WorldWideScience

Sample records for linux systems justifying

  1. Linux System Administration

    Adelstein, Tom

    2007-01-01

    If you're an experienced system administrator looking to acquire Linux skills, or a seasoned Linux user facing a new challenge, Linux System Administration offers practical knowledge for managing a complete range of Linux systems and servers. The book summarizes the steps you need to build everything from standalone SOHO hubs, web servers, and LAN servers to load-balanced clusters and servers consolidated through virtualization. Along the way, you'll learn about all of the tools you need to set up and maintain these working environments. Linux is now a standard corporate platform with user

  2. Pro Linux System Administration

    Turnbull, James

    2009-01-01

    We can all be Linux experts, provided we invest the time in learning the craft of Linux administration. Pro Linux System Administration makes it easy for small to medium--sized businesses to enter the world of zero--cost software running on Linux and covers all the distros you might want to use, including Red Hat, Ubuntu, Debian, and CentOS. Authors, and systems infrastructure experts James Turnbull, Peter Lieverdink, and Dennis Matotek take a layered, component--based approach to open source business systems, while training system administrators as the builders of business infrastructure. If

  3. Justifying an information system.

    Neal, T

    1993-03-01

    A four-step model for the hospital pharmacist to use in justifying a computerized information system is described. In the first step, costs are identified and analyzed. Both the costs and the advantages of the existing system are evaluated. A request for information and a request for proposal are prepared and sent to vendors, who return estimates of hardware, software, and support costs. Costs can then be merged and analyzed as one-time costs, recurring annual costs, and total costs annualized over five years. In step 2, benefits are identified and analyzed. Tangible economic benefits are those that directly reduce or avoid costs or directly enhance revenues and can be measured in dollars. Intangible economic benefits are realized through a reduction in overhead and reallocation of labor and are less easily measured in dollars. Noneconomic benefits, some involving quality-of-care issues, can also be used in the justification. Step 3 consists of a formal risk assessment in which the project is broken into categories for which specific questions are answered by assigning a risk factor. In step 4, both costs and benefits are subjected to a financial analysis, the object of which is to maximize the return on investment to the institution from the capital being requested. Calculations include return on investment based on the net present value of money, internal rate of return, payback period, and profitability index. A well-designed justification for an information system not only identifies the costs, risks, and benefits but also presents a plan of action for realizing the benefits.

  4. The Linux operating system: An introduction

    Bokhari, Shahid H.

    1995-01-01

    Linux is a Unix-like operating system for Intel 386/486/Pentium based IBM-PCs and compatibles. The kernel of this operating system was written from scratch by Linus Torvalds and, although copyrighted by the author, may be freely distributed. A world-wide group has collaborated in developing Linux on the Internet. Linux can run the powerful set of compilers and programming tools of the Free Software Foundation, and XFree86, a port of the X Window System from MIT. Most capabilities associated with high performance workstations, such as networking, shared file systems, electronic mail, TeX, LaTeX, etc. are freely available for Linux. It can thus transform cheap IBM-PC compatible machines into Unix workstations with considerable capabilities. The author explains how Linux may be obtained, installed and networked. He also describes some interesting applications for Linux that are freely available. The enormous consumer market for IBM-PC compatible machines continually drives down prices of CPU chips, memory, hard disks, CDROMs, etc. Linux can convert such machines into powerful workstations that can be used for teaching, research and software development. For professionals who use Unix based workstations at work, Linux permits virtually identical working environments on their personal home machines. For cost conscious educational institutions Linux can create world-class computing environments from cheap, easily maintained, PC clones. Finally, for university students, it provides an essentially cost-free path away from DOS into the world of Unix and X Windows.

