WorldWideScience

Sample records for linux ip masquerade

  1. IP Security für Linux

    Parthey, Mirko

    2001-01-01

    Die Nutzung des Internet für sicherheitskritische Anwendungen erfordert kryptographische Schutzmechanismen. IP Security (IPsec) definiert dafür geeignete Protokolle. Diese Arbeit gibt einen Überblick über IPsec. Eine IPsec-Implementierung für Linux (FreeS/WAN) wird auf Erweiterbarkeit und Praxistauglichkeit untersucht. Using the Internet in security-critical areas requires cryptographic protection, for which IP Security (IPsec) defines suitable protocols. This paper gives an overview of IP...

  2. Implementación del servicio de voz sobre IP en redes Linux y redes telefónicas análogas, utilizando software de comunicación sobre Linux

    Campos, Jorge Alberto; Guzmán, Mauricio Orlando; González Jiménez, Francisco Alirio

    2007-01-01

    Implementación del servicio de voz sobre IP en redes Linux y redes telefónicas análogas, utilizando software de comunicación sobre Linux La tecnología de voz sobre protocolos de comunicación TCP/IP (VoIP, Voice over IP) es la que permite la transmisión de la voz a través de redes digitales (LAN WAN, INTERNET, etc) en forma de paquetes de datos, utilizando para ello la infraestructura de intercambio de datos instalada. La telefonía IP es una aplicación inmediata de esta tecnología de forma ...

  3. IPs

    Fr. Ikenga

    special rights to the under-privileged IPs based on their culture, religion and .... and exploitation of natural resources, political determination and autonomy, .... supportive and sustaining.33Balancing individualism and communalism will avoid ...

  4. Linux bible

    Negus, Christopher

    2015-01-01

    The industry favorite Linux guide, updated for Red Hat Enterprise Linux 7 and the cloud Linux Bible, 9th Edition is the ultimate hands-on Linux user guide, whether you're a true beginner or a more advanced user navigating recent changes. This updated ninth edition covers the latest versions of Red Hat Enterprise Linux 7 (RHEL 7), Fedora 21, and Ubuntu 14.04 LTS, and includes new information on cloud computing and development with guidance on Openstack and Cloudforms. With a focus on RHEL 7, this practical guide gets you up to speed quickly on the new enhancements for enterprise-quality file s

  5. Linux Essentials

    Smith, Roderick W

    2012-01-01

    A unique, full-color introduction to Linux fundamentals Serving as a low-cost, secure alternative to expensive operating systems, Linux is a UNIX-based, open source operating system. Full-color and concise, this beginner's guide takes a learning-by-doing approach to understanding the essentials of Linux. Each chapter begins by clearly identifying what you will learn in the chapter, followed by a straightforward discussion of concepts that leads you right into hands-on tutorials. Chapters conclude with additional exercises and review questions, allowing you to reinforce and measure your underst

  6. Running Linux

    Dalheimer, Matthias Kalle

    2006-01-01

    The fifth edition of Running Linux is greatly expanded, reflecting the maturity of the operating system and the teeming wealth of software available for it. Hot consumer topics such as audio and video playback applications, groupware functionality, and spam filtering are covered, along with the basics in configuration and management that always made the book popular.

  7. APLIKASI SERVER VIRTUAL IP UNTUK MIKROKONTROLER

    Ashari, Ahmad

    2008-01-01

    Selama ini mikrokontroler yang terhubung ke satu komputer hanya dapat diakses melalui satu IP saja, padahal kebanyakan sistem operasi sekarang dapat memperjanjikan lebih dari satu IP untuk setiap komputer dalam bentuk virtual IP. Penelitian ini mengkaji pemanfaatan virtual IP dari IP aliasing pada sistem operasi Linux sebagai Server Virtual IP untuk mikrokontroler. Prinsip dasar Server Virtual IP adalah pembuatan Virtual Host pada masing-masing IP untuk memproses paket-paket data dan menerjem...

  8. Linux System Administration

    Adelstein, Tom

    2007-01-01

    If you're an experienced system administrator looking to acquire Linux skills, or a seasoned Linux user facing a new challenge, Linux System Administration offers practical knowledge for managing a complete range of Linux systems and servers. The book summarizes the steps you need to build everything from standalone SOHO hubs, web servers, and LAN servers to load-balanced clusters and servers consolidated through virtualization. Along the way, you'll learn about all of the tools you need to set up and maintain these working environments. Linux is now a standard corporate platform with user

  9. Linux Desktop Pocket Guide

    Brickner, David

    2005-01-01

    While Mac OS X garners all the praise from pundits, and Windows XP attracts all the viruses, Linux is quietly being installed on millions of desktops every year. For programmers and system administrators, business users, and educators, desktop Linux is a breath of fresh air and a needed alternative to other operating systems. The Linux Desktop Pocket Guide is your introduction to using Linux on five of the most popular distributions: Fedora, Gentoo, Mandriva, SUSE, and Ubuntu. Despite what you may have heard, using Linux is not all that hard. Firefox and Konqueror can handle all your web bro

  10. Beginning Ubuntu Linux

    Raggi, Emilio; Channelle, Andy; Parsons, Trevor; Van Vugt, Sander

    2010-01-01

    Ubuntu Linux is the fastest growing Linux-based operating system, and Beginning Ubuntu Linux, Fifth Edition teaches all of us - including those who have never used Linux - how to use it productively, whether you come from Windows or the Mac or the world of open source. Beginning Ubuntu Linux, Fifth Edition shows you how to take advantage of the newest Ubuntu release, Lucid Lynx. Based on the best-selling previous edition, Emilio Raggi maintains a fine balance between teaching Ubuntu and introducing new features. Whether you aim to use it in the home or in the office, you'll be introduced to th

  11. Linux utilities cookbook

    Lewis, James Kent

    2013-01-01

    A Cookbook-style guide packed with examples and illustrations, it offers organized learning through recipes and step-by-step instructions. The book is designed so that you can pick exactly what you need, when you need it.Written for anyone that would like to familiarize themselves with Linux. This book is perfect migrating from Windows to Linux and will save your time and money, learn exactly how to and where to begin working with Linux and troubleshooting in easy steps.

  12. Linux Networking Cookbook

    Schroder, Carla

    2008-01-01

    If you want a book that lays out the steps for specific Linux networking tasks, one that clearly explains the commands and configurations, this is the book for you. Linux Networking Cookbook is a soup-to-nuts collection of recipes that covers everything you need to know to perform your job as a Linux network administrator. You'll dive straight into the gnarly hands-on work of building and maintaining a computer network

  13. Pro Linux System Administration

    Turnbull, James

    2009-01-01

    We can all be Linux experts, provided we invest the time in learning the craft of Linux administration. Pro Linux System Administration makes it easy for small to medium--sized businesses to enter the world of zero--cost software running on Linux and covers all the distros you might want to use, including Red Hat, Ubuntu, Debian, and CentOS. Authors, and systems infrastructure experts James Turnbull, Peter Lieverdink, and Dennis Matotek take a layered, component--based approach to open source business systems, while training system administrators as the builders of business infrastructure. If

  14. Ubuntu Linux toolbox

    Negus, Christopher

    2012-01-01

    This bestseller from Linux guru Chris Negus is packed with an array of new and revised material As a longstanding bestseller, Ubuntu Linux Toolbox has taught you how to get the most out Ubuntu, the world?s most popular Linux distribution. With this eagerly anticipated new edition, Christopher Negus returns with a host of new and expanded coverage on tools for managing file systems, ways to connect to networks, techniques for securing Ubuntu systems, and a look at the latest Long Term Support (LTS) release of Ubuntu, all aimed at getting you up and running with Ubuntu Linux quickly.

  15. Minimalist's linux cluster

    Choi, Chang-Yeong; Kim, Jeong-Hyun; Kim, Seyong

    2004-01-01

    Using barebone PC components and NIC's, we construct a linux cluster which has 2-dimensional mesh structure. This cluster has smaller footprint, is less expensive, and use less power compared to conventional linux cluster. Here, we report our experience in building such a machine and discuss our current lattice project on the machine

  16. Linux Server Security

    Bauer, Michael D

    2005-01-01

    Linux consistently appears high up in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services such as DNS and delivering mail. But security is the foremost concern of anyone providing such a service. Any server experiences casual probe attempts dozens of time a day, and serious break-in attempts with some frequency as well. This highly regarded book, originally titled Building Secure Servers with Linux, combines practical advice with a firm knowledge of the technical tools needed to ensure security. The book focuses on the most common use of Linux--

  17. Embedded Linux platform for data acquisition systems

    Patel, Jigneshkumar J.; Reddy, Nagaraj; Kumari, Praveena; Rajpal, Rachana; Pujara, Harshad; Jha, R.; Kalappurakkal, Praveen

    2014-01-01

    Highlights: • The design and the development of data acquisition system on FPGA based reconfigurable hardware platform. • Embedded Linux configuration and compilation for FPGA based systems. • Hardware logic IP core and its Linux device driver development for the external peripheral to interface it with the FPGA based system. - Abstract: This scalable hardware–software system is designed and developed to explore the emerging open standards for data acquisition requirement of Tokamak experiments. To address the future need for a scalable data acquisition and control system for fusion experiments, we have explored the capability of software platform using Open Source Embedded Linux Operating System on a programmable hardware platform such as FPGA. The idea was to identify the platform which can be customizable, flexible and scalable to support the data acquisition system requirements. To do this, we have selected FPGA based reconfigurable and scalable hardware platform to design the system with Embedded Linux based operating system for flexibility in software development and Gigabit Ethernet interface for high speed data transactions. The proposed hardware–software platform using FPGA and Embedded Linux OS offers a single chip solution with processor, peripherals such ADC interface controller, Gigabit Ethernet controller, memory controller amongst other peripherals. The Embedded Linux platform for data acquisition is implemented and tested on a Virtex-5 FXT FPGA ML507 which has PowerPC 440 (PPC440) [2] hard block on FPGA. For this work, we have used the Linux Kernel version 2.6.34 with BSP support for the ML507 platform. It is downloaded from the Xilinx [1] GIT server. Cross-compiler tool chain is created using the Buildroot scripts. The Linux Kernel and Root File System are configured and compiled using the cross-tools to support the hardware platform. The Analog to Digital Converter (ADC) IO module is designed and interfaced with the ML507 through Xilinx

  18. Embedded Linux platform for data acquisition systems

    Patel, Jigneshkumar J., E-mail: jjp@ipr.res.in [Institute for Plasma Research, Gandhinagar, Gujarat (India); Reddy, Nagaraj, E-mail: nagaraj.reddy@coreel.com [Sandeepani School of Embedded System Design, Bangalore, Karnataka (India); Kumari, Praveena, E-mail: praveena@ipr.res.in [Institute for Plasma Research, Gandhinagar, Gujarat (India); Rajpal, Rachana, E-mail: rachana@ipr.res.in [Institute for Plasma Research, Gandhinagar, Gujarat (India); Pujara, Harshad, E-mail: pujara@ipr.res.in [Institute for Plasma Research, Gandhinagar, Gujarat (India); Jha, R., E-mail: rjha@ipr.res.in [Institute for Plasma Research, Gandhinagar, Gujarat (India); Kalappurakkal, Praveen, E-mail: praveen.k@coreel.com [Sandeepani School of Embedded System Design, Bangalore, Karnataka (India)

    2014-05-15

    Highlights: • The design and the development of data acquisition system on FPGA based reconfigurable hardware platform. • Embedded Linux configuration and compilation for FPGA based systems. • Hardware logic IP core and its Linux device driver development for the external peripheral to interface it with the FPGA based system. - Abstract: This scalable hardware–software system is designed and developed to explore the emerging open standards for data acquisition requirement of Tokamak experiments. To address the future need for a scalable data acquisition and control system for fusion experiments, we have explored the capability of software platform using Open Source Embedded Linux Operating System on a programmable hardware platform such as FPGA. The idea was to identify the platform which can be customizable, flexible and scalable to support the data acquisition system requirements. To do this, we have selected FPGA based reconfigurable and scalable hardware platform to design the system with Embedded Linux based operating system for flexibility in software development and Gigabit Ethernet interface for high speed data transactions. The proposed hardware–software platform using FPGA and Embedded Linux OS offers a single chip solution with processor, peripherals such ADC interface controller, Gigabit Ethernet controller, memory controller amongst other peripherals. The Embedded Linux platform for data acquisition is implemented and tested on a Virtex-5 FXT FPGA ML507 which has PowerPC 440 (PPC440) [2] hard block on FPGA. For this work, we have used the Linux Kernel version 2.6.34 with BSP support for the ML507 platform. It is downloaded from the Xilinx [1] GIT server. Cross-compiler tool chain is created using the Buildroot scripts. The Linux Kernel and Root File System are configured and compiled using the cross-tools to support the hardware platform. The Analog to Digital Converter (ADC) IO module is designed and interfaced with the ML507 through Xilinx

  19. Transmutations in Masquerade Costumes and Performances: An ...

    Masquerades or spirit manifests are uniquely ritualistic. Masquerade performances in African culture are symbolizations; they represent not only the physical and continuous presence of the ancestors but also their luminal sense of justice and equity. Masquerade, derived from mask presupposes that somebody's identity is ...

  20. Kali Linux CTF blueprints

    Buchanan, Cameron

    2014-01-01

    Taking a highly practical approach and a playful tone, Kali Linux CTF Blueprints provides step-by-step guides to setting up vulnerabilities, in-depth guidance to exploiting them, and a variety of advice and ideas to build and customising your own challenges. If you are a penetration testing team leader or individual who wishes to challenge yourself or your friends in the creation of penetration testing assault courses, this is the book for you. The book assumes a basic level of penetration skills and familiarity with the Kali Linux operating system.

  1. Linux Security Cookbook

    Barrett, Daniel J; Byrnes, Robert G

    2003-01-01

    Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject each time you pick up a book. Sometimes you want to get straight to the point. That's exactly what the new Linux Security Cookbook does. Rather than provide a total security solution for Linux computers, the authors present a series of easy-to-fol

  2. Kali Linux social engineering

    Singh, Rahul

    2013-01-01

    This book is a practical, hands-on guide to learning and performing SET attacks with multiple examples.Kali Linux Social Engineering is for penetration testers who want to use BackTrack in order to test for social engineering vulnerabilities or for those who wish to master the art of social engineering attacks.

  3. Faults in Linux

    Palix, Nicolas Jean-Michel; Thomas, Gaël; Saha, Suman

    2011-01-01

    In 2001, Chou et al. published a study of faults found by applying a static analyzer to Linux versions 1.0 through 2.4.1. A major result of their work was that the drivers directory contained up to 7 times more of certain kinds of faults than other directories. This result inspired a number...... of development and research efforts on improving the reliability of driver code. Today Linux is used in a much wider range of environments, provides a much wider range of services, and has adopted a new development and release model. What has been the impact of these changes on code quality? Are drivers still...... a major problem? To answer these questions, we have transported the experiments of Chou et al. to Linux versions 2.6.0 to 2.6.33, released between late 2003 and early 2010. We find that Linux has more than doubled in size during this period, but that the number of faults per line of code has been...

  4. Embedded Linux in het onderwijs

    Dr Ruud Ermers

    2008-01-01

    Embedded Linux wordt bij steeds meer grote bedrijven ingevoerd als embedded operating system. Binnen de opleiding Technische Informatica van Fontys Hogeschool ICT is Embedded Linux geïntroduceerd in samenwerking met het lectoraat Architectuur van Embedded Systemen. Embedded Linux is als vakgebied

  5. Communication to Linux users

    IT Department

    We would like to inform you that the aging “phone” Linux command will stop working: On lxplus on 30 November 2009, On lxbatch on 4 January 2010, and is replaced by the new “phonebook” command, currently available on SLC4 and SLC5 Linux. As the new “phonebook” command has different syntax and output formats from the “phone” command, please update and test all scripts currently using “phone” before the above dates. You can refer to the article published on the IT Service Status Board, under the Service Changes section. Please send any comments to it-dep-phonebook-feedback@cern.ch Best regards, IT-UDS User Support Section

  6. Pachydermoperiostosis Masquerading as Acromegaly.

    Karimova, Munira M; Halimova, Zamira Yu; Urmanova, Yulduz M; Korbonits, Márta; Cranston, Treena; Grossman, Ashley B

    2017-02-01

    Acromegaly usually is suspected on clinical grounds. Biochemical confirmation is required to optimize therapy, but there are other differential diagnoses. We describe a 24-year-old Uzbek man who presented with many clinical symptoms and signs of apparent acromegaly. On examination, the patient showed a rugose folding of his scalp, with the formation of tender, painful, rough skin folds in the parietal-occipital region, resembling cerebral gyri ( i.e. , cutis verticis gyrate). There was also a thickening and enlargement of the eyelids due to cartilaginous hypertrophy, dystrophic changes of the conjunctiva, and atrophy of the Meibomian glands, with the formation of multiple cysts and granulomas. He perspired excessively. There was thickening of the facial skin, with increased oiliness, increased rugosity, and seborrheic dermatitis. The skin over the hands was thick and apparently fixed to the underlying tissues. However, the patient had a low-normal insulin-like growth factor-1 level. More detailed analysis revealed a family history of relatives with similar problems, and certain features were not in keeping with this diagnosis. The disorder pachydermoperiostosis, or pulmonary hypertrophic osteoarthropathy, was suspected, and next-generation screening confirmed that the patient was homozygous for a pathogenic mutation in the SLCO2A1 gene, c.764G>A (p.Gly255Glu). The condition of pachydermoperiostosis may masquerade as acromegaly but is a genetic disorder, usually autosomal recessive, leading to elevated prostaglandin E2 levels. This is an important, albeit rare, differential diagnosis of acromegaly.

  7. Homicidal hanging masquerading as suicide

    Leth, Peter Mygind; Charles, Annie Vesterby

    1997-01-01

    Homicidal hanging is rare and presents special problems for the forensic pathologist. We report a case of homicide by hanging masquerading as suicide, in which the forensic evidence was of crucial importance. The victim was a 61 years old man, who was found in his house suspended by a rope around...

  8. Kali Linux cookbook

    Pritchett, Willie

    2013-01-01

    A practical, cookbook style with numerous chapters and recipes explaining the penetration testing. The cookbook-style recipes allow you to go directly to your topic of interest if you are an expert using this book as a reference, or to follow topics throughout a chapter to gain in-depth knowledge if you are a beginner.This book is ideal for anyone who wants to get up to speed with Kali Linux. It would also be an ideal book to use as a reference for seasoned penetration testers.

  9. IP Centrex

    Massa Torrelles, Roger

    2006-01-01

    Este documento recoge el trabajo realizado para diseñar e implementar una centralita o PBX para Telefonía IP basada en VoIP (Voz sobre IP) mediante SIP. Proporcionando una alternativa a las actuales centralitas de telefonía, basadas en hardware, que son caras y poco escalables. Se detallan los conceptos VoIP, IP Centrex, se plantean diferentes esquemas para el diseño de IP Centrex y se presentan los detalles de la implementación de IP Centrex. Para la implementación de IP...

  10. Primary hypothyroidism masquerading pituitary macroadenoma

    Agrawal Amit

    2014-03-01

    Full Text Available Diffuse and reactive pituitary gland enlargement secondary to primary hypothyroidism is an uncommon occurrence and that can masquerade many pituitary disorders. In present article, we report a case of 19 year female severe hypothyroidism presenting with diffuse enlargement of pituitary gland and hyperprolactinemia and review the clinical importance of this entity. Knowledge of this entity is very important to avoid unnecessary surgery and irreversible complications in this sub-group of patients.

  11. Primary hypothyroidism masquerading pituitary macroadenoma

    Agrawal Amit; Reddy Amareesh P.; Malleswara Rao G.; Reddy V. Umamaheswara

    2014-01-01

    Diffuse and reactive pituitary gland enlargement secondary to primary hypothyroidism is an uncommon occurrence and that can masquerade many pituitary disorders. In present article, we report a case of 19 year female severe hypothyroidism presenting with diffuse enlargement of pituitary gland and hyperprolactinemia and review the clinical importance of this entity. Knowledge of this entity is very important to avoid unnecessary surgery and irreversible complications in this sub-group of patients.

  12. Quality of service on Linux for the Atlas TDAQ event building network

    Yasu, Y.; Manabe, A.; Fujii, H.; Watase, Y.; Nagasaka, Y.; Hasegawa, Y.; Shimojima, M.; Nomachi, M.

    2001-01-01

    Congestion control for packets sent on a network is important for DAQ systems that contain an event builder using switching network technologies. Quality of Service (QoS) is a technique for congestion control. Recent Linux releases provide QoS in the kernel to manage network traffic. The authors have analyzed the packet-loss and packet distribution for the event builder prototype of the Atlas TDAQ system. The authors used PC/Linux with Gigabit Ethernet network as the testbed. The results showed that QoS using CBQ and TBF eliminated packet loss on UDP/IP transfer while the UDP/IP transfer in best effort made lots of packet loss. The result also showed that the QoS overhead was small. The authors concluded that QoS on Linux performed efficiently in TCP/IP and UDP/IP and will have an important role of the Atlas TDAQ system

  13. A General Purpose High Performance Linux Installation Infrastructure

    Wachsmann, Alf

    2002-01-01

    With more and more and larger and larger Linux clusters, the question arises how to install them. This paper addresses this question by proposing a solution using only standard software components. This installation infrastructure scales well for a large number of nodes. It is also usable for installing desktop machines or diskless Linux clients, thus, is not designed for cluster installations in particular but is, nevertheless, highly performant. The infrastructure proposed uses PXE as the network boot component on the nodes. It uses DHCP and TFTP servers to get IP addresses and a bootloader to all nodes. It then uses kickstart to install Red Hat Linux over NFS. We have implemented this installation infrastructure at SLAC with our given server hardware and installed a 256 node cluster in 30 minutes. This paper presents the measurements from this installation and discusses the bottlenecks in our installation

  14. Diskless Linux Cluster How-To

    Shumaker, Justin L

    2005-01-01

    Diskless linux clustering is not yet a turn-key solution. The process of configuring a cluster of diskless linux machines requires many modifications to the stock linux operating system before they can boot cleanly...

  15. Hypothalamic glioma masquerading as craniopharyngioma

    Sameer Vyas

    2013-01-01

    Full Text Available Hypothalamic glioma account for 10-15% of supratentorial tumors in children. They usually present earlier (first 5 years of age than craniopharyngioma. Hypothalamic glioma poses a diagnostic dilemma with craniopharyngioma and other hypothalamic region tumors, when they present with atypical clinical or imaging patterns. Neuroimaging modalities especially MRI plays a very important role in scrutinizing the lesions in the hypothalamic region. We report a case of a hypothalamic glioma masquerading as a craniopharyngioma on imaging along with brief review of both the tumors.

  16. Implementasi Sistem IP PBX menggunakan Briker

    DWI ARYANTA

    2017-06-01

    Full Text Available Abstrak VoIP (Voice over Internet Protocol adalah komunikasi suara jarak jauh yang digunakan melalui jaringan IP. Pada penelitian ini dirancang sistem IP PBX dengan menggunakan teknologi berbasis VoIP. IP PBX adalah perangkat switching komunikasi telepon dan data berbasis teknologi Internet Protocol (IP yang mengendalikan ekstension telepon analog maupun ekstension IP Phone. Software VirtualBox digunakan dengan tujuan agar lebih memudahkan dalam sistem pengoperasian Linux yang dimana program untuk membuat IP PBX adalah menggunakan Briker yang bekerja pada Operating System Linux 2.6. Setelah proses penginstalan Briker pada Virtualbox dilakukan implementasi jaringan IP PBX. Setelah mengimplementasikan jaringan IP PBX sesuai dengan topologi, kemudian melakukan pengujian success call rate dan analisis Quality of Service (QoS. Pengukuran QoS menggunakan parameter jitter, delay, dan packet loss yang dihasilkan dalam sistem IP PBX ini. Nilai jitter sesama user Briker (baik pada smartphone maupun komputer mempunyai rata-rata berada pada nilai 16,77 ms. Sedangkan nilai packetloss yang didapat pada saat terdapat pada saat user 1 sebagai pemanggil telepon adalah 0%. Sedangkan persentase packet loss pada saat user 1 sebagai penerima telepon adalah 0,01%. Nilai delay pada saat berkomunikasi antar user berada pada 11,75 ms. Secara keseluruhan nilai yang didapatkan melalui penelitian ini, dimana hasil pengujian parameter-parameter QOS sesuai dengan standar yang telah direkomendasikan oleh ITU dan didapatkan nilai QoS dengan hasil “baik”. Kata Kunci : Briker, VoIP, QoS, IP PBX, Smartphone. Abstract VoIP (Voice over Internet Protocol is a long-distance voice communications over IP networks are used. In this study, IP PBX systems designed using VoIP -based technologies. IP PBX is a telephone switching device and data communication technology-based Internet Protocol (IP which controls the analog phone extensions and IP Phone extensions. VirtualBox software is

  17. Linux all-in-one for dummies

    Dulaney, Emmett

    2014-01-01

    Eight minibooks in one volume cover every important aspect of Linux and everything you need to know to pass level-1 certification Linux All-in-One For Dummies explains everything you need to get up and running with the popular Linux operating system. Written in the friendly and accessible For Dummies style, the book ideal for new and intermediate Linux users, as well as anyone studying for level-1 Linux certification. The eight minibooks inside cover the basics of Linux, interacting with it, networking issues, Internet services, administration, security, scripting, and level-1 certification. C

  18. Channel Bonding in Linux Ethernet Environment using Regular Switching Hub

    Chih-wen Hsueh

    2004-06-01

    Full Text Available Bandwidth plays an important role for quality of service in most network systems. There are many technologies developed to increase host bandwidth in a LAN environment. Most of them need special hardware support, such as switching hub that supports IEEE Link Aggregation standard. In this paper, we propose a Linux solution to increase the bandwidth between hosts with multiple network adapters connected to a regular switching hub. The approach is implemented as two Linux kernel modules in a LAN environment without modification to the hardware and operating systems on host machines. Packets are dispatched to bonding network adapters for transmission. The proposed approach is backward compatible, flexible and transparent to users and only one IP address is needed for multiple bonding network adapters. Evaluation experiments in TCP and UDP transmission are shown with bandwidth gain proportionally to the number of network adapters. It is suitable for large-scale LAN systems with high bandwidth requirement, such as clustering systems.

  19. Analyzing Security-Enhanced Linux Policy Specifications

    Archer, Myla

    2003-01-01

    NSA's Security-Enhanced (SE) Linux enhances Linux by providing a specification language for security policies and a Flask-like architecture with a security server for enforcing policies defined in the language...

  20. Super computer made with Linux cluster

    Lee, Jeong Hun; Oh, Yeong Eun; Kim, Jeong Seok

    2002-01-01

    This book consists of twelve chapters, which introduce super computer made with Linux cluster. The contents of this book are Linux cluster, the principle of cluster, design of Linux cluster, general things for Linux, building up terminal server and client, Bear wolf cluster by Debian GNU/Linux, cluster system with red hat, Monitoring system, application programming-MPI, on set-up and install application programming-PVM, with PVM programming and XPVM application programming-open PBS with composition and install and set-up and GRID with GRID system, GSI, GRAM, MDS, its install and using of tool kit

  1. Linux Command Line and Shell Scripting Bible

    Blum, Richard

    2011-01-01

    The authoritative guide to Linux command line and shell scripting?completely updated and revised [it's not a guide to Linux as a whole ? just to scripting] The Linux command line allows you to type specific Linux commands directly to the system so that you can easily manipulate files and query system resources, thereby permitting you to automate commonly used functions and even schedule those programs to run automatically. This new edition is packed with new and revised content, reflecting the many changes to new Linux versions, including coverage of alternative shells to the default bash shel

  2. Membangun Sistem Linux Mandrake Minimal Menggunakan Inisial Disk Ram

    Wagito, Wagito

    2006-01-01

    Minimal Linux system is commonly used for special systems like router, gateway, Linux installer and diskless Linux system. Minimal Linux system is a Linux system that use a few facilities of all Linux capabilities. Mandrake Linux, as one of Linux distribution is able to perform minimal Linux system. RAM is a computer resource that especially used as main memory. A part of RAM's function can be changed into disk called RAM disk. This RAM disk can be used to run the Linux system. This ...

  3. MEMBANGUN SISTEM LINUX MANDRAKE MINIMAL MENGGUNAKAN INISIAL DISK RAM

    Wagito, Wagito

    2009-01-01

            Minimal Linux system is commonly used for special systems like router, gateway, Linux installer and diskless Linux system. Minimal Linux system is a Linux system that use a few facilities of all Linux capabilities. Mandrake Linux, as one of Linux distribution is able to perform minimal Linux system.         RAM is a computer resource that especially used as main memory. A  part of RAM’s function can be changed into disk called RAM disk. This RAM disk can be used to run the Linux syste...

  4. Mobile IP

    Heijenk, Geert; Sallent, S.; Pras, Aiko

    1999-01-01

    The Internet is growing exponentially, both in the amount of traffic carried, and in the amount of hosts connected. IP technology is becoming more and more important, in company networks (Intranets), and also in the core networks for the next generation mobile networks. Further, wireless access to

  5. Ifabiyi, IP

    Ifabiyi, IP. Vol 11, No 1 (2013) - Articles Analysis of the Impacts of Rainfall Variability on Public Water Supply in Ilorin, Nigeria Abstract. ISSN: 2006-7003. AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors · FAQ's · More about AJOL · AJOL's Partners · Terms and Conditions of ...

  6. MARS Code in Linux Environment

    Hwang, Moon Kyu; Bae, Sung Won; Jung, Jae Joon; Chung, Bub Dong [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)

    2005-07-01

    The two-phase system analysis code MARS has been incorporated into Linux system. The MARS code was originally developed based on the RELAP5/MOD3.2 and COBRA-TF. The 1-D module which evolved from RELAP5 alone could be applied for the whole NSSS system analysis. The 3-D module developed based on the COBRA-TF, however, could be applied for the analysis of the reactor core region where 3-D phenomena would be better treated. The MARS code also has several other code units that could be incorporated for more detailed analysis. The separate code units include containment analysis modules and 3-D kinetics module. These code modules could be optionally invoked to be coupled with the main MARS code. The containment code modules (CONTAIN and CONTEMPT), for example, could be utilized for the analysis of the plant containment phenomena in a coupled manner with the nuclear reactor system. The mass and energy interaction during the hypothetical coolant leakage accident could, thereby, be analyzed in a more realistic manner. In a similar way, 3-D kinetics could be incorporated for simulating the three dimensional reactor kinetic behavior, instead of using the built-in point kinetics model. The MARS code system, developed initially for the MS Windows environment, however, would not be adequate enough for the PC cluster system where multiple CPUs are available. When parallelism is to be eventually incorporated into the MARS code, MS Windows environment is not considered as an optimum platform. Linux environment, on the other hand, is generally being adopted as a preferred platform for the multiple codes executions as well as for the parallel application. In this study, MARS code has been modified for the adaptation of Linux platform. For the initial code modification, the Windows system specific features have been removed from the code. Since the coupling code module CONTAIN is originally in a form of dynamic load library (DLL) in the Windows system, a similar adaptation method

  7. MARS Code in Linux Environment

    Hwang, Moon Kyu; Bae, Sung Won; Jung, Jae Joon; Chung, Bub Dong

    2005-01-01

    The two-phase system analysis code MARS has been incorporated into Linux system. The MARS code was originally developed based on the RELAP5/MOD3.2 and COBRA-TF. The 1-D module which evolved from RELAP5 alone could be applied for the whole NSSS system analysis. The 3-D module developed based on the COBRA-TF, however, could be applied for the analysis of the reactor core region where 3-D phenomena would be better treated. The MARS code also has several other code units that could be incorporated for more detailed analysis. The separate code units include containment analysis modules and 3-D kinetics module. These code modules could be optionally invoked to be coupled with the main MARS code. The containment code modules (CONTAIN and CONTEMPT), for example, could be utilized for the analysis of the plant containment phenomena in a coupled manner with the nuclear reactor system. The mass and energy interaction during the hypothetical coolant leakage accident could, thereby, be analyzed in a more realistic manner. In a similar way, 3-D kinetics could be incorporated for simulating the three dimensional reactor kinetic behavior, instead of using the built-in point kinetics model. The MARS code system, developed initially for the MS Windows environment, however, would not be adequate enough for the PC cluster system where multiple CPUs are available. When parallelism is to be eventually incorporated into the MARS code, MS Windows environment is not considered as an optimum platform. Linux environment, on the other hand, is generally being adopted as a preferred platform for the multiple codes executions as well as for the parallel application. In this study, MARS code has been modified for the adaptation of Linux platform. For the initial code modification, the Windows system specific features have been removed from the code. Since the coupling code module CONTAIN is originally in a form of dynamic load library (DLL) in the Windows system, a similar adaptation method

  8. The Linux operating system: An introduction

    Bokhari, Shahid H.

    1995-01-01

    Linux is a Unix-like operating system for Intel 386/486/Pentium based IBM-PCs and compatibles. The kernel of this operating system was written from scratch by Linus Torvalds and, although copyrighted by the author, may be freely distributed. A world-wide group has collaborated in developing Linux on the Internet. Linux can run the powerful set of compilers and programming tools of the Free Software Foundation, and XFree86, a port of the X Window System from MIT. Most capabilities associated with high performance workstations, such as networking, shared file systems, electronic mail, TeX, LaTeX, etc. are freely available for Linux. It can thus transform cheap IBM-PC compatible machines into Unix workstations with considerable capabilities. The author explains how Linux may be obtained, installed and networked. He also describes some interesting applications for Linux that are freely available. The enormous consumer market for IBM-PC compatible machines continually drives down prices of CPU chips, memory, hard disks, CDROMs, etc. Linux can convert such machines into powerful workstations that can be used for teaching, research and software development. For professionals who use Unix based workstations at work, Linux permits virtually identical working environments on their personal home machines. For cost conscious educational institutions Linux can create world-class computing environments from cheap, easily maintained, PC clones. Finally, for university students, it provides an essentially cost-free path away from DOS into the world of Unix and X Windows.

  9. Kali Linux assuring security by penetration testing

    Ali, Shakeel; Allen, Lee

    2014-01-01

    Written as an interactive tutorial, this book covers the core of Kali Linux with real-world examples and step-by-step instructions to provide professional guidelines and recommendations for you. The book is designed in a simple and intuitive manner that allows you to explore the whole Kali Linux testing process or study parts of it individually.If you are an IT security professional who has a basic knowledge of Unix/Linux operating systems, including an awareness of information security factors, and want to use Kali Linux for penetration testing, then this book is for you.

  10. Visual Art Form in Motion: Traditional African masquerade as ...

    Masquerade is a moving art. When a masquerade performs on stage, the audience thinks mainly of the figure they see which is the visual art form. This figure is the focus of attention. But oftentimes, when people think of the works of visual arts that have to do with theatre performance, what readily comes to their mind are the ...

  11. Kali Linux wireless penetration testing essentials

    Alamanni, Marco

    2015-01-01

    This book is targeted at information security professionals, penetration testers and network/system administrators who want to get started with wireless penetration testing. No prior experience with Kali Linux and wireless penetration testing is required, but familiarity with Linux and basic networking concepts is recommended.

  12. Modeling Security-Enhanced Linux Policy Specifications for Analysis (Preprint)

    Archer, Myla; Leonard, Elizabeth; Pradella, Matteo

    2003-01-01

    Security-Enhanced (SE) Linux is a modification of Linux initially released by NSA in January 2001 that provides a language for specifying Linux security policies and, as in the Flask architecture, a security server...

  13. Linux command line and shell scripting bible

    Blum, Richard

    2014-01-01

    Talk directly to your system for a faster workflow with automation capability Linux Command Line and Shell Scripting Bible is your essential Linux guide. With detailed instruction and abundant examples, this book teaches you how to bypass the graphical interface and communicate directly with your computer, saving time and expanding capability. This third edition incorporates thirty pages of new functional examples that are fully updated to align with the latest Linux features. Beginning with command line fundamentals, the book moves into shell scripting and shows you the practical application

  14. The Research on Linux Memory Forensics

    Zhang, Jun; Che, ShengBing

    2018-03-01

    Memory forensics is a branch of computer forensics. It does not depend on the operating system API, and analyzes operating system information from binary memory data. Based on the 64-bit Linux operating system, it analyzes system process and thread information from physical memory data. Using ELF file debugging information and propose a method for locating kernel structure member variable, it can be applied to different versions of the Linux operating system. The experimental results show that the method can successfully obtain the sytem process information from physical memory data, and can be compatible with multiple versions of the Linux kernel.

  15. Understanding Collateral Evolution in Linux Device Drivers

    Padioleau, Yoann; Lawall, Julia Laetitia; Muller, Gilles

    2006-01-01

    no tools to help in this process, collateral evolution is thus time consuming and error prone.In this paper, we present a qualitative and quantitative assessment of collateral evolution in Linux device driver code. We provide a taxonomy of evolutions and collateral evolutions, and use an automated patch......-analysis tool that we have developed to measure the number of evolutions and collateral evolutions that affect device drivers between Linux versions 2.2 and 2.6. In particular, we find that from one version of Linux to the next, collateral evolutions can account for up to 35% of the lines modified in such code....

  16. Web penetration testing with Kali Linux

    Muniz, Joseph

    2013-01-01

    Web Penetration Testing with Kali Linux contains various penetration testing methods using BackTrack that will be used by the reader. It contains clear step-by-step instructions with lot of screenshots. It is written in an easy to understand language which will further simplify the understanding for the user.""Web Penetration Testing with Kali Linux"" is ideal for anyone who is interested in learning how to become a penetration tester. It will also help the users who are new to Kali Linux and want to learn the features and differences in Kali versus Backtrack, and seasoned penetration testers

  17. The Linux command line a complete introduction

    Shotts, William E

    2012-01-01

    You've experienced the shiny, point-and-click surface of your Linux computer—now dive below and explore its depths with the power of the command line. The Linux Command Line takes you from your very first terminal keystrokes to writing full programs in Bash, the most popular Linux shell. Along the way you'll learn the timeless skills handed down by generations of gray-bearded, mouse-shunning gurus: file navigation, environment configuration, command chaining, pattern matching with regular expressions, and more.

  18. LPI Linux Certification in a Nutshell

    Haeder, Adam; Pessanha, Bruno; Stanger, James

    2010-01-01

    Linux deployment continues to increase, and so does the demand for qualified and certified Linux system administrators. If you're seeking a job-based certification from the Linux Professional Institute (LPI), this updated guide will help you prepare for the technically challenging LPIC Level 1 Exams 101 and 102. The third edition of this book is a meticulously researched reference to these exams, written by trainers who work closely with LPI. You'll find an overview of each exam, a summary of the core skills you need, review questions and exercises, as well as a study guide, a practice test,

  19. Kali Linux wireless penetration testing beginner's guide

    Ramachandran, Vivek

    2015-01-01

    If you are a security professional, pentester, or anyone interested in getting to grips with wireless penetration testing, this is the book for you. Some familiarity with Kali Linux and wireless concepts is beneficial.

  20. Two-factor Authorization in Linux

    L. S. Nosov

    2010-03-01

    Full Text Available Identification and authentication realization in OS Linux on basis of external USB-device and on basis of PAM-module program realization by the example answer on control question (enigma is considered.

  1. The Linux farm at the RCF

    Chan, A.W.; Hogue, R.W.; Throwe, T.G.; Yanuklis, T.A.

    2001-01-01

    A description of the Linux Farm at the RHIC Computing Facility (RCF) is presented. The RCF is a dedicated data processing facility for RHIC, which became operational in the summer of 2000 at Brookhaven National Laboratory

  2. Tuning Linux to meet real time requirements

    Herbel, Richard S.; Le, Dang N.

    2007-04-01

    There is a desire to use Linux in military systems. Customers are requesting contractors to use open source to the maximal possible extent in contracts. Linux is probably the best operating system of choice to meet this need. It is widely used. It is free. It is royalty free, and, best of all, it is completely open source. However, there is a problem. Linux was not originally built to be a real time operating system. There are many places where interrupts can and will be blocked for an indeterminate amount of time. There have been several attempts to bridge this gap. One of them is from RTLinux, which attempts to build a microkernel underneath Linux. The microkernel will handle all interrupts and then pass it up to the Linux operating system. This does insure good interrupt latency; however, it is not free [1]. Another is RTAI, which provides a similar typed interface; however, the PowerPC platform, which is used widely in real time embedded community, was stated as "recovering" [2]. Thus this is not suited for military usage. This paper provides a method for tuning a standard Linux kernel so it can meet the real time requirement of an embedded system.

  3. Governance and associated social roles of masquerades among the ...

    PROMOTING ACCESS TO AFRICAN RESEARCH ... First is to verify and document governance and associated social roles played by masquerades ... The second objective is to account for how globalization has impacted on such roles of ...

  4. Evaluation of IP Portfolios

    Søberg, Peder Veng

    2009-01-01

    As a result of an inquiry concerning how to evaluate IP (intellectual property) portfolios in order to enable the best possible use of IP resources within organizations, an IP evaluation approach primarily applicable for patents and utility models is developed. The developed approach is useful...... of the organization owning the IP....

  5. PVM and IP multicast

    Dunigan, T.H.; Hall, K.A.

    1996-12-01

    This report describes a 1994 demonstration implementation of PVM that uses IP multicast. PVM`s one-to-many unicast implementation of its pvm{_}mcast() function is replaced with reliable IP multicast. Performance of PVM using IP multicast over local and wide-area networks is measured and compared with the original unicast implementation. Current limitations of IP multicast are noted.

  6. VoIP Security

    Fontanini, Piero

    2008-01-01

    VOIP or Voice Over Internet Protocol is a common term for phone service over IP based networks. There are much information about VoIP and some of how VoIP can be secured. There is however no standard for VoIP and no general solution for VoIP Security. The security in VoIP systems today are often non existing or in best case weak and often based on proprietary solutions. This master thesis investigates threats to VoIP system and describes existing alternatives for securing Vo...

  7. Replacing OSE with Real Time capable Linux

    Boman, Simon; Rutgersson, Olof

    2009-01-01

    For many years OSE has been a common used operating system, with real time extensions enhancements, in embed-ded systems. But in the last decades, Linux has grown and became a competitor to common operating systems and, in recent years, even as an operating system with real time extensions. With this in mind, ÅF was interested in replacing the quite expensive OSE with some distribution of the open source based Linux on a PowerPC MPC8360. Therefore, our purpose with thesis is to implement Linu...

  8. Research of Performance Linux Kernel File Systems

    Andrey Vladimirovich Ostroukh

    2015-10-01

    Full Text Available The article describes the most common Linux Kernel File Systems. The research was carried out on a personal computer, the characteristics of which are written in the article. The study was performed on a typical workstation running GNU/Linux with below characteristics. On a personal computer for measuring the file performance, has been installed the necessary software. Based on the results, conclusions and proposed recommendations for use of file systems. Identified and recommended by the best ways to store data.

  9. Mastering Kali Linux for advanced penetration testing

    Beggs, Robert W

    2014-01-01

    This book provides an overview of the kill chain approach to penetration testing, and then focuses on using Kali Linux to provide examples of how this methodology is applied in the real world. After describing the underlying concepts, step-by-step examples are provided that use selected tools to demonstrate the techniques. If you are an IT professional or a security consultant who wants to maximize the success of your network testing using some of the advanced features of Kali Linux, then this book is for you. This book will teach you how to become an expert in the pre-engagement, management,

  10. Python for Unix and Linux system administration

    Gift, Noah

    2007-01-01

    Python is an ideal language for solving problems, especially in Linux and Unix networks. With this pragmatic book, administrators can review various tasks that often occur in the management of these systems, and learn how Python can provide a more efficient and less painful way to handle them. Each chapter in Python for Unix and Linux System Administration presents a particular administrative issue, such as concurrency or data backup, and presents Python solutions through hands-on examples. Once you finish this book, you'll be able to develop your own set of command-line utilities with Pytho

  11. Linux software for large topology optimization problems

    evolving product, which allows a parallel solution of the PDE, it lacks the important feature that the matrix-generation part of the computations is localized to each processor. This is well-known to be critical for obtaining a useful speedup on a Linux cluster and it motivates the search for a COMSOL......-like package for large topology optimization problems. One candidate for such software is developed for Linux by Sandia Nat’l Lab in the USA being the Sundance system. Sundance also uses a symbolic representation of the PDE and a scalable numerical solution is achieved by employing the underlying Trilinos...

  12. Linux malware incident response an excerpt from malware forensic field guide for Linux systems

    Malin, Cameron H; Aquilina, James M

    2013-01-01

    Linux Malware Incident Response is a ""first look"" at the Malware Forensics Field Guide for Linux Systems, exhibiting the first steps in investigating Linux-based incidents. The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is a ""toolkit"" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. This compendium of tools for computer forensics analysts and investigators is presented in a succinct outline format with cross-references to suppleme

  13. Primary Vitreoretinal Lymphoma Masquerading as Refractory Retinitis

    Ofira Zloto

    2015-10-01

    Full Text Available Purpose: To report a case of a patient with primary vitreoretinal lymphoma masquerading as retinitis. Methods: Retrospective review of the patient's clinical, histopathological and imaging records. Results: Cytopathology was negative for malignancy, and preliminary polymerase chain reaction results supported the diagnosis of varicella zoster virus retinitis. Therefore, the patient was treated with antiviral therapy. However, under this treatment, the retinitis progressed. As a result, primary vitreoretinal lymphoma was suspected, and empirical treatment with intravitreal methotrexate injections was started. Under this treatment, the ocular features improved. Five months after initial ocular presentation and ocular resolution, the patient presented with central nervous system lymphoma. Conclusion: This case should raise the awareness of the variable clinical presentations, the challenging diagnosis and treatment of primary vitreoretinal lymphoma. All cases should be continuously systemically evaluated.

  14. Metastatic melanoma masquerading as a furuncle

    Imran Aslam

    2017-10-01

    Full Text Available Melanoma metastasizes to the skin in about 10-17% of patients. Although there are reports of metastatic melanoma masquerading as panniculitis and erysipelas, it is very uncommon for it to present as an inflammatory skin lesion. When malignant melanoma cells invade the superficial dermal lymphatic vessels it can result in erythema, edema and induration of the overlying skin. This presentation can be problematic for clinicians if they do not suspect melanoma and choose not to biopsy the lesion. We report a case of an elderly man with a history of invasive melanoma who presented with a furuncle-like lesion that was found to be in-transit metastatic melanoma.

  15. Using Linux PCs in DAQ applications

    Ünel, G; Beck, H P; Cetin, S A; Conka, T; Crone, G J; Fernandes, A; Francis, D; Joosb, M; Lehmann, G; López, J; Mailov, A A; Mapelli, Livio P; Mornacchi, Giuseppe; Niculescu, M; Petersen, J; Tremblet, L J; Veneziano, Stefano; Wildish, T; Yasu, Y

    2000-01-01

    ATLAS Data Acquisition/Event Filter "-1" (DAQ/EF1) project provides the opportunity to explore the use of commodity hardware (PCs) and Open Source Software (Linux) in DAQ applications. In DAQ/EF-1 there is an element called the LDAQ which is responsible for providing local run-control, error-handling and reporting for a number of read- out modules in front end crates. This element is also responsible for providing event data for monitoring and for the interface with the global control and monitoring system (Back-End). We present the results of an evaluation of the Linux operating system made in the context of DAQ/EF-1 where there are no strong real-time requirements. We also report on our experience in implementing the LDAQ on a VMEbus based PC (the VMIVME-7587) and a desktop PC linked to VMEbus with a Bit3 interface both running Linux. We then present the problems encountered during the integration with VMEbus, the status of the LDAQ implementation and draw some conclusions on the use of Linux in DAQ applica...

  16. Embedded Linux projects using Yocto project cookbook

    González, Alex

    2015-01-01

    If you are an embedded developer learning about embedded Linux with some experience with the Yocto project, this book is the ideal way to become proficient and broaden your knowledge with examples that are immediately applicable to your embedded developments. Experienced embedded Yocto developers will find new insight into working methodologies and ARM specific development competence.

  17. Kernel Korner : The Linux keyboard driver

    Brouwer, A.E.

    1995-01-01

    Our Kernel Korner series continues with an article describing the Linux keyboard driver. This article is not for "Kernel Hackers" only--in fact, it will be most useful to those who wish to use their own keyboard to its fullest potential, and those who want to write programs to take advantage of the

  18. Linux Incident Response Volatile Data Analysis Framework

    McFadden, Matthew

    2013-01-01

    Cyber incident response is an emphasized subject area in cybersecurity in information technology with increased need for the protection of data. Due to ongoing threats, cybersecurity imposes many challenges and requires new investigative response techniques. In this study a Linux Incident Response Framework is designed for collecting volatile data…

  19. [Making a low cost IPSec router on Linux and the assessment for practical use].

    Amiki, M; Horio, M

    2001-09-01

    We installed Linux and FreeS/WAN on a PC/AT compatible machine to make an IPSec router. We measured the time of ping/ftp, only in the university, between the university and the external network. Between the university and the external network (the Internet), there were no differences. Therefore, we concluded that CPU load was not remarkable at low speed networks, because packets exchanged via the Internet are small, or compressions of VPN are more effective than encoding and decoding. On the other hand, in the university, the IPSec router performed down about 20-30% compared with normal IP communication, but this is not a serious problem for practical use. Recently, VPN machines are becoming cheaper, but they do not function sufficiently to create a fundamental VPN environment. Therefore, if one wants a fundamental VPN environment at a low cost, we believe you should select a VPN router on Linux.

