Search results for "computer networks"

showing 10 items of 860 documents

FMapper: Scalable read mapper based on succinct hash index on SunWay TaihuLight

2022

Abstract One of the most important application in bioinformatics is read mapping. With the rapidly increasing number of reads produced by next-generation sequencing (NGS) technology, there is a need for fast and efficient high-throughput read mappers. In this paper, we present FMapper – a highly scalable read mapper on the TaihuLight supercomputer optimized for its fourth-generation ShenWei many-core architecture (SW26010). In order to fully exploit the computational power of the SW26010, we employ dynamic scheduling of tasks, asynchronous I/O and data transfers and implement a vectorized version of the banded Myers algorithm tailored to the 256 bit vector registers of the SW26010. Our perf…

256-bitSpeedupXeonComputer Networks and CommunicationsComputer scienceHash functionParallel computingSW26010SupercomputerTheoretical Computer ScienceArtificial IntelligenceHardware and ArchitectureScalabilitySoftwareSunway TaihuLightJournal of Parallel and Distributed Computing
researchProduct

Designing the 5G network infrastructure: a flexible and reconfigurable architecture based on context and content information

2018

5G networks will have to offer extremely high volumes of content, compared to those of today’s. Moreover, they will have to support heterogeneous traffics, including machine-to-machine, generated by a massive volume of Internet-of-Things devices. Traffic demands will be variable in time and space. In this work, we argue that all this can be achieved in a cost-effective way if the network is flexible and reconfigurable. We present the Flex5Gware network architecture, designed to meet the above requirements. Moreover, we discuss the links between flexibility and reconfigurability, on the one side, and context awareness and content awareness, on the other; we show how two of the building…

5G networkingStandardizationFlexible HW/SW platformComputer Networks and CommunicationsComputer scienceContext-awareneDistributed computinglcsh:TK7800-8360050801 communication & media studies02 engineering and technologylcsh:Telecommunication0508 media and communicationslcsh:TK5101-6720flexible HW/SW platforms 5G networking context-awareness; content-awareness; reconfigurability0202 electrical engineering electronic engineering information engineeringContext awarenessArchitecturecontent-awarenessNetwork architectureAccess networklcsh:Electronicsflexible HW/SW platforms05 social sciencescontext-awarenessReconfigurabilityControl reconfigurationComputer Science Applications1707 Computer Vision and Pattern Recognition020206 networking & telecommunicationsComputer Science ApplicationsContent-awareneSignal Processingreconfigurability5GEURASIP Journal on Wireless Communications and Networking
researchProduct

A heuristic algorithm for project scheduling with splitting allowed

1996

In this article, we analyze the precedence diagramming method, the only published algorithm for time-only project scheduling with activity splitting allowed. The criteria used in this method (forward and backward pass computations) for deciding when an activity has to be interrupted are shown to be invalid in some situations. We look into the causes of these failures and propose new formulae that always provide feasible solutions. The new algorithm has been tested on 240 randomly generated problems ranging up to 600 activities and 7,200 precedence relationships, resulting in an average deviation from optima of less than 1 percent.

Absolute deviationMathematical optimizationControl and OptimizationPrecedence diagram methodArtificial IntelligenceComputer Networks and CommunicationsComputer scienceComputationRangingManagement Science and Operations ResearchAlgorithmSoftwareInformation SystemsJournal of Heuristics
researchProduct

Proportional and Preemption-Enabled Traffic Offloading for IP Flow Mobility: Algorithms and Performance Evaluation

2018

IP Flow Mobility (IFOM) enables a user equipment to offload data traffic at the IP flow level. Although the procedure of IFOM-based flow offloading has been specified by 3GPP, how many IP flows should be offloaded and when offloading should be performed are not defined. Consequently, IP flows may be routed to a target access network which has a strong signal strength but with backhaul congestion or insufficient access capability. In this paper, we propose two algorithms, referred to as proportional offloading (PO), and proportional and preemption-enabled offloading (PPO), respectively, for IP flow offloading in hybrid cellular and wireless local area networks. The PO algorithm decides an op…

Access networkComputer Networks and CommunicationsComputer sciencebusiness.industryIT service continuityComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPreemptionLocal area networkAerospace Engineering020206 networking & telecommunications020302 automobile design & engineering02 engineering and technologyBackhaul (telecommunications)0203 mechanical engineeringUser equipmentAutomotive Engineering0202 electrical engineering electronic engineering information engineeringWirelessElectrical and Electronic EngineeringbusinessMobility managementAlgorithmIEEE Transactions on Vehicular Technology
researchProduct

A Metaheuristic Bandwidth Allocation Scheme for FiWi Networks Using Ant Colony Optimization

2015

Optical-wireless access networks constitute a quite attractive solution to meet the ever-increasing bandwidth requirements of end-users, offering significant benefits such as ubiquitous coverage in the wireless domain and huge bandwidth in the optical domain. However, converging optical and wireless networking technologies, with Passive Optical Networks (PONs) and 4G wireless standards, such as the Worldwide Interoperability for Microwave Access (WiMAX) and the Long Term Evolution (LTE), entails major challenges that need to be addressed. In this context, designing an efficient and fair bandwidth distribution with Quality of Service (QoS) support is a difficult task due to the interdependen…

Access networkDynamic bandwidth allocationWireless networkbusiness.industryComputer scienceSettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSWiMAXPassive optical networkBandwidth allocationComputer Networks and CommunicationAutomotive EngineeringBandwidth (computing)Radio resource managementbusinessComputer network
researchProduct

