Academic literature on the topic 'Slave-server'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Slave-server.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Slave-server"

1

Li, Rui, Shu Yong Song, Zhen Guo Ma, and Zi Ming Kou. "Design of Setting Management System of Relay Protection to Anti-Grade Trip in Coal Mine Based on Serial Communication." Applied Mechanics and Materials 415 (September 2013): 109–12. http://dx.doi.org/10.4028/www.scientific.net/amm.415.109.

Full text
Abstract:
Because of personnel deployment flow, protection equipment and electric device replacement, and enterprise scale expansion, setting management is more difficult. It is easy to be out of control and become the main reason for the anti-grade trip. To solve the anti-grade trip problem of setting mismanagement, this paper designed one setting management system, which is composed of slave controller and upper server. After analysis, the communication process based on the TCP/IP protocols, the communication scheme is chosen between slave controller and upper server. Software within upper server is designed based on database technology. Slave controller gets the setting from relay protection device, by using IEC 60870-5-103 protocols based on serial communication, and sends to the software within the upper server, which can monitor, display and record. Setting management problem was solved, which is caused by the personnel deployment flow, protection equipment replacement, and enterprise scale expansion. This method can be widely used.
APA, Harvard, Vancouver, ISO, and other styles
2

Kristian, Dolly Simon, Adian Fatchur Rochim, and Eko Didik Widianto. "Pengembangan Sistem Replikasi dan Redundansi untuk Meningkatkan Kehandalan Basisdata MySQL." Jurnal Teknologi dan Sistem Komputer 3, no. 4 (October 20, 2015): 523. http://dx.doi.org/10.14710/jtsiskom.3.4.2015.523-529.

Full text
Abstract:
With the development of information technology, humans make it easy to complete every duty. Any information about the work carried out to be very valuable, therefore the information should be stored properly, by organizing a reliable database system when performing data storage on the server information. Build a design application virtualization master slave database servers that are connected with the management node using the virtual application to get the test results replication system performance and redundancy in the design of the cluster system. Methodology of this research include the study of literature, collecting data by interview, observation, literature studies, system design, and testing of the system. In a literature study on the use of research methods to study the literature books, records that can be used as a support in the research. The design of this thesis using MySQL Cluster system with Ndbcluster engine. Last is testing this system on its performance on the server failure or failures occur and reliability in performance. The results obtained are when there is a failure on the primary server, it will be immediately replaced by another server is a slave. And the replication of data between the main server and slave.
APA, Harvard, Vancouver, ISO, and other styles
3

Song, Xin. "A Design of Boot over SRIO." Applied Mechanics and Materials 401-403 (September 2013): 1734–37. http://dx.doi.org/10.4028/www.scientific.net/amm.401-403.1734.

Full text
Abstract:
A server architecture composed of multiple embedded boards connected by serial RapidIO bus is proposed, and a solution of boot over serial RapidIO is provided. This solution can allow the master board to dynamically discover configure boot and release the slave boards according to service demands and provides all images to the slave boards. This architecture is reliable scalable and low power consumption.
APA, Harvard, Vancouver, ISO, and other styles
4

Xilong, Qu, Liu Shengzong, Fu Sha, He Hong, Hu Ying, and Xiao Leyi. "Design and Implementation of Wireless Environment Monitoring System Based on STM32." Scientific Programming 2021 (October 28, 2021): 1–15. http://dx.doi.org/10.1155/2021/6070664.

Full text
Abstract:
This paper first designed the overall scheme of a wireless-based intelligent environment monitoring system; this system is comprised of the following four parts: server part, client part, slave computer part, and master computer part. The master computer is equipped with a wireless transmission module and an LCD module. Slave computers are equipped with temperature-humidity sensing modules and wireless transmission modules. The server side has two major interfaces: data display and server establishment. An Android phone as the client can realize the communication between the mobile APP and server through network communication to obtain environmental data in real time. The hardware part of the system consists of wireless transmission module, temperature and humidity module, smoke module, lighting module, flame module, and LCD module. The software implementation part mainly includes the design and implementation of serial communication, the design and implementation of wireless communication, the design and implementation of collection of data acquisition in each sensor module, and the design and implementation of network communication as well as the design and implementation of display unit. With the cooperation of these four parts, we can automatically sense and control the state of the environment to realize human-computer interaction.
APA, Harvard, Vancouver, ISO, and other styles
5

Mufadhol, M. "CLONING HARDDISK MELALUI JARINGAN KOMPUTER DENGAN MENGGUNAKAN SOFTWARE GHOST." Jurnal Transformatika 7, no. 1 (July 8, 2009): 23. http://dx.doi.org/10.26623/transformatika.v7i1.39.

