Performance of a Browser-Based JavaScript Bandwidth Test

Size: px
Start display at page:

Download "Performance of a Browser-Based JavaScript Bandwidth Test"

Transcription

1 Performance of a Brower-Baed JavaScript Bandwidth Tet David A. Cohen II May 7, 2013 CP SC 491/H495 Abtract An exiting brower-baed bandwidth tet written in JavaScript wa modified for the purpoe of further data collection by the CyberTiger Project. The peed tet reult were compared with thoe of iperf, a tandard internet performance meaurement tool, under variou network contraint. Introduction Becaue the brower-baed PHP peed tet [1] ued by the CyberTiger project provided inaccurate reult, I wa aked to improve the tet or find or write a uitable replacement. After reviewing the exiting code and comparing it with the reult of variou other peed tet on the Internet, it became clear that the bet option wa to ue an open-ource peed tet written with node.j by Joh Erickon (Github: noj) [2]. Depite the fact that the node.j peed tet eemed to be more accurate than the one ued by CyberTiger, it had iue at relatively high peed, topping out at megabyte per econd (MBp), a noted in the project README file. After further optimization and the addition of feature, the modified peed tet wa teted for it limit and it accuracy. The remainder of thi paper dicue the peed tet in more detail, a well a the experiment teting it accuracy and their reult. Background JavaScript and node.j The erver-ide i written in the JavaScript language uing node.j [3], a platform deigned for building network application in JavaScript. It i relatively lightweight (compared to Apache/PHP) and fat due to it non-blocking, eventdriven I/O model. The peed client-ide of the peed tet i written in HTML and JavaScript, uing the JQuery library [4]. Server Uage The erver program i run with the command node./bin/peed.j from the project root directory. A oon a it tart, it tart litening for HTTP requet (in the port pecified in bin/config.jon, or port 8080 by default).

2 Client Uage Once the erver i running, the peed tet hould be acceible in the brower at the machine web root (e.g. When a uer click a button to run the download peed tet, a requet i ent via AJAX (Aynchronou JavaScript And XML) with a number indicating the ize in byte to be downloaded. A repone of zero of the appropriate ize i then ent from the erver. Thi proce repeat everal time, tarting at a download ize of MB, and doubling it in ize each time until a topping parameter a time or ize limit i met. A imilar proce occur during the upload procedure: a tring of zero i repeatedly ent via AJAX to the erver. Unlike the download tet, the upload tet do not double in ize (although both thi parameter and it counterpart for download may be changed in the etting). In both cae, the tranfer peed i meaured from the client ide. If both download and upload peed are teted, reult are then ent back to the erver, which add the reult to the MySQL databae. It wa choen to record the maximum upload and download peed reported for any ingle tranfer, becaue it i more reflective of the maximum utained peed; the reported average of tranfer peed included mall file that did not attain maximum peed due to TCP buildup. Additional Feature The HTML5 geolocation API [5] wa added in order to acquire the phyical location of the uer. If authorized by the uer, data about the uer location (accuracy, longitude, and latitude) i ent back to the erver for torage in the databae. Thi data i helpful to the CyberTiger project, and will be uitable for viualization in the project heatmap of connection quality. The Modernizr library i ued to detect brower without upport for thi geolocation API, and the cript geo-polyfill.j [6] wa ued to acquire the poition with a le accurate method. Experimental Hardware Ued The erver program wa run uing node.j on a Dell Optiplex 755 with an Intel Core 2 Quad CPU 2.40GHz and 8 GB RAM running Ubuntu LTS. The client hot for thi experiment wa a MacBook Pro 5,2 (Early 2009) with an Intel Core GHz and 8GB RAM running Mac OS X

3 Brower Teted There were four brower on the client: Google Chrome (current verion at time of writing) [7], Google Chrome ( Canary development verion) [8], Firefox 20.0 [9], and Safari [10]. Safari and Chrome 26 both ue the WebKit rendering engine (however, Safari i a 64-bit application and Chrome i 32-bit). Chrome ue Blink, a fork of WebKit currently in development. Firefox ue it own rendering engine, Gecko. Safari ue the Nitro JavaScript Engine, Firefox ue the IonMonkey engine, and both verion of Google Chrome ue the V8 JavaScript Engine. Other Tool Ued in thi Experiment The tool Network Link Conditioner, a preference pane for OS X made by Apple, wa ued to place limit on the uptream and downtream bandwidth in order to imulate real-world condition in a controlled environment. Additionally, the open-ource command-line tool iperf [11] wa ued to meaure throughput between hot a a benchmark, and in order to check the accuracy of Network Link Conditioner throughput contraint. Procedure The client hot wa connected to gigabit Ethernet and plugged into AC power. All four brower and SSH window for controlling the erver were open during the experiment. The experiment wa conducted on a day with minimal congetion in order to avoid error. The performance of the network wa teted firt with iperf with the command iperf and iperf c <erver> -fm on each the client and the erver to tet throughput in both direction. Speed tet were then run on each of the four brower multiple time to tet conitency and reliability. The tet indice in the MySQL table and the peed reported by iperf were recorded in Microoft Excel. Thi procedure wa performed without any network contraint, then uing Network Link Conditioner to tet download peed limited at 780kbp, 6mbp, 12mbp, 14mbp, 48mbp, and 96mbp, and upload peed limited at 330kp, 1mbp, 2mbp, 4mbp, 8mbp 32mbp, 64mbp, 128mbp, 256mbp, and 512mbp.

