Search results for "Cluster computing"

showing 10 items of 120 documents

Efficient anomaly detection on sampled data streams with contaminated phase I data

2020

International audience; Control chart algorithms aim to monitor a process over time. This process consists of two phases. Phase I, also called the learning phase, estimates the normal process parameters, then in Phase II, anomalies are detected. However, the learning phase itself can contain contaminated data such as outliers. If left undetected, they can jeopardize the accuracy of the whole chart by affecting the computed parameters, which leads to faulty classifications and defective data analysis results. This problem becomes more severe when the analysis is done on a sample of the data rather than the whole data. To avoid such a situation, Phase I quality must be guaranteed. The purpose…

Computer scienceSample (material)0211 other engineering and technologies02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]01 natural sciences[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing010104 statistics & probabilitysymbols.namesake[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]ChartControl chartEWMA chart0101 mathematics021103 operations researchData stream miningbusiness.industryPattern recognition[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]OutliersymbolsAnomaly detection[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Artificial intelligence[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessGibbs sampling
researchProduct

A new autonomous data transmission reduction method for wireless sensors networks

2018

International audience; The inherent limitation in energy resources and computational power for sensor nodes in a Wireless Sensor Network, poses the challenge of extending the lifetime of these networks. Since radio communication is the dominant energy consuming activity, most presented approaches focused on reducing the number of data transmitted to the central workstation. This can be achieved by deploying both on the workstation and the sensor node a synchronized prediction model capable of forecasting future values. Thus, enabling the sensor node to transmit only the values that surpasses a predefined error threshold. This mechanism offers a decrease in the cost of transmission energy f…

Computer sciencebusiness.industryReal-time computing020206 networking & telecommunications[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technology[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation7. Clean energy[INFO.INFO-IU]Computer Science [cs]/Ubiquitous ComputingReduction (complexity)[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]Transmission (telecommunications)[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]020204 information systemsSensor node0202 electrical engineering electronic engineering information engineeringWireless[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessWireless sensor networkEnergy (signal processing)Data transmissionData reduction2018 IEEE Middle East and North Africa Communications Conference (MENACOMM)
researchProduct

Efficient Hybrid Emergency Aware MAC Protocol for Wireless Body Sensor Networks

2018

International audience; In Body Sensor Networks (BSNs), two types of events should be addressed: periodic and emergency events. Traffic rate is usually low during periodic observation, and becomes very high upon emergency. One of the main and challenging requirements of BSNs is to design Medium Access Control (MAC) protocols that guarantee immediate and reliable transmission of data in emergency situations, while maintaining high energy efficiency in non-emergency conditions. In this paper, we propose a new emergency aware hybrid DTDMA/DS-CDMA protocol that can accommodate BSN traffic variations by addressing emergency and periodic traffic requirements. It takes advantage of the high delay …

Computer sciencedelayAccess control02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]DTDMAlcsh:Chemical technology01 natural sciencesBiochemistryArticleAnalytical Chemistry[INFO.INFO-IU]Computer Science [cs]/Ubiquitous ComputingBSN[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]energy consumption0202 electrical engineering electronic engineering information engineeringWirelesslcsh:TP1-1185Electrical and Electronic EngineeringInstrumentationMACbusiness.industryNetwork packet010401 analytical chemistryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunicationsEnergy consumption[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationAtomic and Molecular Physics and Optics0104 chemical sciences[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]packet drop[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessWireless sensor networkEfficient energy useComputer networkDS-CDMAOPNETSensors
researchProduct

A Generic Approach to Scheduling and Checkpointing Workflows

2018

This work deals with scheduling and checkpointing strategies to execute scientific workflows on failure-prone large-scale platforms. To the best of our knowledge, this work is the first to target fail-stop errors for arbitrary workflows. Most previous work addresses soft errors, which corrupt the task being executed by a processor but do not cause the entire memory of that processor to be lost, contrarily to fail-stop errors. We revisit classical mapping heuristics such as HEFT and MinMin and complement them with several checkpointing strategies. The objective is to derive an efficient trade-off between checkpointing every task (CkptAll), which is an overkill when failures are rare events, …

Computer scienceworkflowDistributed computing02 engineering and technologyTheoretical Computer ScienceScheduling (computing)résiliencecheckpointfail-stop error0202 electrical engineering electronic engineering information engineeringRare eventsOverhead (computing)[INFO]Computer Science [cs]Resilience (network)resilienceComplement (set theory)020203 distributed computing020206 networking & telecommunications020202 computer hardware & architecture[INFO.INFO-PF]Computer Science [cs]/Performance [cs.PF]Task (computing)WorkflowHardware and Architectureerreur fatale[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]HeuristicsSoftware
researchProduct

"Table 29" of "Tuning and test of fragmentation models based on identified particles and precision event shape data."