Full text
Abstract:
<span>Kloning adalah proses duplikat isi harddisk ke harddisk yang lain. Jadi isi kedua harddisk adalah sama persis. Kloning harddisk dilakukan untuk mempercepat proses instalasi perangkat lunak dengan spesifikasi hardware yang sama. Kloning harddisk melalui jaringan komputer dapat dilakukan dari harddisk master ke harddisk slave atau harddisk tujuan. Pada proses kloning harddisk melalui jaringan komputer hardis induk berada di komputer server saja sedangkan slave harddisk berada di komputer klien saja. Harddisk setiap komputer tidak perlu digandeng (diparalel). Dalam melakukan kloning harddisk melalui jaringan komputer diperlukan beberapa program aplikasi antara lain: Ghost Cast Server, Boot Wizard, LAN Boot Floppy Klien, Ghost Explore. Aplikasi yang sering digunakan untuk kloning adalah software Ghost yang dirilis oleh </span><em>Symantect Coorporation.</em>
APA, Harvard, Vancouver, ISO, and other styles
6

Yang, Jui-Pin. "A Novel Storage Virtualization Scheme for Network Storage Systems." International Journal on Recent and Innovation Trends in Computing and Communication 10, no. 1 (January 31, 2022): 08–13. http://dx.doi.org/10.17762/ijritcc.v10i1.5514.

Full text
Abstract:
The network storage systems are generally composed of clients, storage servers and metadata servers. In this paper, we proposed a novel storage virtualization (NSV) scheme which is capable of alleviating the heavy load of metadata server, guaranteeing the storage quality of service and dynamically adapting storage resources. The metadata server automatically constructs a dedicated storage cluster according to various requirements of storage quality of service. The storage cluster may consist of one to many storage servers which includes one master storage server and zero to many slave storage servers. In other words, a network storage system consists of at least one storage cluster. The requests of each client are forwarded to corresponding master storage server within a specific storage cluster. In addition, the master storage server determines the best storage server which handles the requests based on the conditions of storage servers. Next, the requests will be redirected to the selected storage server. Finally, the responses are directly transmitted to the client.
APA, Harvard, Vancouver, ISO, and other styles
7

Lukito, Rudy Santoso, Deddy Susilo, and F. Dalu Setiaji. "Sistem Monitoring Energi Lampu Penerangan Jalan Umum Berbasis Wireless Sensor Network dengan Topologi Mesh." Techné : Jurnal Ilmiah Elektroteknika 15, no. 01 (April 1, 2016): 39–46. http://dx.doi.org/10.31358/techne.v15i01.139.

Full text
Abstract:
Pada makalah ini dibuat suatu sistem untuk memantau energi listrik yang terpakai pada lampu penerangan jalan umum dan mengirimkan datanya, berbasis wireless sensor network dengan topologi mesh. Terdapat modul slave yang dipasang pada tiang lampu jalan yang terdiri dari sensor tegangan jala-jala PLN, sensor arus yang terpakai oleh lampu, dan sensor intensitas cahaya yang dihasilkan lampu. Mikrokontroler Arduino pro mini 3,3V 8MHz digunakan untuk mengolah data dari sensor sehingga dapat diketahui besarnya daya yang digunakan oleh lampu. Wireless sensor network dengan topologi mesh dirancang untuk untuk mengatasi gagalnya pengiriman data dari modul slave ke modul master di komputer server. Wireless sensor network dirancang menggunakan RF transceiver. Hasil pengujian menunjukkan sensor tegangan, arus dan intensitas cahaya memiliki ralat di bawah 3%. Perancangan wireless sensor network dengan topologi mesh berhasil direalisasikan, di mana ketika salah satu modul slave yang tidak berfungsi, semua data dari modul slave yang berfungsi tetap dapat diterima oleh modul master.
APA, Harvard, Vancouver, ISO, and other styles
8

Short, Michael. "Eligible earliest deadline first: Server-based scheduling for master-slave industrial wireless networks." Computers & Electrical Engineering 64 (November 2017): 305–21. http://dx.doi.org/10.1016/j.compeleceng.2017.08.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Xiong, Qi, Hong Bo Zhang, Zheng Bei Zhu, and Zu Ju Li. "Design of Streaming Media Cluster Server Based on MPI." Applied Mechanics and Materials 63-64 (June 2011): 643–46. http://dx.doi.org/10.4028/www.scientific.net/amm.63-64.643.

