Performance of a Browser-Based JavaScript Bandwidth Test
|
|
- Amber Chandler
- 8 years ago
- Views:
Transcription
1 Performance of a Brower-Baed JavaScript Bandwidth Tet David A. Cohen II May 7, 2013 CP SC 491/H495 Abtract An exiting brower-baed bandwidth tet written in JavaScript wa modified for the purpoe of further data collection by the CyberTiger Project. The peed tet reult were compared with thoe of iperf, a tandard internet performance meaurement tool, under variou network contraint. Introduction Becaue the brower-baed PHP peed tet [1] ued by the CyberTiger project provided inaccurate reult, I wa aked to improve the tet or find or write a uitable replacement. After reviewing the exiting code and comparing it with the reult of variou other peed tet on the Internet, it became clear that the bet option wa to ue an open-ource peed tet written with node.j by Joh Erickon (Github: noj) [2]. Depite the fact that the node.j peed tet eemed to be more accurate than the one ued by CyberTiger, it had iue at relatively high peed, topping out at megabyte per econd (MBp), a noted in the project README file. After further optimization and the addition of feature, the modified peed tet wa teted for it limit and it accuracy. The remainder of thi paper dicue the peed tet in more detail, a well a the experiment teting it accuracy and their reult. Background JavaScript and node.j The erver-ide i written in the JavaScript language uing node.j [3], a platform deigned for building network application in JavaScript. It i relatively lightweight (compared to Apache/PHP) and fat due to it non-blocking, eventdriven I/O model. The peed client-ide of the peed tet i written in HTML and JavaScript, uing the JQuery library [4]. Server Uage The erver program i run with the command node./bin/peed.j from the project root directory. A oon a it tart, it tart litening for HTTP requet (in the port pecified in bin/config.jon, or port 8080 by default).
2 Client Uage Once the erver i running, the peed tet hould be acceible in the brower at the machine web root (e.g. When a uer click a button to run the download peed tet, a requet i ent via AJAX (Aynchronou JavaScript And XML) with a number indicating the ize in byte to be downloaded. A repone of zero of the appropriate ize i then ent from the erver. Thi proce repeat everal time, tarting at a download ize of MB, and doubling it in ize each time until a topping parameter a time or ize limit i met. A imilar proce occur during the upload procedure: a tring of zero i repeatedly ent via AJAX to the erver. Unlike the download tet, the upload tet do not double in ize (although both thi parameter and it counterpart for download may be changed in the etting). In both cae, the tranfer peed i meaured from the client ide. If both download and upload peed are teted, reult are then ent back to the erver, which add the reult to the MySQL databae. It wa choen to record the maximum upload and download peed reported for any ingle tranfer, becaue it i more reflective of the maximum utained peed; the reported average of tranfer peed included mall file that did not attain maximum peed due to TCP buildup. Additional Feature The HTML5 geolocation API [5] wa added in order to acquire the phyical location of the uer. If authorized by the uer, data about the uer location (accuracy, longitude, and latitude) i ent back to the erver for torage in the databae. Thi data i helpful to the CyberTiger project, and will be uitable for viualization in the project heatmap of connection quality. The Modernizr library i ued to detect brower without upport for thi geolocation API, and the cript geo-polyfill.j [6] wa ued to acquire the poition with a le accurate method. Experimental Hardware Ued The erver program wa run uing node.j on a Dell Optiplex 755 with an Intel Core 2 Quad CPU 2.40GHz and 8 GB RAM running Ubuntu LTS. The client hot for thi experiment wa a MacBook Pro 5,2 (Early 2009) with an Intel Core GHz and 8GB RAM running Mac OS X
3 Brower Teted There were four brower on the client: Google Chrome (current verion at time of writing) [7], Google Chrome ( Canary development verion) [8], Firefox 20.0 [9], and Safari [10]. Safari and Chrome 26 both ue the WebKit rendering engine (however, Safari i a 64-bit application and Chrome i 32-bit). Chrome ue Blink, a fork of WebKit currently in development. Firefox ue it own rendering engine, Gecko. Safari ue the Nitro JavaScript Engine, Firefox ue the IonMonkey engine, and both verion of Google Chrome ue the V8 JavaScript Engine. Other Tool Ued in thi Experiment The tool Network Link Conditioner, a preference pane for OS X made by Apple, wa ued to place limit on the uptream and downtream bandwidth in order to imulate real-world condition in a controlled environment. Additionally, the open-ource command-line tool iperf [11] wa ued to meaure throughput between hot a a benchmark, and in order to check the accuracy of Network Link Conditioner throughput contraint. Procedure The client hot wa connected to gigabit Ethernet and plugged into AC power. All four brower and SSH window for controlling the erver were open during the experiment. The experiment wa conducted on a day with minimal congetion in order to avoid error. The performance of the network wa teted firt with iperf with the command iperf and iperf c <erver> -fm on each the client and the erver to tet throughput in both direction. Speed tet were then run on each of the four brower multiple time to tet conitency and reliability. The tet indice in the MySQL table and the peed reported by iperf were recorded in Microoft Excel. Thi procedure wa performed without any network contraint, then uing Network Link Conditioner to tet download peed limited at 780kbp, 6mbp, 12mbp, 14mbp, 48mbp, and 96mbp, and upload peed limited at 330kp, 1mbp, 2mbp, 4mbp, 8mbp 32mbp, 64mbp, 128mbp, 256mbp, and 512mbp.
4 Reult iperf and node.j upload peed tet reult under network bandwidth contraint Upload Speed, Megabyte/ k bp 1mbp 2mbp 4mbp 8mbp 32mb p 64mb p 128m bp 256m p 512m bp Mean iperf reult Mean node.j reult Upload Limit, Megabit/ Mean iperf reult Mean node.j reult iperf and node.j download peed tet reult under network bandwidth contraint Download Speed, Megabyte/ kbp 6mbp 12mbp 24mbp 48mbp 96mbp Downlad Speed Limit, Megabit/ mean iperf reult mean node.j reult
5 iperf v node.j reult without contraint Download Speed, Megabyte/ Gigabit Download Gigabit Upload Tet Reult (gigabit connection) Mean iperf reult Mean node.j reult Connection Performance of Brower and iperf on uncontrained gigabit 120 Speed, Megabyte/ iperf Chrome Chrome Brower Firefox 20.0 Safari Mean downtream performance Diuion The reult ugget that, when contrained to low peed, the upload and download tet are relatively accurate when compared to reult returned by iperf. However, upload peed tend to be under-reported at peed above 32 Mbp (4 MBp). In contrat, the reult of the download tet remained imilar to thoe of iperf up to 96 Mbp (12 MBp). An iue with Network Link Conditioner eem to affect the maximum download peed, becaue at and above 96 Mbp, reult from both iperf and the node.j peedtet are inaccurate.
6 In contrat, the tet that compare the iperf and node.j peed tet reult without bandwidth contraint how that iperf report higher upload and download peed than node.j, uggeting the node.j peed tet i inaccurate at high peed. Though it appear that accuracy degrade gradually a peed increae in the upload tet, it i unknown whether thi i the cae for the download peed, a it reult remained conitent with thoe of iperf for the other contrained tet. The comparion of brower how that there tend to be light difference in the download reult reported by different brower at the uncontrained gigabit peed, and that all of them are lower than the reult reported by iperf. Thi ugget that the limit of the peed tet are due at leat in part to performance of the client-ide JavaScript. Concluion Though an improvement over the previou peed tet, the data how that thi one i not without it limit. Though the exact detail of thee limit are not yet known, it i hown that the tet remain accurate in the brower teted for peed available with local ISP (other than Clemon Univerity). Further teting i neceary, however, to find out exactly the nature of thee limit, and whether thee limitation are fundamental to JavaScript-baed peed tet. Future Work The future work for thi project include both further development and further teting and analyi. One poible modification i a change in implementation from AJAX-baed tranfer to HTML5 Webocket-baed one. Though not compatible in all brower, it i poible that Webocket could provide more accurate reult, perhap with higher bandwidth limitation. Further teting could include more analyi of the current data, in addition to more tet being performed with different device and brower. Link [1] [2] [3] [4] [5] [6] [7]
7 [8] [9] [10] [11]
Mobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN
Mobile Network Configuration for Large-cale Multimedia Delivery on a Single WLAN Huigwang Je, Dongwoo Kwon, Hyeonwoo Kim, and Hongtaek Ju Dept. of Computer Engineering Keimyung Univerity Daegu, Republic
More informationCluster-Aware Cache for Network Attached Storage *
Cluter-Aware Cache for Network Attached Storage * Bin Cai, Changheng Xie, and Qiang Cao National Storage Sytem Laboratory, Department of Computer Science, Huazhong Univerity of Science and Technology,
More informationPerformance of Multiple TFRC in Heterogeneous Wireless Networks
Performance of Multiple TFRC in Heterogeneou Wirele Network 1 Hyeon-Jin Jeong, 2 Seong-Sik Choi 1, Firt Author Computer Engineering Department, Incheon National Univerity, oaihjj@incheon.ac.kr *2,Correponding
More informationDISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle
DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS G. Chapman J. Cleee E. Idle ABSTRACT Content matching i a neceary component of any ignature-baed network Intruion Detection
More informationDISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS
DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS Chritopher V. Kopek Department of Computer Science Wake Foret Univerity Winton-Salem, NC, 2709 Email: kopekcv@gmail.com
More informationName: SID: Instructions
CS168 Fall 2014 Homework 1 Aigned: Wedneday, 10 September 2014 Due: Monday, 22 September 2014 Name: SID: Dicuion Section (Day/Time): Intruction - Submit thi homework uing Pandagrader/GradeScope(http://www.gradecope.com/
More informationTap Into Smartphone Demand: Mobile-izing Enterprise Websites by Using Flexible, Open Source Platforms
Tap Into Smartphone Demand: Mobile-izing Enterprie Webite by Uing Flexible, Open Source Platform acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 Tap Into Smartphone Demand:
More informationReport 4668-1b 30.10.2010. Measurement report. Sylomer - field test
Report 4668-1b Meaurement report Sylomer - field tet Report 4668-1b 2(16) Contet 1 Introduction... 3 1.1 Cutomer... 3 1.2 The ite and purpoe of the meaurement... 3 2 Meaurement... 6 2.1 Attenuation of
More informationApigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management
Apigee Edge: Apigee Cloud v. Private Cloud Evaluating deployment model for API management Table of Content Introduction 1 Time to ucce 2 Total cot of ownerhip 2 Performance 3 Security 4 Data privacy 4
More informationDOCUMENT REFERENCE: SQ309-002-EN. SAMKNOWS TEST METHODOLOGY Web-based Broadband Performance White Paper. July 2015
DOCUMENT REFERENCE: SQ309-002-EN SAMKNOWS TEST METHODOLOGY Web-based Broadband Performance White Paper July 2015 SAMKNOWS QUALITY CONTROLLED DOCUMENT. SQ REV LANG STATUS OWNER DATED 309 03 EN FINAL SC
More informationCASE STUDY ALLOCATE SOFTWARE
CASE STUDY ALLOCATE SOFTWARE allocate caetud y TABLE OF CONTENTS #1 ABOUT THE CLIENT #2 OUR ROLE #3 EFFECTS OF OUR COOPERATION #4 BUSINESS PROBLEM THAT WE SOLVED #5 CHALLENGES #6 WORKING IN SCRUM #7 WHAT
More informationA Review On Software Testing In SDlC And Testing Tools
www.ijec.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Iue -9 September, 2014 Page No. 8188-8197 A Review On Software Teting In SDlC And Teting Tool T.Amruthavalli*,
More informationVery special thanks to Wolfgang Gentzsch and Burak Yenier for making the UberCloud HPC Experiment possible.
Digital manufacturing technology and convenient acce to High Performance Computing (HPC) in indutry R&D are eential to increae the quality of our product and the competitivene of our companie. Progre can
More informationInternational Journal of Heat and Mass Transfer
International Journal of Heat and Ma Tranfer 5 (9) 14 144 Content lit available at ScienceDirect International Journal of Heat and Ma Tranfer journal homepage: www.elevier.com/locate/ijhmt Technical Note
More informationSCM- integration: organiational, managerial and technological iue M. Caridi 1 and A. Sianei 2 Dipartimento di Economia e Produzione, Politecnico di Milano, Italy E-mail: maria.caridi@polimi.it Itituto
More informationA technical guide to 2014 key stage 2 to key stage 4 value added measures
A technical guide to 2014 key tage 2 to key tage 4 value added meaure CONTENTS Introduction: PAGE NO. What i value added? 2 Change to value added methodology in 2014 4 Interpretation: Interpreting chool
More informationTurbulent Mixing and Chemical Reaction in Stirred Tanks
Turbulent Mixing and Chemical Reaction in Stirred Tank André Bakker Julian B. Faano Blend time and chemical product ditribution in turbulent agitated veel can be predicted with the aid of Computational
More informationLicense & SW Asset Management at CES Design Services
Licene & SW Aet Management at CES Deign Service johann.poechl@iemen.com www.ces-deignservice.com 2003 Siemen AG Öterreich Overview 1. Introduction CES Deign Service 2. Objective and Motivation 3. What
More informationA Spam Message Filtering Method: focus on run time
, pp.29-33 http://dx.doi.org/10.14257/atl.2014.76.08 A Spam Meage Filtering Method: focu on run time Sin-Eon Kim 1, Jung-Tae Jo 2, Sang-Hyun Choi 3 1 Department of Information Security Management 2 Department
More informationWarehouse Security System based on Embedded System
International Conference on Logitic Engineering, Management and Computer Science (LEMCS 2015) Warehoue Security Sytem baed on Embedded Sytem Gen Li Department of Electronic Engineering, Tianjin Univerity
More informationBio-Plex Analysis Software
Multiplex Supenion Array Bio-Plex Analyi Software The Leader in Multiplex Immunoaay Analyi Bio-Plex Analyi Software If making ene of your multiplex data i your challenge, then Bio-Plex data analyi oftware
More informationDespeckling Synthetic Aperture Radar Images with Cloud Computing using Graphics Processing Units
Depeckling Synthetic Aperture Radar Image with Cloud Computing uing Graphic Proceing Unit Matej Keneman 1, Dušan Gleich, Amor Chowdhury 1 1 Margento R & D d.o.o., Gopovetka ceta 84, Maribor, Slovenia matej.keneman@gmail.com
More informationFEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS
Aignment Report RP/98-983/5/0./03 Etablihment of cientific and technological information ervice for economic and ocial development FOR INTERNAL UE NOT FOR GENERAL DITRIBUTION FEDERATION OF ARAB CIENTIFIC
More informationExposure Metering Relating Subject Lighting to Film Exposure
Expoure Metering Relating Subject Lighting to Film Expoure By Jeff Conrad A photographic expoure meter meaure ubject lighting and indicate camera etting that nominally reult in the bet expoure of the film.
