Filters








43 Hits in 4.2 sec

Facilitating Efficient and Reliable Monitoring Through HAMSA [chapter]

David Breitgand, Danny Dolev, Danny Raz, Gleb Shaviner
2003 Integrated Network Management VIII  
We describe the Highly Available Monitoring Services Architecture (HAMSA), present its implementation details, and evaluate its performance.  ...  In this paper we study a solution based on a lightweight middleware architecture that aims primarily at improving availability and efficiency of monitoring applications.  ...  Acknowledgments We thank Elias Procopio Duarte, Jr, and Aldri L. dos Santos for their valuable comments.  ... 
doi:10.1007/978-0-387-35674-7_30 fatcat:whnlnlwnlrdrvnsnhouxfn2myu

Facilitating efficient and reliable monitoring through HAMSA

D. Breitgand, D. Dolev, D. Raz, G. Shaviner
IFIP/IEEE Eighth International Symposium on Integrated Network Management, 2003.  
We describe the Highly Available Monitoring Services Architecture (HAMSA), present its implementation details, and evaluate its performance.  ...  In this paper we study a solution based on a lightweight middleware architecture that aims primarily at improving availability and efficiency of monitoring applications.  ...  Acknowledgments We thank Elias Procopio Duarte, Jr, and Aldri L. dos Santos for their valuable comments.  ... 
doi:10.1109/inm.2003.1194185 fatcat:3ofbbaquhrgzni2q457cs4rtlm

Cyber-physical systems: Milestones and research challenges

Kyung-Joon Park, Rong Zheng, Xue Liu
2012 Computer Communications  
Acknowledgements This work was supported in part by the Basic Science Research Program through the National Research Foundation (NRF) of Korea funded by the Ministry of Education, Science and Technology  ...  (2010-0022076), and in part by the DGIST R&D Program of the Ministry of Education, Science and Technology of Korea (12-BD-0404).  ...  Shankar Sastry, David Culler, and Hamsa Balakrishnan.  ... 
doi:10.1016/j.comcom.2012.09.006 fatcat:iow2gcdzdfcy3j4fogi67dd3ni

A Framework for Producing Effective and Efficient Secure Code through Malware Analysis

Abhishek Kumar Pandey, Ashutosh Tripathi, Mamdouh Alenezi, Alka Agrawal, Rajeev Kumar, Raees Ahmad
2020 International Journal of Advanced Computer Science and Applications  
Further, the article provides an approach of malicious code identification, mitigation, and management through a hybrid process of malware analysis, priority-based vulnerability mitigation process and  ...  Malware attacks are creating huge inconveniences for organizations and security experts.  ...  Hamsa et al. provides an analysis of various malware identification techniques and assess their pros and cons on different standards [15] .  ... 
doi:10.14569/ijacsa.2020.0110263 fatcat:62turtejxfc3hga65zsgzjcea4

Commensal microbe-derived acetate suppresses NAFLD/NASH development via hepatic FFAR2 signalling in mice

Ryo Aoki, Masayoshi Onuki, Koya Hattori, Masato Ito, Takahiro Yamada, Kohei Kamikado, Yun-Gi Kim, Nobuhiro Nakamoto, Ikuo Kimura, Julie M. Clarke, Takanori Kanai, Koji Hase
2021 Microbiome  
acetate, in the gut lumen and portal blood.  ...  Inulin consumption resulted in global changes in the gut microbiome, including concomitant enrichment of the genera Bacteroides and Blautia, and increased concentrations of short-chain fatty acids, particularly  ...  Suzuki, and T. Amiya (Division of Gastroenterology and Hepatology, Keio University) for technical assistance and critical reading of this manuscript.  ... 
doi:10.1186/s40168-021-01125-7 pmid:34530928 fatcat:zzyzb5lvvncbbamvx5ouehtiwm

Development of real-time flood forecast model for vamsadhara river through hydrological approach