4 Reult iperf and node.j upload peed tet reult under network bandwidth contraint Upload Speed, Megabyte/ k bp 1mbp 2mbp 4mbp 8mbp 32mb p 64mb p 128m bp 256m p 512m bp Mean iperf reult Mean node.j reult Upload Limit, Megabit/ Mean iperf reult Mean node.j reult iperf and node.j download peed tet reult under network bandwidth contraint Download Speed, Megabyte/ kbp 6mbp 12mbp 24mbp 48mbp 96mbp Downlad Speed Limit, Megabit/ mean iperf reult mean node.j reult

5 iperf v node.j reult without contraint Download Speed, Megabyte/ Gigabit Download Gigabit Upload Tet Reult (gigabit connection) Mean iperf reult Mean node.j reult Connection Performance of Brower and iperf on uncontrained gigabit 120 Speed, Megabyte/ iperf Chrome Chrome Brower Firefox 20.0 Safari Mean downtream performance Diuion The reult ugget that, when contrained to low peed, the upload and download tet are relatively accurate when compared to reult returned by iperf. However, upload peed tend to be under-reported at peed above 32 Mbp (4 MBp). In contrat, the reult of the download tet remained imilar to thoe of iperf up to 96 Mbp (12 MBp). An iue with Network Link Conditioner eem to affect the maximum download peed, becaue at and above 96 Mbp, reult from both iperf and the node.j peedtet are inaccurate.

6 In contrat, the tet that compare the iperf and node.j peed tet reult without bandwidth contraint how that iperf report higher upload and download peed than node.j, uggeting the node.j peed tet i inaccurate at high peed. Though it appear that accuracy degrade gradually a peed increae in the upload tet, it i unknown whether thi i the cae for the download peed, a it reult remained conitent with thoe of iperf for the other contrained tet. The comparion of brower how that there tend to be light difference in the download reult reported by different brower at the uncontrained gigabit peed, and that all of them are lower than the reult reported by iperf. Thi ugget that the limit of the peed tet are due at leat in part to performance of the client-ide JavaScript. Concluion Though an improvement over the previou peed tet, the data how that thi one i not without it limit. Though the exact detail of thee limit are not yet known, it i hown that the tet remain accurate in the brower teted for peed available with local ISP (other than Clemon Univerity). Further teting i neceary, however, to find out exactly the nature of thee limit, and whether thee limitation are fundamental to JavaScript-baed peed tet. Future Work The future work for thi project include both further development and further teting and analyi. One poible modification i a change in implementation from AJAX-baed tranfer to HTML5 Webocket-baed one. Though not compatible in all brower, it i poible that Webocket could provide more accurate reult, perhap with higher bandwidth limitation. Further teting could include more analyi of the current data, in addition to more tet being performed with different device and brower. Link [1] [2] [3] [4] [5] [6] [7]

7 [8] [9] [10] [11]

Mobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN

Mobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN Mobile Network Configuration for Large-cale Multimedia Delivery on a Single WLAN Huigwang Je, Dongwoo Kwon, Hyeonwoo Kim, and Hongtaek Ju Dept. of Computer Engineering Keimyung Univerity Daegu, Republic

More information

Cluster-Aware Cache for Network Attached Storage *

Cluster-Aware Cache for Network Attached Storage * Cluter-Aware Cache for Network Attached Storage * Bin Cai, Changheng Xie, and Qiang Cao National Storage Sytem Laboratory, Department of Computer Science, Huazhong Univerity of Science and Technology,

More information

Performance of Multiple TFRC in Heterogeneous Wireless Networks

Performance of Multiple TFRC in Heterogeneous Wireless Networks Performance of Multiple TFRC in Heterogeneou Wirele Network 1 Hyeon-Jin Jeong, 2 Seong-Sik Choi 1, Firt Author Computer Engineering Department, Incheon National Univerity, oaihjj@incheon.ac.kr *2,Correponding

More information

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS G. Chapman J. Cleee E. Idle ABSTRACT Content matching i a neceary component of any ignature-baed network Intruion Detection

More information

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS Chritopher V. Kopek Department of Computer Science Wake Foret Univerity Winton-Salem, NC, 2709 Email: kopekcv@gmail.com

More information

Name: SID: Instructions

Name: SID: Instructions CS168 Fall 2014 Homework 1 Aigned: Wedneday, 10 September 2014 Due: Monday, 22 September 2014 Name: SID: Dicuion Section (Day/Time): Intruction - Submit thi homework uing Pandagrader/GradeScope(http://www.gradecope.com/

More information

Tap Into Smartphone Demand: Mobile-izing Enterprise Websites by Using Flexible, Open Source Platforms

Tap Into Smartphone Demand: Mobile-izing Enterprise Websites by Using Flexible, Open Source Platforms Tap Into Smartphone Demand: Mobile-izing Enterprie Webite by Uing Flexible, Open Source Platform acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 Tap Into Smartphone Demand:

More information

Report 4668-1b 30.10.2010. Measurement report. Sylomer - field test

Report 4668-1b 30.10.2010. Measurement report. Sylomer - field test Report 4668-1b Meaurement report Sylomer - field tet Report 4668-1b 2(16) Contet 1 Introduction... 3 1.1 Cutomer... 3 1.2 The ite and purpoe of the meaurement... 3 2 Meaurement... 6 2.1 Attenuation of

More information

Apigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management

Apigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management Apigee Edge: Apigee Cloud v. Private Cloud Evaluating deployment model for API management Table of Content Introduction 1 Time to ucce 2 Total cot of ownerhip 2 Performance 3 Security 4 Data privacy 4