  5. Embedded Linux platform for data acquisition systems

    Patel, Jigneshkumar J.; Reddy, Nagaraj; Kumari, Praveena; Rajpal, Rachana; Pujara, Harshad; Jha, R.; Kalappurakkal, Praveen

    2014-01-01

    Highlights: • The design and the development of data acquisition system on FPGA based reconfigurable hardware platform. • Embedded Linux configuration and compilation for FPGA based systems. • Hardware logic IP core and its Linux device driver development for the external peripheral to interface it with the FPGA based system. - Abstract: This scalable hardware–software system is designed and developed to explore the emerging open standards for data acquisition requirement of Tokamak experiments. To address the future need for a scalable data acquisition and control system for fusion experiments, we have explored the capability of software platform using Open Source Embedded Linux Operating System on a programmable hardware platform such as FPGA. The idea was to identify the platform which can be customizable, flexible and scalable to support the data acquisition system requirements. To do this, we have selected FPGA based reconfigurable and scalable hardware platform to design the system with Embedded Linux based operating system for flexibility in software development and Gigabit Ethernet interface for high speed data transactions. The proposed hardware–software platform using FPGA and Embedded Linux OS offers a single chip solution with processor, peripherals such ADC interface controller, Gigabit Ethernet controller, memory controller amongst other peripherals. The Embedded Linux platform for data acquisition is implemented and tested on a Virtex-5 FXT FPGA ML507 which has PowerPC 440 (PPC440) [2] hard block on FPGA. For this work, we have used the Linux Kernel version 2.6.34 with BSP support for the ML507 platform. It is downloaded from the Xilinx [1] GIT server. Cross-compiler tool chain is created using the Buildroot scripts. The Linux Kernel and Root File System are configured and compiled using the cross-tools to support the hardware platform. The Analog to Digital Converter (ADC) IO module is designed and interfaced with the ML507 through Xilinx

  6. Embedded Linux platform for data acquisition systems

    Patel, Jigneshkumar J., E-mail: jjp@ipr.res.in [Institute for Plasma Research, Gandhinagar, Gujarat (India); Reddy, Nagaraj, E-mail: nagaraj.reddy@coreel.com [Sandeepani School of Embedded System Design, Bangalore, Karnataka (India); Kumari, Praveena, E-mail: praveena@ipr.res.in [Institute for Plasma Research, Gandhinagar, Gujarat (India); Rajpal, Rachana, E-mail: rachana@ipr.res.in [Institute for Plasma Research, Gandhinagar, Gujarat (India); Pujara, Harshad, E-mail: pujara@ipr.res.in [Institute for Plasma Research, Gandhinagar, Gujarat (India); Jha, R., E-mail: rjha@ipr.res.in [Institute for Plasma Research, Gandhinagar, Gujarat (India); Kalappurakkal, Praveen, E-mail: praveen.k@coreel.com [Sandeepani School of Embedded System Design, Bangalore, Karnataka (India)

    2014-05-15

    Highlights: • The design and the development of data acquisition system on FPGA based reconfigurable hardware platform. • Embedded Linux configuration and compilation for FPGA based systems. • Hardware logic IP core and its Linux device driver development for the external peripheral to interface it with the FPGA based system. - Abstract: This scalable hardware–software system is designed and developed to explore the emerging open standards for data acquisition requirement of Tokamak experiments. To address the future need for a scalable data acquisition and control system for fusion experiments, we have explored the capability of software platform using Open Source Embedded Linux Operating System on a programmable hardware platform such as FPGA. The idea was to identify the platform which can be customizable, flexible and scalable to support the data acquisition system requirements. To do this, we have selected FPGA based reconfigurable and scalable hardware platform to design the system with Embedded Linux based operating system for flexibility in software development and Gigabit Ethernet interface for high speed data transactions. The proposed hardware–software platform using FPGA and Embedded Linux OS offers a single chip solution with processor, peripherals such ADC interface controller, Gigabit Ethernet controller, memory controller amongst other peripherals. The Embedded Linux platform for data acquisition is implemented and tested on a Virtex-5 FXT FPGA ML507 which has PowerPC 440 (PPC440) [2] hard block on FPGA. For this work, we have used the Linux Kernel version 2.6.34 with BSP support for the ML507 platform. It is downloaded from the Xilinx [1] GIT server. Cross-compiler tool chain is created using the Buildroot scripts. The Linux Kernel and Root File System are configured and compiled using the cross-tools to support the hardware platform. The Analog to Digital Converter (ADC) IO module is designed and interfaced with the ML507 through Xilinx

  7. Research of Performance Linux Kernel File Systems

    Andrey Vladimirovich Ostroukh

    2015-10-01

    Full Text Available The article describes the most common Linux Kernel File Systems. The research was carried out on a personal computer, the characteristics of which are written in the article. The study was performed on a typical workstation running GNU/Linux with below characteristics. On a personal computer for measuring the file performance, has been installed the necessary software. Based on the results, conclusions and proposed recommendations for use of file systems. Identified and recommended by the best ways to store data.