Full text
Abstract:
In recent years, cluster technology is used more wildly. In this paper, we present a new method to implement a streaming media cluster server. The server is constructed on a high performance cluster which consists of one control node, one storage node and 8 computing nodes. We wrote a parallel program with MPI which run on the cluster. The organization of MPI program is a master-slave scheme. The master interacted with users and scheduled task within slaves. Slaves called streaming media server which sent data directly to user. This can improve the system performance significantly. We can also guarantee the transparence of the service by single access point named IP Tunneling. The system was implemented under Linux platform and tested through simulation testing method. From the testing results, it can be confirmed that the whole system is well designed which achieves high performance, good robustness and high scalability.
APA, Harvard, Vancouver, ISO, and other styles
10

Prasetyo, Angga. "RANCANG BANGUN DATABASE DUA ARAH DENGAN KENDALI RASPBERRY PI PADA INTEGRASI SISTEM INFORMASI GEOGRAFIS PENYAKIT MENULAR." Simetris : Jurnal Teknik Mesin, Elektro dan Ilmu Komputer 7, no. 2 (November 1, 2016): 769. http://dx.doi.org/10.24176/simet.v7i2.793.

Full text
Abstract:
Puskesmas sebagai unit kesehatan tingkat pertama memiliki tugas pokok yaitu pengobatan, perawatan kesehatan, kesehatan lingkungan, membina kesehatan ibu dan anak, pencegahan penyakit menular, pencatatan dan pelaporan. Dari keseluruhan tugas tampaknya tidak seluruhnya digarap oleh puskesmas terutama pencatatan dan pelaporan untuk pencegahan penyakit menular serta pola penyebarannya. untuk mengawasi dan mengendalikan perencananan program kesehatan termasuk penekanan penyebaran penyakit menular, puskesmas belum memiliki alat bantu yang terintegrasi satu atap secara real time dengan dinas kesehatan, untuk itu dibutuhkan sistem informasi geografis (SIG) untuk memvisualisasikan data penyakit menular, hal ini juga perlu ditunjang perangkat yang optimal dengan biaya yang murah dengan menggunakan raspberry pi sebagai kendali otomasi server data dalam replikasi. Proses memanfaatkan replikasi database dua arah menggunakan dua server dengan server satu sebagai master sedangkan server lainnya berfungsi sebagai slave. Hasil pengujian replikasi pada transaction rate untuk meminimalkan antrian data node 1 pada nilai 1,99/detik setiap transaksi data, node 2 nilai 2,02/detik, sedangkan balancer dengan nilai 1,91/detik, sedangkan response time atau kecepatan replikasi database dalam menangkap dan mengirimkan data sangat efektif, pada node 1 0,33/s untuk kecepatan proses, node 2 dengan waktu 0,01/s, dan balancer 0,13/s. Kata kunci: puskesmas, replikasi database dua arah, penyakit menular, dinas kesehatan, sistem informasi geografis (SIG).
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Slave-server"

1

Merzky, Alexander. "LDAP UBIK Entwicklung einer SPOF-freien Methode zur Replikation von openLDAP-Server /." Master's thesis, Universitätsbibliothek Chemnitz, 2005. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200500593.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Afanasiev, S. V., S. A. Ivanets, and N. S. Poberezkyi. "Using Remote Hardware Education Kit to Study Electronics Courses." Thesis, 2020. https://openarchive.nure.ua/handle/document/17540.

Full text
Abstract:
Using of remote tools for studying courses in electronics (digital design or microcontroller programming) can increase the efficiency of student learning. RHE (Remote Hardware Education) is a set of software and hardware equipment. And also, to reduce the load on the use of hardware testing, which will entail a reduction in costs for the purchase of components.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Slave-server"

1

Krajewski, Markus. "Masters / Servants: Everyone Is a Subaltern." In The Server, translated by Ilinca Iurascu, 17–85. Yale University Press, 2018. http://dx.doi.org/10.12987/yale/9780300180817.003.0001.