More informationTowards Control-Relevant Forecasting in Supply Chain Management
25 American Control Conference June 8-1, 25. Portland, OR, USA WeA7.1 Toward Control-Relevant Forecating in Supply Chain Management Jay D. Schwartz, Daniel E. Rivera 1, and Karl G. Kempf Control Sytem
More informationREDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND TAGUCHI METHODOLOGY. Abstract. 1.
International Journal of Advanced Technology & Engineering Reearch (IJATER) REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND Abtract TAGUCHI METHODOLOGY Mr.
More information2. METHOD DATA COLLECTION
Key to learning in pecific ubject area of engineering education an example from electrical engineering Anna-Karin Cartenen,, and Jonte Bernhard, School of Engineering, Jönköping Univerity, S- Jönköping,
More informationThe MLS Guide to installing Silverlight on your Microsoft Windows or Apple Macintosh Operating System
MLS 2009 The MLS Guide to installing Silverlight on your Microsoft or Apple Macintosh Operating System This document covers the compatibility of the Silverlight client interfaces. The Management interface
More informationThird Party Technical Guidelines
Third Party Technical Guideline Configuration Guide Releae: Document Reviion: Ditribution Statu: NICE Engage Platform 6.3 / NICE Interaction Management 4.1 Real-Time Solution 4.9 NICE Perform 3.2 / 3.5
More informationAlgorithms for Advance Bandwidth Reservation in Media Production Networks
Algorithm for Advance Bandwidth Reervation in Media Production Network Maryam Barhan 1, Hendrik Moen 1, Jeroen Famaey 2, Filip De Turck 1 1 Department of Information Technology, Ghent Univerity imind Gaton
More informationUtility-Based Flow Control for Sequential Imagery over Wireless Networks
Utility-Baed Flow Control for Sequential Imagery over Wirele Networ Tomer Kihoni, Sara Callaway, and Mar Byer Abtract Wirele enor networ provide a unique et of characteritic that mae them uitable for building
More informationA New Optimum Jitter Protection for Conversational VoIP
Proc. Int. Conf. Wirele Commun., Signal Proceing (Nanjing, China), 5 pp., Nov. 2009 A New Optimum Jitter Protection for Converational VoIP Qipeng Gong, Peter Kabal Electrical & Computer Engineering, McGill
More informationSPECIFICATIONS FOR PERIMETER FIREWALL. APPENDIX-24 Complied (Yes / No) Remark s. S.No Functional Requirements :
S.No Functional Requirement : 1 The propoed olution mut allow ingle policy rule creation for application control, uer baed control, hot profile, threat prevention, Anti-viru, file filtering, content filtering,
More information6. Friction, Experiment and Theory
6. Friction, Experiment and Theory The lab thi wee invetigate the rictional orce and the phyical interpretation o the coeicient o riction. We will mae ue o the concept o the orce o gravity, the normal
More informationTwo Dimensional FEM Simulation of Ultrasonic Wave Propagation in Isotropic Solid Media using COMSOL
Excerpt from the Proceeding of the COMSO Conference 0 India Two Dimenional FEM Simulation of Ultraonic Wave Propagation in Iotropic Solid Media uing COMSO Bikah Ghoe *, Krihnan Balaubramaniam *, C V Krihnamurthy
More informationLabStats 5 System Requirements
LabStats Tel: 877-299-6241 255 B St, Suite 201 Fax: 208-473-2989 Idaho Falls, ID 83402 LabStats 5 System Requirements Server Component Virtual Servers: There is a limit to the resources available to virtual
More informationAssessing the Discriminatory Power of Credit Scores
Aeing the Dicriminatory Power of Credit Score Holger Kraft 1, Gerald Kroiandt 1, Marlene Müller 1,2 1 Fraunhofer Intitut für Techno- und Wirtchaftmathematik (ITWM) Gottlieb-Daimler-Str. 49, 67663 Kaierlautern,
More informationTRADING rules are widely used in financial market as
Complex Stock Trading Strategy Baed on Particle Swarm Optimization Fei Wang, Philip L.H. Yu and David W. Cheung Abtract Trading rule have been utilized in the tock market to make profit for more than a
More informationPekka Helkiö, 58490K Antti Seppälä, 63212W Ossi Syd, 63513T
Pekka Helkiö, 58490K Antti Seppälä, 63212W Oi Syd, 63513T Table of Content 1. Abtract...1 2. Introduction...2 2.1 Background... 2 2.2 Objective and Reearch Problem... 2 2.3 Methodology... 2 2.4 Scoping
More informationTable 1 summarizes the requirements for desktop computers running the Participant Application and the myat&t utility.
SYSTEM REQUIREMENTS Participant Application and myat&t Table 1 summarizes the requirements for desktop computers running the Participant Application and the myat&t utility. End-user Computer for Participant
More informationA Resolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networks
A Reolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networ Joé Craveirinha a,c, Rita Girão-Silva a,c, João Clímaco b,c, Lúcia Martin a,c a b c DEEC-FCTUC FEUC INESC-Coimbra International
More informationMANAGING DATA REPLICATION IN MOBILE AD- HOC NETWORK DATABASES (Invited Paper) *
MANAGING DATA REPLICATION IN MOBILE AD- HOC NETWORK DATABASES (Invited Paper) * Praanna Padmanabhan School of Computer Science The Univerity of Oklahoma Norman OK, USA praannap@yahoo-inc.com Dr. Le Gruenwald
More informationMixed Method of Model Reduction for Uncertain Systems
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol 4 No June Mixed Method of Model Reduction for Uncertain Sytem N Selvaganean Abtract: A mixed method for reducing a higher order uncertain ytem to a table reduced
More informationTrusted Document Signing based on use of biometric (Face) keys
Truted Document Signing baed on ue of biometric (Face) Ahmed B. Elmadani Department of Computer Science Faculty of Science Sebha Univerity Sebha Libya www.ebhau.edu.ly elmadan@yahoo.com ABSTRACT An online
More informationQueueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems,
MANAGEMENT SCIENCE Vol. 54, No. 3, March 28, pp. 565 572 in 25-199 ein 1526-551 8 543 565 inform doi 1.1287/mnc.17.82 28 INFORMS Scheduling Arrival to Queue: A Single-Server Model with No-Show INFORMS
More informationUnit 11 Using Linear Regression to Describe Relationships
Unit 11 Uing Linear Regreion to Decribe Relationhip Objective: To obtain and interpret the lope and intercept of the leat quare line for predicting a quantitative repone variable from a quantitative explanatory
More informationControl of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling
Control of Wirele Network with Flow Level Dynamic under Contant Time Scheduling Long Le and Ravi R. Mazumdar Department of Electrical and Computer Engineering Univerity of Waterloo,Waterloo, ON, Canada
More informationPorts utilisés. Ports utilisés par le XT1000/5000 :
Ports utilisés Ports utilisés par le XT1000/5000 : 80 HTTP (TCP) WEB server 123 SNTP (UDP) SNTP Client 161 SNMP (UDP) SNMP Configuration and Status 162 SNMP (UDP) SNMP Traps and events 1718 H.225/RAS (UDP)
More informationNo. 73,122 MODEL FORM OF VERDICT ITEMIZING PERSONAL INJURY DAMAGES (TORT REFORM ACT OF 1986, S 768.77 F.S. 1987)
CORRECTED OPINION No. 73,122 IN RE: STANDARD JURY INSTRUCTIONS (CIVIL CASES 88-2) [March 2, 19891 PER CURIAM. The Florida Supreme Court Committee on Standard Jury Intruction (Civil) ha recommended to thi
More informationReturn on Investment and Effort Expenditure in the Software Development Environment
International Journal of Applied Information ytem (IJAI) IN : 2249-0868 Return on Invetment and Effort Expenditure in the oftware Development Environment Dineh Kumar aini Faculty of Computing and IT, ohar
More informationCASE STUDY BRIDGE. www.future-processing.com
CASE STUDY BRIDGE TABLE OF CONTENTS #1 ABOUT THE CLIENT 3 #2 ABOUT THE PROJECT 4 #3 OUR ROLE 5 #4 RESULT OF OUR COLLABORATION 6-7 #5 THE BUSINESS PROBLEM THAT WE SOLVED 8 #6 CHALLENGES 9 #7 VISUAL IDENTIFICATION
More informationBrainlab Node TM Technical Specifications
Brainlab Node TM Technical Specifications BRAINLAB NODE TM HP ProLiant DL360p Gen 8 CPU: Chipset: RAM: HDD: RAID: Graphics: LAN: HW Monitoring: Height: Width: Length: Weight: Operating System: 2x Intel
More informationControl Theory based Approach for the Improvement of Integrated Business Process Interoperability
www.ijcsi.org 201 Control Theory baed Approach for the Improvement of Integrated Buine Proce Interoperability Abderrahim Taoudi 1, Bouchaib Bounabat 2 and Badr Elmir 3 1 Al-Qualadi Reearch & Development
More informationThe Cash Flow Statement: Problems with the Current Rules
A C C O U N T I N G & A U D I T I N G accounting The Cah Flow Statement: Problem with the Current Rule By Neii S. Wei and Jame G.S. Yang In recent year, the tatement of cah flow ha received increaing attention
More informationEnterprise Manager. Version 6.2. Installation Guide
Enterprise Manager Version 6.2 Installation Guide Enterprise Manager 6.2 Installation Guide Document Number 680-028-014 Revision Date Description A August 2012 Initial release to support version 6.2.1
More informationinforouter V8.0 Server & Client Requirements
inforouter V8.0 Server & Client Requirements Please review this document thoroughly before proceeding with the installation of inforouter Version 8. This document describes the minimum and recommended
More informationRO-BURST: A Robust Virtualization Cost Model for Workload Consolidation over Clouds
!111! 111!ttthhh IIIEEEEEEEEE///AAACCCMMM IIInnnttteeerrrnnnaaatttiiiooonnnaaalll SSSyyymmmpppoooiiiuuummm ooonnn CCCllluuuttteeerrr,,, CCClllooouuuddd aaannnddd GGGrrriiiddd CCCooommmpppuuutttiiinnnggg
More informationAbstract parsing: static analysis of dynamically generated string output using LR-parsing technology
Abtract paring: tatic analyi of dynamically generated tring output uing LR-paring technology Kyung-Goo Doh 1, Hyunha Kim 1, David A. Schmidt 2 1 Hanyang Univerity, Anan, South Korea 2 Kana State Univerity,
More informationEncrypted TCP chat using RSA and AES algorithm
Encrypted TCP chat uing RSA and AES algorithm Krzyztof Jakub Szala Bachelor Thei April 2014 Degree Programme in Information Technology Technology, communication and tranport DESCRIPTION Author() SZALA
More informationDistributed, Secure Load Balancing with Skew, Heterogeneity, and Churn
Ditributed, Secure Load Balancing with Skew, Heterogeneity, and Churn Jonathan Ledlie and Margo Seltzer Diviion of Engineering and Applied Science Harvard Univerity Abtract Numerou propoal exit for load
More informationDelft. Matlab and Simulink for Modeling and Control. Robert Babuška and Stefano Stramigioli. November 1999
Matlab and Simulink for Modeling and Control Robert Babuška and Stefano Stramigioli November 999 Delft Delft Univerity of Technology Control Laboratory Faculty of Information Technology and Sytem Delft
More informationAnalysis of Mesostructure Unit Cells Comprised of Octet-truss Structures
Analyi of Meotructure Unit Cell Compried of Octet-tru Structure Scott R. Johnton *, Marque Reed *, Hongqing V. Wang, and David W. Roen * * The George W. Woodruff School of Mechanical Engineering, Georgia
More informationCONFIGURING MICROSOFT SQL SERVER REPORTING SERVICES
CONFIGURING MICROSOFT SQL SERVER REPORTING SERVICES TECHNICAL ARTICLE November/2011. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
More informationTesting Documentation for CCIH Database Management System By: John Reeves, Derek King, and Robert Watts
Teting Documentation for CCIH Databae Management Sytem By: John Reeve, Derek King, and Robert Watt The teting proce for our project i divided into three part of Unit teting, one part of Integration/Function
More informationMcKesson Radiology 12.0 Technical Requirements
McKesson Radiology 12.0 Technical Requirements McKesson Radiology Version 12.0 is designed to not require workstation replacement, assuming the legacy McKesson PACS hardware meets the specifications listed
More informationOptimizing a Semantic Comparator using CUDA-enabled Graphics Hardware
Optimizing a Semantic Comparator uing CUDA-enabled Graphic Hardware Aalap Tripathy Suneil Mohan, Rabi Mahapatra Embedded Sytem and Codeign Lab codeign.ce.tamu.edu (Preented at ICSC 0, September 9, 0 in
More informationReview of Multiple Regression Richard Williams, University of Notre Dame, http://www3.nd.edu/~rwilliam/ Last revised January 13, 2015
Review of Multiple Regreion Richard William, Univerity of Notre Dame, http://www3.nd.edu/~rwilliam/ Lat revied January 13, 015 Aumption about prior nowledge. Thi handout attempt to ummarize and yntheize
More informationSage Grant Management System Requirements
Sage Grant Management System Requirements You should meet or exceed the following system requirements: One Server - Database/Web Server The following system requirements are for Sage Grant Management to
More informationWireless and Battery-less Sensor Using RF Energy Harvesting
DOI.56/etc4/. Wirele and Battery-le Senor Uing RF Energy Harveting Chritian Merz, Gerald Kupri, Maximilian Niedernhuber 3 Deggendorf Intitute of Technology, Edlmairtr. 6 + 8, 94469 Deggendorf, Germany
More informationHow to Maximize User Satisfaction Degree in Multi-service IP Networks
How to Maximize Uer Satifaction Degree in Multi-ervice IP Network Huy Anh Nguyen, Tam Van Nguyen and Deokai Choi Department of Electronic and Computer Engineering Chonnam National Univerity Gwangu, KOREA
More informationImagery Portal Workshop #2 Department of Administrative Services, Executive Building Salem, Oregon May 11, 2006
ry Portal Workhop #2 Department of Adminitrative Service, Executive Building Salem, Oregon May 11, 2006 Workhop Purpoe: dicu the outcome of the phae 1 coping proce for development of an imagery portal
More informationComputing Location from Ambient FM Radio Signals
Computing Location from Ambient FM Radio Signal Adel Youef Department of Computer Science Univerity of Maryland A.V. William Building College Park, MD 20742 adel@c.umd.edu John Krumm, Ed Miller, Gerry
More informationSHARESYNC SECURITY FEATURES
www.kyboxinnovation.com SHARESYNC SECURITY FEATURES ShareSync provide a high degree of ecurity and protection which allow adminitrator to: Aure compliance with ecurity bet practice Get full viibility over
More informationImproving Energy Efficiency in Data Centers and federated Cloud Environments
Improving Energy Efficiency in Data Center and federated Cloud Environment Comparion of CoolEmAll and Eco2Cloud approache and metric Eugen Volk, Axel Tenchert, Michael Gienger High erformance Computing
More informationRequirements Engineering Databases: The Good, The Bad, and The Ugly
New England Databae Day (NEDBDay08) February 4, 2008 Requirement Engineering Databae: The Good, The Bad, and The Ugly Brian Berenbach Siemen Corporate Reearch brian.berenbach@iemen.com 1 Agenda Brief Introduction
More informationGUIDELINE FOR FIELD TESTING OF GAS TURBINE AND CENTRIFUGAL COMPRESSOR PERFORMANCE
GUIDELINE FOR FIELD TESTING OF GAS TURBINE AND CENTRIFUGAL COMPRESSOR PERFORMANCE RELEASE.0 Augut 006 Ga Machinery Reearch Council Southwet Reearch Intitute Thi page i intentionally left blank. GUIDELINE
More information1) Assume that the sample is an SRS. The problem state that the subjects were randomly selected.
12.1 Homework for t Hypothei Tet 1) Below are the etimate of the daily intake of calcium in milligram for 38 randomly elected women between the age of 18 and 24 year who agreed to participate in a tudy
More informationAcceleration-Displacement Crash Pulse Optimisation A New Methodology to Optimise Vehicle Response for Multiple Impact Speeds
Acceleration-Diplacement Crah Pule Optimiation A New Methodology to Optimie Vehicle Repone for Multiple Impact Speed D. Gildfind 1 and D. Ree 2 1 RMIT Univerity, Department of Aeropace Engineering 2 Holden
More informationVMware Horizon FLEX User Guide
Horizon FLEX 1.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this
More informationOPINION PIECE. It s up to the customer to ensure security of the Cloud
OPINION PIECE It up to the cutomer to enure ecurity of the Cloud Content Don t outource what you don t undertand 2 The check lit 2 Step toward control 4 Due Diligence 4 Contract 4 E-dicovery 4 Standard
More informationInstall Guide Housatonic Project Plan for Web. Housatonic Software - Project Plan 365 App
Install Guide Housatonic Project Plan for Web Housatonic Software - Project Plan 365 App 2014 Contents 1. Introduction... 3 2. Requirements... 4 2.1 Client-side / Workstation Requirements... 4 2.2 Server-side
More informationINFORMATION Technology (IT) infrastructure management
IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 2, NO. 1, MAY 214 1 Buine-Driven Long-term Capacity Planning for SaaS Application David Candeia, Ricardo Araújo Santo and Raquel Lope Abtract Capacity Planning
More informationQuark Publishing Platform 9.5 ReadMe
Quark Publishing Platform 9.5 ReadMe CONTENTS Contents Quark Publishing Platform 9.5 ReadMe...5 Quark Publishing Platform components...6 Compatibility matrix...6 Server components...7 Other optional components...8
More informationIntroduction to Web Development
Introduction to Web Development Week 1 - Intro, The Internet!, & Dev Environment Dr. Paul Talaga 487 Rhodes paul.talaga@uc.edu ACM Lecture Series University of Cincinnati, OH October 10, 2012 1/12 About
More informationQuark Publishing Platform 9.5.1.1 ReadMe
