A. Portero, M. Podhorányi, D. Hrbáč, Simone Libutti, G. Massari, W. Fornaciari
This article is centred on a mathematical weather forecasting model that must run regularly (i.e. 24/7) on an HPC system. Depending on the environmental conditions, each execution of the model may have a different deadline and a different accuracy requirement. In order to minimize power consumption and heat, we minimize resource allocation as far as the deadlines allow, thus evenly spreading resource usage over time while nonetheless complying with the deadlines. Our work relies on a run-time resource manager that adapts resource allocation to the runtime-variable performance demand of applications. The resource assignment is temperature-aware: the application is dynamically migrated on the coolest cores, and this has a positive impact on the system reliability.
{"title":"Just-In-Time Execution Through On-Demand Resource Allocation in HPC Systems","authors":"A. Portero, M. Podhorányi, D. Hrbáč, Simone Libutti, G. Massari, W. Fornaciari","doi":"10.1145/3127942.3127951","DOIUrl":"https://doi.org/10.1145/3127942.3127951","url":null,"abstract":"This article is centred on a mathematical weather forecasting model that must run regularly (i.e. 24/7) on an HPC system. Depending on the environmental conditions, each execution of the model may have a different deadline and a different accuracy requirement. In order to minimize power consumption and heat, we minimize resource allocation as far as the deadlines allow, thus evenly spreading resource usage over time while nonetheless complying with the deadlines. Our work relies on a run-time resource manager that adapts resource allocation to the runtime-variable performance demand of applications. The resource assignment is temperature-aware: the application is dynamically migrated on the coolest cores, and this has a positive impact on the system reliability.","PeriodicalId":270425,"journal":{"name":"Proceedings of the 1st International Conference on Algorithms, Computing and Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130551297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Card skimming and identity theft in ATMs transactions are prevalent nowadays. The use of the common PIN system together with the use of fingerprint as one's identification, eliminating the card skimming- and theft-prone typical card when the PIN is known, strengthens the current ATM transaction process. Images from fingerprint sensors undergo a multi-step process to provide proper user identification when transacting in ATMs. The researcher came up with the idea of designing a system to eliminate possibilities of card skimming and identity theft with the use of a fingerprint identification which is unique for each person. The system uses Fast Fourier Transform as one of its image process to produce better image quality to be used for minutiae identifications. The system's simulated performance indices showed an FAR and FRR of 0% and 15.79%, respectively, and accuracy of 92.11%. The image is remotely transmitted to a distant server wirelessly, implementing a full Internet of Things providing the system a better mobility for mobile ATM Setups in far places.
{"title":"Raspberry Pi and IOT Based-Automated Teller Machine Security for the DSWD 4P's Biometric System Using Fingerprint Recognition with Fast- Fourier Transform Image Enhancement, Multi-Stage Minutia Extraction","authors":"Ericson D. Dimaunahan, A. Ballado, F. Cruz","doi":"10.1145/3127942.3127945","DOIUrl":"https://doi.org/10.1145/3127942.3127945","url":null,"abstract":"Card skimming and identity theft in ATMs transactions are prevalent nowadays. The use of the common PIN system together with the use of fingerprint as one's identification, eliminating the card skimming- and theft-prone typical card when the PIN is known, strengthens the current ATM transaction process. Images from fingerprint sensors undergo a multi-step process to provide proper user identification when transacting in ATMs. The researcher came up with the idea of designing a system to eliminate possibilities of card skimming and identity theft with the use of a fingerprint identification which is unique for each person. The system uses Fast Fourier Transform as one of its image process to produce better image quality to be used for minutiae identifications. The system's simulated performance indices showed an FAR and FRR of 0% and 15.79%, respectively, and accuracy of 92.11%. The image is remotely transmitted to a distant server wirelessly, implementing a full Internet of Things providing the system a better mobility for mobile ATM Setups in far places.","PeriodicalId":270425,"journal":{"name":"Proceedings of the 1st International Conference on Algorithms, Computing and Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125527996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proceedings of the 1st International Conference on Algorithms, Computing and Systems","authors":"","doi":"10.1145/3127942","DOIUrl":"https://doi.org/10.1145/3127942","url":null,"abstract":"","PeriodicalId":270425,"journal":{"name":"Proceedings of the 1st International Conference on Algorithms, Computing and Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123022079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}