More information

DOCUMENT REFERENCE: SQ309-002-EN. SAMKNOWS TEST METHODOLOGY Web-based Broadband Performance White Paper. July 2015

DOCUMENT REFERENCE: SQ309-002-EN. SAMKNOWS TEST METHODOLOGY Web-based Broadband Performance White Paper. July 2015 DOCUMENT REFERENCE: SQ309-002-EN SAMKNOWS TEST METHODOLOGY Web-based Broadband Performance White Paper July 2015 SAMKNOWS QUALITY CONTROLLED DOCUMENT. SQ REV LANG STATUS OWNER DATED 309 03 EN FINAL SC

More information

CASE STUDY ALLOCATE SOFTWARE

CASE STUDY ALLOCATE SOFTWARE CASE STUDY ALLOCATE SOFTWARE allocate caetud y TABLE OF CONTENTS #1 ABOUT THE CLIENT #2 OUR ROLE #3 EFFECTS OF OUR COOPERATION #4 BUSINESS PROBLEM THAT WE SOLVED #5 CHALLENGES #6 WORKING IN SCRUM #7 WHAT

More information

A Review On Software Testing In SDlC And Testing Tools

A Review On Software Testing In SDlC And Testing Tools www.ijec.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Iue -9 September, 2014 Page No. 8188-8197 A Review On Software Teting In SDlC And Teting Tool T.Amruthavalli*,

More information

Very special thanks to Wolfgang Gentzsch and Burak Yenier for making the UberCloud HPC Experiment possible.

Very special thanks to Wolfgang Gentzsch and Burak Yenier for making the UberCloud HPC Experiment possible. Digital manufacturing technology and convenient acce to High Performance Computing (HPC) in indutry R&D are eential to increae the quality of our product and the competitivene of our companie. Progre can

More information

International Journal of Heat and Mass Transfer

International Journal of Heat and Mass Transfer International Journal of Heat and Ma Tranfer 5 (9) 14 144 Content lit available at ScienceDirect International Journal of Heat and Ma Tranfer journal homepage: www.elevier.com/locate/ijhmt Technical Note

More information

SCM- integration: organiational, managerial and technological iue M. Caridi 1 and A. Sianei 2 Dipartimento di Economia e Produzione, Politecnico di Milano, Italy E-mail: maria.caridi@polimi.it Itituto

More information

A technical guide to 2014 key stage 2 to key stage 4 value added measures

A technical guide to 2014 key stage 2 to key stage 4 value added measures A technical guide to 2014 key tage 2 to key tage 4 value added meaure CONTENTS Introduction: PAGE NO. What i value added? 2 Change to value added methodology in 2014 4 Interpretation: Interpreting chool

More information

Turbulent Mixing and Chemical Reaction in Stirred Tanks

Turbulent Mixing and Chemical Reaction in Stirred Tanks Turbulent Mixing and Chemical Reaction in Stirred Tank André Bakker Julian B. Faano Blend time and chemical product ditribution in turbulent agitated veel can be predicted with the aid of Computational

More information

License & SW Asset Management at CES Design Services

License & SW Asset Management at CES Design Services Licene & SW Aet Management at CES Deign Service johann.poechl@iemen.com www.ces-deignservice.com 2003 Siemen AG Öterreich Overview 1. Introduction CES Deign Service 2. Objective and Motivation 3. What

More information

A Spam Message Filtering Method: focus on run time

A Spam Message Filtering Method: focus on run time , pp.29-33 http://dx.doi.org/10.14257/atl.2014.76.08 A Spam Meage Filtering Method: focu on run time Sin-Eon Kim 1, Jung-Tae Jo 2, Sang-Hyun Choi 3 1 Department of Information Security Management 2 Department

More information

Warehouse Security System based on Embedded System

Warehouse Security System based on Embedded System International Conference on Logitic Engineering, Management and Computer Science (LEMCS 2015) Warehoue Security Sytem baed on Embedded Sytem Gen Li Department of Electronic Engineering, Tianjin Univerity

More information

Bio-Plex Analysis Software

Bio-Plex Analysis Software Multiplex Supenion Array Bio-Plex Analyi Software The Leader in Multiplex Immunoaay Analyi Bio-Plex Analyi Software If making ene of your multiplex data i your challenge, then Bio-Plex data analyi oftware

More information

Despeckling Synthetic Aperture Radar Images with Cloud Computing using Graphics Processing Units

Despeckling Synthetic Aperture Radar Images with Cloud Computing using Graphics Processing Units Depeckling Synthetic Aperture Radar Image with Cloud Computing uing Graphic Proceing Unit Matej Keneman 1, Dušan Gleich, Amor Chowdhury 1 1 Margento R & D d.o.o., Gopovetka ceta 84, Maribor, Slovenia matej.keneman@gmail.com

More information

FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS

FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS Aignment Report RP/98-983/5/0./03 Etablihment of cientific and technological information ervice for economic and ocial development FOR INTERNAL UE NOT FOR GENERAL DITRIBUTION FEDERATION OF ARAB CIENTIFIC

More information

Exposure Metering Relating Subject Lighting to Film Exposure

Exposure Metering Relating Subject Lighting to Film Exposure Expoure Metering Relating Subject Lighting to Film Expoure By Jeff Conrad A photographic expoure meter meaure ubject lighting and indicate camera etting that nominally reult in the bet expoure of the film.

More information

Towards Control-Relevant Forecasting in Supply Chain Management

Towards Control-Relevant Forecasting in Supply Chain Management 25 American Control Conference June 8-1, 25. Portland, OR, USA WeA7.1 Toward Control-Relevant Forecating in Supply Chain Management Jay D. Schwartz, Daniel E. Rivera 1, and Karl G. Kempf Control Sytem

More information

REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND TAGUCHI METHODOLOGY. Abstract. 1.

REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND TAGUCHI METHODOLOGY. Abstract. 1. International Journal of Advanced Technology & Engineering Reearch (IJATER) REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND Abtract TAGUCHI METHODOLOGY Mr.

More information

2. METHOD DATA COLLECTION

2. METHOD DATA COLLECTION Key to learning in pecific ubject area of engineering education an example from electrical engineering Anna-Karin Cartenen,, and Jonte Bernhard, School of Engineering, Jönköping Univerity, S- Jönköping,

More information

The MLS Guide to installing Silverlight on your Microsoft Windows or Apple Macintosh Operating System

The MLS Guide to installing Silverlight on your Microsoft Windows or Apple Macintosh Operating System MLS 2009 The MLS Guide to installing Silverlight on your Microsoft or Apple Macintosh Operating System This document covers the compatibility of the Silverlight client interfaces. The Management interface

More information

Third Party Technical Guidelines

Third Party Technical Guidelines Third Party Technical Guideline Configuration Guide Releae: Document Reviion: Ditribution Statu: NICE Engage Platform 6.3 / NICE Interaction Management 4.1 Real-Time Solution 4.9 NICE Perform 3.2 / 3.5

More information

Algorithms for Advance Bandwidth Reservation in Media Production Networks

Algorithms for Advance Bandwidth Reservation in Media Production Networks Algorithm for Advance Bandwidth Reervation in Media Production Network Maryam Barhan 1, Hendrik Moen 1, Jeroen Famaey 2, Filip De Turck 1 1 Department of Information Technology, Ghent Univerity imind Gaton

More information

Utility-Based Flow Control for Sequential Imagery over Wireless Networks

Utility-Based Flow Control for Sequential Imagery over Wireless Networks Utility-Baed Flow Control for Sequential Imagery over Wirele Networ Tomer Kihoni, Sara Callaway, and Mar Byer Abtract Wirele enor networ provide a unique et of characteritic that mae them uitable for building

More information

A New Optimum Jitter Protection for Conversational VoIP

A New Optimum Jitter Protection for Conversational VoIP Proc. Int. Conf. Wirele Commun., Signal Proceing (Nanjing, China), 5 pp., Nov. 2009 A New Optimum Jitter Protection for Converational VoIP Qipeng Gong, Peter Kabal Electrical & Computer Engineering, McGill

More information

SPECIFICATIONS FOR PERIMETER FIREWALL. APPENDIX-24 Complied (Yes / No) Remark s. S.No Functional Requirements :

SPECIFICATIONS FOR PERIMETER FIREWALL. APPENDIX-24 Complied (Yes / No) Remark s. S.No Functional Requirements : S.No Functional Requirement : 1 The propoed olution mut allow ingle policy rule creation for application control, uer baed control, hot profile, threat prevention, Anti-viru, file filtering, content filtering,

More information

6. Friction, Experiment and Theory

6. Friction, Experiment and Theory 6. Friction, Experiment and Theory The lab thi wee invetigate the rictional orce and the phyical interpretation o the coeicient o riction. We will mae ue o the concept o the orce o gravity, the normal

More information

Two Dimensional FEM Simulation of Ultrasonic Wave Propagation in Isotropic Solid Media using COMSOL

Two Dimensional FEM Simulation of Ultrasonic Wave Propagation in Isotropic Solid Media using COMSOL Excerpt from the Proceeding of the COMSO Conference 0 India Two Dimenional FEM Simulation of Ultraonic Wave Propagation in Iotropic Solid Media uing COMSO Bikah Ghoe *, Krihnan Balaubramaniam *, C V Krihnamurthy

More information

LabStats 5 System Requirements

LabStats 5 System Requirements LabStats Tel: 877-299-6241 255 B St, Suite 201 Fax: 208-473-2989 Idaho Falls, ID 83402 LabStats 5 System Requirements Server Component Virtual Servers: There is a limit to the resources available to virtual

More information

Assessing the Discriminatory Power of Credit Scores

Assessing the Discriminatory Power of Credit Scores Aeing the Dicriminatory Power of Credit Score Holger Kraft 1, Gerald Kroiandt 1, Marlene Müller 1,2 1 Fraunhofer Intitut für Techno- und Wirtchaftmathematik (ITWM) Gottlieb-Daimler-Str. 49, 67663 Kaierlautern,

More information

TRADING rules are widely used in financial market as

TRADING rules are widely used in financial market as Complex Stock Trading Strategy Baed on Particle Swarm Optimization Fei Wang, Philip L.H. Yu and David W. Cheung Abtract Trading rule have been utilized in the tock market to make profit for more than a

More information

Pekka Helkiö, 58490K Antti Seppälä, 63212W Ossi Syd, 63513T

Pekka Helkiö, 58490K Antti Seppälä, 63212W Ossi Syd, 63513T Pekka Helkiö, 58490K Antti Seppälä, 63212W Oi Syd, 63513T Table of Content 1. Abtract...1 2. Introduction...2 2.1 Background... 2 2.2 Objective and Reearch Problem... 2 2.3 Methodology... 2 2.4 Scoping

More information

Table 1 summarizes the requirements for desktop computers running the Participant Application and the myat&t utility.