Quark Publishing Platform 9.5.1.1 ReadMe TABLE DES MATIÈRES Table des matières Quark Publishing Platform 9.5.1.1 ReadMe...5 Quark Publishing Platform components...6 Compatibility matrix...6 Server components...8
More informationSELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE
SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE RAVI KUMAR G 1, C.MUTHUSAMY 2 & A.VINAYA BABU 3 1 HP Bangalore, Reearch Scholar JNTUH, Hyderabad, India, 2 Yahoo, Bangalore,
More informationFour Ways Companies Can Use Open Source Social Publishing Tools to Enhance Their Business Operations
Four Way Companie Can Ue Open Source Social Publihing Tool to Enhance Their Buine Operation acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 Four Way Companie Can Ue Open
More informationThe Arms Race on American Roads: The Effect of SUV s and Pickup Trucks on Traffic Safety
The Arm Race on American Road: The Effect of SUV and Pickup Truck on Traffic Safety Michelle J. White Univerity of California, San Diego, and NBER Abtract Driver have been running an arm race on American
More informationA Note on Profit Maximization and Monotonicity for Inbound Call Centers
OPERATIONS RESEARCH Vol. 59, No. 5, September October 2011, pp. 1304 1308 in 0030-364X ein 1526-5463 11 5905 1304 http://dx.doi.org/10.1287/opre.1110.0990 2011 INFORMS TECHNICAL NOTE INFORMS hold copyright
More informationMcKesson Radiology 12.1.1 Technical Requirements
McKesson Radiology 12.1.1 Technical Requirements McKesson Radiology Version 12.1.1 is designed to not require workstation replacement, assuming the legacy McKesson PACS hardware meets the specifications
More informationCHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY
Annale Univeritati Apuleni Serie Oeconomica, 2(2), 200 CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Sidonia Otilia Cernea Mihaela Jaradat 2 Mohammad
More informationDigifort Enterprise The most complete Digifort solution for camera and alarm monitoring.
Digifort Enterprie The mot complete Digifort olution for camera and alarm monitoring. The Enterprie verion i the package which comprie all of the feature available in the Digifort Sytem, offering complete
More informationMicrosoft Windows Apple Mac OS X
Products Snow License Manager Snow Inventory Server, IDP, IDR Client for Windows Client for OSX Client for Linux Client for Unix Oracle Scanner External Data Provider Snow Distribution Date 2014-02-12
More informationRequest support: ecentral.graphics.kodak.com
Kodak Graphic Communications Canada Company 4225 Kincaid Street Burnaby, B.C., Canada V5G 4P5Tel: 1.604.451.2700 Fax: 1.604.437.9891 Release date: 17 May 2015 Doc number: 719-01475C Rev A Request support:
More informationNETWORK TRAFFIC ENGINEERING WITH VARIED LEVELS OF PROTECTION IN THE NEXT GENERATION INTERNET
Chapter 1 NETWORK TRAFFIC ENGINEERING WITH VARIED LEVELS OF PROTECTION IN THE NEXT GENERATION INTERNET S. Srivatava Univerity of Miouri Kana City, USA hekhar@conrel.ice.umkc.edu S. R. Thirumalaetty now
More informationSystem requirements. for Installation of LANDESK Service Desk 2016. Clarita-Bernhard-Str. 25 D 81249 Muenchen. Magelan GmbH
System requirements for Installation of LANDESK Service Desk 2016 Created by: Magelan GmbH Magelan GmbH Clarita-Bernhard-Str. 25 D 81249 Muenchen Version Version Date Author Description 1.0 22.11.2012
More informationREDCENTRIC UNITY SOFTWARE MINIMUM REQUIREMENTS
REDCENTRIC UNITY SOFTWARE MINIMUM REQUIREMENTS User Guide v1.0 12/08/2014 VERSION CONTROL Date Change Author 12/08/14 1.0 Initial version created and signed off DM Page 2 Public UNITY SOFTWARE MINIMUM
More informationSystem Requirements for Online Testing
System Requirements for Online Testing 2015 2016 Overview This document was developed by the American Institutes for Research (AIR) and the Florida Department of Education (FDOE) and contains technology
More informationIntroduction to the article Degrees of Freedom.
Introduction to the article Degree of Freedom. The article by Walker, H. W. Degree of Freedom. Journal of Educational Pychology. 3(4) (940) 53-69, wa trancribed from the original by Chri Olen, George Wahington
More informationGrant Management. System Requirements
January 26, 2014 This is a publication of Abila, Inc. Version 2014.x 2013 Abila, Inc. and its affiliated entities. All rights reserved. Abila, the Abila logos, and the Abila product and service names mentioned
More information