-
Database of Indian Social Media Influencers on Twitter
Authors:
Arshia Arya,
Soham De,
Dibyendu Mishra,
Gazal Shekhawat,
Ankur Sharma,
Anmol Panda,
Faisal Lalani,
Parantak Singh,
Ramaravind Kommiya Mothilal,
Rynaa Grover,
Sachita Nishal,
Saloni Dash,
Shehla Shora,
Syeda Zainab Akbar,
Joyojeet Pal
Abstract:
Databases of highly networked individuals have been indispensable in studying narratives and influence on social media. To support studies on Twitter in India, we present a systematically categorised database of accounts of influence on Twitter in India, identified and annotated through an iterative process of friends, networks, and self-described profile information, verified manually. We built a…
▽ More
Databases of highly networked individuals have been indispensable in studying narratives and influence on social media. To support studies on Twitter in India, we present a systematically categorised database of accounts of influence on Twitter in India, identified and annotated through an iterative process of friends, networks, and self-described profile information, verified manually. We built an initial set of accounts based on the friend network of a seed set of accounts based on real-world renown in various fields, and then snowballed "friends of friends" multiple times, and rank ordered individuals based on the number of in-group connections, and overall followers. We then manually classified identified accounts under the categories of entertainment, sports, business, government, institutions, journalism, civil society accounts that have independent standing outside of social media, as well as a category of "digital first" referring to accounts that derive their primary influence from online activity. Overall, we annotated 11580 unique accounts across all categories. The database is useful studying various questions related to the role of influencers in polarisation, misinformation, extreme speech, political discourse etc.
△ Less
Submitted 5 May, 2022; v1 submitted 17 March, 2022;
originally announced March 2022.
-
Extremism & Whataboutism: A Case Study on Bangalore Riots
Authors:
Saloni Dash,
Gazal Shekhawat,
Syeda Zainab Akbar,
Joyojeet Pal
Abstract:
A common diversionary tactic used to deflect attention from contested issues is whataboutery which, when used by majoritarian groups to justify their behaviour against marginalised communities, can quickly devolve into extremism. We explore the manifestations of extreme speech in the Indian context, through a case study of violent protests and policing in the city of Bangalore, provoked by a derog…
▽ More
A common diversionary tactic used to deflect attention from contested issues is whataboutery which, when used by majoritarian groups to justify their behaviour against marginalised communities, can quickly devolve into extremism. We explore the manifestations of extreme speech in the Indian context, through a case study of violent protests and policing in the city of Bangalore, provoked by a derogatory Facebook post. Analyses of the dominant narratives on Twitter surrounding the incident reveal that, most of them employ whataboutism to deflect attention from the triggering post and serve as breeding grounds for religion-based extreme speech. We conclude by discussing how our study proposes an alternative lens of viewing extremism in the Global South.
△ Less
Submitted 22 September, 2021;
originally announced September 2021.
-
Rihanna versus Bollywood: Twitter Influencers and the Indian Farmers' Protest
Authors:
Dibyendu Mishra,
Syeda Zainab Akbar,
Arshia Arya,
Saloni Dash,
Rynaa Grover,
Joyojeet Pal
Abstract:
A tweet from popular entertainer and businesswoman, Rihanna, bringing attention to farmers' protests around Delhi set off heightened activity on Indian social media. An immediate consequence was the weighing in by Indian politicians, entertainers, media and other influencers on the issue. In this paper, we use data from Twitter and an archive of debunked misinformation stories to understand some o…
▽ More
A tweet from popular entertainer and businesswoman, Rihanna, bringing attention to farmers' protests around Delhi set off heightened activity on Indian social media. An immediate consequence was the weighing in by Indian politicians, entertainers, media and other influencers on the issue. In this paper, we use data from Twitter and an archive of debunked misinformation stories to understand some of the patterns around influencer engagement with a political issue. We found that more followed influencers were less likely to come out in support of the tweet. We also find that the later engagement of major influencers on the side of the government's position shows suggestion's of collusion. Irrespective of their position on the issue, influencers who engaged saw a significant rise in their following after their tweets. While a number of tweets thanked Rihanna for raising awareness on the issue, she was systematically trolled on the grounds of her gender, race, nationality and religion. Finally, we observed how misinformation existing prior to the tweet set up the grounds for alternative narratives that emerged.