Arunima Mahapatra, Vazeer Mahammood, K H V Durga Rao
2021 International Journal of Advanced Technology and Engineering Exploration  
An early warning system comprises both structural and non-structural measures. While structural incorporates the physical construction of embankments, canals, and so on, non-structural  ...  In India, wide sectoral and regional variables impact country climate change adaptability [1].  ...  We are also grateful to the CWC, Bhubaneswar, Odisha, for supplying us with the Vamsadhara River basin stage and gauge discharge data.  ... 
doi:10.19101/ijatee.2021.874272 fatcat:kkmqcejkarhudcztcxpakx76iu

Ring and bring drug services: Delivery dealing and the social life of a drug phone

Thomas Friis Søgaard, Torsten Kolind, Mie Birk Haller, Geoffrey Hunt
2019 International journal of drug policy  
Illegal drug dealers no longer compete for customers only through the quality of their products, but also in convenience and speed of delivery.  ...  This article investigates "ring and bring" drug dealing, and argues that a focus on dealers' use of mobile phones is useful for exploring current changes within retail level drug markets.  ...  as reliable drug suppliers.  ... 
doi:10.1016/j.drugpo.2019.02.003 pmid:31005746 fatcat:cmty53j6jvbdvasqdc3vbdjdsa

WormTerminator

Songqing Chen, Xinyuan Wang, Lei Liu, Xinwen Zhang
2006 Proceedings of the 2006 ACM/IEEE symposium on Architecture for networking and communications systems - ANCS '06  
While signature based worm detection and containment are effective in detecting and containing known worms, they are inherently ineffective against previously unknown worms and polymorphic worms.  ...  Existing traffic anomaly pattern based approaches have the potential to detect and/or contain previously unknown and polymorphic worms, but they either impose too much constraint on normal traffic or allow  ...  Acknowledgment We would like to thank Bill Bynum and the anonymous reviewers for their helpful comments.  ... 
doi:10.1145/1185347.1185371 dblp:conf/ancs/ChenWLZ06 fatcat:3vrvqzi25zasdhfbvuk5v76pey

MOBILITY21: Strategic Investments for Transportation Infrastructure & Technology

Rahul Mangharam, Megan Reyerson, Steve Viscelli, Hamsa Balakrishanan, Alexandre Bayen, Surabh Amin, Leslie Richards, Penndot Leo, Bagley Penndot, George Pappas
unpublished
for our transportation infrastructure, identifies new technology drivers and proposes strategic investments for safe and efficient air, ground, rail and marine mobility of people and goods.  ...  predictable decisions, (ii) efficient exchange of travel data while ensuring user privacy and asset security, and (iii) coexistence of private and public autonomous systems with an integrated technology  ...  sector through precision farming; and the oil and gas industry through efficient pipeline inspections and infrastructure maintenance.  ... 
fatcat:6t56dofejjh2xin4ehilszyoie

Packed Ultra-wideband Mapping Array (PUMA): Astro2020 RFI Response [article]

Emanuele Castorina, Simon Foreman, Dionysios Karagiannis, Adrian Liu, Kiyoshi W. Masui, Pieter D. Meerburg, Laura B. Newburgh, Paul O'Connor, Andrej Obuljen, Hamsa Padmanabhan, J. Richard Shaw, Anže Slosar, Paul Stankus, Peter T. Timbie (+2 others)
2020 arXiv   pre-print
Its rich science portfolio will include measuring structure in the universe from redshift z = 0.3 to 6 using 21cm intensity mapping, detecting one million fast radio bursts, and monitoring thousands of  ...  This document is a response to a request for information (RFI) by the Panel on Radio, Millimeter, and Submillimeter Observations from the Ground (RMS) of the Decadal Survey on Astronomy and Astrophysics  ...  ; probing cosmic inflation through primordial non-Gaussianity and relic inflationary features; discovering fast radio bursts and monitoring pulsars.  ... 
arXiv:2002.05072v2 fatcat:y22rddkq5vattogemik72ovwca

