Search results for: comcute - Bridge of Knowledge

Search

Search results for: comcute

Search results for: comcute

  • Architektura systemu Comcute

    Publication

    - Year 2012

    Przedstawiono architekturę systemu Comcute realizującego masywne przetwarzanie rozproszone wykorzystujące powszechny wolontariat użytkowników komputerów w sieciach rozległych.

    Full text to download in external service

  • Security Mechanisms in the Comcute System

    Publication

    - Year 2012

    The aim of this paper is pointing out the basic security problems and mechanisms in the Comcute system - maintenance system of large computing power in the face of critical crisis. Moreover security mechanism and tools useful to apply in laboratory model as well as target version of the Comcute system are presented.

  • LECTURE NOTES IN COMPUTER SCIENCE

    Journals

    ISSN: 0302-9743

  • Procedia Computer Science

    Journals

    ISSN: 1877-0509

  • Mechanizmy bezpieczeństwa w systemie Comcute

    Publication

    - Year 2012

    Wyróżniono podstawowe problemy związane z bezpieczeństwem przetwarzania w systemie utrzymania wielkiej mocy obliczeniowej w sytuacjach kryzysowych Comcute. Ponadto na przykładzie architektury systemu modelowego przedstawiono mechanizmy bezpieczeństwa przydatne do zastosowania w projekcie.

    Full text to download in external service

  • Zagadnienia implementacyjne w systemie Comcute

    Publication

    - Year 2012

    Zaprezentowano zaimplementowane w prototypie systemu Comcute podstawowe algorytmy systemowe, które znajdują zastosowanie w realizacji rzeczywistego systemu. Zwrócono uwagę na warstwowość modelu w całości systemu. Omówiono podstawowe zadania systemowe poszczególnych warstw, a następnie zaprezentowano szczegóły operacyjne dla interfejsów komunikacyjnych pomiędzy warstwami. Skoncentrowano się na zrealizowanych (zaimplementowanych)...

    Full text to download in external service

  • Foundations of Grid Processing Architecture for the Comcute System

    Publication

    - Year 2012

    Fundamental system algorithms and structures implemented in the Comcute system are described and analysed in detail. Layered architecture of the system model is highlighted. System tasks of the layers are elaborated, presented and described. Operational details of communication interfaces among layers are worked out and examined. The focus is put onto implemented system components with regard to their operability and efficiency....

  • Volunteer Computing System Comcute with Smart Scheduler

    In this paper, a volunteer grid called Comcute is studied. Moreover, the harmony search scheduler is proposed. This scheduler has been designed for efficient using some resources of volunteer grid. The harmony search scheduler optimizes both a workload of a bottleneck computer and the cost of grid. Finally, some experiment outcomes have been discussed.

    Full text to download in external service

  • Parallel computations in the volunteer based Comcute system

    Publication

    The paper presents Comcute which is a novel multi-level implemen- tation of the volunteer based computing paradigm. Comcute was designed to let users donate the computing power of their PCs in a simplified manner, requiring only pointing their web browser at a specific web address and clicking a mouse. The server side appoints several servers to be in charge of execution of particular tasks. Thanks to that the system can survive...

    Full text to download in external service

  • THEORETICAL COMPUTER SCIENCE

    Journals

    ISSN: 0304-3975 , eISSN: 1879-2294

  • On Configurability of Distributed Volunteer-Based Computing in the Comcute System

    Publication

    - Year 2012

    The chapter proposes additional solutions that can be implemented within the Comcute system to increase its configurability. This refers to configuration of the reliability level in the W and S server layers, static or on-the-fly data partitioning and integration, configuration of the system for processing in the data streaming fashion, extending the system for selection of a project that the client wants to contribute to, ease...

  • Genetic Programming for Workload Balancing in the Comcute Grid System

    Publication

    - Year 2012

    A genetic programming paradigm is implemented for reliability optimization in the Comcute grid system design. Chromosomes are generated as the program functions and then genetic operators are applied for finding Pareto-suboptimal task assignment and scheduling. Results are compared with outcomes obtained by an adaptive evolutionary algorithm.

  • Zastosowanie systemu Comcute do łamania algorytmu DES

    Publication

    - Year 2012

    Zaprezentowano zastosowanie systemu Comcute do łamania szyfru DES. Przedstawiono podstawową architekturę wykorzystaną do dystrybucji obliczeń oraz zaprezentowano wyniki skalowalności rozwiązania w funkcji użytych jednostek obliczeniowych.

    Full text to download in external service

  • A theoretical consideration of a free convective boundary layer on an isothermal horizontal conic.

