Access Control and Service-Oriented Architectures" investigates in which way logical access control can be achieved effectively, in particular in highly dynamic environments such as service-oriented architectures (SOA's). The author combines state-of-the-art best-practice and projects these onto the
Kim, Suntae; Shim, Bingu; Kim, Jeong Ah; Cho, Insook
Recently, many approaches have been studied to author medical knowledge and verify doctor's diagnosis based on the specified knowledge. During the verification, intensive access to medical information is unavoidable. Also, the access approach should consider modifiability in order to cover diverse medical information from the variety of hospitals. This paper presents an approach to generating query language from medical knowledge, and shows software architecture for accessing medical information from hospitals by executing generated query languages. Implementation of this architecture has been deployed in a hospital of South Korea so that it shows the feasibility of the architecture.
Friday, Adrian; Wu, Maomao; Schmid, Stefan; Finney, Joseph; Cheverst, Keith; Davies, Nigel
This paper presents a novel wireless access point architecture designed to support the development of next generation mobile context-aware applications over metropolitan scale areas. In addition, once deployed, this network will allow ordinary citizens secure, accountable and convenient access to the Internet from their local city and campus environments. The proposed architecture is based on an approach utilising a modified Mobile IPv6 protocol stack that uses packet marking and network leve...
Gómez-Martínez, Alejandro; Amaya-Fernández, Ferney; Hincapié, Roberto;
The increasing demand of fixed and mobile applications, and considering that smart grid imposes new requirements to the access networks, in this paper we present an optical access architecture to support home multiservice including smart grid applications. We propose a migration path based in a WDM...... passive optical network (PON) architecture for the next 10 years. Moreover, we compare the performance of each stage in terms of data bit rate requirements, bit error rate (BER) and jitter....
In the digital world, library services need to be transformed to recognize that automation and machine-to-machine communication of information enables many advanced features. NRC CISTI, Canada's National Science Library, has addressed this challenge using Service-Oriented Architecture (SOA). Using SOA based on Enterprise Architecture, we have modeled services provided by the catalogue, services related to document delivery, and advanced services to provide more open data access. We will prese...
Manegold, Stefan; Boncz, Peter; Kersten, Martin
In the past decade, advances in speed of commodity CPUs have far out-paced advances in memory latency. Main-memory access is therefore increasingly a performance bottleneck for many computer applications, including database systems. In this article, we use a simple scan test to show the severe impact of this bottleneck. The insights gained are translated into guidelines for database architecture; in terms of both data structures and algorithms. We discuss how vertically fragmented data struct...
Boncz, Peter; Manegold, Stefan; Kersten, Martin
In the past decade, advances in speed of commodity CPUs have far out-paced advances in memory latency. Main-memory access is therefore increasingly a performance bottleneck for many computer applications, including database systems. In this article, we use a simple scan test to show the severe impact of this bottleneck. The insights gained are translated into guidelines for database architecture; in terms of both data structures and algorithms. We discuss how vertically fragmented data struct...
Full Text Available Due to the abilities of real-time sensing and information sharing, Wireless Sensor Network (WSN has been applied in more and more fields. Basing on the emergence of Internet of Things (IoT, the issue about heterogeneous network integration is becoming more important. We first analyze the new businesses that arise recently for cell phone users as well as the potential effect on carrying network. After that we mainly discuss the influence on traditional carrying network for WSN accessing and taking concurrent businesses as the study case, common access architecture from WSN to carrying network is constructed, which makes use of business differentiation. Furthermore, we propose the idea of tortuous access from WSN to the gateway in the carrying network to avoid congested paths with simulation and verification. Finally, we conclude the possible impacts for the integration of these two networks and present possible solutions.
Moßgraber, Jürgen; Rospocher, M.
An increasing number of information systems integrate semantic data stores for managing ontologies. To access these knowledge bases most of the available implementations provide application programming interfaces (APIs). The implementations of these APIs normally do not support any kind of network protocol or service interface. This works fine as long as a monolithic system is developed. If the need arises to integrate such a knowledge base into a service-oriented architecture a different app...
Motamedi, Masoud; Sue, Miles K.
A Code Division Multiple Access (CDMA) architecture is currently being studied for use in a Ka-band Personal Access Satellite System (PASS). The complete architecture consisting of block diagrams of the user terminal, the supplier station, the network management center, and the satellite is described along with the access methods and frequency/time plans. The complexity of developing this system using the CDMA architecture is compared to that of a Frequency Division Multiple Access (FDMA) architecture. The inherent advantages and disadvantages of the two architectures are compared and their respective capacities are discussed.
Full Text Available Personalization and adaptation to the user profile capability are the hottest issues to ensure ambientassisted living and context awareness in nowadays environments. With the growing healthcare andwellbeing context aware applications, modeling security policies becomes an important issue in thedesign of future access control models. This requires rich semantics using ontology modeling for themanagement of services provided to dependant people. However, current access control models remainunsuitable due to lack of personalization, adaptability and smartness to the handicap situation.In this paper, we propose a novel adaptable access control model and its related architecture in whichthe security policy is based on the handicap situation analyzed from the monitoring of user’s behavior inorder to grant a service using any assistive device within intelligent environment. The design of ourmodel is an ontology-learning and evolving security policy for predicting the future actions of dependentpeople. This is reached by reasoning about historical data, contextual data and user behavior accordingto the access rules that are used in the inference engine to provide the right service according to theuser’s needs.
Data-intensive sciences have to deploy diverse large scale database technologies for data analytics as scientists have now been dealing with much larger volume than ever before. While array databases have bridged many gaps between the needs of data-intensive research fields and DBMS technologies (Zhang 2011), invocation of other big data tools accompanying these databases is still manual and separate the database management's interface. We identify this as an architectural challenge that will increasingly complicate the user's work flow owing to the growing number of useful but isolated and niche database tools. Such use of data analysis tools in effect leaves the burden on the user's end to synchronize the results from other data manipulation analysis tools with the database management system. To this end, we propose a unified access interface for using big data tools within large scale scientific array database using the database queries themselves to embed foreign routines belonging to the big data tools. Such an invocation of foreign data manipulation routines inside a query into a database can be made possible through a user-defined function (UDF). UDFs that allow such levels of freedom as to call modules from another language and interface back and forth between the query body and the side-loaded functions would be needed for this purpose. For the purpose of this research we attempt coupling of four widely used tools Hadoop (hadoop1), Matlab (matlab1), R (r1) and ScaLAPACK (scalapack1) with UDF feature of rasdaman (Baumann 98), an array-based data manager, for investigating this concept. The native array data model used by an array-based data manager provides compact data storage and high performance operations on ordered data such as spatial data, temporal data, and matrix-based data for linear algebra operations (scidbusr1). Performances issues arising due to coupling of tools with different paradigms, niche functionalities, separate processes and output
Kardaras, Georgios; Soler, José; Dittmann, Lars
Several actions for developing environmentally friendly technologies have been taken in most industrial fields. Significant resources have also been devoted in mobile communications industry. Moving towards eco-friendly alternatives is primarily a social responsibility for network operators....... However besides this, increasing energy efficiency represents a key factor for reducing operating expenses and deploying cost effective mobile networks. This paper presents how distributed base station architectures can contribute in greening radio access networks. More specifically, the advantages of...... introducing remote radio head modules are discussed. Substantial flexibility is provided in terms of power consumption, as a result of combining efficient hardware with intelligent software. Additionally, it is underlined that designing eco-sustainable systems needs to follow a holistic approach towards...
Cloud Radio Access Network (C-RAN) is a novel mobile network architecture which can address a number of challenges that mobile operators face while trying to support ever-growing end-users’ needs towards 5th generation of mobile networks (5G). The main idea behind C-RAN is to split the base...... as to design the socalled fronthaul network, interconnecting those parts. This thesis focuses on quantifying those benefits and proposing a flexible and capacity-optimized fronthaul network. It is shown that a C-RAN with a functional split resulting in a variable bit rate on the fronthaul links brings cost...... savings due to the multiplexing gains in the BBU pool and the fronthaul network. The cost of a fronthaul network deployment and operation can be further reduced by sharing infrastructure between fronthaul and other services. The origins of multiplexing gains in terms of traffic burstiness, the tidal...
Solbakk, Svein Arne
This paper describes some basic architectural choices for the access to and preservation of digital objects at the National Library of Norway. A digital repository is a core element for the handling of both access to and preservation of the digital objects. Strategies for giving access to the complete holdings include the use of a powerful search…
Pereira, Óscar Narciso Mortágua; Rui L. Aguiar; Santos, Maribel Yasmina
Programmers of relational database applications use software solutions (Hibernate, JDBC, LINQ, ADO.NET) to ease the development process of business tiers. These software solutions were not devised to address access control policies, much less for evolving access control policies, in spite of their unavoidable relevance. Currently, access control policies, whenever implemented, are enforced by independent components leading to a separation between policies and their enf...
Emig, Christian; Brandt, Frank; Abeck, Sebastian; Biermann, Jürgen; Klarl, Heiko
With the mutual consent to use WSDL (Web Service Description Language) to describe web service interfaces and SOAP as the basic communication protocol, the cornerstone for web service-oriented architecture (WSOA) has been established. Considering the momentum observable by the growing number of specifications in the web service domain for the indispensable cross-cutting concern of identity management (IdM) it is still an open issue how a WSOA-aware IdM architecture is built and how it is link...
Gholamali Nejad Hajali Irani
Full Text Available Layered architectures are the main architectures that are used in architecture of Information Systems. Data Access Layer (DAL is a common layer in all layered architecture of Information Systems. One of the most important steps in architectural design of information systems is designing the DAL. More than 20 Data Access Patterns (DAP have been developed for DALs. So providing a DAL based on existing DAPs is major activity in architectural design. Therefore an architect should be familiar to all existing DAPs and their evaluation parameters. Performance is one of most important parameter in architecture evaluation. In this paper, different aspects of performance of existing DAPs have been investigated and analyzed. To obtain this aim, firstly, a new classification has been provided for categorizing all DAPs based on architectures difference of them. Secondly, a simulation program as named DALSim has been developed for measuring performance of all DAPs. Finally, some comparisons of DAPs have been provided based on DALSim results. Based on provided classification for DAPs and performance comparison results of them, architects of information systems can easily compare and evaluate existing DAPs. With fully development of provided results in other aspect such as modifiability, extensibility, security etc., a complete framework for all DAPs can be provided.
Ulltveit-Moe, Nils; Olsen, Morten Goodwin; Pillai, Anand B.;
The European Internet Accessibility project (EIAO) has developed an Observatory for performing large scale automatic web accessibility evaluations of public sector web sites in Europe. The architecture includes a distributed web crawler that crawls web sites for links until either a given budget...... of web pages have been identified or the web site has been crawled exhaustively. Subsequently, a uniform random subset of the crawled web pages is sampled and sent for accessibility evaluation and the evaluation results are stored in a Resource Description Format (RDF) database that is later loaded...... challenges that the project faced and the solutions developed towards building a system capable of regular large-scale accessibility evaluations with sufficient capacity and stability. It also outlines some possible future architectural improvements....
Full Text Available Multimedia streaming means delivering continuous data to a plethora of client devices. Besides the actual data transport, this also needs a high degree of content adaptation respecting the end users’ needs given by content preferences, transcoding constraints, and device capabilities. Such adaptations can be performed in many ways, usually on the media server. However, when it comes to content editing, like mixing in subtitles or picture-in-picture composition, relying on third party service providers may be necessary. For economic reasons this should be done in a service-oriented way, because a lot of adaptation modules can be reused within different adaptation workflows. Although service-oriented architectures have become widely accepted in the Web community, the multimedia environment is still dominated by monolithic systems. The main reason is the insufficient support for working with continuous data: generally the suitability of Web services for handling complex data types and state-full applications is still limited. In this paper we discuss extensions of Web service frameworks, and present a first implementation of a service-oriented framework for media streaming and digital item adaptation. The focus lies on the technical realization of the services. Our experimental results show the practicality of the actual deployment of service-oriented multimedia frameworks.
Boggs, James D.
First responders are continuously moving at an incident site and this movement requires them to access Service-Oriented Architecture services, such as a Web Map Service, via mobile wireless networks. First responders from inside a building often have problems in communicating to devices outside that building due to propagation obstacles. Dynamic…
Chandra, Kishor; Cao, Zizheng; Bruintjes, T.M.; Prasad, R.V.; Karagiannis, G.; Tangdiongga, E.; Boom, van den H.P.A.; Kokkeler, A.B.J.
Millimeter wave (mmWave) communication is being seen as a disruptive technology for 5G era. In particular, 60GHz frequency band has emerged as a promising candidate for multi-Gbps connectivity in indoor and hotspot areas. In terms of network architecture, cloud radio access network (CRAN) has emerge
Hanushevsky, Andrew; Wang, Daniel L.; /SLAC
Scalla is a distributed low-latency file access system that incorporates novel techniques that minimize latency and maximize scalability over a large distributed system with a distributed namespace. Scalla's techniques have shown to be effective in nearly a decade of service for the high-energy physics community using commodity hardware and interconnects. We describe the two components used in Scalla that are instrumental in its ability to provide low-latency, fault-tolerant name resolution and load distribution, and enable its use as a high-throughput, low-latency communication layer in the Qserv system, the Large Synoptic Survey Telescope's (LSST's) prototype astronomical query system. Scalla arguably exceeded its three main design objectives: low latency, scaling, and recoverability. In retrospect, these objectives were met using a simple but effective design. Low latency was met by uniformly using linear or constant time algorithms in all high-use paths, avoiding locks whenever possible, and using compact data structures to maximize the memory caching efficiency. Scaling was achieved by architecting the system as a 64-ary tree. Nodes can be added easily and as the number of nodes increases, search performance increases at an exponential rate. Recoverability is inherent in that no permanent state information is maintained and whatever state information is needed it can be quickly constructed or reconstructed in real time. This allows dynamic changes in a cluster of servers with little impact on over-all performance or usability. Today, Scalla is being deployed in environments and for uses that were never conceived in 2001. This speaks well for the systems adaptability but the underlying reason is that the system can meet its three fundamental objectives at the same time.
Chien, E. S. K.; Marinho, J. A.; Russell, J. E., Sr.
The Cellular Access Digital Network (CADN) is the access vehicle through which cellular technology is brought into the mainstream of the evolving integrated telecommunications network. Beyond the integrated end-to-end digital access and per call network services provisioning of the Integrated Services Digital Network (ISDN), the CADN engenders the added capability of mobility freedom via wireless access. One key element of the CADN network architecture is the standard user to network interface that is independent of RF transmission technology. Since the Mobile Satellite System (MSS) is envisioned to not only complement but also enhance the capabilities of the terrestrial cellular telecommunications network, compatibility and interoperability between terrestrial cellular and mobile satellite systems are vitally important to provide an integrated moving telecommunications network of the future. From a network standpoint, there exist very strong commonalities between the terrestrial cellular system and the mobile satellite system. Therefore, the MSS architecture should be designed as an integral part of the CADN. This paper describes the concept of the CADN, the functional architecture of the MSS, and the user-network interface signaling protocols.
Full Text Available A novel channel based rescheduling scheme for modern turbo convolution code is proposed by the inclusion of suboptimal and low-complex max-log-MAP algorithm. Demands for dedicated custom solutions in mobile communications and its related applications leads to a reconfigurable architecture for Turbo convolution code. This study comprises the design and performance evolution of the proposed reconfigurable architecture for channel coding scheme in MIMO-High Speed Downlink Packet Access (MIMO-HSDPA. To attain effective performance close to shannon limit in a multi channel system, flexible reconfigurable architecture is realized with 28 nm cyclone V GX 5CGXFC5C6 FPGA. We achieved throughput of 13.5 Mbps compared with the conventional HSDPA standards while consuming 53 mW.
Ruj, Sushmita; Stojmenovic, Ivan
We propose an integrated architecture for smart grids, that supports data aggregation and access control. Data can be aggregated by home area network, building area network and neighboring area network in such a way that the privacy of customers is protected. We use homomorphic encryption technique to achieve this. The consumer data that is collected is sent to the substations where it is monitored by remote terminal units (RTU). The proposed access control mechanism gives selective access to consumer data stored in data repositories and used by different smart grid users. Users can be maintenance units, utility centers, pricing estimator units or analyzing and prediction groups. We solve this problem of access control using cryptographic technique of attribute-based encryption. RTUs and users have attributes and cryptographic keys distributed by several key distribution centers (KDC). RTUs send data encrypted under a set of attributes. Users can decrypt information provided they have valid attributes. The ac...
Corredor, Germán.; Iregui, Marcela; Arias, Viviana; Romero, Eduardo
Virtual microscopy (VM) facilitates visualization and deployment of histopathological virtual slides (VS), a useful tool for education, research and diagnosis. In recent years, it has become popular, yet its use is still limited basically because of the very large sizes of VS, typically of the order of gigabytes. Such volume of data requires efficacious and efficient strategies to access the VS content. In an educative or research scenario, several users may require to access and interact with VS at the same time, so, due to large data size, a very expensive and powerful infrastructure is usually required. This article introduces a novel JPEG2000-based service oriented architecture for streaming and visualizing very large images under scalable strategies, which in addition need not require very specialized infrastructure. Results suggest that the proposed architecture enables transmission and simultaneous visualization of large images, while it is efficient using resources and offering users proper response times.
Lazaro, Jose A.; Bock, Carlos; Polo, Victor; Martinez, Reynaldo I.; Prat, Josep
A highly scalable access architecture achieving high density and featuring resiliency, centralized light-generation control, remote amplification, and colorless optical network unit with reflective semiconductor optical amplifier (RSOA) for upstream modulation is presented and experimentally demonstrated. It is based on a user-single-fiber completely passive outside plant and provides broadband connections to >1000 users distributed along large distances. It is believed to represent an intermediate step toward metro-access convergence and offers flexible configurations covering high- and low-density population areas.
