Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.

SEARCH GUIDE  Download Search Tip PDF File

  • articleNo Access

    TARGETING HETEROGENEOUS ARCHITECTURES VIA MACRO DATA FLOW

    We propose a data flow based run time system as an efficient tool for supporting execution of parallel code on heterogeneous architectures hosting both multicore CPUs and GPUs. We discuss how the proposed run time system may be the target of both structured parallel applications developed using algorithmic skeletons/parallel design patterns and also more "domain specific" programming models. Experimental results demonstrating the feasibility of the approach are presented.

  • articleNo Access

    Parameter-Level Data Flow Modeling Oriented to Product Design Process

    In this paper, a method of data flow modeling for a product design process oriented to data parameter is proposed. The data parameters are defined, which are classified as the basic data parameters and complex data parameters. The mechanism of the mapping relationship between different forms of documents and some basic data parameters, and a data transmission based on parameters, are constructed. Aiming at the characteristics of the iterative design process, the parameters version mechanism including node modification and iteration information is proposed. The data parameters transmission relationships are represented by a parameters network model (PNM) based on a directed graph. Finally, through the table of data parameters mapping onto the workflow node and PNM, the data ports and data links in the data flow model are generated automatically by the program. Validation in the 15-meter-diameter S/Ka frequency band antenna design process of the “Reflector, Back frame and Center part design” data flow model shows that the method can effectively shorten the time of data flow modeling and improve the data transmission efficiency.

  • articleOpen Access

    THE OPERATION OF VEGA/CHARA: FROM THE SCIENTIFIC IDEA TO THE FINAL PRODUCTS

    We describe the data flow in the operation of the VEGA/CHARA instrument. After a brief summary of the main characteristics and scientific objectives of the VEGA instrument, we explain the standard procedure from the scientific idea up to the execution of the observation. Then, we describe the different steps done after the observation, from the raw data to the archives and the final products. Many tools are used and we show how the Virtual Observatory principles have been implemented for the interoperability of these software and databases.

  • articleOpen Access

    Governing Cross-Border Data Flows: China’s Proposal and Practice

    Beijing’s quest for a more prominent role in a changing international order requires greater ability to shape global rules and norms in emerging strategic domains like cyberspace. Cross-border data flows, an important driving force behind the digital economy, give rise to growing concerns about potential threats to national security and individual privacy. In contrast with the Western approach that focuses on maximum data freedom, China’s proposal for cross-border data governance prioritizes security, order, and development. Contrary to outside expectations that Beijing’s restrictive data policies allow little room for international alignment on data security governance, China has shown sufficient flexibility and open-mindedness in major international initiatives for norm setting and institution building. Moreover, Beijing insists that as a global common, cyberspace should not become a new battlefield of great power competition, but instead help advance the shared interests of developing nations.

  • chapterNo Access

    FUZZY CONTROL AND ANALYSIS ON NETWORK DATA FLOW

    This paper considers the analysis on network data flow of discrete-time queuing system. The system consists of single buffer and there serverrs with the same service function and different service rate. In the process of data transmission, when many input terminals send data to a middle note synchronously the waiting data have to queue in the buffer. We use fuzzy control theory to select suitable routes for the data so as to reduce the sojourn time and avoid network congestion. We give different simulations in terms of different conditions. Numerical examples are worked out which show the validity of the fuzzy controller.

  • chapterNo Access

    The Framework and Implement of Trusted Network Connection Based on Separation of Controlling Flow and Data Flow

    The paper proposes a trusted network connection frame based on the separation of controlling flow and data flow, giving priority to maintaining data stream transmission. This is done through controlling the flow of communication on both sides of the identity authentication and trusted state assessment, and updating the access control policies of both sides, so as to maintain data stream transmission control. On the one hand, it can guarantee the real-time transmission of business data and on the other hand it can improve the efficiency of communication participants’ trusted state assessment, which is suitable for the intensive real-time requirements of industrial and business data.

  • chapterNo Access

    Data Acquisition and Organization of Remote Monitoring System for Gantry Cranes

    Reasonable data acquisition method and excellent data organization and management structure are fundamental guarantees for the reliable operation of the remote gantry crane monitoring system. In this paper, the architecture of gantry crane remote monitoring data flow is established, and acquisition of sorted data is analyzed. The data management structure of the remote crane monitoring system for large amount of data with multi users and multi equipments is established by using the E-R model, thus the robustness and maintainability of monitoring system are improved. Real-time database and CMS gateway are designed to ensure the data continuity during the disconnection-recovery of field wireless network. This study provides a basis for further fault diagnosis, performance prediction and none downtime intelligent maintenance of gantry cranes.