  20. Superiority of CT imaging reconstruction on Linux OS

    Lin Shaochun; Yan Xufeng; Wu Tengfang; Luo Xiaomei; Cai Huasong

    2010-01-01

    Objective: To compare the speed of CT reconstruction using the Linux and Windows OS. Methods: Shepp-Logan head phantom in different pixel size was projected to obtain the sinogram by using the inverse Fourier transformation, filtered back projection and Radon transformation on both Linux and Windows OS. Results: CT image reconstruction using the Linux operating system was significantly better and more efficient than Windows. Conclusion: CT image reconstruction using the Linux operating system is more efficient. (authors)

  1. Enforcing the use of API functions in Linux code

    Lawall, Julia; Muller, Gilles; Palix, Nicolas Jean-Michel

    2009-01-01

    In the Linux kernel source tree, header files typically define many small functions that have a simple behavior but are critical to ensure readability, correctness, and maintainability. We have observed, however, that some Linux code does not use these functions systematically. In this paper, we...... in the header file include/linux/usb.h....

  2. Mobile IP: Security & application

    Tuquerres, G.; Salvador, M.R.; Sprenkels, Ron

    1999-01-01

    As required in the TGS Mobile IP Advanced Module, this paper presents a survey of common security threats which mobile IP networks are exposed to as well as some proposed solutions to deal with such threats.

  3. Real Time Linux - The RTOS for Astronomy?

    Daly, P. N.

    The BoF was attended by about 30 participants and a free CD of real time Linux-based upon RedHat 5.2-was available. There was a detailed presentation on the nature of real time Linux and the variants for hard real time: New Mexico Tech's RTL and DIAPM's RTAI. Comparison tables between standard Linux and real time Linux responses to time interval generation and interrupt response latency were presented (see elsewhere in these proceedings). The present recommendations are to use RTL for UP machines running the 2.0.x kernels and RTAI for SMP machines running the 2.2.x kernel. Support, both academically and commercially, is available. Some known limitations were presented and the solutions reported e.g., debugging and hardware support. The features of RTAI (scheduler, fifos, shared memory, semaphores, message queues and RPCs) were described. Typical performance statistics were presented: Pentium-based oneshot tasks running > 30kHz, 486-based oneshot tasks running at ~ 10 kHz, periodic timer tasks running in excess of 90 kHz with average zero jitter peaking to ~ 13 mus (UP) and ~ 30 mus (SMP). Some detail on kernel module programming, including coding examples, were presented showing a typical data acquisition system generating simulated (random) data writing to a shared memory buffer and a fifo buffer to communicate between real time Linux and user space. All coding examples were complete and tested under RTAI v0.6 and the 2.2.12 kernel. Finally, arguments were raised in support of real time Linux: it's open source, free under GPL, enables rapid prototyping, has good support and the ability to have a fully functioning workstation capable of co-existing hard real time performance. The counter weight-the negatives-of lack of platforms (x86 and PowerPC only at present), lack of board support, promiscuous root access and the danger of ignorance of real time programming issues were also discussed. See ftp://orion.tuc.noao.edu/pub/pnd/rtlbof.tgz for the StarOffice overheads

  4. Ensuring Software IP Cleanliness

    Mahshad Koohgoli

    2007-12-01

    Full Text Available At many points in the life of a software enterprise, determination of intellectual property (IP cleanliness becomes critical. The value of an enterprise that develops and sells software may depend on how clean the software is from the IP perspective. This article examines various methods of ensuring software IP cleanliness and discusses some of the benefits and shortcomings of current solutions.

  5. Ensuring Software IP Cleanliness

    Mahshad Koohgoli; Richard Mayer

    2007-01-01

    At many points in the life of a software enterprise, determination of intellectual property (IP) cleanliness becomes critical. The value of an enterprise that develops and sells software may depend on how clean the software is from the IP perspective. This article examines various methods of ensuring software IP cleanliness and discusses some of the benefits and shortcomings of current solutions.

  6. Unicentric Castleman’s Disease Masquerading Pancreatic Neoplasm

    Saurabh Jain

    2012-01-01

    Full Text Available Castleman’s disease is a rare nonclonal proliferative disorder of the lymph nodes with an unknown etiology. Common locations of Castleman’s disease are mediastinum, neck, axilla, and abdomen. Castleman’s disease of a peripancreatic location masquerading as pancreatic neoplasm is an even rarer entity. On search of published data, we came across about 17 cases published on peripancreatic Castleman’s disease until now. Here we are reporting a case of retropancreatic Castleman's disease masquerading as retroperitoneal neoplasm in a 46-year-old male patient.

  7. Masquerade Syndrome of Multicentre Primary Central Nervous System Lymphoma

    Silvana Guerriero

    2011-01-01

    Full Text Available Purpose. In Italy we say that the most unlucky things can happen to physicians when they get sick, despite the attention of colleagues. To confirm this rumor, we report the sad story of a surgeon with bilateral vitreitis and glaucoma unresponsive to traditional therapies. Methods/Design. Case report. Results. After one year of steroidal and immunosuppressive therapy, a vitrectomy, and a trabeculectomy for unresponsive bilateral vitreitis and glaucoma, MRI showed a multicentre primary central nervous system lymphoma, which was the underlying cause of the masquerade syndrome. Conclusions. All ophthalmologists and clinicians must be aware of masquerade syndromes, in order to avoid delays in diagnosis.

  8. Preparing a scientific manuscript in Linux: Today's possibilities and limitations.

    Tchantchaleishvili, Vakhtang; Schmitto, Jan D

    2011-10-22

    Increasing number of scientists are enthusiastic about using free, open source software for their research purposes. Authors' specific goal was to examine whether a Linux-based operating system with open source software packages would allow to prepare a submission-ready scientific manuscript without the need to use the proprietary software. Preparation and editing of scientific manuscripts is possible using Linux and open source software. This letter to the editor describes key steps for preparation of a publication-ready scientific manuscript in a Linux-based operating system, as well as discusses the necessary software components. This manuscript was created using Linux and open source programs for Linux.

  9. Implementação de um sistema SIP para o sistema operacional Linux

    Davison Gonzaga da Silva

    2003-01-01

    Resumo: Este trabalho apresenta a implementação de um Sistema de VoIP usando o Protocolo SIP. Este Sistema SIP foi desenvolvido para o Linux, usando-se a linguagem C++ em conjunto com a biblioteca QT. O Sistema SIP é composto de três entidades básicas: o Terminal SIP, o Proxy e o Servidor de Registros. O Terminal SIP é a entidade responsável por estabelecer sessões SIP com outros Terminais SIP. Para o Terminal SIP, foi desenvolvida uma biblioteca de acesso à placa de áudio, que permite a modi...

  10. The visual and remote analyzing software for a Linux-based radiation information acquisition system

    Fan Zhaoyang; Zhang Li; Chen Zhiqiang

    2003-01-01

    A visual and remote analyzing software for the radiation information, which has the merit of universality and credibility, is developed based on the Linux operating system and the TCP/IP network protocol. The software is applied to visually debug and real time monitor of the high-speed radiation information acquisition system, and a safe, direct and timely control can assured. The paper expatiates the designing thought of the software, which provides the reference for other software with the same purpose for the similar systems

  11. Distributed MDSplus database performance with Linux clusters

    Minor, D.H.; Burruss, J.R.

    2006-01-01

    The staff at the DIII-D National Fusion Facility, operated for the USDOE by General Atomics, are investigating the use of grid computing and Linux technology to improve performance in our core data management services. We are in the process of converting much of our functionality to cluster-based and grid-enabled software. One of the most important pieces is a new distributed version of the MDSplus scientific data management system that is presently used to support fusion research in over 30 countries worldwide. To improve data handling performance, the staff is investigating the use of Linux clusters for both data clients and servers. The new distributed capability will result in better load balancing between these clients and servers, and more efficient use of network resources resulting in improved support of the data analysis needs of the scientific staff

  12. UNIX and Linux system administration handbook

    Nemeth, Evi; Hein, Trent R; Whaley, Ben; Mackin, Dan; Garnett, James; Branca, Fabrizio; Mouat, Adrian

    2018-01-01

    Now fully updated for today’s Linux distributions and cloud environments, it details best practices for every facet of system administration, including storage management, network design and administration, web hosting and scale-out, automation, configuration management, performance analysis, virtualization, DNS, security, management of IT service organizations, and much more. For modern system and network administrators, this edition contains indispensable new coverage of cloud deployments, continuous delivery, Docker and other containerization solutions, and much more.

  13. Dynamic masquerade with morphing three-dimensional skin in cuttlefish.

    Panetta, Deanna; Buresch, Kendra; Hanlon, Roger T

    2017-03-01

    Masquerade is a defence tactic in which a prey resembles an inedible or inanimate object thus causing predators to misclassify it. Most masquerade colour patterns are static although some species adopt postures or behaviours to enhance the effect. Dynamic masquerade in which the colour pattern can be changed is rare. Here we report a two-step sensory process that enables an additional novel capability known only in cuttlefish and octopus: morphing three-dimensional physical skin texture that further enhances the optical illusions created by coloured skin patterns. Our experimental design incorporated sequential sensory processes: addition of a three-dimensional rock to the testing arena, which attracted the cuttlefish to settle next to it; then visual processing by the cuttlefish of physical textures on the rock to guide expression of the skin papillae, which can range from fully relaxed (smooth skin) to fully expressed (bumpy skin). When a uniformly white smooth rock was presented, cuttlefish moved to the rock and deployed a uniform body pattern with mostly smooth skin. When a rock with small-scale fragments of contrasting shells was presented, the cuttlefish deployed mottled body patterns with strong papillae expression. These robust and reversible responses indicate a sophisticated visual sensorimotor system for dynamic masquerade. © 2017 The Author(s).

  14. Cleaning up a GNU/Linux operating system

    Oblak , Denis

    2018-01-01

    The aim of the thesis is to develop an application for cleaning up the Linux operating system that would be able to function on most distributions. The theoretical part discusses the cleaning of the Linux operating system that frees up disk space and allows a better functioning. The cleaning techniques and the existing tools for Linux are systematically reviewed and presented. The following part examines the cleaning of the Windows and MacOS operating systems. The thesis also compares all...

  15. Abstract of talk for Silicon Valley Linux Users Group

    Clanton, Sam

    2003-01-01

    The use of Linux for research at NASA Ames is discussed.Topics include:work with the Atmospheric Physics branch on software for a spectrometer to be used in the CRYSTAL-FACE mission this summer; work on in the Neuroengineering Lab with code IC including an introduction to the extension of the human senses project,advantages with using linux for real-time biological data processing,algorithms utilized on a linux system, goals of the project,slides of people with Neuroscan caps on, and progress that has been made and how linux has helped.

  16. Measuring performances of linux hyper visors

    Chierici, A.; Veraldi, R.; Salomoni, D.

    2009-01-01

    Virtualisation is a now proven software technology that is rapidly transforming the I T landscape and fundamentally changing the way people make computations and implement services. Recently, all major software producers (e.g., Microsoft and Red Hat) developed or acquired virtualisation technologies. Our institute (http://www.CNAF.INFN.it) is a Tier l for experiments carried on at the Large Hadron Collider at CERN (http://lhc.web.CERN.ch/lhc/) and is experiencing several benefits from virtualisation technologies, like improving fault tolerance, providing efficient hardware resource usage and increasing security. Currently, the virtualisation solution we adopted is xen, which is well supported by the Scientific Linux distribution, widely used by the High-Energy Physics (HEP) community. Since Scientific Linux is based on Red Hat E S, we felt the need to investigate performances and usability differences with the new k vm technology, recently acquired by Red Hat. The case study of this work is the Tier2 site for the LHCb experiment hosted at our institute; all major grid elements for this Tier2 run on xen virtual machines smoothly. We will investigate the impact on performance and stability that a migration to k vm would entail on the Tier2 site, as well as the effort required by a system administrator to deploy the migration.

  17. Voice over IP Security

    Keromytis, Angelos D

    2011-01-01

    Voice over IP (VoIP) and Internet Multimedia Subsystem technologies (IMS) are rapidly being adopted by consumers, enterprises, governments and militaries. These technologies offer higher flexibility and more features than traditional telephony (PSTN) infrastructures, as well as the potential for lower cost through equipment consolidation and, for the consumer market, new business models. However, VoIP systems also represent a higher complexity in terms of architecture, protocols and implementation, with a corresponding increase in the potential for misuse. In this book, the authors examine the

  18. Extracting Feature Model Changes from the Linux Kernel Using FMDiff

    Dintzner, N.J.R.; Van Deursen, A.; Pinzger, M.

    2014-01-01

    The Linux kernel feature model has been studied as an example of large scale evolving feature model and yet details of its evolution are not known. We present here a classification of feature changes occurring on the Linux kernel feature model, as well as a tool, FMDiff, designed to automatically

  19. Mimicry and masquerade from the avian visual perspective

    Mary Caswell STODDARD

    2012-08-01

    Full Text Available Several of the most celebrated examples of visual mimicry, like mimetic eggs laid by avian brood parasites and pala­table insects mimicking distasteful ones, involve signals directed at the eyes of birds. Despite this, studies of mimicry from the avian visual perspective have been rare, particularly with regard to defensive mimicry and masquerade. Defensive visual mimicry, which includes Batesian and Müllerian mimicry, occurs when organisms share a visual signal that functions to deter predators. Masquerade occurs when an organism mimics an inedible or uninteresting object, such as a leaf, stick, or pebble. In this paper, I present five case studies covering diverse examples of defensive mimicry and masquerade as seen by birds. The best-known cases of defensive visual mimicry typically come from insect prey, but birds themselves can exhibit defensive visual mimicry in an attempt to escape mobbing or dissuade avian predators. Using examples of defensive visual mimicry by both insects and birds, I show how quantitative models of avian color, luminance, and pattern vision can be used to enhance our understanding of mimicry in many systems and produce new hypotheses about the evolution and diversity of signals. Overall, I investigate examples of Batesian mimicry (1 and 2, Müllerian mimicry (3 and 4, and masquerade (5 as follows: 1 Polymorphic mimicry in African mocker swallowtail butterflies; 2 Cuckoos mimicking sparrowhawks; 3 Mimicry rings in Neotropical butterflies; 4 Plumage mimicry in toxic pitohuis; and 5 Dead leaf-mimicking butterflies and mantids [Current Zoology 58 (4: 630–648, 2012].

  20. Churg-Strauss syndrome masquerading as an acute coronary syndrome.

    Triantafyllis, Andreas S; Sakadakis, Eleftherios A; Papafilippaki, Argyro; Katsimbri, Pelagia; Panou, Fotios; Anastasiou-Nana, Maria; Lekakis, Ioannis

    2015-02-01

    Churg-Strauss Syndrome (CSS) is a rare vasculitis with multiorgan involvement. Cardiac manifestations are common causing serious complications. We report a case of CSS masquerading as a non-ST elevation myocardial infarction with heart failure. CSS should be considered in the differential diagnosis of an acute coronary syndrome(ACS)with normal coronary arteries when history of asthma, peripheral eosinophilia and multisystemic involvement is present.

  1. Agency IP Data

    National Aeronautics and Space Administration — Public data set for NASA Agency Intellectual Property (IP). The distribution contains both Patent information as well as General Release of Open Source Software.

  2. IP Infrastructure Geolocation

    2015-03-01

    by non-commercial enti- ties. HostiP is a community-driven geolocation service. It provides an Application Pro- gramming Interface ( API ) for...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS IP INFRASTRUCTURE GEOLOCATION Thesis Advisor: Second Reader: by Guan Yan Cai March...FUNDING NUMBERS IP INFRASTRUCfURE GEOLOCATION N66001-2250-59231 6. AUTHOR(S) Guan Yan Cai 7. PERFORMING ORGANIZATION NAME(S) AND AOORESS(ES) 9

  3. Fedora Bible 2010 Edition Featuring Fedora Linux 12

    Negus, Christopher

    2010-01-01

    The perfect companion for mastering the latest version of Fedora. As a free, open source Linux operating system sponsored by Red Hat, Fedora can either be a stepping stone to Enterprise or used as a viable operating system for those looking for frequent updates. Written by veteran authors of perennial bestsellers, this book serves as an ideal companion for Linux users and offers a thorough look at the basics of the new Fedora 12. Step-by-step instructions make the Linux installation simple while clear explanations walk you through best practices for taking advantage of the desktop interface. Y

  4. Web application security analysis using the Kali Linux operating system

    BABINCEV IVAN M.; VULETIC DEJAN V.

    2016-01-01

    The Kali Linux operating system is described as well as its purpose and possibilities. There are listed groups of tools that Kali Linux has together with the methods of their functioning, as well as a possibility to install and use tools that are not an integral part of Kali. The final part shows a practical testing of web applications using the tools from the Kali Linux operating system. The paper thus shows a part of the possibilities of this operating system in analaysing web applications ...

  5. A Quantitative Analysis of Variability Warnings in Linux

    Melo, Jean; Flesborg, Elvis; Brabrand, Claus

    2015-01-01

    In order to get insight into challenges with quality in highly-configurable software, we analyze one of the largest open source projects, the Linux kernel, and quantify basic properties of configuration-related warnings. We automatically analyze more than 20 thousand valid and distinct random...... configurations, in a computation that lasted more than a month. We count and classify a total of 400,000 warnings to get an insight in the distribution of warning types, and the location of the warnings. We run both on a stable and unstable version of the Linux kernel. The results show that Linux contains...

  6. Rebootless Linux Kernel Patching with Ksplice Uptrack at BNL

    Hollowell, Christopher; Pryor, James; Smith, Jason

    2012-01-01

    Ksplice/Oracle Uptrack is a software tool and update subscription service which allows system administrators to apply security and bug fix patches to the Linux kernel running on servers/workstations without rebooting them. The RHIC/ATLAS Computing Facility (RACF) at Brookhaven National Laboratory (BNL) has deployed Uptrack on nearly 2,000 hosts running Scientific Linux and Red Hat Enterprise Linux. The use of this software has minimized downtime, and increased our security posture. In this paper, we provide an overview of Ksplice's rebootless kernel patch creation/insertion mechanism, and our experiences with Uptrack.

  7. Shell Scripting Expert Recipes for Linux, Bash and more

    Parker, Steve

    2011-01-01

    A compendium of shell scripting recipes that can immediately be used, adjusted, and applied The shell is the primary way of communicating with the Unix and Linux systems, providing a direct way to program by automating simple-to-intermediate tasks. With this book, Linux expert Steve Parker shares a collection of shell scripting recipes that can be used as is or easily modified for a variety of environments or situations. The book covers shell programming, with a focus on Linux and the Bash shell; it provides credible, real-world relevance, as well as providing the flexible tools to get started

  8. Pro Oracle database 11g RAC on Linux

    Shaw, Steve

    2010-01-01

    Pro Oracle Database 11g RAC on Linux provides full-life-cycle guidance on implementing Oracle Real Application Clusters in a Linux environment. Real Application Clusters, commonly abbreviated as RAC, is Oracle's industry-leading architecture for scalable and fault-tolerant databases. RAC allows you to scale up and down by simply adding and subtracting inexpensive Linux servers. Redundancy provided by those multiple, inexpensive servers is the basis for the failover and other fault-tolerance features that RAC provides. Written by authors well-known for their talent with RAC, Pro Oracle Database

  9. Climate tools in mainstream Linux distributions

    McKinstry, Alastair

    2015-04-01

    Debian/meterology is a project to integrate climate tools and analysis software into the mainstream Debian/Ubuntu Linux distributions. This work describes lessons learnt, and recommends practices for scientific software to be adopted and maintained in OS distributions. In addition to standard analysis tools (cdo,, grads, ferret, metview, ncl, etc.), software used by the Earth System Grid Federation was chosen for integraion, to enable ESGF portals to be built on this base; however exposing scientific codes via web APIs enables security weaknesses, normally ignorable, to be exposed. How tools are hardened, and what changes are required to handle security upgrades, are described. Secondly, to enable libraries and components (e.g. Python modules) to be integrated requires planning by writers: it is not sufficient to assume users can upgrade their code when you make incompatible changes. Here, practices are recommended to enable upgrades and co-installability of C, C++, Fortran and Python codes. Finally, software packages such as NetCDF and HDF5 can be built in multiple configurations. Tools may then expect incompatible versions of these libraries (e.g. serial and parallel) to be simultaneously available; how this was solved in Debian using "pkg-config" and shared library interfaces is described, and best practices for software writers to enable this are summarised.

  10. Infecting Windows, Linux & Mac in one go

    Computer Security Team

    2012-01-01

    Still love bashing on Windows as you believe it is an insecure operating system? Hold on a second! Just recently, a vulnerability has been published for Java 7.   It affects Windows/Linux PCs and Macs, Internet Explorer, Safari and Firefox. In fact, it affects all computers that have enabled the Java 7 plug-in in their browser (Java 6 and earlier is not affected). Once you visit a malicious website (and there are plenty already out in the wild), your computer is infected… That's "Game Over" for you.      And this is not the first time. For a while now, attackers have not been targeting the operating system itself, but rather aiming at vulnerabilities inherent in e.g. your Acrobat Reader, Adobe Flash or Java programmes. All these are standard plug-ins added into your favourite web browser which make your web-surfing comfortable (or impossible when you un-install them). A single compromised web-site, however, is sufficient to prob...

  11. BSD Portals for LINUX 2.0

    McNab, A. David; woo, Alex (Technical Monitor)

    1999-01-01

    Portals, an experimental feature of 4.4BSD, extend the file system name space by exporting certain open () requests to a user-space daemon. A portal daemon is mounted into the file name space as if it were a standard file system. When the kernel resolves a pathname and encounters a portal mount point, the remainder of the path is passed to the portal daemon. Depending on the portal "pathname" and the daemon's configuration, some type of open (2) is performed. The resulting file descriptor is passed back to the kernel which eventually returns it to the user, to whom it appears that a "normal" open has occurred. A proxy portalfs file system is responsible for kernel interaction with the daemon. The overall effect is that the portal daemon performs an open (2) on behalf of the kernel, possibly hiding substantial complexity from the calling process. One particularly useful application is implementing a connection service that allows simple scripts to open network sockets. This paper describes the implementation of portals for LINUX 2.0.

  12. Evolution of Linux operating system network

    Xiao, Guanping; Zheng, Zheng; Wang, Haoqin

    2017-01-01

    Linux operating system (LOS) is a sophisticated man-made system and one of the most ubiquitous operating systems. However, there is little research on the structure and functionality evolution of LOS from the prospective of networks. In this paper, we investigate the evolution of the LOS network. 62 major releases of LOS ranging from versions 1.0 to 4.1 are modeled as directed networks in which functions are denoted by nodes and function calls are denoted by edges. It is found that the size of the LOS network grows almost linearly, while clustering coefficient monotonically decays. The degree distributions are almost the same: the out-degree follows an exponential distribution while both in-degree and undirected degree follow power-law distributions. We further explore the functionality evolution of the LOS network. It is observed that the evolution of functional modules is shown as a sequence of seven events (changes) succeeding each other, including continuing, growth, contraction, birth, splitting, death and merging events. By means of a statistical analysis of these events in the top 4 largest components (i.e., arch, drivers, fs and net), it is shown that continuing, growth and contraction events occupy more than 95% events. Our work exemplifies a better understanding and describing of the dynamics of LOS evolution.

  13. Open discovery: An integrated live Linux platform of Bioinformatics tools.

    Vetrivel, Umashankar; Pilla, Kalabharath

    2008-01-01

    Historically, live linux distributions for Bioinformatics have paved way for portability of Bioinformatics workbench in a platform independent manner. Moreover, most of the existing live Linux distributions limit their usage to sequence analysis and basic molecular visualization programs and are devoid of data persistence. Hence, open discovery - a live linux distribution has been developed with the capability to perform complex tasks like molecular modeling, docking and molecular dynamics in a swift manner. Furthermore, it is also equipped with complete sequence analysis environment and is capable of running windows executable programs in Linux environment. Open discovery portrays the advanced customizable configuration of fedora, with data persistency accessible via USB drive or DVD. The Open Discovery is distributed free under Academic Free License (AFL) and can be downloaded from http://www.OpenDiscovery.org.in.

  14. Real-time data collection in Linux: a case study.

    Finney, S A

    2001-05-01

    Multiuser UNIX-like operating systems such as Linux are often considered unsuitable for real-time data collection because of the potential for indeterminate timing latencies resulting from preemptive scheduling. In this paper, Linux is shown to be fully adequate for precisely controlled programming with millisecond resolution or better. The Linux system calls that subserve such timing control are described and tested and then utilized in a MIDI-based program for tapping and music performance experiments. The timing of this program, including data input and output, is shown to be accurate at the millisecond level. This demonstrates that Linux, with proper programming, is suitable for real-time experiment software. In addition, the detailed description and test of both the operating system facilities and the application program itself may serve as a model for publicly documenting programming methods and software performance on other operating systems.

  15. Lecture 11: Systemtap : Patching the linux kernel on the fly

    CERN. Geneva

    2013-01-01

    The presentation will describe the usage of Systemtap, in CERN Scientific Linux environment. Systemtap is a tool that allows developers and administrators to write and reuse simple scripts to deeply examine the activities of a live Linux system. We will go through the life cycle of a system tap module : creation, packaging, deployment. It will focus on how we used it recently at CERN as a workaround to patch a 0-day. Thomas Oulevey is a member if the IT department at CERN where he is an active member of the Linux team which supports 9’000 servers, 3’000 desktop systems and more than 5’000 active users. Before CERN he worked at the former astrophysics department of CERN, now called the European Southern Observatory, based in Chile. He was used to maintain the core telescope Linux systems and monitoring infrastructure.

  16. Linux containers networking: performance and scalability of kernel modules

    Claassen, J.; Koning, R.; Grosso, P.; Oktug Badonnel, S.; Ulema, M.; Cavdar, C.; Zambenedetti Granville, L.; dos Santos, C.R.P.

    2016-01-01

    Linux container virtualisation is gaining momentum as lightweight technology to support cloud and distributed computing. Applications relying on container architectures might at times rely on inter-container communication, and container networking solutions are emerging to address this need.

  17. After the first five years: central Linux support at DESY

    Knut Woller; Thorsten Kleinwort; Peter Jung

    2001-01-01

    The authors will describe how Linux is embedded into DESY's unix computing, their support concept and policies, tools used and developed, and the challenges which they are facing now that the number of supported PCs is rapidly approaching one thousand

  18. On methods to increase the security of the Linux kernel

    Matvejchikov, I.V.

    2014-01-01

    Methods to increase the security of the Linux kernel for the implementation of imposed protection tools have been examined. The methods of incorporation into various subsystems of the kernel on the x86 architecture have been described [ru

  19. Linux, OpenBSD, and Talisker: A Comparative Complexity Analysis

    Smith, Kevin

    2002-01-01

    .... Rigorous engineering principles are applicable across a broad range of systems. The purpose of this study is to analyze and compare three operating systems, including two general-purpose operating systems (Linux and OpenBSD...

  20. Linux vallutab arvutiilma / Scott Handy ; interv. Kristjan Otsmann

    Handy, Scott

    2000-01-01

    IBM tarkvaragrupi Linuxi lahenduste turundusdirektor S. Handy prognoosib, et kolme-nelja aasta pärast kasutab tasuta operatsioonisüsteemi Linux sama palju arvuteid kui Windowsi operatsioonisüsteemi

  1. Vabavarana levitatav Linux alles viib end massidesse / Erik Aru

    Aru, Erik

    2004-01-01

    Tasuta operatsioonisüsteem Linux leiab maailmas aina laialdasemat kasutust. Operatsioonisüsteemi eeldusteks peetakse töö- ja viirusekindlust. Lisad: Toshiba lahing DVD tuleviku pärast. Vastuseks vt. Maaleht 16. dets. lk. 12

  2. Mobile IP and protocol authentication extension

    Nguyen, Phuc V.

    2011-01-01

    Mobile IP is an open standard, defined by the Internet Engineering Task Force (IETF) RFC 3220. By using Mobile IP, you can keep the same IP address, stay connected, and maintain ongoing applications while roaming between IP networks. Mobile IP is scalable for the Internet because it is based on IP - any media that can support IP can support Mobile IP.

  3. Assessment of VME-PCI Interfaces with Linux Drivers

    Schossmater, K; CERN. Geneva

    2000-01-01

    Abstract This report summarises the performance measurements and experiences recorded by testing three commercial VME-PCI interfaces with their Linux drivers. These interfaces are manufactured by Wiener, National Instruments and SBS Bit 3. The developed C programs are reading/writing a VME memory in different transfer modes via these interfaces. A dual processor HP Kayak XA-s workstation was used with the CERN certified Red Hat Linux 6.1 running on it.

  4. Research on application of VME based embedded linux

    Ji Xiaolu; Ye Mei; Zhu Kejun; Li Xiaonan; Wang Yifang

    2010-01-01

    It describes the feasibility and realization of using embedded Linux in DAQ readout system of high energy physics experiment. The first part, the hardware and software framework is introduced. And then emphasis is placed on the key technologies during the system realization. The development is based on the VME bus and vme u niverse driver. Finally, the test result is presented: the readout system can work well in Embedded Linux OS. (authors)

  5. Argonne National Lab gets Linux network teraflop cluster

    2003-01-01

    "Linux NetworX, Salt Lake City, Utah, has delivered an Evolocity II (E2) Linux cluster to Argonne National Laboratory that is capable of performing more than one trillion calculations per second (1 teraFLOP). The cluster, named "Jazz" by Argonne, is designed to provide optimum performance for multiple disciplines such as chemistry, physics and reactor engineering and will be used by the entire scientific community at the Lab" (1 page).

  6. Digital signage sobre IP

    Casademont Filella, Albert

    2012-01-01

    Projecte que versa sobre el disseny i la implementació d'un sistema de Digital Signage (Cartelleria Digital) sobre IP, creant un gestor que permeti controlar de forma remota tot un conjunt de petits dispositius connectats a pantalles que emeten continguts multimèdia com vídeos, imatges, feeds rss...

  7. Ade-Ojo, IP

    Ade-Ojo, IP. Vol 40, No 2 (2013) - Articles Myasthenia gravis following chicken pox infection in a Nigerian primary school girl. Abstract PDF. ISSN: 0302-4660. AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors · FAQ's · More about AJOL · AJOL's Partners · Terms and Conditions ...

  8. Inflammatory demyelinating pseudotumor with hemorrhage masquerading high grade cerebral neoplasm

    Amit Agrawal

    2015-03-01

    Full Text Available Demyelinating pseudotumors are rare, benign, solitary intracranial space occupying lesions which masquerade cerebral neoplasms. Contrast MRI shows open ring enhancement which is fairly specific for this entity. Advanced MRI techniques like MR spectroscopy and magnetizing transfer techniques can help differentiating these lesions. NAA/Cr ratio is significantly elevated in central regions of demyelinating pseudotumors than in gliomas and other lesions. Presence of abundant foamy macrophages, lymphoid inflammatory infiltrates around blood vessels, sheets of gemistocytic astrocytes with well-developed processes, well defined border of the lesion absence of neovascularity and necrosis should help us diagnose demyelinating pseudotumor fairly confidently on histopathology.

  9. Idiopathic subvalvular aortic aneurysm masquerading as acute coronary syndrome.

    Natarajan, Balaji; Ramanathan, Sundar; Subramaniam, Natarajan; Janardhanan, Rajesh

    2016-09-02

    Subvalvular aneurysms are the least common type of left ventricular (LV) aneurysms and can be fatal. Subaortic LV aneurysms are much rarer than submitral LV aneurysms and mostly reported in infancy. They can be congenital or acquired secondary to infections, cardiac surgery or trauma. Here, we report a unique presentation of a large, idiopathic subaortic aneurysm in an adult masquerading as an acute coronary syndrome. Diagnosis was made with the help of a CT aortography. Aneurysm was surgically resected with good results. This case highlights the clinical presentation and management of subaortic aneurysms, an important differential for congenital aortic malformations. 2016 BMJ Publishing Group Ltd.

  10. Evaluation of mosix-Linux farm performances in GRID environment

    Barone, F.; Rosa, M.de; Rosa, R.de.; Eleuteri, A.; Esposito, R.; Mastroserio, P.; Milano, L.; Taurino, F.; Tortone, G.

    2001-01-01

    The MOSIX extensions to the Linux Operating System allow the creation of high-performance Linux Farms and an excellent integration of the several CPUs of the Farm, whose computational power can be furtherly increased and made more effective by networking them within the GRID environment. Following this strategy, the authors started to perform computational tests using two independent farms within the GRID environment. In particular, the authors performed a preliminary evaluation of the distributed computing efficiency with a MOSIX Linux farm in the simulation of gravitational waves data analysis from coalescing binaries. To this task, two different techniques were compared: the classical matched filters technique and one of its possible evolutions, based on a global optimisation technique

  11. Analysis of Linux kernel as a complex network

    Gao, Yichao; Zheng, Zheng; Qin, Fangyun

    2014-01-01

    Operating system (OS) acts as an intermediary between software and hardware in computer-based systems. In this paper, we analyze the core of the typical Linux OS, Linux kernel, as a complex network to investigate its underlying design principles. It is found that the Linux Kernel Network (LKN) is a directed network and its out-degree follows an exponential distribution while the in-degree follows a power-law distribution. The correlation between topology and functions is also explored, by which we find that LKN is a highly modularized network with 12 key communities. Moreover, we investigate the robustness of LKN under random failures and intentional attacks. The result shows that the failure of the large in-degree nodes providing basic services will do more damage on the whole system. Our work may shed some light on the design of complex software systems

  12. Servidor Linux para conexiones seguras de una LAN a Internet

    Escartín Vigo, José Antonio

    2005-01-01

    Este documento esta elaborado para describir la implementación de un servidor GNU/Linux, así como especificar y resolver los principales problemas que un administrador se encuentra al poner en funcionamiento un servidor. Se aprenderá a configurar un servidor GNU/Linux describiendo los principales servicios utilizados para compartir archivos, páginas web, correo y otros que veremos más adelante. La herramienta de configuración Webmin, que se detalla en uno de los últimos capítulos es indepe...

  13. Design and Implementation of Linux Access Control Model

    Wei Xiaomeng; Wu Yongbin; Zhuo Jingchuan; Wang Jianyun; Haliqian Mayibula

    2017-01-01

    In this paper,the design and implementation of an access control model for Linux system are discussed in detail. The design is based on the RBAC model and combines with the inherent characteristics of the Linux system,and the support for the process and role transition is added.The core idea of the model is that the file is divided into different categories,and access authority of every category is distributed to several roles.Then,roles are assigned to users of the system,and the role of the user can be transited from one to another by running the executable file.

  14. Using Vega Linux Cluster at Reactor Physics Dept

    Zefran, B.; Jeraj, R.; Skvarc, J.; Glumac, B.

    1999-01-01

    Experience using a Linux-based cluster for the reactor physics calculations are presented in this paper. Special attention is paid to the MCNP code in this environment and to practical guidelines how to prepare and use the paralel version of the code. Our results of a time comparison study are presented for two sets of inputs. The results are promising and speedup factor achieved on the Linux cluster agrees with previous tests on other parallel systems. We also tested tools for parallelization of other programs used at our Dept..(author)

  15. First experiences with large SAN storage and Linux

    Wezel, Jos van; Marten, Holger; Verstege, Bernhard; Jaeger, Axel

    2004-01-01

    The use of a storage area network (SAN) with Linux opens possibilities for scalable and affordable large data storage and poses a new challenge for cluster computing. The GridKa center uses a commercial parallel file system to create a highly available high-speed data storage using a combination of Fibre Channel (SAN) and Ethernet (LAN) to optimize between data throughput and costs. This article describes the design, implementation and optimizations of the GridKa storage solution which will offer over 400 TB online storage for 600 nodes. Presented are some throughput measurements of one of the largest Linux-based parallel storage systems in the world

  16. Foundations of hardware IP protection

    Torres, Lionel

    2017-01-01

    This book provides a comprehensive and up-to-date guide to the design of security-hardened, hardware intellectual property (IP). Readers will learn how IP can be threatened, as well as protected, by using means such as hardware obfuscation/camouflaging, watermarking, fingerprinting (PUF), functional locking, remote activation, hidden transmission of data, hardware Trojan detection, protection against hardware Trojan, use of secure element, ultra-lightweight cryptography, and digital rights management. This book serves as a single-source reference to design space exploration of hardware security and IP protection. · Provides readers with a comprehensive overview of hardware intellectual property (IP) security, describing threat models and presenting means of protection, from integrated circuit layout to digital rights management of IP; · Enables readers to transpose techniques fundamental to digital rights management (DRM) to the realm of hardware IP security; · Introduce designers to the concept of salutar...

  17. Teaching Hands-On Linux Host Computer Security

    Shumba, Rose

    2006-01-01

    In the summer of 2003, a project to augment and improve the teaching of information assurance courses was started at IUP. Thus far, ten hands-on exercises have been developed. The exercises described in this article, and presented in the appendix, are based on actions required to secure a Linux host. Publicly available resources were used to…

  18. Drowning in PC Management: Could a Linux Solution Save Us?

    Peters, Kathleen A.

    2004-01-01

    Short on funding and IT staff, a Western Canada library struggled to provide adequate public computing resources. Staff turned to a Linux-based solution that supports up to 10 users from a single computer, and blends Web browsing and productivity applications with session management, Internet filtering, and user authentication. In this article,…

  19. Fedora Linux A Complete Guide to Red Hat's Community Distribution

    Tyler, Chris

    2009-01-01

    Whether you are running the stable version of Fedora Core or bleeding-edge Rawhide releases, this book has something for every level of user. The modular, lab-based approach not only shows you how things work--but also explains why--and provides you with the answers you need to get up and running with Fedora Linux.

  20. Linux Adventures on a Laptop. Computers in Small Libraries

    Roberts, Gary

    2005-01-01

    This article discusses the pros and cons of open source software, such as Linux. It asserts that despite the technical difficulties of installing and maintaining this type of software, ultimately it is helpful in terms of knowledge acquisition and as a beneficial investment librarians can make in themselves, their libraries, and their patrons.…

  1. LHC@home online tutorial for Linux users - recording

    CERN. Geneva

    2016-01-01

    A step-by-step online tutorial for LHC@home by Karolina Bozek It contains detailed instructions for Linux users on how-to-join this volunteer computing project.  This 5' linked from http://lhcathome.web.cern.ch/join-us CLICK Here to see the commands to copy/paste for installing BOINC and the VirtualBox.

  2. The Linux kernel as flexible product-line architecture

    M. de Jonge (Merijn)

    2002-01-01

    textabstractThe Linux kernel source tree is huge ($>$ 125 MB) and inflexible (because it is difficult to add new kernel components). We propose to make this architecture more flexible by assembling kernel source trees dynamically from individual kernel components. Users then, can select what

  3. Argonne Natl Lab receives TeraFLOP Cluster Linux NetworX

    2002-01-01

    " Linux NetworX announced today it has delivered an Evolocity II (E2) Linux cluster to Argonne National Laboratory that is capable of performing more than one trillion calculations per second (1 teraFLOP)" (1/2 page).

  4. Remote Boot of a Diskless Linux Client for Operating System Integrity

    Allen, Bruce

    2002-01-01

    .... The diskless Linux client is organized to provide read-write files over NFS at home, read-only files over NFS for accessing bulky immutable utilities, and sone volatile RAM disk files to allow the Linux Kernel to boot...

  5. Identifying and quantifying recurrent novae masquerading as classical novae

    Pagnotta, Ashley; Schaefer, Bradley E.

    2014-01-01

    Recurrent novae (RNe) are cataclysmic variables with two or more nova eruptions within a century. Classical novae (CNe) are similar systems with only one such eruption. Many of the so-called CNe are actually RNe for which only one eruption has been discovered. Since RNe are candidate Type Ia supernova progenitors, it is important to know whether there are enough in our Galaxy to provide the supernova rate, and therefore to know how many RNe are masquerading as CNe. To quantify this, we collected all available information on the light curves and spectra of a Galactic, time-limited sample of 237 CNe and the 10 known RNe, as well as exhaustive discovery efficiency records. We recognize RNe as having (1) outburst amplitude smaller than 14.5 – 4.5 × log (t 3 ), (2) orbital period >0.6 days, (3) infrared colors of J – H > 0.7 mag and H – K > 0.1 mag, (4) FWHM of Hα > 2000 km s –1 , (5) high excitation lines, such as Fe X or He II near peak, (6) eruption light curves with a plateau, and (7) white dwarf mass greater than 1.2 M ☉ . Using these criteria, we identify V1721 Aql, DE Cir, CP Cru, KT Eri, V838 Her, V2672 Oph, V4160 Sgr, V4643 Sgr, V4739 Sgr, and V477 Sct as strong RN candidates. We evaluate the RN fraction among the known CNe using three methods to get 24% ± 4%, 12% ± 3%, and 35% ± 3%. With roughly a quarter of the 394 known Galactic novae actually being RNe, there should be approximately a hundred such systems masquerading as CNe.

  6. Genomic analysis identifies masqueraders of full-term cerebral palsy.

    Takezawa, Yusuke; Kikuchi, Atsuo; Haginoya, Kazuhiro; Niihori, Tetsuya; Numata-Uematsu, Yurika; Inui, Takehiko; Yamamura-Suzuki, Saeko; Miyabayashi, Takuya; Anzai, Mai; Suzuki-Muromoto, Sato; Okubo, Yukimune; Endo, Wakaba; Togashi, Noriko; Kobayashi, Yasuko; Onuma, Akira; Funayama, Ryo; Shirota, Matsuyuki; Nakayama, Keiko; Aoki, Yoko; Kure, Shigeo

    2018-05-01

    Cerebral palsy is a common, heterogeneous neurodevelopmental disorder that causes movement and postural disabilities. Recent studies have suggested genetic diseases can be misdiagnosed as cerebral palsy. We hypothesized that two simple criteria, that is, full-term births and nonspecific brain MRI findings, are keys to extracting masqueraders among cerebral palsy cases due to the following: (1) preterm infants are susceptible to multiple environmental factors and therefore demonstrate an increased risk of cerebral palsy and (2) brain MRI assessment is essential for excluding environmental causes and other particular disorders. A total of 107 patients-all full-term births-without specific findings on brain MRI were identified among 897 patients diagnosed with cerebral palsy who were followed at our center. DNA samples were available for 17 of the 107 cases for trio whole-exome sequencing and array comparative genomic hybridization. We prioritized variants in genes known to be relevant in neurodevelopmental diseases and evaluated their pathogenicity according to the American College of Medical Genetics guidelines. Pathogenic/likely pathogenic candidate variants were identified in 9 of 17 cases (52.9%) within eight genes: CTNNB1 , CYP2U1 , SPAST , GNAO1 , CACNA1A , AMPD2 , STXBP1 , and SCN2A . Five identified variants had previously been reported. No pathogenic copy number variations were identified. The AMPD2 missense variant and the splice-site variants in CTNNB1 and AMPD2 were validated by in vitro functional experiments. The high rate of detecting causative genetic variants (52.9%) suggests that patients diagnosed with cerebral palsy in full-term births without specific MRI findings may include genetic diseases masquerading as cerebral palsy.

  7. Generating a Corpus of Mobile Forensic Images for Masquerading user Experimentation.

    Guido, Mark; Brooks, Marc; Grover, Justin; Katz, Eric; Ondricek, Jared; Rogers, Marcus; Sharpe, Lauren

    2016-11-01

    The Periodic Mobile Forensics (PMF) system investigates user behavior on mobile devices. It applies forensic techniques to an enterprise mobile infrastructure, utilizing an on-device agent named TractorBeam. The agent collects changed storage locations for later acquisition, reconstruction, and analysis. TractorBeam provides its data to an enterprise infrastructure that consists of a cloud-based queuing service, relational database, and analytical framework for running forensic processes. During a 3-month experiment with Purdue University, TractorBeam was utilized in a simulated operational setting across 34 users to evaluate techniques to identify masquerading users (i.e., users other than the intended device user). The research team surmises that all masqueraders are undesirable to an enterprise, even when a masquerader lacks malicious intent. The PMF system reconstructed 821 forensic images, extracted one million audit events, and accurately detected masqueraders. Evaluation revealed that developed methods reduced storage requirements 50-fold. This paper describes the PMF architecture, performance of TractorBeam throughout the protocol, and results of the masquerading user analysis. © 2016 American Academy of Forensic Sciences.

  8. Feasibility study of BES data processing and physics analysis on a PC/Linux platform

    Rong Gang; He Kanglin; Zhao Jiawei; Heng Yuekun; Zhang Chun

    1999-01-01

    The authors report a feasibility study of off-line BES data processing (data reconstruction and Detector simulation) on a PC/Linux platform and an application of the PC/Linux system in D/Ds physics analysis. The authors compared the results obtained from the PC/Linux with that from HP workstation. It shows that PC/Linux platform can do BES data offline analysis as good as UNIX workstation do, but it is much powerful and economical

  9. Voice Quality Measuring Setup with Automatic Voice over IP Call Generator and Lawful Interception Packet Analyzer

    PLEVA Matus

    Full Text Available This paper describes the packet measuring laboratory setup, which could be used also for lawful interception applications, using professional packet analyzer, Voice over IP call generator, free call server (Asterisk linux setup and appropriate software and hardware described below. This setup was used for measuring the quality of the automatically generated VoIP calls under stressed network conditions, when the call manager server was flooded with high bandwidth traffic, near the bandwidth limit of the connected switch. The call generator realizes 30 calls simultaneously and the packet capturer & analyzercould decode the VoIP traffic, extract RTP session data, automatically analyze the voice quality using standardized MOS (Mean Opinion Score values and describe also the source of the voice degradation (jitter, packet loss, codec, delay, etc..

  10. Identification of a major IP5 kinase in Cryptococcus neoformans confirms that PP-IP5/IP7, not IP6, is essential for virulence

    Li, Cecilia; Lev, Sophie; Saiardi, Adolfo; Desmarini, Desmarini; Sorrell, Tania C.; Djordjevic, Julianne T.

    2016-01-01

    Fungal inositol polyphosphate (IP) kinases catalyse phosphorylation of IP3 to inositol pyrophosphate, PP-IP5/IP7, which is essential for virulence of Cryptococcus neoformans. Cryptococcal Kcs1 converts IP6 to PP-IP5/IP7, but the kinase converting IP5 to IP6 is unknown. Deletion of a putative IP5 kinase-encoding gene (IPK1) alone (ipk1?), and in combination with KCS1 (ipk1?kcs1?), profoundly reduced virulence in mice. However, deletion of KCS1 and IPK1 had a greater impact on virulence attenua...

  11. Beyond iPS!

    Editorial

    2012-01-01

    Full Text Available It’s undoubtedly a jubilant moment for scientists and clinicians working in the stem cell arena as Prof. Gurdon and Prof. Shinya Yamanaka have been chosen for the Nobel Prize in Physiology & Medicine this year. The mystery of cell biology is something unfathomable and probably the work of this duo as well as the other scientists, who have put their hands on in- vitro de-differentiation have opened our eyes to a new window or a new paradigm in cell biology. The iPS invention has brought a lot of hope in terms of potential direct benefits to treat several diseases, which have no definite options at the moment. But, we envisage that several spin-offs could come out of this invention and one very significant spin-off finding recently witnessed is the finding by Prof. Masaharu Seno and his team of researchers at the Okayama University, Japan (Chen L, et al. 2012, PLoS ONE 7(4:e33544.doi:10.1371/journal.pone.0033544. According to Prof. Seno, mouse iPS cells (miPS when cultured in the conditioned medium derived from cancer cell lines, differentiate into cancer stem cells (CSCs. While differentiating into CSCs, they do retain the potential to develop endothelial progenitor cells. Several questions arise here: 1.Are these miPS derived CSCs really pluripotent, even if the terminal differentiation destined to specific phenotypes? 2.Shouldn’t the Cancer Stem Cells be termed as cancer progenitor cells, as till date they are considered to be producing only cancer cells but not pluripotent to yield other types of normal tissues? The spin-offs could be infinite as the process of differentiation and de-differentiation happening due to trillions of signals and pathways, most still remaining not-so-well understood. A special mention should be made to Prof. Shinya Yamanaka as he has several sterling qualities to be a role-model for budding scientists. Apart from his passion for science, which made him shift his career from orthopedics to a cell biologist, his

  12. O Linux e a perspectiva da dádiva

    Renata Apgaua

    2004-06-01

    Full Text Available O objetivo deste trabalho é analisar o surgimento e consolidação do sistema operacional Linux em um contexto marcado pela hegemonia de sistemas operacionais comerciais, sendo o Windows/Microsoft o exemplo paradigmático. O idealizador do Linux optou por abrir o seu código-fonte e oferecê-lo, gratuitamente, na Internet. Desde então, pessoas de diversas partes do mundo têm participado do seu desenvolvimento. Busca-se, assim, através deste estudo, analisar as características desse espaço de sociabilidade, onde as trocas apontam para outra lógica que não a do mercado. A proposta de compreender os laços sociais no universo Linux, a partir da perspectiva da dádiva, acaba remetendo a outra discussão, que também merecerá atenção nesse estudo, qual seja: a atualidade da dádiva. Releituras de Mauss, feitas por Godbout e Caillé, indicam que a dádiva, em seu "sistema de transformações", encontra-se presente nas sociedades contemporâneas, mas não apenas nos interstícios sociais, conforme afirmava o próprio Mauss.This work's goal is to analyze the appearance and consolidation of the Linux operational system in a context marked by the hegemony of commercial operational systems, taking the Windows/Microsoft as the paradigmatic example. The creator of Linux chose to make it open-source and offer it free of charge, in the Internet. Since then, people from the various parts of the world have participated in its development. This study, therefore, seeks to analyse the features of this space of sociability, where the exchange points to another logic different of that one adopted by the market. The proposal of comprehending the social ties of the Linux universe through the perspective of gift ends up sending us into another discussion, which will also deserve attention in this study, that would be: the recentness of gift. Re-interpretations of Mauss, made by Godbout and Caillé, indicate that gif, in its "changing system", is present in

  13. Installing, Running and Maintaining Large Linux Clusters at CERN

    Bahyl, V; van Eldik, Jan; Fuchs, Ulrich; Kleinwort, Thorsten; Murth, Martin; Smith, Tim; Bahyl, Vladimir; Chardi, Benjamin; Eldik, Jan van; Fuchs, Ulrich; Kleinwort, Thorsten; Murth, Martin; Smith, Tim

    2003-01-01

    Having built up Linux clusters to more than 1000 nodes over the past five years, we already have practical experience confronting some of the LHC scale computing challenges: scalability, automation, hardware diversity, security, and rolling OS upgrades. This paper describes the tools and processes we have implemented, working in close collaboration with the EDG project [1], especially with the WP4 subtask, to improve the manageability of our clusters, in particular in the areas of system installation, configuration, and monitoring. In addition to the purely technical issues, providing shared interactive and batch services which can adapt to meet the diverse and changing requirements of our users is a significant challenge. We describe the developments and tuning that we have introduced on our LSF based systems to maximise both responsiveness to users and overall system utilisation. Finally, this paper will describe the problems we are facing in enlarging our heterogeneous Linux clusters, the progress we have ...