Quality situation assessment and decision making require access to multiple sources of data and information. Insufficient accessibility to data exists for many large corporations and Government agencies. By utilizing current advances in computer technology, today's situation analyst's have a wealth of information at their disposal. There are many potential solutions to the information accessibility problem using today's technology. The United States Department of Energy (US-DOE) faced this problem when dealing with one class of problem in the US. The result of their efforts has been the creation of the Tank Waste Information Network System -- TWINS. The TWINS solution combines many technologies to address problems in several areas such as User Interfaces, Transparent Access to Multiple Data Sources, and Integrated Data Access. Data related to the complex is currently distributed throughout several US-DOE installations. Over time, each installation has adopted their own set of standards as related to information management. Heterogeneous hardware and software platforms exist both across the complex and within a single installation. Standards for information management vary between US-DOE mission areas within installations. These factors contribute to the complexity of accessing information in a manner that enhances the performance and decision making process of the analysts. This paper presents one approach taken by the DOE to resolve the problem of distributed, heterogeneous, multi-media information management for the HLW Tank complex. The information system architecture developed for the DOE by the TWINS effort is one that is adaptable to other problem domains and uses
Networks and the associated tools from graph theory have now become well-established approaches to study natural as well as human-made systems. While early studies focused on topology and connectivity, the recent literature has acknowledged the importance of the dynamical properties of these networks. Here we focus on such a dynamic measure: accessibility. It characterizes for any given movement dynamics (such as random walks) the average number of nodes that can be reached in exactly h steps (out-accessibility), or the average number of nodes from which a given node can be reached (in-accessibility). This focus on dynamics makes accessibility particularly appropriate to study movement on networks and to detect complementary properties with respect to topology-based measurements such as betweenness centrality. We apply this measure to six nests of Cubitermes termites. Their mushroom-like 3D architectures consist of chambers and connecting tunnels that can be associated to nodes and edges in a communication network. Accessibilities turn out to be particularly low in the bottom part of the nests that link them to their underground tunneling network. We interpret this result in the context of anti-predator (ants) behavior and/or as a side effect of the global nest shape.
WANG Yu-xing; WU Jin
Discussed is a review and perspective of architecture, materials and process technology for dynamic random access memory(DRAM) applications. Key challenges of the transistor and capacitor scaling from DRAM will be reviewed. To continue scaling down, multi-gate devices with very thin silicon channels are most promising. Several architectures like Fin-field effect transistor(Fin-FET), Wafer bonded double gate and silicon on nothing(SON) gate-all-around have been demonstrated with good electrical characteristics. An overview of the evolution of capacitor technology is also presented from the early days of planar poly/insulator/silicon(PIS) capacitors to the metal/insulator/metal(MIM) capacitors used for today 50 nm technology node and below. In comparing Ta2O5, HfO2 and Al2O3 as high-k dielectric for use in DRAM technology, Al2O3 is found to give a good compromise between capacitor performance and manufacturability used in MIM architecture.
Quality situation assessment and decision making require access to multiple sources of data and information. Insufficient accessibility to data exists for many large corporations and Government agencies. By utilizing current advances in computer technology, today`s situation analyst`s have a wealth of information at their disposal. There are many potential solutions to the information accessibility problem using today`s technology. The United States Department of Energy (US-DOE) faced this problem when dealing with one class of problem in the US. The result of their efforts has been the creation of the Tank Waste Information Network System -- TWINS. The TWINS solution combines many technologies to address problems in several areas such as User Interfaces, Transparent Access to Multiple Data Sources, and Integrated Data Access. Data related to the complex is currently distributed throughout several US-DOE installations. Over time, each installation has adopted their own set of standards as related to information management. Heterogeneous hardware and software platforms exist both across the complex and within a single installation. Standards for information management vary between US-DOE mission areas within installations. These factors contribute to the complexity of accessing information in a manner that enhances the performance and decision making process of the analysts. This paper presents one approach taken by the DOE to resolve the problem of distributed, heterogeneous, multi-media information management for the HLW Tank complex. The information system architecture developed for the DOE by the TWINS effort is one that is adaptable to other problem domains and uses.
Kershaw, Philip; Ananthakrishnan, Rachana; Cinquini, Luca; Lawrence, Bryan; Pascoe, Stephen; Siebenlist, Frank
Network data access services such as OPeNDAP enable widespread access to data across user communities. However, without ready means to restrict access to data for such services, data providers and data owners are constrained from making their data more widely available. Even with such capability, the range of different security technologies available can make interoperability between services and user client tools a challenge. OPeNDAP is a key data access service in the infrastructure under development to support the CMIP5 (Couple Model Intercomparison Project Phase 5). The work is being carried out as part of an international collaboration including the US Earth System Grid and Curator projects and the EU funded IS-ENES and Metafor projects. This infrastructure will bring together Petabytes of climate model data and associated metadata from over twenty modelling centres around the world in a federation with a core archive mirrored at three data centres. A security system is needed to meet the requirements of organisations responsible for model data including the ability to restrict data access to registered users, keep them up to date with changes to data and services, audit access and protect finite computing resources. Individual organisations have existing tools and services such as OPeNDAP with which users in the climate research community are already familiar. The security system should overlay access control in a way which maintains the usability and ease of access to these services. The BADC (British Atmospheric Data Centre) has been working in collaboration with the Earth System Grid development team and partner organisations to develop the security architecture. OpenID and MyProxy were selected at an early stage in the ESG project to provide single sign-on capability across the federation of participating organisations. Building on the existing OPeNDAP specification an architecture based on pluggable server side components has been developed at the BADC
Musick, Charles R.; Critchlow, Terence; Ganesh, Madhaven; Slezak, Tom; Fidelis, Krzysztof
A system and method is disclosed for integrating and accessing multiple data sources within a data warehouse architecture. The metadata formed by the present method provide a way to declaratively present domain specific knowledge, obtained by analyzing data sources, in a consistent and useable way. Four types of information are represented by the metadata: abstract concepts, databases, transformations and mappings. A mediator generator automatically generates data management computer code based on the metadata. The resulting code defines a translation library and a mediator class. The translation library provides a data representation for domain specific knowledge represented in a data warehouse, including "get" and "set" methods for attributes that call transformation methods and derive a value of an attribute if it is missing. The mediator class defines methods that take "distinguished" high-level objects as input and traverse their data structures and enter information into the data warehouse.
Full Text Available Modern systems-on-chip (SoCs today contain hundreds of cores, and this number is predicted to reach the thousands by the year 2020. As the number of communicating elements increases, there is a need for an efficient, scalable and reliable communication infrastructure. As technology geometries shrink to the deep submicron regime, however, the communication delay and power consumption of global interconnections become the major bottleneck. The network-on-chip (NoC design paradigm, based on a modular packet-switched mechanism, can address many of the on-chip communication issues, such as the performance limitations of long interconnects and integration of large number of cores on a chip. Recently, new communication technologies based on the NoC concept have emerged with the aim of improving the scalability limitations of conventional NoC-based architectures. Among them, wireless NoCs (WiNoCs use the radio medium for reducing the performance and energy penalties of long-range and multi-hop communications. As the radio medium can be accessed by a single transmitter at a time, a radio access control mechanism (RACM is needed. In this paper, we present a novel RACM, which allows one to improve both the performance and energy figures of the WiNoC. Experiments, carried out on both synthetic and real traffic scenarios, have shown the effectiveness of the proposed RACM. On average, a 30% reduction in communication delay and a 25% energy savings have been observed when the proposed RACM is applied to a known WiNoC architecture.
Massive levels of integration following Moore's Law ushered in a paradigm shift in the way on-chip interconnections were designed. With higher and higher number of cores on the same die traditional bus based interconnections are no longer a scalable communication infrastructure. On-chip networks were proposed enabled a scalable plug-and-play mechanism for interconnecting hundreds of cores on the same chip. Wired interconnects between the cores in a traditional Network-on-Chip (NoC) system, becomes a bottleneck with increase in the number of cores thereby increasing the latency and energy to transmit signals over them. Hence, there has been many alternative emerging interconnect technologies proposed, namely, 3D, photonic and multi-band RF interconnects. Although they provide better connectivity, higher speed and higher bandwidth compared to wired interconnects; they also face challenges with heat dissipation and manufacturing difficulties. On-chip wireless interconnects is one other alternative proposed which doesn't need physical interconnection layout as data travels over the wireless medium. They are integrated into a hybrid NOC architecture consisting of both wired and wireless links, which provides higher bandwidth, lower latency, lesser area overhead and reduced energy dissipation in communication. However, as the bandwidth of the wireless channels is limited, an efficient media access control (MAC) scheme is required to enhance the utilization of the available bandwidth. This thesis proposes using a multiple access mechanism such as Code Division Multiple Access (CDMA) to enable multiple transmitter-receiver pairs to send data over the wireless channel simultaneously. It will be shown that such a hybrid wireless NoC with an efficient CDMA based MAC protocol can significantly increase the performance of the system while lowering the energy dissipation in data transfer. In this work it is shown that the wireless NoC with the proposed CDMA based MAC protocol
Gleerup, Thomas Møller; Holten-Lund, Hans Erik; Madsen, Jan;
This paper discusses the trade-off between calculations and memory accesses in a 3D graphics tile renderer for visualization of data from medical scanners. The performance requirement of this application is a frame rate of 25 frames per second when rendering 3D models with 2 million triangles, i....... In software, forward differencing is usually better, but in this hardware implementation, the trade-off has made it possible to develop a very regular memory architecture with a buffering system, which can reach 95% bandwidth utilization using off-the-shelf SDRAM, This is achieved by changing the...... algorithm to use a memory access strategy with write-only and read-only phases, and a buffering system, which uses round-robin bank write-access combined with burst read-access....
Andersson, Jonas E
In the Danish building code, the twin concept of accessibility and usability has an open interpretation on a comprehensive level of thinking, whereas the notions generate specific physical requirements on a detailed level when it comes to architecture and built environments. This study has been...... executed as a case study among 34 experienced professionals, active in the implementation of the twin concept in the built environments in order to facilitate for people with a cognitive or functional impairment. The research material has been assembled by the use of mini-questionnaires that have been...... physical constituent of architecture and built environments, while usability refers to both physical and other measures that have been deemed necessary to realize in order to create a usable built space. A high level of accessibility, but a low degree of usability, indicates a high fit between user demands...
In this talk, Professor Lessig will review the evolution of access to scientific scholarship, and evaluate the success of this system of access against a background norm of universal access.While copyright battles involving artists has gotten most of the public's attention, the real battle should be over access to knowledge, not culture. That battle we are losing.
Ramesh Bhakthavatchalu; Nirmala Devi.M
A technique to provide programmable secure access to the scan based Logic Built in Self- Test (BIST) structures is proposed. Joint Test Access Group (JTAG) interface is the major test access method used in VLSI IC’s. At the same time, it can be misused as a means to access and hack the hardware circuitry of the IC. It is addressed in this method to prevent unauthorized users from hacking the JTAG interface and interfering in the Logic BIST test functions. A two stage, multiple crypto algorith...
Bonnet, Philippe; Gonzalez, Javier; Granados, Joel Andres
new insights, there are signicant barriers to the realization of this vision. One of the key challenge is to allow scientists to share their data widely while retaining some form of control over who accesses this data (access control) and more importantly how it is used (usage control). Access...... and usage control is necessary to enforce existing open data policies. We have proposed the vision of trusted cells: A decentralized infrastructure, based on secure hardware running on devices equipped with trusted execution environments at the edges of the Internet. We originally described the utilization...... data sets with access and usage control guarantees. We rely on examples from terrestrial research and monitoring in the arctic in the context of the INTERACT project....
Avó, Ricardo Pedro Custodinho da
The recent remarkable growth in bandwidth of both wired optical and wireless access networks supports a burst of new high bandwidth Internet applications such as: peer-topeer file sharing, cloud storage, on-line gaming, video streaming, etc. Within this scenario, the convergence of fixed and wireless access networks offers significant opportunities for network operators to satisfy user demands, and simultaneously reduce the cost of implementing and running separated wireless an...
Hamm, Virginie; Lopez, Simon
The "WELLCOME" (WELL COMpletion Evaluation on productivity and injectivity) project is part of an effort to promote the development of deep geothermal resources not or little exploited today because of poor and/or uncertain permeability. The main objective of this project is to evaluate the impact of geothermal wells (injector and producer) architecture on the initial productivity and injectivity of the reservoir. This project has emerged in order to give operators quantitative elements to as...
Full Text Available A technique to provide programmable secure access to the scan based Logic Built in Self- Test (BIST structures is proposed. Joint Test Access Group (JTAG interface is the major test access method used in VLSI IC’s. At the same time, it can be misused as a means to access and hack the hardware circuitry of the IC. It is addressed in this method to prevent unauthorized users from hacking the JTAG interface and interfering in the Logic BIST test functions. A two stage, multiple crypto algorithms based separate authorization schemes are used. A configuration register can be programmed to select the level of security to a specific user group. Different crypto algorithms can be chosen, with user specifiable key lengths. A challenge response protocol is employed to authenticate the user and corresponding accessibility. All the features included are compliant with the IEEE JTAG standard 1149.1. This technique is applied on ISCAS-89 and ISCAS-99 benchmark designs with the help of Cadence Encounter true time 13.1 design automation tools and results are shown. A small amount of (less than 2 to 5% increase in area reported for implementing the security features.
Bonometti, Joseph; Frame, Kyle L.; Dankanich, John W.
Two transportation architecture changes are presented at either end of a conventional two-stage rocket flight: 1) Air launch using a large, conventional, pod hauler design (i.e., Crossbow)ans 2) Momentum exchange tether (i.e., an in-space asset like MXER). Air launch has ana analytically justified cost reduction of approx. 10%, but its intangible benefits suggest real-world operations cost reductions much higher: 1) Inherent launch safety; 2) Mission Risk Reduction; 3) Favorable payload/rocket limitations; and 4) Leveraging the aircraft for other uses (military transport, commercial cargo, public outreach activities, etc.)
This article presents the principal results of the doctoral thesis “Semantic-oriented Architecture and Models for Personalized and Adaptive Access to the Knowledge in Multimedia Digital Library” by Desislava Ivanova Paneva-Marinova (Institute of Mathematics and Informatics), successfully defended before the Specialised Academic Council for Informatics and Mathematical Modelling on 27 October, 2008. This paper presents dissertation work on semantic-oriented architectures and...
He, Jun; Song, Wei
Mobile networks are undergoing fast evolution to software-defined networking (SDN) infrastructure in order to accommodate the ever-growing mobile traffic and overcome the network management nightmares caused by unremitting acceleration in technology innovations and evolution of the service market.Enabled by virtualized network functionalities, evolving carrier wireless networks tend to share radio access network (RAN) among multiple (virtual) network operators so as to increase network capaci...
Khan TareqHasan; Wahid KhanA
A design of a novel bridge is proposed to interface digital-video-port (DVP) compatible image sensors with popular microcontrollers. Most commercially available CMOS image sensors send image data at high speed and in a row-by-row fashion. On the other hand, commercial microcontrollers run at relatively slower speed, and many embedded system applications need random access of pixel values. Moreover, commercial microcontrollers may not have sufficient internal memory to store a complete image ...
Broadband Wireless Access technologies have significant market potential, especially the WiMAX protocol which can deliver data rates of tens of Mbps. Strong demand for high performance WiMAX solutions is forcing designers to seek help from multi-core processors that offer competitive advantages in terms of all performance metrics, such as speed, power and area. Through the provision of a degree of flexibility similar to that of a DSP and performance and power consumption advant...
Yeh, Bih-Chyun; Lin, Cheing-Hong; Yang, De-Nian
We propose a new code family, called extended shifted prime codes, and the universal encoding architecture for spectral amplitude coding optical code division multiple access systems using a two-code keying scheme. The proposed system can eliminate multiuser interference and suppress phase-induced intensity noise. In addition, we design the ESP codes to be an encoding/decoding architecture based on the array waveguide grating architecture and reduce the power loss and the complexity of the optical line terminal. The numerical results demonstrate that the proposed system with ESP codes outperforms the existing one-dimensional shifted prime codes system.
Donohoe, Bryon S; Resch, Michael G
To improve the deconstruction of biomass, the most abundant terrestrial source of carbon polymers, en route to renewable fuels, chemicals, and materials more knowledge is needed into the mechanistic interplay between thermochemical pretreatment and enzymatic hydrolysis. In this review we highlight recent progress in advanced imaging techniques that have been used to elucidate the effects of thermochemical pretreatment on plant cell walls across a range of spatial scales and the relationship between the substrate structure and the function of various glycoside hydrolase components. The details of substrate and enzyme interactions are not yet fully understood and the challenges of characterizing plant cell wall architecture, how it dictates recalcitrance, and how it relates to enzyme-substrate interactions is the focus for many research groups in the field. Better understanding of how to match pretreatments with improved enzyme mixtures will lead to lower costs for industrial biorefining. PMID:26529490
We propose a concept of rewritable ferroelectric random access memory (RAM) with two lateral organic transistors-in-one cell architecture. Lateral integration of a paraelectric organic field-effect transistor (OFET), being a selection transistor, and a ferroelectric OFET as a memory transistor is realized using a paraelectric depolarizing layer (PDL) which is patterned on a ferroelectric insulator by transfer-printing. For the selection transistor, the key roles of the PDL are to reduce the dipolar strength and the surface roughness of the gate insulator, leading to the low memory on–off ratio and the high switching on–off current ratio. A new driving scheme preventing the crosstalk between adjacent memory cells is also demonstrated for the rewritable operation of the ferroelectric RAM. (paper)
Sanyal, Rajarshi; Cianca, Ernestina; Prasad, Ramjee
for conveying data symbols from one end to other. The big question is: Is it feasible to implement color synthesized by the video systems for the purpose of telecommunications? In this paper we propose the ‘Color Pixel Multiple Access’ scheme for the radio access network and Color Pixel Multiplexing for core...... network, by implementing electronic color as a tool for addressing and bearing data overhead. The present day video systems that can generate millions of colors, in its electronic form have been utilized to set up a wireless network, serving mobile stations or computers as its nodes. The state of the art...... Wireless Local Loop deployments are based on the traditional cellular technologies. However there are limitations in terms of intricacy, cost and time to deploy .In this paper, the authors introduce a Wireless Local Loop architecture employing the proposed CPMA technique on existing overlay video...
