification, while developing a surrounding service oriented architecture of agnostic biomedical utilities. This chapter reports on a preliminary analysis of the issues faced in the gridification of neuroimaging pipelines and attempts to sketch an integration model able to cope with the several and heterogeneous applications used by neuroscientists.

Data Mining ◽  
2013 ◽  
pp. 1893-1915
Author(s):  
David Manset

In recent times, innovative new e-Infrastructures have materialized all around the globe to address the compelling and unavoidably increasing demand on computing power and storage capacity. All fields of science have entered an era of digital explosion and thus need to face it with appropriate and scalable instruments. Amongst century’s cutting-edge technologies, the grid has become a tangible candidate which several initiatives have harnessed and demonstrated the added value of. Turning the concept into a concrete solution for Neurosciences, the neuGRID project aims to establish a grid-based e-Infrastructure providing neuroscientists with a powerful tool to address the challenge of developing and testing new markers of neurodegenerative diseases. In order to optimize the resulting grid and to deliver a user-friendly environment, neuGRID has engaged the process of migrating existing imaging and data mining toolkits to the grid, the so-called gridification, while developing a surrounding service oriented architecture of agnostic biomedical utilities. This chapter reports on a preliminary analysis of the issues faced in the gridification of neuroimaging pipelines and attempts to sketch an integration model able to cope with the several and heterogeneous applications used by neuroscientists.


Author(s):  
MS. KRUTHI K. KUMAR ◽  
MRS. SHANTHI M.B. ◽  
DR. JITENDRANATH MUNGARA

The use of firewall has been widespread in all the emerging technologies such as Service Oriented Architecture, web services, cloud computing and so on. The term security itself is the most important task that has to be maintained in the real-time applications. Policies are enrolled in the security of the firewall where the quality of policies is to be maintained. The network administrator defines the policy as a rule. Managing the firewall policies, maintaining the risk analysis and also the conflicting nature that arise in the network, lack of systematic analysis mechanisms and tools used are often error prone. The distributed firewall is used to overcome the shortcomings of the traditional firewall. In this paper we represent a set of techniques such as, rule-based segmentation technique to identify the policy anomalies and effectively derive the anomaly resolution. Grid-based visualization technique, provide the policy anomaly information in a grid form, which helps in identifying the policy conflicts and finally the techniques to resolve the conflicts and the redundancy that arise in a single- or multi-firewall environment. We also discuss about the implementation of the visualization-based firewall policy analysis tool called Firewall Anomaly Management Framework (FAME), where all the techniques are used in a single tool and an approach to resolve the anomalies in an effective and efficient way.


Author(s):  
Simon Polovina ◽  
Simon Andrews

As 80-85% of all corporate information remains unstructured, outside of the processing scope of enterprise systems, many enterprises rely on Information Systems that cause them to risk transactions that are based on lack of information (errors of omission) or misleading information (errors of commission). To address this concern, the fundamental business concept of monetary transactions is extended to include qualitative business concepts. A Transaction Concept (TC) is accordingly identified that provides a structure for these unstructured but vital aspects of business transactions. Based on REA (Resources, Events, Agents) and modelled using Conceptual Graphs (CGs) and Formal Concept Analysis (FCA), the TC provides businesses with a more balanced view of the transactions they engage in and a means of discovering new transactions that they might have otherwise missed. A simple example is provided that illustrates this integration and reveals a key missing element. This example is supported by reference to a wide range of case studies and application areas that demonstrate the added value of the TC. The TC is then advanced into a Transaction-Oriented Architecture (TOA). The TOA provides the framework by which an enterprise’s business processes are orchestrated according to the TC. TOA thus brings Service-Oriented Architecture (SOA) and the productivity of enterprise applications to the height of the real, transactional world that enterprises actually operate in.


Author(s):  
Vasso Koufi ◽  
Flora Malamateniou ◽  
George Vassilacopoulos

Homecare is an important component of the continuum of care as it provides the potential to improve quality of life and quality of healthcare delivery while containing costs. Personal Health Record (PHR) systems constitute a technological infrastructure that can support greater flexibility for healthcare professionals and patients, thus allowing for more effective homecare services. In particular, PHRs are intended to reach patients outside of care settings, influence their behaviors and satisfy their demand for greater information and access. Moreover, PHRs can facilitate access to comprehensive real-time patient data for healthcare professionals thus enabling them to identify problems quickly (e.g. prior to scheduled appointments) and steer patients to appropriate facilities when needed. To this ends, PHR technology needs to evolve well beyond providing a consolidated patient record, in ways that make it more widely applicable and valuable to health systems. The development of applications and tools on top of PHR systems can allow the PHR to function as a platform for both patients and healthcare professionals to exchange information and interact with the health system (e.g., scheduling appointments electronically). This chapter presents a prototype PHR-based system that aims at supporting chronic disease management. In particular, it assists healthcare professionals in assessing an individual’s condition and in forming the appropriate treatment plan for him/her while it provides individuals with a user-friendly application for step-to-step guidance to their treatment plans. The system has been developed on the grounds of a service-oriented architecture where healthcare process automation is realized by means of dynamic, patient-related workflows.


2019 ◽  
Vol 16 (1) ◽  
pp. 45-74 ◽  
Author(s):  
Mladen Matejas ◽  
Kresimir Fertalj

Modern organizations need to understand and constantly improve their business processes (BPs) in order to make successful business decisions. This paper describes an integration model for building a Business Process Management Application (BPMA) and connecting the BPMA with legacy systems based on Service-Oriented Architecture (SOA). A BPMA is an application developed to support a BP performed by legacy application/s. A combination of multiple BPMAs provides support for multiple BPs and forms a BPM solution. The presented model is characterized by a simple co-dependence of the BPMA and the existing systems, minimal changes to the legacy applications and a maximal utilization of the existing functionalities. It enables the existing applications to function independently from the BPMA and simplifies the business data used in the BPMA. An extensive evaluation of the model was undertaken by experts from the BPM area. Its feasibility is demonstrated on a real-life business use case scenario.


2013 ◽  
pp. 299-313
Author(s):  
Simon Polovina ◽  
Simon Andrews

As 80-85% of all corporate information remains unstructured, outside of the processing scope of enterprise systems, many enterprises rely on Information Systems that cause them to risk transactions that are based on lack of information (errors of omission) or misleading information (errors of commission). To address this concern, the fundamental business concept of monetary transactions is extended to include qualitative business concepts. A Transaction Concept (TC) is accordingly identified that provides a structure for these unstructured but vital aspects of business transactions. Based on REA (Resources, Events, Agents) and modelled using Conceptual Graphs (CGs) and Formal Concept Analysis (FCA), the TC provides businesses with a more balanced view of the transactions they engage in and a means of discovering new transactions that they might have otherwise missed. A simple example is provided that illustrates this integration and reveals a key missing element. This example is supported by reference to a wide range of case studies and application areas that demonstrate the added value of the TC. The TC is then advanced into a Transaction-Oriented Architecture (TOA). The TOA provides the framework by which an enterprise’s business processes are orchestrated according to the TC. TOA thus brings Service-Oriented Architecture (SOA) and the productivity of enterprise applications to the height of the real, transactional world that enterprises actually operate in.


2016 ◽  
Vol 1 (1) ◽  
Author(s):  
Muhammad Aamir Nadeem

Cloud Computing is a recently emerged paradigm, for sure out of infancy but yet not matured, is aiming at provisioning of computing resources in most efficient and economical way. Virtualization is the key technique behind Cloud Computing. It adopts Service Oriented Architecture which enables its clients to transform their requirements problems into services thus benefited by the solution provided by the Cloud. Besides provisioning of computing and storage resources, it expanded the traditional threat environment. The vulnerabilities and threats to Cloud are the issues which if successfully overcome would make Cloud a digital fort for its users. This paper surveys the weaknesses in Cloud architecture, internet protocols, operating system and application software, and in crypto system. It also identifies the challenges related to Cloud security and counter measures to resolve those issues.


Sign in / Sign up

Export Citation Format

Share Document