  14. Operational Numerical Weather Prediction systems based on Linux cluster architectures

    Pasqui, M.; Baldi, M.; Gozzini, B.; Maracchi, G.; Giuliani, G.; Montagnani, S.

    2005-01-01

    The progress in weather forecast and atmospheric science has been always closely linked to the improvement of computing technology. In order to have more accurate weather forecasts and climate predictions, more powerful computing resources are needed, in addition to more complex and better-performing numerical models. To overcome such a large computing request, powerful workstations or massive parallel systems have been used. In the last few years, parallel architectures, based on the Linux operating system, have been introduced and became popular, representing real high performance-low cost systems. In this work the Linux cluster experience achieved at the Laboratory far Meteorology and Environmental Analysis (LaMMA-CNR-IBIMET) is described and tips and performances analysed

  15. LXtoo: an integrated live Linux distribution for the bioinformatics community.

    Yu, Guangchuang; Wang, Li-Gen; Meng, Xiao-Hua; He, Qing-Yu

    2012-07-19

    Recent advances in high-throughput technologies dramatically increase biological data generation. However, many research groups lack computing facilities and specialists. This is an obstacle that remains to be addressed. Here, we present a Linux distribution, LXtoo, to provide a flexible computing platform for bioinformatics analysis. Unlike most of the existing live Linux distributions for bioinformatics limiting their usage to sequence analysis and protein structure prediction, LXtoo incorporates a comprehensive collection of bioinformatics software, including data mining tools for microarray and proteomics, protein-protein interaction analysis, and computationally complex tasks like molecular dynamics. Moreover, most of the programs have been configured and optimized for high performance computing. LXtoo aims to provide well-supported computing environment tailored for bioinformatics research, reducing duplication of efforts in building computing infrastructure. LXtoo is distributed as a Live DVD and freely available at http://bioinformatics.jnu.edu.cn/LXtoo.

  16. ISAC EPICS on Linux: the march of the penguins

    Richards, J.; Nussbaumer, R.; Rapaz, S.; Waters, G.

    2012-01-01

    The DC linear accelerators of the ISAC radioactive beam facility at TRIUMF do not impose rigorous timing constraints on the control system. Therefore a real-time operating system is not essential for device control. The ISAC Control System is completing a move to the use of the Linux operating system for hosting all EPICS IOCs. The IOC platforms include GE-Fanuc VME based CPUs for control of most optics and diagnostics, rack mounted servers for supervising PLCs, small desktop PCs for GPIB and RS232 instruments, as well as embedded ARM processors controlling CAN-bus devices that provide a suitcase sized control system. This article focuses on the experience of creating a customized Linux distribution for front-end IOC deployment. Rationale, a road-map of the process, and efficiency advantages in personnel training and system management realized by using a single OS will be discussed. (authors)

  17. A embedded Linux system based on PowerPC

    Ye Mei; Zhao Jingwei; Chu Yuanping

    2006-01-01

    The authors will introduce a Embedded Linux System based on PowerPC as well as the base method on how to establish the system. The goal of the system is to build a test system of VMEbus device. It also can be used to setup the small data acquisition and control system. Two types of compiler are provided by the developer system according to the features of the system and the Power PC. At the top of the article some typical embedded Operation system will be introduced and the features of different system will be provided. And then the method on how to build a embedded Linux system as well as the key technique will be discussed in detail. Finally a successful read-write example will be given based on the test system. (authors)

  18. Gevaar VoIP voor telecomsector overdreven

    Deventer, M.O. van; Wegberg, M. van

    2004-01-01

    Het is een hype Voice-over-IP (VoIP) voor te stellen als een ontwrichtende technologie die de telecomindustrie ingrijpend zal veranderen. Maar hoe ontwrichtend is VoIP eigenlijk? Oskar van Deventer en Marc van Wegberg analyseren drie vormen van VoIP en laten zien dat alleen ‘VoIP-chat’ potentieel

  19. LightNVM: The Linux Open-Channel SSD Subsystem

    Bjørling, Matias; Gonzalez, Javier; Bonnet, Philippe

    2017-01-01

    resource utilization. We propose that SSD management trade-offs should be handled through Open-Channel SSDs, a new class of SSDs, that give hosts control over their internals. We present our experience building LightNVM, the Linux Open-Channel SSD subsystem. We introduce a new Physical Page Ad- dress I...... to limit read latency variability and that it can be customized to achieve predictable I/O latencies....

  20. Diversifying the Department of Defense Network Enterprise with Linux

    2010-03-01

    protection of DoD infrastructure. In the competitive marketplace, strategy is defined as a firm’s theory on how it gains high levels of performance...practice of discontinuing support to legacy systems. Microsoft also needs to convey it was in the user’s best interest to upgrade the operating... stockholders , Microsoft acknowledged recent notable competitors in the market place threatening their long time monopolistic enterprise. Linux (a popular

  1. Developing and Benchmarking Native Linux Applications on Android

    Batyuk, Leonid; Schmidt, Aubrey-Derrick; Schmidt, Hans-Gunther; Camtepe, Ahmet; Albayrak, Sahin

    Smartphones get increasingly popular where more and more smartphone platforms emerge. Special attention was gained by the open source platform Android which was presented by the Open Handset Alliance (OHA) hosting members like Google, Motorola, and HTC. Android uses a Linux kernel and a stripped-down userland with a custom Java VM set on top. The resulting system joins the advantages of both environments, while third-parties are intended to develop only Java applications at the moment.

  2. A camac data acquisition system based on PC-Linux

    Ribas, R.V.

    2002-01-01

    A multi-parametric data acquisition system for Nuclear Physics experiments using camac instrumentation on a personal computer with the Linux operating system in described. The system is very reliable, inexpensive and is capable of handling event rates up to 4-6 k events/s. In the present version, the maximum number of parameters to be acquired is limited only by the number of camac modules that can be fitted in one camac crate

  3. The performance analysis of linux networking - packet receiving

    Wu, Wenji; Crawford, Matt; Bowden, Mark; /Fermilab

    2006-11-01

    The computing models for High-Energy Physics experiments are becoming ever more globally distributed and grid-based, both for technical reasons (e.g., to place computational and data resources near each other and the demand) and for strategic reasons (e.g., to leverage equipment investments). To support such computing models, the network and end systems, computing and storage, face unprecedented challenges. One of the biggest challenges is to transfer scientific data sets--now in the multi-petabyte (10{sup 15} bytes) range and expected to grow to exabytes within a decade--reliably and efficiently among facilities and computation centers scattered around the world. Both the network and end systems should be able to provide the capabilities to support high bandwidth, sustained, end-to-end data transmission. Recent trends in technology are showing that although the raw transmission speeds used in networks are increasing rapidly, the rate of advancement of microprocessor technology has slowed down. Therefore, network protocol-processing overheads have risen sharply in comparison with the time spent in packet transmission, resulting in degraded throughput for networked applications. More and more, it is the network end system, instead of the network, that is responsible for degraded performance of network applications. In this paper, the Linux system's packet receive process is studied from NIC to application. We develop a mathematical model to characterize the Linux packet receiving process. Key factors that affect Linux systems network performance are analyzed.

  4. Linux real-time framework for fusion devices

    Neto, Andre [Associacao Euratom-IST, Instituto de Plasmas e Fusao Nuclear, Av. Rovisco Pais, 1049-001 Lisboa (Portugal)], E-mail: andre.neto@cfn.ist.utl.pt; Sartori, Filippo; Piccolo, Fabio [Euratom-UKAEA, Culham Science Centre, Abingdon, Oxon OX14 3DB (United Kingdom); Barbalace, Antonio [Euratom-ENEA Association, Consorzio RFX, 35127 Padova (Italy); Vitelli, Riccardo [Dipartimento di Informatica, Sistemi e Produzione, Universita di Roma, Tor Vergata, Via del Politecnico 1-00133, Roma (Italy); Fernandes, Horacio [Associacao Euratom-IST, Instituto de Plasmas e Fusao Nuclear, Av. Rovisco Pais, 1049-001 Lisboa (Portugal)

    2009-06-15

    A new framework for the development and execution of real-time codes is currently being developed and commissioned at JET. The foundations of the system are Linux, the Real Time Application Interface (RTAI) and a wise exploitation of the new i386 multi-core processors technology. The driving motivation was the need to find a real-time operating system for the i386 platform able to satisfy JET Vertical Stabilisation Enhancement project requirements: 50 {mu}s cycle time. Even if the initial choice was the VxWorks operating system, it was decided to explore an open source alternative, mostly because of the costs involved in the commercial product. The work started with the definition of a precise set of requirements and milestones to achieve: Linux distribution and kernel versions to be used for the real-time operating system; complete characterization of the Linux/RTAI real-time capabilities; exploitation of the multi-core technology; implementation of all the required and missing features; commissioning of the system. Latency and jitter measurements were compared for Linux and RTAI in both user and kernel-space. The best results were attained using the RTAI kernel solution where the time to reschedule a real-time task after an external interrupt is of 2.35 {+-} 0.35 {mu}s. In order to run the real-time codes in the kernel-space, a solution to provide user-space functionalities to the kernel modules had to be designed. This novel work provided the most common functions from the standard C library and transparent interaction with files and sockets to the kernel real-time modules. Kernel C++ support was also tested, further developed and integrated in the framework. The work has produced very convincing results so far: complete isolation of the processors assigned to real-time from the Linux non real-time activities, high level of stability over several days of benchmarking operations and values well below 3 {mu}s for task rescheduling after external interrupt. From

  5. Linux real-time framework for fusion devices

    Neto, Andre; Sartori, Filippo; Piccolo, Fabio; Barbalace, Antonio; Vitelli, Riccardo; Fernandes, Horacio

    2009-01-01

    A new framework for the development and execution of real-time codes is currently being developed and commissioned at JET. The foundations of the system are Linux, the Real Time Application Interface (RTAI) and a wise exploitation of the new i386 multi-core processors technology. The driving motivation was the need to find a real-time operating system for the i386 platform able to satisfy JET Vertical Stabilisation Enhancement project requirements: 50 μs cycle time. Even if the initial choice was the VxWorks operating system, it was decided to explore an open source alternative, mostly because of the costs involved in the commercial product. The work started with the definition of a precise set of requirements and milestones to achieve: Linux distribution and kernel versions to be used for the real-time operating system; complete characterization of the Linux/RTAI real-time capabilities; exploitation of the multi-core technology; implementation of all the required and missing features; commissioning of the system. Latency and jitter measurements were compared for Linux and RTAI in both user and kernel-space. The best results were attained using the RTAI kernel solution where the time to reschedule a real-time task after an external interrupt is of 2.35 ± 0.35 μs. In order to run the real-time codes in the kernel-space, a solution to provide user-space functionalities to the kernel modules had to be designed. This novel work provided the most common functions from the standard C library and transparent interaction with files and sockets to the kernel real-time modules. Kernel C++ support was also tested, further developed and integrated in the framework. The work has produced very convincing results so far: complete isolation of the processors assigned to real-time from the Linux non real-time activities, high level of stability over several days of benchmarking operations and values well below 3 μs for task rescheduling after external interrupt. From being the

  6. Perbandingan proxy pada linux dan windows untuk mempercepat browsing website

    Dafwen Toresa

    2017-05-01

    Full Text Available AbstrakPada saat ini sangat banyak organisasi, baik pendidikan, pemerintahan,  maupun perusahaan swasta berusaha membatasi akses para pengguna ke internet dengan alasan bandwidth yang dimiliki mulai terasa lambat ketika para penggunanya mulai banyak yang melakukan browsing ke internet. Mempercepat akses browsing menjadi perhatian utama dengan memanfaatkan teknologi Proxy server. Penggunaan proxy server perlu mempertimbangkan sistem operasi pada server dan tool yang digunakan belum diketahui performansi terbaiknya pada sistem operasi apa.  Untuk itu dirasa perlu untuk menganalisis performan Proxy server pada sistem operasi berbeda yaitu Sistem Operasi Linux dengan tools Squid  dan Sistem Operasi Windows dengan tool Winroute. Kajian ini dilakukan untuk mengetahui perbandingan kecepatan browsing dari komputer pengguna (client. Browser yang digunakan di komputer pengguna adalah Mozilla Firefox. Penelitian ini menggunakan 2 komputer klien dengan pengujian masing-masingnya 5 kali pengujian pengaksesan/browsing web yang dituju melalui proxy server. Dari hasil pengujian yang dilakukan, diperoleh kesimpulan bahwa penerapan proxy server di sistem operasi linux dengan tools squid lebih cepat browsing dari klien menggunakan web browser yang sama dan komputer klien yang berbeda dari pada proxy server sistem operasi windows dengan tools winroute.  Kata kunci: Proxy, Bandwidth, Browsing, Squid, Winroute AbstractAt this time very many organizations, both education, government, and private companies try to limit the access of users to the internet on the grounds that the bandwidth owned began to feel slow when the users began to do a lot of browsing to the internet. Speed up browsing access is a major concern by utilizing Proxy server technology. The use of proxy servers need to consider the operating system on the server and the tool used is not yet known the best performance on what operating system. For that it is necessary to analyze Performance Proxy

  7. Memory Analysis of the KBeast Linux Rootkit: Investigating Publicly Available Linux Rootkit Using the Volatility Memory Analysis Framework

    2015-06-01

    examine how a computer forensic investigator/incident handler, without specialised computer memory or software reverse engineering skills , can successfully...memory images and malware, this new series of reports will be directed at those who must analyse Linux malware-infected memory images. The skills ...disable 1287 1000 1000 /usr/lib/policykit-1-gnome/polkit-gnome-authentication- agent-1 1310 1000 1000 /usr/lib/pulseaudio/pulse/gconf- helper 1350

  8. Hardware IP security and trust

    Bhunia, Swarup; Tehranipoor, Mark

    2017-01-01

    This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle. Readers will gain a comprehensive understanding of the security vulnerabilities of different types of IPs. This book would enable readers to overcome these vulnerabilities through an efficient combination of proactive countermeasures and design-for-security solutions, as well as a wide variety of IP security and trust assessment and validation techniques. This book serves as a single-source of reference for system designers and practitioners for designing secure, reliable and trustworthy SoCs.

  9. Carcinoma transverse colon masquerading as carcinoma gall bladder.

    Munghate, Anand; Kumar, Ashwani; Singh, Harnam; Singh, Gurpreet; Singh, Bimaljot; Chauhan, Mahak

    2014-04-01

    Colorectal cancer is one of the most common cancer worldwide .Its incidence is reported to be increasing in developing countries. It commonly presents with weight loss, anaemia, lump abdomen, change of bowel habit, obstruction or fresh rectal bleeding. Beside these common modes of presentations, there are some rare manifestations which masqueraded as different disease like obstructive jaundice, empyema gall bladder or cholecystitis. A 60-year-old male presented to hospital with right sided pain abdomen. On abdominal examination mild tenderness was present in right hypochondrium. Intra operatively gall bladder was separated from the adjoining gut, peritoneum and liver bed and was removed. On further exploration, there was a large mass in the vicinity of the gall bladder related to transverse colon. Extended right hemicolectomy was done. Histopathological examination of gut mass revealed adenocarcinoma of transverse colon with free margins and gall bladder showed cholecystitis with no evidence of malignancy. We present an interesting case of colon cancer colon that caused diagnostic confusion by mimicking as cholecystitis. Colorectal cancer constitutes a major public health issue globally. Therefore, public awareness, screening of high-risk populations, early diagnosis and effective treatment and follow-up will help to reduce its occurance and further complications.

  10. Appendiceal Diverticulitis Clinically Masquerading as an Appendiceal Carcinoma

    Tadashi Terada

    2014-01-01

    Full Text Available Appendiceal diverticulosis is a rare condition. Herein reported is a case of appendiceal diverticulosis and diverticulitis clinically masquerading as appendiceal carcinoma. A 62-year-old woman presented with abdominal pain. US and CT showed a tumor measuring 5 × 4 × 4 cm in vermiform appendix. Colon endoscopy showed mucosal elevation and irregularity in the orifice of vermiform appendix. A biopsy of the appendiceal mucosa showed no significant changes. Clinical diagnosis was appendiceal carcinoma and wide excision of terminal ileum, appendix, cecum, and ascending colon was performed. Grossly, the appendix showed a tumor measuring 5 × 3 × 4 cm. The appendiceal lumen was opened, and the appendiceal mucosa was elevated and irregular. The periappendiceal tissue showed thickening. Microscopically, the lesion was multiple appendiceal diverticula. The diverticula were penetrating the muscle layer. The mucosa showed erosions in places. Much fibrosis, abscess formations, and lymphocytic infiltration were seen in the subserosa. Abscesses were also seen in the diverticular lumens. Some diverticula penetrated into the subserosa. The pathologic diagnosis was appendiceal diverticulitis. When they encounter an appendiceal mass, clinicians should consider appendiceal diverticulitis as a differential diagnosis.

  11. Nail psoriasis masqueraded by secondary infection with Rhodotorula mucilaginosa.

    Martini, K; Müller, H; Huemer, H P; Höpfl, R

    2013-11-01

    A 38-year-old man presented with whitish nail changes on all fingers as the sole symptom. The condition had developed within a few days and led to dystrophy of the proximal part of the nail plates. As microscopic examination of nail scrapings demonstrated budding hyphae and the patient working as a teacher reported frequent use of a wet sponge, antifungal therapy was initiated. Subsequent cultures and molecular typing identified Rhodotorula mucilaginosa (formerly R. rubra). This environmental yeast was repeatedly isolated despite of therapy with itraconazole. As no improvement was achieved and testing of the biological activity of the fungus revealed only marginal keratolytic activity, it was considered as a coloniser of a destructed nail matrix. Finally, a biopsy of the nail bed confirmed the diagnosis of nail psoriasis, which rapidly responded to treatment with acitretin and topical calcipotriol/betamethasone cream. Fungal growth in destructed nails masqueraded the underlying disease and may have triggered the psoriatic nail reaction. © 2013 Blackwell Verlag GmbH.

  12. Laboratorio de Seguridad Informática con Kali Linux

    Gutiérrez Benito, Fernando

    2014-01-01

    Laboratorio de Seguridad Informática usando la distribución Linux Kali, un sistema operativo dedicado a la auditoría de seguridad informática. Se emplearán herramientas especializadas en los distintos campos de la seguridad, como nmap, Metaspoit, w3af, John the Ripper o Aircrack-ng. Se intentará que los alumnos comprendan la necesidad de crear aplicaciones seguras así como pueda servir de base para aquellos que deseen continuar en el mundo de la seguridad informática. Grado en Ingeniería T...

  13. Documenting and automating collateral evolutions in Linux device drivers

    Padioleau, Yoann; Hansen, René Rydhof; Lawall, Julia

    2008-01-01

    . Manually performing such collateral evolutions is time-consuming and unreliable, and has lead to errors when modifications have not been done consistently. In this paper, we present an automatic program transformation tool, Coccinelle, for documenting and automating device driver collateral evolutions...... programmer. We have evaluated our approach on 62 representative collateral evolutions that were previously performed manually in Linux 2.5 and 2.6. On a test suite of over 5800 relevant driver files, the semantic patches for these collateral evolutions update over 93% of the files completely...

  14. Millisecond accuracy video display using OpenGL under Linux.

    Stewart, Neil

    2006-02-01

    To measure people's reaction times to the nearest millisecond, it is necessary to know exactly when a stimulus is displayed. This article describes how to display stimuli with millisecond accuracy on a normal CRT monitor, using a PC running Linux. A simple C program is presented to illustrate how this may be done within X Windows using the OpenGL rendering system. A test of this system is reported that demonstrates that stimuli may be consistently displayed with millisecond accuracy. An algorithm is presented that allows the exact time of stimulus presentation to be deduced, even if there are relatively large errors in measuring the display time.

  15. Construction of a Linux based chemical and biological information system.

    Molnár, László; Vágó, István; Fehér, András

    2003-01-01

    A chemical and biological information system with a Web-based easy-to-use interface and corresponding databases has been developed. The constructed system incorporates all chemical, numerical and textual data related to the chemical compounds, including numerical biological screen results. Users can search the database by traditional textual/numerical and/or substructure or similarity queries through the web interface. To build our chemical database management system, we utilized existing IT components such as ORACLE or Tripos SYBYL for database management and Zope application server for the web interface. We chose Linux as the main platform, however, almost every component can be used under various operating systems.

  16. A PC-Linux-based data acquisition system for the STAR TOFp detector

    Liu Zhixu; Liu Feng; Zhang Bingyun

    2003-01-01

    Commodity hardware running the open source operating system Linux is playing various important roles in the field of high energy physics. This paper describes the PC-Linux-based Data Acquisition System of STAR TOFp detector. It is based on the conventional solutions with front-end electronics made of NIM and CAMAC modules controlled by a PC running Linux. The system had been commissioned into the STAR DAQ system, and worked successfully in the second year of STAR physics runs

  17. Ubuntu Linux Toolbox 1000 + Commands for Ubuntu and Debian Power Users

    Negus, Christopher

    2008-01-01

    In this handy, compact guide, you'll explore a ton of powerful Ubuntu Linux commands while you learn to use Ubuntu Linux as the experts do: from the command line. Try out more than 1,000 commands to find and get software, monitor system health and security, and access network resources. Then, apply the skills you learn from this book to use and administer desktops and servers running Ubuntu, Debian, and KNOPPIX or any other Linux distribution.

  18. Offloading IP Flows onto Lambda-Connections

    Fioreze, Tiago; Oude Wolbers, Mattijs; van de Meent, R.; Pras, Aiko

    2007-01-01

    Optical networks are capable of switching IP traffic via lambda connections. In this way, big IP flows that overload the regular IP routing level may be moved to the optical level, where they get better Quality of Service (QoS). At the same time, the IP routing level is off-loaded and can serve

  19. SOFTICE: Facilitating both Adoption of Linux Undergraduate Operating Systems Laboratories and Students' Immersion in Kernel Code

    Alessio Gaspar

    2007-06-01

    Full Text Available This paper discusses how Linux clustering and virtual machine technologies can improve undergraduate students' hands-on experience in operating systems laboratories. Like similar projects, SOFTICE relies on User Mode Linux (UML to provide students with privileged access to a Linux system without creating security breaches on the hosting network. We extend such approaches in two aspects. First, we propose to facilitate adoption of Linux-based laboratories by using a load-balancing cluster made of recycled classroom PCs to remotely serve access to virtual machines. Secondly, we propose a new approach for students to interact with the kernel code.

  20. Security risks in IP telephony

    Řezáč, Filip; Vozňák, Miroslav

    2010-01-01

    This paper deals with VoIP communication security and various techniques of VoIP attacks. We divided these threats in several categories according to their specific behaviour and their impact on the affected system. We also tried to find effective methods to prevent or mitigate these attacks. We focused our work on Spam over Internet Telephony (SPIT) as a real threat for the future. We have developed both a tool generating SPIT attacks and AntiSPIT tool defending communication systems against...

  1. Mobility management in mobile IP

    Medidi, Sirisha; Golshani, Forouzan

    2002-07-01

    There is an emerging interest in integrating mobile wireless communication with the Internet based on the Ipv6 technology. Many issues introduced by the mobility of users arise when such an integration is attempted. This paper addresses the problem of mobility management, i.e., that of tracking the current IP addresses of mobile terminals and sustaining active IP connections as mobiles move. The paper presents some architectural and mobility management options for integrating wireless access to the Internet. We then present performance results for Mobile IPv4, route optimization and Mobile IPv6.

  2. Security Risks in IP Telephony

    Filip Rezac

    2010-01-01

    Full Text Available This paper deals with VoIP communication security and various techniques of VoIP attacks. We divided these threats in several categories according to their specific behaviour and their impact on the affected system. We also tried to find effective methods to prevent or mitigate these attacks. We focused our work on Spam over Internet Telephony (SPIT as a real threat for the future. We have developed both a tool generating SPIT attacks and AntiSPIT tool defending communication systems against SPIT attacks. AntiSPIT represents an effective protection based on statistical blacklist and works without participation of the called party which is a significant advantage.

  3. GSI operation software: migration from OpenVMS TO Linux

    Huhmann, R.; Froehlich, G.; Juelicher, S.; Schaa, V.R.W.

    2012-01-01

    The current operation software at GSI, controlling the linac, beam transfer lines, synchrotron and storage ring, has been developed over a period of more than two decades using OpenVMS on Alpha-Workstations. The GSI accelerator facilities will serve as an injector chain for the new FAIR accelerator complex for which a control system is currently developed. To enable reuse and integration of parts of the distributed GSI software system, in particular the linac operation software, within the FAIR control system, the corresponding software components must be migrated to Linux. Inter-operability with FAIR controls applications is achieved by adding a generic middle-ware interface accessible from Java applications. For porting applications to Linux a set of libraries and tools has been developed covering the necessary OpenVMS system functionality. Currently, core applications and services are already ported or rewritten and functionally tested but not in operational usage. This paper presents the current status of the project and concepts for putting the migrated software into operation. (authors)

  4. Berkeley lab checkpoint/restart (BLCR) for Linux clusters

    Hargrove, Paul H; Duell, Jason C

    2006-01-01

    This article describes the motivation, design and implementation of Berkeley Lab Checkpoint/Restart (BLCR), a system-level checkpoint/restart implementation for Linux clusters that targets the space of typical High Performance Computing applications, including MPI. Application-level solutions, including both checkpointing and fault-tolerant algorithms, are recognized as more time and space efficient than system-level checkpoints, which cannot make use of any application-specific knowledge. However, system-level checkpointing allows for preemption, making it suitable for responding to ''fault precursors'' (for instance, elevated error rates from ECC memory or network CRCs, or elevated temperature from sensors). Preemption can also increase the efficiency of batch scheduling; for instance reducing idle cycles (by allowing for shutdown without any queue draining period or reallocation of resources to eliminate idle nodes when better fitting jobs are queued), and reducing the average queued time (by limiting large jobs to running during off-peak hours, without the need to limit the length of such jobs). Each of these potential uses makes BLCR a valuable tool for efficient resource management in Linux clusters

  5. Implementing Journaling in a Linux Shared Disk File System

    Preslan, Kenneth W.; Barry, Andrew; Brassow, Jonathan; Cattelan, Russell; Manthei, Adam; Nygaard, Erling; VanOort, Seth; Teigland, David; Tilstra, Mike; O'Keefe, Matthew; hide

    2000-01-01

    In computer systems today, speed and responsiveness is often determined by network and storage subsystem performance. Faster, more scalable networking interfaces like Fibre Channel and Gigabit Ethernet provide the scaffolding from which higher performance computer systems implementations may be constructed, but new thinking is required about how machines interact with network-enabled storage devices. In this paper we describe how we implemented journaling in the Global File System (GFS), a shared-disk, cluster file system for Linux. Our previous three papers on GFS at the Mass Storage Symposium discussed our first three GFS implementations, their performance, and the lessons learned. Our fourth paper describes, appropriately enough, the evolution of GFS version 3 to version 4, which supports journaling and recovery from client failures. In addition, GFS scalability tests extending to 8 machines accessing 8 4-disk enclosures were conducted: these tests showed good scaling. We describe the GFS cluster infrastructure, which is necessary for proper recovery from machine and disk failures in a collection of machines sharing disks using GFS. Finally, we discuss the suitability of Linux for handling the big data requirements of supercomputing centers.

  6. Migration of alcator C-Mod computer infrastructure to Linux

    Fredian, T.W.; Greenwald, M.; Stillerman, J.A.

    2004-01-01

    The Alcator C-Mod fusion experiment at MIT in Cambridge, Massachusetts has been operating for twelve years. The data handling for the experiment during most of this period was based on MDSplus running on a cluster of VAX and Alpha computers using the OpenVMS operating system. While the OpenVMS operating system provided a stable reliable platform, the support of the operating system and the software layered on the system has deteriorated in recent years. With the advent of extremely powerful low cost personal computers and the increasing popularity and robustness of the Linux operating system a decision was made to migrate the data handling systems for C-Mod to a collection of PC's running Linux. This paper will describe the new system configuration, the effort involved in the migration from OpenVMS, the results of the first run campaign under the new configuration and the impact the switch may have on the rest of the MDSplus community

  7. KNBD: A Remote Kernel Block Server for Linux

    Becker, Jeff

    1999-01-01

    I am developing a prototype of a Linux remote disk block server whose purpose is to serve as a lower level component of a parallel file system. Parallel file systems are an important component of high performance supercomputers and clusters. Although supercomputer vendors such as SGI and IBM have their own custom solutions, there has been a void and hence a demand for such a system on Beowulf-type PC Clusters. Recently, the Parallel Virtual File System (PVFS) project at Clemson University has begun to address this need (1). Although their system provides much of the functionality of (and indeed was inspired by) the equivalent file systems in the commercial supercomputer market, their system is all in user-space. Migrating their 10 services to the kernel could provide a performance boost, by obviating the need for expensive system calls. Thanks to Pavel Machek, the Linux kernel has provided the network block device (2) with kernels 2.1.101 and later. You can configure this block device to redirect reads and writes to a remote machine's disk. This can be used as a building block for constructing a striped file system across several nodes.

  8. FIREWALL E SEGURANÇA DE SISTEMAS APLICADO AO LINUX

    Rodrigo Ribeiro

    2017-04-01

    Full Text Available Tendo em vista a evolução da internet no mundo, torna-se necessário investir na segurança da informação, alguns importantes conceitos referentes as redes de computadores e sua evolução direcionam para o surgimento de novas vulnerabilidades. O objetivo principal deste trabalho é comprovar que, por meio da utilização de software livre como o Linux e suas ferramentas, é possível criar um cenário seguro contra alguns ataques, por meio de testes em ambientes controlados utilizando-se de arquiteturas testadas em tempo real e verificando qual o potencial de uso entre uma pesquisa autoral sobre o assunto, a partir dessa ideia, foi possível reconhecer a grande utilização dos mecanismos de segurança, validando a eficiência de tais ferramentas estudadas na mitigação de ataques a redes de computares. Os sistemas de defesa da plataforma Linux são extremamente eficientes e atende ao objetivo de prevenir uma rede de acesso indevido.

  9. CompTIA Linux+ Complete Study Guide (Exams LX0-101 and LX0-102)

    Smith, Roderick W

    2010-01-01

    Prepare for CompTIA's Linux+ Exams. As the Linux server and desktop markets continue to grow, so does the need for qualified Linux administrators. CompTIA's Linux+ certification (Exams LX0-101 and LX0-102) includes the very latest enhancements to the popular open source operating system. This detailed guide not only covers all key exam topics—such as using Linux command-line tools, understanding the boot process and scripts, managing files and file systems, managing system security, and much more—it also builds your practical Linux skills with real-world examples. Inside, you'll find:. Full co

  10. Encrypted IP video communication system

    Bogdan, Apetrechioaie; Luminiţa, Mateescu

    2010-11-01

    Digital video transmission is a permanent subject of development, research and improvement. This field of research has an exponentially growing market in civil, surveillance, security and military aplications. A lot of solutions: FPGA, ASIC, DSP have been used for this purpose. The paper presents the implementation of an encrypted, IP based, video communication system having a competitive performance/cost ratio .

  11. Introduction to IP address management

    Rooney, Tim

    2010-01-01

    "The book begins with a basic overview of IP networking, followed by chapters describing each of the three core IPAM technologies: IPv4 and IPv6 addressing, DHCP, and DNS. The next three chapters describe IPAM management techniques and practice, followed by chapters on IPv4-IPv6 co-existence, security and the IPAM business case"--

  12. Continuously Connected With Mobile IP

    2002-01-01

    Cisco Systems developed Cisco Mobile Networks, making IP devices mobile. With this innovation, a Cisco router and its connected IP devices can roam across network boundaries and connection types. Because a mobile user is able to keep the same IP address while roaming, a live IP connection can be maintained without interruption. Glenn Research Center jointly tested the technology with Cisco, and is working to use it on low-earth-orbiting research craft. With Cisco's Mobile Networks functionality now available in Cisco IOS Software release 12.2(4)T, the commercial advantages and benefits are numerous. The technology can be applied to public safety, military/homeland security, emergency management services, railroad and shipping systems, and the automotive industry. It will allow ambulances, police, firemen, and the U.S. Coast Guard to stay connected to their networks while on the move. In the wireless battlefield, the technology will provide rapid infrastructure deployment for U.S. national defense. Airline, train, and cruise passengers utilizing Cisco Mobile Networks can fly all around the world with a continuous Internet connection. Cisco IOS(R) Software is a registered trademark of Cisco Systems.

  13. Tri-Laboratory Linux Capacity Cluster 2007 SOW

    Seager, M.

    2007-01-01

    well, the budget demands are extreme and new, more cost effective ways of fielding these systems must be developed. This Tri-Laboratory Linux Capacity Cluster (TLCC) procurement represents the ASC first investment vehicle in these capacity systems. It also represents a new strategy for quickly building, fielding and integrating many Linux clusters of various sizes into classified and unclassified production service through a concept of Scalable Units (SU). The programmatic objective is to dramatically reduce the overall Total Cost of Ownership (TCO) of these 'capacity' systems relative to the best practices in Linux Cluster deployments today. This objective only makes sense in the context of these systems quickly becoming very robust and useful production clusters under the crushing load that will be inflicted on them by the ASC and SSP scientific simulation capacity workload.

  14. Enabling rootless Linux containers in multi-user environments. The udocker tool

    Gomes, Jorge; David, Mario; Alves, Luis; Martins, Jo ao; Pina, Jo ao [Laboratorio de Instrumentacao e Fisica Experimental de Particulas (LIP), Lisboa (Portugal); Bagnaschi, Emanuele [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Campos, Isabel; Lopez-Garcia, Alvaro; Orviz, Pablo [IFCA, Consejo Superior de Investigaciones Cientificas-CSIC, Santander (Spain)

    2017-11-15

    Containers are increasingly used as means to distribute and run Linux services and applications. In this paper we describe the architectural design and implementation of udocker a tool to execute Linux containers in user mode and we describe a few practical applications for a range of scientific codes meeting different requirements: from single core execution to MPI parallel execution and execution on GPGPUs.

  15. Enabling rootless Linux containers in multi-user environments. The udocker tool

    Gomes, Jorge; David, Mario; Alves, Luis; Martins, Jo ao; Pina, Jo ao; Bagnaschi, Emanuele; Campos, Isabel; Lopez-Garcia, Alvaro; Orviz, Pablo

    2017-11-01

    Containers are increasingly used as means to distribute and run Linux services and applications. In this paper we describe the architectural design and implementation of udocker a tool to execute Linux containers in user mode and we describe a few practical applications for a range of scientific codes meeting different requirements: from single core execution to MPI parallel execution and execution on GPGPUs.

  16. SmPL: A Domain-Specific Language for Specifying Collateral Evolutions in Linux Device Drivers

    Padioleau, Yoann; Lawall, Julia Laetitia; Muller, Gilles

    2007-01-01

    identifying the affected files and modifying all of the code fragments in these files that in some way depend on the changed interface. We have studied the collateral evolution problem in the context of Linux device drivers. Currently, collateral evolutions in Linux are mostly done manually using a text...

  17. Big Data demonstrator using Hadoop to build a Linux cluster for log data analysis using R

    Torbensen, Rune Sonnich; Top, Søren

    2017-01-01

    This article walks through the steps to create a Hadoop Linux cluster in the cloud and outlines how to analyze device log data via an example in the R programming language.......This article walks through the steps to create a Hadoop Linux cluster in the cloud and outlines how to analyze device log data via an example in the R programming language....

  18. Application of instrument platform based embedded Linux system on intelligent scaler

    Wang Jikun; Yang Run'an; Xia Minjian; Yang Zhijun; Li Lianfang; Yang Binhua

    2011-01-01

    It designs a instrument platform based on embedded Linux system and peripheral circuit, by designing Linux device driver and application program based on QT Embedded, various functions of the intelligent scaler are realized. The system architecture is very reasonable, so the stability and the expansibility and the integration level are increased, the development cycle is shorten greatly. (authors)

  19. Automating the Port of Linux to the VirtualLogix Hypervisor using Semantic Patches

    Armand, Francois; Muller, Gilles; Lawall, Julia Laetitia

    2008-01-01

    of Linux to the VLX hypervisor.  Coccinelle provides a notion of semantic patches, which are more abstract than standard patches, and thus are potentially applicable to a wider range of OS versions.  We have applied this approach in the context of Linux versions 2.6.13, 2.6.14, and 2.6.15, for the ARM...

  20. Linux thin-client conversion in a large cardiology practice: initial experience.

    Echt, Martin P; Rosen, Jordan

    2004-01-01

    Capital Cardiology Associates (CCA) is a single-specialty cardiology practice with offices in New York and Massachusetts. In 2003, CCA converted its IT system from a Microsoft-based network to a Linux network employing Linux thin-client technology with overall positive outcomes.

  1. EMBEDDED LINUX BASED ALBUM BROWSER SYSTEM AT MUSIC STORES

    Suryadiputra Liawatimena

    2009-01-01

    Full Text Available The goal of this research is the creation of an album browser system at a music store based on embedded Linux. It is expected with this system; it will help the promotion of said music store and make the customers activity at the store simpler and easier. This system uses NFS for networking, database system, ripping software, and GUI development. The research method used are and laboratory experiments to test the system’s hardware using TPC-57 (Touch Panel Computer 5.7" SA2410 ARM-9 Medallion CPU Module and software using QtopiaCore. The result of the research are; 1. The database query process is working properly; 2. The audio data buffering process is working properly. With those experiment results, it can be concluded that the summary of this research is that the system is ready to be implemented and used in the music stores.

  2. Impact on TRMM Products of Conversion to Linux

    Stocker, Erich Franz; Kwiatkowski, John

    2008-01-01

    In June 2008, TRMM data processing will be assumed by the Precipitation Processing System (PPS). This change will also mean a change in the hardware production environment from an SGI 32 bit IRIX processing environment to a Linux (Beowulf) 64 bit processing environment. This change of platform and operating system addressing (32 to 64) has some influence on data values in the TRMM data products. This paper will describe the transition architecture and scheduling. It will also provide an analysis of what the nature of the product differences will be. It will demonstrate that the differences are not scientifically significant and are generally not visible. However, they are not always identical with those which the SGI would produce.

  3. Compact PCI/Linux platform in FTU slow control system

    Iannone, F.; Centioli, C.; Panella, M.; Mazza, G.; Vitale, V.; Wang, L.

    2004-01-01

    In large fusion experiments, such as tokamak devices, there is a common trend for slow control systems. Because of complexity of the plants, the so-called 'Standard Model' (SM) in slow control has been adopted on several tokamak machines. This model is based on a three-level hierarchical control: 1) High-Level Control (HLC) with a supervisory function; 2) Medium-Level Control (MLC) to interface and concentrate I/O field equipment; 3) Low-Level Control (LLC) with hard real-time I/O function, often managed by PLCs. FTU (Frascati Tokamak Upgrade) control system designed with SM concepts has underwent several stages of developments in its fifteen years duration of runs. The latest evolution was inevitable, due to the obsolescence of the MLC CPUs, based on VME-MOTOROLA 68030 with OS9 operating system. A large amount of C code was developed for that platform to route the data flow from LLC, which is constituted by 24 Westinghouse Numalogic PC-700 PLCs with about 8000 field-points, to HLC, based on a commercial Object-Oriented Real-Time database on Alpha/CompaqTru64 platform. Therefore, authors have to look for cost-effective solutions and finally a CompactPCI-Intel x86 platform with Linux operating system was chosen. A software porting has been done, taking into account the differences between OS9 and Linux operating system in terms of Inter/Network Processes Communications and I/O multi-ports serial driver. This paper describes the hardware/software architecture of the new MLC system, emphasizing the reliability and the low costs of the open source solutions. Moreover, a huge amount of software packages available in open source environment will assure a less painful maintenance, and will open the way to further improvements of the system itself. (authors)

  4. Standardization efforts in IP telephony

    Sengodan, Senthil; Bansal, Raj

    1999-11-01

    The recent interest in IP telephony has led to a tremendous increase of standardization activities in the area. The three main standards bodies in the area of IP telephony are the International Telecommunication Union's (ITU-T) Study Group (SG) 16, the Internet Engineering Task Force (IETF) and the European Telecommunication Standards Institute's (ETSI) TIPHON project. In addition, forums such as the International Multimedia Teleconferencing Consortium (IMTC), the Intelligent Network Forum (INF), the International Softswitch Consortium (ISC), the Electronic Computer Telephony Forum (ECTF), and the MIT's Internet Telephony Consortium (ITC) are looking into various other aspects that aim at the growth of this industry. This paper describes the main tasks (completed and in progress) undertaken by these organizations. In describing such work, an overview of the underlying technology is also provided.

  5. Internetworking with TCP/IP

    Comer, Douglas E

    2014-01-01

    An internationally best-selling, conceptual introduction to the TCP/IP protocols and Internetworking, this book interweaves a clear discussion of fundamentals and scientific principles with details and examples drawn from the latest technologies. Leading author Douglas Comer covers layering and packet formats for all the Internet protocols, includingTCP, IPv4, IPv6, DHCP, and DNS. In addition, the text explains new trends in Internet systems, including packet classification, Software Defined Networking (SDN), and mesh protocols used in The Internet of Things. The text is appropriate for individuals interested in learning more about TCP/IP protocols, Internet architecture, and current networking technologies, as well as engineers who build network systems. It is suitable for junior to graduate-level courses in Computer Networks, Data Networks, Network Protocols, and Internetworking.

  6. VoIP over WLAN

    Nikkari, Joni

    2007-01-01

    Tässä opinnäytetyössä tutkitaan VoIP over WLAN -tekniikan mahdollisuuksia nykyaikaisessa käyttöympäristössä, sekä yritysmaailman että kotikäyttäjän näkökulmasta. Toimiakseen VoWLAN tarvitsee kaksi eri tekniikkaa: langattoman lähiverkon sekä WLAN-puhelimen, joka perustuu VoIP-tekniikkaan.; WLAN:ssa tietoliikenne kulkee normaalin kaapeloinnin sijasta radiotaajuuksia käyttämällä. Standardina toimii IEEE 802.11, joka määrittelee WLAN-verkkojen toiminnan. Standardia on kehitetty jatkuvasti, ja si...

  7. OSI and TCP/IP

    Randolph, Lynwood P.

    1994-01-01

    The Open Systems Interconnection Transmission Control Protocol/Internet Protocol (OSI TCP/IP) and the Government Open Systems Interconnection Profile (GOSIP) are compared and described in terms of Federal internetworking. The organization and functions of the Federal Internetworking Requirements Panel (FIRP) are discussed and the panel's conclusions and recommendations with respect to the standards and implementation of the National Information Infrastructure (NII) are presented.

  8. Presence in the IP multimedia subsystem

    Lin, L.; Liotta, A.

    2007-01-01

    With an ever increasing penetration of Internet Protocol (IP) technologies, the wireless industry is evolving the mobile core network towards all-IP network. The IP Multimedia Subsystem (IMS) is a standardised Next Generation Network (NGN) architectural framework defined by the 3rd Generation

  9. Ritual Continuity and “Failed Rituals” in a Winter Masquerade in the Italian Alps

    Lia Zola

    2011-08-01

    Full Text Available Alpine winter masquerades, also known as carnival masquerades, may be regarded as one of the most complex phenomena within the field of study of cultural anthropology and folklore. In the Italian alpine chain some of them have been brought to a new life two decades ago after a long period of decline; since then, alpine winter masquerades have been the focus of a great interest by cultural anthropologists, theatre performers and other intellectuals. In some cases bringing a winter masquerade to new life has proved to be successful; in others, after a first, “reborn” performance, some celebrations abruptly stopped. My paper aims to explore issues of ritual continuity and ritual failure through a specific case-study, that of the carnival masquerade in Salbertrand, an alpine settlement of 485 inhabitants in the upper part of the Val di Susa, in the Italian western alpine chain.Les mascarades alpines d'hiver, aussi connues comme mascarades de carnaval, peuvent être considérées comme l’un des phénomènes les plus complexes dans le champ d'étude d'anthropologie culturelle et du folklore. Dans la chaîne alpine italienne, certains d'entre eux ont été amenés à une nouvelle vie il y a deux décennies, après une longue période de déclin. Dès lors, les mascarades alpines d'hiver ont été sujet d'intérêt majeur pour les anthropologues culturels, les acteurs de théâtre et d'autres intellectuels. Dans certains cas, réactiver une mascarade d'hiver s'est soldé par une réussite ; dans d'autres, après une première manifestation "renaissante" quelques célébrations se sont brusquement arrêtées. Mon article aspire à explorer les phénomènes de continuité et d'échec rituel à travres une étude de cas spécifique, celui de la mascarade de carnaval de Salbertrand, une localité alpine de 485 habitants dans la partie supérieure de Val De Suse, dans les Alpes occidentales italiennes.

  10. Communication Software Performance for Linux Clusters with Mesh Connections

    Jie Chen; William Watson

    2003-09-01

    Recent progress in copper based commodity Gigabit Ethernet interconnects enables constructing clusters to achieve extremely high I/O bandwidth at low cost with mesh connections. However, the TCP/IP protocol stack cannot match the improved performance of Gigabit Ethernet networks especially in the case of multiple interconnects on a single host. In this paper, we evaluate and compare the performance characteristics of TCP/IP and M-VIA software that is an implementation of VIA.In particular, we focus on the performance of the software systems for a mesh communication architecture and demonstrate the feasibility of using multiple Gigabit Ethernet cards on one host to achieve aggregated bandwidth and latency that are not only better than what TCP provides but also compare favorably to some of the special purpose high-speed networks. In addition, implementation of a new M-VIA driver for one type of Gigabit Ethernet card will be discussed.

  11. Tri-Laboratory Linux Capacity Cluster 2007 SOW

    Seager, M

    2007-03-22

    ). However, given the growing need for 'capability' systems as well, the budget demands are extreme and new, more cost effective ways of fielding these systems must be developed. This Tri-Laboratory Linux Capacity Cluster (TLCC) procurement represents the ASC first investment vehicle in these capacity systems. It also represents a new strategy for quickly building, fielding and integrating many Linux clusters of various sizes into classified and unclassified production service through a concept of Scalable Units (SU). The programmatic objective is to dramatically reduce the overall Total Cost of Ownership (TCO) of these 'capacity' systems relative to the best practices in Linux Cluster deployments today. This objective only makes sense in the context of these systems quickly becoming very robust and useful production clusters under the crushing load that will be inflicted on them by the ASC and SSP scientific simulation capacity workload.

  12. Mobile-ip Aeronautical Network Simulation Study

    Ivancic, William D.; Tran, Diepchi T.

    2001-01-01

    NASA is interested in applying mobile Internet protocol (mobile-ip) technologies to its space and aeronautics programs. In particular, mobile-ip will play a major role in the Advanced Aeronautic Transportation Technology (AATT), the Weather Information Communication (WINCOMM), and the Small Aircraft Transportation System (SATS) aeronautics programs. This report presents the results of a simulation study of mobile-ip for an aeronautical network. The study was performed to determine the performance of the transmission control protocol (TCP) in a mobile-ip environment and to gain an understanding of how long delays, handoffs, and noisy channels affect mobile-ip performance.

