This paper addresses mathematical methods to reduce or segment the search space for big data solutions into distinct subspaces with partial solutions. It is achieved by using a data organization structure of 'm-tu...
详细信息
The Message Passing Interface (MPI) is a widely accepted standard for parallel computing on distributed ***, MPI implementations can contain defects that impact the reliability and performance of parallelapplications....
详细信息
The Message Passing Interface (MPI) is a widely accepted standard for parallel computing on distributed ***, MPI implementations can contain defects that impact the reliability and performance of parallelapplications. Detecting and correcting these defects is crucial, yet there is a lack of published models specificallydesigned for correctingMPI defects. To address this, we propose a model for detecting and correcting MPI defects(DC_MPI), which aims to detect and correct defects in various types of MPI communication, including blockingpoint-to-point (BPTP), nonblocking point-to-point (NBPTP), and collective communication (CC). The defectsaddressed by the DC_MPI model include illegal MPI calls, deadlocks (DL), race conditions (RC), and messagemismatches (MM). To assess the effectiveness of the DC_MPI model, we performed experiments on a datasetconsisting of 40 MPI codes. The results indicate that the model achieved a detection rate of 37 out of 40 codes,resulting in an overall detection accuracy of 92.5%. Additionally, the execution duration of the DC_MPI modelranged from 0.81 to 1.36 s. These findings show that the DC_MPI model is useful in detecting and correctingdefects in MPI implementations, thereby enhancing the reliability and performance of parallel applications. TheDC_MPImodel fills an important research gap and provides a valuable tool for improving the quality ofMPI-basedparallel computing systems.
In recent years, cloud computing has witnessed widespread applications across numerous organizations. Predicting workload and computing resource data can facilitate proactive service operation management, leading to s...
详细信息
Attacks on multimedia files by malicious users have become quite common, especially with the increase in the number of editing tools and their ease of use. Considering that such files can now be used both as evidence ...
详细信息
In order to achieve the goal that the manipulator can automatically obtain any position within its working range, and can adjust the end actuator for grasping, a machine vision sorting system is designed. The system p...
详细信息
3D spheroids that are able to mimic the microenvironment of tumors effectively have emerged as significant structures in cancer biology and drug development. This study aims to help cancer researchers monitor the chan...
详细信息
Ambiguity is an inherent feature of language, whose management is crucial for effective communication and collaboration. This is particularly true for Chinese, a language with extensive lexical-morphemic ambiguity. De...
The convergence of digital health systems, Internet of Healthcare Things (IoHT), and Deep Learning (DL) offers intelligent healthcare services to deploy in medical software development with extended decision-making mo...
详细信息
Patient medical information in all forms is crucial to keep private and secure,particularly when medical data communication occurs through insecure ***,there is a bad need for protecting and securing the color medical...
详细信息
Patient medical information in all forms is crucial to keep private and secure,particularly when medical data communication occurs through insecure ***,there is a bad need for protecting and securing the color medical images against impostors and *** this paper,an optical medical image security approach is *** is based on the optical bit-plane Jigsaw Transform(JT)and Fractional Fourier Transform(FFT).Different kernels with a lone lens and a single arbitrary phase code are exploited in this security approach.A preceding bit-plane scrambling process is conducted on the input color medical images prior to the JT and FFT processes to accomplish a tremendous level of robustness and *** confirm the efficiency of the suggested security approach for secure color medical image communication,various assessments on different color medical images are examined based on different statistical security ***,a comparative analysis is introduced between the suggested security approach and other conventional cryptography *** simulation outcomes acquired for performance assessment demonstrate that the suggested security approach is highly *** has excellent encryption/decryption performance and superior security results compared to conventional cryptography approaches with achieving recommended values of average entropy and correlation coefficient of 7.63 and 0.0103 for encrypted images.
In this work application of the latest achievements of synergetic control theory to the construction of new algal bloom models is considered. A three-component model of zooplankton and phytoplankton is used as the bas...
详细信息
暂无评论