    Publication

    - Year 2004

    Przedstawiono rozwiązanie analityczne naturalnej konwekcji swobodnej od izotermicznego, poziomego stożka o kącie przy podstawie alfa. Rozwiązanie przeprowadzono w oparciu o typowe dla konwekcji swobodnej założenia upraszczające. Rozwiązania dla przypadków granicznych (poziomy walec i pionowa płyta kołowa) wykazują dobrą zgodność z danymi literaturowymi.

  • Communications in Computer and Information Science

    Journals

    ISSN: 1865-0929

  • Mersenne Number Finding and Collatz Hypothesis Verification in the Comcute Grid System

    Publication

    - Year 2012

    In this chapter, some mathematic applications have been described to test scalability of the Comcute grid system. Especially, a verification of the Collatz hypothesis and finding Mersenne numbers were applied to prove the scalability and high performance of this grid system. Results were compared with outcomes obtained by the other grid systems.

  • Sposoby definiowana zadań i zlecania wykonywania obliczeń w systemie Comcute

    Publication

    - Year 2012

    Zaprezentowano specyfikację elementów definiowanych przez zleceniodawcę systemu Comcute przy uruchamianiu nowych zadań obliczeniowych w systemie, w tym parametrów niezawodnościowo-wydajnościowych jak również kodów obliczeniowych, partycjonowania i scalania. Przedstawiono także wymagania związane z konfigurowalnością systemu i jego bezpieczeństwem a także wskazówki technologiczne.

    Full text to download in external service

  • Integration of compute-intensive tasks into scientific workflows in BeesyCluster

    Publication

    - Year 2006

    Artykuł prezentuje szczegóły projektowe i implementacyjne jak również symulacje naukowych scenariuszy z wymagającymi zadaniami na klastrach i komputerach PC. Autor wdrożył wsparcie dla scenariuszy naukowych do wcześniej opracowanego systemu BeesyCluster wdrożonego w Akademickim Centrum Komputerowym sieci TASK w Gdańsku na klastrze holk z 288 procesorami Itanium2. BeesyCluster pozwala użytkownikom na zarządzanie różnymi kontami...

  • Computer synchronization of power generators

    Publication

    - Measurement Automation Monitoring - Year 2003

    Aktualną staje się kwestia opracowania odpowiednich algorytmów pomiarów i obliczeń, według których będzie możliwe prowadzenie procesu automatycznej synchronizacji bezpośrednio z wykorzystaniem komputera. W artykule przedstawiono komputerową metodę realizacji warunku fazowego podczas synchronizacji oraz podano wyniki jej badań symulacyjnych oraz badań na obiektach rzeczywistych.

    Full text available to download

  • Parallelization of Compute Intensive Applications into Workflows based on Services in BeesyCluster

    Publication

    - Year 2011

    The paper presents an approach for modeling, optimization and execution of workflow applications based on services that incorporates both service selection and partitioning of input data for parallel processing by parallel workflow paths. A compute-intensive workflow application for parallel integration is presented. An impact of the input data partitioning on the scalability is presented. The paper shows a comparison of the theoretical...

    Full text available to download

  • Computer-aided Measurements of Turbine Blades

    Przedstawiono skomputeryzowane pomiary profili łopatek turbinowych po szlifowaniu. W pracy wykorzystano program komputerowy, który może być zastosowany bezpośrednio przez operatora obrabiarki, opracowany na bazie Microsoft Excel.

  • Geo-location of the commune of an IP user

    Publication

    - Year 2008

    This paper describes a system of geo-location of an IP user that would enable VoIP users to call 112. Basic requirement is fast (under 50ms) determination of the commune of the subscriber. To obtain as accurate information as possible aggregation of several methods was proposed: using a database of locations of IP ranges created by specialized companies, traceroute using history of user locations to assume his current one.It is...

  • Computer modeling and testing of structural metamaterials

    Publication
    • T. Krolikowski
    • R. Knitter
    • A. Blazejewski

    - Procedia Computer Science - Year 2019

    Full text to download in external service

  • Industrial computer networks and functional safety

    Publication

    W rozdziale monografii przedstawiono wybrane aspekty bezpieczeństwa funkcjonalnego na przykładzie przemysłowych sieci komputerowych stosowanych w obiektach infrastruktury krytycznej. Pierwszą cześć rozdziału poświęcono omówieniu klasycznych rozwiązań w zakresie sieci komputerowych. Drugą część rozdziału stanowi analiza przypadku typowej przemysłowej sieci komputerowej z uwzględnieniem aspektów bezpieczeństwa funkcjonalnego.