Full text
Abstract:
This chapter provides a brief history of service, accompanied by a systematic effort to find what distinguishes the servant from related figures like the slave, the bondsman, the apprentice, or the assistant, in order to define what a servant actually is. Based on various external markers of distinction like the livery, subalterns can be classified into hierarchies whose logic and spatial organization will be discussed using the examples of baroque palaces and English manors. The chapter also analyzes the figure of the valet de chambre, as well as the relation of subalternity as a general structure that runs through all social ranks.
APA, Harvard, Vancouver, ISO, and other styles
2

Petersen, Wesley, and Peter Arbenz. "MIMD, Multiple Instruction, Multiple Data." In Introduction to Parallel Computing. Oxford University Press, 2004. http://dx.doi.org/10.1093/oso/9780198515760.003.0010.

Full text
Abstract:
The Multiple instruction, multiple data (MIMD) programming model usually refers to computing on distributed memory machines with multiple independent processors. Although processors may run independent instruction streams, we are interested in streams that are always portions of a single program. Between processors which share a coherent memory view (within a node), data access is immediate, whereas between nodes data access is effected by message passing. In this book, we use MPI for such message passing. MPI has emerged as a more/less standard message passing system used on both shared memory and distributed memory machines. It is often the case that although the system consists of multiple independent instruction streams, the programming model is not too different from SIMD. Namely, the totality of a program is logically split into many independent tasks each processed by a group (see Appendix D) of processes—but the overall program is effectively single threaded at the beginning, and likewise at the end. The MIMD model, however, is extremely flexible in that no one process is always master and the other processes slaves. A communicator group of processes performs certain tasks, usually with an arbitrary master/slave relationship. One process may be assigned to be master (or root) and coordinates the tasks of others in the group. We emphasize that the assignments of which is root is arbitrary—any processor may be chosen. Frequently, however, this choice is one of convenience—a file server node, for example. Processors and memory are connected by a network, for example, Figure 5.1. In this form, each processor has its own local memory. This is not always the case: The Cray X1, and NEC SX-6 through SX-8 series machines, have common memory within nodes. Within a node, memory coherency is maintained within local caches. Between nodes, it remains the programmer’s responsibility to assure a proper read–update relationship in the shared data. Data updated by one set of processes should not be clobbered by another set until the data are properly used.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Slave-server"

1

Zhang, Shilong, Quan Liu, Wenjun Xu, and Zaiqun Liu. "RFID Indoor Localization Using Master-Slave Reference Tags Scheme for Manufacturing Environment." In ASME 2014 International Manufacturing Science and Engineering Conference collocated with the JSME 2014 International Conference on Materials and Processing and the 42nd North American Manufacturing Research Conference. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/msec2014-4083.

Full text
Abstract:
In manufacturing process, the indoor location information of physical object is an essential part in storage and transport link. The efficient perception of indoor location is able to significantly reduce the system load and also improves its real-time performance. In this paper, a novel RFID indoor localization algorithm using Master-Slave reference tags scheme (MSRT) is presented. The algorithm divides the sensing area into several subspaces with master reference tags to realize rough location. In each subspaces, slave reference tags are used to perform partial location. A set of experiments have been conducted and the results demonstrate that the proposed method can reduce system redundancy and server load without decrement of accuracy.
APA, Harvard, Vancouver, ISO, and other styles
2

Ji, Jinlong, Xuhui Chen, Qianlong Wang, Lixing Yu, and Pan Li. "Learning to Learn Gradient Aggregation by Gradient Descent." In Twenty-Eighth International Joint Conference on Artificial Intelligence {IJCAI-19}. California: International Joint Conferences on Artificial Intelligence Organization, 2019. http://dx.doi.org/10.24963/ijcai.2019/363.

Full text
Abstract:
In the big data era, distributed machine learning emerges as an important learning paradigm to mine large volumes of data by taking advantage of distributed computing resources. In this work, motivated by learning to learn, we propose a meta-learning approach to coordinate the learning process in the master-slave type of distributed systems. Specifically, we utilize a recurrent neural network (RNN) in the parameter server (the master) to learn to aggregate the gradients from the workers (the slaves). We design a coordinatewise preprocessing and postprocessing method to make the neural network based aggregator more robust. Besides, to address the fault tolerance, especially the Byzantine attack, in distributed machine learning systems, we propose an RNN aggregator with additional loss information (ARNN) to improve the system resilience. We conduct extensive experiments to demonstrate the effectiveness of the RNN aggregator, and also show that it can be easily generalized and achieve remarkable performance when transferred to other distributed systems. Moreover, under majoritarian Byzantine attacks, the ARNN aggregator outperforms the Krum, the state-of-art fault tolerance aggregation method, by 43.14%. In addition, our RNN aggregator enables the server to aggregate gradients from variant local models, which significantly improve the scalability of distributed learning.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography