platform independence
Recently Published Documents


TOTAL DOCUMENTS

57
(FIVE YEARS 11)

H-INDEX

5
(FIVE YEARS 1)

Author(s):  
Qibin Zhou ◽  
Qinggang Su ◽  
Peng Xiong

The assisted download is an effective method solving the problem that the coverage range is insufficient when Wi-Fi access is used in VANET. For the low utilization of time-space resource within blind area and unbalanced download services in VANET, this paper proposes an approximate global optimum scheme to select vehicle based on WebGIS for assistance download. For WebGIS, this scheme uses a two-dimensional matrix to respectively define the time-space resource and the vehicle selecting behavior, and uses Markov Decision Process to solve the problem of time-space resource allocation within blind area, and utilizes the communication features of VANET to simplify the behavior space of vehicle selection so as to reduce the computing complexity. At the same time, Euclidean Distance(Metric) and Manhattan Distance are used as the basis of vehicle selection by the proposed scheme so that, in the case of possessing the balanced assisted download services, the target vehicles can increase effectively the total amount of user downloads. Experimental results show that because of the wider access range and platform independence of WebGIS, when user is in the case of relatively balanced download services, the total amount of downloads is increased by more than 20%. Moreover, WebGIS usually only needs to use Web browser (sometimes add some plug-ins) on the client side, so the system cost is greatly reduced.


2021 ◽  
Author(s):  
Josué Bock ◽  
Jan Kaiser ◽  
Max Thomas ◽  
Andreas Bott ◽  
Roland von Glasow

Abstract. We present MISTRA-v9.0, a one dimensional (1D) atmospheric chemistry model. The model includes a detailed particle description with regards to the microphysics, gas-particle interactions, and liquid phase chemistry within particles. Version 9.0 is the first release of MISTRA as an open-source community model. A major review of the code has been performed along with this public version release to improve the user-friendliness and platform-independence of the model. In the past 20 years, MISTRA has been used in over 25 studies to address a wide range of scientific questions. The purpose of this public release is to maximise the benefit of MISTRA to the community by making the model freely available and easier to use and develop. This paper presents a thorough description of the model characteristics and components. We show some examples of simulations reproducing previous studies with MISTRA, finding that version 9.0 is consistent with previous versions.


Author(s):  
Peng Jiang ◽  
Kexin Yan ◽  
Haijian Chen ◽  
Hai Sun

As an important part of the evaluation reform, online evaluation system can effectively improve the efficiency of evaluation work, which has been paid attention by teaching institutions. The online evaluation system needs to support the safe and stable transmission of information between the client and the server, and socket protocol establishes the connection through the listening port, which can easily carry out the message transmission and process control. Because it can well meet the construction requirements of online evaluation system, it is applied in our study. The building of online evaluation system based on socket protocol includes the function design of students and teachers, data flow design, evaluation difficulty grading design and system implementation. The system uses Java language and MVC mode for development, which has good scalability and platform-independence. It realizes the paperless examination process and greatly reduces the workload of teachers. The contribution of this paper is mainly reflected in two aspects. One is to explore the construction of an online evaluation system based on the socket protocol, and it provide an Asynchronous IO technical solution for the network communication between the student and the server, which provides a reference for the development of similar systems. The second is to give the realization method of the difficulty classification of the evaluation, and classify the difficulty of the test questions, which lays the foundation for carrying out personalized testing and evaluation.


Author(s):  
Sandeep Kumar and Dr. Anu Rathee

In this modern time, people don’t want to invest their time in something processing. They just want to give an input and take an output immediately. This project is actually an application that we are developing which enables implementation of OMR using an ordinary WebCam. It provides tools to the user to check and calculate on the base of layout they want. The user can give Input through Webcam of system and take correct checked calculate output, distribute it among others from whom information is desired.. The scanned image files will then be provided as input to the software, processing will be done, value of filled fields will be extracted and then the data will be manipulated as instructed by the user. The implementation is done using Opencv and python. We are using Pycharm IDE so as to easily manage the graphical layout and all the resources. For the GUI Python was chosen mainly because of its platform independence and lightweight of the components in python.


2020 ◽  
pp. 55-62
Author(s):  
Iryna Khomytska ◽  
Vasyl Teslyuk ◽  
Iryna Bazylevych ◽  
Inna Shylinska

The developed mathematical support for authorship attribution software includes a combination of statistical methods (Student’s t-test, Kolmogorov-Smirnov’s test) and a statistical model for determining significant differences between styles. The combination of statistical methods allows us to enhance test validity of authorship attribution by obtaining the same results by the two methods applied. The model developed makes it possible to identify a consonant phoneme group with high style identification capability. The phoneme position in a word is taken into account. The greater number of significant differences is, the higher authorship identification capability of the phoneme group is. The developed system software is based on the algorithms of the used combination of methods and statistical model. The Java programming language provides platform independence. The minimized number of consonant phoneme groups makes the process of style and authorship attribution more automated. The obtained results of comparisons of the scientific, belles-lettres, conversational and newspaper styles are presented. The data obtained allows us to assert that the used combination of methods and the developed statistical model improve test validity of style and authorship attribution.


Author(s):  
Yaser Chaaban

Nowadays, micro-programming of machines becomes more common. It is a technique used in several fields such as Computer Engineering. Here it is worth mentioning that micro-programming is employed throughout the design process. As well, designing the control unit of digital computers needs micro-programming, which is more complex than assembly languages. In this field, micro-programs can be written as sequences of micro-instructions. In this context, distinguished teaching of micro-programming of machines requires a suitable and carefully chosen Computer Simulation Tool (CST). This research designs a computer hardware project that introduces a special simulator achieving an easy-to-use microprogramming environment and a user-friendly simulation tool. This tool presents a visualization environment in order to display the execution behaviour of microprograms. It is a model/tool designed as a java program to ensure platform independence. This paper presents the Minimax simulator, which is used in the Minimax project. This project is a part of a hardware practical course. Therefore, it is a simulator for microprogramming and hardware simulation. As a result, this simulator facilitates the process of micro-programming significantly enabling students to understand easily how a computer works. Here, two formal measures and metrics were presented to assess the implemented program, the execution time and the program length. Other results of this study showed how self-organized group work and project management can be accomplished.


2020 ◽  
Vol 12 (4) ◽  
pp. 61 ◽  
Author(s):  
Parminder Singh ◽  
Anand Nayyar ◽  
Avinash Kaur ◽  
Uttam Ghosh

Fog computing (FC) is used to reduce the energy consumption and latency for the heterogeneous communication approaches in the smart cities’ applications of the Internet of Everything (IoE). Fog computing nodes are connected through wired or wireless medium. The goal of smart city applications is to develop the transaction relationship of real-time response applications. There are various frameworks in real-world to support the IoE in smart-cities but they face the issues like security, platform Independence, multi-application assistance, and resource management. This article is motivated from the Blockchain and Fog computing technologies and presents a secured architecture Blockchain and Fog-based Architecture Network (BFAN) for IoE applications in the smart cities. The proposed architecture secures sensitive data with encryption, authentication, and Blockchain. It assists the System-developers and Architects to deploy the applications in smart city paradigm. The goal of the proposed architecture is to reduce the latency and energy, and ensure improved security features through Blockchain technology. The simulation results demonstrate that the proposed architecture performs better than the existing frameworks for smart-cities.


2020 ◽  
Vol 10 (1) ◽  
Author(s):  
Matthew Bashton ◽  
Robin Hollis ◽  
Sarra Ryan ◽  
Claire J. Schwab ◽  
John Moppett ◽  
...  

AbstractIn acute lymphoblastic leukaemia, MLPA has been used in research studies to identify clinically relevant copy number abnormality (CNA) profiles. However, in diagnostic settings other techniques are often employed. We assess whether equivalent CNA profiles are called using SNP arrays, ensuring platform independence. We demonstrate concordance between SNP6.0 and MLPA CNA calling on 143 leukaemia samples from two UK trials; comparing 1,287 calls within eight genes and a region. The techniques are 99% concordant using manually augmented calling, and 98% concordant using an automated pipeline. We classify these discordant calls and examine reasons for discordance. In nine cases the circular binary segmentation (CBS) algorithm failed to detect focal abnormalities or those flanking gaps in IKZF1 probe coverage. Eight cases were discordant due to probe design differences, with focal abnormalities detectable using one technique not observable by the other. Risk classification using manually augmented array calling resulted in four out of 143 patients being assigned to a different CNA risk group and eight patients using the automated pipeline. We conclude that MLPA defined CNA profiles can be accurately mirrored by SNP6.0 or similar array platforms. Automated calling using the CBS algorithm proved successful, except for IKZF1 which should be manually inspected.


10.29007/5945 ◽  
2019 ◽  
Author(s):  
Tarek Sobh ◽  
Awad Khalil

Nowadays, with the wide applications of distributed systems, web-based applications, and communications systems over the Internet for carrying data between users such as terminal client and computer/server or communications between different devices using a computer network, network security has become crucial requirement to ensure authentic received data during transmission. Authentication and encryption are basic procedures to ensure secure communications over a public network due to tamper-resistance and convenience in dealing with a password file. Most of the used protocols; HTTP, FTP, and SMTP of the Internet applications use text stream that is more and more vulnerable to attacks. Encryption represents the main security for the most computer applications.This work proposes enhanced secure actions for transferring data using FTP protocol by using a smart token. A smart token has the capabilities of the smart card, but more secured beside some interesting operations. A practical and secure user scheme, based on a smart token device, is proposed. A Secure Platform has been developed using implemented APIs and PKCS#11 as RSA standard interface. The proposed API is called SAFEST (Secure Actions for FTP Environment with Smart Token). SAFEST API wraps a standard protocol for implementing the communication between a token and the application using it. This API is a platform independent, scalable to support more functionality, optimizing token usage and adding more security for accessing token objects. The smart token can process the cryptographic key operations on its own rather than on the host computer, which supports high-level platform independence. In addition, through the proposed SAFEST API, standard interfacing to such token devices from any vendor can be implemented through using PKCS#11 interfaces, developed by RSA labs.


In this paper, a generic comparison between the Enterprise Public and Private Cloud is analyzed based on its features and service provided. Cloud computing technology is widely adopted in today's industry where large database applications are deployed. Every organization moving towards cloud will have to consider many factors such as security, portability, database size, platform independence, multi-tenancy, customer requirements and other related resources. The detailed study focuses on essential cloud characteristics, service models, and cloud operation models such as Integrated (Hybrid), Public, Internal (Private) and Community clouds. The outcome is an effective assessment of leading two Enterprise cloud technology service providers – ownCloud© and HP Public Cloud® and its implications on the organizations which used them for cloud based applications. ownCloud© is the preferred open source file system for organizations to access for solutions across the world. HP Cloud offered by Hewlett-Packard (HP) provides public, private, hybrid and community cloud based services for various enterprise and other large-scale business organizations. Both the Private Cloud and Public Cloud can be enhanced to protect the data from intrusion with various security features where multiple users share the same cloud for storing and retrieving data


Sign in / Sign up

Export Citation Format

Share Document