Table 1 summarizes the requirements for desktop computers running the Participant Application and the myat&t utility. SYSTEM REQUIREMENTS Participant Application and myat&t Table 1 summarizes the requirements for desktop computers running the Participant Application and the myat&t utility. End-user Computer for Participant

More information

A Resolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networks

A Resolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networks A Reolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networ Joé Craveirinha a,c, Rita Girão-Silva a,c, João Clímaco b,c, Lúcia Martin a,c a b c DEEC-FCTUC FEUC INESC-Coimbra International

More information

MANAGING DATA REPLICATION IN MOBILE AD- HOC NETWORK DATABASES (Invited Paper) *

MANAGING DATA REPLICATION IN MOBILE AD- HOC NETWORK DATABASES (Invited Paper) * MANAGING DATA REPLICATION IN MOBILE AD- HOC NETWORK DATABASES (Invited Paper) * Praanna Padmanabhan School of Computer Science The Univerity of Oklahoma Norman OK, USA praannap@yahoo-inc.com Dr. Le Gruenwald

More information

Mixed Method of Model Reduction for Uncertain Systems

Mixed Method of Model Reduction for Uncertain Systems SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol 4 No June Mixed Method of Model Reduction for Uncertain Sytem N Selvaganean Abtract: A mixed method for reducing a higher order uncertain ytem to a table reduced

More information

Trusted Document Signing based on use of biometric (Face) keys

Trusted Document Signing based on use of biometric (Face) keys Truted Document Signing baed on ue of biometric (Face) Ahmed B. Elmadani Department of Computer Science Faculty of Science Sebha Univerity Sebha Libya www.ebhau.edu.ly elmadan@yahoo.com ABSTRACT An online

More information

Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems,

Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems, MANAGEMENT SCIENCE Vol. 54, No. 3, March 28, pp. 565 572 in 25-199 ein 1526-551 8 543 565 inform doi 1.1287/mnc.17.82 28 INFORMS Scheduling Arrival to Queue: A Single-Server Model with No-Show INFORMS

More information

Unit 11 Using Linear Regression to Describe Relationships

Unit 11 Using Linear Regression to Describe Relationships Unit 11 Uing Linear Regreion to Decribe Relationhip Objective: To obtain and interpret the lope and intercept of the leat quare line for predicting a quantitative repone variable from a quantitative explanatory

More information

Control of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling

Control of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling Control of Wirele Network with Flow Level Dynamic under Contant Time Scheduling Long Le and Ravi R. Mazumdar Department of Electrical and Computer Engineering Univerity of Waterloo,Waterloo, ON, Canada

More information

Ports utilisés. Ports utilisés par le XT1000/5000 :

Ports utilisés. Ports utilisés par le XT1000/5000 : Ports utilisés Ports utilisés par le XT1000/5000 : 80 HTTP (TCP) WEB server 123 SNTP (UDP) SNTP Client 161 SNMP (UDP) SNMP Configuration and Status 162 SNMP (UDP) SNMP Traps and events 1718 H.225/RAS (UDP)

More information

No. 73,122 MODEL FORM OF VERDICT ITEMIZING PERSONAL INJURY DAMAGES (TORT REFORM ACT OF 1986, S 768.77 F.S. 1987)

No. 73,122 MODEL FORM OF VERDICT ITEMIZING PERSONAL INJURY DAMAGES (TORT REFORM ACT OF 1986, S 768.77 F.S. 1987) CORRECTED OPINION No. 73,122 IN RE: STANDARD JURY INSTRUCTIONS (CIVIL CASES 88-2) [March 2, 19891 PER CURIAM. The Florida Supreme Court Committee on Standard Jury Intruction (Civil) ha recommended to thi

More information

Return on Investment and Effort Expenditure in the Software Development Environment

Return on Investment and Effort Expenditure in the Software Development Environment International Journal of Applied Information ytem (IJAI) IN : 2249-0868 Return on Invetment and Effort Expenditure in the oftware Development Environment Dineh Kumar aini Faculty of Computing and IT, ohar

More information

CASE STUDY BRIDGE. www.future-processing.com

CASE STUDY BRIDGE. www.future-processing.com CASE STUDY BRIDGE TABLE OF CONTENTS #1 ABOUT THE CLIENT 3 #2 ABOUT THE PROJECT 4 #3 OUR ROLE 5 #4 RESULT OF OUR COLLABORATION 6-7 #5 THE BUSINESS PROBLEM THAT WE SOLVED 8 #6 CHALLENGES 9 #7 VISUAL IDENTIFICATION

More information

Brainlab Node TM Technical Specifications

Brainlab Node TM Technical Specifications Brainlab Node TM Technical Specifications BRAINLAB NODE TM HP ProLiant DL360p Gen 8 CPU: Chipset: RAM: HDD: RAID: Graphics: LAN: HW Monitoring: Height: Width: Length: Weight: Operating System: 2x Intel

More information

Control Theory based Approach for the Improvement of Integrated Business Process Interoperability

Control Theory based Approach for the Improvement of Integrated Business Process Interoperability www.ijcsi.org 201 Control Theory baed Approach for the Improvement of Integrated Buine Proce Interoperability Abderrahim Taoudi 1, Bouchaib Bounabat 2 and Badr Elmir 3 1 Al-Qualadi Reearch & Development

More information

The Cash Flow Statement: Problems with the Current Rules

The Cash Flow Statement: Problems with the Current Rules A C C O U N T I N G & A U D I T I N G accounting The Cah Flow Statement: Problem with the Current Rule By Neii S. Wei and Jame G.S. Yang In recent year, the tatement of cah flow ha received increaing attention

More information

Enterprise Manager. Version 6.2. Installation Guide

Enterprise Manager. Version 6.2. Installation Guide Enterprise Manager Version 6.2 Installation Guide Enterprise Manager 6.2 Installation Guide Document Number 680-028-014 Revision Date Description A August 2012 Initial release to support version 6.2.1

