Please login to be able to save your searches and receive alerts for new content matching your search criteria.
We propose a data flow based run time system as an efficient tool for supporting execution of parallel code on heterogeneous architectures hosting both multicore CPUs and GPUs. We discuss how the proposed run time system may be the target of both structured parallel applications developed using algorithmic skeletons/parallel design patterns and also more "domain specific" programming models. Experimental results demonstrating the feasibility of the approach are presented.
In this paper, a method of data flow modeling for a product design process oriented to data parameter is proposed. The data parameters are defined, which are classified as the basic data parameters and complex data parameters. The mechanism of the mapping relationship between different forms of documents and some basic data parameters, and a data transmission based on parameters, are constructed. Aiming at the characteristics of the iterative design process, the parameters version mechanism including node modification and iteration information is proposed. The data parameters transmission relationships are represented by a parameters network model (PNM) based on a directed graph. Finally, through the table of data parameters mapping onto the workflow node and PNM, the data ports and data links in the data flow model are generated automatically by the program. Validation in the 15-meter-diameter S/Ka frequency band antenna design process of the “Reflector, Back frame and Center part design” data flow model shows that the method can effectively shorten the time of data flow modeling and improve the data transmission efficiency.
We describe the data flow in the operation of the VEGA/CHARA instrument. After a brief summary of the main characteristics and scientific objectives of the VEGA instrument, we explain the standard procedure from the scientific idea up to the execution of the observation. Then, we describe the different steps done after the observation, from the raw data to the archives and the final products. Many tools are used and we show how the Virtual Observatory principles have been implemented for the interoperability of these software and databases.
Beijing’s quest for a more prominent role in a changing international order requires greater ability to shape global rules and norms in emerging strategic domains like cyberspace. Cross-border data flows, an important driving force behind the digital economy, give rise to growing concerns about potential threats to national security and individual privacy. In contrast with the Western approach that focuses on maximum data freedom, China’s proposal for cross-border data governance prioritizes security, order, and development. Contrary to outside expectations that Beijing’s restrictive data policies allow little room for international alignment on data security governance, China has shown sufficient flexibility and open-mindedness in major international initiatives for norm setting and institution building. Moreover, Beijing insists that as a global common, cyberspace should not become a new battlefield of great power competition, but instead help advance the shared interests of developing nations.
This paper considers the analysis on network data flow of discrete-time queuing system. The system consists of single buffer and there serverrs with the same service function and different service rate. In the process of data transmission, when many input terminals send data to a middle note synchronously the waiting data have to queue in the buffer. We use fuzzy control theory to select suitable routes for the data so as to reduce the sojourn time and avoid network congestion. We give different simulations in terms of different conditions. Numerical examples are worked out which show the validity of the fuzzy controller.
The paper proposes a trusted network connection frame based on the separation of controlling flow and data flow, giving priority to maintaining data stream transmission. This is done through controlling the flow of communication on both sides of the identity authentication and trusted state assessment, and updating the access control policies of both sides, so as to maintain data stream transmission control. On the one hand, it can guarantee the real-time transmission of business data and on the other hand it can improve the efficiency of communication participants’ trusted state assessment, which is suitable for the intensive real-time requirements of industrial and business data.
Reasonable data acquisition method and excellent data organization and management structure are fundamental guarantees for the reliable operation of the remote gantry crane monitoring system. In this paper, the architecture of gantry crane remote monitoring data flow is established, and acquisition of sorted data is analyzed. The data management structure of the remote crane monitoring system for large amount of data with multi users and multi equipments is established by using the E-R model, thus the robustness and maintainability of monitoring system are improved. Real-time database and CMS gateway are designed to ensure the data continuity during the disconnection-recovery of field wireless network. This study provides a basis for further fault diagnosis, performance prediction and none downtime intelligent maintenance of gantry cranes.