1996

Differential 3-jet rate for the Durham Algorithm. Corrected to final state particles. YCUT is the jet finding cutt-off parameter.

DN/DSIGE+ E- --> 3JETAstrophysics::High Energy Astrophysical PhenomenaE+ E- ScatteringExclusiveHigh Energy Physics::Experiment91.2Single Differential DistributionJet ProductionComputer Science::Distributed Parallel and Cluster Computing
researchProduct

FRIPON: a worldwide network to track incoming meteoroids

2020

Context. Until recently, camera networks designed for monitoring fireballs worldwide were not fully automated, implying that in case of a meteorite fall, the recovery campaign was rarely immediate. This was an important limiting factor as the most fragile - hence precious - meteorites must be recovered rapidly to avoid their alteration. Aims. The Fireball Recovery and InterPlanetary Observation Network (FRIPON) scientific project was designed to overcome this limitation. This network comprises a fully automated camera and radio network deployed over a significant fraction of western Europe and a small fraction of Canada. As of today, it consists of 150 cameras and 25 European radio receiver…

DYNAMICS[INFO.INFO-AR]Computer Science [cs]/Hardware Architecture [cs.AR]MeteorsComputer scienceRadio receiver[INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM]Surveys010502 geochemistry & geophysicsTrack (rail transport)01 natural sciencesMeteorites meteors meteoroidslaw.inventionPlanets and planetary system[INFO.INFO-TS]Computer Science [cs]/Signal and Image ProcessingMethods: observationallaw[INFO.INFO-RB]Computer Science [cs]/Robotics [cs.RO]meteoroids010303 astronomy & astrophysicsComputingMilieux_MISCELLANEOUSObservational methodsEarth and Planetary Astrophysics (astro-ph.EP)meteoroids -surveys -methods: observational -interplanetary medium[SDU.ASTR]Sciences of the Universe [physics]/Astrophysics [astro-ph]ORIGIN[INFO.INFO-AO]Computer Science [cs]/Computer Arithmeticmeteorites meteors meteoroids – surveys – methods: observational – interplanetary mediumMeteoroidsRECOVERYORBITMeteoriteFully automatedInterplanetary medium; Meteorites meteors meteoroids; Methods: observational; Surveys[INFO.INFO-TI]Computer Science [cs]/Image Processing [eess.IV][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]Astrophysics - Instrumentation and Methods for Astrophysics[SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processingFLUXReal-time computingfripon[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS]FOS: Physical sciencesContext (language use)CAMERA[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE][SPI.AUTO]Engineering Sciences [physics]/Automatic[SDU.STU.PL]Sciences of the Universe [physics]/Earth Sciences/Planetology0103 physical sciencesFIREBALL NETWORKobservational [Methods]meteorsInstrumentation and Methods for Astrophysics (astro-ph.IM)0105 earth and related environmental sciencesMeteoroidINNISFREE METEORITE[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]Astronomy and AstrophysicsMETEORITE FALLMeteorites meteors meteoroidCamera networkSpace and Planetary Science[SDU]Sciences of the Universe [physics]Interplanetary spaceflightmeteroids trackingmeteoroids - surveys - methods: observationalSYSTEMInterplanetary mediumAstrophysics - Earth and Planetary AstrophysicsMeteorites
researchProduct

Analyzing big datasets of genomic sequences: fast and scalable collection of k-mer statistics

2019

Abstract Background Distributed approaches based on the MapReduce programming paradigm have started to be proposed in the Bioinformatics domain, due to the large amount of data produced by the next-generation sequencing techniques. However, the use of MapReduce and related Big Data technologies and frameworks (e.g., Apache Hadoop and Spark) does not necessarily produce satisfactory results, in terms of both efficiency and effectiveness. We discuss how the development of distributed and Big Data management technologies has affected the analysis of large datasets of biological sequences. Moreover, we show how the choice of different parameter configurations and the careful engineering of the …

Data AnalysisFOS: Computer and information sciencesTime FactorsTime FactorComputer scienceStatistics as TopicBig dataApache Spark; distributed computing; performance evaluation; k-mer countinglcsh:Computer applications to medicine. Medical informaticsBiochemistryDomain (software engineering)Databases03 medical and health sciences0302 clinical medicineStructural BiologyComputer clusterStatisticsSpark (mathematics)Molecular Biologylcsh:QH301-705.5030304 developmental biology0303 health sciencesGenomeSettore INF/01 - InformaticaBase SequenceNucleic AcidApache Sparkbusiness.industryResearchApache Spark; Distributed computing; k-mer counting; Performance evaluation; Algorithms; Base Sequence; Software; Time Factors; Data Analysis; Databases Nucleic Acid; Genome; Statistics as TopicApplied Mathematicsk-mer countingDistributed computingComputer Science ApplicationsAlgorithmData AnalysiComputer Science - Distributed Parallel and Cluster Computinglcsh:Biology (General)030220 oncology & carcinogenesisScalabilityPerformance evaluationlcsh:R858-859.7Algorithm designDistributed Parallel and Cluster Computing (cs.DC)Databases Nucleic AcidbusinessAlgorithmsSoftware
researchProduct

Distributed Real-Time Sentiment Analysis for Big Data Social Streams

2014

Big data trend has enforced the data-centric systems to have continuous fast data streams. In recent years, real-time analytics on stream data has formed into a new research field, which aims to answer queries about "what-is-happening-now" with a negligible delay. The real challenge with real-time stream data processing is that it is impossible to store instances of data, and therefore online analytical algorithms are utilized. To perform real-time analytics, pre-processing of data should be performed in a way that only a short summary of stream is stored in main memory. In addition, due to high speed of arrival, average processing time for each instance of data should be in such a way that…

Data streamFOS: Computer and information sciencesComputer Science - Computation and LanguageComputer sciencebusiness.industryData stream miningSentiment analysisBig dataMachine Learning (stat.ML)Databases (cs.DB)Data structurecomputer.software_genreField (computer science)Computer Science - Information RetrievalTree (data structure)Computer Science - DatabasesComputer Science - Distributed Parallel and Cluster ComputingAnalyticsStatistics - Machine LearningData miningDistributed Parallel and Cluster Computing (cs.DC)businesscomputerComputation and Language (cs.CL)Information Retrieval (cs.IR)
researchProduct

Toward fast and accurate emergency cases detection in BSNs

2020

International audience; In body sensor networks (BSNs), medical sensors capture physiological data from the human body and send them to the coordinator who act as a gateway to health care. The main aim of BSNs is to save peoples' lives. Therefore, fast and correct detection of emergencies while maintaining low-energy consumption of sensors is essential requirement of BSNs. In this study, the authors propose a new adaptive data sampling approach, where the sampling ratio is adapted based on the sensed data variation. The idea is to use the modified version of the cumulative sum (CUSUM) algorithm (modified CUSUM) that they previously proposed for wireless sensor networks to monitor the data v…

Data variabilityProperty (programming)Computer science010401 analytical chemistryReal-time computing020206 networking & telecommunicationsCUSUM02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]01 natural sciences[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationIndustrial and Manufacturing Engineering0104 chemical sciences[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]Data samplingSampling (signal processing)[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Default gateway0202 electrical engineering electronic engineering information engineering[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]Wireless sensor network
researchProduct

"Table 19" of "Measurement of event shape and inclusive distributions at s**(1/2) = 130-GeV and 136-GeV."

1997

2-jet rate for the Durham Algorithm.

Dijet Production133.0Astrophysics::High Energy Astrophysical PhenomenaE+ E- ScatteringIntegrated Cross SectionExclusiveHigh Energy Physics::ExperimentJet ProductionE+ E- --> 2JETCross SectionSIGComputer Science::Distributed Parallel and Cluster Computing
researchProduct