  13. Challenges Regarding IP Core Functional Reliability

    Berg, Melanie D.; LaBel, Kenneth A.

    2017-01-01

    For many years, intellectual property (IP) cores have been incorporated into field programmable gate array (FPGA) and application specific integrated circuit (ASIC) design flows. However, the usage of large complex IP cores were limited within products that required a high level of reliability. This is no longer the case. IP core insertion has become mainstream including their use in highly reliable products. Due to limited visibility and control, challenges exist when using IP cores and subsequently compromise product reliability. We discuss challenges and suggest potential solutions to critical application IP insertion.

  14. Hard Real-Time Performances in Multiprocessor-Embedded Systems Using ASMP-Linux

    Daniel Pierre Bovet

    2008-01-01

    Full Text Available Multiprocessor systems, especially those based on multicore or multithreaded processors, and new operating system architectures can satisfy the ever increasing computational requirements of embedded systems. ASMP-LINUX is a modified, high responsiveness, open-source hard real-time operating system for multiprocessor systems capable of providing high real-time performance while maintaining the code simple and not impacting on the performances of the rest of the system. Moreover, ASMP-LINUX does not require code changing or application recompiling/relinking. In order to assess the performances of ASMP-LINUX, benchmarks have been performed on several hardware platforms and configurations.

  15. Hard Real-Time Performances in Multiprocessor-Embedded Systems Using ASMP-Linux

    Betti Emiliano

    2008-01-01

    Full Text Available Abstract Multiprocessor systems, especially those based on multicore or multithreaded processors, and new operating system architectures can satisfy the ever increasing computational requirements of embedded systems. ASMP-LINUX is a modified, high responsiveness, open-source hard real-time operating system for multiprocessor systems capable of providing high real-time performance while maintaining the code simple and not impacting on the performances of the rest of the system. Moreover, ASMP-LINUX does not require code changing or application recompiling/relinking. In order to assess the performances of ASMP-LINUX, benchmarks have been performed on several hardware platforms and configurations.

  16. Čiščenje operacijskega sistema GNU/Linux

    OBLAK, DENIS

    2018-01-01

    Cilj diplomskega dela je izdelava aplikacije, ki bo pomagala očistiti operacijski sistem Linux in bo delala v večini distribucij. V teoretičnem delu je obravnavano čiščenje operacijskega sistema Linux, ki sprosti prostor na disku in omogoči boljše delovanje sistema. Sistematično so pregledani in teoretično predstavljeni tehnike čiščenja in obstoječa orodja za operacijski sistem Linux. V nadaljevanju je predstavljeno čiščenje operacijskih sistemov Windows in MacOS. Hkrati so predstavljen...

  17. Voice over IP in Wireless Heterogeneous Networks

    Fathi, Hanane; Chakraborty, Shyam; Prasad, Ramjee

    with the deployment of wireless heterogeneous systems, both speech and data traffic are carrried over wireless links by the same IP-based packet-switched infrastructure. However, this combination faces some challenges due to the inherent properties of the wireless network. The requirements for good quality VoIP...... communications are difficult to achieve in a time-varying environment due to channel errors and traffic congestion and across different systems. The provision of VoIP in wireless heterogeneous networks requires a set of time-efficient control mechanisms to support a VoIP session with acceptable quality....... The focus of Voice over IP in Wierless Heterogeneous Networks is on mechanisms that affect the VoIP user satisfaction  while not explicitly involved in the media session. This relates to the extra delays introduced by the security and the signaling protocols used to set up an authorized VoIP session...

  18. TCP/IP Network Administration

    Hunt, Craig

    2002-01-01

    This complete guide to setting up and running a TCP/IP network is essential for network administrators, and invaluable for users of home systems that access the Internet. The book starts with the fundamentals -- what protocols do and how they work, how addresses and routing are used to move data through the network, how to set up your network connection -- and then covers, in detail, everything you need to know to exchange information via the Internet. Included are discussions on advanced routing protocols (RIPv2, OSPF, and BGP) and the gated software package that implements them, a tutorial

  19. Debugging Nondeterministic Failures in Linux Programs through Replay Analysis

    Shakaiba Majeed

    2018-01-01

    Full Text Available Reproducing a failure is the first and most important step in debugging because it enables us to understand the failure and track down its source. However, many programs are susceptible to nondeterministic failures that are hard to reproduce, which makes debugging extremely difficult. We first address the reproducibility problem by proposing an OS-level replay system for a uniprocessor environment that can capture and replay nondeterministic events needed to reproduce a failure in Linux interactive and event-based programs. We then present an analysis method, called replay analysis, based on the proposed record and replay system to diagnose concurrency bugs in such programs. The replay analysis method uses a combination of static analysis, dynamic tracing during replay, and delta debugging to identify failure-inducing memory access patterns that lead to concurrency failure. The experimental results show that the presented record and replay system has low-recording overhead and hence can be safely used in production systems to catch rarely occurring bugs. We also present few concurrency bug case studies from real-world applications to prove the effectiveness of the proposed bug diagnosis framework.

  20. ZIO: The Ultimate Linux I/O Framework

    Gonzalez Cobas, J D; Rubini, A; Nellaga, S; Vaga, F

    2014-01-01

    ZIO (with Z standing for “The Ultimate I/O” Framework) was developed for CERN with the specific needs of physics labs in mind, which are poorly addressed in the mainstream Linux kernel. ZIO provides a framework for industrial, high-bandwith, high-channel count I/O device drivers (digitizers, function generators, timing devices like TDCs) with performance, generality and scalability as design goals. Among its features, it offers abstractions for • both input and output channels, and channel sets • run-time selection of trigger types • run-time selection of buffer types • sysfs-based configuration • char devices for data and metadata • a socket interface (PF ZIO) as alternative to char devices In this paper, we discuss the design and implementation of ZIO, and describe representative cases of driver development for typical and exotic applications: drivers for the FMC (FPGAMezzanine Card, see [1]) boards developed at CERN like the FMC ADC 100Msps digitizer, FMC TDC timestamp counter, and FMC DEL ...

  1. Multi-terabyte EIDE disk arrays running Linux RAID5

    Sanders, D.A.; Cremaldi, L.M.; Eschenburg, V.; Godang, R.; Joy, M.D.; Summers, D.J.; Petravick, D.L.

    2004-01-01

    High-energy physics experiments are currently recording large amounts of data and in a few years will be recording prodigious quantities of data. New methods must be developed to handle this data and make analysis at universities possible. Grid Computing is one method; however, the data must be cached at the various Grid nodes. We examine some storage techniques that exploit recent developments in commodity hardware. Disk arrays using RAID level 5 (RAID-5) include both parity and striping. The striping improves access speed. The parity protects data in the event of a single disk failure, but not in the case of multiple disk failures. We report on tests of dual-processor Linux Software RAID-5 arrays and Hardware RAID-5 arrays using a 12-disk 3ware controller, in conjunction with 250 and 300 GB disks, for use in offline high-energy physics data analysis. The price of IDE disks is now less than $1/GB. These RAID-5 disk arrays can be scaled to sizes affordable to small institutions and used when fast random access at low cost is important

  2. Multi-terabyte EIDE disk arrays running Linux RAID5

    Sanders, D.A.; Cremaldi, L.M.; Eschenburg, V.; Godang, R.; Joy, M.D.; Summers, D.J.; /Mississippi U.; Petravick, D.L.; /Fermilab

    2004-11-01

    High-energy physics experiments are currently recording large amounts of data and in a few years will be recording prodigious quantities of data. New methods must be developed to handle this data and make analysis at universities possible. Grid Computing is one method; however, the data must be cached at the various Grid nodes. We examine some storage techniques that exploit recent developments in commodity hardware. Disk arrays using RAID level 5 (RAID-5) include both parity and striping. The striping improves access speed. The parity protects data in the event of a single disk failure, but not in the case of multiple disk failures. We report on tests of dual-processor Linux Software RAID-5 arrays and Hardware RAID-5 arrays using a 12-disk 3ware controller, in conjunction with 250 and 300 GB disks, for use in offline high-energy physics data analysis. The price of IDE disks is now less than $1/GB. These RAID-5 disk arrays can be scaled to sizes affordable to small institutions and used when fast random access at low cost is important.

  3. The Spacelab IPS Star Simulator

    Wessling, Francis C., III

    The cost of doing business in space is very high. If errors occur while in orbit the costs grow and desired scientific data may be corrupted or even lost. The Spacelab Instrument Pointing System (IPS) Star Simulator is a unique test bed that allows star trackers to interface with simulated stars in a laboratory before going into orbit. This hardware-in-the loop testing of equipment on earth increases the probability of success while in space. The IPS Star Simulator provides three fields of view 2.55 x 2.55 degrees each for input into star trackers. The fields of view are produced on three separate monitors. Each monitor has 4096 x 4096 addressable points and can display 50 stars (pixels) maximum at a given time. The pixel refresh rate is 1000 Hz. The spectral output is approximately 550 nm. The available relative visual magnitude range is 2 to 8 visual magnitudes. The star size is less than 100 arc seconds. The minimum star movement is less than 5 arc seconds and the relative position accuracy is approximately 40 arc seconds. The purpose of this paper is to describe the LPS Star Simulator design and to provide an operational scenario so others may gain from the approach and possible use of the system.

  4. Development of a laboratory model of SSSC using RTAI on Linux ...

    ... capability to Linux Gen- eral Purpose Operating System (GPOS) over and above the capabilities of non ... Introduction. Power transfer ... of a controller prototyping environment is Matlab/Simulink/Real-time Workshop software, which can be ...

  5. Supporting the Secure Halting of User Sessions and Processes in the Linux Operating System

    Brock, Jerome

    2001-01-01

    .... Only when a session must be reactivated are its processes returned to a runnable state. This thesis presents an approach for adding this "secure halting" functionality to the Linux operating system...

  6. [Study for lung sound acquisition module based on ARM and Linux].

    Lu, Qiang; Li, Wenfeng; Zhang, Xixue; Li, Junmin; Liu, Longqing

    2011-07-01

    A acquisition module with ARM and Linux as a core was developed. This paper presents the hardware configuration and the software design. It is shown that the module can extract human lung sound reliably and effectively.

  7. Parallel Processing Performance Evaluation of Mixed T10/T100 Ethernet Topologies on Linux Pentium Systems

    Decato, Steven

    1997-01-01

    ... performed on relatively inexpensive off the shelf components. Alternative network topologies were implemented using 10 and 100 megabit-per-second Ethernet cards under the Linux operating system on Pentium based personal computer platforms...

  8. Linux aitab olla sõltumatu / Jon Hall ; interv. Kristjan Otsmann

    Hall, Jon

    2002-01-01

    Eesti peaks kasutama rohkem avatud lähtekoodil põhinevat tarkvara, sest see seab Eesti väiksemasse sõltuvusse välismaistest tarkvaratootjatest, ütles intervjuus Postimehele Linux Internationali juht

  9. Applying a gaming approach to IP strategy.

    Gasnier, Arnaud; Vandamme, Luc

    2010-02-01

    Adopting an appropriate IP strategy is an important but complex area, particularly in the pharmaceutical and biotechnology sectors, in which aspects such as regulatory submissions, high competitive activity, and public health and safety information requirements limit the amount of information that can be protected effectively through secrecy. As a result, and considering the existing time limits for patent protection, decisions on how to approach IP in these sectors must be made with knowledge of the options and consequences of IP positioning. Because of the specialized nature of IP, it is necessary to impart knowledge regarding the options and impact of IP to decision-makers, whether at the level of inventors, marketers or strategic business managers. This feature review provides some insight on IP strategy, with a focus on the use of a new 'gaming' approach for transferring the skills and understanding needed to make informed IP-related decisions; the game Patentopolis is discussed as an example of such an approach. Patentopolis involves interactive activities with IP-related business decisions, including the exploitation and enforcement of IP rights, and can be used to gain knowledge on the impact of adopting different IP strategies.

  10. Vaccines and IP Rights: A Multifaceted Relationship.

    Durell, Karen

    2016-01-01

    Just as there are many forms of vaccines and components to vaccines-particular compositions, delivery systems, components, and distribution networks-there are a variety of intellectual property (IP) protections applicable for vaccines. IP rights such as patent, copyright, trademarks, plant breeders' rights, and trade secrets may all be applicable to vaccines. Thus, discussion of IP rights and vaccines should not begin and end with the application of one IP right to a vaccine. The discussion should engage considerations of multiple IP rights applicable to a vaccine and how these can be utilized in an integrated manner in a strategy aimed at supporting the development and distribution of the vaccine. Such an approach to IP rights to vaccines allows for the integrated rights to be considered in light of the justifications for protecting vaccines with IP rights, as well as the issues relating to specific IP rights for vaccines, such as compulsory license regimes, available humanitarian purpose IP credits, etc. To view vaccines as the subject of multiple IP protections involves a refocusing, but the outcome can provide significant benefits for vaccine development and distribution.

  11. Low latency protocol for transmission of measurement data from FPGA to Linux computer via 10 Gbps Ethernet link

    Zabolotny, W.M.

    2015-01-01

    This paper presents FADE-10G—an integrated solution for modern multichannel measurement systems. Its main aim is a low latency, reliable transmission of measurement data from FPGA-based front-end electronic boards (FEBs) to a computer-based node in the Data Acquisition System (DAQ), using a standard Ethernet 1 Gbps or 10 Gbps link. In addition to transmission of data, the system allows the user to send reliably simple control commands from DAQ to FEB and to receive responses. The aim of the work is to provide a possible simple base solution, which can be adapted by the end user to his or her particular needs. Therefore, the emphasis is put on the minimal consumption of FPGA resources in FEB and the minimal CPU load in the DAQ computer. The open source implementation of the FPGA IP core and the Linux kernel driver published under permissive license facilitates modifications and reuse of the solution. The system has been successfully tested in real hardware, both with 1 Gbps and 10 Gbps links

  12. Performance of VoIP on HSDPA

    Wang, Bang; Pedersen, Klaus I.; Kolding, Troels E.

    2005-01-01

    This paper provides packet scheduler design and performance simulations for running VoIP services over high-speed downlink packet access (HSDPA) in WCDMA. The main challenge of supporting VoIP service on HSDPA is the tight delay requirement combined with the small VoIP packet size. A packet...... scheduler design incorporating VoIP packet aggregation and user multiplexing is proposed and the VoIP capacity is studied for a macro-cellular environment. Results are obtained for different delay budgets and packet scheduling settings, using either blind round robin or a slightly modified version...... of proportional fair scheduling. For proportional fair scheduling with code-multiplexing of 4-users, the downlink VoIP cell capacity on HSDPA is found to be in the range 72-104 users depending on whether the delay budget for the Node-B scheduling and user reception equals 80 ms or 150 ms, respectively....

  13. Analysis of Handoff Mechanisms in Mobile IP

    Jayaraj, Maria Nadine Simonel; Issac, Biju; Haldar, Manas Kumar

    2011-06-01

    One of the most important challenges in mobile Internet Protocol (IP) is to provide service for a mobile node to maintain its connectivity to network when it moves from one domain to another. IP is responsible for routing packets across network. The first major version of IP is the Internet Protocol version 4 (IPv4). It is one of the dominant protocols relevant to wireless network. Later a newer version of IP called the IPv6 was proposed. Mobile IPv6 is mainly introduced for the purpose of mobility. Mobility management enables network to locate roaming nodes in order to deliver packets and maintain connections with them when moving into new domains. Handoff occurs when a mobile node moves from one network to another. It is a key factor of mobility because a mobile node can trigger several handoffs during a session. This paper briefly explains on mobile IP and its handoff issues, along with the drawbacks of mobile IP.

  14. Universal Space IP Transparent Proxy, Phase II

    National Aeronautics and Space Administration — Communications applications are strategically moving toward Internet Protocol-based architectures and technologies. Despite IP's huge potential, (e.g. cost...

  15. Systemic diffuse large B-cell lymphoma masquerading as neovascular glaucoma.

    Bawankar, Pritam; Das, Dipankar; Bhattacharjee, Harsha; Tayab, Shahinur; Deori, Nilutparna; Paulbuddhe, Vivek; Dhar, Shriya; Deka, Apurba

    2018-02-01

    We describe a case of spontaneous hyphema associated with anterior uveitis presents in a 69-year old female as the prominent sign of the intraocular spread of systemic diffuse large B-cell lymphoma (DLBCL). She had a history of diabetes and initially misdiagnosed as neovascular glaucoma. Clinical history of systemic lymphoma, characteristic findings on B-scan ultrasonography and magnetic resonance imaging scan, and identification of atypical lymphoid cells in aqueous sample established the diagnosis of intraocular metastasis of systemic DLBCL. Therefore, this report highlights that life-threatening malignant systemic lymphoma may masquerade as anterior segment ocular inflammation or neovascular glaucoma.

  16. Squamous cell carcinoma of penis with bullous pemphigoid masquerading as lymphogranuloma venereum

    Venugopal, V.; Gnanaraj, Pushpa; Fernandes, S. D.; Narasimhan, Murali; Karthikeyan, Subashini; Rahul, Shwetha

    2013-01-01

    We report a case of a 60-year old unmarried male who presented with multiple ulcers and foul smelling discharge from the groin since 4 months and multiple tense bullae over the trunk of 1 month duration. Groove sign was present. Investigations for lymphogranuloma venereum (LGV) and other sexually transmitted diseases were negative. Histopathology from the ulcer in the groin and growth in the penis revealed squamous cell carcinoma (SCC). Skin biopsy of bulla was diagnostic of bullous pemphigoid (BP). We report a rare case of SCC masquerading as LGV with BP occurring as a paraneoplastic phenomenon. PMID:23919055

  17. Masquerading bundle branch block as a presenting manifestation of complete atrioventricular block that caused syncope.

    Jiao, Zhenyu; Tian, Ying; Yang, Xinchun; Liu, Xingpeng

    2017-10-01

    A 59-year-old male patient was admitted with the main complaints of stuffiness and shortness of breath. An ECG from precordial leads on admission showed masquerading bundle branch block. Syncope frequently occurred after admission. During syncope episodes, ECG telemetry showed that the syncope was caused by intermittent complete atrioventricular block, with the longest RR interval lasting for 4.36 s. At the gap of syncope, ECG showed complete right bundle branch block accompanied by alternation of left anterior fascicular block and left posterior fascicular block. The patient was implanted with a dual-chamber permanent pacemaker. Follow-up of 9 months showed no reoccurrence of syncope.

  18. Womanliness as Masquerade: Tracing Luce Irigaray’s Theory in Angela Carter’s Nights at the Circus

    Yiğit Sümbül

    2015-12-01

    Full Text Available Womanliness as Masquerade: Tracing Luce Irigaray’s Theory in Angela Carter’s Nights at the Circus Abstract Published in 1977 with a great deal of controversy within European feminist circles, Luce Irigaray’s This Sex Which Is Not One presents the author’s commentary on the modern phallocentric culture, commodification of women and their counteraction disguised within the very patriarchal structures. Irigaray, for instance, views womanliness and female submissiveness as a strategy that women have always made use of in order to develop a much more unfettered self behind such masks. Women masquerade as objects to be consumed to achieve a freer voice from the patriarchal discourse and to establish themselves as the ultimate subjects of a never-ending cultural exchange. Irigaray’s views on female strategies such as masquerade and performativity are applicable to a feminist reading of Angela Carter’s famous postmodern novel, Nights at the Circus (1984, which critiques the patriarchal ideology with its suggestion of a New Woman. Fevvers, the protagonist of the novel, imprisons the male voice in the novel behind the invisible cage of her own world of performances and uses her womanliness to suppress the male willpower to the degree of self-submission. In this respect, this study argues that Carter’s generation of Fevvers as the New Woman is reminiscent of what Irigaray theorizes in her above article with respect to questions like womanliness, masquerade and performativity.

  19. Diseño e implementación de una plataforma para Voz sobre IP basado en FPGA.

    Orlando Landrove Gámez

    2011-05-01

    Full Text Available Normal 0 21 false false false MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Tabla normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin:0cm; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman"; mso-ansi-language:#0400; mso-fareast-language:#0400; mso-bidi-language:#0400;} El desarrollo de sistemas con microprocesadores embebidos dentro de un chip FPGA toma importancia pues permite diseños híbridos entre módulos hardware que ofrecen velocidad de procesamiento, e inteligencia a través de aplicaciones de alto nivel  sobre un microprocesador, todo dentro de un mismo dispositivo. Muchos de ellos se sirven de sistemas operativos con aplicaciones multitareas que logran el procesamiento eficiente de protocolos modernos para las telecomunicaciones. Asimismo es notable el crecimiento de aplicaciones de voz sobre IP (VoIP sobre las múltiples redes estándares de telecomunicaciones, debido a su flexibilidad, gran capacidad de diseño y actualización que tributa a servicios cada vez más completos. En este trabajo se describe la utilización del microprocesador MicroBlaze embebido sobre un Virtex5, una de las familias de FPGA de Xilinx. Se presentan sus módulos hardwares para albergar un sistema operativo con el kernel 2.6 de Linux, probándose con la Tarjeta de Desarrollo ML507 de Xilinx. Se utilizan aplicaciones sobre protocolos que se compilan e introducen dentro de los ficheros del Linux, soportado a su vez por el sistema MicroBlaze embebido dentro del FPGA. Se obtiene un cliente VoIP capaz de establecer comunicación y registro con el servidor VoIP y demás clientes de la red IP, llámese teléfonos IP, software VoIP. Se logra el funcionamiento del protocolo SIP, así como la preparación del protocolo RTP para su utilizaci

  20. Comparing genome-wide chromatin profiles using ChIP-chip or ChIP-seq

    Johannes, F.; Wardenaar, R.; Colome-Tatche, M.; Mousson, F.; de Graaf, P.; Mokry, M.; Guryev, V.; Timmers, H.T.; Cuppen, E.; Jansen, R.

    2010-01-01

    MOTIVATION: ChIP-chip and ChIP-seq technologies provide genome-wide measurements of various types of chromatin marks at an unprecedented resolution. With ChIP samples collected from different tissue types and/or individuals, we can now begin to characterize stochastic or systematic changes in

  1. Comparing genome-wide chromatin profiles using ChIP-chip or ChIP-seq

    Johannes, Frank; Wardenaar, Rene; Colomé Tatché, Maria; Mousson, Florence; de Graaf, Petra; Mokry, Michal; Guryev, Victor; Timmers, H. Th. Marc; Cuppen, Edwin; Jansen, Ritsert C.; Bateman, Alex

    2010-01-01

    Motivation: ChIP-chip and ChIP-seq technologies provide genomewide measurements of various types of chromatin marks at an unprecedented resolution. With ChIP samples collected from different tissue types and/ or individuals, we can now begin to characterize stochastic or systematic changes in

  2. Localitzador Gràfic de Direccions IP 'IpLocInspector'

    Ordóñez Chapado, Miguel

    2006-01-01

    En aquest treball s'ha desenvolupat una aplicació capaç de localitzar adreces IP. En este trabajo se ha desarrollado una aplicación capaz de localizar direcciones IP. In this work an application was developed capable of locating IP addresses.

  3. Mobile IP: state of the art report

    Karagiannis, Georgios; Heijenk, Geert

    Due to roaming, a mobile device may change its network attachment each time it moves to a new link. This might cause a disruption for the Internet data packets that have to reach the mobile node. Mobile IP is a protocol, developed by the Mobile IP Internet Engineering Task Force (IETF) working

  4. 75 FR 13235 - IP-Enabled Services

    2010-03-19

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 63 [WC Docket No. 04-36; FCC 09-40] IP-Enabled Services AGENCY: Federal Communications Commission ACTION: Final rule; announcement of effective date... Internet Protocol (VoIP) service the discontinuance obligations that apply to domestic non-dominant...

  5. DIVERSITY in binding, regulation, and evolution revealed from high-throughput ChIP.

    Mitra, Sneha; Biswas, Anushua; Narlikar, Leelavati

    2018-04-23

    Genome-wide in vivo protein-DNA interactions are routinely mapped using high-throughput chromatin immunoprecipitation (ChIP). ChIP-reported regions are typically investigated for enriched sequence-motifs, which are likely to model the DNA-binding specificity of the profiled protein and/or of co-occurring proteins. However, simple enrichment analyses can miss insights into the binding-activity of the protein. Note that ChIP reports regions making direct contact with the protein as well as those binding through intermediaries. For example, consider a ChIP experiment targeting protein X, which binds DNA at its cognate sites, but simultaneously interacts with four other proteins. Each of these proteins also binds to its own specific cognate sites along distant parts of the genome, a scenario consistent with the current view of transcriptional hubs and chromatin loops. Since ChIP will pull down all X-associated regions, the final reported data will be a union of five distinct sets of regions, each containing binding sites of one of the five proteins, respectively. Characterizing all five different motifs and the corresponding sets is important to interpret the ChIP experiment and ultimately, the role of X in regulation. We present diversity which attempts exactly this: it partitions the data so that each partition can be characterized with its own de novo motif. Diversity uses a Bayesian approach to identify the optimal number of motifs and the associated partitions, which together explain the entire dataset. This is in contrast to standard motif finders, which report motifs individually enriched in the data, but do not necessarily explain all reported regions. We show that the different motifs and associated regions identified by diversity give insights into the various complexes that may be forming along the chromatin, something that has so far not been attempted from ChIP data. Webserver at http://diversity.ncl.res.in/; standalone (Mac OS X/Linux) from https

  6. Two cases of uveitis masquerade syndrome caused by bilateral intraocular large B-cell lymphoma

    Jovanović Svetlana

    2013-01-01

    Full Text Available Introduction. Sometimes it is not easy to clinically recognize subtle differences between intraocular lymphoma and noninfectious uveitis. The most common lymphoma subtype involving the eye is B-cell lymphoma. Case report. We presented two patients aged 59 and 58 years with infiltration of the subretinal space with a large B-cell non-Hodgkin intraocular lymphoma. The patients originally had clinically masked syndrome in the form of intermediate uveitis. As it was a corticosteroid-resistant uveitis, we focused on the possible diagnosis of neoplastic causes of this syndrome. During hospitalization, the neurological symptoms emerged and multiple subretinal changes accompanied by yellowish white patches of retinal pigment epithelium with signs of vitritis, which made us suspect the intraocular lymphoma. Endocranial magnetic resonance imaging established tumorous infiltration in the region of the left hemisphere of the cerebellum. The histopathological finding confirmed the diagnosis of large B-cell non-Hodgkin lymphoma of risk moderate degree, immunoblast - centroblast cytological type. The other patient had clinical chronic uveitis accompanied by yellowish shaped white echographic changes of the retina and localized changes in the level of the subretina. The diagnosis of lymphoma was made by brain biopsy. Conclusion. Uveitis masquerade syndrome should be considered in all patients over 40 years with idiopathic steroid-resistant uveitis. Treatment begun on time can affect the course and improve the prognosis of uveitis masquerade syndrome (UMS and systemic disease.

  7. Getting Priorities Straight: Improving Linux Support for Database I/O

    Hall, Christoffer; Bonnet, Philippe

    2005-01-01

    advantage of Linux asynchronous I/O and how Linux can help MySQL/InnoDB best take advantage of the underlying I/O bandwidth. This is a crucial problem for the increasing number of MySQL servers deployed for very large database applications. In this paper, we rst show that the conservative I/O submission......The Linux 2.6 kernel supports asynchronous I/O as a result of propositions from the database industry. This is a positive evolution but is it a panacea? In the context of the Badger project, a collaboration between MySQL AB and University of Copenhagen, we evaluate how MySQL/InnoDB can best take...... policy used by InnoDB (as well as Oracle 9.2) leads to an under-utilization of the available I/O bandwidth. We then show that introducing prioritized asynchronous I/O in Linux will allow MySQL/InnoDB and the other Linux databases to fully utilize the available I/O bandwith using a more aggressive I...

  8. Securing VoIP keeping your VoIP network safe

    (Bud) Bates, Regis J Jr

    2015-01-01

    Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent

  9. Space Network IP Services (SNIS): An Architecture for Supporting Low Earth Orbiting IP Satellite Missions

    Israel, David J.

    2005-01-01

    The NASA Space Network (SN) supports a variety of missions using the Tracking and Data Relay Satellite System (TDRSS), which includes ground stations in White Sands, New Mexico and Guam. A Space Network IP Services (SNIS) architecture is being developed to support future users with requirements for end-to-end Internet Protocol (IP) communications. This architecture will support all IP protocols, including Mobile IP, over TDRSS Single Access, Multiple Access, and Demand Access Radio Frequency (RF) links. This paper will describe this architecture and how it can enable Low Earth Orbiting IP satellite missions.

  10. CompTIA Linux+ study guide exam LX0-103 and exam LX0-104

    Bresnahan, Christine

    2015-01-01

    CompTIA Authorized Linux+ prepCompTIA Linux+ Study Guide is your comprehensive study guide for the Linux+ Powered by LPI certification exams. With complete coverage of 100% of the objectives on both exam LX0-103 and exam LX0-104, this study guide provides clear, concise information on all aspects of Linux administration, with a focus on the latest version of the exam. You'll gain the insight of examples drawn from real-world scenarios, with detailed guidance and authoritative coverage of key topics, including GNU and Unix commands, system operation, system administration, system services, secu

  11. Implementing Discretionary Access Control with Time Character in Linux and Performance Analysis

    TAN Liang; ZHOU Ming-Tian

    2006-01-01

    DAC (Discretionary Access Control Policy) is access control based on ownership relations between subject and object, the subject can discretionarily decide on that who, by what methods, can access his owns object. In this paper, the system time is looked as a basic secure element. The DAC_T (Discretionary Access Control Policy with Time Character) is presented and formalized. The DAC_T resolves that the subject can discretionarily decide that who, on when, can access his owns objects. And then the DAC_T is implemented on Linux based on GFAC (General Framework for Access Control), and the algorithm is put forward. Finally, the performance analysis for the DAC_T_Linux is carried out. It is proved that the DAC_T_Linux not only can realize time constraints between subject and object but also can still be accepted by us though its performance have been decreased.

  12. Research and implementation of intelligent gateway driver layer based on Linux bus

    ZHANG Jian

    2016-10-01

    Full Text Available Currently,in the field of smart home,there is no relevant organization that yet has proposed an unified protocol standard.It increases the complexity and limitations of heterogeneous gateway software framework design that different vendor′s devices have different communication mode and protocol standards.In this paper,a serial of interfaces are provided by Linux kernel,and a virtual bus is registered under Linux.The physical device drivers are able to connect to the virtual bus.The detailed designs of the communication protocol are placed in the underlying adapters,making the integration of heterogeneous networks more natural.At the same time,designing the intelligent gateway system driver layer based on Linux bus can let the application layer be more unified and clear logical.And it also let the hardware access network become more convenient and distinct.

  13. Reuse of the compact nuclear simulator software under PC with Linux

    Cha, K. H.; Park, J. C.; Kwon, K. C.; Lee, G. Y.

    2000-01-01

    This study was approached to reuse source programs for a nuclear simulator under PC with Open Source Software(OSS) and to extend its applicability. Source programs in the Compact Nuclear Simulator(CNS), which has been operated for institutional research and training in KAERI, were reused and implemented for Linux-PC environment with the aim of supporting the study. PC with 500 MHz processor and Linux 2.2.5-22 kernel were utilized for the reuse implementation and it was investigated for some applications, through the functional testing for its main functions as interfaced with compact control panels in the current CNS. Development and upgrade of small-scale simulators, establishment of process simulation for PC, and development of prototype predictive simulation, can effectively be enabled with the experience though the reuse implementation was limited to port only CNS programs for PC with Linux

  14. Research on applications of ARM-LINUX embedded systems in manufacturing the nuclear equipment

    Nguyen Van Sy; Phan Luong Tuan; Nguyen Xuan Vinh; Dang Quang Bao

    2016-01-01

    A new microprocessor system that is ARM processor with open source Linux operating system is studied with the objective to apply ARM-Linux embedded systems in manufacturing the nuclear equipment. We use the development board of the company to learn and to build the workflow for an embedded system, then basing on the knowledge we design a motherboard embedded systems interface with the peripherals is buttons, LEDs through GPIO interface and connected with GM counting system via RS232 interface. The results of this study are: i) The procedures for working with embedded systems: process customization, installation embedded operating system and installation process, configure the development tools on the host computer; ii) ARM-Linux motherboard embedded systems interface with the peripherals and GM counting system, indicating the counts from GM counting system on the touch screen. (author)

  15. IP Address Management Principles and Practice

    Rooney, Timothy

    2010-01-01

    This book will be the first covering the subject of IP address management (IPAM). The practice of IPAM includes the application of network management disciplines to IP address space and associated network services, namely DHCP (Dynamic Host Configuration Protocol) and DNS (Domain Name System). The consequence of inaccurately configuring DHCP is that end users may not be able to obtain IP addresses to access the network. Without proper DNS configuration, usability of the network will greatly suffer as the name-to-address lookup process may fail. Imagine having to navigate to a website or send a

  16. Malware Memory Analysis of the Jynx2 Linux Rootkit (Part 1): Investigating a Publicly Available Linux Rootkit Using the Volatility Memory Analysis Framework

    2014-10-01

    represented by the Minister of National Defence, 2014 © Sa Majesté la Reine (en droit du Canada), telle que représentée par le ministre de la Défense...analysis techniques is outside the scope of this work, as it requires a comprehensive study of operating system internals and software reverse engineering...2 Peripheral concerns 2.1 Why examine Linux memory images or make them available? After extensively searching the available public

  17. ARTiS, an Asymmetric Real-Time Scheduler for Linux on Multi-Processor Architectures

    Piel , Éric; Marquet , Philippe; Soula , Julien; Osuna , Christophe; Dekeyser , Jean-Luc

    2005-01-01

    The ARTiS system is a real-time extension of the GNU/Linux scheduler dedicated to SMP (Symmetric Multi-Processors) systems. It allows to mix High Performance Computing and real-time. ARTiS exploits the SMP architecture to guarantee the preemption of a processor when the system has to schedule a real-time task. The implementation is available as a modification of the Linux kernel, especially focusing (but not restricted to) IA-64 architecture. The basic idea of ARTiS is to assign a selected se...

  18. Linux toys II 9 Cool New Projects for Home, Office, and Entertainment

    Negus, Christopher

    2006-01-01

    Builds on the success of the original Linux Toys (0-7645-2508-5) and adds projects using different Linux distributionsAll-new toys in this edition include a car computer system with built-in entertainment and navigation features, bootable movies, a home surveillance monitor, a LEGO Mindstorms robot, and a weather mapping stationIntroduces small business opportunities with an Internet radio station and Internet caf ̌projectsCompanion Web site features specialized hardware drivers, software interfaces, music and game software, project descriptions, and discussion forumsIncludes a CD-ROM with scr

  19. LPIC-2 Linux Professional Institute Certification Study Guide Exams 201 and 202

    Smith, Roderick W

    2011-01-01

    The first book to cover the LPIC-2 certification Linux allows developers to update source code freely, making it an excellent, low-cost, secure alternative to alternate, more expensive operating systems. It is for this reason that the demand for IT professionals to have an LPI certification is so strong. This study guide provides unparalleled coverage of the LPIC-2 objectives for exams 201 and 202. Clear and concise coverage examines all Linux administration topics while practical, real-world examples enhance your learning process. On the CD, you'll find the Sybex Test Engine, electronic flash

  20. Memanfaatkan Sistem Operasi Linux Untuk Keamanan Data Pada E-commerce

    Isnania

    2012-01-01

    E-commerce is one of the major networks to do the transaction, where security is an issue that must be considered vital to the security of customer data and transactions. To realize the process of e-commerce, let prepared operating system (OS) that are reliable to secure the transaction path and also Dynamic Database back end that provides a product catalog that will be sold online. For technology, we can adopt open source technologies that are all available on linux. On linux it's too bundle...

  1. PhyLIS: A Simple GNU/Linux Distribution for Phylogenetics and Phyloinformatics

    Robert C. Thomson

    2009-01-01

    Full Text Available PhyLIS is a free GNU/Linux distribution that is designed to provide a simple, standardized platform for phylogenetic and phyloinformatic analysis. The operating system incorporates most commonly used phylogenetic software, which has been pre-compiled and pre-configured, allowing for straightforward application of phylogenetic methods and development of phyloinformatic pipelines in a stable Linux environment. The software is distributed as a live CD and can be installed directly or run from the CD without making changes to the computer. PhyLIS is available for free at http://www.eve.ucdavis.edu/rcthomson/phylis/.

  2. Getting priorities straight: improving Linux support for database I/O

    Hall, Christoffer; Bonnet, Philippe

    2005-01-01

    The Linux 2.6 kernel supports asynchronous I/O as a result of propositions from the database industry. This is a positive evolution but is it a panacea? In the context of the Badger project, a collaboration between MySQL AB and University of Copenhagen, ......The Linux 2.6 kernel supports asynchronous I/O as a result of propositions from the database industry. This is a positive evolution but is it a panacea? In the context of the Badger project, a collaboration between MySQL AB and University of Copenhagen, ...

  3. An approach to improving the structure of error-handling code in the linux kernel

    Saha, Suman; Lawall, Julia; Muller, Gilles

    2011-01-01

    The C language does not provide any abstractions for exception handling or other forms of error handling, leaving programmers to devise their own conventions for detecting and handling errors. The Linux coding style guidelines suggest placing error handling code at the end of each function, where...... an automatic program transformation that transforms error-handling code into this style. We have applied our transformation to the Linux 2.6.34 kernel source code, on which it reorganizes the error handling code of over 1800 functions, in about 25 minutes....

  4. PhyLIS: a simple GNU/Linux distribution for phylogenetics and phyloinformatics.

    Thomson, Robert C

    2009-07-30

    PhyLIS is a free GNU/Linux distribution that is designed to provide a simple, standardized platform for phylogenetic and phyloinformatic analysis. The operating system incorporates most commonly used phylogenetic software, which has been pre-compiled and pre-configured, allowing for straightforward application of phylogenetic methods and development of phyloinformatic pipelines in a stable Linux environment. The software is distributed as a live CD and can be installed directly or run from the CD without making changes to the computer. PhyLIS is available for free at http://www.eve.ucdavis.edu/rcthomson/phylis/.

  5. Intellectual Property and Strategic Agreements (IP/SA) | FNLCR

    What does IP/SA handle? IP/SA handles all invention issues including patents and copyrights. All employee inventionreports are filed through the IP/SA office for all activities under the OTS contract.Additionally,&nbs

  6. China's Indigenous IP Policies -- Here to Stay?

    Prud'homme, Dan

    2013-01-01

    In 2010 and 2011, foreign businesses and governments welcomed measures believed to dramatically reform a highly controversial branch of China’s indigenous innovation policy which provided government procurement preferences to applicants who can meet restrictive indigenous intellectual property (IP) rights requirements. However, this article describes specific examples of (what can be labeled) China’s “indigenous IP policy” that are still very much in force, in particular several programs link...

  7. HPC Access Using KVM over IP

    2007-06-08

    Lightwave VDE /200 KVM-over-Fiber (Keyboard, Video and Mouse) devices installed throughout the TARDEC campus. Implementation of this system required...development effort through the pursuit of an Army-funded Phase-II Small Business Innovative Research (SBIR) effort with IP Video Systems (formerly known as...visualization capabilities of a DoD High- Performance Computing facility, many advanced features are necessary. TARDEC-HPC’s SBIR with IP Video Systems

  8. Heterogeneous IP Ecosystem enabling Reuse (HIER)

    2017-03-22

    HIER project, DARPA also established additional concepts in the formation of the Common Heterogeneous Integration and IP Reuse Strategies (CHIPS...would need a major change to  business model to offer  Hard  or Soft IP – So CHIPS program can be a better fit to these firms • DoD‐Contractor IP pricing

  9. Development of Automatic Live Linux Rebuilding System with Flexibility in Science and Engineering Education and Applying to Information Processing Education

    Sonoda, Jun; Yamaki, Kota

    We develop an automatic Live Linux rebuilding system for science and engineering education, such as information processing education, numerical analysis and so on. Our system is enable to easily and automatically rebuild a customized Live Linux from a ISO image of Ubuntu, which is one of the Linux distribution. Also, it is easily possible to install/uninstall packages and to enable/disable init daemons. When we rebuild a Live Linux CD using our system, we show number of the operations is 8, and the rebuilding time is about 33 minutes on CD version and about 50 minutes on DVD version. Moreover, we have applied the rebuilded Live Linux CD in a class of information processing education in our college. As the results of a questionnaires survey from our 43 students who used the Live Linux CD, we obtain that the our Live Linux is useful for about 80 percents of students. From these results, we conclude that our system is able to easily and automatically rebuild a useful Live Linux in short time.

  10. The Free Software Movement and the GNU/Linux Operating System

    CERN. Geneva

    2003-01-01

    Richard Stallman will speak about the purpose, goals, philosophy, methods, status, and future prospects of the GNU operating system, which in combination with the kernel Linux is now used by an estimated 17 to 20 million users world wide.BiographyRichard Stallman is the founder of the Gnu Project, launched in 1984 to develop the free operating system GNU (an acronym for ''GNU's Not Unix''), and thereby give computer users the freedom that most of them have lost. GNU is free software: everyone is free to copy it and redistribute it, as well as to make changes either large or small. Today, Linux-based variants of the GNU system, based on the kernel Linux developed by Linus Torvalds, are in widespread use. There are estimated to be some 20 million users of GNU/Linux systems today. Richard Stallman is the principal author of the GNU Compiler Collection, a portable optimizing compiler which was designed to support diverse architectures and multiple languages. The compiler now supports over 30 different architect...

  11. Convolutional Neural Network on Embedded Linux System-on-Chip: A Methodology and Performance Benchmark

    2016-05-01

    Linux® is a registered trademark of Linus Torvalds. NVIDIA ® is a registered trademark of NVIDIA Corporation. Oracle® is a registered trademark of...two NVIDIA ® GTX580 GPUs [3]. Therefore, for this initial work, we decided to concentrate on small networks and small datasets until the methods are

  12. WYSIWIB: A Declarative Approach to Finding API Protocols and Bugs in Linux Code

    Lawall, Julia; Brunel, Julien Pierre Manuel; Palix, Nicolas Jean-Michel

    2009-01-01

    the tools on specific kinds of bugs and to relate the results to patterns in the source code. We propose a declarative approach to bug finding in Linux OS code using a control-flow based program search engine. Our approach is WYSIWIB (What You See Is Where It Bugs), since the programmer expresses...

  13. Web application for monitoring mainframe computer, Linux operating systems and application servers

    Dimnik, Tomaž

    2016-01-01

    This work presents the idea and the realization of web application for monitoring the operation of the mainframe computer, servers with Linux operating system and application servers. Web application is intended for administrators of these systems, as an aid to better understand the current state, load and operation of the individual components of the server systems.

  14. NSC KIPT Linux cluster for computing within the CMS physics program

    Levchuk, L.G.; Sorokin, P.V.; Soroka, D.V.

    2002-01-01

    The architecture of the NSC KIPT specialized Linux cluster constructed for carrying out work on CMS physics simulations and data processing is described. The configuration of the portable batch system (PBS) on the cluster is outlined. Capabilities of the cluster in its current configuration to perform CMS physics simulations are pointed out

  15. Implementation of the On-the-fly Encryption for the Linux OS Based on Certified CPS

    Alexander Mikhailovich Korotin

    2013-02-01

    Full Text Available The article is devoted to tools for on-the-fly encryption and a method to implement such tool for the Linux OS based on a certified CPS.The idea is to modify the existing tool named eCryptfs. Russian cryptographic algorithms will be used in the user and kernel modes.

  16. Design of software platform based on linux operating system for γ-spectrometry instrument

    Hong Tianqi; Zhou Chen; Zhang Yongjin

    2008-01-01

    This paper described the design of γ-spectrometry instrument software platform based on s3c2410a processor with arm920t core, emphases are focused on analyzing the integrated application of embedded linux operating system, yaffs file system and qt/embedded GUI development library. It presented a new software platform in portable instrument for γ measurement. (authors)

  17. Granulocytic sarcoma masquerading as Ewing′s sarcoma: A diagnostic dilemma

    Haresh Kunhi

    2008-01-01

    Full Text Available An eleven-year-old boy presented with a swelling in his left elbow. Radiologically the features were that of an Ewing′s sarcoma involving the ulna. Histopathology showed small round cell tumor strongly positive for Monoclonal Imperial Cancer research fund 2 (MIC2 antigen. Similar cells in the bone marrow were involved with MIC2 positivity. The patient developed skin lesions, which on biopsy were found to be chloromas. The initial biopsies were reevaluated with special stains revealing granulocytic sarcomas in acute myeloid leukemia masquerading as Ewing′s due to its MIC2 positivity. The possibility of myeloid neoplasms should be considered routinely with known MIC2 positive round cell tumors.

  18. A type II first branchial cleft cyst masquerading as an infected parotid Warthin's tumor.

    Chen, Meng-Feng; Ueng, Shir-Hwa; Jung, Shih-Ming; Chen, Yao-Liang; Chang, Kai-Ping

    2006-01-01

    The diagnosis of a parotid mass usually depends on thorough history taking and physical examination. Diagnostic modalities, including ultrasonographic examinations, computed tomography and magnetic resonance images, may also provide substantial information but their accuracy for diagnosis is sometimes questionable, especially in differentiating some rare neoplasms. First branchial cleft cysts (FBCCs) are rare causes of parotid swelling and comprise less than 1% of all branchial anomalies. They are frequently misdiagnosed due to their rarity and unfamiliar clinical signs and symptoms. We present a case of type II FBCC masquerading as an infected parotid Warthin's tumor. We also review the clinical signs and symptoms of FBCCs in order to remind clinicians that this rare branchial anomaly can mimic an infected Warthin's tumor and may be seated in the deep lobe of the parotid gland. By making an accurate pre-operative diagnosis of type II FBCC, we can minimize surgical morbidity and avoid incomplete resection and possible recurrence.

  19. Fashion pictures and women pictures in French women magazine. Normatives parades or strategic masquerade?

    Justine MARILLONNET

    2014-12-01

    Full Text Available This article proposes to study the fashion pictures within a representative sample of French women magazines. Based on the method of “sémiologie des indices”, used to analyze a corpus of woman’s body and fashion staged, this paper addresses the issue of new functions granted to the stereotyping process. Starting to the assumption of a contract between audience and media, this analysis shows that the gender stereotype may be prescribed, up to a caricature of the womanhood, to the female readers identified as co-producers of the media discourse. Demonstrating both the co-existence of a plurality of gender representations in its pictures and their variability, this work proposes the concept of strategic masquerade to apprehend the possible new functions for the process of gender stereotyping in media.

  20. Squamous Cell Carcinoma Arising in Mature Teratoma of the Ovary Masquerading as Abdominal Tuberculosis

    Shreeya Taresh Indulkar

    2018-01-01

    Full Text Available Pure squamous cell carcinoma (SCC of the ovary is rare. SCC can arise in a mature teratoma (MT, ovarian endometriosis or in a Brenner tumor. SCC is the most common malignant transformation arising in MT and comprises 80% of all cases. Such neoplastic transformations are extremely difficult either to predict or detect early. The mechanism of malignant transformation has not been completely understood. Due to the rarity and the aggressive course, diagnosis and treatment constitute a big challenge. We report a case of SCC arising in MT presenting with a huge abdominopelvic mass and abundant peritoneal collections clinically masquerading as abdominal tuberculosis. A review of literature with special emphasis on prognosis and treatment modalities is also presented.

  1. A masquerade is not watched from one spot: reassessing the study of African religions

    Umar Habila Dadem Danfulani

    1999-01-01

    Full Text Available The search for an adequate methodological approach to the study of African Religions in their multiformity has been a fervent one. In this paper, approaches to the study of African Religions today are proposed. These are polymethodic and multidimentional approaches, the contextual study of African Religions, the historical approaches (demonstrated in the art of masquerading, the need to balance synchronic and diachronic approaches, the use of art and iconography in the study and female studies. The fifth focuses on studying African Religions as insider. The author also examines the problems of the "insider" and the politics of doing research in history of religions in a Nigerian university.The conclusion strongly recommends a multidisciplinary approach for studying African Religions.

  2. ejIP: A TCP/IP Stack for Embedded Java

    Schoeberl, Martin

    2011-01-01

    present the design and implementation of a network stack written entirely in Java. This implementation serves as an example how to implement system functions in a safe language and gives evidence that Java can be used for operating system related functionality. The described TCP/IP stack ejIP has already...

  3. Outbreak of Ips nitidus and Ips shangrila in northeastern margin of the Tibetan Plateau

    Jakuš, R.; Kalinová, Blanka; Hoskovec, Michal; Knížek, M.; Schlyter, F.; Sun, J.-H.; Zhang, Q. H.

    2011-01-01

    Roč. 89, - (2011), s. 111-117 ISSN 1436-1566 R&D Projects: GA MŠk ME 860 Institutional research plan: CEZ:AV0Z40550506 Keywords : Ips shangrila * Ips nitidus * pheromone s * GCxGC-TOFMS Subject RIV: CC - Organic Chemistry

  4. A survey of IP over ATM architectures

    Chen, H.; Tsang, R.; Brandt, J.; Hutchins, J.

