configurable system
Recently Published Documents


TOTAL DOCUMENTS

62
(FIVE YEARS 1)

H-INDEX

9
(FIVE YEARS 0)

2021 ◽  
Vol 251 ◽  
pp. 04005
Author(s):  
David Lawrence

The Hall-D Online Skim System (HOSS) was developed to simultaneously solve two issues for the high intensity GlueX experiment. One was to parallelize the writing of raw data files to disk in order to improve bandwidth. The other was to distribute the raw data across multiple compute nodes in order to produce calibration skims of the data online. The highly configurable system employs RDMA, RAM disks, and zeroMQ driven by Python to simultaneously store and process the full high intensity GlueX data stream.





Author(s):  
Romeo E. Balcita ◽  
◽  
Thelma D. Palaoag

School have different departments and offices with interrelated functionalities that needs one’s cooperation in order to function well. Offices are scattered across the campus and transfer of information is affected. The need to build an integrated School Management System using a centralized database will make school services of better quality. The need to integrate technologies like barcodes, use of internet, video cameras, sensors and the use of a better framework are needed to cope up with the changing needs of the society and in providing quality school service. Thus this study aimed to build such system, implement the system and identify the level of acceptability. Features of the system include enrollment, assessment, report generation and providing decision support module. The system is based from a standardized school management framework derived from different existing school management systems. This is under qualitative as well as descriptive research. Agile AWE model is used in the project development. This is implemented in an institution that uses manual process of school management. Manager, staff, teachers, students and guardian will provide the needed system requirements and at the same time they will be the respondents in getting the level of acceptability. Feedbacks are continuously gathered and helps identify possible improvements. This system is beneficial to institutions currently using manual process in their departments. This is a fully functional and configurable system that will suit to the needs and surely provide quality service.



2019 ◽  
Vol 10 (3) ◽  
pp. 19-37
Author(s):  
Ram Gouda ◽  
Chandraprakash V.

The combinatorial strategy is useful in the reduction of the number of input parameters into a compact set of a system based on the combinations of the parameters. This strategy can be used in testing the behaviour that takes place when the events are allowed to be executed in an appropriate order. Basically, in the software systems, for the highly configurable system, the input configurations are based on the constraints, and the construction of this idea undergoes various kinds of difficulties. The proposed Jaya-Bat optimization algorithm is developed with the combinatorial interaction test cases in an effective manner in the presence of the constraints. The proposed Jaya-Bat based optimization algorithm is the integration of the Jaya optimization algorithm (JOA) and the Bat optimization algorithm (BA). The experimentation is carried out in terms of average size and the average time to prove the effectiveness of the proposed algorithm. From the results, it is clear that the proposed algorithm is capable of selecting the test cases optimally with better performance.



2019 ◽  
Vol 2 (4) ◽  
pp. 285-292
Author(s):  
Zakariya Ahmed Nadji ◽  
Boudour Rachid ◽  
Abdourazek Souahi

Background:Assisting people with severe physical limitations with information technology has been an active area of research in recent years. Many researchers’ efforts are built on assistive devices which are often used to offset the impact of the resulted physical impairments.The Assistive Context-Aware Toolkit (ACAT) is the widely known project in this area. After being released as open source, the developers’ community helped to integrate many languages such as French and Spanich. However, many languages are still messing and to the best of our knowledge, the Arabic-speaking users still can not use the platform as no significant effort to integrate the Arabic language have been previously undertaken.Methods:This paper firstly, provides an overview on ACAT; the specifically-developed platform by Intel Labs for Dr. Stephen Hawking. Besides, it describes the ways in which ACAT may be used to enhance the capacity to take part in fundamental and instrumental activities of every day living and upgrade one's autonomy in general.Secondly, we outline our contributions in integrating the Arabic language into the keyboard, the intelligent predictive text engine and all interfaces of this unique and highly configurable system. Results:Our integration evolved after resolving many issues and we succeeded in integrating the Arabic language in interfaces, keyboard and word prediction engine. Most of other ACAT features (Facial gesture recognition, Mouse Navigation., etc) are functional. Conclusion:This work is a step forward to make the intel ACAT platform completely available in Arabic language. Therefore, Arabic-speaking patient can now get the benefits from this platform and are able to perform common tasks such as documents editing and management, Web surfing, writing emails and above all, communicating with others easily.The Arabic Text-to-speech engine integration is planned for future works .





2018 ◽  
Vol 7 (2.19) ◽  
pp. 94
Author(s):  
Anwar Basha.H ◽  
S Amrit Sai ◽  
Sanjnah A ◽  
Srimathi M

Cloud computing facilitates ubiquitous access to shared pool of configurable system resources and services over the Internet. Often due to shared access to this massive amount of data there is equal chances of risk. Transferring sensitive information in the form of text, audio or video, over the cloud one cannot guarantee the safety of the file. This paper assesses the effect of transmission of High Definition videos with the help of cloud-based servers that will improve the security of data being transmitted as well as enhance the quality of experience for end-users. We propose to share video contents to a selective group of people using the Time Domain Attribute based Access Control(TAAC) schema and generate keys using cryptographic method which gives the much needed protection to access these videos. Further stegnographic approaches are practised to maintain the data confidentiality.  



Sign in / Sign up

Export Citation Format

Share Document