6,971 research outputs found

    Disseny i construcció d'una sonda atmosfèrica

    Get PDF
    The project consists of the construction of a functional meteorological probe, controlled by an Arduino microcontroller. This probe was design to measure pressure and temperature as functions of the altitude. This device is the first of its kind built at the EETAC, thus a considerable effort of requirement definition has been done. In the present report we describe how all the probesystems were designed, and all the necessary components as well as the reason why they were chosen are described. The resulting design is modular in order to facilitate future improvements/expansions.The steps necessary for the assembly of all the components in a common structure are detailed, as well as the choice of tools and materials. All the systems developed were tested simulating conditions similar to those expected in the real mission.Finally, after the construction and validation processes, all the materials and the tasks needed to launch the probe up to at an altitude of 35 km are detailed.The present report is intended to serve as a guide for futuresimilar projects in EETAC. The resulting device from this work is named FourCast after our surnames

    Storage Solutions for Big Data Systems: A Qualitative Study and Comparison

    Full text link
    Big data systems development is full of challenges in view of the variety of application areas and domains that this technology promises to serve. Typically, fundamental design decisions involved in big data systems design include choosing appropriate storage and computing infrastructures. In this age of heterogeneous systems that integrate different technologies for optimized solution to a specific real world problem, big data system are not an exception to any such rule. As far as the storage aspect of any big data system is concerned, the primary facet in this regard is a storage infrastructure and NoSQL seems to be the right technology that fulfills its requirements. However, every big data application has variable data characteristics and thus, the corresponding data fits into a different data model. This paper presents feature and use case analysis and comparison of the four main data models namely document oriented, key value, graph and wide column. Moreover, a feature analysis of 80 NoSQL solutions has been provided, elaborating on the criteria and points that a developer must consider while making a possible choice. Typically, big data storage needs to communicate with the execution engine and other processing and visualization technologies to create a comprehensive solution. This brings forth second facet of big data storage, big data file formats, into picture. The second half of the research paper compares the advantages, shortcomings and possible use cases of available big data file formats for Hadoop, which is the foundation for most big data computing technologies. Decentralized storage and blockchain are seen as the next generation of big data storage and its challenges and future prospects have also been discussed

    Cloud Security : A Review of Recent Threats and Solution Models

    Get PDF
    The most significant barrier to the wide adoption of cloud services has been attributed to perceived cloud insecurity (Smitha, Anna and Dan, 2012). In an attempt to review this subject, this paper will explore some of the major security threats to the cloud and the security models employed in tackling them. Access control violations, message integrity violations, data leakages, inability to guarantee complete data deletion, code injection, malwares and lack of expertise in cloud technology rank the major threats. The European Union invested €3m in City University London to research into the certification of Cloud security services. This and more recent developments are significant in addressing increasing public concerns regarding the confidentiality, integrity and privacy of data held in cloud environments. Some of the current cloud security models adopted in addressing cloud security threats were – Encryption of all data at storage and during transmission. The Cisco IronPort S-Series web security appliance was among security solutions to solve cloud access control issues. 2-factor Authentication with RSA SecurID and close monitoring appeared to be the most popular solutions to authentication and access control issues in the cloud. Database Active Monitoring, File Active Monitoring, URL Filters and Data Loss Prevention were solutions for detecting and preventing unauthorised data migration into and within clouds. There is yet no guarantee for a complete deletion of data by cloud providers on client requests however; FADE may be a solution (Yang et al., 2012)

    Accelerator Data Foundation : How it all fits together

    Get PDF
    Since 2003, a coherent data management approach was envisaged for the needs of installing, commissioning, operating and maintaining the LHC. Data repositories in the distinct domains of physical equipment, installed components, controls configuration and operational data have been established to cater for these different aspects. The interdependencies between the domains have been implemented as a distributed database. This approach, based on a very wide data foundation, has been used for the LHC and is being extended to the CERN accelerator complex

    An overview of the planned CCAT software system

    Get PDF
    CCAT will be a 25m diameter sub-millimeter telescope capable of operating in the 0.2 to 2.1mm wavelength range. It will be located at an altitude of 5600m on Cerro Chajnantor in northern Chile near the ALMA site. The anticipated first generation instruments include large format (60,000 pixel) kinetic inductance detector (KID) cameras, a large format heterodyne array and a direct detection multi-object spectrometer. The paper describes the architecture of the CCAT software and the development strategy.Comment: 17 pages, 6 figures, to appear in Software and Cyberinfrastructure for Astronomy III, Chiozzi & Radziwill (eds), Proc. SPIE 9152, paper ID 9152-10

    Development and Optimization of NoSQL Database in Food Insecurity Early Warning System Based on Local Community Participation

    Get PDF
    As a part of the food insecurity early warning system based on local participation, a robust and scalable database service is required. This necessity caused by the large area of services which include 34 provinces, 416 districts, 7,215 sub-districts and 80,534 villages in Indonesia. The abundant number of the expected daily transaction might not be handled properly using the traditional model. In this research, we design, implement, and optimize the NoSQL database to create scalable, dynamic, and flexible database service for the early warning system. The cohesion of the model is then measured, resulting in 5 entities with high cohesion, 16 with moderate cohesion, and 3 with low cohesion. After refactoring, we reduced the number of the low-cohesion entity into one and increased the average cohesion from 0.62 to 0.67. An empirical experiment was conducted to compare the response time before and after the refactoring. As the results, the average response time is decreased from 11.0 ms to 7.99 ms or equal to 1.38 in speedup. The experiment results suggest there is an impact of the logical data model improvement, by increasing their cohesion, to the performance of the NoSQL database
    • …
    corecore