    1997-07-01

    Over the past decade, the Internet has burgeoned into a worldwide information highway consisting of approximately 5 million hosts on over 45,000 interconnected networks. This unprecedented growth, together with the introduction of multimedia workstations, has spurred the development of innovative applications that require high speed, low latency, and real-time transport. Today`s Internet can neither scale in its bandwidth nor guarantee the Quality of Services (QoS) necessary to meet these performance requirements. Many network researchers propose to use the Asynchronous Transfer Mode (ATM) technology as the underlying infrastructure for the next generation of workgroup, campus, and enterprise IP networks. Since ATM is significantly different from today`s legacy network technologies, efficient implementation of IP over ATM is especially challenging. This tutorial paper covers several existing proposals that integrate IP over ATM.

  5. Secure IP mobility management for VANET

    Taha, Sanaa

    2013-01-01

    This brief presents the challenges and solutions for VANETs' security and privacy problems occurring in mobility management protocols including Mobile IPv6 (MIPv6), Proxy MIPv6 (PMIPv6), and Network Mobility (NEMO). The authors give an overview of the concept of the vehicular IP-address configurations as the prerequisite step to achieve mobility management for VANETs, and review the current security and privacy schemes applied in the three mobility management protocols. Throughout the brief, the authors propose new schemes and protocols to increase the security of IP addresses within VANETs in

  6. MICROSOFT DYNAMICS CRM IN CISCO IP TELEFONIJA

    Knez, Margareta

    2011-01-01

    Microsoft Dynamics CRM je le ena od mnogih rešitev CRM, ki se iz dneva v dan bolj izpopolnjuje in postaja prijaznejša za uporabnike. Na trgu je še mnogo drugih konkurenčnih rešitev programskega orodja CRM. Tako je tudi Ciscova IP-telefonija le ena od mnogih ponudnikov te tehnologije. IP-telefonija bo počasi spodrinila navadno telefonsko linijo, saj je veliko cenejša in ponuja še mnogo dodatnih funkcionalnosti. Le lepa beseda in dobra komunikacija sta potrebni, da stranko zadovoljimo in...

  7. Extending Tactical Fleet Communications Through VoIP

    2014-09-01

    corporate world , the military is leveraging VoIP communication solutions as well. Shore commands like Tactical Training Group Pacific use VoIP for...VoIP fuzzing (e.g., Asteroid , PROTOS, Sip-Proxy)  VoIP signaling manipulation (e.g., IAXAuthJack, IAXHangup, SIP-Kill)  VoIP media...as well, but instead of just matching the information to rules, it compares synchronization information between the protocols to determine if the

  8. VoIP Accessibility: A Usability Study of Voice over Internet Protocol (VoIP) Systems and A Survey of VoIP Users with Vision Loss

    Packer, Jaclyn; Reuschel, William

    2018-01-01

    Introduction: Accessibility of Voice over Internet Protocol (VoIP) systems was tested with a hands-on usability study and an online survey of VoIP users who are visually impaired. The survey examined the importance of common VoIP features, and both methods assessed difficulty in using those features. Methods: The usability test included four paid…

  9. Presence in the IP Multimedia Subsystem

    Ling Lin

    2007-01-01

    Full Text Available With an ever increasing penetration of Internet Protocol (IP technologies, the wireless industry is evolving the mobile core network towards all-IP network. The IP Multimedia Subsystem (IMS is a standardised Next Generation Network (NGN architectural framework defined by the 3rd Generation Partnership Project (3GPP to bridge the gap between circuit-switched and packet-switched networks and consolidate both sides into on single all-IP network for all services. In this paper, we provide an insight into the limitation of the presence service, one of the fundamental building blocks of the IMS. Our prototype-based study is unique of its kind and helps identifying the factors which limit the scalability of the current version of the presence service (3GPP TS 23.141 version 7.2.0 Release 7 [1], which will in turn dramatically limit the performance of advanced IMS services. We argue that the client-server paradigm behind the current IMS architecture does not suite the requirements of the IMS system, which defies the very purpose of its introduction. We finally elaborate on possible avenues for addressing this problem.

  10. IP validation in remote microelectronics testing

    Osseiran, Adam; Eshraghian, Kamran; Lachowicz, Stefan; Zhao, Xiaoli; Jeffery, Roger; Robins, Michael

    2004-03-01

    This paper presents the test and validation of FPGA based IP using the concept of remote testing. It demonstrates how a virtual tester environment based on a powerful, networked Integrated Circuit testing facility, aimed to complement the emerging Australian microelectronics based research and development, can be employed to perform the tasks beyond the standard IC test. IC testing in production consists in verifying the tested products and eliminating defective parts. Defects could have a number of different causes, including process defects, process migration and IP design and implementation errors. One of the challenges in semiconductor testing is that while current fault models are used to represent likely faults (stuck-at, delay, etc.) in a global context, they do not account for all possible defects. Research in this field keeps growing but the high cost of ATE is preventing a large community from accessing test and verification equipment to validate innovative IP designs. For these reasons a world class networked IC teletest facility has been established in Australia under the support of the Commonwealth government. The facility is based on a state-of-the-art semiconductor tester operating as a virtual centre spanning Australia and accessible internationally. Through a novel approach the teletest network provides virtual access to the tester on which the DUT has previously been placed. The tester software is then accessible as if the designer is sitting next to the tester. This paper presents the approach used to test and validate FPGA based IPs using this remote test approach.

  11. Experimental evaluation of the IP multimedia subsystem

    Oredope, A.; Liotta, A.; Yang, K.; Tyrode-Goilo, D.H.; Magedanz, T.; Mauro Madeira, E.R.M.; Dini, P.

    2005-01-01

    The IP Multimedia Subsystem (IMS) is the latest framework for a seamless conversion of the ordinary Internet with mobile cellular systems. As such it has the backing of all major companies since it aims to offer a unified solution to integrated mobile services, including mechanisms for security,

  12. EQuIP-ped for Success

    Ewing, Molly

    2015-01-01

    The Educators Evaluating the Quality of Instructional Products (EQuIP) Rubric for science is a new tool for science educators that provides criteria by which to examine the alignment and overall quality of lessons and units with respect to the "Next Generation Science Standards" ("NGSS"). The rubric criteria are divided into…

  13. IP-I0 BASED IMMUNOLOGICAL MONITORING

    2008-01-01

    The present invention relates to an immunological method and, more particularly, a method for measuring cell-mediated immune reactivity (CMI) in mammals based on the production of IP-10.The invention further discloses an assay and a kit for measuring CMI to an antigen using whole blood or other...

  14. Spojení s dynamickou IP adresou

    Papík, Martin; Hodboď, J.

    2013-01-01

    Roč. 47, č. 2 (2013), s. 60-61 ISSN 1211-0906 R&D Projects: GA ČR GA13-02149S Institutional support: RVO:67985556 Keywords : dynamical IP adress * dynamic DNS * web services Subject RIV: JC - Computer Hardware ; Software

  15. Wireless IP and building the mobile Internet

    Dixit, Sudhir; Prasad, Ramjee

    2003-01-01

    ..., as well as the shortage of technical material in a single place in the field of wireless IP and closely related technologies that form the critical success factors. Therefore, we decided to invite the experts who are truly active in the field: the equipment manufacturers, mobile operators, and those working in research laboratories and unive...

  16. Operational Space Weather Products at IPS

    Neudegg, D.; Steward, G.; Marshall, R.; Terkildsen, M.; Kennewell, J.; Patterson, G.; Panwar, R.

    2008-12-01

    IPS Radio and Space Services operates an extensive network (IPSNET) of monitoring stations and observatories within the Australasian and Antarctic regions to gather information on the space environment. This includes ionosondes, magnetometers, GPS-ISM, oblique HF sounding, riometers, and solar radio and optical telescopes. IPS exchanges this information with similar organisations world-wide. The Regional Warning Centre (RWC) is the Australian Space Forecast Centre (ASFC) and it utilizes this data to provide products and services to support customer operations. A wide range of customers use IPS services including; defence force and emergency services using HF radio communications and surveillance systems, organisations involved in geophysical exploration and pipeline cathodic protection, GPS users in aviation. Subscriptions to the alerts, warnings, forecasts and reports regarding the solar, geophysical and ionospheric conditions are distributed by email and Special Message Service (SMS). IPS also develops and markets widely used PC software prediction tools for HF radio skywave and surface wave (ASAPS/GWPS) and provides consultancy services for system planning.

  17. Searching CLEF-IP by Strategy

    W. Alink (Wouter); R. Cornacchia (Roberto); A.P. de Vries (Arjen)

    2010-01-01

    htmlabstractTasks performed by intellectual property specialists are often ad hoc, and continuously require new approaches to search a collection of documents. We therefore investigate the benets of a visual `search strategy builder' to allow IP search experts to express their approach to

  18. Teaching Network Security with IP Darkspace Data

    Zseby, Tanja; Iglesias Vázquez, Félix; King, Alistair; Claffy, K. C.

    2016-01-01

    This paper presents a network security laboratory project for teaching network traffic anomaly detection methods to electrical engineering students. The project design follows a research-oriented teaching principle, enabling students to make their own discoveries in real network traffic, using data captured from a large IP darkspace monitor…

  19. Enhancing the Classification Accuracy of IP Geolocation

    2013-10-01

    accurately identify the geographic location of Internet devices has signficant implications for online- advertisers, application developers , network...Real Media, Comedy Central, Netflix and Spotify) and target advertising (e.g., Google). More re- cently, IP geolocation techniques have been deployed...distance to delay function and how they triangulate the position of the target. Statistical Geolocation [14] develops a joint probability density

  20. PERBANDINGAN KINERJA IP SEC DAN SSL

    Dessyanto Boedi P

    2015-04-01

    Full Text Available Ipsec (IP Security and SSL (Secure Socket Layer is the most widely used techniques to secure data communications over the Internet. Both of these techniques has advantages and disadvantages of each. The purpose of this study is to present an analysis of the two techniques above in terms of security and performance.

  1. High-speed data acquisition with the Solaris and Linux operating systems

    Zilker, M.; Heimann, P.

    2000-01-01

    In this paper, we discuss whether Solaris and Linux are suitable for data acquisition systems in soft real time conditions. As an example we consider a plasma diagnostic (Mirnov coils), which collects data for a complete plasma discharge of about 10 s from up to 72 channels. Each ADC-Channel generates a data stream of 4 MB/s. To receive these data streams an eight-channel Hotlink PCI interface board was designed. With a prototype system using Solaris and the driver developed by us we investigate important properties of the operating system such as the I/O performance and scheduling of processes. We compare the Solaris operating system on the Ultra Sparc platform with Linux on the Intel platform. Finally, some points of user program development are mentioned to show how the application can make the most efficient use of the underlying high-speed I/O system

  2. MySQL databases as part of the Online Business, using a platform based on Linux

    Ion-Sorin STROE

    2011-09-01

    Full Text Available The Internet is a business development environment that has major advantages over traditional environment. From a financial standpoint, the initial investment is much reduced and, as yield, the chances of success are considerably higher. Developing an online business also depends on the manager’s ability to use the best solutions, sustainable on a long term. The current trend is to decrease the costs for the technical platform by adopting open-source license products. Such platform is based on a Linux operating system and a database system based on MySQL product. This article aims to answer two basic questions: “A platform based on Linux and MySQL can handle the demands of an online business?” and “Adopting such a solution has the effect of increasing profitability?”

  3. A PC parallel port button box provides millisecond response time accuracy under Linux.

    Stewart, Neil

    2006-02-01

    For psychologists, it is sometimes necessary to measure people's reaction times to the nearest millisecond. This article describes how to use the PC parallel port to receive signals from a button box to achieve millisecond response time accuracy. The workings of the parallel port, the corresponding port addresses, and a simple Linux program for controlling the port are described. A test of the speed and reliability of button box signal detection is reported. If the reader is moderately familiar with Linux, this article should provide sufficient instruction for him or her to build and test his or her own parallel port button box. This article also describes how the parallel port could be used to control an external apparatus.

  4. Free and open source software at CERN: integration of drivers in the Linux kernel

    Gonzalez Cobas, J.D.; Iglesias Gonsalvez, S.; Howard Lewis, J.; Serrano, J.; Vanga, M.; Cota, E.G.; Rubini, A.; Vaga, F.

    2012-01-01

    Most device drivers written for accelerator control systems suffer from a severe lack of portability due to the ad hoc nature of the code, often embodied with intimate knowledge of the particular machine it is deployed in. In this paper we challenge this practice by arguing for the opposite approach: development in the open, which in our case translates into the integration of our code within the Linux kernel. We make our case by describing the upstream merge effort of the tsi148 driver, a critical (and complex) component of the control system. The encouraging results from this effort have then led us to follow the same approach with two more ambitious projects, currently in the works: Linux support for the upcoming FMC boards and a new I/O subsystem. (authors)

  5. The Linux based distributed data acquisition system for the ISTRA+ experiment

    Filin, A.; Inyakin, A.; Novikov, V.; Obraztsov, V.; Smirnov, N.; Vlassov, E.; Yuschenko, O.

    2001-01-01

    The DAQ hardware of the ISTRA+ experiment consists of the VME system crate that contains two PCI-VME bridges interfacing two PCs with VME, external interrupts receiver, the readout controller for dedicated front-end electronics, the readout controller buffer memory module, the VME-CAMAC interface, and additional control modules. The DAQ computing consist of 6 PCs running the Linux operating system and linked into LAN. The first PC serves the external interrupts and acquires the data from front-end electronic. The second one is the slow control computer. The remaining PCs host the monitoring and data analysis software. The Linux based DAQ software provides the external interrupts processing, the data acquisition, recording, and distribution between monitoring and data analysis tasks running at DAQ PCs. The monitoring programs are based on two packages for data visualization: home-written one and the ROOT system. MySQL is used as a DAQ database

  6. An update on perfmon and the struggle to get into the Linux kernel

    Nowak, Andrzej, E-mail: Andrzej.Nowak@cern.c [CERN openlab (Switzerland)

    2010-04-01

    At CHEP2007 we reported on the perfmon2 subsystem as a tool for interfacing to the PMUs (Performance Monitoring Units) which are found in the hardware of all modern processors (from AMD, Intel, SUN, IBM, MIPS, etc.). The intent was always to get the subsystem into the Linux kernel by default. This paper reports on how progress was made (after long discussions) and will also show the latest additions to the subsystems.

  7. An update on perfmon and the struggle to get into the Linux kernel

    Nowak, Andrzej

    2010-01-01

    At CHEP2007 we reported on the perfmon2 subsystem as a tool for interfacing to the PMUs (Performance Monitoring Units) which are found in the hardware of all modern processors (from AMD, Intel, SUN, IBM, MIPS, etc.). The intent was always to get the subsystem into the Linux kernel by default. This paper reports on how progress was made (after long discussions) and will also show the latest additions to the subsystems.

  8. A real-time data transmission method based on Linux for physical experimental readout systems

    Cao Ping; Song Kezhu; Yang Junfeng

    2012-01-01

    In a typical physical experimental instrument, such as a fusion or particle physical application, the readout system generally implements an interface between the data acquisition (DAQ) system and the front-end electronics (FEE). The key task of a readout system is to read, pack, and forward the data from the FEE to the back-end data concentration center in real time. To guarantee real-time performance, the VxWorks operating system (OS) is widely used in readout systems. However, VxWorks is not an open-source OS, which gives it has many disadvantages. With the development of multi-core processor and new scheduling algorithm, Linux OS exhibits performance in real-time applications similar to that of VxWorks. It has been successfully used even for some hard real-time systems. Discussions and evaluations of real-time Linux solutions for a possible replacement of VxWorks arise naturally. In this paper, a real-time transmission method based on Linux is introduced. To reduce the number of transfer cycles for large amounts of data, a large block of contiguous memory buffer for DMA transfer is allocated by modifying the Linux Kernel (version 2.6) source code slightly. To increase the throughput for network transmission, the user software is designed into formation of parallelism. To achieve high performance in real-time data transfer from hardware to software, mapping techniques must be used to avoid unnecessary data copying. A simplified readout system is implemented with 4 readout modules in a PXI crate. This system can support up to 48 MB/s data throughput from the front-end hardware to the back-end concentration center through a Gigabit Ethernet connection. There are no restrictions on the use of this method, hardware or software, which means that it can be easily migrated to other interrupt related applications.

  9. genepop'007: a complete re-implementation of the genepop software for Windows and Linux.

    Rousset, François

    2008-01-01

    This note summarizes developments of the genepop software since its first description in 1995, and in particular those new to version 4.0: an extended input format, several estimators of neighbourhood size under isolation by distance, new estimators and confidence intervals for null allele frequency, and less important extensions to previous options. genepop now runs under Linux as well as under Windows, and can be entirely controlled by batch calls. © 2007 The Author.

  10. Empirical tests of Zipf's law mechanism in open source Linux distribution.

    Maillart, T; Sornette, D; Spaeth, S; von Krogh, G

    2008-11-21

    Zipf's power law is a ubiquitous empirical regularity found in many systems, thought to result from proportional growth. Here, we establish empirically the usually assumed ingredients of stochastic growth models that have been previously conjectured to be at the origin of Zipf's law. We use exceptionally detailed data on the evolution of open source software projects in Linux distributions, which offer a remarkable example of a growing complex self-organizing adaptive system, exhibiting Zipf's law over four full decades.

  11. Disk cloning program 'Dolly+' for system management of PC Linux cluster

    Atsushi Manabe

    2001-01-01

    The Dolly+ is a Linux application program to clone files and disk partition image from a PC to many others. By using several techniques such as logical ring connection, multi threading and pipelining, it could achieve high performance and scalability. For example, in typical condition, installations to a hundred PCs takes almost equivalent time for two PCs. Together with the Intel PXE and the RedHat kickstart, automatic and very fast system installation and upgrading could be performed

  12. Using VoIP to compete.

    Werbach, Kevin

    2005-09-01

    Internet telephony, or VoIP, is rapidly replacing the conventional kind. This year, for the first time, U.S. companies bought more new Internet-phone connections than standard lines. The major driver behind this change is cost. But VoIP isn't just a new technology for making old-fashioned calls cheaper, says consultant Kevin Werbach. It is fundamentally changing how companies use voice communications. What makes VoIP so powerful is that it turns voice into digital data packets that can be stored, copied, combined with other data, and distributed to virtually any device that connects to the Internet. And it makes it simple to provide all the functionality of a corporate phone-call features, directories, security-to anyone anywhere there's broadband access. That fosters new kinds of businesses such as virtual call centers, where widely dispersed agents work at all hours from their homes. The most successful early adopters, says Werbach, will focus more on achieving business objectives than on saving money. They will also consider how to push VoIP capabilities out to the extended organization, making use of everyone as a resource. Deployment may be incremental, but companies should be thinking about where VoIP could take them. Executives should ask what they could do if, on demand, they could bring all their employees, customers, suppliers, and partners together in a virtual room, with shared access to every modern communications and computing channel. They should take a fresh look at their business processes to find points at which richer and more customizable communications could eliminate bottlenecks and enhance quality. The important dividing line won't be between those who deploy Vol P and those who don't, or even between early adopters and laggards. It will be between those who see Vol P as just a new way to do the same old things and those who use itto rethink their entire businesses.

  13. Aplicación de RT-Linux en el control de motores de pasos. Parte II; Appication of RT-Linux in the Control of Steps Motors. Part II

    Ernesto Duany Renté

    2011-02-01

    Full Text Available Este trabajo complementa al presentado anteriormente: "Aplicación de RT-Linux en el control de motoresde pasos. Primera parte", de manera que se puedan relacionar a las tareas de adquisición y control para laobtención de un sistema lo más exacto posible. Las técnicas empleadas son las de tiempo real aprovechandolas posibilidades del microkernel RT-Linux y los software libres contenidos en sistemas Unix/Linux. Lasseñales se obtienen mediante un conversor AD y mostradas en pantalla empleando el Gnuplot.  The work presented in this paper is a complement to the control and acquisition tasks which were explainedin "Application of RT-Linux in the Control of Steps Motors. First Part", so that those both real time taskscan be fully related in order to make the whole control system more accurate. The employed techniquesare those of Real Time Taking advantage of the possibilities of the micro kernel RT-Linux and the freesoftware distributed in the Unix/Linux operating systems. The signals are obtained by means of an ADconverter and are shown in screen using Gnuplot.

  14. Low Cost Multisensor Kinematic Positioning and Navigation System with Linux/RTAI

    Baoxin Hu

    2012-09-01

    Full Text Available Despite its popularity, the development of an embedded real-time multisensor kinematic positioning and navigation system discourages many researchers and developers due to its complicated hardware environment setup and time consuming device driver development. To address these issues, this paper proposed a multisensor kinematic positioning and navigation system built on Linux with Real Time Application Interface (RTAI, which can be constructed in a fast and economical manner upon popular hardware platforms. The authors designed, developed, evaluated and validated the application of Linux/RTAI in the proposed system for the integration of the low cost MEMS IMU and OEM GPS sensors. The developed system with Linux/RTAI as the core of a direct geo-referencing system provides not only an excellent hard real-time performance but also the conveniences for sensor hardware integration and real-time software development. A software framework is proposed in this paper for a universal kinematic positioning and navigation system with loosely-coupled integration architecture. In addition, general strategies of sensor time synchronization in a multisensor system are also discussed. The success of the loosely-coupled GPS-aided inertial navigation Kalman filter is represented via post-processed solutions from road tests.

  15. Development of a portable Linux-based ECG measurement and monitoring system.

    Tan, Tan-Hsu; Chang, Ching-Su; Huang, Yung-Fa; Chen, Yung-Fu; Lee, Cheng

    2011-08-01

    This work presents a portable Linux-based electrocardiogram (ECG) signals measurement and monitoring system. The proposed system consists of an ECG front end and an embedded Linux platform (ELP). The ECG front end digitizes 12-lead ECG signals acquired from electrodes and then delivers them to the ELP via a universal serial bus (USB) interface for storage, signal processing, and graphic display. The proposed system can be installed anywhere (e.g., offices, homes, healthcare centers and ambulances) to allow people to self-monitor their health conditions at any time. The proposed system also enables remote diagnosis via Internet. Additionally, the system has a 7-in. interactive TFT-LCD touch screen that enables users to execute various functions, such as scaling a single-lead or multiple-lead ECG waveforms. The effectiveness of the proposed system was verified by using a commercial 12-lead ECG signal simulator and in vivo experiments. In addition to its portability, the proposed system is license-free as Linux, an open-source code, is utilized during software development. The cost-effectiveness of the system significantly enhances its practical application for personal healthcare.

  16. Fast scalar data buffering interface in Linux 2.6 kernel

    Homs, A.

    2012-01-01

    Key instrumentation devices like counter/timers, analog-to-digital converters and encoders provide scalar data input. Many of them allow fast acquisitions, but do not provide hardware triggering or buffering mechanisms. A Linux 2.4 kernel driver called Hook was developed at the ESRF as a generic software-triggered buffering interface. This work presents the portage of the ESRF Hook interface to the Linux 2.6 kernel. The interface distinguishes 2 independent functional groups: trigger event generators and data channels. Devices in the first group create software events, like hardware interrupts generated by timers or external signals. On each event, one or more device channels on the second group are read and stored in kernel buffers. The event generators and data channels to be read are fully configurable before each sequence. Designed for fast acquisitions, the Hook implementation is well adapted to multi-CPU systems, where the interrupt latency is notably reduced. On heavily loaded dual-core PCs running standard (non real time) Linux, data can be taken at 1 KHz without losing events. Additional features include full integration into the /sys virtual file-system and hot-plug devices support. (author)

  17. Application of the Linux cluster for exhaustive window haplotype analysis using the FBAT and Unphased programs.

    Mishima, Hiroyuki; Lidral, Andrew C; Ni, Jun

    2008-05-28

    Genetic association studies have been used to map disease-causing genes. A newly introduced statistical method, called exhaustive haplotype association study, analyzes genetic information consisting of different numbers and combinations of DNA sequence variations along a chromosome. Such studies involve a large number of statistical calculations and subsequently high computing power. It is possible to develop parallel algorithms and codes to perform the calculations on a high performance computing (HPC) system. However, most existing commonly-used statistic packages for genetic studies are non-parallel versions. Alternatively, one may use the cutting-edge technology of grid computing and its packages to conduct non-parallel genetic statistical packages on a centralized HPC system or distributed computing systems. In this paper, we report the utilization of a queuing scheduler built on the Grid Engine and run on a Rocks Linux cluster for our genetic statistical studies. Analysis of both consecutive and combinational window haplotypes was conducted by the FBAT (Laird et al., 2000) and Unphased (Dudbridge, 2003) programs. The dataset consisted of 26 loci from 277 extended families (1484 persons). Using the Rocks Linux cluster with 22 compute-nodes, FBAT jobs performed about 14.4-15.9 times faster, while Unphased jobs performed 1.1-18.6 times faster compared to the accumulated computation duration. Execution of exhaustive haplotype analysis using non-parallel software packages on a Linux-based system is an effective and efficient approach in terms of cost and performance.

  18. Measuring the impostor phenomenon: a comparison of Clance's IP Scale and Harvey's I-P Scale.

    Holmes, S W; Kertay, L; Adamson, L B; Holland, C L; Clance, P R

    1993-02-01

    Many of the discrepancies reported to date in empirical investigations of the impostor phenomenon (IP) may be due in part to (a) the use of different methods for identifying individuals suffering from this syndrome (impostors), (b) the common use of a median split procedure to classify subjects and (c) the fact that subjects in many studies were drawn from impostor-prone samples. In this study, we compared the scores of independently identified impostors and nonimpostors on two instruments designed to measure the IP: Harvey's I-P Scale and Clance's IP Scale. The results suggest that Clance's scale may be the more sensitive and reliable instrument. Cutoff score suggestions for both instruments are offered.

  19. Opportunities for IP  in Communications Beyond 3G

    Nielsen, Thomas Toftegaard; Jacobsen, Rune H.

    2005-01-01

    Future communication will be based on TCP/IP as common network and transport layers to provide global connectivity to users and applications. IP is used to provide ubiquitous access across different access networks and exploits the benefits of a common connectivity layer while reducing the cost...... of operation and maintenance of the network. This paper discusses the opportunities for IP in the evolution towards a future broadband, all-IP mobile communication network. In particular, we argue for three opportunities for the future: Interworking access technologies over IP, IP layer transparency...

  20. Design and Achievement of User Interface Automation Testing of Linux Based on Element Tree of DogTail

    Yuan Wen-Chao

    2017-01-01

    Full Text Available As Linux gets more popular around the world, the advantage of the open source on software makes people do automated UI test by unified testing framework. UI software testing can guarantee the rationality of User Interface of Linux and accuracy of the UI’s widgets. In order to set free from fuzzy and repeated manual testing, and improve efficiency, this paper achieves automation testing of UI under Linux, and proposes a method to identify and test UI widgets under Linux, which is according to element tree of DogTail automaton testing framework. It achieves automation test of UI under Linux. According to this method, Aiming at the product of Red Hat Subscription Manager under Red Hat Enterprise Linux, it designs the automation test plan of this series of product’s dialogs. After many tests, it is indicated that this plan can identify UI widgets accurately and rationally, describe the structure of software clearly, avoid software errors and improve efficiency of the software. Simultaneously, it also can be used in the internationalization testing for checking translation during software internationalization.

  1. Adjusting the IP $\\beta$ Functions in RHIC

    Wittmer, W; Pilat, F; Ptitsyn, V; Van Zeijts, J

    2004-01-01

    The beta functions at the IP can be adjusted without perturbation of other optics functions via several approaches. In this paper we describe a scheme based on a vector knob, which assigns fixed values to the different tuning quadrupoles and scales them by a common multiplier. The values for the knob vector were calculated for a lattice without any errors using MADX. Previous studies for the LHC [1] have shown that this approach can meet the design goals. A specific feature of the RHIC lattice is the nested power supply system. To cope with the resulting problems a detailed response matrix analysis has been carried out and different sets of knobs were calculated and compared. The knobs were tested at RHIC during the 2004 run and preliminary results are discussed. Simultaneously a new approach to measure the beam sizes of both colliding beams at the IP, based on the tunability provided by the knobs, was developed and tested.

  2. Automatic Classification of Attacks on IP Telephony

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  3. IP Telephony Applicability in Cloud Computing

    Francisco Palacios

    2018-02-01

    Full Text Available This paper carries out a research related to the applicability of VoIP over Cloud Computing to guarantee service stability and elasticity of the organizations. In this paper, Elastix is used as an open source software that allows the management and control of a Private Branch Exchange (PBX; and for developing, it is used the services given Amazon Web Services due to their leadership and experience in cloud computing providing security, scalability, backup service and feasibility for the users.

  4. Reliability of IP Tunnels in Military Networks

    Pólkowski Marcin

    2016-10-01

    Full Text Available The military networks, contrary to commercial ones, require standards which provide the highest level of security and reliability. The process to assuring redundancy of the main connections through applying various protocols and transmission media causes problem with time needed to re-establish virtual tunnels between different locations in case of damaged link. This article compares reliability of different IP (Internet Protocol tunnels, which were implemented on military network devices.

  5. A Case of Retained Graphite Anterior Chamber Foreign Body Masquerading as Stromal Keratitis

    Han, Eun Ryung; Wee, Won Ryang; Lee, Jin Hak

    2011-01-01

    We report a case of a retained graphite anterior chamber foreign body that was masquerading as stromal keratitis. A 28-year-old male visited with complaints of visual disturbance and hyperemia in his right eye for four weeks. On initial examination, he presented with a stromal edema involving the inferior half of the cornea, epithelial microcysts, and moderate chamber inflammation. Suspecting herpetic stromal keratitis, he was treated with anti-viral and anti-inflammatory agents. One month after the initial visit, anterior chamber inflammation was improved and his visual acuity recovered to 20/20, but subtle corneal edema still remained. On tapering the medication, after three months, a foreign body was incidentally identified in the inferior chamber angle and was surgically removed resulting in complete resolution of corneal edema. The removed foreign body was a fragment of graphite and he subsequently disclosed a trauma with mechanical pencil 12 years earlier. This case showed that the presence of an anterior chamber foreign body should always be considered in the differential diagnosis of idiopathic localized corneal edema. PMID:21461226

  6. High-mass twins & resolution of the reconfinement, masquerade and hyperon puzzles of compact star interiors

    Blaschke, David; Alvarez-Castillo, David E.

    2016-01-01

    We aim at contributing to the resolution of three of the fundamental puzzles related to the still unsolved problem of the structure of the dense core of compact stars (CS): (i) the hyperon puzzle: how to reconcile pulsar masses of 2 M ⊙ with the hyperon softening of the equation of state (EoS); (ii) the masquerade problem: modern EoS for cold, high density hadronic and quark matter are almost identical; and (iii) the reconfinement puzzle: what to do when after a deconfinement transition the hadronic EoS becomes favorable again? We show that taking into account the compositeness of baryons (by excluded volume and/or quark Pauli blocking) on the hadronic side and confining and stiffening effects on the quark matter side results in an early phase transition to quark matter with sufficient stiffening at high densities which removes all three present-day puzzles of CS interiors. Moreover, in this new class of EoS for hybrid CS falls the interesting case of a strong first order phase transition which results in the observable high mass twin star phenomenon, an astrophysical observation of a critical endpoint in the QCD phase diagram

  7. A RARE CASE OF EXTRAMEDULLARY PLASMACYTOMA MASQUERADING AS JUVENILE NASOPHARYNGEAL ANGIOFIBROMA

    Harshita V. Sabhahit

    2016-09-01

    Full Text Available BACKGROUND Plasmacytomas are rare plasma cell tumours occurring consequent to monoclonal proliferation of plasma cells. They are divided into Solitary bone plasmacytoma, Extramedullary plasmacytoma (EMP and Multiple myeloma. EMPs are commonly housed in the head and neck region with a predilection to the mucosa associated lymphoid tissue in the aerodigestive tract. The nasal cavity, paranasal sinuses, and nasopharynx are the most common sites. OBJECTIVE We describe our experience with this tumour owing to its clinical rarity and a different way of presentation. METHODS After complete surgical excision of a nasal mass presenting in a young male with features masquerading that of Juvenile Nasopharyngeal Angiofibroma, a diagnosis of plasma cell tumour was made on histopathological analysis which was confirmed using immunohistochemistry. Serum electrophoresis, urine Bence Jones proteins, complete skeletal survey were done to rule out any progression into multiple myeloma. Radiation therapy was given with 45 Gy in 25 fractions at 1.8 Gy per day, 5 days a week. RESULTS Followup after 2 years showed no recurrence locally as well as in regional nodes. CONCLUSION Given to the rarity of the tumour, undefined manner of presentation and a predominant prevalence in the head and neck region, every otolaryngologist should keep EMP in mind while considering sinonasal masses. A multidisciplinary approach with a combination of surgery and radiotherapy is found to benefit the patient significantly. A long term watch out for progression to MM is mandatory to commence early treatment and thus prolonged disease-free survival from the same.

  8. High-dose calcium stimulation test in a case of insulinoma masquerading as hysteria.

    Nakamura, Yoshio; Doi, Ryuichiro; Kohno, Yasuhiro; Shimono, Dai; Kuwamura, Naomitsu; Inoue, Koichi; Koshiyama, Hiroyuki; Imamura, Masayuki

    2002-11-01

    It is reported that some cases with insulinoma present with neuropsychiatric symptoms and are often misdiagnosed as psychosis. Here we report a case of insulinoma masquerading as hysteria, whose final diagnosis could be made using high-dose calcium stimulation test. A 28-yr-old woman was referred presenting with substupor, mutism, mannerism, restlessness, and incoherence. Laboratory examinations revealed hypoglycemia (33 mg/dL) and detectable insulin levels (9.7 microU/mL), suggesting the diagnosis of insulinoma. However, neither imaging studies nor selective arterial calcium injection (SACI) test with a conventional dose of calcium (0.025 mEq/kg) indicated the tumor. High-dose calcium injection (0.05 mEq/kg) evoked insulin secretion when injected into superior mesenteric artery. A solitary tumor in the head of the pancreas was resected, and her plasma glucose returned to normal. Postoperatively, iv injection of secretin resulted in a normal response of insulin, which was not found preoperatively. This case suggests the usefulness of the SACI test with high-dose of calcium in the case of insulinoma when the standard dose fails to detect such a tumor.

  9. Chronic Mercury Intoxication Masquerading as Systemic Disease: A Case Report and Review of the Literature

    Alexandre Malek

    2017-05-01

    Full Text Available Background: Mercury is a highly toxic environmental metal that exists in three different forms: elemental, inorganic and organic. Intoxication occurs in either occupational or non-occupational settings, mainly after the inhalation of vapour and fumes in work places, laboratories or homes. Chronic mercury toxicity ranges from mild and insignificant to severe and life-threatening. We describe the case of a young male patient who presented with multiple organ dysfunction after chronic mercury exposure. Case presentation: We report the case of 28-year-old male artisanal gold miner who was admitted to hospital for severe neurological impairment associated with inflammatory bowel disease-like symptoms and a skin rash after mercury exposure. Symptomatic treatment and corticosteroid administration assured rapid clinical improvement. Chronic mercury poisoning can masquerade as an autoimmune or systemic inflammatory disease. Conclusion: Physicians should be aware that low exposure to mercury, even from artisanal gold mining, may be harmful to health. Management can be simple without the need for aggressive or invasive therapeutic measures. Larger case series are required in order to establish a clear management plan.

  10. Giant ovarian cyst masquerading as a massive ascites: a case report.

    Yeika, Eugene Vernyuy; Efie, Derrick Tembi; Tolefac, Paul Nkemtendong; Fomengia, Joseph Nkeangu

    2017-12-19

    Giant ovarian cysts are tumours of the ovary presenting with diameters greater than 10 cm. Giant ovarian cysts have become rare in recent days as they are diagnosed and managed early due to the availability of good imaging modalities. The aim of this case report is to show how a huge cystic ovarian mass can mislead the diagnosis of ascites in a postmenopausal woman. Factors associated with late presentation of giant ovarian cysts in sub-Saharan Africa have also been discussed. We present the case of a 65-year-old grand multiparous woman who was referred to our centre with a grossly distended abdomen misdiagnosed as a massive ascites. Abdominopelvic ultrasound scan revealed a right giant multiloculated ovarian cyst. She benefited from a cystectomy with an uneventful postoperative stay. Histopathology revealed mucinous cystadenoma. Large cystic ovarian tumours can present masquerading as massive ascites and misleading diagnosis as in this case report. We report this case to increase the suspicion index of a large ovarian cyst in all women presenting with massive ascites.

  11. Drain Tube-Induced Jejunal Penetration Masquerading as Bile Leak following Whipple's Operation.

    Bae, Sang Ho; Lee, Tae Hoon; Lee, Sae Hwan; Lee, Suck-Ho; Park, Sang-Heum; Kim, Sun-Joo; Kim, Chang Ho

    2011-05-01

    A 70-year-old man had undergone pancreaticoduodenectomy due to a distal common bile duct malignancy. After the operation, serous fluid discharge decreased from two drain tubes in the retroperitoneum. Over four weeks, the appearance of the serous fluid changed to a greenish bile color and the patient persistently drained over 300 ml/day. Viewed as bile leak at the choledochojejunostomy, treatment called for endoscopic diagnosis and therapy. Cap-fitted forward-viewing endoscopy demonstrated that the distal tip of a pancreatic drain catheter inserted at the pancreaticojejunostomy site had penetrated the opposite jejunum wall. One of the drain tubes primarily placed in the retroperitoneum had also penetrated the jejunum wall, with the distal tip positioned near the choledochojejunostomy site. No leak of contrast appeared beyond the jejunum or anastomosis site. Following repositioning of a penetrating catheter of the pancreaticojejunostomy, four days later, the patient underwent removal of two drain tubes without additional complications. In conclusion, the distal tip of the catheter, placed to drain pancreatic juice, penetrated the jejunum wall and may have caused localized perijejunal inflammation. The other drain tube, placed in the retroperitoneal space, might then have penetrated the inflamed wall of the jejunum, allowing persistent bile drainage via the drain tube. The results masqueraded as bile leakage following pancreaticoduodenectomy.

  12. Drain Tube-Induced Jejunal Penetration Masquerading as Bile Leak following Whipple’s Operation

    Sang Ho Bae

    2011-05-01

    Full Text Available A 70-year-old man had undergone pancreaticoduodenectomy due to a distal common bile duct malignancy. After the operation, serous fluid discharge decreased from two drain tubes in the retroperitoneum. Over four weeks, the appearance of the serous fluid changed to a greenish bile color and the patient persistently drained over 300 ml/day. Viewed as bile leak at the choledochojejunostomy, treatment called for endoscopic diagnosis and therapy. Cap-fitted forward-viewing endoscopy demonstrated that the distal tip of a pancreatic drain catheter inserted at the pancreaticojejunostomy site had penetrated the opposite jejunum wall. One of the drain tubes primarily placed in the retroperitoneum had also penetrated the jejunum wall, with the distal tip positioned near the choledochojejunostomy site. No leak of contrast appeared beyond the jejunum or anastomosis site. Following repositioning of a penetrating catheter of the pancreaticojejunostomy, four days later, the patient underwent removal of two drain tubes without additional complications. In conclusion, the distal tip of the catheter, placed to drain pancreatic juice, penetrated the jejunum wall and may have caused localized perijejunal inflammation. The other drain tube, placed in the retroperitoneal space, might then have penetrated the inflamed wall of the jejunum, allowing persistent bile drainage via the drain tube. The results masqueraded as bile leakage following pancreaticoduodenectomy.

  13. Primary hyperparathyroidism may masquerade as rickets-osteomalacia in vitamin D replete children.

    Ganie, Mohd Ashraf; Raizada, Nishant; Chawla, Himika; Singh, Arun Kumar; Aggarwala, Sandeep; Bal, Chandra Sekhar

    2016-10-01

    Primary hyperparathyroidism, typically a disease of the middle aged and the old, is less commonly seen in children. In children the disease has a bimodal age distribution with calcium sensing receptor mutation presenting in infancy as hypercalcemic crises and parathyroid adenoma or hyperplasia presenting later in childhood with bone disease. The childhood parathyroid adenomas are often familial with multiglandular disease and manifest with severe bone disease unlike adults. We report a series of four male patients with juvenile primary hyperparathyroidism, three of whom presented with bone disease masquerading as rickets-osteomalacia. One patient had asymptomatic hypercalcemia with short stature. Parathyroid adenoma was detected in all the four cases and all of them underwent resection of parathyroid adenomas confirmed on histopathology. Post-surgery all the cases had initial hypocalcaemia followed by normocalcemia. One case developed pancreatitis after surgery even after achieving normocalcemia. We conclude that parathyroid adenomas, although uncommon in children, are an important cause of skeletal disease that may initially be confused with hypovitaminosis D.

  14. Aspects of the epidemiology of intestinal parasitosis (IP) in children ...

    Aspects of the epidemiology of intestinal parasitosis (IP) in children: ... Conclusion: The low level of knowledge, practices and perceptions of mothers concerning IP is a major cause for ... EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT

  15. Intellectual Property and Strategic Agreements (IP/SA) | FNLCR Staging

    IP/SA handles all invention issues including patents and copyrights. All employee inventionreports are filed through the IP/SA office for all activities under the OTS contract.Additionally,request for assignment ofcopyri

  16. The “Great Masquerader" Strikes Again: Secondary Syphilis Presentation with Erythema Multiforme (EM-Like Lesions

    Adi Brom

    2014-12-01

    Full Text Available Syphilis is a sexually transmitted disease known to present with highly variable manifestations, especially when left untreated. Patients who present to Internal Medicine Departments with fever and a rash are always a diagnostic challenge since mild viral diseases and life-threatening bacterial infections may manifest themselves similarly. In the following case presentation, we describe a patient with 1 month’s duration of fever and rash on the palms of the hand and soles of the feet, in the form of erythema multiforme (EM-like lesions. His disease was diagnosed as secondary syphilis, once again justifying its name: the “great masquerader".

  17. A fast neutron detector with IP by track measurement

    Miao Zhengqiang; Yang Jun; Zhang Qiang; Zhao Xiangfeng; Wang Daohua

    2004-01-01

    Imaging Plate(IP) is very sensitive to electric particles, especially to heavy ions. As we know, the recoiling protons are produced while fast neutrons scattered in light material containing hydrogen. When the recoiling proton enters in the sensitive layer of IP, a track will be recorded by IP. In this paper, a fast neutron detector based on IP and (n, p) reaction is described in detail, the detector's efficiency is studied also. (authors)

  18. IP- -: A Reduced Internet Protocol for Optical Packet Networking

    Ohta, Masataka; Fujikawa, Kenji

    IP- - is proposed as an Internet Protocol suitable for optical packet networking. As optical routers require much faster control than electric ones and lack of optical buffers other than those by fiber delay lines requires fixed time control, Internet Protocols must be at least as simple as IPv4 and much simpler than IPv6. IP- - also addresses issues of IP address space exhaustion and IP routing table explosion.

  19. Covert Channels in SIP for VoIP Signalling

    Mazurczyk, Wojciech; Szczypiorski, Krzysztof

    In this paper, we evaluate available steganographic techniques for SIP (Session Initiation Protocol) that can be used for creating covert channels during signaling phase of VoIP (Voice over IP) call. Apart from characterizing existing steganographic methods we provide new insights by introducing new techniques. We also estimate amount of data that can be transferred in signalling messages for typical IP telephony call.

  20. Dynamic Mobile IP routers in ad hoc networks

    Kock, B.A.; Schmidt, J.R.

    2005-01-01

    This paper describes a concept combining mobile IP and ad hoc routing to create a robust mobile network. In this network all nodes are mobile and globally and locally reachable under the same IP address. Essential for implementing this network are the dynamic mobile IP routers. They act as gateways

  1. Impact of genome assembly status on ChIP-Seq and ChIP-PET data mapping

    Sachs Laurent

    2009-12-01

    Full Text Available Abstract Background ChIP-Seq and ChIP-PET can potentially be used with any genome for genome wide profiling of protein-DNA interaction sites. Unfortunately, it is probable that most genome assemblies will never reach the quality of the human genome assembly. Therefore, it remains to be determined whether ChIP-Seq and ChIP-PET are practicable with genome sequences other than a few (e.g. human and mouse. Findings Here, we used in silico simulations to assess the impact of completeness or fragmentation of genome assemblies on ChIP-Seq and ChIP-PET data mapping. Conclusions Most currently published genome assemblies are suitable for mapping the short sequence tags produced by ChIP-Seq or ChIP-PET.

  2. Analisis Perbandingan Load Balancing Web Server Tunggal Dengan Web Server Cluster Menggunakan Linux Virtual Server

    Lukitasari, Desy; Oklilas, Ahmad Fali

    2010-01-01

    Virtual server adalah server yang mempunyai skalabilitas dan ketersedian yang tinggi yang dibangun diatas sebuah cluster dari beberapa real server. Real server dan load balancer akan saling terkoneksi baik dalam jaringan lokal kecepatan tinggi atau yang terpisah secara geografis. Load balancer dapat mengirim permintaan-permintaan ke server yang berbeda dan membuat paralel service dari sebuah cluster pada sebuah alamat IP tunggal dan meminta pengiriman dapat menggunakan teknologi IP load...

  3. Implementasi Protokol Keamanan TLS pada Aplikasi Layanan Komunikasi Suara Melalui Jaringan TCP/IP (VoIP)

    Hariady, Ricky

    2011-01-01

    Saat ini layanan komunikasi suara melalui jaringan TCP/IP atau yang lebih dikenal dengan VoIP (Voice over IP) telah semakin banyak digunakan, namun teknologi VoIP yang ada saat ini masih rentan terhadap penyadapan ataupun pencurian data. Sementara protokol kriptografi TLS (Transport Layer Security) telah teruji dan banyak digunakan untuk mengamankan komunikasi melalui internet seperti pada layanan email dan web. Dengan mengimplementasikan protokol TLS pada sebuah aplikasi Vo...

  4. A package of Linux scripts for the parallelization of Monte Carlo simulations

    Badal, Andreu; Sempau, Josep

    2006-09-01

    Despite the fact that fast computers are nowadays available at low cost, there are many situations where obtaining a reasonably low statistical uncertainty in a Monte Carlo (MC) simulation involves a prohibitively large amount of time. This limitation can be overcome by having recourse to parallel computing. Most tools designed to facilitate this approach require modification of the source code and the installation of additional software, which may be inconvenient for some users. We present a set of tools, named clonEasy, that implement a parallelization scheme of a MC simulation that is free from these drawbacks. In clonEasy, which is designed to run under Linux, a set of "clone" CPUs is governed by a "master" computer by taking advantage of the capabilities of the Secure Shell (ssh) protocol. Any Linux computer on the Internet that can be ssh-accessed by the user can be used as a clone. A key ingredient for the parallel calculation to be reliable is the availability of an independent string of random numbers for each CPU. Many generators—such as RANLUX, RANECU or the Mersenne Twister—can readily produce these strings by initializing them appropriately and, hence, they are suitable to be used with clonEasy. This work was primarily motivated by the need to find a straightforward way to parallelize PENELOPE, a code for MC simulation of radiation transport that (in its current 2005 version) employs the generator RANECU, which uses a combination of two multiplicative linear congruential generators (MLCGs). Thus, this paper is focused on this class of generators and, in particular, we briefly present an extension of RANECU that increases its period up to ˜5×10 and we introduce seedsMLCG, a tool that provides the information necessary to initialize disjoint sequences of an MLCG to feed different CPUs. This program, in combination with clonEasy, allows to run PENELOPE in parallel easily, without requiring specific libraries or significant alterations of the

  5. Real-time head movement system and embedded Linux implementation for the control of power wheelchairs.

    Nguyen, H T; King, L M; Knight, G

    2004-01-01

    Mobility has become very important for our quality of life. A loss of mobility due to an injury is usually accompanied by a loss of self-confidence. For many individuals, independent mobility is an important aspect of self-esteem. Head movement is a natural form of pointing and can be used to directly replace the joystick whilst still allowing for similar control. Through the use of embedded LINUX and artificial intelligence, a hands-free head movement wheelchair controller has been designed and implemented successfully. This system provides for severely disabled users an effective power wheelchair control method with improved posture, ease of use and attractiveness.

  6. Transitioning to Intel-based Linux Servers in the Payload Operations Integration Center

    Guillebeau, P. L.