More information

inforouter V8.0 Server & Client Requirements

inforouter V8.0 Server & Client Requirements inforouter V8.0 Server & Client Requirements Please review this document thoroughly before proceeding with the installation of inforouter Version 8. This document describes the minimum and recommended

More information

RO-BURST: A Robust Virtualization Cost Model for Workload Consolidation over Clouds

RO-BURST: A Robust Virtualization Cost Model for Workload Consolidation over Clouds !111! 111!ttthhh IIIEEEEEEEEE///AAACCCMMM IIInnnttteeerrrnnnaaatttiiiooonnnaaalll SSSyyymmmpppoooiiiuuummm ooonnn CCCllluuuttteeerrr,,, CCClllooouuuddd aaannnddd GGGrrriiiddd CCCooommmpppuuutttiiinnnggg

More information

Abstract parsing: static analysis of dynamically generated string output using LR-parsing technology

Abstract parsing: static analysis of dynamically generated string output using LR-parsing technology Abtract paring: tatic analyi of dynamically generated tring output uing LR-paring technology Kyung-Goo Doh 1, Hyunha Kim 1, David A. Schmidt 2 1 Hanyang Univerity, Anan, South Korea 2 Kana State Univerity,

More information

Encrypted TCP chat using RSA and AES algorithm

Encrypted TCP chat using RSA and AES algorithm Encrypted TCP chat uing RSA and AES algorithm Krzyztof Jakub Szala Bachelor Thei April 2014 Degree Programme in Information Technology Technology, communication and tranport DESCRIPTION Author() SZALA

More information

Distributed, Secure Load Balancing with Skew, Heterogeneity, and Churn

Distributed, Secure Load Balancing with Skew, Heterogeneity, and Churn Ditributed, Secure Load Balancing with Skew, Heterogeneity, and Churn Jonathan Ledlie and Margo Seltzer Diviion of Engineering and Applied Science Harvard Univerity Abtract Numerou propoal exit for load

More information

Delft. Matlab and Simulink for Modeling and Control. Robert Babuška and Stefano Stramigioli. November 1999

Delft. Matlab and Simulink for Modeling and Control. Robert Babuška and Stefano Stramigioli. November 1999 Matlab and Simulink for Modeling and Control Robert Babuška and Stefano Stramigioli November 999 Delft Delft Univerity of Technology Control Laboratory Faculty of Information Technology and Sytem Delft

More information

Analysis of Mesostructure Unit Cells Comprised of Octet-truss Structures

Analysis of Mesostructure Unit Cells Comprised of Octet-truss Structures Analyi of Meotructure Unit Cell Compried of Octet-tru Structure Scott R. Johnton *, Marque Reed *, Hongqing V. Wang, and David W. Roen * * The George W. Woodruff School of Mechanical Engineering, Georgia

More information

CONFIGURING MICROSOFT SQL SERVER REPORTING SERVICES

CONFIGURING MICROSOFT SQL SERVER REPORTING SERVICES CONFIGURING MICROSOFT SQL SERVER REPORTING SERVICES TECHNICAL ARTICLE November/2011. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

Testing Documentation for CCIH Database Management System By: John Reeves, Derek King, and Robert Watts

Testing Documentation for CCIH Database Management System By: John Reeves, Derek King, and Robert Watts Teting Documentation for CCIH Databae Management Sytem By: John Reeve, Derek King, and Robert Watt The teting proce for our project i divided into three part of Unit teting, one part of Integration/Function

More information

McKesson Radiology 12.0 Technical Requirements

McKesson Radiology 12.0 Technical Requirements McKesson Radiology 12.0 Technical Requirements McKesson Radiology Version 12.0 is designed to not require workstation replacement, assuming the legacy McKesson PACS hardware meets the specifications listed

More information

Optimizing a Semantic Comparator using CUDA-enabled Graphics Hardware

Optimizing a Semantic Comparator using CUDA-enabled Graphics Hardware Optimizing a Semantic Comparator uing CUDA-enabled Graphic Hardware Aalap Tripathy Suneil Mohan, Rabi Mahapatra Embedded Sytem and Codeign Lab codeign.ce.tamu.edu (Preented at ICSC 0, September 9, 0 in

More information

Review of Multiple Regression Richard Williams, University of Notre Dame, http://www3.nd.edu/~rwilliam/ Last revised January 13, 2015

Review of Multiple Regression Richard Williams, University of Notre Dame, http://www3.nd.edu/~rwilliam/ Last revised January 13, 2015 Review of Multiple Regreion Richard William, Univerity of Notre Dame, http://www3.nd.edu/~rwilliam/ Lat revied January 13, 015 Aumption about prior nowledge. Thi handout attempt to ummarize and yntheize

More information

Sage Grant Management System Requirements

Sage Grant Management System Requirements Sage Grant Management System Requirements You should meet or exceed the following system requirements: One Server - Database/Web Server The following system requirements are for Sage Grant Management to

More information

Wireless and Battery-less Sensor Using RF Energy Harvesting

Wireless and Battery-less Sensor Using RF Energy Harvesting DOI.56/etc4/. Wirele and Battery-le Senor Uing RF Energy Harveting Chritian Merz, Gerald Kupri, Maximilian Niedernhuber 3 Deggendorf Intitute of Technology, Edlmairtr. 6 + 8, 94469 Deggendorf, Germany