△ Less
Submitted 8 February, 2021;
originally announced February 2021.
-
Anatomy of a Rumour: Social media and the suicide of Sushant Singh Rajput
Authors:
Syeda Zainab Akbar,
Ankur Sharma,
Himani Negi,
Anmol Panda,
Joyojeet Pal
Abstract:
The suicide of Indian actor Sushant Singh Rajput in the midst of the COVID-19 lockdown triggered a media frenzy of prime time coverage that lasted several months and became a political hot button issue. Using data from Twitter, YouTube, and an archive of debunked misinformation stories, we found two important patterns. First, that retweet rates on Twitter clearly suggest that commentators benefite…
▽ More
The suicide of Indian actor Sushant Singh Rajput in the midst of the COVID-19 lockdown triggered a media frenzy of prime time coverage that lasted several months and became a political hot button issue. Using data from Twitter, YouTube, and an archive of debunked misinformation stories, we found two important patterns. First, that retweet rates on Twitter clearly suggest that commentators benefited from talking about the case, which got higher engagement than other topics. Second, that politicians, in particular, were instrumental in changing the course of the discourse by referring to the case as 'murder', rather than 'suicide'. In conclusion, we consider the effects of Rajput's outsider status as a small-town implant in the film industry within the broader narrative of systemic injustice, as well as the gendered aspects of mob justice that have taken aim at his former partner in the months since.
△ Less
Submitted 8 October, 2020; v1 submitted 24 September, 2020;
originally announced September 2020.
-
Distributed Continuous Range-Skyline Query Monitoring over the Internet of Mobile Things
Authors:
Chuan-Chi Lai,
Zulhaydar Fairozal Akbar,
Chuan-Ming Liu,
Van-Dai Ta,
Li-Chun Wang
Abstract:
A Range-Skyline Query (RSQ) is the combination of range query and skyline query. It is one of the practical query types in multi-criteria decision services, which may include the spatial and non-spatial information as well as make the resulting information more useful than skyline search when the location is concerned. Furthermore, Continuous Range-Skyline Query (CRSQ) is an extension of Range-Sky…
▽ More
A Range-Skyline Query (RSQ) is the combination of range query and skyline query. It is one of the practical query types in multi-criteria decision services, which may include the spatial and non-spatial information as well as make the resulting information more useful than skyline search when the location is concerned. Furthermore, Continuous Range-Skyline Query (CRSQ) is an extension of Range-Skyline Query (RSQ) that the system continuously reports the skyline results to a query within a given search range. This work focuses on the RSQ and CRSQ within a specific range on Internet of Mobile Things (IoMT) applications. Many server-client approaches for CRSQ have been proposed but are sensitive to the number of moving objects. We propose an effective and non-centralized approach, Distributed Continuous Range-Skyline Query process (DCRSQ process), for supporting RSQ and CRSQ in mobile environments. By considering the mobility, the proposed approach can predict the time when an object falls in the query range and ignore more irrelevant information when deriving the results, thus saving the computation overhead. The proposed approach, DCRSQ process, is analyzed on cost and validated with extensive simulated experiments. The results show that DCRSQ process outperforms the existing approaches in different scenarios and aspects.
△ Less
Submitted 24 April, 2019;
originally announced April 2019.
-
Complete Semantics to empower Touristic Service Providers
Authors:
Zaenal Akbar,
Elias Kärle,
Oleksandra Panasiuk,
Umutcan Şimşek,
Ioan Toma,
Dieter Fensel
Abstract:
The tourism industry has a significant impact on the world's economy, contributes 10.2% of the world's gross domestic product in 2016. It becomes a very competitive industry, where having a strong online presence is an essential aspect for business success. To achieve this goal, the proper usage of latest Web technologies, particularly schema.org annotations is crucial. In this paper, we present o…
▽ More
The tourism industry has a significant impact on the world's economy, contributes 10.2% of the world's gross domestic product in 2016. It becomes a very competitive industry, where having a strong online presence is an essential aspect for business success. To achieve this goal, the proper usage of latest Web technologies, particularly schema.org annotations is crucial. In this paper, we present our effort to improve the online visibility of touristic service providers in the region of Tyrol, Austria, by creating and deploying a substantial amount of semantic annotations according to schema.org, a widely used vocabulary for structured data on the Web. We started our work from Tourismusverband (TVB) Mayrhofen-Hippach and all touristic service providers in the Mayrhofen-Hippach region and applied the same approach to other TVBs and regions, as well as other use cases. The rationale for doing this is straightforward. Having schema.org annotations enables search engines to understand the content better, and provide better results for end users, as well as enables various intelligent applications to utilize them. As a direct consequence, the region of Tyrol and its touristic service increase their online visibility and decrease the dependency on intermediaries, i.e. Online Travel Agency (OTA).
△ Less
Submitted 15 September, 2017; v1 submitted 19 June, 2017;
originally announced June 2017.
-
The network structure of visited locations according to geotagged social media photos
Authors:
Christian Junker,
Zaenal Akbar,
Martí Cuquet
Abstract:
Businesses, tourism attractions, public transportation hubs and other points of interest are not isolated but part of a collaborative system. Making such collaborative network surface is not always an easy task. The existence of data-rich environments can assist in the reconstruction of collaborative networks. They shed light into how their members operate and reveal a potential for value creation…
▽ More
Businesses, tourism attractions, public transportation hubs and other points of interest are not isolated but part of a collaborative system. Making such collaborative network surface is not always an easy task. The existence of data-rich environments can assist in the reconstruction of collaborative networks. They shed light into how their members operate and reveal a potential for value creation via collaborative approaches. Social media data are an example of a means to accomplish this task. In this paper, we reconstruct a network of tourist locations using fine-grained data from Flickr, an online community for photo sharing. We have used a publicly available set of Flickr data provided by Yahoo! Labs. To analyse the complex structure of tourism systems, we have reconstructed a network of visited locations in Europe, resulting in around 180,000 vertices and over 32 million edges. An analysis of the resulting network properties reveals its complex structure.
△ Less
Submitted 16 April, 2017;
originally announced April 2017.
-
Exhaustive Search-based Model for Hybrid Sensor Network
Authors:
A. A. Waskita,
H. Suhartanto,
Z. Akbar,
L. T. Handoko
Abstract:
A new model for a cluster of hybrid sensors network with multi sub-clusters is proposed. The model is in particular relevant to the early warning system in a large scale monitoring system in, for example, a nuclear power plant. It mainly addresses to a safety critical system which requires real-time processes with high accuracy. The mathematical model is based on the extended conventional search a…
▽ More
A new model for a cluster of hybrid sensors network with multi sub-clusters is proposed. The model is in particular relevant to the early warning system in a large scale monitoring system in, for example, a nuclear power plant. It mainly addresses to a safety critical system which requires real-time processes with high accuracy. The mathematical model is based on the extended conventional search algorithm with certain interactions among the nearest neighborhood of sensors. It is argued that the model could realize a highly accurate decision support system with less number of parameters. A case of one dimensional interaction function is discussed, and a simple algorithm for the model is also given.
△ Less
Submitted 30 September, 2012;
originally announced October 2012.