    2004-01-01

    The MSFC Payload Operations Integration Center (POIC) is the focal point for International Space Station (ISS) payload operations. The POIC contains the facilities, hardware, software and communication interface necessary to support payload operations. ISS ground system support for processing and display of real-time spacecraft and telemetry and command data has been operational for several years. The hardware components were reaching end of life and vendor costs were increasing while ISS budgets were becoming severely constrained. Therefore it has been necessary to migrate the Unix portions of our ground systems to commodity priced Intel-based Linux servers. hardware architecture including networks, data storage, and highly available resources. This paper will concentrate on the Linux migration implementation for the software portion of our ground system. The migration began with 3.5 million lines of code running on Unix platforms with separate servers for telemetry, command, Payload information management systems, web, system control, remote server interface and databases. The Intel-based system is scheduled to be available for initial operational use by August 2004 The overall migration to Intel-based Linux servers in the control center involves changes to the This paper will address the Linux migration study approach including the proof of concept, criticality of customer buy-in and importance of beginning with POSlX compliant code. It will focus on the development approach explaining the software lifecycle. Other aspects of development will be covered including phased implementation, interim milestones and metrics measurements and reporting mechanisms. This paper will also address the testing approach covering all levels of testing including development, development integration, IV&V, user beta testing and acceptance testing. Test results including performance numbers compared with Unix servers will be included. need for a smooth transition while maintaining

  7. Implementasi Manajemen Bandwidth Dengan Disiplin Antrian Hierarchical Token Bucket (HTB Pada Sistem Operasi Linux

    Muhammad Nugraha

    2016-09-01

    Full Text Available Important Problem on Internet networking is exhausted resource and bandwidth by some user while other user did not get service properly. To overcome that problem we need to implement traffic control and bandwidth management system in router. In this research author want to implement Hierarchical Token Bucket algorithm as queue discipline (qdisc to get bandwidth management accurately in order the user can get bandwidth properly. The result of this research is form the management bandwidth cheaply and efficiently by using Hierarchical Token Bucket qdisc on Linux operating system were able to manage the user as we want.

  8. Programación de LEGO MindStorms bajo GNU/Linux

    Matellán Olivera, Vicente; Heras Quirós, Pedro de las; Centeno González, José; González Barahona, Jesús

    2002-01-01

    GNU/Linux sobre un ordenador personal es la opción libre preferida por muchos desarrolladores de aplicaciones, pero también es una plataforma de desarrollo muy popular para otros sistemas, incluida la programación de robots, en particular es muy adecuada para jugar con los LEGO Mindstorms. En este artículo presentaremos las dos opciones más extendidas a la hora de programar estos juguetes: NQC y LegOS. NQC es una versión reducida de C que permite el desarrollo rápido de programas ...

  9. Hard Real-Time Linux for Off-The-Shelf Multicore Architectures

    Radder, Dirk

    2015-01-01

    This document describes the research results that were obtained from the development of a real-time extension for the Linux operating system. The paper describes a full extension of the kernel, which enables hard real-time performance on a 64-bit x86 architecture. In the first part of this study, real-time systems are categorized and concepts of real-time operating systems are introduced to the reader. In addition, numerous well-known real-time operating systems are considered. QNX Neutrino, ...

  10. DB2 9 for Linux, Unix, and Windows database administration certification study guide

    Sanders, Roger E

    2007-01-01

    In DB2 9 for Linux, UNIX, and Windows Database Administration Certification Study Guide, Roger E. Sanders-one of the world's leading DB2 authors and an active participant in the development of IBM's DB2 certification exams-covers everything a reader needs to know to pass the DB2 9 UDB DBA Certification Test (731).This comprehensive study guide steps you through all of the topics that are covered on the test, including server management, data placement, database access, analyzing DB2 activity, DB2 utilities, high availability, security, and much more. Each chapter contains an extensive set of p

  11. IMPLEMENTASI MANAJEMEN BANDWIDTH DENGAN DISIPLIN ANTRIAN HIERARCHICAL TOKEN BUCKET (HTB PADA SISTEM OPERASI LINUX

    Muhammad Nugraha

    2017-01-01

    Full Text Available Important Problem on Internet networking is exhausted resource and bandwidth by some user while other user did not get service properly. To overcome that problem we need to implement traffic control and bandwidth management system in router. In this research author want to implement Hierarchical Token Bucket algorithm as queue discipline (qdisc to get bandwidth management accurately in order the user can get bandwidth properly. The result of this research is form the management bandwidth cheaply and efficiently by using Hierarchical Token Bucket qdisc on Linux operating system were able to manage the user as we want.

  12. AliEnFS - a Linux File System for the AliEn Grid Services

    Peters, Andreas J.; Saiz, P.; Buncic, P.

    2003-01-01

    Among the services offered by the AliEn (ALICE Environment http://alien.cern.ch) Grid framework there is a virtual file catalogue to allow transparent access to distributed data-sets using various file transfer protocols. $alienfs$ (AliEn File System) integrates the AliEn file catalogue as a new file system type into the Linux kernel using LUFS, a hybrid user space file system framework (Open Source http://lufs.sourceforge.net). LUFS uses a special kernel interface level called VFS (Virtual F...

  13. ClusterControl: a web interface for distributing and monitoring bioinformatics applications on a Linux cluster.

    Stocker, Gernot; Rieder, Dietmar; Trajanoski, Zlatko

    2004-03-22

    ClusterControl is a web interface to simplify distributing and monitoring bioinformatics applications on Linux cluster systems. We have developed a modular concept that enables integration of command line oriented program into the application framework of ClusterControl. The systems facilitate integration of different applications accessed through one interface and executed on a distributed cluster system. The package is based on freely available technologies like Apache as web server, PHP as server-side scripting language and OpenPBS as queuing system and is available free of charge for academic and non-profit institutions. http://genome.tugraz.at/Software/ClusterControl

  14. [Design of an embedded stroke rehabilitation apparatus system based on Linux computer engineering].

    Zhuang, Pengfei; Tian, XueLong; Zhu, Lin

    2014-04-01

    A realizaton project of electrical stimulator aimed at motor dysfunction of stroke is proposed in this paper. Based on neurophysiological biofeedback, this system, using an ARM9 S3C2440 as the core processor, integrates collection and display of surface electromyography (sEMG) signal, as well as neuromuscular electrical stimulation (NMES) into one system. By embedding Linux system, the project is able to use Qt/Embedded as a graphical interface design tool to accomplish the design of stroke rehabilitation apparatus. Experiments showed that this system worked well.

  15. LINK codes TRAC-BF1/PARCSv2.7 in LINUX without external communication interface

    Barrachina, T.; Garcia-Fenoll, M.; Abarca, A.; Miro, R.; Verdu, G.; Concejal, A.; Solar, A.

    2014-01-01

    The TRAC-BF1 code is still widely used by the nuclear industry for safety analysis. The plant models developed using this code are highly validated, so it is advisable to continue improving this code before migrating to another completely different code. The coupling with the NRC neutronic code PARCSv2.7 increases the simulation capabilities in transients in which the power distribution plays an important role. In this paper, the procedure for the coupling of TRAC-BF1 and PARCSv2.7 codes without PVM and in Linux is presented. (Author)

  16. Using a Linux Cluster for Parallel Simulations of an Active Magnetic Regenerator Refrigerator

    Petersen, T.F.; Pryds, N.; Smith, A.

    2006-01-01

    This paper describes the implementation of a Comsol Multiphysics model on a Linux computer Cluster. The Magnetic Refrigerator (MR) is a special type of refrigerator with potential to reduce the energy consumption of household refrigeration by a factor of two or more. To conduct numerical analysis....... The coupled set of equations and the transient convergence towards the final steady state means that the model has an excessive solution time. To make parametric studies practical, the developed model was implemented on a Cluster to allow parallel simulations, which has decreased the solution time...

  17. Audio Arduino - an ALSA (Advanced Linux Sound Architecture) audio driver for FTDI-based Arduinos

    Dimitrov, Smilen; Serafin, Stefania

    2011-01-01

    be considered to be a system, that encompasses design decisions on both hardware and software levels - that also demand a certain understanding of the architecture of the target PC operating system. This project outlines how an Arduino Duemillanove board (containing a USB interface chip, manufactured by Future...... Technology Devices International Ltd [FTDI] company) can be demonstrated to behave as a full-duplex, mono, 8-bit 44.1 kHz soundcard, through an implementation of: a PC audio driver for ALSA (Advanced Linux Sound Architecture); a matching program for the Arduino's ATmega microcontroller - and nothing more...

  18. Impact of artefact removal on ChIP quality metrics in ChIP-seq and ChIP-exo data.

    Thomas Samuel Carroll

    2014-04-01

    Full Text Available With the advent of ChIP-seq multiplexing technologies and the subsequent increase in ChIP-seq throughput, the development of working standards for the quality assessment of ChIP-seq studies has received significant attention. The ENCODE consortium’s large scale analysis of transcription factor binding and epigenetic marks as well as concordant work on ChIP-seq by other laboratories has established a new generation of ChIP-seq quality control measures. The use of these metrics alongside common processing steps has however not been evaluated. In this study, we investigate the effects of blacklisting and removal of duplicated reads on established metrics of ChIP-seq quality and show that the interpretation of these metrics is highly dependent on the ChIP-seq preprocessing steps applied. Further to this we perform the first investigation of the use of these metrics for ChIP-exo data and make recommendations for the adaptation of the NSC statistic to allow for the assessment of ChIP-exo efficiency.

  19. Capturing value from Intellectual Property (IP) in a global environment

    Alcácer, Juan; Beukel, Karin; Cassiman, Bruno

    2017-01-01

    Globalization should provide firms with an opportunity to leverage their know-how and reputation across countries to create value. However, it remains challenging for them to actually capture that value using traditional Intellectual Property (IP) tools. In this paper, we document the strong growth...... in patents, trademarks, and industrial designs used by firms to protect their IP globally. We then show that IP protection remains fragmented; the quality of IP applications might be questionable; and developing a comprehensive IP footprint worldwide is very costly. Growing numbers of applications...

  20. Feasibility study of BES data off-line processing and D/Ds physics analysis on a PC/Linux platform

    Rong Gang; He Kanglin; Heng Yuekun; Zhang Chun; Liu Huaimin; Cheng Baosen; Yan Wuguang; Mai Jimao; Zhao Haiwen

    2000-01-01

    The authors report a feasibility study of BES data off-line processing (BES data off-line reconstruction and Monte Carlo simulation) and D/Ds physics analysis on a PC/Linux platform. The authors compared the results obtained from the PC/Linux with that from HP/UNIX workstation. It shows that PC/Linux platform can do BES data off-line analysis as good as HP/UNIX workstation, and is much powerful and economical

  1. Qualification of Type IP-2, Type IP-3 and Type A packages for radioactive liquid shipments

    Marcu, L.; Sullivan, G.; Lo, K.K.

    2006-01-01

    Commercial products such as pails, drums or bulk containers can be used for radioactive materials transportation if they can be shown to meet the regulatory requirements. Ontario Power Generation (OPG) has successfully tested and qualified several off-the-shelf containers as Type IP-2, Type IP-3 and Type A packages for liquids in accordance with the International and Canadian Regulations. This paper describes the testing and qualification of these commercial products, and discusses the problems encountered and lessons learned during this process. (author)

  2. Applied Multiprotocol Routing in IP Telephony

    Miroslav Voznak

    2010-01-01

    Full Text Available The aim of the project was to create a multi-protocol system using SIP, H.323 and MGCP standards, which would ensure routing to various types of VoIP networks. The priority was to provide multi-protocol support to SIP and H.323 signalling and the support of the routing using the ENUM standard which has recently passed from the trial phase into full operation in the Czech Republic. The document describes the system's architecture and the components used. It also briefly describes ENUM.

  3. FLUKA-LIVE-an embedded framework, for enabling a computer to execute FLUKA under the control of a Linux OS

    Cohen, A.; Battistoni, G.; Mark, S.

    2008-01-01

    This paper describes a Linux-based OS framework for integrating the FLUKA Monte Carlo software (currently distributed only for Linux) into a CD-ROM, resulting in a complete environment for a scientist to edit, link and run FLUKA routines-without the need to install a UNIX/Linux operating system. The building process includes generating from scratch a complete operating system distribution which will, when operative, build all necessary components for successful operation of FLUKA software and libraries. Various source packages, as well as the latest kernel sources, are freely available from the Internet. These sources are used to create a functioning Linux system that integrates several core utilities in line with the main idea-enabling FLUKA to act as if it was running under a popular Linux distribution or even a proprietary UNIX workstation. On boot-up a file system will be created and the contents from the CD will be uncompressed and completely loaded into RAM-after which the presence of the CD is no longer necessary, and could be removed for use on a second computer. The system can operate on any i386 PC as long as it can boot from a CD

  4. Linux: Hacia una revolución silenciosa de la sociedad de la información

    Pascuale Sofia

    2004-01-01

    Full Text Available l presente artículo intenta realizar una demostración de las cualidades globales que posee el nuevo sistema operativo LINUX a nivel técnico, y develar el cambio que está engendrando en el sector económico y en el mundo cultural. Esto se realiza por medio, de un análisis comparativo entre los sistemas operativos: Comerciales (Microsoft y Open Source (LINUX. El mundo de hoy está caracterizado por cambios rádicales y rápidos, ocurriendo con mayor frecuencia en el sector de la informática. Actualmente en éste sector y específicamente en el ámbito del sofware, es LINUX el nuevo sistema operativo que está modificando el mundo de la informática. Todo ello se efectuó sobre los lineamientos metodológicos exploratorios, porque la literatura sobre los avances de Linux es escasa, por lo tanto el trabajo responde a la sintesis de un amplio trabajo (Conferencias, Exposiciones en Universidades, Asociaciones de empresas, entre otros de los autores, llevaron a cabo desde que el producto LINUX es conocido y trabajado por una pequeña elite de técnicos.

  5. The Many Guises of Endometriosis: Giant Abdominal Wall Endometriosis Masquerading as An Incisional Hernia

    Chiara Petrosellini

    2017-10-01

    Full Text Available Endometriosis is defined by the presence of ectopic endometrial tissue outside the uterine cavity. Although it is a leading cause of chronic pelvic pain and infertility, its clinical presentation can vary, resulting in diagnostic and therapeutic challenges. Extrapelvic endometriosis is particularly difficult to diagnose owing to its ability to mimic other conditions. Endometrial tissue in a surgical scar is uncommon and often misdiagnosed as a granuloma, abscess, or malignancy. Cyclical hemorrhagic ascites due to peritoneal endometriosis is exceptionally rare. We report the case of a pre-menopausal, nulliparous 44-year-old woman who presented with ascites and a large abdominal mass that arose from the site of a lower midline laparotomy scar. Five years previously, she had undergone open myomectomy for uterine fibroids. Soon after her initial operation she developed abdominal ascites, which necessitated percutaneous drainage on multiple occasions. We performed a laparotomy with excision of the abdominal wall mass through an inverted T incision. The extra-abdominal mass consisted of mixed cystic and solid components, and weighed 1.52 kg. It communicated with the abdominopelvic cavity through a 2 cm defect in the linea alba. The abdomen contained a large amount of odourless, brown fluid which drained into the mass. There was a large capsule that covered the small and large bowel, liver, gallbladder, and stomach. Final histology reported a 28×19×5 cm mass of endometrial tissue with no evidence of malignant transformation. The patient recovered well post-operatively and has remained asymptomatic. Our case illustrates that, despite being a common disease, endometriosis can masquerade as several other conditions and be missed or diagnosed late. Delay in diagnosis will not only prolong symptoms but can also compromise reproductive lifespan. It is therefore paramount that endometriosis is to be considered early in the management of premenopausal women

  6. Unsteady, Cooled Turbine Simulation Using a PC-Linux Analysis System

    List, Michael G.; Turner, Mark G.; Chen, Jen-Pimg; Remotigue, Michael G.; Veres, Joseph P.

    2004-01-01

    The fist stage of the high-pressure turbine (HPT) of the GE90 engine was simulated with a three-dimensional unsteady Navier-Sokes solver, MSU Turbo, which uses source terms to simulate the cooling flows. In addition to the solver, its pre-processor, GUMBO, and a post-processing and visualization tool, Turbomachinery Visual3 (TV3) were run in a Linux environment to carry out the simulation and analysis. The solver was run both with and without cooling. The introduction of cooling flow on the blade surfaces, case, and hub and its effects on both rotor-vane interaction as well the effects on the blades themselves were the principle motivations for this study. The studies of the cooling flow show the large amount of unsteadiness in the turbine and the corresponding hot streak migration phenomenon. This research on the GE90 turbomachinery has also led to a procedure for running unsteady, cooled turbine analysis on commodity PC's running the Linux operating system.

  7. Linux OS integrated modular avionics application development framework with apex API of ARINC653 specification

    Anna V. Korneenkova

    2017-01-01

    Full Text Available The framework is made to provide tools to develop the integrated modular avionics (IMA applications, which could be launched on the target platform LynxOs-178 without modifying their source code. The framework usage helps students to form skills for developing modern modules of the avionics. In addition, students obtain deeper knowledge for the development of competencies in the field of technical creativity by using of the framework.The article describes the architecture and implementation of the Linux OS framework for ARINC653 compliant OS application development.The proposed approach reduces ARINC-653 application development costs and gives a unified tool to implement OS vendor independent code that meets specification. To achieve import substitution free and open-source Linux OS is used as an environment for developing IMA applications.The proposed framework is applicable for using as the tool to develop IMA applications and as the tool for development of the following competencies: the ability to master techniques of using software to solve practical problems, the ability to develop components of hardware and software systems and databases, using modern tools and programming techniques, the ability to match hardware and software tools in the information and automated systems, the readiness to apply the fundamentals of informatics and programming to designing, constructing and testing of software products, the readiness to apply basic methods and tools of software development, knowledge of various technologies of software development.

  8. Kualitas Jaringan Pada Jaringan Virtual Local Area Network (VLAN Yang Menerapkan Linux Terminal Server Project (LTSP

    Lipur Sugiyanta

    2017-12-01

    Full Text Available Virtual Local Area Network (VLAN merupakan sebuah teknik dalam jaringan komputer untuk menciptakan beberapa jaringan yang berbeda tetapi masih merupakan sebuah jaringan lokal yang tidak terbatas pada lokasi fisik seperti LAN sedangkan Linux Terminal Server Project (LTSP merupakan sebuah teknik terminal server yang dapat memperbanyak workstation dengan hanya menggunakan sebuah Linux server. Dalam membangun sebuah jaringan komputer perlu memperhatikan beberapa hal dan salah satunya adalah kualitas jaringan dari jaringan yang dibangun. Pada penelitian ini bertujuan untuk mengetahui pengaruh jumlah client terhadap kualitas jaringan berdasarkan parameter delay dan packet loss pada jaringan VLAN yang menerapkan LTSP. Oleh karena itu, penelitian ini menggunakan jenis metode penelitian kualitatif dengan memperhatikan standar yang digunakan dalam penelitian yaitu standar International Telecommunication Union – Telecommunication (ITU-T. Penerapan penelitian ini menggunakan sistem operasi pada server adalah Ubuntu Desktop 14.04 LTS. Berdasarkan dari hasil penelitian yang ditemukan dapat disimpulkan bahwa benar terbukti bahwa makin banyak client yang dilayani oleh server maka akan menurunkan kualitas jaringan berdasarkan parameter Quality of Service (QoS yang digunakan yaitu delay dan packet loss.

  9. Real-time data acquisition and feedback control using Linux Intel computers

    Penaflor, B.G.; Ferron, J.R.; Piglowski, D.A.; Johnson, R.D.; Walker, M.L.

    2006-01-01

    This paper describes the experiences of the DIII-D programming staff in adapting Linux based Intel computing hardware for use in real-time data acquisition and feedback control systems. Due to the highly dynamic and unstable nature of magnetically confined plasmas in tokamak fusion experiments, real-time data acquisition and feedback control systems are in routine use with all major tokamaks. At DIII-D, plasmas are created and sustained using a real-time application known as the digital plasma control system (PCS). During each experiment, the PCS periodically samples data from hundreds of diagnostic signals and provides these data to control algorithms implemented in software. These algorithms compute the necessary commands to send to various actuators that affect plasma performance. The PCS consists of a group of rack mounted Intel Xeon computer systems running an in-house customized version of the Linux operating system tailored specifically to meet the real-time performance needs of the plasma experiments. This paper provides a more detailed description of the real-time computing hardware and custom developed software, including recent work to utilize dual Intel Xeon equipped computers within the PCS

  10. CompactPCI/Linux platform for medium level control system on FTU

    Wang, L.; Centioli, C.; Iannone, F.; Panella, M.; Mazza, G.; Vitale, V.

    2004-01-01

    In large fusion experiments, such as tokamak devices, there are common trends for slow control systems. Because of complexity of the plants, several tokamaks adopt the so-called 'standard model' (SM) based on a three levels hierarchical control: (i) high level control (HLC) - the supervisor; (ii) medium level control (MLC) - I/O field equipments interface and concentration units and (iii) low level control (LLC) - the programmable logic controllers (PLC). FTU control system was designed with SM concepts and, in its 15 years life cycle, it underwent several developments. The latest evolution was mandatory, due to the obsolescence of the MLC CPUs, based on VME/Motorola 68030 with OS9 operating system. Therefore, we had to look for cost-effective solutions and we chose a CompactPCI-Intel x86 platform with Linux operating system. A software porting has been done taking into account the differences between OS9 and Linux operating system in terms of inter/network processes communications and I/O multi-ports serial driver. This paper describes the hardware/software architecture of the new MLC system emphasising the reliability and the low costs of the open source solutions. Moreover, the huge amount of software packages available in open source environment will assure a less painful maintenance, and will open the way to further improvements of the system itself

  11. Lin4Neuro: a customized Linux distribution ready for neuroimaging analysis.

    Nemoto, Kiyotaka; Dan, Ippeita; Rorden, Christopher; Ohnishi, Takashi; Tsuzuki, Daisuke; Okamoto, Masako; Yamashita, Fumio; Asada, Takashi

    2011-01-25

    A variety of neuroimaging software packages have been released from various laboratories worldwide, and many researchers use these packages in combination. Though most of these software packages are freely available, some people find them difficult to install and configure because they are mostly based on UNIX-like operating systems. We developed a live USB-bootable Linux package named "Lin4Neuro." This system includes popular neuroimaging analysis tools. The user interface is customized so that even Windows users can use it intuitively. The boot time of this system was only around 40 seconds. We performed a benchmark test of inhomogeneity correction on 10 subjects of three-dimensional T1-weighted MRI scans. The processing speed of USB-booted Lin4Neuro was as fast as that of the package installed on the hard disk drive. We also installed Lin4Neuro on a virtualization software package that emulates the Linux environment on a Windows-based operation system. Although the processing speed was slower than that under other conditions, it remained comparable. With Lin4Neuro in one's hand, one can access neuroimaging software packages easily, and immediately focus on analyzing data. Lin4Neuro can be a good primer for beginners of neuroimaging analysis or students who are interested in neuroimaging analysis. It also provides a practical means of sharing analysis environments across sites.

  12. Development and application of remote video monitoring system for combine harvester based on embedded Linux

    Chen, Jin; Wang, Yifan; Wang, Xuelei; Wang, Yuehong; Hu, Rui

    2017-01-01

    Combine harvester usually works in sparsely populated areas with harsh environment. In order to achieve the remote real-time video monitoring of the working state of combine harvester. A remote video monitoring system based on ARM11 and embedded Linux is developed. The system uses USB camera for capturing working state video data of the main parts of combine harvester, including the granary, threshing drum, cab and cut table. Using JPEG image compression standard to compress video data then transferring monitoring screen to remote monitoring center over the network for long-range monitoring and management. At the beginning of this paper it describes the necessity of the design of the system. Then it introduces realization methods of hardware and software briefly. And then it describes detailedly the configuration and compilation of embedded Linux operating system and the compiling and transplanting of video server program are elaborated. At the end of the paper, we carried out equipment installation and commissioning on combine harvester and then tested the system and showed the test results. In the experiment testing, the remote video monitoring system for combine harvester can achieve 30fps with the resolution of 800x600, and the response delay in the public network is about 40ms.

  13. PsyToolkit: a software package for programming psychological experiments using Linux.

    Stoet, Gijsbert

    2010-11-01

    PsyToolkit is a set of software tools for programming psychological experiments on Linux computers. Given that PsyToolkit is freely available under the Gnu Public License, open source, and designed such that it can easily be modified and extended for individual needs, it is suitable not only for technically oriented Linux users, but also for students, researchers on small budgets, and universities in developing countries. The software includes a high-level scripting language, a library for the programming language C, and a questionnaire presenter. The software easily integrates with other open source tools, such as the statistical software package R. PsyToolkit is designed to work with external hardware (including IoLab and Cedrus response keyboards and two common digital input/output boards) and to support millisecond timing precision. Four in-depth examples explain the basic functionality of PsyToolkit. Example 1 demonstrates a stimulus-response compatibility experiment. Example 2 demonstrates a novel mouse-controlled visual search experiment. Example 3 shows how to control light emitting diodes using PsyToolkit, and Example 4 shows how to build a light-detection sensor. The last two examples explain the electronic hardware setup such that they can even be used with other software packages.

  14. A case study in application I/O on Linux clusters

    Ross, R.; Nurmi, D.; Cheng, A.; Zingale, M.

    2001-01-01

    A critical but often ignored component of system performance is the I/O system. Today's applications expect a great deal from underlying storage systems and software, and both high performance distributed storage and high level interfaces have been developed to fill these needs. In this paper they discuss the I/O performance of a parallel scientific application on a Linux cluster, the FLASH astrophysics code. This application relies on three I/O software components to provide high performance parallel I/O on Linux clusters: the Parallel Virtual File System (PVFS), the ROMIO MPI-IO implementation, and the Hierarchical Data Format (HDF5) library. First they discuss the roles played by each of these components in providing an I/O solution. Next they discuss the FLASH I/O benchmark and point out its relevance. Following this they examine the performance of the benchmark, and through instrumentation of both the application and underlying system software code they discover the location of major software bottlenecks. They work around the most inhibiting of these bottlenecks, showing substantial performance improvement. Finally they point out similarities between the inefficiencies found here and those found in message passing systems, indicating that research in the message passing field could be leveraged to solve similar problems in high-level I/O interfaces

  15. An integrated genetic data environment (GDE)-based LINUX interface for analysis of HIV-1 and other microbial sequences.

    De Oliveira, T; Miller, R; Tarin, M; Cassol, S

    2003-01-01

    Sequence databases encode a wealth of information needed to develop improved vaccination and treatment strategies for the control of HIV and other important pathogens. To facilitate effective utilization of these datasets, we developed a user-friendly GDE-based LINUX interface that reduces input/output file formatting. GDE was adapted to the Linux operating system, bioinformatics tools were integrated with microbe-specific databases, and up-to-date GDE menus were developed for several clinically important viral, bacterial and parasitic genomes. Each microbial interface was designed for local access and contains Genbank, BLAST-formatted and phylogenetic databases. GDE-Linux is available for research purposes by direct application to the corresponding author. Application-specific menus and support files can be downloaded from (http://www.bioafrica.net).

  16. Parallel factor ChIP provides essential internal control for quantitative differential ChIP-seq.

    Guertin, Michael J; Cullen, Amy E; Markowetz, Florian; Holding, Andrew N

    2018-04-17

    A key challenge in quantitative ChIP combined with high-throughput sequencing (ChIP-seq) is the normalization of data in the presence of genome-wide changes in occupancy. Analysis-based normalization methods were developed for transcriptomic data and these are dependent on the underlying assumption that total transcription does not change between conditions. For genome-wide changes in transcription factor (TF) binding, these assumptions do not hold true. The challenges in normalization are confounded by experimental variability during sample preparation, processing and recovery. We present a novel normalization strategy utilizing an internal standard of unchanged peaks for reference. Our method can be readily applied to monitor genome-wide changes by ChIP-seq that are otherwise lost or misrepresented through analytical normalization. We compare our approach to normalization by total read depth and two alternative methods that utilize external experimental controls to study TF binding. We successfully resolve the key challenges in quantitative ChIP-seq analysis and demonstrate its application by monitoring the loss of Estrogen Receptor-alpha (ER) binding upon fulvestrant treatment, ER binding in response to estrodiol, ER mediated change in H4K12 acetylation and profiling ER binding in patient-derived xenographs. This is supported by an adaptable pipeline to normalize and quantify differential TF binding genome-wide and generate metrics for differential binding at individual sites.

  17. In vitro synthesis and purification of PhIP-deoxyguanosine and PhIP-DNA oligomer covalent complexes

    Freeman, J.

    1994-12-01

    2-Amino-1-methyl-6-phenylimidazo[4,5-b]pyridine (PhIP) is a heterocyclic amine compound formed when meats are cooked at high temperatures. PhIP damages DNA by forming covalent complexes with DNA carcinogen. In an effort to understand how the binding of PhIP to DNA may cause cancer, it is important to characterize the structures of PhIP-damaged DNA molecules. Our HPLC data support fluorescence and {sup 32}P Post-labeling studies which indicate the formation of several species of 2{prime}deoxyguanosine-(dG) or oligodeoxynucleotide-PhIP adducts. The reaction of PhIP with dG resulted in a reddish precipitate that was likely the major adduct, N-(deoxyguanosin-8-yl)-PhIP (dG-C8-PhIP) adduct, with a more polar adduct fraction remaining in the supernatant. Reversed-phase HPLC analysis of the adducts in the supernatant revealed the existence of species of much shorter retention times than the dG-C8-PhIP adduct, confirming that these species are more polar than dG-C8-PhIP. At least four adducts were formed in the reaction of PhIP with DNA oligomer. HPLC analysis of the PhIP-DNA oligomer supernatant after butanol extractions revealed four unresolved peaks which spectra had maximum wavelengths between 340 and 360 nm. Though adduct peaks were not completely resolved, there was {approximately}3 minutes interval between the DNA oligomer peak and the adduct peaks. Furthermore, fluorescence emission data of the DNA oligomer-PhIP adduct solution show heterogeneous binding. The more polar PhIP adducts were fraction-collected and their structures will be solved by nuclear magnetic resonance or x-ray crystallography.

  18. Chromatin immunoprecipitation (ChIP) of plant transcription factors followed by sequencing (ChIP-SEQ) or hybridization to whole genome arrays (ChIP-CHIP)

    Kaufmann, K.; Muiño, J.M.; Østerås, M.; Farinelli, L.; Krajewski, P.; Angenent, G.C.

    2010-01-01

    Chromatin immunoprecipitation (ChIP) is a powerful technique to study interactions between transcription factors (TFs) and DNA in vivo. For genome-wide de novo discovery of TF-binding sites, the DNA that is obtained in ChIP experiments needs to be processed for sequence identification. The sequences

  19. Research of future network with multi-layer IP address

    Li, Guoling; Long, Zhaohua; Wei, Ziqiang

    2018-04-01

    The shortage of IP addresses and the scalability of routing systems [1] are challenges for the Internet. The idea of dividing existing IP addresses between identities and locations is one of the important research directions. This paper proposed a new decimal network architecture based on IPv9 [11], and decimal network IP address from E.164 principle of traditional telecommunication network, the IP address level, which helps to achieve separation and identification and location of IP address, IP address form a multilayer network structure, routing scalability problem in remission at the same time, to solve the problem of IPv4 address depletion. On the basis of IPv9, a new decimal network architecture is proposed, and the IP address of the decimal network draws on the E.164 principle of the traditional telecommunication network, and the IP addresses are hierarchically divided, which helps to realize the identification and location separation of IP addresses, the formation of multi-layer IP address network structure, while easing the scalability of the routing system to find a way out of IPv4 address exhausted. In addition to modifying DNS [10] simply and adding the function of digital domain, a DDNS [12] is formed. At the same time, a gateway device is added, that is, IPV9 gateway. The original backbone network and user network are unchanged.

  20. LPIC-1 Linux Professional Institute certification study guide exam 101-400 and exam 102-400

    Bresnahan, Christine

    2015-01-01

    Thorough LPIC-1 exam prep, with complete coverage and bonus study tools LPIC-1Study Guide is your comprehensive source for the popular Linux Professional Institute Certification Level 1 exam, fully updated to reflect the changes to the latest version of the exam. With 100% coverage of objectives for both LPI 101 and LPI 102, this book provides clear and concise information on all Linux administration topics and practical examples drawn from real-world experience. Authoritative coverage of key exam topics includes GNU and UNIX commands, devices, file systems, file system hierarchy, user interf

  1. RELAP5-3D developmental assessment: Comparison of version 4.2.1i on Linux and Windows

    Bayless, Paul D. [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2014-06-01

    Figures have been generated comparing the parameters used in the developmental assessment of the RELAP5-3D code, version 4.2i, compiled on Linux and Windows platforms. The figures, which are the same as those used in Volume III of the RELAP5-3D code manual, compare calculations using the semi-implicit solution scheme with available experiment data. These figures provide a quick, visual indication of how the code predictions differ between the Linux and Windows versions.

  2. RELAP5-3D Developmental Assessment. Comparison of Version 4.3.4i on Linux and Windows

    Bayless, Paul David

    2015-01-01

    Figures have been generated comparing the parameters used in the developmental assessment of the RELAP5-3D code, version 4.3i, compiled on Linux and Windows platforms. The figures, which are the same as those used in Volume III of the RELAP5-3D code manual, compare calculations using the semi-implicit solution scheme with available experiment data. These figures provide a quick, visual indication of how the code predictions differ between the Linux and Windows versions.

  3. A real-time computer simulation of nuclear simulator software using standard PC hardware and linux environments

    Cha, K. H.; Kweon, K. C.

    2001-01-01

    A feasibility study, which standard PC hardware and Real-Time Linux are applied to real-time computer simulation of software for a nuclear simulator, is presented in this paper. The feasibility prototype was established with the existing software in the Compact Nuclear Simulator (CNS). Throughout the real-time implementation in the feasibility prototype, we has identified that the approach can enable the computer-based predictive simulation to be approached, due to both the remarkable improvement in real-time performance and the less efforts for real-time implementation under standard PC hardware and Real-Time Linux envrionments

  4. IPS Empress: a standard of excellence.

    Hornbrook, D S; Roberts, M

    1998-01-01

    For 10 years, clinicians have been able to provide patients with a proven aesthetic and functional restoration that exhibits wear-compatibility, durability, and marginal integrity. This leucite-reinforced, pressed ceramic (IPS Empress, Ivoclar Williams, Amherst, NY) presents to patients and dentists the option of a metal-free alternative which retains the functional advantages of a porcelain-fused-to-metal restoration. This article illustrates the importance of sound laboratory communication in the utilization of this restorative material, focusing upon three aspects: midline and incisal edge inclination, elimination of open gingival embrasures, and incisal edge translucency. Techniques are also presented in order to efficiently communicate details of each case presented to the laboratory.

  5. Telemetry and Communication IP Video Player

    OFarrell, Zachary L.

    2011-01-01

    Aegis Video Player is the name of the video over IP system for the Telemetry and Communications group of the Launch Services Program. Aegis' purpose is to display video streamed over a network connection to be viewed during launches. To accomplish this task, a VLC ActiveX plug-in was used in C# to provide the basic capabilities of video streaming. The program was then customized to be used during launches. The VLC plug-in can be configured programmatically to display a single stream, but for this project multiple streams needed to be accessed. To accomplish this, an easy to use, informative menu system was added to the program to enable users to quickly switch between videos. Other features were added to make the player more useful, such as watching multiple videos and watching a video in full screen.

  6. Machinability of IPS Empress 2 framework ceramic.

    Schmidt, C; Weigl, P

    2000-01-01

    Using ceramic materials for an automatic production of ceramic dentures by CAD/CAM is a challenge, because many technological, medical, and optical demands must be considered. The IPS Empress 2 framework ceramic meets most of them. This study shows the possibilities for machining this ceramic with economical parameters. The long life-time requirement for ceramic dentures requires a ductile machined surface to avoid the well-known subsurface damages of brittle materials caused by machining. Slow and rapid damage propagation begins at break outs and cracks, and limits life-time significantly. Therefore, ductile machined surfaces are an important demand for machine dental ceramics. The machining tests were performed with various parameters such as tool grain size and feed speed. Denture ceramics were machined by jig grinding on a 5-axis CNC milling machine (Maho HGF 500) with a high-speed spindle up to 120,000 rpm. The results of the wear test indicate low tool wear. With one tool, you can machine eight occlusal surfaces including roughing and finishing. One occlusal surface takes about 60 min machining time. Recommended parameters for roughing are middle diamond grain size (D107), cutting speed v(c) = 4.7 m/s, feed speed v(ft) = 1000 mm/min, depth of cut a(e) = 0.06 mm, width of contact a(p) = 0.8 mm, and for finishing ultra fine diamond grain size (D46), cutting speed v(c) = 4.7 m/s, feed speed v(ft) = 100 mm/min, depth of cut a(e) = 0.02 mm, width of contact a(p) = 0.8 mm. The results of the machining tests give a reference for using IPS Empress(R) 2 framework ceramic in CAD/CAM systems. Copyright 2000 John Wiley & Sons, Inc.

  7. PENGUKURAN KINERJA ROUND-ROBIN SCHEDULER UNTUK LINUX VIRTUAL SERVER PADA KASUS WEB SERVER

    Royyana Muslim Ijtihadie

    2005-07-01

    Full Text Available Normal 0 false false false IN X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin:0cm; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} Dengan meningkatnya perkembangan jumlah pengguna internet dan mulai diadopsinya penggunaan internet dalam kehidupan sehari-hari, maka lalulintas data di Internet telah meningkat secara signifikan. Sejalan dengan itu pula beban kerja server-server yang memberikan service di Internet juga mengalami kenaikan yang cukup signifikan. Hal tersebut dapat mengakibatkan suatu server mengalami kelebihan beban pada suatu saat. Untuk mengatasi hal tersebut maka diterapkan skema konfigurasi server cluster menggunakan konsep load balancing. Load balancing server menerapkan algoritma dalam melakukan pembagian tugas. Algoritma round robin telah digunakan pada Linux Virtual Server. Penelitian ini melakukan pengukuran kinerja terhadap Linux Virtual Server yang menggunakan algoritma round robin untuk melakukan penjadwalan pembagian beban terhadap server. Penelitian ini mengukur performa dari sisi client yang mencoba mengakses web server.performa yang diukur adalah jumlah request yang bisa diselesaikan perdetik (request per second, waktu untuk menyelesaikan per satu request, dan   throughput yang dihasilkan. Dari hasil percobaan didapatkan bahwa penggunaan LVS bisa meningkatkan performa, yaitu menaikkan jumlah request per detik

  8. Mobile location services over the next generation IP core network

    Thongthammachart, Saowanee; Olesen, Henning

    2003-01-01

    network is changing from circuit-switched to packet-switched technology and evolving to an IP core network based on IPv6. The IP core network will allow all IP devices to be connected seamlessly. Due to the movement detection mechanism of Mobile IPv6, mobile terminals will periodically update....... The concept of mobile location services over the next generation IP networks is described. We also discuss the effectiveness of the short-range wireless network regarding a mobile user's position inside buildings and hotspot areas....

  9. How to Use FASTLANEs to Protect IP Networks

    Robson, Christopher L

    2006-01-01

    .... By using appropriate configuration and taking full advantage of new IP technologies and successful network encryption FASTLANE devices, interconnecting individual agency networks into a common...

  10. Voice over IP in the Local Exchange: A Case Study

    Weiss, Martin B. H.; Kim, Hak-Ju

    2001-01-01

    There have been a small number of cost studies of Voice over IP (VoIP) in the academic literature. Generally, they have been for abstract networks, have not been focused on the public switched telephone network, or they have not included the operating costs. This paper presents the operating cost portion of our ongoing research project comparing circuit-switched and IP network costs for an existing local exchange carrier. We have found that (1) The operating cost differential between IP and c...

  11. DB2 9 for Linux, Unix, and Windows database administration upgrade certification study guide

    Sanders, Roger E

    2007-01-01

    Written by one of the world's leading DB2 authors who is an active participant in the development of the DB2 certification exams, this resource covers everything a database adminstrator needs to know to pass the DB2 9 for Linux, UNIX, and Windows Database Administration Certification Upgrade exam (Exam 736). This comprehensive study guide discusses all exam topics: server management, data placement, XML concepts, analyzing activity, high availability, database security, and much more. Each chapter contains an extensive set of practice questions along with carefully explained answers. Both information-technology professionals who have experience as database administrators and have a current DBA certification on version 8 of DB2 and individuals who would like to learn the new features of DB2 9 will benefit from the information in this reference guide.

  12. FTAP: a Linux-based program for tapping and music experiments.

    Finney, S A

    2001-02-01

    This paper describes FTAP, a flexible data collection system for tapping and music experiments. FTAP runs on standard PC hardware with the Linux operating system and can process input keystrokes and auditory output with reliable millisecond resolution. It uses standard MIDI devices for input and output and is particularly flexible in the area of auditory feedback manipulation. FTAP can run a wide variety of experiments, including synchronization/continuation tasks (Wing & Kristofferson, 1973), synchronization tasks combined with delayed auditory feedback (Aschersleben & Prinz, 1997), continuation tasks with isolated feedback perturbations (Wing, 1977), and complex alterations of feedback in music performance (Finney, 1997). Such experiments have often been implemented with custom hardware and software systems, but with FTAP they can be specified by a simple ASCII text parameter file. FTAP is available at no cost in source-code form.

  13. Use of Low-Cost Acquisition Systems with an Embedded Linux Device for Volcanic Monitoring.

    Moure, David; Torres, Pedro; Casas, Benito; Toma, Daniel; Blanco, María José; Del Río, Joaquín; Manuel, Antoni

    2015-08-19

    This paper describes the development of a low-cost multiparameter acquisition system for volcanic monitoring that is applicable to gravimetry and geodesy, as well as to the visual monitoring of volcanic activity. The acquisition system was developed using a System on a Chip (SoC) Broadcom BCM2835 Linux operating system (based on DebianTM) that allows for the construction of a complete monitoring system offering multiple possibilities for storage, data-processing, configuration, and the real-time monitoring of volcanic activity. This multiparametric acquisition system was developed with a software environment, as well as with different hardware modules designed for each parameter to be monitored. The device presented here has been used and validated under different scenarios for monitoring ocean tides, ground deformation, and gravity, as well as for monitoring with images the island of Tenerife and ground deformation on the island of El Hierro.

  14. A Linux cluster for between-pulse magnetic equilibrium reconstructions and other processor bound analyses

    Peng, Q.; Groebner, R. J.; Lao, L. L.; Schachter, J.; Schissel, D. P.; Wade, M. R.

    2001-01-01

    A 12-processor Linux PC cluster has been installed to perform between-pulse magnetic equilibrium reconstructions during tokamak operations using the EFIT code written in FORTRAN. The MPICH package implementing message passing interface is employed by EFIT for data distribution and communication. The new system calculates equilibria eight times faster than the previous system yielding a complete equilibrium time history on a 25 ms time scale 4 min after the pulse ends. A graphical interface is provided for users to control the time resolution and the type of EFITs. The next analysis to benefit from the cluster is CERQUICK written in IDL for ion temperature profile analysis. The plan is to expand the cluster so that a full profile analysis (Te, Ti, ne, Vr, Zeff) can be made available between pulses, which lays the ground work for Kinetic EFIT and/or ONETWO power balance analyses

  15. RTSPM: real-time Linux control software for scanning probe microscopy.

    Chandrasekhar, V; Mehta, M M

    2013-01-01

    Real time computer control is an essential feature of scanning probe microscopes, which have become important tools for the characterization and investigation of nanometer scale samples. Most commercial (and some open-source) scanning probe data acquisition software uses digital signal processors to handle the real time data processing and control, which adds to the expense and complexity of the control software. We describe here scan control software that uses a single computer and a data acquisition card to acquire scan data. The computer runs an open-source real time Linux kernel, which permits fast acquisition and control while maintaining a responsive graphical user interface. Images from a simulated tuning-fork based microscope as well as a standard topographical sample are also presented, showing some of the capabilities of the software.

  16. Dugong: a Docker image, based on Ubuntu Linux, focused on reproducibility and replicability for bioinformatics analyses.

    Menegidio, Fabiano B; Jabes, Daniela L; Costa de Oliveira, Regina; Nunes, Luiz R

    2018-02-01

    This manuscript introduces and describes Dugong, a Docker image based on Ubuntu 16.04, which automates installation of more than 3500 bioinformatics tools (along with their respective libraries and dependencies), in alternative computational environments. The software operates through a user-friendly XFCE4 graphic interface that allows software management and installation by users not fully familiarized with the Linux command line and provides the Jupyter Notebook to assist in the delivery and exchange of consistent and reproducible protocols and results across laboratories, assisting in the development of open science projects. Source code and instructions for local installation are available at https://github.com/DugongBioinformatics, under the MIT open source license. Luiz.nunes@ufabc.edu.br. © The Author (2017). Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com

  17. Porting oxbash to linux and its application in SD-shell calculations

    Suman, H.; Suleiman, S.

    1998-01-01

    Oxbash, a code for nuclear structure calculations within the shell model approach, was ported to Linux that is a UNIX clone for PC's. Due to many faults in the code version we had, deep corrective actions in the code had to be undertaken. This was done through intensive use of UNIX utilities like sed, nm, make in addition to proper shell script programming. Our version contained calls for missing subroutines. Some of these were included from C- and f90 libraries. Others had to be written separately. All these actions were organized and automated through a robust system of M akefiles . Finally the code was tested and applied for nuclei with 18 and 20 nucleons. (author)

  18. Secure Protocol and IP Core for Configuration of Networking Hardware IPs in the Smart Grid

    Marcelo Urbina

    2018-02-01

    Full Text Available Nowadays, the incorporation and constant evolution of communication networks in the electricity sector have given rise to the so-called Smart Grid, which is why it is necessary to have devices that are capable of managing new communication protocols, guaranteeing the strict requirements of processing required by the electricity sector. In this context, intelligent electronic devices (IEDs with network architectures are currently available to meet the communication, real-time processing and interoperability requirements of the Smart Grid. The new generation IEDs include an Field Programmable Gate Array (FPGA, to support specialized networking switching architectures for the electric sector, as the IEEE 1588-aware High-availability Seamless Redundancy/Parallel Redundancy Protocol (HSR/PRP. Another advantage to using an FPGA is the ability to update or reconfigure the design to support new requirements that are being raised to the standards (IEC 61850. The update of the architecture implemented in the FPGA can be done remotely, but it is necessary to establish a cyber security mechanism since the communication link generates vulnerability in the case the attacker gains physical access to the network. The research presented in this paper proposes a secure protocol and Intellectual Property (IP core for configuring and monitoring the networking IPs implemented in a Field Programmable Gate Array (FPGA. The FPGA based implementation proposed overcomes this issue using a light Layer-2 protocol fully implemented on hardware and protected by strong cryptographic algorithms (AES-GCM, defined in the IEC 61850-90-5 standard. The proposed secure protocol and IP core are applicable in any field where remote configuration over Ethernet is required for IP cores in FPGAs. In this paper, the proposal is validated in communications hardware for Smart Grids.

  19. 77 FR 5864 - BluePoint Linux Software Corp., China Bottles Inc., Long-e International, Inc., and Nano...

    2012-02-06

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] BluePoint Linux Software Corp., China Bottles Inc., Long-e International, Inc., and Nano Superlattice Technology, Inc.; Order of Suspension of... that there is a lack of current and accurate information concerning the securities of Nano Superlattice...

  20. Convolutional Neural Network on Embedded Linux(trademark) System-on-Chip: A Methodology and Performance Benchmark

    2016-05-01

    Linux® is a registered trademark of Linus Torvalds. NVIDIA ® is a registered trademark of NVIDIA Corporation. Oracle® is a registered trademark of...two NVIDIA ® GTX580 GPUs [3]. Therefore, for this initial work, we decided to concentrate on small networks and small datasets until the methods are

  1. PCI-VME bridge device driver design of a high-performance data acquisition and control system on LINUX

    Sun Yan; Ye Mei; Zhang Nan; Zhao Jingwei

    2000-01-01

    Data Acquisition and Control is an important part of Nuclear Electronic and Nuclear Detection application in HEP. The key methods are introduced for designing LINUX Device Driver of PCI-VME Bridge Device based on the realized Data Acquisition and Control System

  2. Setup of the development tools for a small-sized controller built in a robot using Linux

    Lee, Jae Cheol; Jun, Hyeong Seop; Choi, Yu Rak; Kim, Jae Hee

    2004-03-01

    This report explains a setup method of practical development tools for robot control software programming. Well constituted development tools make a programmer more productive and a program more reliable. We ported a proven operating system to the target board (our robot's controller) to avoid such convention. We selected open source Linux as operating system, because it is free, reliable, flexible and widely used. First, we setup the host computer with Linux, and installed a cross compiler on it. And we ported Linux to the target board and connected to the host computer with ethernet, and setup NFS to both the host and the target. So the target board can use host computer's hard disk as it's own disk. Next, we installed gdb server on the target board and gdb client and DDD to the host computer for debugging the target program in the host computer with graphic environment. Finally, we patched the target board's Linux kernel with another one which have realtime capability. In this way, we can have a realtime embedded hardware controller for a robot with convenient software developing tools. All source programs are edited and compiled on the host computer, and executable codes exist in the NFS mounted directory that can be accessed from target board's directory. We can execute and debugging the code by means of logging into the target through the ethernet or the serial line

  3. Pro Linux system administration learn to build systems for your business using free and open source software

    Matotek, Dennis; Lieverdink, Peter

    2017-01-01

    This book aims to ease the entry of businesses to the world of zero-cost software running on Linux. It takes a layered, component-based approach to open source business systems, while training system administrators as the builders of business infrastructure.