A conceptual model of feedback mechanisms in adjusted affordances – Insights from usage of a mental mobile health application

2023

Affordance theory provides one of the most prominent lenses through which the socio-technical aspects of a system’s use can be investigated and understood. In this context, the literature has proposed that perceived and actualized affordances may be adjusted over time. Yet, how the adjustment of affordances occurs has not been explained in detail. Thus, in this article, we develop a conceptual model of feedback mechanisms that includes a more explicit description of how affordances are perceived by users, whether actualized and adjusted. With the model, we introduce the central concept of a generative base, out of which affordance perceptions emerge and which can be updated through affordan…

ActualizationComputer Networks and CommunicationsMental ModelsPerception000 Informatik Informationswissenschaft allgemeine Werke::000 Informatik Wissen Systeme::004 Datenverarbeitung; InformatikLibrary and Information SciencesFeedback MechanismsVDP::Matematikk og Naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420AffordancesInformation Systems004
researchProduct

A distributed real-time data prediction and adaptive sensing approach for wireless sensor networks

2018

International audience; Many approaches have been proposed in the literature to reduce energy consumption in Wireless Sensor Networks (WSNs). Influenced by the fact that radio communication and sensing are considered to be the most energy consuming activities in such networks. Most of these approaches focused on either reducing the number of collected data using adaptive sampling techniques or on reducing the number of data transmitted over the network using prediction models. In this article, we propose a novel prediction-based data reduction method. furthermore, we combine it with an adaptive sampling rate technique, allowing us to significantly decrease energy consumption and extend the …

Adaptive samplingComputer Networks and CommunicationsComputer scienceReal-time computing[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technology[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]0202 electrical engineering electronic engineering information engineeringReal-time dataWork (physics)020206 networking & telecommunicationsEnergy consumption[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationComputer Science Applications[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Hardware and Architecture[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]020201 artificial intelligence & image processing[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]Wireless sensor networkSoftwarePredictive modellingEnergy (signal processing)Information SystemsData reductionPervasive and Mobile Computing
researchProduct

SINGLE-TRIAL BASED INDEPENDENT COMPONENT ANALYSIS ON MISMATCH NEGATIVITY IN CHILDREN

2010

Independent component analysis (ICA) does not follow the superposition rule. This motivates us to study a negative event-related potential — mismatch negativity (MMN) estimated by the single-trial based ICA (sICA) and averaged trace based ICA (aICA), respectively. To sICA, an optimal digital filter (ODF) was used to remove low-frequency noise. As a result, this study demonstrates that the performance of the sICA+ODF and aICA could be different. Moreover, MMN under sICA+ODF fits better with the theoretical expectation, i.e., larger deviant elicits larger MMN peak amplitude.

AdolescentLearning DisabilitiesComputer Networks and CommunicationsSpeech recognitionMismatch negativityElectroencephalographyGeneral MedicineIndependent component analysisNoiseAcoustic StimulationAttention Deficit Disorder with HyperactivityEvoked Potentials AuditoryHumansSingle trialChildEvoked PotentialsDigital filterAlgorithmsMathematicsInternational Journal of Neural Systems
researchProduct

An adoption model for mobile banking in Ghana

2009

The impact of social and cultural factors on the adoption of technology still requires much research. To investigate it more fully, we examine the reasons for the adoption and non-adoption of mobile banking in Ghana. Through a survey of 271 people in Ghana, it has been found that social and cultural factors in the form of perceived credibility, facilitating conditions, perceived elitisation and demographic factors do play a significant role in adoption decisions. It has been found that elitisation of technology and services can be a positive influence for adopters whilst being a negative influence for non-adopters. In addition, perceived credibility and facilitating conditions also influenc…

Adoption modelMobile bankingComputer Networks and Communicationsbusiness.industryInformation technologyPerceived credibilityContext (language use)Electrical and Electronic EngineeringMarketingbusinessComputer Science ApplicationsInternational Journal of Mobile Communications
researchProduct

LOW-RANK APPROXIMATION BASED NON-NEGATIVE MULTI-WAY ARRAY DECOMPOSITION ON EVENT-RELATED POTENTIALS

2014

Non-negative tensor factorization (NTF) has been successfully applied to analyze event-related potentials (ERPs), and shown superiority in terms of capturing multi-domain features. However, the time-frequency representation of ERPs by higher-order tensors are usually large-scale, which prevents the popularity of most tensor factorization algorithms. To overcome this issue, we introduce a non-negative canonical polyadic decomposition (NCPD) based on low-rank approximation (LRA) and hierarchical alternating least square (HALS) techniques. We applied NCPD (LRAHALS and benchmark HALS) and CPD to extract multi-domain features of a visual ERP. The features and components extracted by LRAHALS NCP…

AdultMaleComputer Networks and CommunicationsEmotionsLow-rank approximationEmotional processingEvent-related potentialDecomposition (computer science)Feature (machine learning)HumansRepresentation (mathematics)ta515Mathematicsta113Depressionbusiness.industryGroup (mathematics)ElectroencephalographyPattern recognitionGeneral MedicineMiddle AgedFacial ExpressionAlgebraData Interpretation StatisticalBenchmark (computing)Evoked Potentials VisualFemaleArtificial intelligencebusinessInternational Journal of Neural Systems
researchProduct