More information

How to Maximize User Satisfaction Degree in Multi-service IP Networks

How to Maximize User Satisfaction Degree in Multi-service IP Networks How to Maximize Uer Satifaction Degree in Multi-ervice IP Network Huy Anh Nguyen, Tam Van Nguyen and Deokai Choi Department of Electronic and Computer Engineering Chonnam National Univerity Gwangu, KOREA

More information

Imagery Portal Workshop #2 Department of Administrative Services, Executive Building Salem, Oregon May 11, 2006

Imagery Portal Workshop #2 Department of Administrative Services, Executive Building Salem, Oregon May 11, 2006 ry Portal Workhop #2 Department of Adminitrative Service, Executive Building Salem, Oregon May 11, 2006 Workhop Purpoe: dicu the outcome of the phae 1 coping proce for development of an imagery portal

More information

Computing Location from Ambient FM Radio Signals

Computing Location from Ambient FM Radio Signals Computing Location from Ambient FM Radio Signal Adel Youef Department of Computer Science Univerity of Maryland A.V. William Building College Park, MD 20742 adel@c.umd.edu John Krumm, Ed Miller, Gerry

More information

SHARESYNC SECURITY FEATURES

SHARESYNC SECURITY FEATURES www.kyboxinnovation.com SHARESYNC SECURITY FEATURES ShareSync provide a high degree of ecurity and protection which allow adminitrator to: Aure compliance with ecurity bet practice Get full viibility over

More information

Improving Energy Efficiency in Data Centers and federated Cloud Environments

Improving Energy Efficiency in Data Centers and federated Cloud Environments Improving Energy Efficiency in Data Center and federated Cloud Environment Comparion of CoolEmAll and Eco2Cloud approache and metric Eugen Volk, Axel Tenchert, Michael Gienger High erformance Computing

More information

Requirements Engineering Databases: The Good, The Bad, and The Ugly

Requirements Engineering Databases: The Good, The Bad, and The Ugly New England Databae Day (NEDBDay08) February 4, 2008 Requirement Engineering Databae: The Good, The Bad, and The Ugly Brian Berenbach Siemen Corporate Reearch brian.berenbach@iemen.com 1 Agenda Brief Introduction

More information

GUIDELINE FOR FIELD TESTING OF GAS TURBINE AND CENTRIFUGAL COMPRESSOR PERFORMANCE

GUIDELINE FOR FIELD TESTING OF GAS TURBINE AND CENTRIFUGAL COMPRESSOR PERFORMANCE GUIDELINE FOR FIELD TESTING OF GAS TURBINE AND CENTRIFUGAL COMPRESSOR PERFORMANCE RELEASE.0 Augut 006 Ga Machinery Reearch Council Southwet Reearch Intitute Thi page i intentionally left blank. GUIDELINE

More information

1) Assume that the sample is an SRS. The problem state that the subjects were randomly selected.

1) Assume that the sample is an SRS. The problem state that the subjects were randomly selected. 12.1 Homework for t Hypothei Tet 1) Below are the etimate of the daily intake of calcium in milligram for 38 randomly elected women between the age of 18 and 24 year who agreed to participate in a tudy

More information

Acceleration-Displacement Crash Pulse Optimisation A New Methodology to Optimise Vehicle Response for Multiple Impact Speeds

Acceleration-Displacement Crash Pulse Optimisation A New Methodology to Optimise Vehicle Response for Multiple Impact Speeds Acceleration-Diplacement Crah Pule Optimiation A New Methodology to Optimie Vehicle Repone for Multiple Impact Speed D. Gildfind 1 and D. Ree 2 1 RMIT Univerity, Department of Aeropace Engineering 2 Holden

More information

VMware Horizon FLEX User Guide

VMware Horizon FLEX User Guide Horizon FLEX 1.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this

More information

OPINION PIECE. It s up to the customer to ensure security of the Cloud

OPINION PIECE. It s up to the customer to ensure security of the Cloud OPINION PIECE It up to the cutomer to enure ecurity of the Cloud Content Don t outource what you don t undertand 2 The check lit 2 Step toward control 4 Due Diligence 4 Contract 4 E-dicovery 4 Standard

More information

Install Guide Housatonic Project Plan for Web. Housatonic Software - Project Plan 365 App

Install Guide Housatonic Project Plan for Web. Housatonic Software - Project Plan 365 App Install Guide Housatonic Project Plan for Web Housatonic Software - Project Plan 365 App 2014 Contents 1. Introduction... 3 2. Requirements... 4 2.1 Client-side / Workstation Requirements... 4 2.2 Server-side

More information

INFORMATION Technology (IT) infrastructure management

INFORMATION Technology (IT) infrastructure management IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 2, NO. 1, MAY 214 1 Buine-Driven Long-term Capacity Planning for SaaS Application David Candeia, Ricardo Araújo Santo and Raquel Lope Abtract Capacity Planning

More information

Quark Publishing Platform 9.5 ReadMe

Quark Publishing Platform 9.5 ReadMe Quark Publishing Platform 9.5 ReadMe CONTENTS Contents Quark Publishing Platform 9.5 ReadMe...5 Quark Publishing Platform components...6 Compatibility matrix...6 Server components...7 Other optional components...8

More information

Introduction to Web Development

Introduction to Web Development Introduction to Web Development Week 1 - Intro, The Internet!, & Dev Environment Dr. Paul Talaga 487 Rhodes paul.talaga@uc.edu ACM Lecture Series University of Cincinnati, OH October 10, 2012 1/12 About