  4. PCI-VME bridge device driver design of a high-performance data acquisition and control system on LINUX

    Sun Yan; Ye Mei; Zhang Nan; Zhao Jingwei

    2001-01-01

    Data acquisition and control is an important part of nuclear electronic and nuclear detection application in HEP. The key method has been introduced for designing LINUX device driver of PCI-VME bridge device based on realized by authors' data acquisition and control system

  5. Posterior epidural disc fragment masquerading as spinal tumor: Review of the literature.

    Park, Taejune; Lee, Ho Jun; Kim, Jae Seong; Nam, Kiyeun

    2018-03-09

    posterior epidural lumbar disc fragment could be masqueraded as spinal tumor, if rim enhancement is observed in MRI scans with sudden symptoms of radiculopathy or cauda equina syndrome, it should be taken into consideration. Early diagnosis can lead to early surgery, which can reduce complications.

  6. The masquerade game: marine mimicry adaptation between egg-cowries and octocorals

    Juan A. Sánchez

    2016-08-01

    -fertilize. Discussion. Our study system comprised background-matching mimicry, of the masquerade type, between egg-cowries (Simnia/Simnialena and octocorals (Pacifigorgia/Eugorgia/Leptogorgia. We observed mimicry mismatches related to fitness trade-offs, such as reproductive aggregations vs. vulnerability against predators. Despite the general assumption that coevolution of mimicry involves speciation, egg-cowries with different hosts and colorations comprise the same lineages. Consequently, we infer that there would be significant tradeoffs between mimicry and the pursuit of reproductive aggregations in egg-cowries. The findings of this study not only contribute to the understanding of the evolution of mimicry in egg-cowries, a poorly studied group of marine gastropods, but also to the development of a new biologically meaningful board game that could be implemented as a learning tool.

  7. Telefonía IP (ToIP): principios fundamentales, arquitectura y aspecto regulatorio en el Ecuador

    Narváez García, William Fernando; Ugalde Peña, Pablo Esteban

    2006-01-01

    En este documento, hemos tratado de explicar el funcionamiento de la telefonía IP dentro de poco, comenzamos hablando con una introducción al tema al comentar sobre la actual tendencia a la conocida como patrón ALL-IP. Luego hemos visto conveniente hacer un comentario acerca de la evolución de las telecomunicaciones desde sus primeros pasos con Guillermo Marconi hasta nuestros días con la ToIP. De modo que existe un concepto claro de lo que la ToIP significa, en primer lugar se explica ...

  8. PENGEMBANGAN PERANGKAT LUNAK MANAJEMEN KONEKSI INTERNET UNTUK SOHO

    Muchammad Husni

    2002-07-01

    Full Text Available Untuk bisa mengakses Internet, komputer harus terhubung ke Internet melalui Internet Service Provider dan menggunakan IP address Internet. Jumlah IP address Internet saat ini (IPv4 sangat terbatas, oleh karena itu penggunaannya dibatasi dan diatur dengan sistem sewa yang cukup mahal. Alternatif koneksi Internet yang paling murah dan umum digunakan adalah Dial-up, komputer client akan otomatis menggunakan IP address dynamic yang disewakan selama kita terkoneksi. Apabila pada Local Area Network terdapat beberapa komputer yang ingin menggunakan Internet secara bersamaan apakah harus dilakukan Dial-up untuk tiap komputer ? Tidak, terdapat 2 alternativ Internet-Sharing yakni Masquerading dan Proxy. Saat ini terdapat beberapa software yang menyediakan solusi Internet-Sharing dengan Masquerading atau Proxy yang berbasis sistem operasi Windows. Permasalahannya software tersebut tidak handal (lambat dan sering hang dan tidak aman karena banyaknya celah keamanan pada sistem operasi Windows seperti Denial-of-Service dan Trojan. Penggunaan Internet yang tidak terkontrol pada suatu perusahaan dapat menyebabkan efek yang kontraproduktiv pada karyawan, oleh karena itu diperlukan manajemen akses Internet yang efektiv, efisien dan mudah digunakan. Pada makalah ini dikembangkan solusi Internet-Sharing dan Manajemen Koneksi Internet yang handal, aman, fleksibel dan mudah digunakan. Untuk Internet-Sharing menggunakan fasilitas Masquerading yang terdapat pada kernel Linux 2.2 yang terbukti handal dan aman. Sistem manajemen koneksi dan konfigurasi didesain berbasis Web agar mudah digunakan oleh network administrator dan karyawan. Sistem ini juga cocok diaplikasikan pada Internet Café/Warung Internet. Kata kunci : Internet, SOHO, IP, dial-up.

  9. Successful Intra-peritoneal Antibiotic Therapy for Primary Abdominal Nocardiosis in an Immunocompetent Young Female Masquerading as Carcinoma Ovary

    Ravi N Patil

    2012-01-01

    Full Text Available Nocardiosis is a common opportunistic infection in the immunocompromised and in patients with chronic debilitating diseases,e.g continuous ambulatory peritoneal dialysis (CAPD patients. Primary abdominal nocardiosis is rare and is indeed a very rare infection in immunocompetent persons. Only two cases have been reported in immunocompetent patients so far and this may be third case to the best of our knowledge and first in India. About 11 cases have been reported in CAPD patients and AIDS patients.We report a case of Nocardiosis in an immunocompetent young female who presented with an abdomino-pelvic mass masquerading as carcinoma ovary.After initial resistance to various antibiotics, she responded to intraperitoneal and oral linezolid and oral ciprofloxacin.

  10. Protection against cancer by dietary IP6 and inositol.

    Vucenik, Ivana; Shamsuddin, AbulKalam M

    2006-01-01

    Inositol hexaphosphate (IP(6)) is a naturally occurring polyphosphorylated carbohydrate, abundantly present in many plant sources and in certain high-fiber diets, such as cereals and legumes. In addition to being found in plants, IP(6) is contained in almost all mammalian cells, although in much smaller amounts, where it is important in regulating vital cellular functions such as signal transduction, cell proliferation, and differentiation. For a long time IP(6) has been recognized as a natural antioxidant. Recently IP(6) has received much attention for its role in cancer prevention and control of experimental tumor growth, progression, and metastasis. In addition, IP(6) possesses other significant benefits for human health, such as the ability to enhance immune system, prevent pathological calcification and kidney stone formation, lower elevated serum cholesterol, and reduce pathological platelet activity. In this review we show the efficacy and discuss some of the molecular mechanisms that govern the action of this dietary agent. Exogenously administered IP(6) is rapidly taken up into cells and dephosphorylated to lower inositol phosphates, which further affect signal transduction pathways resulting in cell cycle arrest. A striking anticancer action of IP(6) was demonstrated in different experimental models. In addition to reducing cell proliferation, IP(6) also induces differentiation of malignant cells. Enhanced immunity and antioxidant properties also contribute to tumor cell destruction. Preliminary studies in humans show that IP(6) and inositol, the precursor molecule of IP(6), appear to enhance the anticancer effect of conventional chemotherapy, control cancer metastases, and improve quality of life. Because it is abundantly present in regular diet, efficiently absorbed from the gastrointestinal tract, and safe, IP(6) + inositol holds great promise in our strategies for cancer prevention and therapy. There is clearly enough evidence to justify the

  11. An analysis of autopsy cases of non-Hodgkin lymphoma-with special reference to those masquerading as acute febrile illness

    Sonali Rajesh Saraf

    2016-01-01

    Conclusion: As NHL present with nonspecific symptoms, these tumours may not be detected in early stages and hence may not be treated appropriately. These patients have weakened immunity and hence are prone to infection and sepsis which can be a major cause of mortality. This autopsy study experience has shown that NHL can masquerade as acute febrile illness which if not detected early and treated adequately can turn fatal.

  12. PENGEMBANGAN PERANGKAT PEMBELAJARAN IPS DENGAN PENDEKATAN INQUIRY

    Lisna Handayani

    2015-08-01

    Full Text Available Tujuan  penelitian adalah menghasilkan perangkat pembelajaran IPS dengan Pendekatan Inquiry. Penelitian pengembangan ini menggunakan langkah-langkah Borg and Gall yang terdiri dari tiga tahapan utama yaitu pendahuluan, pengembangan dan validasi. Data yang diperoleh adalah hasil belajar, aktivitas diskusi dan respon peserta didik. Data dianalisis menggunakan analisis deskriptif dan uji t. Penggunaan pendekatan inquiry sebagai salah satau strategi pembelajaran IPS dapat dilakukan dengan mempersiapkan terlebih dahulu perangkat pembelajarannya. Hasil pengembangan divalidasi oleh pakar, diujicobakan pada kelas terbatas dan selanjutnya dilakukan ujicoba pada kelas eksperimen yang dibandingkan hasilnya dengan kelas kontrol. Perangkat pembelajaran tergolong efektif untuk meningkatkan hasil belajar peserta didik di kelas VII SMP Negeri 2 Jepara, terbukti dari adanya peningkatan yang nyata terbukti dari hasil uji paired sampel t-test dengan nilai signifikansi 0,000 <0,05, dan terjadi peningkatan yang tinggi (gain > 0,7, serta hasil belajar yang dicapai berbeda secara signifikan dengan kelompok kontrol. Di samping hasil belajar, pembelajaran yang dilakukan juga berdampak pada proses belajar yang membawa tingginya aktivitas peserta didik dalam memberikan gagasan, kerjasama, inisiatif, keaktifan dan kedisiplinan. The purpose of this research is creating Social Lesson Material with Inquiry Approach.This developing of the research is used of  the steps of Borg and Gall. They are Introducing, developing and evaluating. Learning materials are developed and validity by expert. Datas are gooten by study result, discussion activity and students, respone. Analizing datas are used descriptive analize and t- try out. The use of inquiry approach as one of learning strategy on Social Lesson Material can be done by preparing those. The result of  developing are being validity by expert,  try out on limited group and experiment group ad compare with control group

  13. Unilateral uveitis masquerade syndrome caused by diffuse large B-cell lymphoma diagnosed using multiparametric flow cytometry of the aqueous humor.

    Monsalvo, Silvia; Serrano, Cristina; Prieto, Elena; Fernández-Sanz, Guillermo; Puente, Maria-Camino; Rodriguez-Pinilla, Maria; Garcia Raso, Aranzazu; Llamas, Pilar; Cordoba, Raul

    2017-07-01

    The uveitis masquerade syndromes (UMS) are a group of ocular diseases that may mimic chronic intraocular inflammation. Many malignant entities such as non-Hodgkin's lymphomas may masquerade as uveitis. We report a case of an HIV-positive patient with masquerade syndrome presenting unilateral uveitis. 45-year-old Caucasian man with a diagnosis of diffuse large B-cell lymphoma (DLBCL). The patient was diagnosed by a biopsy of an abdominal mass which showed fragments of gastric mucosa with diffuse growth of neoplastic cells. At diagnosis, the patient suffered from unilateral blurring of vision and a sudden decrease of left-eye visual acuity. A slit-lamp examination of the left eye revealed a diagnosis of anterior uveitis. The patient exhibited no signs of posterior uveitis. An anterior-chamber paracentesis was performed and analyzed by multiparameter flow cytometry (MFC), showing cells CD45, CD19, CD20, CD22, and CD38 positives, and moderate expression of CD10 with kappa light chain restriction, showing a monoclonal B-cell population. The patient received CHOP-R with intrathecal methotrexate followed by consolidation high dose methotrexate obtaining a complete response which is ongoing. Differential diagnosis between chronic uveitis and ocular lymphoma may be challenging. We advocate anterior-chamber paracentesis in cases of refractory uveitis in patients with hematologic malignancies. © 2016 International Clinical Cytometry Society. © 2016 International Clinical Cytometry Society.

  14. In Silico Pooling of ChIP-seq Control Experiments

    Sun, Guannan; Srinivasan, Rajini; Lopez-Anido, Camila; Hung, Holly A.; Svaren, John; Keleş, Sündüz

    2014-01-01

    As next generation sequencing technologies are becoming more economical, large-scale ChIP-seq studies are enabling the investigation of the roles of transcription factor binding and epigenome on phenotypic variation. Studying such variation requires individual level ChIP-seq experiments. Standard designs for ChIP-seq experiments employ a paired control per ChIP-seq sample. Genomic coverage for control experiments is often sacrificed to increase the resources for ChIP samples. However, the quality of ChIP-enriched regions identifiable from a ChIP-seq experiment depends on the quality and the coverage of the control experiments. Insufficient coverage leads to loss of power in detecting enrichment. We investigate the effect of in silico pooling of control samples within multiple biological replicates, multiple treatment conditions, and multiple cell lines and tissues across multiple datasets with varying levels of genomic coverage. Our computational studies suggest guidelines for performing in silico pooling of control experiments. Using vast amounts of ENCODE data, we show that pairwise correlations between control samples originating from multiple biological replicates, treatments, and cell lines/tissues can be grouped into two classes representing whether or not in silico pooling leads to power gain in detecting enrichment between the ChIP and the control samples. Our findings have important implications for multiplexing samples. PMID:25380244

  15. An Attacker-Defender Model for IP-Based Networks

    Barkley, Timothy R

    2008-01-01

    .... Because IP flows are defined essentially in terms of origin-destination (O-D) pairs, we represent IP traffic engineering as a multi-commodity flow problem in which each O-D pair is treated as a separate commodity...

  16. IP-10 release assays in the diagnosis of tuberculosis infection

    Ruhwald, Morten; Aabye, Martine G; Ravn, Pernille

    2012-01-01

    The current state-of-the-art tests for infection with Mycobacterium tuberculosis - the IFN-γ release assays - rely on accurate measurement of the cytokine IFN-γ. Many other potential biomarkers are expressed in concert with IFN-γ, and IP-10 in particular has shown promising results. IP-10...

  17. VoIP under the EU regulatory framework : preventing foreclosure?

    Sadowski, B.M.; Straathof, B.

    2005-01-01

    In June 2004, the European Commission (EC) issued an "Information and Consultation Document" (European Commission 2004) that discussed how the Regulatory Framework of the European Union (EU) should be adapted to accommodate Voice over IP (VoIP) and invited relevant parties to comment on the

  18. Collaboration in Science and Innovation: IP Considerations

    Belenkaya, N.

    2016-01-01

    Full text: In today’s highly competitive market, organizations gain competitive advantage by collaborating on innovations. However, in general, before a successful partnership can start, organizations will have to negotiate ownership and access to the intellectual property produced as a result of the joint effort. While some collaborative projects are not created to pursue commercial gains, outputs of collaboration may have commercial application. Experience shows that the framework for the collaboration should be determined through an agreement that describes the project and the future ownership, management and exploitation of the intellectual property. The attractiveness of a collaborative project is increased if such framework can be negotiated timely. It is important that the partners agree on the allocation of ownership, transfer, and access to intellectual property before the project starts. This is done to reduce uncertainties and to protect the rights of the partners. Partners should agree not only on the owners of the future intellectual property but also on the ways for subsequent commercial exploitation of the results of the collaboration. A timely negotiated and successfully finalized framework for IP ownership and management plays a key role in protecting partner investments and ensuring the successful exploitation of the results of the collaboration. (author

  19. 77 FR 33227 - Assessment Questionnaire-IP Sector Specific Agency Risk Self Assessment Tool (IP-SSARSAT)

    2012-06-05

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0069] Assessment Questionnaire--IP Sector... comments concerning new Information Collection Request--Assessment Questionnaire--IP Sector Specific Agency... http://www.regulations.gov , including any personal information provided. OMB is particularly...

  20. Inositol hexakisphosphate (IP6) generated by IP5K mediates cullin-COP9 signalosome interactions and CRL function.

    Scherer, Paul C; Ding, Yan; Liu, Zhiqing; Xu, Jing; Mao, Haibin; Barrow, James C; Wei, Ning; Zheng, Ning; Snyder, Solomon H; Rao, Feng

    2016-03-29

    The family of cullin-RING E3 Ligases (CRLs) and the constitutive photomorphogenesis 9 (COP9) signalosome (CSN) form dynamic complexes that mediate ubiquitylation of 20% of the proteome, yet regulation of their assembly/disassembly remains poorly understood. Inositol polyphosphates are highly conserved signaling molecules implicated in diverse cellular processes. We now report that inositol hexakisphosphate (IP6) is a major physiologic determinant of the CRL-CSN interface, which includes a hitherto unidentified electrostatic interaction between the N-terminal acidic tail of CSN subunit 2 (CSN2) and a conserved basic canyon on cullins. IP6, with an EC50 of 20 nM, acts as an intermolecular "glue," increasing cullin-CSN2 binding affinity by 30-fold, thereby promoting assembly of the inactive CRL-CSN complexes. The IP6 synthase, Ins(1,3,4,5,6)P5 2-kinase (IPPK/IP5K) binds to cullins. Depleting IP5K increases the percentage of neddylated, active Cul1 and Cul4A, and decreases levels of the Cul1/4A substrates p27 and p21. Besides dysregulating CRL-mediated cell proliferation and UV-induced apoptosis, IP5K depletion potentiates by 28-fold the cytotoxic effect of the neddylation inhibitor MLN4924. Thus, IP5K and IP6 are evolutionarily conserved components of the CRL-CSN system and are potential targets for cancer therapy in conjunction with MLN4924.

  1. IP3 levels and their modulation FY fusicoccin measured by a novel [3H] IP3 binding assay

    Aducci, P.; Marra, M.

    1990-01-01

    A recently developed sensitive assay based on the binding reaction of IP3 to bovine adrenal preparations has been utilized for determining the level of endogenous inositol-1,4,5 trisphosphate (IP3) in maize roots and coleoptiles. The amount of IP3 found in these tissues ranges from 0.1 to 1.0 nmol g-1 fresh weight. Reproducible results were obtained with extracts of tissues from a same harvest, while they showed a 2-3 fold variation when different batches of plantlets were compared. The fungal phytotoxin fusicoccin (FC) known to affect several physiological processes in higher plants, increases the level of IP3 in coleoptiles. This observation suggests that IP3 might be involved in the transduction of the FC encoded signal from its receptors at the plasmalemma level to the cell machinery

  2. An IP-10 (CXCL10)-Derived Peptide Inhibits Angiogenesis

    Yates-Binder, Cecelia C.; Rodgers, Margaret; Jaynes, Jesse; Wells, Alan; Bodnar, Richard J.; Turner, Timothy

    2012-01-01

    Angiogenesis plays a critical role in processes such as organ development, wound healing, and tumor growth. It requires well-orchestrated integration of soluble and matrix factors and timely recognition of such signals to regulate this process. Previous work has shown that newly forming vessels express the chemokine receptor CXC receptor 3 (CXCR3) and, activation by its ligand IP-10 (CXCL10), both inhibits development of new vasculature and causes regression of newly formed vessels. To identify and develop new therapeutic agents to limit or reverse pathological angiogenesis, we identified a 21 amino acid fragment of IP-10, spanning the α-helical domain residues 77–98, that mimic the actions of the whole IP-10 molecule on endothelial cells. Treatment of the endothelial cells with the 22 amino acid fragment referred to as IP-10p significantly inhibited VEGF-induced endothelial motility and tube formation in vitro, properties critical for angiogenesis. Using a Matrigel plug assay in vivo, we demonstrate that IP-10p both prevented vessel formation and induced involution of nascent vessels. CXCR3 neutralizing antibody was able to block the inhibitory effects of the IP-10p, demonstrating specificity of the peptide. Inhibition of endothelial function by IP-10p was similar to that described for IP-10, secondary to CXCR3-mediated increase in cAMP production, activation of PKA inhibiting cell migration, and inhibition of VEGF-mediated m-calpain activation. IP-10p provides a novel therapeutic agent that inhibits endothelial cell function thus, allowing for the modulation of angiogenesis. PMID:22815829

  3. PERANGKAT LUNAK SEMI HOT STANDBY ROUTER PROTOCOL PADA PC ROUTER BERBASIS LINUX

    Nur Aini Rakhmawati

    2005-01-01

    Full Text Available Normal 0 false false false IN X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin:0cm; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} Router memegang peranan penting dalam sebuah jaringan. Jika router mengalami suatu masalah dapat berakibat terhambatnya lalu lintas data dalam suatu jaringan. Untuk mengatasi masalah sebuah router, Cisco mengembangkan suatu sistem Hot Standby Router Protocol (HSRP. Namun HSRP ini belum dimiliki oleh router komputer. Padahal harga komputer lebih murah daripada router hardware. Semi HSRP merupakan suatu metode yang diimplementasikan pada router komputer dengan keterbatasan yang dimiliki oleh sebuah komputer dimana sebuahrouter komputer tidak dapat mengirimkan pesan resign yang mengijikan router lain untuk menggantikannyaketika router komputer ini mengalami kegagalan. Dalam semi HSRP dibentuk suatu kelompok router yang memiliki subnet yang sama pada masing-masing interfacenya.Pada masing-masing router dijalankan aplikasi yang berfungsi untuk mengatur jalannya mekanisme HSRP. Aplikasi ini memungkinkan router-router tersebut dapat berhubungan untuk mengetahui apakah ada masalah yang terjadi pada router utama yang berfungsi untuk meneruskan data klien dengan menggunakan alamat virtual IP dan MAC. Dalam berhubungan router-router tersebut menggunakan komunikasi broadcast. Ketika router utama mengalami kegagalan maka

  4. Protecting LHC IP1/IP5 Components Against Radiation Resulting from Colliding Beam Interactions

    Mokhov, N V; Kerby, J S; Strait, J B

    2003-01-01

    Beam-induced energy deposition in the LHC high luminosity interaction region (IR) components due to both pp collisions and beam loss in the IR vicinity is a significant challenge for the design of the high luminosity insertions. It was shown in our previous studies that a set of absorbers would reduce both the peak power density and total heat load to tolerable levels. In this paper the results of further optimization and comprehensive MARS calculations are summarized for the LHC lattice, version 6.4, for the updated IP1 and IP5 layouts and a baseline pp-collision source term. Power density, power dissipation, particle fluxes and spectra, accumulated dose and residual dose rates are studied in the components of the inner triplets including their TAS absorbers, the TAN neutral beam absorbers, separation dipoles, and quadrupoles of the outer triplets and possible collimators there. Results are given for the nominal luminosity of 1034 cm-2 s-1. The current design is proved to provide the best safety margin under...

  5. A Novel Smart Meter Controlling System with Dynamic IP Addresses

    Manembu, Pinrolinvic; Welang, Brammy; Kalua Lapu, Aditya

    2017-01-01

    Smart meters are the electronic devices for measuring energy consumption in real time. Usually, static public IP addresses are allocated to realize the point-to-point (P2P) communication and remote controlling for smart metering systems. This, however, restricts the wide deployment of smart meters......, due to the deficiency of public IP resources. This paper proposes a novel subscription-based communication architecture for the support of dynamic IP addresses and group controlling of smart meters. The paper evaluates the proposed architecture by comparing the traditional P2P architecture...

  6. Understanding Innovative Potential (IP) in an ICT Context

    Rai, Sudhanshu

    a dynamic perspective in its conception, operation and instantiation. I conclude this paper with insights on what I call the dynamic IP threshold arguing that being dynamic cannot be seen as a point in time but a threshold existing over time. I then discuss some implications. I suggest that firms need...... to consider IP as a long term investment not only in human capital but in the way the human capital is allowed to engage with new ideas. I suggest IP can be build using institutional logics that enable openness and collegiality....

  7. On the Cryptographic Features of a VoIP Service

    Dimitrios Alvanos

    2018-01-01

    Full Text Available Security issues of typical Voice over Internet Protocol (VoIP applications are studied in this paper; in particular, the open source Linphone application is being used as a case study. An experimental analysis indicates that protecting signalling data with the TLS protocol, which unfortunately is not always the default option, is needed to alleviate several security concerns. Moreover, towards improving security, it is shown that a VoIP application may operate over a virtual private network without significantly degrading the overall performance. The conclusions of this study provide useful insights to the usage of any VoIP application.

  8. Application of Mobile-ip to Space and Aeronautical Networks

    Leung, Kent; Shell, Dan; Ivancic, William D.; Stewart, David H.; Bell, Terry L.; Kachmar, Brian A.

    2001-01-01

    The National Aeronautics and Space Administration (NASA) is interested in applying mobile Internet protocol (mobile-ip) technologies to its space and aeronautics programs. In particular, mobile-ip will play a major role in the Advanced Aeronautic Transportation Technology (AAT-F), the Weather Information Communication (WINCOMM), and the Small Aircraft Transportation System (SATS) aeronautics programs. This paper describes mobile-ip and mobile routers--in particular, the features, capabilities, and initial performance of the mobile router are presented. The application of mobile-router technology to NASA's space and aeronautics programs is also discussed.

  9. A comparison of the microstructure and properties of the IPS Empress 2 and the IPS Empress glass-ceramics.

    Höland, W; Schweiger, M; Frank, M; Rheinberger, V

    2000-01-01

    The aim of this report is to analyze the microstructures of glass-ceramics of the IPS Empress 2 and IPS Empress systems by scanning electron microscopy. The main properties of the glass-ceramics were determined and compared to each other. The flexural strength of the pressed glass-ceramic (core material) was improved by a factor of more than three for IPS Empress 2 (lithium disilicate glass-ceramic) in comparison with IPS Empress (leucite glass-ceramic). For the fracture toughness, the K(IC) value was measured as 3.3 +/- 0.3 MPa. m(0.5) for IPS Empress 2 and 1.3 +/- 0.1 MPa. m(0.5) for IPS Empress. Abrasion behavior, chemical durability, and optical properties such as translucency of all glass-ceramics fulfill the dental standards. The authors concluded that IPS Empress 2 can be used to fabricate 3-unit bridges up to the second premolar. Copyright 2000 John Wiley & Sons, Inc.

  10. NSTX-U Advances in Real-Time C++11 on Linux

    Erickson, Keith G.

    2015-01-01

    Programming languages like C and Ada combined with proprietary embedded operating systems have dominated the real-time application space for decades. The new C++11standard includes native, language-level support for concurrency, a required feature for any nontrivial event-oriented real-time software. Threads, Locks, and Atomics now exist to provide the necessary tools to build the structures that make up the foundation of a complex real-time system. The National Spherical Torus Experiment Upgrade (NSTX-U) at the Princeton Plasma Physics Laboratory (PPPL) is breaking new ground with the language as applied to the needs of fusion devices. A new Digital Coil Protection System (DCPS) will serve as the main protection mechanism for the magnetic coils, and it is written entirely in C++11 running on Concurrent Computer Corporation's real-time operating system, RedHawk Linux. It runs over 600 algorithms in a 5 kHz control loop that determine whether or not to shut down operations before physical damage occurs. To accomplish this, NSTX-U engineers developed software tools that do not currently exist elsewhere, including real-time atomic synchronization, real-time containers, and a real-time logging framework. Together with a recent (and carefully configured) version of the GCC compiler, these tools enable data acquisition, processing, and output using a conventional operating system to meet a hard real-time deadline (that is, missing one periodic is a failure) of 200 microseconds

  11. NSTX-U Advances in Real-Time C++11 on Linux

    Erickson, Keith G.

    2015-08-01

    Programming languages like C and Ada combined with proprietary embedded operating systems have dominated the real-time application space for decades. The new C++11 standard includes native, language-level support for concurrency, a required feature for any nontrivial event-oriented real-time software. Threads, Locks, and Atomics now exist to provide the necessary tools to build the structures that make up the foundation of a complex real-time system. The National Spherical Torus Experiment Upgrade (NSTX-U) at the Princeton Plasma Physics Laboratory (PPPL) is breaking new ground with the language as applied to the needs of fusion devices. A new Digital Coil Protection System (DCPS) will serve as the main protection mechanism for the magnetic coils, and it is written entirely in C++11 running on Concurrent Computer Corporation's real-time operating system, RedHawk Linux. It runs over 600 algorithms in a 5 kHz control loop that determine whether or not to shut down operations before physical damage occurs. To accomplish this, NSTX-U engineers developed software tools that do not currently exist elsewhere, including real-time atomic synchronization, real-time containers, and a real-time logging framework. Together with a recent (and carefully configured) version of the GCC compiler, these tools enable data acquisition, processing, and output using a conventional operating system to meet a hard real-time deadline (that is, missing one periodic is a failure) of 200 microseconds.

  12. A self contained Linux based data acquisition system for 2D detectors with delay line readout

    Beltran, D.; Toledo, J.; Klora, A.C.; Ramos-Lerate, I.; Martinez, J.C.

    2007-01-01

    This article describes a fast and self-contained data acquisition system for 2D gas-filled detectors with delay line readout. It allows the realization of time resolved experiments in the millisecond scale. The acquisition system comprises of an industrial PC running Linux, a commercial time-to-digital converter and an in-house developed histogramming PCI card. The PC provides a mass storage for images and a graphical user interface for system monitoring and control. The histogramming card builds images with a maximum count rate of 5 MHz limited by the time-to-digital converter. Histograms are transferred to the PC at 85 MB/s. This card also includes a time frame generator, a calibration channel unit and eight digital outputs for experiment control. The control software was developed for easy integration into a beamline, including scans. The system is fully operational at the Spanish beamline BM16 at the ESRF in France, the neutron beamlines Adam and Eva at the ILL in France, the Max Plank Institute in Stuttgart in Germany, the University of Copenhagen in Denmark and at the future ALBA synchrotron in Spain. Some representative collected images from synchrotron and neutron beamlines are presented

  13. The RAppArmor Package: Enforcing Security Policies in R Using Dynamic Sandboxing on Linux

    Jeroen Ooms

    2013-11-01

    Full Text Available The increasing availability of cloud computing and scientific super computers brings great potential for making R accessible through public or shared resources. This allows us to efficiently run code requiring lots of cycles and memory, or embed R functionality into, e.g., systems and web services. However some important security concerns need to be addressed before this can be put in production. The prime use case in the design of R has always been a single statistician running R on the local machine through the interactive console. Therefore the execution environment of R is entirely unrestricted, which could result in malicious behavior or excessive use of hardware resources in a shared environment. Properly securing an R process turns out to be a complex problem. We describe various approaches and illustrate potential issues using some of our personal experiences in hosting public web services. Finally we introduce the RAppArmor package: a Linux based reference implementation for dynamic sandboxing in R on the level of the operating system.

  14. The renewed HT-7 plasma control system based on real-time Linux cluster

    Yuan, Q.P., E-mail: qpyuan@ipp.ac.cn [Institute of Plasma Physics, Chinese Academy of Sciences, Hefei (China); Xiao, B.J.; Zhang, R.R. [Institute of Plasma Physics, Chinese Academy of Sciences, Hefei (China); Walker, M.L.; Penaflor, B.G.; Piglowski, D.A.; Johnson, R.D. [General Atomics, DIII-D National Fusion Facility, San Diego, CA (United States)

    2012-12-15

    Highlights: Black-Right-Pointing-Pointer The hardware and software structure of the new HT-7 plasma control system (HT-7 PCS) is reported. Black-Right-Pointing-Pointer All original systems were integrated in the new HT-7 PCS. And the implementation details of the control algorithms are given in the paper. Black-Right-Pointing-Pointer Different from EAST PCS, the AC operation mode is realized in HT-7 PCS. Black-Right-Pointing-Pointer The experiment results are discussed. Good control performance has been obtained. - Abstract: In order to improve the synchronization, flexibility and expansibility of the plasma control on HT-7, a new plasma control system (HT-7 PCS) was constructed. The HT-7 PCS was based on a real-time Linux cluster with a well-defined, robust and flexible software infrastructure which was adapted from DIII-D PCS. In this paper, the hardware structure and system customization details for HT-7 PCS are reported. The plasma position and current control, plasma density control and off-normal event detection, which were realized in separated systems originally, have been integrated and implemented in such HT-7 PCS. All these control algorithms have been successfully validated in the last several HT-7 experiment campaigns. Good control performance has been achieved and the experiment results are discussed in the paper.

  15. Smartphone qualification & linux-based tools for CubeSat computing payloads

    Bridges, C. P.; Yeomans, B.; Iacopino, C.; Frame, T. E.; Schofield, A.; Kenyon, S.; Sweeting, M. N.

    Modern computers are now far in advance of satellite systems and leveraging of these technologies for space applications could lead to cheaper and more capable spacecraft. Together with NASA AMES's PhoneSat, the STRaND-1 nanosatellite team has been developing and designing new ways to include smart-phone technologies to the popular CubeSat platform whilst mitigating numerous risks. Surrey Space Centre (SSC) and Surrey Satellite Technology Ltd. (SSTL) have led in qualifying state-of-the-art COTS technologies and capabilities - contributing to numerous low-cost satellite missions. The focus of this paper is to answer if 1) modern smart-phone software is compatible for fast and low-cost development as required by CubeSats, and 2) if the components utilised are robust to the space environment. The STRaND-1 smart-phone payload software explored in this paper is united using various open-source Linux tools and generic interfaces found in terrestrial systems. A major result from our developments is that many existing software and hardware processes are more than sufficient to provide autonomous and operational payload object-to-object and file-based management solutions. The paper will provide methodologies on the software chains and tools used for the STRaND-1 smartphone computing platform, the hardware built with space qualification results (thermal, thermal vacuum, and TID radiation), and how they can be implemented in future missions.

  16. BioSMACK: a linux live CD for genome-wide association analyses.

    Hong, Chang Bum; Kim, Young Jin; Moon, Sanghoon; Shin, Young-Ah; Go, Min Jin; Kim, Dong-Joon; Lee, Jong-Young; Cho, Yoon Shin

    2012-01-01

    Recent advances in high-throughput genotyping technologies have enabled us to conduct a genome-wide association study (GWAS) on a large cohort. However, analyzing millions of single nucleotide polymorphisms (SNPs) is still a difficult task for researchers conducting a GWAS. Several difficulties such as compatibilities and dependencies are often encountered by researchers using analytical tools, during the installation of software. This is a huge obstacle to any research institute without computing facilities and specialists. Therefore, a proper research environment is an urgent need for researchers working on GWAS. We developed BioSMACK to provide a research environment for GWAS that requires no configuration and is easy to use. BioSMACK is based on the Ubuntu Live CD that offers a complete Linux-based operating system environment without installation. Moreover, we provide users with a GWAS manual consisting of a series of guidelines for GWAS and useful examples. BioSMACK is freely available at http://ksnp.cdc. go.kr/biosmack.

  17. BioconductorBuntu: a Linux distribution that implements a web-based DNA microarray analysis server.

    Geeleher, Paul; Morris, Dermot; Hinde, John P; Golden, Aaron

    2009-06-01

    BioconductorBuntu is a custom distribution of Ubuntu Linux that automatically installs a server-side microarray processing environment, providing a user-friendly web-based GUI to many of the tools developed by the Bioconductor Project, accessible locally or across a network. System installation is via booting off a CD image or by using a Debian package provided to upgrade an existing Ubuntu installation. In its current version, several microarray analysis pipelines are supported including oligonucleotide, dual-or single-dye experiments, including post-processing with Gene Set Enrichment Analysis. BioconductorBuntu is designed to be extensible, by server-side integration of further relevant Bioconductor modules as required, facilitated by its straightforward underlying Python-based infrastructure. BioconductorBuntu offers an ideal environment for the development of processing procedures to facilitate the analysis of next-generation sequencing datasets. BioconductorBuntu is available for download under a creative commons license along with additional documentation and a tutorial from (http://bioinf.nuigalway.ie).

  18. Research on Linux Trusted Boot Method Based on Reverse Integrity Verification

    Chenlin Huang

    2016-01-01

    Full Text Available Trusted computing aims to build a trusted computing environment for information systems with the help of secure hardware TPM, which has been proved to be an effective way against network security threats. However, the TPM chips are not yet widely deployed in most computing devices so far, thus limiting the applied scope of trusted computing technology. To solve the problem of lacking trusted hardware in existing computing platform, an alternative security hardware USBKey is introduced in this paper to simulate the basic functions of TPM and a new reverse USBKey-based integrity verification model is proposed to implement the reverse integrity verification of the operating system boot process, which can achieve the effect of trusted boot of the operating system in end systems without TPMs. A Linux operating system booting method based on reverse integrity verification is designed and implemented in this paper, with which the integrity of data and executable files in the operating system are verified and protected during the trusted boot process phase by phase. It implements the trusted boot of operation system without TPM and supports remote attestation of the platform. Enhanced by our method, the flexibility of the trusted computing technology is greatly improved and it is possible for trusted computing to be applied in large-scale computing environment.

  19. STATUS OF THE LINUX PC CLUSTER FOR BETWEEN-PULSE DATA ANALYSES AT DIII-D

    PENG, Q; GROEBNER, R.J; LAO, L.L; SCHACHTER, J.; SCHISSEL, D.P; WADE, M.R.

    2001-08-01

    OAK-B135 Some analyses that survey experimental data are carried out at a sparse sample rate between pulses during tokamak operation and/or completed as a batch job overnight because the complete analysis on a single fast workstation cannot fit in the narrow time window between two pulses. Scientists therefore miss the opportunity to use these results to guide experiments quickly. With a dedicated Beowulf type cluster at a cost less than that of a workstation, these analyses can be accomplished between pulses and the analyzed data made available for the research team during the tokamak operation. A Linux PC cluster comprises of 12 processors was installed at DIII-D National Fusion Facility in CY00 and expanded to 24 processors in CY01 to automatically perform between-pulse magnetic equilibrium reconstructions using the EFIT code written in Fortran, CER analyses using CERQUICK code written in IDL and full profile fitting analyses (n e , T e , T i , V r , Z eff ) using IDL code ZIPFIT. This paper reports the current status of the system and discusses some problems and concerns raised during the implementation and expansion of the system

  20. Web-based Quality Control Tool used to validate CERES products on a cluster of Linux servers

    Chu, C.; Sun-Mack, S.; Heckert, E.; Chen, Y.; Mlynczak, P.; Mitrescu, C.; Doelling, D.

    2014-12-01

    There have been a few popular desktop tools used in the Earth Science community to validate science data. Because of the limitation on the capacity of desktop hardware such as disk space and CPUs, those softwares are not able to display large amount of data from files.This poster will talk about an in-house developed web-based software built on a cluster of Linux servers. That allows users to take advantage of a few Linux servers working in parallel to generate hundreds images in a short period of time. The poster will demonstrate:(1) The hardware and software architecture is used to provide high throughput of images. (2) The software structure that can incorporate new products and new requirement quickly. (3) The user interface about how users can manipulate the data and users can control how the images are displayed.

  1. PEMBELAJARAN IPS DALAM REALITA DI ERA KTSP: STUDI EKSPLORASI PELAKSANAAN PEMBELAJARAN IPS PADA JENJANG SMP DI KABUPATEN PATI

    Edi Sutrisna

    2011-10-01

    Full Text Available Application of KTSP as a curriculum based on competency requires the implementation of strategies and methods that can deliver a number of learners achieving a particular competence. IPS as a subject who has a noble purpose, namely to prepare students to be good citizens, should be taught to students through appropriate strategies and methods by utilizing various media sources and learning. Most social studies teachers still promote the use of expository strategies in presenting lessons of Social Science education and the use of resources and learning media are minimal. Environment, as a laboratory of IPS is not utilized properly.The study shows that most teachers still tend to use expository teaching strategies, use of resources and learning media that are less varied, and integrated approaches to teaching social studies can not be realized by the teachers due to various constraints.   Keywords: learning, IPS, junior school, KTSP   Penerapan KTSP sebagai kurikulum berbasis kompetensi membutuhkan penerapan strategi dan metode yang dapat memberikan sejumlah peserta didik mencapai kompetensi tertentu. IPS sebagai subjek yang memiliki tujuan mulia, yaitu untuk mempersiapkan siswa untuk menjadi warga negara yang baik, harus diajarkan kepada siswa melalui strategi yang tepat dan metode dengan memanfaatkan berbagai sumber media dan pembelajaran. Kebanyakan guru IPS masih menggunakan strategi ekspositori dalam menyajikan meteri pelajaran IPS dengan menggunakan sumber daya dan media pembelajaran yang minimal. Lingkungan sekitar, sebagai laboratorium IPS tidak digunakan menunjukkan pembelajaran yang baik. Kebanyakan guru masih cenderung untuk menggunakan strategi pengajaran ekspositori, penggunaan sumber daya dan media pembelajaran yang kurang bervariasi, dan pendekatan terpadu untuk mengajar IPS, sehingga tidak dapat direalisasikan oleh para guru karena berbagai kendala.   Kata kunci: pembelajaran, IPS, SMP, KTSP  

  2. Cloud BioLinux: pre-configured and on-demand bioinformatics computing for the genomics community

    2012-01-01

    Background A steep drop in the cost of next-generation sequencing during recent years has made the technology affordable to the majority of researchers, but downstream bioinformatic analysis still poses a resource bottleneck for smaller laboratories and institutes that do not have access to substantial computational resources. Sequencing instruments are typically bundled with only the minimal processing and storage capacity required for data capture during sequencing runs. Given the scale of sequence datasets, scientific value cannot be obtained from acquiring a sequencer unless it is accompanied by an equal investment in informatics infrastructure. Results Cloud BioLinux is a publicly accessible Virtual Machine (VM) that enables scientists to quickly provision on-demand infrastructures for high-performance bioinformatics computing using cloud platforms. Users have instant access to a range of pre-configured command line and graphical software applications, including a full-featured desktop interface, documentation and over 135 bioinformatics packages for applications including sequence alignment, clustering, assembly, display, editing, and phylogeny. Each tool's functionality is fully described in the documentation directly accessible from the graphical interface of the VM. Besides the Amazon EC2 cloud, we have started instances of Cloud BioLinux on a private Eucalyptus cloud installed at the J. Craig Venter Institute, and demonstrated access to the bioinformatic tools interface through a remote connection to EC2 instances from a local desktop computer. Documentation for using Cloud BioLinux on EC2 is available from our project website, while a Eucalyptus cloud image and VirtualBox Appliance is also publicly available for download and use by researchers with access to private clouds. Conclusions Cloud BioLinux provides a platform for developing bioinformatics infrastructures on the cloud. An automated and configurable process builds Virtual Machines, allowing the

  3. Cloud BioLinux: pre-configured and on-demand bioinformatics computing for the genomics community.

    Krampis, Konstantinos; Booth, Tim; Chapman, Brad; Tiwari, Bela; Bicak, Mesude; Field, Dawn; Nelson, Karen E

    2012-03-19

    A steep drop in the cost of next-generation sequencing during recent years has made the technology affordable to the majority of researchers, but downstream bioinformatic analysis still poses a resource bottleneck for smaller laboratories and institutes that do not have access to substantial computational resources. Sequencing instruments are typically bundled with only the minimal processing and storage capacity required for data capture during sequencing runs. Given the scale of sequence datasets, scientific value cannot be obtained from acquiring a sequencer unless it is accompanied by an equal investment in informatics infrastructure. Cloud BioLinux is a publicly accessible Virtual Machine (VM) that enables scientists to quickly provision on-demand infrastructures for high-performance bioinformatics computing using cloud platforms. Users have instant access to a range of pre-configured command line and graphical software applications, including a full-featured desktop interface, documentation and over 135 bioinformatics packages for applications including sequence alignment, clustering, assembly, display, editing, and phylogeny. Each tool's functionality is fully described in the documentation directly accessible from the graphical interface of the VM. Besides the Amazon EC2 cloud, we have started instances of Cloud BioLinux on a private Eucalyptus cloud installed at the J. Craig Venter Institute, and demonstrated access to the bioinformatic tools interface through a remote connection to EC2 instances from a local desktop computer. Documentation for using Cloud BioLinux on EC2 is available from our project website, while a Eucalyptus cloud image and VirtualBox Appliance is also publicly available for download and use by researchers with access to private clouds. Cloud BioLinux provides a platform for developing bioinformatics infrastructures on the cloud. An automated and configurable process builds Virtual Machines, allowing the development of highly

  4. Migration of the Three-dimensional Wind Field (3DWF) Model from Linux to Windows and Mobile Platforms

    2017-11-01

    Results in netCDF 11 4.3 Morphological Data Generation 16 5. 3DWF on Mobile Platforms 17 5.1 3DWF on Windows Mobile Devices 18 5.2 3DWF Migration to...Windows and Mobile Platforms by Giap Huynh and Yansen Wang Approved for public release; distribution is unlimited. NOTICES...Migration of the Three-dimensional Wind Field (3DWF) Model from Linux to Windows and Mobile Platforms by Giap Huynh and Yansen Wang

  5. CATCHprofiles: Clustering and Alignment Tool for ChIP Profiles

    G. G. Nielsen, Fiona; Galschiøt Markus, Kasper; Møllegaard Friborg, Rune

    2012-01-01

    IP-profiling data and detect potentially meaningful patterns, the areas of enrichment must be aligned and clustered, which is an algorithmically and computationally challenging task. We have developed CATCHprofiles, a novel tool for exhaustive pattern detection in ChIP profiling data. CATCHprofiles is built upon...... a computationally efficient implementation for the exhaustive alignment and hierarchical clustering of ChIP profiling data. The tool features a graphical interface for examination and browsing of the clustering results. CATCHprofiles requires no prior knowledge about functional sites, detects known binding patterns...... it an invaluable tool for explorative research based on ChIP profiling data. CATCHprofiles and the CATCH algorithm run on all platforms and is available for free through the CATCH website: http://catch.cmbi.ru.nl/. User support is available by subscribing to the mailing list catch-users@bioinformatics.org....

  6. Engineering of radioimmunoassay (RIA) IP10.1

    Hari Nurcahyadi

    2010-01-01

    Engineering of Radioimmunoassay (RIA) IP10.1 is an innovative by PRPN - BATAN in 2010. Innovations made to the device IP10.1 RIA is the sample changer system, sample changer system on the device RIA IP10.1 applied 2 linear axis system (X, Z) with AC servo motor. In the RIA IP10.1 also use 5 pieces of the detector, so the enumeration process 50 (Fifty) sample is expected to be faster. Like its predecessor, The whole enumeration, data collection procedures and mechanisms operating within this system is entirely controlled by a PC via an electronic module. Electronics module consists of a high voltage module, amplifier and signal processor module, the module enumerators, low-voltage module, the module driver motor controller and a USB interface. The data acquisition and communication system using a USB port with the computer. (author)

  7. IP and resistivity survey at the INEL cold test pit

    Frangos, W.

    1997-01-01

    Induced polarization (IP) is a technique for detection of diffuse occurrences of metallic material. The Idaho National Laboratory (INEL) Cold Test Pit (CTP) has been carefully constructed to simulate stored hazardous waste occurrences. IP and resistivity surveys of the CTP show a very strong IP response and a modest resistivity response associated with the simulated waste. Several false positive resistivity anomalies are noted. 2-D inversion of the data accurately determine the lateral limits of the waste zone. The depth of burial indicated is deeper than reported by the construction engineers. Limited depth extent is recognized, in distinction to results from other, resistivity-based, methods, but it also appears too deep. IP holds promise as a method for locating buried waste

  8. The psisub(IPS)-LAS relation for extragalactic radio sources

    Banhatti, D.G.

    1984-01-01

    Metre-wavelength interplanetary scintillation (IPS) observations give the overall angular sizes psi of scintillating compact structures in radio sources. From 326.5-MHz IPS data for a sample of faint (Ooty) radio sources, log psi versus log (largest angular size) is seen, on average, to have a slope 0.2, significantly less than one. A similar trend is seen from 81.5-MHz IPS data for a sample of strong, powerful (3CR) double sources, although the slope is 0.4 and the mean psi about four times larger. The difference in slopes is due mainly to the large spread in the redshifts of the 3CR sources compared to the expected narrow range for the Ooty sources, while the difference in mean psi values is due to the different methods of determining psi for the two samples, the different frequencies used for the IPS observations and the different mean LAS values. (author)

  9. Quantitative analysis of macro-ARG using IP system

    Nakajima, Eiichi; Kawai, Kenji; Furuta, Yoshitake

    1997-01-01

    Recent progress in imaging plate (IP) system allow us to analyze autoradiographic images quantitatively. In the 'whole-body autoradiography', a method clarify the distribution of radioisotope or labeled compounds in the tissues and organs in a freeze-dried whole-body section of small animals such as rats and mice, the sections are pressed against a IP for exposure and the IP is scanned by Bio-Imaging Analyzer (Fuji Photo Film Co., Ltd) and a digital autoradiographic image is given. Quantitative data concerning the activity in different tissues can be obtained using an isotope scale as a reference source. Fading effect, application of IP system for distribution of receptor binding ARG, analysis of radio-spots on TLC and radioactive concentration in liquid such as blood are also discussed. (author)

  10. Mathematical Representation of VoIP Connection Delay

    M. Halas

    2007-09-01

    Full Text Available The main topic of this article is to define mathematical formulation of VoIP connection delay model. It handles about all partial delay components, the mechanism of their generation, facilities and their mathematical formulation. Thereafter based on mathematical formulation of all partial delay components, the final mathematical model of whole VoIP call delay is created. In conclusion of this article the results of the designed mathematical model are compared with the experimentally gained results.

  11. IP3 stimulates CA++ efflux from fusogenic carrot protoplasts

    Rincon, M.; Boss, W.F.