  • Erosion of privacy in computer vision systems

    W pracy przedstawiono problemy, które mogą wystąpić, gdy technologia komputerowego wzroku zostanie zaimplementowana w urządzeniach wykorzystywanych w codziennym życiu. Przeprowadzono także dyskusję socjologicznych konsekwencji stosowania biometrii, automatycznego śledzenia ruchu i interpretacji obrazu. Omówiono też problemy wynikające z połączenia komputerowego wzroku z możliwościami oferowanymi przez Internet.

  • Gesture-based computer control system

    In the paper a system for controlling computer applications by hand gestures is presented. First, selected methods used for gesture recognition are described. The system hardware and a way of controlling a computer by gestures are described. The architecture of the software along with hand gesture recognition methods and algorithms used are presented. Examples of basic and complex gestures recognized by the system are given.

    Full text to download in external service

  • Computer application for railway track realignment

    Publication

    - Year 2014

    The topic of this article is the issue of railway track realignment. For this purpose, a computer software application was created that supports computations and generates a report needed for regulation of the trajectory of the railway. This program gives the ability to import data from measurement of the railway trajectory and then perform the calculation of the mathematical realignment. The result of this calculation is the basis...

    Full text to download in external service

  • Cost assessment of computer security activities

    Publication

    Comprehensive cost-benefit analysis plays a crucial role in the decision-making process when it comes to investments in information security solutions. The cost of breaches needs to be analysed in the context of spending on protection measures. However, no methods exist that facilitate the quick and rough prediction of true expenditures on security protection systems. Rafal Leszczyna of Gdansk University of Technology presents...

    Full text to download in external service

  • Software Agents for Computer Network Security

    Publication

    - Year 2012

    The chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...

    Full text to download in external service

  • Computer aided funcional safety assessment

    Publication

    Referat porusza wybrane zagadnienia związane z oceną bezpieczeństwa funkcjonalnego w nawiązaniu do normy międzynarodowej IEC 61508. Podkreśla się znaczenie modelowania probabilistycznego systemów elektrycznych, elektronicznych i programowalnych elektronicznych (E/E/PE). Opisuje się wyznaczanie poziomu nienaruszalności bezpieczeństwa (SIL). W następnym kroku analizy weryfikuje się poziom SIL w procesie modelowania probabilistycznego...

  • COMPUTER

    Journals

    ISSN: 0018-9162 , eISSN: 1558-0814

  • COMPUTER PHYSICS COMMUNICATIONS

    Journals

    ISSN: 0010-4655 , eISSN: 1879-2944

  • Journal of Applied Computer Science

    Journals

    ISSN: 1507-0360

  • Planning documents and sustainable development of a commune in Poland

    Publication
    • A. Stacherzak
    • M. Hełdak
    • B. Raszka

    - Year 2012

    Full text to download in external service

  • Complex human computer interface for las patient

    Publication

    W pracy zaprezentowano system umożliwiający komunikację osobie sparaliżowanej z komputerem przy pomocy wzroku.

    Full text to download in external service

  • Computer based system for strabismus and amblyopia therapy

    Publication

    W publikacji opisano system komputerowy do badania i treningu zeza i amblyopii.W przypadku zeza i amblyopii lub tak zwanego syndromu leniwego oka terapia polega na zasłanianiu oka dominującego przez kilka godzin dziennie lub rozmywanie obrazu w tym oku poprzez zastasowanie kropli do oczu lub silnych soczewek w okularach. Taki sposób terapii powoduje zaburzenie widzenia obuocznego. Proponowane rozwiązanie zachowuje widzenie obuoczne....

    Full text to download in external service

  • Computer modeling of the solution conformation of cyclic enkephalins

    Publication
    • J. Malicka
    • M. Groth
    • C. Czaplewski
    • R. Kasprzykowska
    • A. Liwo
    • L. Łankiewicz
    • W. Wiczk

    - LETTERS IN PEPTIDE SCIENCE - Year 1998

    Full text to download in external service

  • Computer Aided Telediagnostics System for Stoma Patients

    Publication
    • R. Zawislak
    • M. Szwoch
    • G. Granosik
    • A. Miarka
    • J. Mik-Wojtczak
    • M. Mik

    - Year 2022

    Stoma surgery may concern patients with colorectal cancer and inflammatory bowel disease. More than half of patients diagnosed with colon cancer present at an advanced stage, and palliative treatment may involve stoma formation. This type of surgery may change the patient’s life strongly, therefore they should receive special medical care. The paper presents the assumptions, concept, and architecture of the Stoma-Alert diagnosis...