More information

Quark Publishing Platform 9.5.1.1 ReadMe

Quark Publishing Platform 9.5.1.1 ReadMe Quark Publishing Platform 9.5.1.1 ReadMe TABLE DES MATIÈRES Table des matières Quark Publishing Platform 9.5.1.1 ReadMe...5 Quark Publishing Platform components...6 Compatibility matrix...6 Server components...8

More information

SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE

SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE RAVI KUMAR G 1, C.MUTHUSAMY 2 & A.VINAYA BABU 3 1 HP Bangalore, Reearch Scholar JNTUH, Hyderabad, India, 2 Yahoo, Bangalore,

More information

Four Ways Companies Can Use Open Source Social Publishing Tools to Enhance Their Business Operations

Four Ways Companies Can Use Open Source Social Publishing Tools to Enhance Their Business Operations Four Way Companie Can Ue Open Source Social Publihing Tool to Enhance Their Buine Operation acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 Four Way Companie Can Ue Open

More information

The Arms Race on American Roads: The Effect of SUV s and Pickup Trucks on Traffic Safety

The Arms Race on American Roads: The Effect of SUV s and Pickup Trucks on Traffic Safety The Arm Race on American Road: The Effect of SUV and Pickup Truck on Traffic Safety Michelle J. White Univerity of California, San Diego, and NBER Abtract Driver have been running an arm race on American

More information

A Note on Profit Maximization and Monotonicity for Inbound Call Centers

A Note on Profit Maximization and Monotonicity for Inbound Call Centers OPERATIONS RESEARCH Vol. 59, No. 5, September October 2011, pp. 1304 1308 in 0030-364X ein 1526-5463 11 5905 1304 http://dx.doi.org/10.1287/opre.1110.0990 2011 INFORMS TECHNICAL NOTE INFORMS hold copyright

More information

McKesson Radiology 12.1.1 Technical Requirements

McKesson Radiology 12.1.1 Technical Requirements McKesson Radiology 12.1.1 Technical Requirements McKesson Radiology Version 12.1.1 is designed to not require workstation replacement, assuming the legacy McKesson PACS hardware meets the specifications

More information

CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY

CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Annale Univeritati Apuleni Serie Oeconomica, 2(2), 200 CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Sidonia Otilia Cernea Mihaela Jaradat 2 Mohammad

More information

Digifort Enterprise The most complete Digifort solution for camera and alarm monitoring.

Digifort Enterprise The most complete Digifort solution for camera and alarm monitoring. Digifort Enterprie The mot complete Digifort olution for camera and alarm monitoring. The Enterprie verion i the package which comprie all of the feature available in the Digifort Sytem, offering complete

More information

Microsoft Windows Apple Mac OS X

Microsoft Windows Apple Mac OS X Products Snow License Manager Snow Inventory Server, IDP, IDR Client for Windows Client for OSX Client for Linux Client for Unix Oracle Scanner External Data Provider Snow Distribution Date 2014-02-12

More information

Request support: ecentral.graphics.kodak.com

Request support: ecentral.graphics.kodak.com Kodak Graphic Communications Canada Company 4225 Kincaid Street Burnaby, B.C., Canada V5G 4P5Tel: 1.604.451.2700 Fax: 1.604.437.9891 Release date: 17 May 2015 Doc number: 719-01475C Rev A Request support:

More information

NETWORK TRAFFIC ENGINEERING WITH VARIED LEVELS OF PROTECTION IN THE NEXT GENERATION INTERNET

NETWORK TRAFFIC ENGINEERING WITH VARIED LEVELS OF PROTECTION IN THE NEXT GENERATION INTERNET Chapter 1 NETWORK TRAFFIC ENGINEERING WITH VARIED LEVELS OF PROTECTION IN THE NEXT GENERATION INTERNET S. Srivatava Univerity of Miouri Kana City, USA hekhar@conrel.ice.umkc.edu S. R. Thirumalaetty now

More information

System requirements. for Installation of LANDESK Service Desk 2016. Clarita-Bernhard-Str. 25 D 81249 Muenchen. Magelan GmbH

System requirements. for Installation of LANDESK Service Desk 2016. Clarita-Bernhard-Str. 25 D 81249 Muenchen. Magelan GmbH System requirements for Installation of LANDESK Service Desk 2016 Created by: Magelan GmbH Magelan GmbH Clarita-Bernhard-Str. 25 D 81249 Muenchen Version Version Date Author Description 1.0 22.11.2012

More information

REDCENTRIC UNITY SOFTWARE MINIMUM REQUIREMENTS

REDCENTRIC UNITY SOFTWARE MINIMUM REQUIREMENTS REDCENTRIC UNITY SOFTWARE MINIMUM REQUIREMENTS User Guide v1.0 12/08/2014 VERSION CONTROL Date Change Author 12/08/14 1.0 Initial version created and signed off DM Page 2 Public UNITY SOFTWARE MINIMUM

More information

System Requirements for Online Testing

System Requirements for Online Testing System Requirements for Online Testing 2015 2016 Overview This document was developed by the American Institutes for Research (AIR) and the Florida Department of Education (FDOE) and contains technology

More information

Introduction to the article Degrees of Freedom.

Introduction to the article Degrees of Freedom. Introduction to the article Degree of Freedom. The article by Walker, H. W. Degree of Freedom. Journal of Educational Pychology. 3(4) (940) 53-69, wa trancribed from the original by Chri Olen, George Wahington

More information

Grant Management. System Requirements

Grant Management. System Requirements January 26, 2014 This is a publication of Abila, Inc. Version 2014.x 2013 Abila, Inc. and its affiliated entities. All rights reserved. Abila, the Abila logos, and the Abila product and service names mentioned

More information