    1986-01-01

    Polyphosphoinositide breakdown plays an important role in signal transduction in animal cells (Berridge and Irvine, 1984, Nature, 312:315). Upon stimulation, phospholipase C hydrolyzes phosphatidylinositol 4,5-bisphosphate to inositol 1,4,5-trisphosphate (IP 3 ) and diacylglycerol both of which act as cellular second messengers. IP 3 mobilizes Ca ++ from internal stores, hence the cytosolic free Ca ++ concentration increases and those physiological activities regulated by Ca ++ are stimulated. To test if plant cells also responded to IP 3 , Ca ++ efflux studies were done with fusogenic carrot protoplasts released in EGTA. The protoplasts were preloaded with 45 Ca ++ placed in a Ca ++ -free medium, and efflux determined as 45 Ca ++ loss from the protoplasts. IP 3 (10-20μM) caused enhanced 45 Ca ++ efflux and the response was sustained for at least 15 min. In plants, as in animals, the observed IP 3 -enhanced 45 Ca ++ efflux suggested that IP 3 released Ca ++ from internal stores, and the increased free cytosolic Ca ++ activated Ca ++ pumping mechanisms which restored the Ca ++ concentration in the cytosol to the normal level

  12. Enabling new e-health business models by converging IP-based and non-IP-based home networks

    Hartog, F.T.H. den; Tijmes, M.R.; Cramer, E.R.; Noorbergen, A.

    2013-01-01

    Current efforts in extending the Internet are focused on achieving full support of services and user-centric content from sectors such as energy management, education, and e-health. Until recently, these sectors typically developed their own communication infrastructure and systems, leading to point solutions, often built on non-IP technologies. We describe a demonstrator that shows how a non-IP supporting Continua-certified health device, such as a weighing scale, can be unlocked for use by ...

  13. Subtype-selective regulation of IP(3) receptors by thimerosal via cysteine residues within the IP(3)-binding core and suppressor domain.

    Khan, Samir A; Rossi, Ana M; Riley, Andrew M; Potter, Barry V L; Taylor, Colin W

    2013-04-15

    IP(3)R (IP(3) [inositol 1,4,5-trisphosphate] receptors) and ryanodine receptors are the most widely expressed intracellular Ca(2+) channels and both are regulated by thiol reagents. In DT40 cells stably expressing single subtypes of mammalian IP(3)R, low concentrations of thimerosal (also known as thiomersal), which oxidizes thiols to form a thiomercurylethyl complex, increased the sensitivity of IP(3)-evoked Ca(2+) release via IP(3)R1 and IP(3)R2, but inhibited IP(3)R3. Activation of IP(3)R is initiated by IP(3) binding to the IBC (IP(3)-binding core; residues 224-604) and proceeds via re-arrangement of an interface between the IBC and SD (suppressor domain; residues 1-223). Thimerosal (100 μM) stimulated IP(3) binding to the isolated NT (N-terminal; residues 1-604) of IP(3)R1 and IP(3)R2, but not to that of IP(3)R3. Binding of a competitive antagonist (heparin) or partial agonist (dimeric-IP(3)) to NT1 was unaffected by thiomersal, suggesting that the effect of thimerosal is specifically related to IP(3)R activation. IP(3) binding to NT1 in which all cysteine residues were replaced by alanine was insensitive to thimerosal, so too were NT1 in which cysteine residues were replaced in either the SD or IBC. This demonstrates that thimerosal interacts directly with cysteine in both the SD and IBC. Chimaeric proteins in which the SD of the IP(3)R was replaced by the structurally related A domain of a ryanodine receptor were functional, but thimerosal inhibited both IP(3) binding to the chimaeric NT and IP(3)-evoked Ca(2+) release from the chimaeric IP(3)R. This is the first systematic analysis of the effects of a thiol reagent on each IP(3)R subtype. We conclude that thimerosal selectively sensitizes IP(3)R1 and IP(3)R2 to IP(3) by modifying cysteine residues within both the SD and IBC and thereby stabilizing an active conformation of the receptor.

  14. Subtype-selective regulation of IP3 receptors by thimerosal via cysteine residues within the IP3-binding core and suppressor domain

    Khan, Samir A.; Rossi, Ana M.; Riley, Andrew M.; Potter, Barry V. L.; Taylor, Colin W.

    2013-01-01

    IP3R (IP3 [inositol 1,4,5-trisphosphate] receptors) and ryanodine receptors are the most widely expressed intracellular Ca2+ channels and both are regulated by thiol reagents. In DT40 cells stably expressing single subtypes of mammalian IP3R, low concentrations of thimerosal (also known as thiomersal), which oxidizes thiols to form a thiomercurylethyl complex, increased the sensitivity of IP3-evoked Ca2+ release via IP3R1 and IP3R2, but inhibited IP3R3. Activation of IP3R is initiated by IP3 binding to the IBC (IP3-binding core; residues 224–604) and proceeds via re-arrangement of an interface between the IBC and SD (suppressor domain; residues 1–223). Thimerosal (100 μM) stimulated IP3 binding to the isolated NT (N-terminal; residues 1–604) of IP3R1 and IP3R2, but not to that of IP3R3. Binding of a competitive antagonist (heparin) or partial agonist (dimeric-IP3) to NT1 was unaffected by thiomersal, suggesting that the effect of thimerosal is specifically related to IP3R activation. IP3 binding to NT1 in which all cysteine residues were replaced by alanine was insensitive to thimerosal, so too were NT1 in which cysteine residues were replaced in either the SD or IBC. This demonstrates that thimerosal interacts directly with cysteine in both the SD and IBC. Chimaeric proteins in which the SD of the IP3R was replaced by the structurally related A domain of a ryanodine receptor were functional, but thimerosal inhibited both IP3 binding to the chimaeric NT and IP3-evoked Ca2+ release from the chimaeric IP3R. This is the first systematic analysis of the effects of a thiol reagent on each IP3R subtype. We conclude that thimerosal selectively sensitizes IP3R1 and IP3R2 to IP3 by modifying cysteine residues within both the SD and IBC and thereby stabilizing an active conformation of the receptor. PMID:23282150

  15. VISPA - Visual Physics Analysis on Linux, Mac OS X and Windows

    Brodski, M.; Erdmann, M.; Fischer, R.; Hinzmann, A.; Klimkovich, T.; Mueller, G.; Muenzer, T.; Steggemann, J.; Winchen, T.

    2009-01-01

    Modern physics analysis is an iterative task consisting of prototyping, executing and verifying the analysis procedure. For supporting scientists in each step of this process, we developed VISPA: a toolkit based on graphical and textual elements for visual physics analysis. Unlike many other analysis frameworks VISPA runs on Linux, Windows and Mac OS X. VISPA can be used in any experiment with serial data flow. In particular, VISPA can be connected to any high energy physics experiment. Furthermore, datatypes for the usage in astroparticle physics have recently been successfully included. An analysis on the data is performed in several steps, each represented by an individual module. While modules e.g. for file input and output are already provided, additional modules can be written by the user with C++ or the Python language. From individual modules, the analysis is designed by graphical connections representing the data flow. This modular concept assists the user in fast prototyping of the analysis and improves the reusability of written source code. The execution of the analysis can be performed directly from the GUI, or on any supported computer in batch mode. Therefore the analysis can be transported from the laptop to other machines. The recently improved GUI of VISPA is based on a plug-in mechanism. Besides components for the development and execution of physics analysis, additional plug-ins are available for the visualization of e.g. the structure of high energy physics events or the properties of cosmic rays in an astroparticle physics analysis. Furthermore plug-ins have been developed to display and edit configuration files of individual experiments from within the VISPA GUI. (author)

  16. Hierarchical Image Segmentation of Remotely Sensed Data using Massively Parallel GNU-LINUX Software

    Tilton, James C.

    2003-01-01

    A hierarchical set of image segmentations is a set of several image segmentations of the same image at different levels of detail in which the segmentations at coarser levels of detail can be produced from simple merges of regions at finer levels of detail. In [1], Tilton, et a1 describes an approach for producing hierarchical segmentations (called HSEG) and gave a progress report on exploiting these hierarchical segmentations for image information mining. The HSEG algorithm is a hybrid of region growing and constrained spectral clustering that produces a hierarchical set of image segmentations based on detected convergence points. In the main, HSEG employs the hierarchical stepwise optimization (HSWO) approach to region growing, which was described as early as 1989 by Beaulieu and Goldberg. The HSWO approach seeks to produce segmentations that are more optimized than those produced by more classic approaches to region growing (e.g. Horowitz and T. Pavlidis, [3]). In addition, HSEG optionally interjects between HSWO region growing iterations, merges between spatially non-adjacent regions (i.e., spectrally based merging or clustering) constrained by a threshold derived from the previous HSWO region growing iteration. While the addition of constrained spectral clustering improves the utility of the segmentation results, especially for larger images, it also significantly increases HSEG s computational requirements. To counteract this, a computationally efficient recursive, divide-and-conquer, implementation of HSEG (RHSEG) was devised, which includes special code to avoid processing artifacts caused by RHSEG s recursive subdivision of the image data. The recursive nature of RHSEG makes for a straightforward parallel implementation. This paper describes the HSEG algorithm, its recursive formulation (referred to as RHSEG), and the implementation of RHSEG using massively parallel GNU-LINUX software. Results with Landsat TM data are included comparing RHSEG with classic

  17. Security of IP Telephony in Ecuador: Online Analysis

    José Estrada

    2016-06-01

    Full Text Available Telephony is a global service and thus telephone networks have been a coveted target for criminals. Now that voice can be transported over IP and that multiple services are integrated in a convergent model through Internet, there are more incentives to attack and more attackers. Moreover, the development of open source telephone applications has encouraged the massive use of IP telephony, but not an increased awareness about embedded security risks. Due to the current and intensive adoption of IP telephony systems in Ecuador, we conducted an exploration based on public information to obtain statistics about telephone systems connected to Internet in Ecuador. Additionally, using a deliberately vulnerable IP telephony system, we collected more data to do a preliminary analysis of threats to such systems. We found that hundreds of telephone systems were publicly available on the Internet and using outdated versions of Asterisk-based applications. We also found thousands of malicious interactions on the IP telephony system we deployed on the Internet.

  18. Modeling ChIP sequencing in silico with applications.

    Zhengdong D Zhang

    2008-08-01

    Full Text Available ChIP sequencing (ChIP-seq is a new method for genomewide mapping of protein binding sites on DNA. It has generated much excitement in functional genomics. To score data and determine adequate sequencing depth, both the genomic background and the binding sites must be properly modeled. To develop a computational foundation to tackle these issues, we first performed a study to characterize the observed statistical nature of this new type of high-throughput data. By linking sequence tags into clusters, we show that there are two components to the distribution of tag counts observed in a number of recent experiments: an initial power-law distribution and a subsequent long right tail. Then we develop in silico ChIP-seq, a computational method to simulate the experimental outcome by placing tags onto the genome according to particular assumed distributions for the actual binding sites and for the background genomic sequence. In contrast to current assumptions, our results show that both the background and the binding sites need to have a markedly nonuniform distribution in order to correctly model the observed ChIP-seq data, with, for instance, the background tag counts modeled by a gamma distribution. On the basis of these results, we extend an existing scoring approach by using a more realistic genomic-background model. This enables us to identify transcription-factor binding sites in ChIP-seq data in a statistically rigorous fashion.

  19. An ethernet/IP security review with intrusion detection applications

    Laughter, S. A.; Williams, R. D.

    2006-01-01

    Supervisory Control and Data Acquisition (SCADA) and automation networks, used throughout utility and manufacturing applications, have their own specific set of operational and security requirements when compared to corporate networks. The modern climate of heightened national security and awareness of terrorist threats has made the security of these systems of prime concern. There is a need to understand the vulnerabilities of these systems and how to monitor and protect them. Ethernet/IP is a member of a family of protocols based on the Control and Information Protocol (CIP). Ethernet/IP allows automation systems to be utilized on and integrated with traditional TCP/IP networks, facilitating integration of these networks with corporate systems and even the Internet. A review of the CIP protocol and the additions Ethernet/IP makes to it has been done to reveal the kind of attacks made possible through the protocol. A set of rules for the SNORT Intrusion Detection software is developed based on the results of the security review. These can be used to monitor, and possibly actively protect, a SCADA or automation network that utilizes Ethernet/IP in its infrastructure. (authors)

  20. LINK codes TRAC-BF1/PARCSv2.7 in LINUX without external communication interface; Acoplamiento de los codigos TRAC-BF1/PARCSv2.7 en Linux sin interfaz externa de comunicacion

    Barrachina, T.; Garcia-Fenoll, M.; Abarca, A.; Miro, R.; Verdu, G.; Concejal, A.; Solar, A.

    2014-07-01

    The TRAC-BF1 code is still widely used by the nuclear industry for safety analysis. The plant models developed using this code are highly validated, so it is advisable to continue improving this code before migrating to another completely different code. The coupling with the NRC neutronic code PARCSv2.7 increases the simulation capabilities in transients in which the power distribution plays an important role. In this paper, the procedure for the coupling of TRAC-BF1 and PARCSv2.7 codes without PVM and in Linux is presented. (Author)

  1. DiffServ resource management in IP-based radio access networks

    Heijenk, Geert; Karagiannis, Georgios; Rexhepi, Vlora; Westberg, Lars; prof.dr. Prasad, R.; prof.dr. Bach Andersen, J.

    2001-01-01

    The increasing popularity of the Internet, the flexibility of IP, and the wide deployment of IP technologies, as well as the growth of mobile communications have driven the development of IP-based solutions for wireless networking. The introduction of IP-based transport in Radio Access Networks

  2. Capturing value from IP in a global environment

    Alcacer, Juan; Beukel, Karin; Cassiman, Bruno

    Executive Summary The authors argue that challenges to capturing value from know-how and reputation through the use of different IP tools will be an increasingly important matter of strategy for global enterprises. This has important implications for management practice. Global enterprises...... will need to combine different institutional, market and non-market mechanisms. The precise combination of tools will depend on the local and regional institutional and market conditions. Abstract: This paper documents the strong growth in tools used by firms to protect their intellectual property (IP......), develop their know-how, and build and maintain their reputation globally during the last decades. We focus on three tools: patents, trademarks, and industrial designs. We find that, although most IP applications come from a few countries (the United States, European Union, Japan, China, and South Korea...

  3. Implementasi Server VoIP Berbasis SIP Pada LAN Nirkabel

    Mohammad Shoffa Al Arofat

    2013-03-01

    Full Text Available Voice over Internet Protocol (VoIP merupakan teknologi yang memungkinkan percakapan suara jarak jauh melalui protokol internet. Dalam telekomunikasi, diperlukan teknologi pensinyalan yang berguna untuk membangun, mengawasi, dan melepas hubungan antara dua titik. Salah satu teknologi pensinyalan yang banyak digunakan untuk VoIP adalah Session Initiation Protocol, dengan implementasinya yang berupa perangkat lunak Open SIP Server. Selain pensinyalan, ada beberapa parameter yang perlu diperhatikan dalam implementasi VoIP, yaitu Mean Opinion Score (MOS, network impairment, dan bandwidth. Pengujian dilakukan terhadap enam codec, yaitu G.722, PCMA, PCMU, Speex, GSM, dan BV16. Berdasarkan hasil analisis dapat diambil kesimpulan bahwa codec yang menggunakan bandwidth paling rendah adalah Speex (27,12 kbps; Rata-rata delay yang dihasilkan oleh sipdroid lebih baik daripada jitsi.

  4. Firewall for Dynamic IP Address in Mobile IPv6

    Qiu, Ying; Bao, Feng; Zhou, Jianying

    Mobile communication is becoming the mainstream with the rapid growth of mobile devices penetrating our daily life. More and more mobile devices such as mobile phones, personal digital assistants, notebooks etc, are capable of Internet access. Mobile devices frequently change their communication IP addresses in mobile IPv6 network following its current attached domain. This raises a big challenge for building firewall for mobile devices. The conventional firewalls are primarily based on IPv4 networks where the security criteria are specified only to the fixed IP addresses or subnets, which apparently do not apply to mobile IPv6. In this paper we propose three solutions for mobile IPv6 firewall. Our approaches make the firewall adaptive to dynamic IP addresses in mobile IPv6 network. They have different expense and weight corresponding to different degree of universality. The paper focuses the study more from practical aspect.

  5. SS-Wrapper: a package of wrapper applications for similarity searches on Linux clusters

    Lefkowitz Elliot J

    2004-10-01

    Full Text Available Abstract Background Large-scale sequence comparison is a powerful tool for biological inference in modern molecular biology. Comparing new sequences to those in annotated databases is a useful source of functional and structural information about these sequences. Using software such as the basic local alignment search tool (BLAST or HMMPFAM to identify statistically significant matches between newly sequenced segments of genetic material and those in databases is an important task for most molecular biologists. Searching algorithms are intrinsically slow and data-intensive, especially in light of the rapid growth of biological sequence databases due to the emergence of high throughput DNA sequencing techniques. Thus, traditional bioinformatics tools are impractical on PCs and even on dedicated UNIX servers. To take advantage of larger databases and more reliable methods, high performance computation becomes necessary. Results We describe the implementation of SS-Wrapper (Similarity Search Wrapper, a package of wrapper applications that can parallelize similarity search applications on a Linux cluster. Our wrapper utilizes a query segmentation-search (QS-search approach to parallelize sequence database search applications. It takes into consideration load balancing between each node on the cluster to maximize resource usage. QS-search is designed to wrap many different search tools, such as BLAST and HMMPFAM using the same interface. This implementation does not alter the original program, so newly obtained programs and program updates should be accommodated easily. Benchmark experiments using QS-search to optimize BLAST and HMMPFAM showed that QS-search accelerated the performance of these programs almost linearly in proportion to the number of CPUs used. We have also implemented a wrapper that utilizes a database segmentation approach (DS-BLAST that provides a complementary solution for BLAST searches when the database is too large to fit into

  6. SS-Wrapper: a package of wrapper applications for similarity searches on Linux clusters.

    Wang, Chunlin; Lefkowitz, Elliot J

    2004-10-28

    Large-scale sequence comparison is a powerful tool for biological inference in modern molecular biology. Comparing new sequences to those in annotated databases is a useful source of functional and structural information about these sequences. Using software such as the basic local alignment search tool (BLAST) or HMMPFAM to identify statistically significant matches between newly sequenced segments of genetic material and those in databases is an important task for most molecular biologists. Searching algorithms are intrinsically slow and data-intensive, especially in light of the rapid growth of biological sequence databases due to the emergence of high throughput DNA sequencing techniques. Thus, traditional bioinformatics tools are impractical on PCs and even on dedicated UNIX servers. To take advantage of larger databases and more reliable methods, high performance computation becomes necessary. We describe the implementation of SS-Wrapper (Similarity Search Wrapper), a package of wrapper applications that can parallelize similarity search applications on a Linux cluster. Our wrapper utilizes a query segmentation-search (QS-search) approach to parallelize sequence database search applications. It takes into consideration load balancing between each node on the cluster to maximize resource usage. QS-search is designed to wrap many different search tools, such as BLAST and HMMPFAM using the same interface. This implementation does not alter the original program, so newly obtained programs and program updates should be accommodated easily. Benchmark experiments using QS-search to optimize BLAST and HMMPFAM showed that QS-search accelerated the performance of these programs almost linearly in proportion to the number of CPUs used. We have also implemented a wrapper that utilizes a database segmentation approach (DS-BLAST) that provides a complementary solution for BLAST searches when the database is too large to fit into the memory of a single node. Used together

  7. Embedded Real-Time Linux for Instrument Control and Data Logging

    Clanton, Sam; Gore, Warren J. (Technical Monitor)

    2002-01-01

    When I moved to the west. coast to take a job at NASA's Ames Research Center in Mountain View, CA, I was impressed with the variety of equipment and software which scientists at the center use to conduct their research. was happy to find that I was just as likely to see a machine running Lenox as one running Windows in the offices and laboratories of NASA Ames (although many people seem to use Moos around here). I was especially happy to find that the particular group with whom I was going to work, the Atmospheric Physics Branch at Ames, relied almost entirely on Lenox machines for their day-to-day work. So it was no surprise that when it was time to construct a new control system for one of their most important pieces of hardware, a switch from an unpredictable DOS-based platform to an Embedded Linux-based one was a decision easily made. The system I am working on is called the Solar Spectral Flux Radiometer (SSFR), a PC-104 based system custom-built by Dr. Warren Gore at Ames. Dr. Gore, Dr. Peter Pilewskie, Dr. Maura Robberies and Larry Pezzolo use the SSFR in their research. The team working on the controller project consists of Dr. Gore, John Pommier, and myself. The SSFR is used by the ,cities Atmospheric Radiation Group to measure solar spectral irradiance at moderate resolution to determine the radiative effect of clouds, aerosols, and gases on climate, and also to infer the physical properties of aerosols and clouds. Two identical SSFR's have been built and successfully deployed in three field missions: 1) the Department of Energy Atmospheric Radiation Measurement (ARM) Enhanced Shortwave Experiment (ARESE) II in February/March, 2000; 2) the Puerto Rico Dust Experiment (PRIDE) in July, 2000; and 3) the South African Regional Science Initiative (SAFARI) in August/September, 2000. Additionally, the SSFR was used to acquire water vapor spectra using the Ames Diameter base-path multiple-reflection absorption cell in a laboratory experiment.

  8. Which IP Strategies Do Young Highly Innovative Firms Choose

    Veugelers, Reinhilde; Schneider, Cédric

    2018-01-01

    This paper describes and analyzes the strategies of young highly innovative companies to appropriate the returns from their innovations. Upon controlling for other firm and industry characteristics, we show that firms combining a young age and small scale with a high R&D intensive profile are mor...... likely to use intellectual property (IP), specifically combining formal and informal appropriation mechanisms. They are especially more likely to choose secrecy in combination with formal IP. This holds primarily when they introduce more radical innovations new to the market....

  9. Transition in complex calcium bursting induced by IP3 degradation

    Zhang Feng; Lu Qishao; Su Jianzhong

    2009-01-01

    Complex intracellular Ca 2+ oscillations are systematically investigated in a mathematical model based on the mechanism of Ca 2+ -induced Ca 2+ release (CICR), taking account of the Ca 2+ -stimulated degradation of inositol 1,4,5-trisphosphate (IP 3 ) by a 3-kinase. Periodic, quasi-periodic and chaotic bursting oscillations exist in a wide range of parameter values and occur alternatively as the parameters change slightly. The transition among them can be observed by the evidence in their interspike interval and the Lyapunov exponent. These results reveal the role of agonist-stimulated of IP 3 degradation as a possible source for complex patterns in Ca 2+ signaling.

  10. A Study on IP Network Recovery through Routing Protocols

    K. Karthik

    2016-09-01

    Full Text Available Internet has taken major role in our communication infrastructure. Such that requirement of internet availability and reliability has increasing accordingly. The major network failure reasons are failure of node and failure of link among the nodes. This can reduce the performance of major applications in an IP networks. The network recovery should be fast enough so that service interruption of link or node failure. The new path taken by the diverted traffic can be computed either at the time of failures or before failures. These mechanisms are known as Reactive and Proactive protocols respectively. In this paper, we surveyed reactive and proactive protocols mechanisms for IP network recovery.

  11. Application Filters for TCP/IP Industrial Automation Protocols

    Batista, Aguinaldo B.; Kobayashi, Tiago H.; Medeiros, João Paulo S.; Brito, Agostinho M.; Motta Pires, Paulo S.

    The use of firewalls is a common approach usually meant to secure Automation Technology (AT) from Information Technology (TI) networks. This work proposes a filtering system for TCP/IP-based automation networks in which only certain kind of industrial traffic is permitted. All network traffic which does not conform with a proper industrial protocol pattern or with specific rules for its actions is supposed to be abnormal and must be blocked. As a case study, we developed a seventh layer firewall application with the ability of blocking spurious traffic, using an IP packet queueing engine and a regular expression library.

  12. The CANopen Controller IP Core: Implementation, Synthesis and Test Results

    Caramia, Maurizio; Bolognino, Luca; Montagna, Mario; Tosi, Pietro; Errico, Walter; Bigongiari, Franco; Furano, Gianluca

    2011-08-01

    This paper will describe the implementation and test results of the CANopen Controller IP Core (CCIPC) implemented by Thales Alenia Space and SITAEL Aerospace with the support of ESA in the frame of the EXOMARS Project. The CCIPC is a configurable VHDL implementation of the CANOPEN protocol [1]; it is foreseen to be used as CAN bus slave controller within the EXOMARS Entry Descending and Landing Demonstrato Module (EDM) and Rover Module. The CCIPC features, configuration capability, synthesis and test results will be described and the evidence of the state of maturity of this innovative IP core will be demonstrated.

  13. Solar Type II Radio Bursts and IP Type II Events

    Cane, H. V.; Erickson, W. C.

    2005-01-01

    We have examined radio data from the WAVES experiment on the Wind spacecraft in conjunction with ground-based data in order to investigate the relationship between the shocks responsible for metric type II radio bursts and the shocks in front of coronal mass ejections (CMEs). The bow shocks of fast, large CMEs are strong interplanetary (IP) shocks, and the associated radio emissions often consist of single broad bands starting below approx. 4 MHz; such emissions were previously called IP type II events. In contrast, metric type II bursts are usually narrowbanded and display two harmonically related bands. In addition to displaying complete dynamic spectra for a number of events, we also analyze the 135 WAVES 1 - 14 MHz slow-drift time periods in 2001-2003. We find that most of the periods contain multiple phenomena, which we divide into three groups: metric type II extensions, IP type II events, and blobs and bands. About half of the WAVES listings include probable extensions of metric type II radio bursts, but in more than half of these events, there were also other slow-drift features. In the 3 yr study period, there were 31 IP type II events; these were associated with the very fastest CMEs. The most common form of activity in the WAVES events, blobs and bands in the frequency range between 1 and 8 MHz, fall below an envelope consistent with the early signatures of an IP type II event. However, most of this activity lasts only a few tens of minutes, whereas IP type II events last for many hours. In this study we find many examples in the radio data of two shock-like phenomena with different characteristics that occur simultaneously in the metric and decametric/hectometric bands, and no clear example of a metric type II burst that extends continuously down in frequency to become an IP type II event. The simplest interpretation is that metric type II bursts, unlike IP type II events, are not caused by shocks driven in front of CMEs.

  14. Aplicación de RT-Linux en el control de motores de pasos. Parte I; Application of RT-Linux in the Control of Steps Mators. Part I

    Ernesto Duany Renté

    2011-02-01

    Full Text Available La idea fundamental de este artículo es mostrar cómo controlar un motor de paso empleando el puertoparalelo de una computadora, y demostrar la eficiencia temporal de las aplicaciones que se desarrollan ensistemas preparados para ejecutar tareas de precisión; aprovechar al máximo la capacidad de tiempo realestricto que brinda RT-Linux para el control de accionamientos eléctricos. Se desarrolla un pequeño softwareen lenguaje C que envía las señales al puerto paralelo en el tiempo necesario. Este software no estádiseñado con fines comerciales, solo permite realizar pruebas sobre el circuito de control diseñado paraeste propósito.  The fundamental idea of this article is to control a steps motor using the parallel port of a computer anddemonstrate the temporary efficiency of the applications that are executed in prepared systems to executetasks of real time. To take advantage of to the maximum capacity of strict real time that RT-Linux offers usfor the control of electric workings. A small software is developed in language C that sent the signs to theparallel port in the necessary time. This software is not designed with commercial, only allows to carry outtests on the control circuit designed for this purpose.

  15. Tactical decisions for changeable cuttlefish camouflage: visual cues for choosing masquerade are relevant from a greater distance than visual cues used for background matching.

    Buresch, Kendra C; Ulmer, Kimberly M; Cramer, Corinne; McAnulty, Sarah; Davison, William; Mäthger, Lydia M; Hanlon, Roger T

    2015-10-01

    Cuttlefish use multiple camouflage tactics to evade their predators. Two common tactics are background matching (resembling the background to hinder detection) and masquerade (resembling an uninteresting or inanimate object to impede detection or recognition). We investigated how the distance and orientation of visual stimuli affected the choice of these two camouflage tactics. In the current experiments, cuttlefish were presented with three visual cues: 2D horizontal floor, 2D vertical wall, and 3D object. Each was placed at several distances: directly beneath (in a circle whose diameter was one body length (BL); at zero BL [(0BL); i.e., directly beside, but not beneath the cuttlefish]; at 1BL; and at 2BL. Cuttlefish continued to respond to 3D visual cues from a greater distance than to a horizontal or vertical stimulus. It appears that background matching is chosen when visual cues are relevant only in the immediate benthic surroundings. However, for masquerade, objects located multiple body lengths away remained relevant for choice of camouflage. © 2015 Marine Biological Laboratory.

  16. Programmable genetic algorithm IP core for sensing and surveillance applications

    Katkoori, Srinivas; Fernando, Pradeep; Sankaran, Hariharan; Stoica, Adrian; Keymeulen, Didier; Zebulum, Ricardo

    2009-05-01

    Real-time evolvable systems are possible with a hardware implementation of Genetic Algorithms (GA). We report the design of an IP core that implements a general purpose GA engine which has been successfully synthesized and verified on a Xilinx Virtex II Pro FPGA Device (XC2VP30). The placed and routed IP core has an area utilization of only 13% and clock speed of 50MHz. The GA core can be customized in terms of the population size, number of generations, cross-over and mutation rates, and the random number generator seed. The GA engine can be tailored to a given application by interfacing with the application specific fitness evaluation module as well as the required storage memory (to store the current and new populations). The core is soft in nature i.e., a gate-level netlist is provided which can be readily integrated with the user's system. The GA IP core can be readily used in FPGA based platforms for space and military applications (for e.g., surveillance, target tracking). The main advantages of the IP core are its programmability, small footprint, and low power consumption. Examples of concept systems in sensing and surveillance domains will be presented.

  17. IP lookup with low memory requirement and fast update

    Berger, Michael Stübert

    2003-01-01

    The paper presents an IP address lookup algorithm with low memory requirement and fast updates. The scheme, which is denoted prefix-tree, uses a combination of a trie and a tree search, which is efficient in memory usage because the tree contains exactly one node for each prefix in the routing...

  18. Construction of a nuclear data server using TCP/IP

    Kawano, Toshihiko; Sakai, Osamu [Kyushu Univ., Fukuoka (Japan)

    1997-03-01

    We construct a nuclear data server which provides data in the evaluated nuclear data library through the network by means of TCP/IP. The client is not necessarily a user but a computer program. Two examples with a prototype server program are demonstrated, the first is data transfer from the server to a user, and the second is to a computer program. (author)

  19. IP over optical multicasting for large-scale video delivery

    Jin, Yaohui; Hu, Weisheng; Sun, Weiqiang; Guo, Wei

    2007-11-01

    In the IPTV systems, multicasting will play a crucial role in the delivery of high-quality video services, which can significantly improve bandwidth efficiency. However, the scalability and the signal quality of current IPTV can barely compete with the existing broadcast digital TV systems since it is difficult to implement large-scale multicasting with end-to-end guaranteed quality of service (QoS) in packet-switched IP network. China 3TNet project aimed to build a high performance broadband trial network to support large-scale concurrent streaming media and interactive multimedia services. The innovative idea of 3TNet is that an automatic switched optical networks (ASON) with the capability of dynamic point-to-multipoint (P2MP) connections replaces the conventional IP multicasting network in the transport core, while the edge remains an IP multicasting network. In this paper, we will introduce the network architecture and discuss challenges in such IP over Optical multicasting for video delivery.

  20. Lessons Learned from resolving massive IPS database change for SPADES+

    Kim, Jin-Soo

    2016-01-01

    Safety Parameter Display and Evaluation System+ (SPADES+) was implemented to meet the requirements for Safety Parameter Display System (SPDS) which are related to TMI Action Plan requirements. SPADES+ monitors continuously the critical safety function during normal, abnormal, and emergency operation mode and generates the alarm output to the alarm server when the tolerance related to safety functions are not satisfied. The alarm algorithm for critical safety function is performed in the NSSS Application Software (NAPS) server of the Information Process System (IPS) and the calculation result will be displayed on the flat panel display (FPD) of the IPS. SPADES+ provides the critical variable to the control room operators to aid them in rapidly and reliable determining the safety status of the plant. Many database point ID names (518 points) were changed. POINT_ID is used in the programming source code, the related documents such as SDS and SRS, and Graphic database. To reduce human errors, computer program and office program’s Macro are used. Though the automatic methods are used for changing POINT_IDs, it takes lots of time to resolve for editing the change list except for making computerized solutions. In IPS, there are many more programs than SPADES+ and over 30,000 POINT_IDs are in IPS database. Changing POINT_IDs could be a burden to software engineers. In case of Ovation system database, there is the Alias field to prevent this kind of problem. The Alias is a kind of secondary key in database

  1. IP-Based TV Technologies, Services and Multidisciplinary Applications

    O.M. Bonastre; M.J. Montpetit; P.S. Cesar Garcia (Pablo Santiago)

    2013-01-01

    htmlabstractThe move to Internet Protocol (IP)-based content delivery services has challenged the television industry by allowing high-quality television content to be delivered using the Internet, wired and wireless, private and public. The new convergence paradigm is already playing out its

  2. Photometric studies of δ Scuti stars. I. IP Virginis

    Joner, Michael D.; Hintz, Eric G.; Collier, Matthew W.

    1998-01-01

    We report 15 new times of maximum light for the δ Scuti star IP Virginis (formerly known as SA 106‐1024). An analysis of all times of maximum light indicates that IP Vir has been decreasing in period at a constant rate of − days day−1. Evidence is also presented that IP Vir is a double‐mode variable with a period ratio of . This period ratio predicts a [Fe/H] value of −0.3. From photometric (uvbyβ) observations, we find a foreground reddening of .008 mag and a metallicity of [Fe/H] = +0.05. It is shown that [Fe/H] = −0.3 is most likely the correct value. Intrinsic ‐ and c1‐values, plotted in a model atmosphere grid, indicate a mean effective temperature, K, and a mean surface gravity, . All of these physical parameters support Landolt's initial conclusion that IP Vir is an ordinary δ Sct star.

  3. Sister broods in the spruce bark beetle, Ips typographus (L.)

    Davídková, Markéta; Doležal, Petr

    2017-01-01

    Roč. 405, DEC 01 (2017), s. 13-21 ISSN 0378-1127 Grant - others:Lesy ČR(CZ) 08/2009-2015 Institutional support: RVO:60077344 Keywords : re-emergence * sister broods * Ips typographus Subject RIV: EH - Ecology, Behaviour OBOR OECD: Zoology Impact factor: 3.064, year: 2016 http://www.sciencedirect.com/science/article/pii/S0378112717309507

  4. Design & Implementation of IP-PBX for Small Business Organization

    Mr. Sandeep R. Sonaskar; Dr. M. M. Khanapurkar

    2012-01-01

    Most of the small business organization uses old Electronics Private Branch Exchange (EPBX) System for the telephony communication. This EPBX is now could be replaced by Internet protocol telephony PBX called IP-PBX which uses Intranet as a backbone as each organization has pre installed local area network. The network architecture for the IPPBX system is easy to design

  5. The mites associated with Ips typographus in Sweden

    John C. Moser; Hubertus H. Eidmann; Jan R. Regnander

    1989-01-01

    Twenty-four species of mites were found associated with Ips typographus (Linnaeus) collected from pherommone traps in Sweden, bringing to 38 the total recorded for this scolytid. Because three of the species are parasites, it may be possible to use them in biological control of I. typographus. Couplets from an earlier key to these...

  6. Harmonising and Matching IPR Holders at IP Australia

    T’Mir D. Julius; Gaétan de Rassenfosse

    2014-01-01

    This document describes the methodology developed by the Melbourne Institute to: (i) harmonise holders of intellectual property rights (IPRs) at IP Australia (applications for patent, designs, trademarks and plant breeder’s rights); (ii) match Australian IPRs holders to the Australian business register; (iii) identify the ultimate owners within Australia; and (iv) identify which holders are small and medium size enterprises.

  7. Voice over IP phone calls from your smartphone

    2014-01-01

    All CERN users do have a Lync account (see here) and can use Instant Messaging, presence and other features. In addition, if your number is activated on Lync IP Phone(1) system then you can make standard phone calls from your computer (Windows/Mac).   Recently, we upgraded the infrastructure to Lync 2013. One of the major features is the possibility to make Voice over IP phone calls from a smartphone using your CERN standard phone number (not mobile!). Install Lync 2013 on iPhone/iPad, Android or Windows Phone, connect to WiFi network and make phone calls as if you were in your office. There will be no roaming charges because you will be using WiFi to connect to CERN phone system(2). Register here to the presentation on Tuesday 29 April at 11 a.m. in the Technical Training Center and see the most exciting features of Lync 2013.   Looking forward to seeing you! The Lync team (1) How to register on Lync IP Phone system: http://information-technology.web.cern.ch/book/lync-ip-phone-serv...

  8. Empirical assessment of VoIP overload detection tests

    Żuraniewski, P.; Mandjes, M.; Mellia, M.

    2010-01-01

    The control of communication networks critically relies on procedures capable of detecting unanticipated load changes. In this paper we explore such techniques, in a setting in which each connection consumes roughly the same amount of bandwidth (with VoIP as a leading example). We focus on

  9. Changepoint detection techniques for VoIP traffic

    Mandjes, M.; Zuraniewski, P.W.

    2013-01-01

    The control of communication networks critically relies on procedures capable of detecting unanticipated load changes. In this chapter we present an overview of such techniques, in a setting in which each connection consumes roughly the same amount of bandwidth (with VoIP as a leading example). For

  10. Biobjective VoIP Service Management in Cloud Infrastructure

    Jorge M. Cortés-Mendoza

    2016-01-01

    Full Text Available Voice over Internet Protocol (VoIP allows communication of voice and/or data over the internet in less expensive and reliable manner than traditional ISDN systems. This solution typically allows flexible interconnection between organization and companies on any domains. Cloud VoIP solutions can offer even cheaper and scalable service when virtualized telephone infrastructure is used in the most efficient way. Scheduling and load balancing algorithms are fundamental parts of this approach. Unfortunately, VoIP scheduling techniques do not take into account uncertainty in dynamic and unpredictable cloud environments. In this paper, we formulate the problem of scheduling of VoIP services in distributed cloud environments and propose a new model for biobjective optimization. We consider the special case of the on-line nonclairvoyant dynamic bin-packing problem and discuss solutions for provider cost and quality of service optimization. We propose twenty call allocation strategies and evaluate their performance by comprehensive simulation analysis on real workload considering six months of the MIXvoip company service.

  11. Changepoint Detection Techniques for VoIP Traffic

    Mandjes, M.; Żuraniewski, P.; Biersack, E.; Callegari, C.; Matijasevic, M.

    2013-01-01

    The control of communication networks critically relies on procedures capable of detecting unanticipated load changes. In this chapter we present an overview of such techniques, in a setting in which each connection consumes roughly the same amount of bandwidth (with VoIP as a leading example). For

  12. DEBROS: design and use of a Linux-like RTOS on an inexpensive 8-bit single board computer

    Davis, M.A.

    2012-01-01

    As the power, complexity, and capabilities of embedded processors continue to grow, it is easy to forget just how much can be done with inexpensive Single Board Computers (SBCs) based on 8-bit processors. When the proprietary, non-standard tools from the vendor for one such embedded computer became a major roadblock, I embarked on a project to expand my own knowledge and provide a more flexible, standards based alternative. Inspired by the early work done on operating systems such as UNIX TM , Linux, and Minix, I wrote DEBROS (the Davis Embedded Baby Real-time Operating System), which is a fully preemptive, priority-based OS with soft real-time capabilities that provides a subset of standard Linux/UNIX compatible system calls such as stdio, BSD sockets, pipes, semaphores, etc. The end result was a much more flexible, standards-based development environment which allowed me to simplify my programming model, expand diagnostic capabilities, and reduce the time spent monitoring and applying updates to the hundreds of devices in the lab currently using such inexpensive hardware. (author)

  13. Real-time Linux operating system for plasma control on FTU--implementation advantages and first experimental results

    Vitale, V.; Centioli, C.; Iannone, F.; Mazza, G.; Panella, M.; Pangione, L.; Podda, S.; Zaccarian, L.

    2004-01-01

    In this paper, we report on the experiment carried out at the Frascati Tokamak Upgrade (FTU) on the porting of the plasma control system (PCS) from a LynxOS architecture to an open source Linux real-time architecture. The old LynxOS system was implemented on a VME/PPC604r embedded controller guaranteeing successful plasma position, density and current control. The new RTAI-Linux operating system has shown to easily adapt to the VME hardware via a VME/INTELx86 embedded controller. The advantages of the new solution versus the old one are not limited to the reduced cost of the new architecture (based on the open-source characteristic of the RTAI architecture) but also enhanced by the response time of the real-time system which, also through an optimization of the real-time code, has been reduced from 150 μs (LynxOS) to 70 μs (RTAI). The new real-time operating system is also shown to be suitable for new extended control activities, whose implementation is also possible based on the reduced duty cycle duration, which leaves space for the real-time implementation of nonlinear control laws. We report here on recent experiments related to the optimization of the coupling between additional radiofrequency power and plasma

  14. MEMBANGUN SERVER BERBASIS LINUX PADA JARINGAN LAN DI LABOR SISTEM INFORMASI JURUSAN TEKNOLOGI INFORMASI POLITEKNIK NEGERI PADANG

    Fifi Rasyidah

    2014-03-01

    Full Text Available The System Information Laboratory of Information Technology Department Polytechnic State of Padang has 30 units computer as education facilities to support learning process. All of computers used at same time in a learning section. This case causing trouble to monitoring each students activities. In order to get the solution for the lecturer, the writer then construct a server by using Linux operation system and client by using windows system operation in which Samba File Server is needed. By using this samba, the lecturer will be able to share the data and will be able to use the server as data storage media. Besides that, the writer will also use VNC (Virtual network connection to simplify the process of monitoring and supervising client working system. Based on the result gotten after the writer done some experiment, it can be concluded that Samba File Server can also be used after some configuration is applied on certain files. Moreover, the writer also conclude that VNC can control the entire of the client. The writer suggests that Samba File server which will be used is the latest version one which has more feature than the previous one, it is suggested that the configuration of VNC is applied on Ubuntu Linux since the service is available. Kata Kunci : Samba File Server, VNC, Ubuntu installation

  15. Real-time Linux operating system for plasma control on FTU--implementation advantages and first experimental results

    Vitale, V. E-mail: vitale@frascati.enea.it; Centioli, C.; Iannone, F.; Mazza, G.; Panella, M.; Pangione, L.; Podda, S.; Zaccarian, L

    2004-06-01

    In this paper, we report on the experiment carried out at the Frascati Tokamak Upgrade (FTU) on the porting of the plasma control system (PCS) from a LynxOS architecture to an open source Linux real-time architecture. The old LynxOS system was implemented on a VME/PPC604r embedded controller guaranteeing successful plasma position, density and current control. The new RTAI-Linux operating system has shown to easily adapt to the VME hardware via a VME/INTELx86 embedded controller. The advantages of the new solution versus the old one are not limited to the reduced cost of the new architecture (based on the open-source characteristic of the RTAI architecture) but also enhanced by the response time of the real-time system which, also through an optimization of the real-time code, has been reduced from 150 {mu}s (LynxOS) to 70 {mu}s (RTAI). The new real-time operating system is also shown to be suitable for new extended control activities, whose implementation is also possible based on the reduced duty cycle duration, which leaves space for the real-time implementation of nonlinear control laws. We report here on recent experiments related to the optimization of the coupling between additional radiofrequency power and plasma.

  16. EVTux: Uma Distribuição Linux para a Disciplina de EVT e para as Artes

    José Alberto Rodrigues

    2012-09-01

    Full Text Available O EVTux é uma distribuição de Linux que tem por base o trabalho de investigação que desenvolvemos sobre a integração de ferramentas digitais na disciplina de Educação Visual e Tecnológica. Após dezoito meses de estudo e desenvolvimento do projeto com um grupo de cerca de noventa colaboradores, recensearam-se quatrocentas e trinta ferramentas digitais passíveis de integração em contexto de Educação Visual e Tecnológica. Dessa listagem surgiu a posterior catalogação e categorização das ferramentas, tendo em conta os conteúdos e áreas de exploração da disciplina. O EVTux tem pré-instaladas todas as aplicações para Linux, bem como, integradas no browser, as ferramentas digitais que não necessitam de instalação e abrem diretamente a partir de uma página na internet, para além dos mais de trezentos e cinquenta manuais de apoio à utilização dessas ferramentas. Já disponível, o EVTux constitui-se como um poderoso recurso que agrega todo o trabalho do EVTdigital, sendo uma ferramenta de eleição para os docentes desta disciplina e das Artes utilizarem em contexto de sala de aula.

  17. Recent advances in PC-Linux systems for electronic structure computations by optimized compilers and numerical libraries.

    Yu, Jen-Shiang K; Yu, Chin-Hui

    2002-01-01

    One of the most frequently used packages for electronic structure research, GAUSSIAN 98, is compiled on Linux systems with various hardware configurations, including AMD Athlon (with the "Thunderbird" core), AthlonMP, and AthlonXP (with the "Palomino" core) systems as well as the Intel Pentium 4 (with the "Willamette" core) machines. The default PGI FORTRAN compiler (pgf77) and the Intel FORTRAN compiler (ifc) are respectively employed with different architectural optimization options to compile GAUSSIAN 98 and test the performance improvement. In addition to the BLAS library included in revision A.11 of this package, the Automatically Tuned Linear Algebra Software (ATLAS) library is linked against the binary executables to improve the performance. Various Hartree-Fock, density-functional theories, and the MP2 calculations are done for benchmarking purposes. It is found that the combination of ifc with ATLAS library gives the best performance for GAUSSIAN 98 on all of these PC-Linux computers, including AMD and Intel CPUs. Even on AMD systems, the Intel FORTRAN compiler invariably produces binaries with better performance than pgf77. The enhancement provided by the ATLAS library is more significant for post-Hartree-Fock calculations. The performance on one single CPU is potentially as good as that on an Alpha 21264A workstation or an SGI supercomputer. The floating-point marks by SpecFP2000 have similar trends to the results of GAUSSIAN 98 package.

  18. CtIP Mutations Cause Seckel and Jawad Syndromes.

    Per Qvist

    2011-10-01

    Full Text Available Seckel syndrome is a recessively inherited dwarfism disorder characterized by microcephaly and a unique head profile. Genetically, it constitutes a heterogeneous condition, with several loci mapped (SCKL1-5 but only three disease genes identified: the ATR, CENPJ, and CEP152 genes that control cellular responses to DNA damage. We previously mapped a Seckel syndrome locus to chromosome 18p11.31-q11.2 (SCKL2. Here, we report two mutations in the CtIP (RBBP8 gene within this locus that result in expression of C-terminally truncated forms of CtIP. We propose that these mutations are the molecular cause of the disease observed in the previously described SCKL2 family and in an additional unrelated family diagnosed with a similar form of congenital microcephaly termed Jawad syndrome. While an exonic frameshift mutation was found in the Jawad family, the SCKL2 family carries a splicing mutation that yields a dominant-negative form of CtIP. Further characterization of cell lines derived from the SCKL2 family revealed defective DNA damage induced formation of single-stranded DNA, a critical co-factor for ATR activation. Accordingly, SCKL2 cells present a lowered apoptopic threshold and hypersensitivity to DNA damage. Notably, over-expression of a comparable truncated CtIP variant in non-Seckel cells recapitulates SCKL2 cellular phenotypes in a dose-dependent manner. This work thus identifies CtIP as a disease gene for Seckel and Jawad syndromes and defines a new type of genetic disease mechanism in which a dominant negative mutation yields a recessively inherited disorder.

  19. Scalability of a Low-Cost Multi-Teraflop Linux Cluster for High-End Classical Atomistic and Quantum Mechanical Simulations

    Kikuchi, Hideaki; Kalia, Rajiv K.; Nakano, Aiichiro; Vashishta, Priya; Shimojo, Fuyuki; Saini, Subhash

    2003-01-01

    Scalability of a low-cost, Intel Xeon-based, multi-Teraflop Linux cluster is tested for two high-end scientific applications: Classical atomistic simulation based on the molecular dynamics method and quantum mechanical calculation based on the density functional theory. These scalable parallel applications use space-time multiresolution algorithms and feature computational-space decomposition, wavelet-based adaptive load balancing, and spacefilling-curve-based data compression for scalable I/O. Comparative performance tests are performed on a 1,024-processor Linux cluster and a conventional higher-end parallel supercomputer, 1,184-processor IBM SP4. The results show that the performance of the Linux cluster is comparable to that of the SP4. We also study various effects, such as the sharing of memory and L2 cache among processors, on the performance.

  20. Switching the JLab Accelerator Operations Environment from an HP-UX Unix-based to a PC/Linux-based environment

    Mcguckin, Theodore

    2008-01-01

    The Jefferson Lab Accelerator Controls Environment (ACE) was predominantly based on the HP-UX Unix platform from 1987 through the summer of 2004. During this period the Accelerator Machine Control Center (MCC) underwent a major renovation which included introducing Redhat Enterprise Linux machines, first as specialized process servers and then gradually as general login servers. As computer programs and scripts required to run the accelerator were modified, and inherent problems with the HP-UX platform compounded, more development tools became available for use with Linux and the MCC began to be converted over. In May 2008 the last HP-UX Unix login machine was removed from the MCC, leaving only a few Unix-based remote-login servers still available. This presentation will explore the process of converting an operational Control Room environment from the HP-UX to Linux platform as well as the many hurdles that had to be overcome throughout the transition period