The DESI Experiment Part II: Instrument Design [article]

DESI Collaboration: Amir Aghamousa, Jessica Aguilar, Steve Ahlen, Shadab Alam, Lori E. Allen, Carlos Allende Prieto, James Annis, Stephen Bailey, Christophe Balland, Otger Ballester, Charles Baltay, Lucas Beaufore, Chris Bebek, Timothy C. Beers (+248 others)
2016 arXiv   pre-print
DESI (Dark Energy Spectropic Instrument) is a Stage IV ground-based dark energy experiment that will study baryon acoustic oscillations and the growth of structure through redshift-space distortions with  ...  a wide-area galaxy and quasar redshift survey.  ...  This activity also has oversight of documentation, coding standards, and tagged releases of both reduced data and code. • Collaboration Tools: Tools to facilitate the efficient operations of the collaboration  ... 
arXiv:1611.00037v2 fatcat:qupbf5xl2beaxb5fjkl2ptdkz4

Volume 19 : 2021 Issue 2

MIP Malaysia
2021 PLANNING MALAYSIA JOURNAL  
The views expressed in this publication are those of the author(s) and do not necessarily represent the views of MIP. This journal is a refereed journal.  ...  It is a reliable number of respondents for doing semi-structured interviews method (Morse, 2000) . The category of targeted respondents is among youth and eldest.  ...  Population and sample size is a vital consideration in market research whereby this research has focused purposive sampling which is reliable for identifying and selecting information related to the phenomenon  ... 
doi:10.21837/pm.v19i16.946 fatcat:ca75sw4n5ncdtpi54djoqdf4ty

Proceedings of the Eighth Conference on Research in Mathematics Education in Ireland (MEI 8) [article]

M. Kingston, P. Grimes
2021 Zenodo  
Collectively, the authors seek to solidify and progress the research field of mathematics education and seek to further understand how we can provide meaningful access and experiences for all learners  ...  In these proceedings of MEI 8, we present papers that reflect a broad variety of mathematical research that is taking place in Ireland and further afield.  ...  Culturally responsive teaching and the brain: Promoting authentic engagement and rigor among culturally and linguistically diverse students. Corwin.  ... 
doi:10.5281/zenodo.5573968 fatcat:33bwf73razfulh4s5rjspi5btq

Counterfactual Explanations without Opening the Black Box: Automated Decisions and the GDPR [article]

Sandra Wachter, Brent Mittelstadt, Chris Russell
2018 arXiv   pre-print
There has been much discussion of the right to explanation in the EU General Data Protection Regulation, and its existence, merits, and disadvantages.  ...  Implementing a right to explanation that opens the black box of algorithmic decision-making faces major legal and technical barriers.  ...  Contesting through counterfactuals Art. 13-15 thus do little to facilitate a data subject's ability to challenge automated decisions.  ... 
arXiv:1711.00399v3 fatcat:xjhwo7dvpvcmjhswo3az3wjbwq

An Enhanced Evolutionary Student Performance Prediction Model Using Whale Optimization Algorithm Boosted with Sine-Cosine Mechanism

Thaer Thaher, Atef Zaguia, Sana Al Azwari, Majdi Mafarja, Hamouda Chantar, Anmar Abuhamdah, Hamza Turabieh, Seyedali Mirjalili, Alaa Sheta
2021 Applied Sciences  
The obtained results show that the LDA classifier is the most reliable classifier with both datasets.  ...  (S-shaped and V-shaped).  ...  Hamsa et al. [47] proposed an academic performance prediction model using two approaches, including fuzzy genetic algorithm (FGA) and DT.  ... 
doi:10.3390/app112110237 fatcat:tsx5nxbpjrcghocurr5vr3edyq
« Previous Showing results 1 — 15 out of 43 results