    Full text to download in external service

  • Computer Aided Design of Wood Pellet Machines

    Publication

    - Year 2019

    Full text to download in external service

  • A computer system for the complete design of ship propellers

    Publication

    Praca zawiera opis metody obliczeniowej pozwalającej na zaprojektowanie okrętowej śruby napędowej dla również obliczeniowo wyznaczonego niejednorodnego pola prędkości za kadłubem statku o znanej geometrii i parametrach ruchu. Metoda pozwala na właściwe ujęcie efektu skali i konsekwencji obecności płetwy sterowej za projektowaną śrubą.

  • Generalized access control in hierarchical computer network

    The paper presents the design of the security layer for a distributed system located in the multizone hierarchical computer network. Depending on the zone from which a client’s request comes to the system and the type of the request, it will be either authorized or rejected. There is one common layer for the access to all the business services and interactions between them. Unlike the commonly used RBAC model, this system enforces...

    Full text available to download

  • Utilization of fuzzy rules in computer character animation

    Publication

    - Year 2010

    The chapter presents a method for automatic enhancement of computer character animation utilizing fuzzy inference. First the user designs a prototype version of animation, with keyframes only for important poses, roughly describing the action. Then animation is enriched with new motion phases calculated by the fuzzy inference system using descriptors given by the user. Various degrees of motion fluency and naturalness are possible...

    Full text to download in external service

  • COMPUTER-AIDED DESIGN OF ORGANOPHOSPHORUS INHIBITORS OF UREASE

    Based on the structure of the most potential inhibitor diamidophosphate, various novel groups of inhibitors were developed by knowledge-based design approach with covalent carbon-phosphorus or carbon-phosphorus-carbon bond to improve hydrolytic stability to inhibit the microbial ureases. Designed compounds were evaluated with 10 (LigScore1, LigScore2, PLP1, PLP2, JAIN, PMF, PMF04, LUDI_1, LUDI_2 and LUDI_3) different scoring functions...

    Full text available to download

  • Modelling and computer animation of geodetic field work

    Publication

    - Year 2014

    3D modelling of objects is a way of obtaining information, while the visualization of geospatial data is becoming a production task in the scope of surveying. Visualization of geospatial data provides effective tools for analysis information about the land surface, land cover, its features, properties etc. Computer animations, both 2D images and 3D are becoming additional, expected and clear form for presentation results of geodetic...

  • 3D Computer Model of the Hip Joint Cartilage

    This paper presents 3D computer model of the hip joint cartilage in the ANSYS program. Model is made on the basis of anatomy and collected data on the material constants of bone and cartilage components. Analysis and comparison of biochemical model, viscoelastic and molecular mixed - aggregation serves to facilitate the creation of the next model of reality, which could be used in the design of joint prostheses. The correctness...

    Full text to download in external service

  • Displacements of chimney in the light of computer calculations and surveying

    The article presents the numerical analysis of reinforced concrete chimney displacements, which was carried out geodetic measurements.

    Full text available to download

  • New Applications of Multimodal Human-Computer Interfaces

    Publication

    - Year 2012

    Multimodal computer interfaces and examples of their applications to education software and for the disabled people are presented. The proposed interfaces include the interactive electronic whiteboard based on video image analysis, application for controlling computers with gestures and the audio interface for speech stretching for hearing impaired and stuttering people. Application of the eye-gaze tracking system to awareness...

  • Personal adaptive tuning of mobile computer audio

    An integrated methodology for enhancing audio quality in mobile computers is presented. The key features are adaptation of the characteristics of the acoustic track to the changing conditions and to the user's individual preferences. Original signal processing algorithms are introduced, which concern: linearization of frequency response, dialogue intelligibility enhancement and dynamics processing tuned up to the user's preferences....

  • Computer Support of Analysis of Optical Spectra Measurements

    Publication

    The verification of measurement errors has a big impact on the assessment of the accuracy of conducted measurements and obtained results. In many cases, computer simulation results are compared with measurement results in order to evaluate measurement errors. The purpose of our research was to check the accuracy of measurements made with a Fabry–Perot interferometer working in the transmission mode. In the measurement setup, a...

    Full text available to download

  • Computer support of analysis optical spectra measurements

    Publication

    Verification of measurement errors has a big impact on assessment of accuracy of conducted measurements and obtained results. In many cases computer simulation results are compared with measurement results in order to evaluate measurement errors. The purpose of our research was to check the accuracy of measurements made with Fabry-Perot interferometer working in the transmission mode. In measurement setup, a 1310 nm superluminescent...

    Full text available to download