Full Text Available In this study we carried out a genome-wide association analysis for plant and grain morphology and root architecture in a unique panel of temperate rice accessions adapted to European pedo-climatic conditions. This is the first study to assess the association of selected phenotypic traits to specific genomic regions in the narrow genetic pool of temperate japonica. A set of 391 rice accessions were GBS-genotyped yielding-after data editing-57000 polymorphic and informative SNPS, among which 54% were in genic regions.In total, 42 significant genotype-phenotype associations were detected: 21 for plant morphology traits, 11 for grain quality traits, 10 for root architecture traits. The FDR of detected associations ranged from 3 · 10-7 to 0.92 (median: 0.25. In most cases, the significant detected associations co-localised with QTLs and candidate genes controlling the phenotypic variation of single or multiple traits. The most significant associations were those for flag leaf width on chromosome 4 (FDR = 3 · 10-7 and for plant height on chromosome 6 (FDR = 0.011.We demonstrate the effectiveness and resolution of the developed platform for high-throughput phenotyping, genotyping and GWAS in detecting major QTLs for relevant traits in rice. We identified strong associations that may be used for selection in temperate irrigated rice breeding: e.g. associations for flag leaf width, plant height, root volume and length, grain length, grain width and their ratio. Our findings pave the way to successfully exploit the narrow genetic pool of European temperate rice and to pinpoint the most relevant genetic components contributing to the adaptability and high yield of this germplasm. The generated data could be of direct use in genomic-assisted breeding strategies.
Kim, Dongkyu; Alaoui, Adil; Levine, Betty; Leondaridis, Leonidas; Shields, Peter; Byers, Steve; Cleary, Kevin
The current trend towards systems medicine will rely heavily on computational and bioinformatics capabilities to collect, integrate, and analyze massive amounts of data from disparate sources. The objective is to use this information to make medical decisions that improve patient care. At Georgetown University Medical Center, we are developing an informatics capability to integrate several research and clinical databases. Our long term goal is to provide researchers at Georgetown's Lombardi Comprehensive Cancer Center better access to aggregated molecular and clinical information facilitating the investigation of new hypotheses that impact patient care. We also recognize the need for data mining tools and intelligent agents to help researchers in these efforts. This paper describes our initial work to create a flexible platform for researchers and physicians that provides access to information sources including clinical records, medical images, genomic, epigenomic, proteomic and metabolomic data. This paper describes the data sources selected for this pilot project and possible approaches to integrating these databases. We present the different database integration models that we considered. We conclude by outlining the proposed Information Model for the project.
A major challenge facing data processing centers today is data management. This includes the storage of large volumes of data and access to it. Current media storage for large data volumes is typically off line and frequently off site in warehouses. Access to data archived in this fashion can be subject to long delays, errors in media selection and retrieval, and even loss of data through misplacement or damage to the media. Similarly, designers responsible for architecting systems capable of continuous high-speed recording of large volumes of digital data are faced with the challenge of identifying technologies and configurations that meet their requirements. Past approaches have tended to evaluate the combination of the fastest tape recorders with the highest capacity tape media and then to compromise technology selection as a consequence of cost. This paper discusses an architecture that addresses both of these challenges and proposes a cost effective solution based on robots, high speed helical scan tape drives, and large-capacity media.
Vinay V Abhyankar
Full Text Available Microfluidic barrier tissue models have emerged as advanced in vitro tools to explore interactions with external stimuli such as drug candidates, pathogens, or toxins. However, the procedures required to establish and maintain these systems can be challenging to implement for end users, particularly those without significant in-house engineering expertise. Here we present a module-based approach that provides an easy-to-use workflow to establish, maintain, and analyze microscale tissue constructs. Our approach begins with a removable culture insert that is magnetically coupled, decoupled, and transferred between standalone, prefabricated microfluidic modules for simplified cell seeding, culture, and downstream analysis. The modular approach allows several options for perfusion including standard syringe pumps or integration with a self-contained gravity-fed module for simple cell maintenance. As proof of concept, we establish a culture of primary human microvascular endothelial cells (HMVEC and report combined surface protein imaging and gene expression after controlled apical stimulation with the bacterial endotoxin lipopolysaccharide (LPS. We also demonstrate the feasibility of incorporating hydrated biomaterial interfaces into the microfluidic architecture by integrating an ultra-thin (< 1 μm, self-assembled hyaluronic acid/peptide amphiphile culture membrane with brain-specific Young's modulus (~ 1kPa. To highlight the importance of including biomimetic interfaces into microscale models we report multi-tiered readouts from primary rat cortical cells cultured on the self-assembled membrane and compare a panel of mRNA targets with primary brain tissue signatures. We anticipate that the modular approach and simplified operational workflows presented here will enable a wide range of research groups to incorporate microfluidic barrier tissue models into their work.
Abhyankar, Vinay V.; Wu, Meiye; Koh, Chung-Yan; Hatch, Anson V.
Microfluidic barrier tissue models have emerged as advanced in vitro tools to explore interactions with external stimuli such as drug candidates, pathogens, or toxins. However, the procedures required to establish and maintain these systems can be challenging to implement for end users, particularly those without significant in-house engineering expertise. Here we present a module-based approach that provides an easy-to-use workflow to establish, maintain, and analyze microscale tissue constructs. Our approach begins with a removable culture insert that is magnetically coupled, decoupled, and transferred between standalone, prefabricated microfluidic modules for simplified cell seeding, culture, and downstream analysis. The modular approach allows several options for perfusion including standard syringe pumps or integration with a self-contained gravity-fed module for simple cell maintenance. As proof of concept, we establish a culture of primary human microvascular endothelial cells (HMVEC) and report combined surface protein imaging and gene expression after controlled apical stimulation with the bacterial endotoxin lipopolysaccharide (LPS). We also demonstrate the feasibility of incorporating hydrated biomaterial interfaces into the microfluidic architecture by integrating an ultra-thin (< 1 μm), self-assembled hyaluronic acid/peptide amphiphile culture membrane with brain-specific Young’s modulus (~ 1kPa). To highlight the importance of including biomimetic interfaces into microscale models we report multi-tiered readouts from primary rat cortical cells cultured on the self-assembled membrane and compare a panel of mRNA targets with primary brain tissue signatures. We anticipate that the modular approach and simplified operational workflows presented here will enable a wide range of research groups to incorporate microfluidic barrier tissue models into their work. PMID:27227828
Full Text Available A design of a novel bridge is proposed to interface digital-video-port (DVP compatible image sensors with popular microcontrollers. Most commercially available CMOS image sensors send image data at high speed and in a row-by-row fashion. On the other hand, commercial microcontrollers run at relatively slower speed, and many embedded system applications need random access of pixel values. Moreover, commercial microcontrollers may not have sufficient internal memory to store a complete image of high resolution. The proposed bridge addresses these problems and provides an easy-to-use and compact way to interface image sensors with microcontrollers. The proposed design is verified in FPGA and later implemented using CMOS 0.18 um Artisan library cells. The design costs 4,735 gates and 0.12 mm2 silicon area. The synthesis results show that the bridge can support a data rate up to 254 megasamples/sec. Its applications may include pattern recognition, robotic vision, tracking system, and medical imaging.
Bekaert, Jeroen L.; Van De Ville, Dimitri; Rogge, Boris; Lerouge, Sam; De Sutter, Robbie; De Kooning, Emiel; Van de Walle, Rik
A comprehensive approach to the access of archival collections necessitates the interplay of various types of metadata standards. Each of these standards fulfills its own part within the context of a 'metadata infrastructure'. Besides this, it should be noted that present-day digital libraries are often limited to the management of mainly textual and image-based material. Archival Information Systems dealing with various media types are still very rare. There is a need for a methodology to deal with time-dependant media within an archival context. The aim of our research is to investigate and implement a number of tools supporting the content management multimedia data within digital collections. A flexible and extendible framework is proposed, based on the emerging Metadata Encoding and Transmission Standard (METS). Firstly, we will focus on the description of archival collections according to the archival mandates of provenance for the benefit of an art-historical research in an archive-theoretically correct manner. Secondly, we will examine the description tools that represent the semantics and structure of multimedia data. In this respect, an extension of the present archival metadata framework has been proposed to time-based media content delivered via standards such as the MPEG-7 multimedia content description standard.
刘盛辉; 朱志祥; 任学强
In view of government internet access situation, it presents the Government Internet Secure Access Technical architecture. By constructing the Government Internet Secure Access Point Government Internet Secure Access Operation Center, it achieves the goals of manageability, controllability, scalability of E-government network.. It also takes Shaanxi Province for example and describes Shaanxi Government Internet Secure Access technical architecture, which is mainly relying on the E-Government unified platform, by constructing six Government Internet Secure Access Points and one Government Internet Secure Access Operation Center, can we realize the secure access and centralized supervision of Government Internet.%针对我国政府部门互联网接入现状,提出了政府部门互联网安全接入技术架构。通过建立政府部门安全接入点和安全接入管理中心,实现对电子政务网络的可管、可控和可剥离。并以陕西省为例,详细介绍了陕西省政府部门互联网安全接入技术架构,依托电子政务统一平台,通过建立6个互联网安全接入点和1个安全接入管理中心,实现了政府部门互联网安全接入和集中监管。
Wang, Yiguang; Wang, Yuanquan; Tao, Li; Shi, Jianyang; Chi, Nan
We propose and experimentally demonstrate a full-duplex high-speed visible light communication (VLC) access network based on star topology architecture to offer high-speed optical wireless access for a large number of users. Optical fiber is used as the backbone of the VLC network and directly connected to the light-emitting diode lamps. Frequency division multiplexing (FDM) is utilized for both the downlink and uplink. The bidirectional transmission of 32 quadrature amplitude modulation orthogonal FDM signals at an overall throughput of 4 Gb/s is successfully achieved to support four users access, and each user is offered 500 Mb/s downstream and 500 Mb/s upstream. The measured bit error rates of the downlink and uplink for all four users are <7% pre-forward error correction limit of 3.8×10-3 after a 25 km standard single-mode fiber and 65 cm free space, which clearly validates the promising potential of the proposed VLC network architecture to offer more than 10 Gb/s wireless access.
ZHOUKe; HUANGYongfeng; ZHANGJiangling; FENGDan; WANGFang
Parallelism is an important way to improve the performance of a storage device. RAID (Redundant array of independent disk) is an example, which uses multi channels to realize parallelism of disk operation. While,because of the limits of bus and channel speed, the number of parallel channels in RAID cannot be increased as far as we wish. In order to break the bottleneck of bus, this paper presents a new approach of storage architecture, disk tree. Disk tree is a tree structure and uses unit controller as a node, which has one channel to connect with up node and two or three channels to connect with down nodes. Disk is the leaf of this tree. In host, multi storage spaces of multi channels are virtualized to a storage space. This paper builds SPN (Stochastic Petri net) model of RAID and unit controller of disk tree, analyzes average utilization of string controller, discusses some basic issues of disk tree,including its architecture, data striping, and gives some results of an implementation of this architecture.
Kiran K. Patnaik
Full Text Available Problem statement: OGSA-DAI middleware allows data resources to be federated and accessed via web services on the web or within grids or clouds. It provides a client API for writing programs that access the exposed databases. Migrating existing applications to the new technology and using a new API to access the data of DBMS with BLOB is difficult and discouraging. A JDBC Driver is a much convenient alternative to existing mechanism and provides an extension to OGSA-DAI middleware and allows applications to use databases exposed in a grid through the OGSA-DAI 3.0. However, the driver does not support Binary Large Objects (BLOB. Approach: The driver is enhanced to support BLOB using the OGSA-DAI Client API. It transforms the JDBC calls into an OGSA-DAI workflow request and sends it to the server using Web Services (WS. The client API of OGSA-DAI uses activities that are connected to form a workflow and executed using a pipeline. This workflow mechanism is embedded into the driver. The WS container dispatches the request to the OGSA-DAI middleware for processing and the result is then transformed back to an instance of ResultSet implementation using the OGSA-DAI Client API, before it is returned to the user. Results: Test on handling of BLOBs (images, flash files and videos ranging from size 1 KB to size 2 GB were carried out on Oracle, MySQL and PostgreSQL databases using our enhanced JDBC driver and it performed well. Conclusion: The enhanced JDBC driver now can offer users, with no experience in Grid computing specifically on OGSA-DAI, the possibility to give their applications the ability to access databases exposed on the grid with minimal effort.
Shuto, Yusuke; Yamamoto, Shuu'ichirou; Sugahara, Satoshi
The energy performance of a nonvolatile static random access memory (NV-SRAM) cell for power gating applications was quantitatively analyzed for the first time using the performance index of break-even time (BET). The NV-SRAM cell is based on spin-transistor architecture using ordinary metal-oxide-semiconductor field-effect transistors (MOSFETs) and spin-transfer-torque magnetic tunnel junctions (STT-MTJs), whose circuit representation of spin-transistor is referred to as a pseudo-spin-MOSFET (PS-MOSFET). The cell is configured with a standard six-transistor SRAM cell and two PS-MOSFETs. The NV-SRAM cell basically has a short BET of submicroseconds. Although the write (store) operation to the STT-MTJs causes an increase in the BET, it can be successfully reduced by the proposed power-aware bias-control for the PS-MOSFETs.
Baziana, Peristera A.
This study aims to put forward an extensive discussion about the increasing demand for available bandwidth to serve the multiple types of traffic in modern wavelength division multiplexing (WDM) metropolitan area networks (MANs). A traffic-depended multi-buffer node architecture in conjunction with an efficient asynchronous transmission WDM access (WDMA) protocol to serve the variable size Internet packets in ring MANs is proposed. The structure of the multi-buffer node architecture is determined by the probability distribution of each packet size category in the MAN traffic, providing storage and dropping events equity among the nodes. The adopted WDMA algorithm satisfies the requirement for high performance efficiency especially under high offered load, by taking care to optimally face the bandwidth fragmentation problem and to maximize the bandwidth exploitation, while it effectively avoids both the packets collisions over the wavelengths and the destination conflicts. Numerical results prove that the proposed network model achieves throughput improvement up to 334% as compared with the relative study of Pranggono and Elmirghani (2011). An analytical framework is developed for the protocol throughput predictions under both symmetric and asymmetric IP traffic scenarios. Also, the proposed protocol performance is thoroughly investigated through simulation results based on Poisson and self-similar traffic model statistics, for both traffic scenarios.
An information system architecture defines the components of a system and the interfaces among the components. A good architecture is essential for creating an Integrated Advanced Information Management System (IAIMS) that works as an integrated whole yet is flexible enough to accommodate many users and roles, multiple applications, changing vendors, evolving user needs, and advancing technology. Modularity and layering promote flexibility by reducing the complexity of a system and by restricting the ways in which components may interact. Enterprise-wide mediation promotes integration by providing message routing, support for standards, dictionary-based code translation, a centralized conceptual data schema, business rule implementation, and consistent access to databases. Several IAIMS sites have adopted a client-server architecture, and some have adopted a three-tiered approach, separating user interface functions, application logic, and repositories. PMID:9067884
This article introduces a new design concept; sensory accessibility. While acknowledging the importance of sensory experiences in architectural quality, as well as the importance of accommodating user needs the concept combines three equally important factors; architecture, the senses and...... accessibility. Sensory accessibility accommodates aspects of a sensory disability and describes architectural design requirements needed to ensure access to architectural experiences. In the context of architecture accessibility has become a design concept of its own. It is generally described as ensuring...... physical access to the built environment by accommodating physical disabilities. While the existing concept of accessibility ensures the physical access of everyone to a given space, sensory accessibility ensures the choice of everyone to stay and be able to participate and experience....
Latré, Steven; Verstichel, Stijn; de Vleeschauwer, Bart; de Turck, Filip; Demeester, Piet
The recent emergence of multimedia services, such as Network Based Personal Video Recording and Broadcast TV over traditional DSL based access networks, has introduced stringent Quality of Experience (QoE) requirements. It is generally assumed that the wide variety of services and user profiles introduces the need for a per-user or per-subscriber QoE management. Such a complex QoE management requires real-time knowledge about the managed services, which is available amongst the different nodes in the network. However, even for managing a few services, a relatively large amount of, constantly updated, knowledge is needed. Propagating all the knowledge to all nodes is therefore not feasible. As not all knowledge is relevant to all nodes, it is important to perform an intelligent knowledge distribution and management. In this position paper, we introduce the concept of a cognitive model that describes the knowledge requirements of each node. Based on the information stated in this cognitive model, we discuss how filter queries, that typically describe what needs to be queried from other nodes, can be automatically generated leading to an efficient partitioning of the knowledge through the distributed nodes.
International audience In this chapter, we introduce an additional, yet essential, concept in describing software architectures : architecture constraints. We explain the precise role of these entities and their importance in object-oriented, component-based or service-oriented software engi-neering. We then describe the way in which they are specified and interpreted. An architect can define architecture constraints and then associate them to architectural descriptions to limit their stru...
how recognising the autonomy of architecture, not as an esoteric concept but as a valid source of information in a pragmatic design practice, may help us overcome the often-proclaimed dichotomy between formal autonomy and a societally committed architecture. It follows that in architectural education...
This paper will discuss the challenges faced by architectural education today. It takes as its starting point the double commitment of any school of architecture: on the one hand the task of preserving the particular knowledge that belongs to the discipline of architecture, and on the other hand...... the obligation to prepare students to perform in a profession that is largely defined by forces outside that discipline. It will be proposed that the autonomy of architecture can be understood as a unique kind of information: as architecture’s self-reliance or knowledge-about itself. A knowledge that...... is not scientific or academic but is more like a latent body of data that we find embedded in existing works of architecture. This information, it is argued, is not limited by the historical context of the work. It can be thought of as a virtual capacity – a reservoir of spatial configurations that...
Christensen, Henrik Bærbak; Hansen, Klaus Marius
Architectural prototyping is a widely used practice, con- cerned with taking architectural decisions through experiments with light- weight implementations. However, many architectural decisions are only taken when systems are already (partially) implemented. This is prob- lematic in the context of...... architectural prototyping since experiments with full systems are complex and expensive and thus architectural learn- ing is hindered. In this paper, we propose a novel technique for harvest- ing architectural prototypes from existing systems, \\architectural slic- ing", based on dynamic program slicing. Given a...... system and a slicing criterion, architectural slicing produces an architectural prototype that contain the elements in the architecture that are dependent on the ele- ments in the slicing criterion. Furthermore, we present an initial design and implementation of an architectural slicer for Java....
Bardram, Jakob; Christensen, Henrik Bærbak; Hansen, Klaus Marius
A major part of software architecture design is learning how specific architectural designs balance the concerns of stakeholders. We explore the notion of "architectural prototypes", correspondingly architectural prototyping, as a means of using executable prototypes to investigate stakeholders......' concerns with respect to a system under development. An architectural prototype is primarily a learning and communication vehicle used to explore and experiment with alternative architectural styles, features, and patterns in order to balance different architectural qualities. The use of architectural...... prototypes in the development process is discussed, and we argue that such prototypes can play a role throughout the entire process. The use of architectural prototypes is illustrated by three distinct cases of creating software systems. We argue that architectural prototyping can provide key insights that...
Bardram, Jakob Eyvind; Christensen, Henrik Bærbak; Hansen, Klaus Marius
A major part of software architecture design is learning how specific architectural designs balance the concerns of stakeholders. We explore the notion of "architectural prototypes", correspondingly architectural prototyping, as a means of using executable prototypes to investigate stakeholders......' concerns with respect to a system under development. An architectural prototype is primarily a learning and communication vehicle used to explore and experiment with alternative architectural styles, features, and patterns in order to balance different architectural qualities. The use of architectural...... prototypes in the development process is discussed, and we argue that such prototypes can play a role throughout the entire process. The use of architectural prototypes is illustrated by three distinct cases of creating software systems. We argue that architectural prototyping can provide key insights that...
李文竹; 冯楠; 任丹萍; 赵继军
在分析 SDN (软件定义网络)组网的国内外相关工作的基础上，提出了一种新型融合宽带接入网络架构，该架构遵从OpenFlow协议，实现了光纤无线接入网络的智能管控，相关的资源分配算法、路由选择协议和节能机制可以在该架构下有效实施并提升网络性能。%This paper proposes a novel integrated broadband access network architecture on the basis of analyzing the relevant research status of the Software Defined Networks (SDN)at home and abroad.In compliance with the OpenFlow protocol,this architecture realizes the intelligent management and control of optical-wireless access networks,effectively implements the rele-vant resource allotment algorithm,routing selection protocol and energy-saving mechanism and enhance the network perform-ances.
Álvarez García, Víctor Manuel
Software technology is creating a ubiquitous context for human living and learning in which new modes of interaction are gradually being incorporated. At the same time, interaction with Internet-based learning systems has evolved from using the traditional access from a personal computer or laptop‟s web browser to more flexible access from mobile devices. However, in both cases, e-learning systems have created a context in which interaction with the user is carried out mainly by using visual ...
Acknowledging that the Danish Buildings Regulations is having an impact on the design of inclusive architecture, a Danish government agency focuses on new models for the accessibility requirements in the future Building Regulations supporting an innovative and inclusive architecture. In order to...
Doyle, John C.; Csete, Marie
This paper aims to bridge progress in neuroscience involving sophisticated quantitative analysis of behavior, including the use of robust control, with other relevant conceptual and theoretical frameworks from systems engineering, systems biology, and mathematics. Familiar and accessible case studies are used to illustrate concepts of robustness, organization, and architecture (modularity and protocols) that are central to understanding complex networks. These essential organizational feature...
This dissertation addresses the reductive reading of Georges Bataille's work done within the field of architectural criticism and theory which tends to set aside the fundamental ‘broken’ totality of Bataille's oeuvre and also to narrowly interpret it as a mere critique of architectural form, consequently presenting it either as the negation of all form of architecture or as the critique of 'classical' architectural forms. Against this ‘appropriation’, i.e. this reductive reading and the subse...
Tvedebrink, Tenna Doktor Olsen; Fisker, Anna Marie; Kirkegaard, Poul Henning
and recovery through the architecture framing eating experiences, this article examines, from a theoretical perspective, two less debated concepts relating to hospitality called food design and architectural theatricality. In architectural theory the nineteenth century German architect Gottfried...... Semper is known for his writings on theatricality, understood as a holistic design approach emphasizing the contextual, cultural, ritual and social meanings rooted in architecture. Relative hereto, the International Food Design Society recently argued, in a similar holistic manner, that the methodology...
Randell, B.; Treleaven, P.C.
This book is a collection of course papers which discusses the latest (1982) milestone of electronic building blocks and its effect on computer architecture. Contributions range from selecting a VLSI process technology to Japan's Fifth Generation Computer Architecture. Contents, abridged: VLSI and machine architecture. Graphic design aids: HED and FATFREDDY. On the LUCIFER system. Clocking of VLSI circuits. Decentralised computer architectures for VLSI. Index.
Erickson, Mary; Delahunt, Michael
Most art teachers would agree that architecture is an important form of visual art, but they do not always include it in their curriculums. In this article, the authors share core ideas from "Architecture and Environment," a teaching resource that they developed out of a long-term interest in teaching architecture and their fascination with the…
This book explains the evolutions of architecture for mobiles and summarizes the different technologies:- 2G: the GSM (Global System for Mobile) network, the GPRS (General Packet Radio Service) network and the EDGE (Enhanced Data for Global Evolution) evolution;- 3G: the UMTS (Universal Mobile Telecommunications System) network and the HSPA (High Speed Packet Access) evolutions:- HSDPA (High Speed Downlink Packet Access),- HSUPA (High Speed Uplink Packet Access),- HSPA+;- 4G: the EPS (Evolved Packet System) network.The telephone service and data transmission are the
Asthana, Deepak; Shukla, Jyoti; Dana, Srikanta; Rani, Varsha; Ajayakumar, M R; Rawat, Kamla; Mandal, Kalyanashis; Yadav, Premlata; Ghosh, Subhasis; Mukhopadhyay, Pritam
An electronically segmented amphiphile was created by conjugating two π-functional units hydroxyquinoline and naphthalenediimide (HQ/NDI) for the first time. The differential electrostatic potential of the π-surfaces, H-bonding units, etc. trigger a manifold response and direct the assembly of a unique collection of seven diverse nano-architectures. Chiral assembly, distinct classes of fibers, 3-D sheets, and metallo-spheres/fibrils with μM levels of Co/Cu/Zn(ii) ions emerged from this new approach of assorted morphosynthesis under ambient conditions. PMID:26194349
Tvedebrink, Tenna Doktor Olsen
This PhD thesis is motived by a personal interest in the theoretical, practical and creative qualities of architecture. But also a wonder and curiosity about the cultural and social relations architecture represents through its occupation with both the sciences and the arts. Inspired by present...... initiatives in Aalborg Hospital to overcome patient undernutrition by refurbishing eating environments, this thesis engages in an investigation of the interior architectural qualities of patient eating environments. The relevance for this holistic perspective, synthesizing health, food and architecture, is...... the current building of a series of Danish ‘super hospitals’ and an increased focus among architectural practices on research-based knowledge produced with the architectural sub-disciplines Healing Architecture and Evidence-Based Design. The problem is that this research does not focus on patient...
Architectural freedom and industrialized architecture. Inge Vestergaard, Associate Professor, Cand. Arch. Aarhus School of Architecture, Denmark Noerreport 20, 8000 Aarhus C Telephone +45 89 36 0000 E-mai l firstname.lastname@example.org Based on the repetitive architecture from the "building boom" 1960...... to 1973 it is discussed how architects can handle these Danish element and montage buildings through the transformation to upgraded aesthetical, functional and energy efficient architecture. The method used is analysis of cases, parallels to literature studies and producer interviews. This analysis...... compares "best practice" in Denmark and "best practice" in Austria. The modern architects accepted the fact that industrialized architecture told the storey of repetition and monotonous as basic condition. This article aims to explain that architecture can be thought as a complex and diverse design through...
Avgeriou, Paris; Stal, Michael; Hilliard, Rich
Software architecture is the foundation of software system development, encompassing a system's architects' and stakeholders' strategic decisions. A special issue of IEEE Software is intended to raise awareness of architecture sustainability issues and increase interest and work in the area. The first Web extra at http://youtu.be/wUGHvocfix0 is an audio interview in which Davide Falessi speaks with guest editors Paris Avgeriou and Rich Hilliard about the importance of architecture sustainabil...
Vogel, Oliver; Chughtai, Arif
As a software architect you work in a wide-ranging and dynamic environment. You have to understand the needs of your customer, design architectures that satisfy both functional and non-functional requirements, and lead development teams in implementing the architecture. And it is an environment that is constantly changing: trends such as cloud computing, service orientation, and model-driven procedures open up new architectural possibilities. This book will help you to develop a holistic architectural awareness and knowledge base that extends beyond concrete methods, techniques, and technologi
Kiib, Hans; Marling, Gitte; Hansen, Peter Mandal
How can architecture promote the enriching experiences of the tolerant, the democratic, and the learning city - a city worth living in, worth supporting and worth investing in? Catalyst Architecture comprises architectural projects, which, by virtue of their location, context and their combination...... of programs, have a role in mediating positive social and/or cultural development. In this sense, we talk about architecture as a catalyst for: sustainable adaptation of the city’s infrastructure appropriate renovation of dilapidated urban districts strengthening of social cohesiveness in the city...
Poletto, Marco; Pasquero, Claudia
This is a manual investigating the subject of urban ecology and systemic development from the perspective of architectural design. It sets out to explore two main goals: to discuss the contemporary relevance of a systemic practice to architectural design, and to share a toolbox of informational...... design protocols developed to describe the city as a territory of self-organization. Collecting together nearly a decade of design experiments by the authors and their practice, ecoLogicStudio, the book discusses key disciplinary definitions such as ecologic urbanism, algorithmic architecture, bottom......-up or tactical design, behavioural space and the boundary of the natural and the artificial realms within the city and architecture. A new kind of "real-time world-city" is illustrated in the form of an operational design manual for the assemblage of proto-architectures, the incubation of proto...
Visnevski, Nikita A.
This paper describes the operational concept of the Embedded Instrumentation Systems Architecture (EISA) that is being developed for Test and Evaluation (T&E) applications. The architecture addresses such future T&E requirements as interoperability, flexibility, and non-intrusiveness. These are the ultimate requirements that support continuous T&E objectives. In this paper, we demonstrate that these objectives can be met by decoupling the Embedded Instrumentation (EI) system into an on-board and an off-board component. An on-board component is responsible for sampling, pre-processing, buffering, and transmitting data to the off-board component. The latter is responsible for aggregating, post-processing, and storing test data as well as providing access to the data via a clearly defined interface including such aspects as security, user authentication and access control. The power of the EISA architecture approach is in its inherent ability to support virtual instrumentation as well as enabling interoperability with such important T&E systems as Integrated Network-Enhanced Telemetry (iNET), Test and Training Enabling Architecture (TENA) and other relevant Department of Defense initiatives.
Karagiannis, Georgios; Heijenk, Geert
This document describes an architecture that is providing Internet access to mobile hosts, by allowing them to access this architecture through various access points and using various wireless technologies. In particular, this deliverable focuses on QoS and mobility between various IP subnetworks that are using different wireless technologies, e.g., UMTS (Universal Mobile Telecommunication Services) and Bluetooth.
Craft, Richard Layne, II
In order for telemedicine to realize the vision of anywhere, anytime access to care, it must address the question of how to create a fully interoperable infrastructure. This paper describes the reasons for pursuing interoperability, outlines operational requirements that any interoperability approach needs to consider, proposes an abstract architecture for meeting these needs, identifies candidate technologies that might be used for rendering this architecture, and suggests a path forward that the telemedicine community might follow.
Toft, Tanya Søndergaard
The article proposes the urban digital gallery as an opportunity to explore the relationship between ‘human’ and ‘technology,’ through the programming of media architecture. It takes a curatorial perspective when proposing an ontological shift from considering media facades as visual spectacles to...... agency and a sense of being by way of dematerializing architecture. This is achieved by way of programming the symbolic to provide new emotional realizations and situations of enlightenment in the public audience. This reflects a greater potential to humanize the digital in media architecture....
The booklet offers an overall introduction to the Institute of Architectural Technology and its projects and activities, and an invitation to the reader to contact the institute or the individual researcher for further information. The research, which takes place at the Institute of Architectural...... Technology at the Roayl Danish Academy of Fine Arts, School of Architecture, reflects a spread between strategic, goal-oriented pilot projects, commissioned by a ministry, a fund or a private company, and on the other hand projects which originate from strong personal interests and enthusiasm of individual...
A global transition towards a new energy architecture is under way, driven by countries' need to respond to the changing dynamics of economic growth, environmental sustainability and energy security. The World Economic Forum, in collaboration with Accenture, has created the New Energy Architecture Initiative to address and accelerate this transition. The Initiative supports the development of national strategies and policy frameworks as countries seek to achieve the combined goals of energy security and access, sustainability, and economic growth and development. The World Economic Forum has formed a partnership with the Ministry of Energy of Myanmar to help apply the Initiative's approach to this developing and resource-rich nation. The Asian Development Bank and the World Economic Forum's Project Adviser, Accenture, have collaborated with the Forum on this consultation process, and have been supported by relevant government, industry and civil society stakeholders. The consultation process aims to understand the nation's current energy architecture challenges and provide an overview of a path to a New Energy Architecture through a series of insights. These insights could form the basis for a long-term multistakeholder roadmap to build Myanmar's energy sector in a way that is secure and sustainable, and promotes economic growth as the country makes its democratic transition. While not all recommendations can be implemented in the near term, they do provide options for creating a prioritized roadmap for Myanmar's energy transition. This report is the culmination of a nine-month multistakeholder process investigating Myanmar's energy architecture. Over the course of many visits to the country, the team has conducted numerous interviews, multistakeholder workshops, and learning and data-gathering exercises to ensure a comprehensive range of information and views. The team has also engaged with a variety of stakeholders to better
Tvedebrink, Tenna Doktor Olsen; Fisker, Anna Marie; Kirkegaard, Poul Henning
German architect Gottfried Semper developed a theory on the “four elements of Architecture” tracing the origin of architecture back to the rise of the early human settlement and the creation of fire. With the notion ‘hearth’ as the first motive in architecture and the definition of three enclosing...... motives; mounding, enclosure and roof, Semper linked the cultural and social values of the primordial fireplace with the order and shape of architecture. He claimed that any building ever made was nothing but a variation of the first primitive shelters erected around the fireplace, and that the three...... enclosing motives existed only as defenders of the “sacred flame”. In that way Semper developed the idea that any architectural scenery can be described, analyzed and explained by understanding the contextual, symbolic and social values of how the four basic motives of hearth, mounding, enclosure, and roof...
In this paper, a six layered architecture for object oriented database from access and management point of view is proposed. This architecture model consist of six layers: Interaction layer, Application layer, Administration layer, Security layer, Paging layer, and Virtual layer.
Shirey, David E.
The following thesis is comprised of a pair of projects focused on the making of architecture through the concept of framing. The work was conducted at the Academia dÃ ÂArchitettura in Mendrisio, Switzerland, under the direction of Peter Zumthor, Miguel Kreisler and Myriam Sterling, emphasizing the relationship between ordered structures and contextual propriety. The making of architecture is inherently most pure when approached as the subtraction of unnecessary elements and a distillation ...
Maurin, Bernard; Motro, René
The basic idea for a textile architecture project originates during early meetings between the architect and the engineer. The morphologic richness of such projects is provided by the varying curvatures of shapes, in contradiction with a classical straight line and orthogonal architecture. However the rules of construction are quite different in terms of realisation and of mechanical behaviour: textile membranes are subjected to a pre-stress conferring them their rigidity, and a major objecti...
Research focuses on the recognition of the disposition of natural environment, which serves as an inspiration for cultural creation as it has always been in the history of architecture. Modern mathematical model of fractal geometry has been used to understand patterns occurring in the surrounding. The comparative analysis has been conducted between the abstract mathematical model and architectural composition in the view of contemporary cognitive paradigms. In conclusion, a hypothesis of a ne...
An information system architecture defines the components of a system and the interfaces among the components. A good architecture is essential for creating an Integrated Advanced Information Management System (IAIMS) that works as an integrated whole yet is flexible enough to accommodate many users and roles, multiple applications, changing vendors, evolving user needs, and advancing technology. Modularity and layering promote flexibility by reducing the complexity of...
Memory limitations are always a focus of computer architecture. The live range aware cache(LIRAC) offers a way to reduce memory access using live range information. In the LIRAC system, scratch data need not be written back if the data will no longer be used. Three kinds of software support developed for LIRAC architecture use compiler analyses, binary analyses, and trace analyses. Trace analysis results show that LIRAC can eliminate 29% of cache write-backs on average and up to 83% in the best case for the SPEC CPU 2000 benchmark. These software techniques can show the feasibility and potential benefit of the LIRAC architecture.
Around 2005 it became apparent in the geometry processing community that freeform architecture contains many problems of a geometric nature to be solved, and many opportunities for optimization which however require geometric understanding. This area of research, which has been called architectural geometry, meanwhile contains a great wealth of individual contributions which are relevant in various fields. For mathematicians, the relation to discrete differential geometry is significant, in particular the integrable system viewpoint. Besides, new application contexts have become available for quite some old-established concepts. Regarding graphics and geometry processing, architectural geometry yields interesting new questions but also new objects, e.g. replacing meshes by other combinatorial arrangements. Numerical optimization plays a major role but in itself would be powerless without geometric understanding. Summing up, architectural geometry has become a rewarding field of study. We here survey the main directions which have been pursued, we show real projects where geometric considerations have played a role, and we outline open problems which we think are significant for the future development of both theory and practice of architectural geometry.
Architecture and anthropology have always had a common focus on dwelling, housing, urban life and spatial organisation. Current developments in both disciplines make it even more relevant to explore their boundaries and overlaps. Architects are inspired by anthropological insights and methods......, while recent material and spatial turns in anthropology have also brought an increasing interest in design, architecture and the built environment. Understanding the relationship between the social and the physical is at the heart of both disciplines, and they can obviously benefit from further...... collaboration: How can qualitative anthropological approaches contribute to contemporary architecture? And just as importantly: What can anthropologists learn from architects’ understanding of spatial and material surroundings? Recent theoretical developments in anthropology stress the role of materials and...
In this essay, I focus on the combination of programs and the architecture of cultural projects that have emerged within the last few years. These projects are characterized as “hybrid cultural projects,” because they intend to combine experience with entertainment, play, and learning. This essay...... identifies new rationales related to this development, and it argues that “cultural planning” has increasingly shifted its focus from a cultural institutional approach to a more market-oriented strategy that integrates art and business. The role of architecture has changed, too. It not only provides a...... functional framework for these concepts, but tries increasingly to endow the main idea of the cultural project with a spatially aesthetic expression - a shift towards “experience architecture.” A great number of these projects typically recycle and reinterpret narratives related to historical buildings and...
Petersen, Rikke Premer
engineering is addresses from two perspectives – as an educational response and an occupational constellation. Architecture and engineering are two of the traditional design professions and they frequently meet in the occupational setting, but at educational institutions they remain largely estranged. The...... paper builds on a multi-sited study of an architectural engineering program at the Technical University of Denmark and an architectural engineering team within an international engineering consultancy based on Denmark. They are both responding to new tendencies within the building industry where the...... role of engineers and architects increasingly overlap during the design process, but their approaches reflect different perceptions of the consequences. The paper discusses some of the challenges that design education, not only within engineering, is facing today: young designers must be equipped with...
Tvedebrink, Tenna Doktor Olsen
initiatives in Aalborg Hospital to overcome patient undernutrition by refurbishing eating environments, this thesis engages in an investigation of the interior architectural qualities of patient eating environments. The relevance for this holistic perspective, synthesizing health, food and architecture...... environments and a knowledge gap therefore exists in present hospital designs. Consequently, the purpose of this thesis has been to investigate if any research-based knowledge exist supporting the hypothesis that the interior architectural qualities of eating environments influence patient food intake, health...... such as a literature review, timeline and historical outline to create a “knowledge map”, which in an eclectic manner merges the positive, normative and polemical knowledge rooted in research, objects and writings. The results of these investigations show that sparse researchbased knowledge exist directly taking...
John, Wolfgang; Devlic, Alisa; Ding, Zhemin; Jocha, David; Kern, Andras; Kind, Mario; Köpsel, Andreas; Nordell, Viktor; Sharma, Sachin; Sköldström, Pontus; Staessens, Dimitri; Takacs, Attila; Topp, Steffen; Westphal, F. -Joachim; Woesner, Hagen
This report defines a carrier-grade split architecture based on requirements identified during the SPARC project. It presents the SplitArchitecture proposal, the SPARC concept for Software Defined Networking (SDN) introduced for large-scale wide area networks such as access/aggregation networks, and evaluates technical issues against architectural trade-offs. First we present the control and management architecture of the proposed SplitArchitecture. Here, we discuss a recursive control archit...
and other spaces that architects are preoccupied with. On the other hand, the distinction between architecture and design is not merely one of scale. Design and architecture represent – at least in Denmark – also quite different disciplinary traditions and methods. Where designers develop prototypes......, architects tend to work with models and plans that are not easily understood by lay people. Further, many architects are themselves sceptical towards notions of user-involvement and collaborative design. They fear that the imagination of citizens and users is restricted to what they are already familiar with...
I would like to thank Prof. Stephen Read (2011) and Prof. Andrew Benjamin (2011) for both giving inspiring and elaborate comments on my article “Dwelling in-between walls: the architectural surround”. As I will try to demonstrate below, their two different responses not only supplement my article...... focuses on how the absence of an initial distinction might threaten the endeavour of my paper. In my reply to Read and Benjamin, I will discuss their suggestions and arguments, while at the same time hopefully clarifying the postphenomenological approach to architecture....
Multithreaded architectures now appear across the entire range of computing devices, from the highest-performing general purpose devices to low-end embedded processors. Multithreading enables a processor core to more effectively utilize its computational resources, as a stall in one thread need not cause execution resources to be idle. This enables the computer architect to maximize performance within area constraints, power constraints, or energy constraints. However, the architectural options for the processor designer or architect looking to implement multithreading are quite extensive and
The paper investigates the topic of green architecture from an architectural point of view and not an energy point of view. The purpose of the paper is to establish a debate about the architectural language and spatial characteristics of green architecture. In this light, green becomes an adjective...... that describes the architectural exclusivity of this particular architecture genre. The adjective green expresses architectural qualities differentiating green architecture from none-green architecture. Currently, adding trees and vegetation to the building’s facade is the main architectural characteristics...... of green architecture. The paper argues that this greenification of facades is insufficient. The green is only a skin cladding the exterior envelope without having a spatial significance. Through the paper it is proposed to flip the order of words from green architecture to architectural green...
In the domain of architecture, a huge amount of digital contents useful to academic and professional users is available online and in principle accessible from all over the world. However, because they reside in many different and unconnected systems, these contents are often hard to find with traditional search engines. MACE (Metadata for Architectural Contents in Europe) is a European eContentplus project  to connect architectural repositories and archives, providing a framework for ...
The main religions of ancient China were Buddhism，Taoism and Islam, of which Buddhism was the most widespread. As a result, Buddhist temples and towers are found all over China, and have become important components of the country's ancient architecture.
Full Text Available The old Greek word "kosmos" means not only "cosmos", but also "the beautiful order", "the way of building", "building", "scenography", "mankind", and, in the time of the New Testament, also "pagans". The word "arhitekton", meaning first the "master of theatrical scenography", acquired the meaning of "builder", when the words "kosmos" and ~kosmetes" became pejorative. The fear that architecture was not considered one of the arts before Renaissance, since none of the Muses supervised the art of building, results from the misunderstanding of the word "kosmos". Urania was the Goddes of the activity implied in the verb "kosmein", meaning "to put in the beautiful order" - everything, from the universe to the man-made space, i. e. the architecture.
Svenningsen Kajita, Heidi
Om MUF architecture samt interview med Liza Fior og Katherine Clarke, partnere i muf architecture/art......Om MUF architecture samt interview med Liza Fior og Katherine Clarke, partnere i muf architecture/art...
Ulrich Fuller, Laurie
A friendly, step-by-step guide to the Microsoft Office database application Access may be the least understood and most challenging application in the Microsoft Office suite. This guide is designed to help anyone who lacks experience in creating and managing a database learn to use Access 2010 quickly and easily. In the classic For Dummies tradition, the book provides an education in Access, the interface, and the architecture of a database. It explains the process of building a database, linking information, sharing data, generating reports, and much more.As the Micr
Ahmed, Zaki; Sotudeh, Reza; Hussain, Dil Muhammad Akbar;
In a continuing effort to improve computer system performance, Processor-In-Memory (PIM) architecture has emerged as an alternative solution. PIM architecture incorporates computational units and control logic directly on the memory to provide immediate access to the data. To exploit the potentia...... methods to ensure a speedup assessment obtained against base-line architecture....
Herssens, Jasmien; Heylighen, Ann
Universal Design is a recent design paradigm which aims at handicap elimination in the physical environment and strives for a more humanized architecture. After pointing out the value of Universal Design, the paper advances human centred design as a possible methodology to make this paradigm operational. Key to this methodology is the explicit attention for cognitive human factors in experiencing space and—the focus of this paper—for the role played by the sense of tou...
Ingstrup, Mads; Hansen, Klaus Marius
Recent research shows runtime architectural reflection is instrumental in, for instance, building adaptive and flexible systems or checking correspondence between design and implementation. Moreover, experience with computational reflection in various branches of computer science shows that the...... interface through which the meta-information of the running system is accessed, and possibly modified, lies at the heart of designing reflective systems. This paper proposes that such an interface should be like a database: accessed through queries expressed using the concepts with which architecture is...... described. Specifically, our contributions are: (1) a presentation of the general idea of a query-based approach to architectural reflection, (2) a definition of an Architectural Query Language (AQL) in which perspectives on an architectural model can be expressed as queries, (3) a prototype of a system...
Heimdal, Elisabeth Jacobsen
Textiles can be used as building skins, adding new aesthetic and functional qualities to architecture. Just like we as humans can put on a coat, buildings can also get dressed. Depending on our mood, or on the weather, we can change coat, and so can the building. But the idea of using textiles...... to create human habitation is not new. As Diether S. Hope phrases it, referring to tents: The history of development of humanity would be barely conceivable without free spanning textile membrane structures....
Venkatramani, Chitra; Kienzle, Martin G.
Video is inherently frame-oriented and most applications such as commercial video processing require to manipulate video in terms of frames. However, typical video servers treat videos as byte streams and perform random access based on approximate byte offsets to be supplied by the client. They do not provide frame or timecode oriented API which is essential for many applications. This paper describes a frame-oriented architecture for video servers. It also describes the implementation in the context of IBM's VideoCharger server. The later part of the paper describes an application that uses the frame architecture and provides fast and slow-motion scanning capabilities to the server.
Coathup, Larry; Goddard, G. W.; McEachern, James; Bears, James
This paper presents a technology and architecture perspective of the cost of evolving today's copper access network, optimized for POTS, to a fiber access network providing both narrowband and broadband services. Architectures are assessed using application studies based on cost models for actual routes in North America. This study identifies three architectures as serious candidates (i.e., close to copper in cost) for providing POTS service in 1992: the double star, the active pedestal and the star-bus.
Full Text Available Cloud computing is set of resources and services offered through the Internet. Cloud services are delivered from data centers located throughout the world. Cloud computing facilitates its consumers by providing virtual resources via internet. The biggest challenge in cloud computing is the security and privacy problems caused by its multi-tenancy nature and the outsourcing of infrastructure, sensitive data and critical applications. Enterprises are rapidly adopting cloud services for their businesses, measures need to be developed so that organizations can be assured of security in their businesses and can choose a suitable vendor for their computing needs. Cloud computing depends on the internet as a medium for users to access the required services at any time on pay-per-use pattern. However this technology is still in its initial stages of development, as it suffers from threats and vulnerabilities that prevent the users from trusting it. Various malicious activitiesfrom illegal users have threatened this technology such as data misuse, inflexible access control and limited monitoring. The occurrence of these threats may result into damaging or illegal access of critical and confidential data of users. In this paper we identify the most vulnerable security threats/attacks in cloud computing, which will enable both end users and vendors to know a bout the k ey security threats associated with cloud computing and propose relevant solution directives to strengthen security in the Cloud environment. We also propose secure cloud architecture for organizations to strengthen the security.
Acessibilidade em ambiente universitário: identificação de barreiras arquitetônicas no campus da USP de Bauru Accessibility in the university environment: identification of architectural barriers in the USP campus of Bauru
Dionísia Aparecida Cusin Lamônica
with others. This study's aims were to identify, describe and map the physical barriers at the Campus of Bauru of the University of São Paulo and to introduce interventions undertaken from October 2001 to December 2005. This was a quantitative descriptive study, in which data was collected on the architectural conditions analysis of the three units that make up this campus. The norms established by the Associação Brasileira de Normas Técnicas (ABNT were used as bases for accomplishing the interventions. Results: 72 locations were identified as having curb cut problems, 21 points of access were found to have interruptions and grade changes that required ramps; 220m² of stairs/ramps had no handrails; 658m² of stairs/ramps had handrails that were not in accord with requirements; 3 ramps had inclinations higher than stipulated by requirements of the ABNT; 10 bathrooms were partially adapted for people with disabilities; 2 parking spaces were partially adapted and there were only 2 elevators. Curb cuts were installed at 19 points, adding 115 m² with tactile lines painted on the pavement; 8 ramps were installed; 14 handrails and guardrails were installed along external stairs and ramps, 5 reserved parking places were designated and marked; 2 central phones for deaf people were installed and 3 wheelchairs were acquired. The various interventions contributed to improve accessibility for people with disabilities on campus facilitating the use of existing resources of public space.
Full Text Available The ability to manipulate the local molecular environment is crucial to access fundamentally new classes of organic functional materials with unprecedented properties and performance. Despite the progress of the last ten years in the area of organic semiconductors for electronics and optoelectronics, much remains to be done to achieve control at the nanoscale of the local environment of the functional molecules, both regarding interaction with other molecular units or species and with the electrodes or other inorganic components of the ‘device’.
Starting from the illustration of the definition and concept of the architectural theory, the author established his unique understanding about the framework of the architectural theory and the innovation of the architectural theory underlined by Chinese characteristics.
Thon That, Minh Tu; Sadou, Salah; Oquendo, F.; Fleurquin, R
International audience Architectural decisions have emerged as a means to maintain the quality of the architecture during its evolution. One of the most important de-cisions made by architects are those about the design approach such as the use of patterns or styles in the architecture. The structural nature of this type of decisions give them the potential to be controlled systematically. In the litera-ture, there are some works on the automation of architectural decision violation checki...
Mårtensson, Frans; Jönsson, Per
A software architecture is one of the first steps towards a software system. A software architecture can be designed in different ways. During the design phase, it is important to select the most suitable design of the architecture, in order to create a good foundation for the system. The selection process is performed by evaluating architecture alternatives against each other. We investigate the use of continuous simulation of a software architecture as a support tool for architecture evalua...
National Aeronautics and Space Administration — Innovative network architecture, protocols, and algorithms are proposed for both lunar surface networks and orbit access networks. Firstly, an overlaying...
Hansen, Klaus Marius; Christensen, Michael; Sandvad, Elmer;
sessions with users, - evolve over a long period of time to contain more functionality - allow for 6-7 developers working intensively in parallel. Explicit focus on the software architecture and letting the architecture evolve with the prototype played a major role in resolving these conflicting...... constraints. Specifically allowing explicit restructuring phases when the architecture became problematic showed to be crucial. ...
Oussalah, Mourad Chabanne
Over the past 20 years, software architectures have significantly contributed to the development of complex and distributed systems. Nowadays, it is recognized that one of the critical problems in the design and development of any complex software system is its architecture, i.e. the organization of its architectural elements. Software Architecture presents the software architecture paradigms based on objects, components, services and models, as well as the various architectural techniques and methods, the analysis of architectural qualities, models of representation of architectural templa
STATE OF ARCHITECTUREArchitectural ChaosRelation of Technology and Architecture The Many Faces of Architecture The Scope of Enterprise Architecture The Need for Enterprise ArchitectureThe History of Architecture The Current Environment Standardization Barriers The Need for Lightweight Architecture in the EnterpriseThe Cost of TechnologyThe Benefits of Enterprise Architecture The Domains of Architecture The Gap between Business and ITWhere Does LEA Fit? LEA's FrameworkFrameworks, Methodologies, and Approaches The Framework of LEATypes of Methodologies Types of ApproachesActual System Environmen
Oussalah , Mourad Chabane
Over the past 20 years, software architectures have significantly contributed to the development of complex and distributed systems. Nowadays, it is recognized that one of the critical problems in the design and development of any complex software system is its architecture, i.e. the organization of its architectural elements. Software Architecture presents the software architecture paradigms based on objects, components, services and models, as well as the various architectural techniques and methods, the analysis of architectural qualities, models of representation of architectural template
Andersen, Mads Schaarup
Integrating Commercial Off-The-Shelf products in a company's software product portfolio offers business value, but introduces challenges from a software architecture perspective. In this paper, the research challenges in relation to identity management in the Danish municipality administration...... system called Opus, are outlined. Opus BRS is the identity management part of Opus. Opus integrates SAP, legacy mainframe systems, and other third party systems of the individual municipality. Each of these systems define their own software architecture and access control model, leading to architectural...
Bayer, J.; Flege, O.; Gacek, C.
The creation and validation of product line software architectures are inherently more complex than those of software architectures for single systems. This paper compares a process for creating and evaluating a traditional, one-of-a- kind software architecture with one for a reference software architecture. The comparison is done in the context of PuLSE-DSSA, a customizable process that integrates both product line architecture creation and evaluation.
The Service oriented perspective is emerging as an important view both for business architecture and IT architecture in the overall context of enterprise architectures. Many existing enterprise architecture frameworks like DODAF, MODAF and NAF have lately been extended with service-oriented views. The UPDM UML Profile and Metamodel for DODAF and MODAF has thus included various service-oriented views. This thesis proposes a new enterprise architecture framework ESA Enterprise Service Arch...
... Information Technology Accessibility Standards (standards) were issued in December 2000, 65 FR 80500 (December... Accessibility Guidelines; Electronic and Information Technology Accessibility Standards AGENCY: Architectural... electronic and information technology, which apply to federal agencies, and its guidelines...
... information technology covered by Section 508 of the Rehabilitation Act Amendments of 1998. 76 FR 76640... Accessibility Guidelines; Electronic and Information Technology Accessibility Standards AGENCY: Architectural... Guidelines and its Electronic and Information Technology Accessibility Standards. DATES: The hearings will...
... of accessibility criteria for information and communication technologies covered by the... Accessibility Guidelines; Electronic and Information Technology Accessibility Standards AGENCY: Architectural... and information technology covered by section 508 of the Rehabilitation Act Amendments of 1998 and...
Thomas, Charles R.
Colleges and universities are initiating data warehouse projects to provide integrated information for planning and reporting purposes. A survey of 40 institutions with active data warehouse projects reveals the kinds of tools, contents, data cycles, and access currently used. Essential elements of an integrated information architecture are…
Ismail, Anis; Ismail, Ziad
We present new system architecture, a distributed framework designed to support pervasive computing applications. We propose a new architecture consisting of a search engine and peripheral clients that addresses issues in scalability, data sharing, data transformation and inherent platform heterogeneity. Key features of our application are a type-aware data transport that is capable of extract data, and present data through handheld devices (PDA (personal digital assistant), mobiles, etc). Pervasive computing uses web technology, portable devices, wireless communications and nomadic or ubiquitous computing systems. The web and the simple standard HTTP protocol that it is based on, facilitate this kind of ubiquitous access. This can be implemented on a variety of devices - PDAs, laptops, information appliances such as digital cameras and printers. Mobile users get transparent access to resources outside their current environment. We discuss our system's architecture and its implementation. Through experimental...
katalog til udstillingen 'Rhein - Ruhr architecture' Meldahls smedie, 15. marts - 28. april 2002. 99 sider......katalog til udstillingen 'Rhein - Ruhr architecture' Meldahls smedie, 15. marts - 28. april 2002. 99 sider...
Hennessy, John L
The computing world today is in the middle of a revolution: mobile clients and cloud computing have emerged as the dominant paradigms driving programming and hardware innovation today. The Fifth Edition of Computer Architecture focuses on this dramatic shift, exploring the ways in which software and technology in the cloud are accessed by cell phones, tablets, laptops, and other mobile computing devices. Each chapter includes two real-world examples, one mobile and one datacenter, to illustrate this revolutionary change.Updated to cover the mobile computing revolutionEmphasizes the two most im
Coch Roura, Helena
Any analysis of the role played by energy in architecture is faced with serious limitations due to the lack of studies in the architectural bibliography, especially studies of popular architecture. An awareness of these limitations will allow us to understand better why architects have paid little attention to the interaction of form and energy, and to the bioclimatic approach in contemporary architecture in general. The first limitation stems from the very essence of bioclimatic analysis; en...
Niemann, Hans Henrik; Poulsen, Niels Kjølstad
This paper investigate different controller architectures in connection with controller switching. The controller switching is derived by using the Youla-Jabr-Bongiorno-Kucera (YJBK) parameterization. A number of different architectures for the implementation of the YJBK parameterization are...... described and applied in connection with controller switching. An architecture that does not include inversion of the coprime factors is introduced. This architecture will make controller switching particular simple....
Chadwick, Heather Riley
Virginia Tech's School of Architecture + Design, in the College of Architecture and Urban Studies, with the initiative of Markus Breitschmid, assistant professor of architecture, has established Virginia Tech Architecture Publications.
WGSN reports from the Architectural Knitted Surfaces workshop recently held at ShenkarCollege of Engineering and Design, Tel Aviv, which offered a cutting-edge insight into interactive knitted surfaces. With the increasing role of smart textiles in architecture, the Architectural Knitted Surfaces...
Vang, Leng [Idaho National Lab. (INL), Idaho Falls, ID (United States); Prescott, Steven R [Idaho National Lab. (INL), Idaho Falls, ID (United States); Smith, Curtis [Idaho National Lab. (INL), Idaho Falls, ID (United States)
In collaborating scientific research arena it is important to have an environment where analysts have access to a shared of information documents, software tools and be able to accurately maintain and track historical changes in models. A new cloud-based environment would be accessible remotely from anywhere regardless of computing platforms given that the platform has available of Internet access and proper browser capabilities. Information stored at this environment would be restricted based on user assigned credentials. This report reviews development of a Cloud-based Architecture Capabilities (CAC) as a web portal for PRA tools.
Braae, Ellen Marie
A reflection on the relation between Danish landscape architecture policy and the statements made through current landscape architectural project.......A reflection on the relation between Danish landscape architecture policy and the statements made through current landscape architectural project....
Walton, Joan; Filman, Robert E.; Korsmeyer, David J.; Lee, Diana D.; Mak, Ron; Patel, Tarang
DARWIN is a NASA developed, Internet-based system for enabling aerospace researchers to securely and remotely access and collaborate on the analysis of aerospace vehicle design data, primarily the results of wind-tunnel testing and numeric (e.g., computational fluid-dynamics) model executions. DARWIN captures, stores and indexes data; manages derived knowledge (such as visualizations across multiple datasets); and provides an environment for designers to collaborate in the analysis of test results. DARWIN is an interesting application because it supports high-volumes of data. integrates multiple modalities of data display (e.g., images and data visualizations), and provides non-trivial access control mechanisms. DARWIN enables collaboration by allowing not only sharing visualizations of data, but also commentary about and views of data. Here we provide an overview of the architecture of D3, the third generation of DARWIN. Earlier versions of DARWIN were characterized by browser-based interfaces and a hodge-podge of server technologies: CGI scripts, applets, PERL, and so forth. But browsers proved difficult to control, and a proliferation of computational mechanisms proved inefficient and difficult to maintain. D3 substitutes a pure-Java approach for that medley: A Java client communicates (though RMI over HTTPS) with a Java-based application server. Code on the server accesses information from JDBC databases, distributed LDAP security services, and a collaborative information system. D3 is a three tier-architecture, but unlike 'E-commerce' applications, the data usage pattern suggests different strategies than traditional Enterprise Java Beans - we need to move volumes of related data together, considerable processing happens on the client, and the 'business logic' on the server-side is primarily data integration and collaboration. With D3, we are extending DARWIN to handle other data domains and to be a distributed system, where a single login allows a user
Barais, Olivier; Le Meur, Anne-Francoise; Duchien, Laurence;
Software architectures must frequently evolve to cope with changing requirements, and this evolution often implies integrating new concerns. Unfortunately, when the new concerns are crosscutting, existing architecture description languages provide little or no support for this kind of evolution....... The software architect must modify multiple elements of the architecture manually, which risks introducing inconsistencies. This chapter provides an overview, comparison and detailed treatment of the various state-of-the-art approaches to describing and evolving software architectures. Furthermore, we...... discuss one particular framework named Tran SAT, which addresses the above problems of software architecture evolution. Tran SAT provides a new element in the software architecture descriptions language, called an architectural aspect, for describing new concerns and their integration into an existing...
Silvana Aparecida de Souza
Full Text Available It is a conceptual and theoretical research on school organization and its democratization, focusing on one aspect of an objective nature: its architecture. The study was based on the academic literature on democratization and theoretical contribution of Michel Foucault, with regard to the analysis of space as a resourcecontrol, surveillance and training, going through a historical review of the modelconstruction of school buildings in Brazil. It is therefore a sociological analysis of the school environment, in relation to the democratization process of basic education, understood as ensuring that the conditions of access and permanence to a universalquality education, and conceived and gestated from collective interests of its users.We conclude that the architecture of public schools in Brazil do not provides democratic management, either by format controller of buildings constructed in the republican period, either by the current economic priority for the construction of public school buildings, which includes little or no space for collective activities. The character of the buildings remains controller, no more for its architecture, but made possible by technological development, which allows monitoring by video cameras, which is made with the permission and support of community.
To develop the communication network architecture of safety system of SMART, the evaluation elements for reliability and performance factors are extracted from commercial networks and classified the required-level by importance. A predictable determinacy, status and fixed based architecture, separation and isolation from other systems, high reliability, verification and validation are introduced as the essential requirements of safety system communication network. Based on the suggested requirements, optical cable, star topology, synchronous transmission, point-to-point physical link, connection-oriented logical link, MAC (medium access control) with fixed allocation are selected as the design elements. The proposed architecture will be applied as basic communication network architecture of SMART safety system
Lazaro, J.A; Polo, V.; Schrenk, B.;
Recent optical technologies are providing higher flexibility to next generation access networks: on the one hand, providing progressive FTTx and specifically FTTH deployment, progressively shortening the copper access network; on the other hand, also opening fixed-mobile convergence solutions...... in next generation PON architectures. It is provided an overview of the optical subsystems developed for the implementation of the proposed NG-Access Networks....
Keskinarkaus, Anja; Ohtonen, Timo; Sauvola, Jaakko J.
This paper presents a new architecture and techniques for media-based telephony over wireless/wireline IP networks, called `Beethoven'. The platform supports complex media transport and mobile conferencing for multi-user environments having a non-uniform access. New techniques are presented to provide advanced multimedia call management over different media types and their presentation. The routing and distribution of the media is rendered over the standards based protocol. Our approach offers a generic, distributed and object-oriented solution having interfaces, where signal processing and unified messaging algorithms are embedded as instances of core classes. The platform services are divided into `basic communication', `conferencing' and `media session'. The basic communication form platform core services and supports access from scalable user interface to network end-points. Conferencing services take care of media filter adaptation, conversion, error resiliency, multi-party connection and event signaling, while the media session services offer resources for application-level communication between the terminals. The platform allows flexible attachment of any number of plug-in modules, and thus we use it as a test bench for multiparty/multi-point conferencing and as an evaluation bench for signal coding algorithms. In tests, our architecture showed the ability to easily be scaled from simple voice terminal to complex multi-user conference sharing virtual data.
Dorch, Bertil Fabricius; Demaio, Alessandro; Hersch, Fred
This week, we celebrate open access week – an event aimed at bringing attention to this rapidly emerging form of scientific publication and its ethical imperatives. Traditionally, knowledge breakthroughs and scientific discoveries are shared through publication in academic journals. Peer...... ideas, break down barriers to science and make knowledge accessible to the masses – but this is not actually the case....
The Internet lets us share perfect copies of our work with a worldwide audience at virtually no cost. We take advantage of this revolutionary opportunity when we make our work "open access": digital, online, free of charge, and free of most copyright and licensing restrictions. Open access is made possible by the Internet and copyright-holder…
future. But this is not enough. The agenda is to develop architectural spaces, where social interaction and learning are enhanced by art and fun. How can we develop new architectural designs in our inner cities and waterfronts where eventscapes, learning labs and temporal use are merged with everyday......Architecture and Art as Fuel New development zones for shopping and entertainment and space for festivals inside the city CAN be coupled with art and architecture and become ‘open minded' public domains based on cultural exchange and mutual learning. This type of space could be labelled as...... "experiencescape" - a space between tourism, culture, learning and economy. Strategies related to these challenges involve new architectural concepts and art as ‘engines' for a change. New expressive architecture and old industrial buildings are often combined into hybrid narratives, linking the past with the...
Gomez-Guillamon, Maria; Eskemose Andersen, Jørgen; Contreras, Jorge Lobos;
Introduced by scientific articles conserning architecture and human rights in light of cultures, emergencies, social equality and sustainability, democracy, economy, artistic development and science into architecture. Concluding in definition of needs for new roles, processes and education of...... architecture. Followed by articles focusing on interdisciplinary research and design of emergency shelters as well as educational environments. Finally concretized in 35 studies from international workshops arranged globally on and by different architect schools: Royal Danish Academy of Fine Arts in Denmark...
What keeps places unique in times of globalization? If information, goods, food, architecture are the same everywhere, what`s the difference between places? What are people identifying with? Eating habits are a main factor of cultural identification. How can architecture contribute to these feelings of belonging, self awareness and joy? How can it teach something about the place and the people living there? What if a new kind of culinary architecture can help opening people`s e...
Alami, Rachid; Chatila, Raja; Fleury, Sara; Ghallab, Malik; Ingrand, Félix
International audience An autonomous robot offers a challenging and ideal field for the study of intelligent architectures. Autonomy within a rational behavior could be evaluated by the robot's effectiveness and robustness in carrying out tasks in different and ill-known environments_ It raises major requirements on the control architecture. Furthermore, a robot as a programmable machine brings up other architectural needs, such as the ease and quality of its speci_cation and programming. ...
Ann Heylighen; Jasmien Herssens; Hubert Froyen
The paper reports on a recent Belgian initiative targeting architectural practice through the professional press. Architecture critics were invited to revisit an exemplary public building while being blindfolded and guided by persons who are visually impaired. Afterwards, they were asked to report on this visit in an article for an architectural magazine. The initiative aimed at drawing the attention of the critics—and, by extension, the readers of their articles—to the need for accessibil...
Full Text Available Recently Low power consumption and Custom Memory design is major issue for embedded designer. Micro wind and Xilinx simulator implements SRAM design architecture and performs efficient simulation. These simulators implements high performances and low power consumption of SRAM design. SRAM efficiency analyzed with 6-T architecture design and row/column based architectural design. We have analyzed clock implemented memory design and simulated with specific application. We have implemented clock based SRAM architecture that improves the internal clock efficiency of SRAM. Architectural Clock implemented memory design reduces the propagation delay and access time. Internal semiconductor material design implemented technique also improves the SRAM data transitions scheme. Semiconductor material and clock implemented design improve simulation performance of SRAM and these design implements for recently developed Application Specific Memory Design Architecture and mobile devices.
Network systems require technical skills in computer architecture, design methodologies, algorithm design, and networking. Architecture of Network Systems explains the practice and methodologies that will allow you to solve a broad range of problems in system design, including problems related to security, quality of service, performance, manageability, and more. Leading researchers Dimitrios Serpanos and Tilman Wolf develop architectures for all network sub-systems, bridging the gap between operation and VLSI. Discussing the major challenges in the design of networks and the architectures tha
Hausman, Kalani Kirk
A solid introduction to the practices, plans, and skills required for developing a smart system architecture. Information architecture combines IT skills with business skills in order to align the IT structure of an organization with the mission, goals, and objectives of its business. This friendly introduction to IT architecture walks you through the myriad issues and complex decisions that many organizations face when setting up IT systems to work in sync with business procedures. Veteran IT professional and author Kirk Hausman explains the business value behind IT architecture and provides
Taft, Jeffrey D. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)
The report describes work done on Grid Architecture under the auspices of the Department of Electricity Office of Electricity Delivery and Reliability in 2015. As described in the first Grid Architecture report, the primary purpose of this work is to provide stakeholder insight about grid issues so as to enable superior decision making on their part. Doing this requires the creation of various work products, including oft-times complex diagrams, analyses, and explanations. This report provides architectural insights into several important grid topics and also describes work done to advance the science of Grid Architecture as well.
... TRANSPORTATION BARRIERS COMPLIANCE BOARD Accessibility Guidelines for Shared Use Paths AGENCY: Architectural and... plans to develop new accessibility guidelines specific to shared use paths (SUPs) designed for use by... in establishing accessibility guidelines for shared use paths. DATES: The information meeting will...
Niemann, Hans Henrik; Stoustrup, Jakob
. Proceedings of the 1999 Issue Date : 1999 Volume : 6 On page(s): 4029 - 4033 vol.6 Location: San Diego, CA Meeting Date : 02 Jun 1999-04 Jun 1999 Print ISBN: 0-7803-4990-3 References Cited: 7 INSPEC Accession Number: 6403075 Digital Object Identifier : 10.1109/ACC.1999.786292 Date of Current Version : 06...... shown how it is possible to change from one multivariable controller to another multivariable controller online in a smooth way with guarantee for closed loop stability. This includes also the case where the controllers are unstable. Gain scheduled controllers can be implemented in this architecture....... The general architecture for smooth online changes of multivariable controllers can also handle the start up and close down of multivariable systems. Furthermore, the start up of unstable multivariable controllers can also be handled in this architecture. Finally, implementation of (unstable...
Full Text Available The shift from mechanical to digital forces architects to reposition themselves: Architects generate digital information, which can be used not only in designing and fabricating building components but also in embedding behaviours into buildings. This implies that, similar to the way that industrial design and fabrication with its concepts of standardisation and serial production influenced modernist architecture, digital design and fabrication influences contemporary architecture. While standardisation focused on processes of rationalisation of form, mass-customisation as a new paradigm that replaces mass-production, addresses non-standard, complex, and flexible designs. Furthermore, knowledge about the designed object can be encoded in digital data pertaining not just to the geometry of a design but also to its physical or other behaviours within an environment. Digitally-driven architecture implies, therefore, not only digitally-designed and fabricated architecture, it also implies architecture – built form – that can be controlled, actuated, and animated by digital means. In this context, this sixth Footprint issue examines the influence of digital means as pragmatic and conceptual instruments for actuating architecture. The focus is not so much on computer-based systems for the development of architectural designs, but on architecture incorporating digital control, sensing, actuating, or other mechanisms that enable buildings to interact with their users and surroundings in real time in the real world through physical or sensory change and variation.
Full Text Available The shift from mechanical to digital forces architects to reposition themselves: Architects generate digital information, which can be used not only in designing and fabricating building components but also in embedding behaviours into buildings. This implies that, similar to the way that industrial design and fabrication with its concepts of standardisation and serial production influenced modernist architecture, digital design and fabrication influences contemporary architecture. While standardisation focused on processes of rationalisation of form, mass-customisation as a new paradigm that replaces mass-production, addresses non-standard, complex, and flexible designs. Furthermore, knowledge about the designed object can be encoded in digital data pertaining not just to the geometry of a design but also to its physical or other behaviours within an environment. Digitally-driven architecture implies, therefore, not only digitally-designed and fabricated architecture, it also implies architecture – built form – that can be controlled, actuated, and animated by digital means.In this context, this sixth Footprint issue examines the influence of digital means as pragmatic and conceptual instruments for actuating architecture. The focus is not so much on computer-based systems for the development of architectural designs, but on architecture incorporating digital control, sensing, actuating, or other mechanisms that enable buildings to interact with their users and surroundings in real time in the real world through physical or sensory change and variation.
The Clinical Document Architecture (CDA), a standard developed by the Health Level Seven organisation (HL7), is an ANSI approved document architecture for exchange of clinical information using XML. A CDA document is comprised of a header with associated vocabularies and a body containing the structural clinical information. PMID:15061557
Barnes, Jeffrey M.
Many software systems eventually undergo changes to their basic architectural structure. Such changes may be prompted by new feature requests, new quality attribute requirements, changing technology, or other reasons. Whatever the causes, architecture evolution is commonplace in real-world software projects. Today's software architects, however,…
This text explores the concept of media architecture as a phenomenon of visual culture that describes the use of screen-technology in new spatial configurations in practices of architecture and art. I shall argue that this phenomenon is not necessarily a revolutionary new approach, but rather...
Moshofsky, R.P.; Rohen, W.T. [Boeing Computer Services Co., Richland, WA (United States)
This document presents an architectural standard for application of workflow automation technology. The standard includes a functional architecture, process for developing an automated workflow system for a work group, functional and collateral specifications for workflow automation, and results of a proof of concept prototype.
Jørn Utzon´s museum design for Asger Jorn´s collection in Silkeborg contextualized in the postwar context of an organic architecture.......Jørn Utzon´s museum design for Asger Jorn´s collection in Silkeborg contextualized in the postwar context of an organic architecture....
Marsh, Rob; Lauring, Michael
Traditional low-energy architecture has not necessarily led to reduced energy consumption. A paradigm shift is proposed promoting pluralistic energy-saving strategies.......Traditional low-energy architecture has not necessarily led to reduced energy consumption. A paradigm shift is proposed promoting pluralistic energy-saving strategies....
Zdun, Uwe; Avgeriou, Paris
Architectural patterns are a fundamental aspect of the architecting process and subsequently the architectural documentation. Unfortunately, there is only poor support for modeling architectural patterns for two reasons. First, patterns describe recurring design solutions and hence do not directly m
Full Text Available Architecture today, no longer reflects the limits of experimentation and innovation. An extremely low-tech art whose field of possibilities consists of choosing and using that which has already been done in the past. It is because of this that the key skill a designer should have is the ability to recognize the complexity in forms around them: cities have the widest programming opportunities for architecture, in the two-way relationship that is established from the city that takes form in architecture and an architecture that finds its place in the contemporary city. Thus, architecture has its foundation in hospitality, an element that differentiates it significantly from the design.
Mikkola, Juliana Hsuan
The focus of this paper is to integrate various perspectives on product architecture modularity into a general framework, and also to propose a way to measure the degree of modularization embedded in product architectures. Various trade-offs between modular and integral product architectures and...... how components and interfaces influence the degree of modularization are considered. In order to gain a better understanding of product architecture modularity as a strategy, a theoretical framework and propositions are drawn from various academic literature sources. Based on the literature review......, the following key elements of product architecture are identified: components (standard and new-to-the-firm), interfaces (standardization and specification), degree of coupling, and substitutability. A mathematical function, termed modularization function, is introduced to measure the degree of...
Cornaglia, Bruno; Young, Gavin; Marchetta, Antonio
Fixed broadband network deployments are moving inexorably to the use of Next Generation Access (NGA) technologies and architectures. These NGA deployments involve building fiber infrastructure increasingly closer to the customer in order to increase the proportion of fiber on the customer's access connection (Fibre-To-The-Home/Building/Door/Cabinet… i.e. FTTx). This increases the speed of services that can be sold and will be increasingly required to meet the demands of new generations of video services as we evolve from HDTV to "Ultra-HD TV" with 4k and 8k lines of video resolution. However, building fiber access networks is a costly endeavor. It requires significant capital in order to cover any significant geographic coverage. Hence many companies are forming partnerships and joint-ventures in order to share the NGA network construction costs. One form of such a partnership involves two companies agreeing to each build to cover a certain geographic area and then "cross-selling" NGA products to each other in order to access customers within their partner's footprint (NGA coverage area). This is tantamount to a bi-lateral wholesale partnership. The concept of Fixed Access Network Sharing (FANS) is to address the possibility of sharing infrastructure with a high degree of flexibility for all network operators involved. By providing greater configuration control over the NGA network infrastructure, the service provider has a greater ability to define the network and hence to define their product capabilities at the active layer. This gives the service provider partners greater product development autonomy plus the ability to differentiate from each other at the active network layer.
Ayat Ali Yassin; Dr. Nangkula Utaberta
The main problem of the theory in the arena of islamic architecture is affected by some of its Westernthoughts, and stereotyping the islamic architecture according to Western thoughts; this leads to the breakdownof the foundations in the islamic architecture. It is a myth that islamic architecture is subjected to theinfluence from foreign architectures. This paper will highlight the dialectical concept of islamic architecture ormuslim buildings and the areas of recognition in islamic architec...
Harrison, Neil B.; Avgeriou, Paris
Architecture patterns are an important tool in architectural design. However, while many architecture patterns have been identified, there is little in-depth understanding of their actual use in software architectures. For instance, there is no overview of how many patterns are used per system or which patterns are the most common or most important for particular domains. In addition, little is known of how architecture patterns may interact with each other. We studied architecture documentat...
V. J. Anand; Himawan Gunadhi
A data warehouse facilitates the integration of disparate operational databases in an enterprise into a single store. The warehouse then provides knowledge workers with easy access to historical, summarized and other forms of aggregated data. A major flaw in present warehouse architectures is the de-coupling of the warehouse database from its underlying operational databases. This creates two problems: the difficulty in updating the warehouse and the inability to provide users with a drill-do...
Kirkeby, Inge Mette
Although serious efforts are made internationally and nationally, it is a slow process to make our physical environment accessible. In the actual design process, architects play a major role. But what kinds of knowledge, including research-based knowledge, do practicing architects make use of when...... designing accessible environments? The answer to the question is crucially important since it affects how knowledge is distributed and how accessibility can be ensured. In order to get first-hand knowledge about the design process and the sources from which they gain knowledge, 11 qualitative interviews...... were conducted with architects with experience of designing for accessibility. The analysis draws on two theoretical distinctions. The first is research-based knowledge versus knowledge used by architects. The second is context-independent knowledge versus context-dependent knowledge. The practitioners...
narratives related to historical buildings and architectural heritage; another group tries to embed new performative technologies in expressive architectural representation. The article provides a theoretical framework for the analysis of the political rationales of these projects and for the architectural...
Acceso solar a las edificaciones. El eslabón pendiente en la norma urbanística chilena sobre la actividad proyectual. / Solar access to buildings. The unsolved link in Chile’s urban laws regarding architectural design activity.
Paula Uribe Araya
Full Text Available Hoy en día las demandas energéticas y la búsqueda de fuentes renovables no contaminantes, tales como las Energías Renovables No Convencionales ERNC, son cada vez más acuciantes en el mundo. Entre ellas está la energía solar, cuya captación adquiere una importancia crucial en el medio urbano, debido a obstrucciones provenientes de las morfologías resultantes de la dinámica inmobiliaria. No obstante, se plantea que la vinculación entre morfología urbana y captación solar por edificaciones para sistemas activos, no ha sido abordada en el medio nacional. El objetivo de este artículo es reflexionar respecto a un concepto clave en estas materias: el acceso solar,porque se transforma en un bien muy preciado y necesario resguardar para el bien común. El enfoque adoptado analiza dos marcos normativos convergentes a la actividad proyectual energética solar: la Ordenanza General de Urbanismo y Construcciones (OGUC y la Ley del Net Metering (NM. Se analiza la aplicación de la normativa OGUC en un caso hipotético, sus implicancias en las sombras arrojadas sobre edificaciones, predios y espacios públicos. El resultado final es la contextualización espacial de un problema detectado entre forma urbana y energía solar, conducente a develar un eslabón pendiente en la normativa chilena sobre actividad proyectual./Nowadays energy demand and searching for renewable no polluted source such as Renewable Energy No Conventional (ERNC has become crucial in the world. Solar energy is one of them whose insolation has a key importance in the built environment because obstructions comingfrom ending morphology of the real estate./ Although that it is stated that link between urban morphology and building insolation for active systems has not yet been tackled in the national legislation. The objective of the article is to think about a key concept: solar access because it is relevant for equity viewpoint. The paperfocus on two legislative frameworks
This article deals with the development of museum architecture from the formation of the classic building architecture to the establishment of the contemporary museum architecture. Changes in the museum building architecture and displaying principles have been analysed. The 19th century was defined by the emergence of a vast number of museums serving through present as examples of the contemporary museum architecture. New styles are tried in the museum architecture alo...
Pinto de Freitas, Rita
The concept of "hybrid architecture" developed in this study considers hybrid all architecture that is at once object, landscape and infrastructure. Hybrid architecture, pushed by the fact that it concentrates in a single architectural intervention a triple object-, landscape- and infrastructure-related nature, generates architectural answers with very specific features, and its study achieves following goals: 1: Clarify the term hybrid related to architectural intervention; 2: Tran...
Barroero, Thiago; Motta, Gianmario; Pignatelli, Giovanni
In the field of Enterprise Architecture, The Open Group Architecture Framework (TOGAF) is a well known framework, that links Business Architecture, Data Architecture, Application Architecture, Technology. A key concept within Business Architecture domain is Business Capabilities, that are delivered by Business Component (BC). A BC is a business unit that encompasses a coherent set of activities, supported by assets including people, processes and technology. Current TOGAF version recognizes t...
Zeinab Rajabi; Maryam Nooraei Abade
Enterprises choose Enterprise Architecture (EA) solution, in order to overcome dynamic business challenges and in coordinate various enterprise elements. In this article, a solution is suggested for the Enterprise Architecture development. The solution focuses on architecture data in the Enterprise Architecture development process. Data-centric architecture approach is preferred product-centric architecture approach. We suggest using Enterprise Ontology (EO) as context for collecting architec...
The PASS project has as its goal the implementation of solutions to the foreseen data access problems of the next generation of scientific experiments. The architectural model results from an evaluation of the operational and technical requirements and is described in terms of an abstract reference model, an implementation model and a discussion of some design aspects. The abstract reference model describes a system that matches the requirements in terms of its components and the mechanisms by which they communicate, but does not discuss policy or design issues that would be necessary to match the model to an actual implementation. Some of these issues are discussed, but more detailed design and simulation work will be necessary before choices can be made
The Internet lets us share perfect copies of our work with a worldwide audience at virtually no cost. We take advantage of this revolutionary opportunity when we make our work "open access": digital, online, free of charge, and free of most copyright and licensing restrictions. Open access is made possible by the Internet and copyright-holder consent, and many authors, musicians, filmmakers, and other creators who depend on royalties are understandably unwilling to give their consent. But for 350 years, scholars have written peer-reviewed journal articles for impact, not for money, and are free to consent to open access without losing revenue. In this concise introduction, Peter Suber tells us what open access is and isn't, how it benefits authors and readers of research, how we pay for it, how it avoids copyright problems, how it has moved from the periphery to the mainstream, and what its future may hold. Distilling a decade of Suber's influential writing and thinking about open access, this is the indispe...
Kristensen, Claus; Kirkegaard, Poul Henning
Details in architecture have a significant influence on how architecture is experienced. One can touch the materials and analyse the detailing - thus details give valuable information about the architectural scheme as a whole. The absence of perceptual stimulation like details and materiality...... / tactility can blur the meaning of the architecture and turn it into an empty statement. The present paper will outline detailing in contemporary architecture and discuss the issue with respect to architectural quality. Architectural cases considered as sublime piece of architecture will be presented and...... discussed with respect to the meaning of detailing....
National Aeronautics and Space Administration — The Integrated Data Assimilation Architecture (IDAA) is a middleware architecture that facilitates the incorporation of heterogeneous sensing and control devices...
National Aeronautics and Space Administration — The Avionics Architectures for Exploration Project team will develop a system level environment and architecture that will accommodate equipment from multiple...
Please note this is a Short Discount publication. This year's edition of Computer Architecture Technology Trends analyses the trends which are taking place in the architecture of computing systems today. Due to the sheer number of different applications to which computers are being applied, there seems no end to the different adoptions which proliferate. There are, however, some underlying trends which appear. Decision makers should be aware of these trends when specifying architectures, particularly for future applications. This report is fully revised and updated and provides insight in
Architecture has always had to relate to climatic conditions while providing shelter from the sun, the rain, the winds or the cold. This is a main purpose of buildings: To establish an indoor climate different from the outdoor. In the Nordic countries fuels for heating buildings has been a vital...... cases been to search for traditional and pre-industrialized ways of building and settlement. The idea of this theme number is not to flee from modern life and approaches, but instead to face modern conditions relevant in achieving sustainable urban development and sustainable architecture, the only...... truly modern architecture that exists....
Reinholtz, William; Dvorak, Daniel
Verifiable MDS Architecture (VMA) is a software architecture that facilitates the construction of highly verifiable flight software for NASA s Mission Data System (MDS), especially for smaller missions subject to cost constraints. More specifically, the purpose served by VMA is to facilitate aggressive verification and validation of flight software while imposing a minimum of constraints on overall functionality. VMA exploits the state-based architecture of the MDS and partitions verification issues into elements susceptible to independent verification and validation, in such a manner that scaling issues are minimized, so that relatively large software systems can be aggressively verified in a cost-effective manner.
IDHAM Noor Cholis
Full Text Available This paper examines deconstruction in architecture and forms used, which triggered by dispute of form and its scientification claimed by deconstructivists. Deconstruction terminologyis studied in the first part related to architecture field as a base knowledge. Some sample works of known deconstructionist architects are assessed in order to understand how their building is deconstructed and what forms they used. Discussion about form and its relation to other fields is then pursued by discussing the involvement of terminology of science, aesthetic pattern, and human life. The results of this discussion give clear understanding how form related to deconstruction in architecture are used.
The main statistical distributions applicable to the analysis of genome architecture and genome tracks are briefly discussed and critically assessed. Although the observed features in distributions of element lengths can be equally well fitted by the different statistical approximations, the interpretation of observed regularities may strongly depend on the chosen scheme. We discuss the possible evolution scenarios and describe the main characteristics obtained with different distributions. The expression for the assessment of levels in hierarchical chromatin folding is derived and the quantitative measure of genome architecture inhomogeneity is suggested. This theory provides the ground for the regular statistical study of genome architecture and genome tracks.
Access is the major new language series designed with the needs of today's generation of students firmly in mind. Whether learning for leisure or business purposes or working towards a curriculum qualification, Access French is specially designed for adults of all ages and gives students a thorough grounding in all the skills required to understand, speak, read and write contemporary French from scratch. The coursebook consists of 10 units covering different topic areas, each of which includes Language Focus panels explaining the structures covered and a comprehensive glossary. Learning tips
Riyanarto Sarno; Hermawan Hermawan
Service Oriented Architecture is a design paradigm in software engineering with which a distributed system is built for an enterprise. This paradigm aims at providing the system as a service through a protocol in web service technology, namely Simple Object Access Protocol (SOAP). However, SOA is service level agreements of webservice. For this reason, this reasearch aims at combining SOA with Resource Oriented Architecture in order to expand scalability of services. This combination creates...
Thierno Bah; Samuel Pierre; Roch Glitho
Lately, the proliferation of small portable devices has driven the introduction of a new mobility concept called service mobility. In order to support service mobility, we introduce a new architecture implementing mechanisms to access end users personalized services regardless of his physical location. The proposed architecture leverages on mobile agent technology to transport and move services to the end users registered terminals and the Session Initiation Protocol (SIP) for user location s...
Lagoze, Carl; Payette, Sandy; Shin, Edwin; Wilper, Chris
The Fedora architecture is an extensible framework for the storage, management, and dissemination of complex objects and the relationships among them. Fedora accommodates the aggregation of local and distributed content into digital objects and the association of services with objects. This al-lows an object to have several accessible representations, some of them dy-namically produced. The architecture includes a generic RDF-based relation-ship model that represents relationships among objec...
Schnädelbach, H.; A Penn; Steadman, P.
Architecture can be shown to structure patterns of co-presence and in turn to be structured itself by the rules and norms of the society present within it. This two-way relationship exists in a surprisingly stable framework, as fundamental changes to buildings are slow and costly. At the same time, change within organisations is increasingly rapid and buildings are used to accommodate some of that change. This adaptation can be supported by the use of telecommunication technolo...
INDRA is the first Information Technology company in Spain and it presents here, through a series of transparencies, its own approach for the remote experimentation architecture for long pulses (REAL). All the architecture is based on Java-2 platform standards and REAL is a totally open architecture. By itself REAL offers significant advantages: -) access authentication and authorization under multiple security implementations, -) local or remote network access: LAN, WAN, VPN..., -) on-line access to acquisition systems for monitoring and configuration, -) scalability, flexibility, robustness, platform independence,.... The BeansNet implementation of REAL gives additional good things such as: -) easy implementation, -) graphical tool for service composition and configuration, -) availability and hot-swap (no need of stopping or restarting services after update or remodeling, and -) INDRA support. The implementation of BeansNet at the TJ-2 stellarator at Ciemat is presented. This document is made of the presentation transparencies. (A.C.)
Wilson, A.; Lindholm, D. M.
A reference architecture is a "design that satisfies a clearly distinguished subset of the functional capabilities identified in the reference requirements within the boundaries of certain design and implementation constraints, also identified in reference requirements." [Tracz, 1995] Recognizing the value of a reference architecture, NASA's ESDSWG's Standards Process Group (SPG) is introducing a multi-disciplinary science data systems (SDS) reference architecture in order to provide an implementation neutral, template solution for an architecture to support scientific data systems in general [Burnett, et al, 2011]. This reference architecture describes common features and patterns in scientific data systems, and can thus provide guidelines in building and improving such systems. But, guidelines alone may not be sufficient to actually build a system. A domain specific software architecture (DSSA) is "an assemblage of software components, specialized for a particular type of task (domain), generalized for effective use across that domain, composed in a standardized structure (topology) effective for building successful applications." [Tracz, 1995]. It can be thought of as relatively specific reference architecture. The "DSSA Process" is a software life cycle developed at Carnegie Melon's Software Engineering Institute that is based on the development and use of domain-specific software architectures, components, and tools. The process has four distinct activities: 1) develop a domain specific base/model, 2) populate and maintain the library, 3) build applications, 4) operate and maintain applications [Armitage, 1993]. The DSSA process may provide the missing link between guidelines and actual system construction. In this presentation we focus specifically on the realm of scientific data access and distribution. Assuming the role of domain experts in building data access systems, we report the results of creating a DSSA for scientific data distribution. We describe
Fröhlich, Bernd; Lucamarini, Marco; Sharpe, Andrew W; Yuan, Zhiliang; Shields, Andrew J
The theoretically proven security of quantum key distribution (QKD) could revolutionise how information exchange is protected in the future. Several field tests of QKD have proven it to be a reliable technology for cryptographic key exchange and have demonstrated nodal networks of point-to-point links. However, so far no convincing answer has been given to the question of how to extend the scope of QKD beyond niche applications in dedicated high security networks. Here we show that adopting simple and cost-effective telecommunication technologies to form a quantum access network can greatly expand the number of users in quantum networks and therefore vastly broaden their appeal. We are able to demonstrate that a high-speed single-photon detector positioned at the network node can be shared between up to 64 users, thereby significantly reducing the hardware requirements for each user added to the network. This shared receiver architecture removes one of the main obstacles restricting the widespread application...
Garrett, Michael; Magnone, Lee; Aghazarian, Hrand; Baumgartner, Eric; Kennedy, Brett
An electronics architecture has been developed to enable the rapid construction and testing of prototypes of robotic systems. This architecture is designed to be a research vehicle of great stability, reliability, and versatility. A system according to this architecture can easily be reconfigured (including expanded or contracted) to satisfy a variety of needs with respect to input, output, processing of data, sensing, actuation, and power. The architecture affords a variety of expandable input/output options that enable ready integration of instruments, actuators, sensors, and other devices as independent modular units. The separation of different electrical functions onto independent circuit boards facilitates the development of corresponding simple and modular software interfaces. As a result, both hardware and software can be made to expand or contract in modular fashion while expending a minimum of time and effort.
In DSP Architecture Design Essentials, authors Dejan Marković and Robert W. Brodersen cover a key subject for the successful realization of DSP algorithms for communications, multimedia, and healthcare applications. The book addresses the need for DSP architecture design that maps advanced DSP algorithms to hardware in the most power- and area-efficient way. The key feature of this text is a design methodology based on a high-level design model that leads to hardware implementation with minimum power and area. The methodology includes algorithm-level considerations such as automated word-length reduction and intrinsic data properties that can be leveraged to reduce hardware complexity. From a high-level data-flow graph model, an architecture exploration methodology based on linear programming is used to create an array of architectural solutions tailored to the underlying hardware technology. The book is supplemented with online material: bibliography, design examples, CAD tutorials and custom software.
Skousbøll, Karin Merete
With the author's Scandinavian viewpoint the aim of this book has been an investigation into contemporary Greek architecture and at the same time providing an understanding for its essential characteristics based on the historic, cultural heritage of Hellas....
In the present study, we express the quality, function, and characteristics of architecture to help people comprehensively understand what architecture is. We also reveal the problems and conflict found in population, land, water resources, pollution, energy, and the organization systems in construction. China’s economy is transforming. We should focus on the cities, architectural environment, energy conservation, emission-reduction, and low-carbon output that will result in successful green development. We should macroscopically and microscopically analyze the development, from the natural environment to the artificial environment; from the relationship between human beings and nature to the combination of social ecology in cities, and farmlands. We must learn to develop and control them harmoniously and scientifically to provide a foundation for the methods used in architecture research.
Foged, Isak Worre; Kirkegaard, Poul Henning
Recent years have seen an increasing variety of applications of adaptive architectural structures for improvement of structural performance by recognizing changes in their environments and loads, adapting to meet goals, and using past events to improve future performance or maintain serviceability....... The general scopes of this paper are to develop a new adaptive kinetic architectural structure, particularly a reconfigurable architectural structure which can transform body shape from planar geometries to hyper-surfaces using different control strategies, i.e. a transformation into more than one or...... two different shape alternatives. The adaptive structure is a proposal for a responsive building envelope which is an idea of a first level operational framework for present and future investigations towards performance based responsive architectures through a set of responsive typologies. A mock- up...
Sørensen, Nils Lykke; Frandsen, Anne Kathrine; Øien, Turid Borgestrand
on architecturalcompetitions, a series of interviews was conducted with building clients as well as architects, focusing on the impact of the above-mentioned changes within the building sector on architectural competitions as an institution. In the interviews, ICT and notleast BIM was a recurring...... clients, architects and client consultants) and the applied technologies (competition forms, ICT tools, directives) in architectural competitions in a theoretical actor-network perspective. The diverging understandings of the role of BIM are demonstrating one of many negotiations in progress in the...... network of architectural competitions. BIM is transformed from an inscription device visually representing the competition proposals to form an actant that challenges the very concept of architectural competition. The objective of the paper is to contribute to theunderstanding of BIM used in the kind of...
Harrison, Neil B.; Avgeriou, Paris
Architecture patterns are an important tool in architectural design. However, while many architecture patterns have been identified, there is little in-depth understanding of their actual use in software architectures. For instance, there is no overview of how many patterns are used per system or wh
Abstract – This paper focuses on the possibility of (re)designing architecture virtually with the help of one of the most important representation tools: Photography. Various digital processes like stitching multiple photos together and mirroring images in image editing software like Photoshop, allow this virtual architecture to take place in virtual environments. Photography can be utilized in the process of ‘constructing’ a new space --that we can call ‘narrative space’-- from an existing s...
Job titles like ""Technical Architect"" and ""Chief Architect"" nowadays abound in software industry, yet many people suspect that ""architecture"" is one of the most overused and least understood terms in professional software development. Gorton's book tries to resolve this dilemma. It concisely describes the essential elements of knowledge and key skills required to be a software architect. The explanations encompass the essentials of architecture thinking, practices, and supporting technologies. They range from a general understanding of structure and quality attributes through technical i
A Generic Distributed Simulation Architecture is described that allows a simulation to be automatically distributed over a heterogeneous network of computers and executed with very little human direction. A prototype Framework is presented that implements the elements of the Architecture and demonstrates the feasibility of the concepts. It provides a basis for a future, improved Framework that will support legacy models. Because the Framework is implemented in Java, it may be installed on almost any modern computer system.
Laverge, Jelle; Van Den Bossche, Nathan; Janssens, Arnold
In this paper, the intentions thriving the implementation of computational modeling of building physics as it is approached in the Architectural engineering courses at Ghent University are discussed. During the bachelor degree, courses focus mainly on integration of basic building physics feasibility in the architectural conceptualization. During the final bachelor year, students program their own simplified 2D models for internal condensation and thermal bridges in a spreadsheet, based on...
Tind Kristensen, Eva; Friis Møller, Winnie; Rotne, Georg;
Climate and Architecture analyserer klimaets rolle i arkitekturen. Intentionen med bogen er at pege på nogle af de mange muligheder for bygningers klimaregulering, som et mere detaljeret studie af de lokale klimatiske forhold og den stedlige byggeskik tilbyder.......Climate and Architecture analyserer klimaets rolle i arkitekturen. Intentionen med bogen er at pege på nogle af de mange muligheder for bygningers klimaregulering, som et mere detaljeret studie af de lokale klimatiske forhold og den stedlige byggeskik tilbyder....
Henriette Bier; Terry Knight
The shift from mechanical to digital forces architects to reposition themselves: Architects generate digital information, which can be used not only in designing and fabricating building components but also in embedding behaviours into buildings. This implies that, similar to the way that industrial design and fabrication with its concepts of standardisation and serial production influenced modernist architecture, digital design and fabrication influences contemporary architecture. While stan...
Pelcat, Maxime; Desnos, Karol; Maggiani, Luca; Liu, Yanzhou; Heulot, Julien; Nezan, Jean-François; Bhattacharyya, Shuvra S.
The current trend in high performance and embedded computing consists of designing increasingly complex heterogeneous hardware architectures with non-uniform communication resources. In order to take hardware and software design decisions, early evaluations of the system non-functional properties are needed. These evaluations of system efficiency require high-level information on both the algorithms and the architecture. In state of the art Model Driven Engineering (MDE) methods, different co...
The purpose of this book is to reveal, explore and further the debate on the aesthetic potentials of sustainable architecture and its practice. This book opens a new area of scholarship and discourse in the design and production of sustainable architecture, one that is based in aesthetics. The chapters in this book have been compiled from architects and scholars working in diverse research and practice areas in North America, Europe, the Middle East and Asia. While they approach the subject m...
Crowder, James A; Friess, Shelli A
The goal of this book is to establish the foundation, principles, theory, and concepts that are the backbone of real, autonomous Artificial Intelligence. Presented here are some basic human intelligence concepts framed for Artificial Intelligence systems. These include concepts like Metacognition and Metamemory, along with architectural constructs for Artificial Intelligence versions of human brain functions like the prefrontal cortex. Also presented are possible hardware and software architectures that lend themselves to learning, reasoning, and self-evolution
Henshaw, Philip D.; Lis, Steven A.
This paper describes a new hardware architecture for searching and accessing data. This Content Addressable Memory (CAM) can be implemented using holographic storage in spectral hole burning media. The use of laser wavelength as a fourth dimension for volume holographic recording provides an additional addressing variable which can be used to advantage in a CAM architecture. This paper consists of three parts: definition of a CAM, presentation of two CAM concepts for digital data string and analog function search, and a discussion of architecture issues.
Naboni, Emanuele; Malcangi, Antonio; Zhang, Yi;
Designers, in response to codes or voluntary " green building " programs, are increasingly concerned with building energy demand reduction, but they are not fully aware of the energy saving potential of architectural design. According to literature, building form, construction and material choices...... different occupant behaviour. The research shows the best solution for each of the climates and compares them with Olgyay´s findings. Finally, for each climate the energy saving potential is defined and then compared to Lechner's conclusions. Defining The Energy Saving Potential of Architectural Design (PDF...... Download Available). Available from: https://www.researchgate.net/publication/279885641_Defining_The_Energy_Saving_Potential_of_Architectural_Design [accessed Jan 21, 2016]....
Ayat Ali Yassin
Full Text Available The main problem of the theory in the arena of islamic architecture is affected by some of its Westernthoughts, and stereotyping the islamic architecture according to Western thoughts; this leads to the breakdownof the foundations in the islamic architecture. It is a myth that islamic architecture is subjected to theinfluence from foreign architectures. This paper will highlight the dialectical concept of islamic architecture ormuslim buildings and the areas of recognition in islamic architecture. It will also widen the knowledge in thecharacteristics of each point in time according to the stages of islamic architecture from the prophetic agemoving through the architecture outside the city of Medina, the Caliphs, the Umayyad, Abbasid, andarchitectural models by spatial and time periods, taking Iraq as the example to explain how the Islam influentson architecture and vice versa.
DSL technology enables very high bandwidth transmission in a point-to-point fashion from a customer's premises to a central office (CO), wiring center, or other logical point of traffic aggregation. Unlike many technologies that enable broadband Internet access, DSL technology does not determine a specific architecture to be deployed at either the customer's premises or in the service/access provider's network. In fact, DSL technology can be used in conjunction with a variety of network architectures. While being agnostic regarding to higher-layer protocols, there are still several critical 'protocol specific' issues that need to be addressed when deploying DSL as a solution for IP (Internet/intrAnet) access. This paper will address these issues and present a range of network architectures that incorporate DSL technology. This paper will only focus on those architectures that enable IP access. These architectures are divided into three categories: Traditional Dialled Model (TDM), frame-based (Frame Relay/Ethernet), and cell-based (ATM).
The purpose of this study is utilizing the central courtyard of traditional architecture in modern architecture. Since the nineteenth century, the traditional architecture has been more taken into account. From this time period, the sixties century is significantly important. The studies on the traditional architecture were conducted and followed in this period with the new objective and attitude. Until the early sixties century, most of the studies on the traditional architecture were briefl...
Israel, David J.
The NASA Space Network (SN) supports a variety of missions using the Tracking and Data Relay Satellite System (TDRSS), which includes ground stations in White Sands, New Mexico and Guam. A Space Network IP Services (SNIS) architecture is being developed to support future users with requirements for end-to-end Internet Protocol (IP) communications. This architecture will support all IP protocols, including Mobile IP, over TDRSS Single Access, Multiple Access, and Demand Access Radio Frequency (RF) links. This paper will describe this architecture and how it can enable Low Earth Orbiting IP satellite missions.
In the 20th century a Swiss writer wrote a book titled Time, Space and Architecture, in which he discussed the relationship between architecture and the times. Fifty years after that, this paper adopts the same title, hoping to deepen the understanding of the space-time structure in architecture and contribute to the new exploration of architectural forms.
Full Text Available Enterprises choose Enterprise Architecture (EA solution, in order to overcome dynamic business challenges and in coordinate various enterprise elements. In this article, a solution is suggested for the Enterprise Architecture development. The solution focuses on architecture data in the Enterprise Architecture development process. Data-centric architecture approach is preferred product-centric architecture approach. We suggest using Enterprise Ontology (EO as context for collecting architecture data; Enterprise Ontology enhances quality of architecture data and lead to effective architecture results for decision-making. First, Enterprise is modeled using the ontology. Then how collecting Enterprise Architecture data based on the Enterprise Ontology is explained. Finally, the results and advantages of the solution are demonstrated.
Costa Santos, Sandra; Klein, Gerald; Despang, Martin
“Sustainability,” being the buzzword of the 21st century, is particularly challenging to the current generation, now in their early teens, which grew up with a childhood of lackadaisical use of fossil energy. This generation, which will soon be leading the world, has been inappropriately labeled the “generation me” and is expected to prove its successful transitioning into “generation p[ostfossil].” If the young emerging architectural professionals choose, they can be the mission group in hel...
The concept of construction in architectural design process is a temporary action that exists for a while and transforms itself into another product; i.e. the final building to be inhabited. Construction site can be taken as a podium where a play-to-remain-incomplete is being staged. The incompleteness causes us to dream, due to the fact that a complete building loses its narrative potential as it informs us about all the necessary pieces that constitute the whole: There is no puzzle to solve...
Plessius, Henk; Steenbergen, Marlies van; Slot, Raymond
Enterprise Architecture has been developed in order to optimize the alignment between business needs and the (rapidly changing) possibilities of information technology. But do organizations indeed benefit from the application of Enterprise Architecture according to those who are in any way involved in architecture? To answer this question, a model has been developed (the Enterprise Architecture Value Framework) to organize the benefits of Enterprise Architecture. Based on this model, a survey...
Foley, Alan; Regan, Bob
Discusses Web design for people with disabilities and outlines a process-based approach to accessibility policy implementation. Topics include legal mandates; determining which standards apply to a given organization; validation, or evaluation of the site; site architecture; navigation; and organizational needs. (Author/LRW)
Cano, M.D.; Norp, A.H.J.; Popova, M.P.
Satellite communications (Satcom) networks are increasingly integrating with terrestrial communications networks, namely Next Generation Networks (NGN). In the area of NGN the Evolved Packet Core (EPC) is a new network architecture that can support multiple access technologies. When Satcom is consid
Al-Neyadi, Fahed; Abawajy, Jemal H.
E-Health systems logically demand a sufficiently fine-grained authorization policy for access control. The access to medical information should not be just role-based but should also include the contextual condition of the role to access data. In this paper, we present a mechanism to extend the standard role-based access control to incorporate contextual information for making access control decisions in e-health application. We present an architecture consisting of authorisation and context infrastructure that work cooperatively to grant access rights based on context-aware authorization policies and context information.
Full Text Available Fashion and architecture fields as non-verbal expression languages are affected by social, cultural, economic and historical factors and shaped around creativity. In both disciplines, based on human scales, employed material is brought dimension in the scope of math. Hue, texture, material, rate-ratio, line, form and shape are common design components of both fashion and architecture. Especially it is possible to see the accrued interactions in terms of pattern, form and decoration throughout the history. The aim of this survey is determining the common grounds, similarities, and interactions of clothing and architectural design that cover to protect the human body based on housing instinct. Descriptive method is used in the survey that examines the subject in depth. In the survey, that structural constitutions constructed on human body are studied in both fields in extent of art, status of fashion designers are affected from architecture is examined. New approaches are exhibited by giving examples of clothing designs in accordance with architectural principles.
Holmes, V.P.; Linebarger, J.M.; Miller, D.J.; Vandewart, R.L.
The Simdarion Infranet (S1) is a term which is being used to dcscribc one element of a multidisciplinary distributed and distance computing initiative known as DisCom2 at Sandia National Laboratory (http ct al. 1998). The Simulation Intranet is an architecture for satisfying Sandia's long term goal of providing an end- to-end set of scrviccs for high fidelity full physics simu- lations in a high performance, distributed, and distance computing environment. The Intranet Architecture group was formed to apply current distributed object technologies to this problcm. For the hardware architec- tures and software models involved with the current simulation process, a CORBA-based architecture is best suited to meet Sandia's needs. This paper presents the initial desi-a and implementation of this Intranct based on a three-tier Network Computing Architecture(NCA). The major parts of the architecture include: the Web Cli- ent, the Business Objects, and Data Persistence.
Dixit, Abhishek; Lannoo, Bart; Colle, Didier; Pickavet, Mario; Demeester, Piet
In this paper, we propose the system concepts of a next-generation wavelength switched hybrid time division multiple access and wavelength division multiplexing (TWDM) passive optical network (PON) architecture. In this architecture, wavelength selective switches (WSSs) are used at the remote node to improve flexibility, data security and power budget compared to other TWDM-PON variants. We map the proposed architecture to the requirements of next-generation optical access networks in a 2020 ...
Tang, Antony; van Vliet, Hans
Despite recent advancements in software architecture knowledge management and design rationale modeling, industrial practice is behind in adopting these methods. The lack of empirical proofs and the lack of a practical process that can be easily incorporated by practitioners are some of the hindrance for adoptions. In particular, the process to support systematic design reasoning is not available. To rectify this issue, we propose a design reasoning process to help architects cope with an architectural design environment where design concerns are cross-cutting and diversified.We use an industrial case study to validate that the design reasoning process can help improve the quality of software architecture design. The results have indicated that associating design concerns and identifying design options are important steps in design reasoning.
Chau, Savio; Hall, Ronald; Traylor, marcus; Whitfield, Adrian
Avionics System Architecture Tool (ASAT) is a computer program intended for use during the avionics-system-architecture- design phase of the process of designing a spacecraft for a specific mission. ASAT enables simulation of the dynamics of the command-and-data-handling functions of the spacecraft avionics in the scenarios in which the spacecraft is expected to operate. ASAT is built upon I-Logix Statemate MAGNUM, providing a complement of dynamic system modeling tools, including a graphical user interface (GUI), modeling checking capabilities, and a simulation engine. ASAT augments this with a library of predefined avionics components and additional software to support building and analyzing avionics hardware architectures using these components.
This volulme features eight original papers dedicated to the theme “Persian Architecture and Mathematics,” guest edited by Reza Sarhangi. All papers were approved through a rigorous process of blind peer review and edited by an interdisciplinary scientific editorial committee. Topics range from symmetry in ancient Persian architecture to the elaborate geometric patterns and complex three-dimensional structures of standing monuments of historical periods, from the expression of mathematical ideas to architectonic structures, and from decorative ornament to the representation of modern group theory and quasi-crystalline patterns. The articles discuss unique monuments Persia, including domed structures and two-dimensional patterns, which have received significant scholarly attention in recent years. This book is a unique contribution to studies of Persian architecture in relation to mathematics.
Wenzel, Henrik; Alting, Leo
An architecture of Environmental Engineering has been developed comprising the various disciplines and tools involved. It identifies industry as the major actor and target group, and it builds on the concept of Eco-efficiency. To improve Eco-efficiency, there is a limited number of intervention......-efficiency is the aim of Environmental Engineering, the discipline of synthesis – design and creation of solutions – will form a core pillar of the architecture. Other disciplines of Environmental Engineering exist forming the necessary background and frame for the synthesis. Environmental Engineering, thus, in...... essence comprise the disciplines of: management, system description & inventory, analysis & assessment, prioritisation, synthesis, and communication, each existing at all levels of intervention. The developed architecture of Environmental Engineering, thus, consists of thirty individual disciplines...
Wenzel, Henrik; Alting, Leo
An architecture of Environmental Engineering has been developed comprising the various disciplines and tools involved. It identifies industry as the major actor and target group, and it builds on the concept of Eco-efficiency. To improve Eco-efficiency, there is a limited number of intervention...... of Eco-efficiency is the aim of Environmental Engineering, the discipline of synthesis – design and creation of solutions – will form a core pillar of the architecture. Other disciplines of Environmental Engineering exist forming the necessary background and frame for the synthesis. Environmental...... Engineering, thus, in essence comprise the disciplines of: management, system description & inventory, analysis & assessment, prioritisation, synthesis, and communication, each existing at all levels of intervention. The developed architecture of Environmental Engineering, thus, consists of thirty individual...
Full Text Available This paper describes an open educational resources (OER architecture framework that would bring significant improvements in a well-structured and systematic way to the educational practices of distance education institutions of India. The OER architecture framework is articulated with six dimensions: pedagogical, technological, managerial, academic, financial, and ethical. These dimensions are structured with the component areas of relevance: IT infrastructure services, management support systems, open content development and maintenance, online teaching-learning, and learner assessment and evaluation of the OER architecture framework. An OER knowledge and information base, including a web portal, is proposed in the form of a series of knowledge repositories. This system would not only streamline the delivery of distance education but also would enhance the quality of distance learning through the development of high quality e-content, instructional processes, course/programme content development, IT infrastructure, and network systems. Thus the proposed OER architecture framework when implemented in the distance education system (DES of India would improve the quality of distance education and also increase its accessibility in a well-organised and structured way.