-
Pattern discovery for semi-structured web pages using bar-tree representation
Authors:
Z. Akbar,
L. T. Handoko
Abstract:
Many websites with an underlying database containing structured data provide the richest and most dense source of information relevant for topical data integration. The real data integration requires sustainable and reliable pattern discovery to enable accurate content retrieval and to recognize pattern changes from time to time; yet, extracting the structured data from web documents is still lack…
▽ More
Many websites with an underlying database containing structured data provide the richest and most dense source of information relevant for topical data integration. The real data integration requires sustainable and reliable pattern discovery to enable accurate content retrieval and to recognize pattern changes from time to time; yet, extracting the structured data from web documents is still lacking from its accuracy. This paper proposes the bar-tree representation to describe the whole pattern of web pages in an efficient way based on the reverse algorithm. While previous algorithms always trace the pattern and extract the region of interest from \textit{top root}, the reverse algorithm recognizes the pattern from the region of interest to both top and bottom roots simultaneously. The attributes are then extracted and labeled reversely from the region of interest of targeted contents. Since using conventional representations for the algorithm should require more computational power, the bar-tree method is developed to represent the generated patterns using bar graphs characterized by the depths and widths from the document roots. We show that this representation is suitable for extracting the data from the semi-structured web sources, and for detecting the template changes of targeted pages. The experimental results show perfect recognition rate for template changes in several web targets.
△ Less
Submitted 14 April, 2011;
originally announced April 2011.
-
openPC : a toolkit for public cluster with full ownership
Authors:
Z. Akbar,
I. Firmansyah,
B. Hermanto,
L. T. Handoko
Abstract:
The openPC is a set of open source tools that realizes a parallel machine and distributed computing environment divisible into several independent blocks of nodes, and each of them is remotely but fully in any means accessible for users with a full ownership policy. The openPC components address fundamental issues relating to security, resource access, resource allocation, compatibilities with het…
▽ More
The openPC is a set of open source tools that realizes a parallel machine and distributed computing environment divisible into several independent blocks of nodes, and each of them is remotely but fully in any means accessible for users with a full ownership policy. The openPC components address fundamental issues relating to security, resource access, resource allocation, compatibilities with heterogeneous middlewares, user-friendly and integrated web-based interfaces, hardware control and monitoring systems. These components have been deployed successfully to the LIPI Public Cluster which is open for public use. In this paper, the unique characteristics of openPC due to its rare requirements are introduced, its components and a brief performance analysis are discussed.
△ Less
Submitted 11 December, 2010;
originally announced December 2010.
-
Public Infrastructure for Monte Carlo Simulation: publicMC@BATAN
Authors:
A. A. Waskita,
N. A. Prasetyo,
Z. Akbar,
L. T. Handoko
Abstract:
The first cluster-based public computing for Monte Carlo simulation in Indonesia is introduced. The system has been developed to enable public to perform Monte Carlo simulation on a parallel computer through an integrated and user friendly dynamic web interface. The beta version, so called publicMC@BATAN, has been released and implemented for internal users at the National Nuclear Energy Agency (B…
▽ More
The first cluster-based public computing for Monte Carlo simulation in Indonesia is introduced. The system has been developed to enable public to perform Monte Carlo simulation on a parallel computer through an integrated and user friendly dynamic web interface. The beta version, so called publicMC@BATAN, has been released and implemented for internal users at the National Nuclear Energy Agency (BATAN). In this paper the concept and architecture of publicMC@BATAN are presented.
△ Less
Submitted 27 July, 2010;
originally announced July 2010.
-
Watermarking Java Programs using Dummy Methods with Dynamically Opaque Predicates
Authors:
Zaenal Akbar
Abstract:
Software piracy, the illegal using, copying, and resale of applications is a major concern for anyone develops software. Software developers also worry about their applications being reverse engineered by extracting data structures and algorithms from an application and incorporated into competitor's code. A defense against software piracy is watermarking, a process that embeds a secret message in…
▽ More
Software piracy, the illegal using, copying, and resale of applications is a major concern for anyone develops software. Software developers also worry about their applications being reverse engineered by extracting data structures and algorithms from an application and incorporated into competitor's code. A defense against software piracy is watermarking, a process that embeds a secret message in a cover software. Watermarking is a method that does not aim to stop piracy copying, but to prove ownership of the software and possibly even the data structures and algorithms used in the software. The language Java was designed to be compiled into a platform independent bytecode format. Much of the information contained in the source code remains in the bytecode, which means that decompilation is easier than with traditional native codes. In this thesis, we present a technique for watermarking Java programs by using a never-executed dummy method (Monden et.al., 2000) combined with opaque predicates (Collberg et.al., 1998; Arboit, 2002) and improved with dynamically opaque predicates (Palsberg et.al., 2000). This work presents a method to construct a dynamic opaque predicates by grouping two or more opaque predicates according to predefined rules. Any software watermarking technique will exhibit a trade-off between resilience, data rate, cost, and stealth. To evaluate the quality of a watermarking scheme we must also know how well it stands up to different types of attacks. Ideally, we would like our watermarks to survive translation (compilation, decompilation, and binary translation), optimization, and obfuscation. Add a single watermark will increasing source code approximate 3.854 bytes with dummy method that cover up to 15 characters, two dynamic data structures, two threads and two opaque predicates. Application loading-time increase approximate 6108 milliseconds.
△ Less
Submitted 19 April, 2010;
originally announced April 2010.
-
Microcontroller based distributed and networked control system for public cluster
Authors:
I. Firmansyah,
Z. Akbar,
L. T. Handoko
Abstract:
We present the architecture and application of the distributed control in public cluster, a parallel machine which is open for public access. Following the nature of public cluster, the integrated distributed control system is fully accessible through network using a user-friendly web interface. The system is intended mainly to control the power of each node in a block of parallel computers prov…
▽ More
We present the architecture and application of the distributed control in public cluster, a parallel machine which is open for public access. Following the nature of public cluster, the integrated distributed control system is fully accessible through network using a user-friendly web interface. The system is intended mainly to control the power of each node in a block of parallel computers provided to certain users. This is especially important to extend the life-time of related hardwares, and to reduce the whole running and maintainance costs. The system consists of two parts : the master- and node-controllers, and both are connected each other through RS-485 interface. Each node-controller is assigned with a unique address to distinguish each of them. We also discuss briefly the implementation of the system at the LIPI Public Cluster.
△ Less
Submitted 1 June, 2009;
originally announced June 2009.
-
Reverse method for labeling the information from semi-structured web pages
Authors:
Z. Akbar,
L. T. Handoko
Abstract:
We propose a new technique to infer the structure and extract the tokens of data from the semi-structured web sources which are generated using a consistent template or layout with some implicit regularities. The attributes are extracted and labeled reversely from the region of interest of targeted contents. This is in contrast with the existing techniques which always generate the trees from th…
▽ More
We propose a new technique to infer the structure and extract the tokens of data from the semi-structured web sources which are generated using a consistent template or layout with some implicit regularities. The attributes are extracted and labeled reversely from the region of interest of targeted contents. This is in contrast with the existing techniques which always generate the trees from the root. We argue and show that our technique is simpler, more accurate and effective especially to detect the changes of the templates of targeted web pages.
△ Less
Submitted 6 August, 2009; v1 submitted 30 May, 2009;
originally announced June 2009.
-
An Integrated Software-based Solution for Modular and Self-independent Networked Robot
Authors:
I. Firmansyah,
Z. Akbar,
B. Hermanto,
L. T. Handoko
Abstract:
An integrated software-based solution for a modular and self-independent networked robot is introduced. The wirelessly operatable robot has been developed mainly for autonomous monitoring works with full control over web. The integrated software solution covers three components : a) the digital signal processing unit for data retrieval and monitoring system; b) the externally executable codes fo…
▽ More
An integrated software-based solution for a modular and self-independent networked robot is introduced. The wirelessly operatable robot has been developed mainly for autonomous monitoring works with full control over web. The integrated software solution covers three components : a) the digital signal processing unit for data retrieval and monitoring system; b) the externally executable codes for control system; and c) the web programming for interfacing the end-users with the robot. It is argued that this integrated software-based approach is crucial to realize a flexible, modular and low development cost mobile monitoring apparatus.
△ Less
Submitted 29 November, 2008;
originally announced December 2008.
-
Microcontroller-based System for Modular Networked Robot
Authors:
I. Firmansyah,
Z. Akbar,
B. Hermanto,
L. T. Handoko
Abstract:
A prototype of modular networked robot for autonomous monitoring works with full control over web through wireless connection has been developed. The robot is equipped with a particular set of built-in analyzing tools and appropriate censors, depending on its main purposes, to enable self-independent and real-time data acquisition and processing. The paper is focused on the microcontroller-based…
▽ More
A prototype of modular networked robot for autonomous monitoring works with full control over web through wireless connection has been developed. The robot is equipped with a particular set of built-in analyzing tools and appropriate censors, depending on its main purposes, to enable self-independent and real-time data acquisition and processing. The paper is focused on the microcontroller-based system to realize the modularity. The whole system is divided into three modules : main unit, data acquisition and data processing, while the analyzed results and all aspects of control and monitoring systems are fully accessible over an integrated web-interface. This concept leads to some unique features : enhancing flexibility due to enabling partial replacement of the modules according to user needs, easy access over web for remote users, and low development and maintenance cost due to software dominated components.
△ Less
Submitted 3 September, 2008;
originally announced September 2008.
-
A Simple Mechanism for Focused Web-harvesting
Authors:
Z. Akbar,
L. T. Handoko
Abstract:
The focused web-harvesting is deployed to realize an automated and comprehensive index databases as an alternative way for virtual topical data integration. The web-harvesting has been implemented and extended by not only specifying the targeted URLs, but also predefining human-edited harvesting parameters to improve the speed and accuracy. The harvesting parameter set comprises three main compo…
▽ More
The focused web-harvesting is deployed to realize an automated and comprehensive index databases as an alternative way for virtual topical data integration. The web-harvesting has been implemented and extended by not only specifying the targeted URLs, but also predefining human-edited harvesting parameters to improve the speed and accuracy. The harvesting parameter set comprises three main components. First, the depth-scale of being harvested final pages containing desired information counted from the first page at the targeted URLs. Secondly, the focus-point number to determine the exact box containing relevant information. Lastly, the combination of keywords to recognize encountered hyperlinks of relevant images or full-texts embedded in those final pages. All parameters are accessible and fully customizable for each target by the administrators of participating institutions over an integrated web interface. A real implementation to the Indonesian Scientific Index which covers all scientific information across Indonesia is also briefly introduced.
△ Less
Submitted 3 September, 2008;
originally announced September 2008.
-
GRID Architecture through a Public Cluster
Authors:
Z. Akbar,
L. T. Handoko
Abstract:
An architecture to enable some blocks consisting of several nodes in a public cluster connected to different grid collaborations is introduced. It is realized by inserting a web-service in addition to the standard Globus Toolkit. The new web-service performs two main tasks : authenticate the digital certificate contained in an incoming requests and forward it to the designated block. The appropr…
▽ More
An architecture to enable some blocks consisting of several nodes in a public cluster connected to different grid collaborations is introduced. It is realized by inserting a web-service in addition to the standard Globus Toolkit. The new web-service performs two main tasks : authenticate the digital certificate contained in an incoming requests and forward it to the designated block. The appropriate block is mapped with the username of the block's owner contained in the digital certificate. It is argued that this algorithm opens an opportunity for any blocks in a public cluster to join various global grids.
△ Less
Submitted 31 December, 2008; v1 submitted 31 March, 2008;
originally announced March 2008.
-
Web-based Interface in Public Cluster
Authors:
Z. Akbar,
L. T. Handoko
Abstract:
A web-based interface dedicated for cluster computer which is publicly accessible for free is introduced. The interface plays an important role to enable secure public access, while providing user-friendly computational environment for end-users and easy maintainance for administrators as well. The whole architecture which integrates both aspects of hardware and software is briefly explained. It…
▽ More
A web-based interface dedicated for cluster computer which is publicly accessible for free is introduced. The interface plays an important role to enable secure public access, while providing user-friendly computational environment for end-users and easy maintainance for administrators as well. The whole architecture which integrates both aspects of hardware and software is briefly explained. It is argued that the public cluster is globally a unique approach, and could be a new kind of e-learning system especially for parallel programming communities.
△ Less
Submitted 4 November, 2007;
originally announced November 2007.
-
Multi and Independent Block Approach in Public Cluster
Authors:
Z. Akbar,
L. T. Handoko
Abstract:
We present extended multi block approach in the LIPI Public Cluster. The multi block approach enables a cluster to be divided into several independent blocks which run jobs owned by different users simultaneously. Previously, we have maintained the blocks using single master node for all blocks due to efficiency and resource limitations. Following recent advancements and expansion of nodeś numbe…
▽ More
We present extended multi block approach in the LIPI Public Cluster. The multi block approach enables a cluster to be divided into several independent blocks which run jobs owned by different users simultaneously. Previously, we have maintained the blocks using single master node for all blocks due to efficiency and resource limitations. Following recent advancements and expansion of nodeś number, we have modified the multi block approach with multiple master nodes, each of them is responsible for a single block. We argue that this approach improves the overall performance significantly, for especially data intensive computational works.
△ Less
Submitted 14 September, 2007; v1 submitted 25 August, 2007;
originally announced August 2007.
-
Resource Allocation in Public Cluster with Extended Optimization Algorithm
Authors:
Z. Akbar,
L. T. Handoko
Abstract:
We introduce an optimization algorithm for resource allocation in the LIPI Public Cluster to optimize its usage according to incoming requests from users. The tool is an extended and modified genetic algorithm developed to match specific natures of public cluster. We present a detail analysis of optimization, and compare the results with the exact calculation. We show that it would be very usefu…
▽ More
We introduce an optimization algorithm for resource allocation in the LIPI Public Cluster to optimize its usage according to incoming requests from users. The tool is an extended and modified genetic algorithm developed to match specific natures of public cluster. We present a detail analysis of optimization, and compare the results with the exact calculation. We show that it would be very useful and could realize an automatic decision making system for public clusters.
△ Less
Submitted 8 August, 2007; v1 submitted 4 August, 2007;
originally announced August 2007.
-
Open and Free Cluster for Public
Authors:
Z. Akbar,
Slamet,
B. I. Ajinagoro,
G. I. Ohara,
I. Firmansyah,
B. Hermanto,
L. T. Handoko
Abstract:
We introduce the LIPI Public Cluster, the first parallel machine facility fully open for public and for free in Indonesia and surrounding countries. In this paper, we focus on explaining our globally new concept on open cluster, and how to realize and manage it to meet the users needs. We show that after 2 years trial running and several upgradings, the Public Cluster performs well and is able t…
▽ More
We introduce the LIPI Public Cluster, the first parallel machine facility fully open for public and for free in Indonesia and surrounding countries. In this paper, we focus on explaining our globally new concept on open cluster, and how to realize and manage it to meet the users needs. We show that after 2 years trial running and several upgradings, the Public Cluster performs well and is able to fulfil all requirements as expected.
△ Less
Submitted 4 August, 2007;
originally announced August 2007.
-
Public Cluster : parallel machine with multi-block approach
Authors:
Z. Akbar,
Slamet,
B. I. Ajinagoro,
G. I. Ohara,
I. Firmansyah,
B. Hermanto,
L. T. Handoko
Abstract:
We introduce a new approach to enable an open and public parallel machine which is accessible for multi users with multi jobs belong to different blocks running at the same time. The concept is required especially for parallel machines which are dedicated for public use as implemented at the LIPI Public Cluster. We have deployed the simplest technique by running multi daemons of parallel process…
▽ More
We introduce a new approach to enable an open and public parallel machine which is accessible for multi users with multi jobs belong to different blocks running at the same time. The concept is required especially for parallel machines which are dedicated for public use as implemented at the LIPI Public Cluster. We have deployed the simplest technique by running multi daemons of parallel processing engine with different configuration files specified for each user assigned to access the system, and also developed an integrated system to fully control and monitor the whole system over web. A brief performance analysis is also given for Message Parsing Interface (MPI) engine. It is shown that the proposed approach is quite reliable and affect the whole performances only slightly.
△ Less
Submitted 4 August, 2007;
originally announced August 2007.