  8. Python for Unix and Linux system administration

    Gift, Noah

    2007-01-01

    Python is an ideal language for solving problems, especially in Linux and Unix networks. With this pragmatic book, administrators can review various tasks that often occur in the management of these systems, and learn how Python can provide a more efficient and less painful way to handle them. Each chapter in Python for Unix and Linux System Administration presents a particular administrative issue, such as concurrency or data backup, and presents Python solutions through hands-on examples. Once you finish this book, you'll be able to develop your own set of command-line utilities with Pytho

  9. UNIX and Linux system administration handbook

    Nemeth, Evi; Hein, Trent R; Whaley, Ben; Mackin, Dan; Garnett, James; Branca, Fabrizio; Mouat, Adrian

    2018-01-01

    Now fully updated for today’s Linux distributions and cloud environments, it details best practices for every facet of system administration, including storage management, network design and administration, web hosting and scale-out, automation, configuration management, performance analysis, virtualization, DNS, security, management of IT service organizations, and much more. For modern system and network administrators, this edition contains indispensable new coverage of cloud deployments, continuous delivery, Docker and other containerization solutions, and much more.

  10. Linux malware incident response an excerpt from malware forensic field guide for Linux systems

    Malin, Cameron H; Aquilina, James M

    2013-01-01

    Linux Malware Incident Response is a ""first look"" at the Malware Forensics Field Guide for Linux Systems, exhibiting the first steps in investigating Linux-based incidents. The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is a ""toolkit"" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. This compendium of tools for computer forensics analysts and investigators is presented in a succinct outline format with cross-references to suppleme

  11. Cleaning up a GNU/Linux operating system

    Oblak , Denis

    2018-01-01

    The aim of the thesis is to develop an application for cleaning up the Linux operating system that would be able to function on most distributions. The theoretical part discusses the cleaning of the Linux operating system that frees up disk space and allows a better functioning. The cleaning techniques and the existing tools for Linux are systematically reviewed and presented. The following part examines the cleaning of the Windows and MacOS operating systems. The thesis also compares all...

  12. Evolution of Linux operating system network

    Xiao, Guanping; Zheng, Zheng; Wang, Haoqin

    2017-01-01

    Linux operating system (LOS) is a sophisticated man-made system and one of the most ubiquitous operating systems. However, there is little research on the structure and functionality evolution of LOS from the prospective of networks. In this paper, we investigate the evolution of the LOS network. 62 major releases of LOS ranging from versions 1.0 to 4.1 are modeled as directed networks in which functions are denoted by nodes and function calls are denoted by edges. It is found that the size of the LOS network grows almost linearly, while clustering coefficient monotonically decays. The degree distributions are almost the same: the out-degree follows an exponential distribution while both in-degree and undirected degree follow power-law distributions. We further explore the functionality evolution of the LOS network. It is observed that the evolution of functional modules is shown as a sequence of seven events (changes) succeeding each other, including continuing, growth, contraction, birth, splitting, death and merging events. By means of a statistical analysis of these events in the top 4 largest components (i.e., arch, drivers, fs and net), it is shown that continuing, growth and contraction events occupy more than 95% events. Our work exemplifies a better understanding and describing of the dynamics of LOS evolution.

  13. Web application security analysis using the Kali Linux operating system

    BABINCEV IVAN M.; VULETIC DEJAN V.

    2016-01-01

    The Kali Linux operating system is described as well as its purpose and possibilities. There are listed groups of tools that Kali Linux has together with the methods of their functioning, as well as a possibility to install and use tools that are not an integral part of Kali. The final part shows a practical testing of web applications using the tools from the Kali Linux operating system. The paper thus shows a part of the possibilities of this operating system in analaysing web applications ...

  14. A embedded Linux system based on PowerPC

    Ye Mei; Zhao Jingwei; Chu Yuanping

    2006-01-01

    The authors will introduce a Embedded Linux System based on PowerPC as well as the base method on how to establish the system. The goal of the system is to build a test system of VMEbus device. It also can be used to setup the small data acquisition and control system. Two types of compiler are provided by the developer system according to the features of the system and the Power PC. At the top of the article some typical embedded Operation system will be introduced and the features of different system will be provided. And then the method on how to build a embedded Linux system as well as the key technique will be discussed in detail. Finally a successful read-write example will be given based on the test system. (authors)

  15. A camac data acquisition system based on PC-Linux

    Ribas, R.V.

    2002-01-01

    A multi-parametric data acquisition system for Nuclear Physics experiments using camac instrumentation on a personal computer with the Linux operating system in described. The system is very reliable, inexpensive and is capable of handling event rates up to 4-6 k events/s. In the present version, the maximum number of parameters to be acquired is limited only by the number of camac modules that can be fitted in one camac crate

  16. Operational Numerical Weather Prediction systems based on Linux cluster architectures

    Pasqui, M.; Baldi, M.; Gozzini, B.; Maracchi, G.; Giuliani, G.; Montagnani, S.

    2005-01-01

    The progress in weather forecast and atmospheric science has been always closely linked to the improvement of computing technology. In order to have more accurate weather forecasts and climate predictions, more powerful computing resources are needed, in addition to more complex and better-performing numerical models. To overcome such a large computing request, powerful workstations or massive parallel systems have been used. In the last few years, parallel architectures, based on the Linux operating system, have been introduced and became popular, representing real high performance-low cost systems. In this work the Linux cluster experience achieved at the Laboratory far Meteorology and Environmental Analysis (LaMMA-CNR-IBIMET) is described and tips and performances analysed

  17. Construction of a Linux based chemical and biological information system.

    Molnár, László; Vágó, István; Fehér, András

    2003-01-01

    A chemical and biological information system with a Web-based easy-to-use interface and corresponding databases has been developed. The constructed system incorporates all chemical, numerical and textual data related to the chemical compounds, including numerical biological screen results. Users can search the database by traditional textual/numerical and/or substructure or similarity queries through the web interface. To build our chemical database management system, we utilized existing IT components such as ORACLE or Tripos SYBYL for database management and Zope application server for the web interface. We chose Linux as the main platform, however, almost every component can be used under various operating systems.

  18. Linux Essentials

    Smith, Roderick W

    2012-01-01

    A unique, full-color introduction to Linux fundamentals Serving as a low-cost, secure alternative to expensive operating systems, Linux is a UNIX-based, open source operating system. Full-color and concise, this beginner's guide takes a learning-by-doing approach to understanding the essentials of Linux. Each chapter begins by clearly identifying what you will learn in the chapter, followed by a straightforward discussion of concepts that leads you right into hands-on tutorials. Chapters conclude with additional exercises and review questions, allowing you to reinforce and measure your underst

  19. Implementing Journaling in a Linux Shared Disk File System

    Preslan, Kenneth W.; Barry, Andrew; Brassow, Jonathan; Cattelan, Russell; Manthei, Adam; Nygaard, Erling; VanOort, Seth; Teigland, David; Tilstra, Mike; O'Keefe, Matthew; hide

    2000-01-01

    In computer systems today, speed and responsiveness is often determined by network and storage subsystem performance. Faster, more scalable networking interfaces like Fibre Channel and Gigabit Ethernet provide the scaffolding from which higher performance computer systems implementations may be constructed, but new thinking is required about how machines interact with network-enabled storage devices. In this paper we describe how we implemented journaling in the Global File System (GFS), a shared-disk, cluster file system for Linux. Our previous three papers on GFS at the Mass Storage Symposium discussed our first three GFS implementations, their performance, and the lessons learned. Our fourth paper describes, appropriately enough, the evolution of GFS version 3 to version 4, which supports journaling and recovery from client failures. In addition, GFS scalability tests extending to 8 machines accessing 8 4-disk enclosures were conducted: these tests showed good scaling. We describe the GFS cluster infrastructure, which is necessary for proper recovery from machine and disk failures in a collection of machines sharing disks using GFS. Finally, we discuss the suitability of Linux for handling the big data requirements of supercomputing centers.

  20. A PC-Linux-based data acquisition system for the STAR TOFp detector

    Liu Zhixu; Liu Feng; Zhang Bingyun

    2003-01-01

    Commodity hardware running the open source operating system Linux is playing various important roles in the field of high energy physics. This paper describes the PC-Linux-based Data Acquisition System of STAR TOFp detector. It is based on the conventional solutions with front-end electronics made of NIM and CAMAC modules controlled by a PC running Linux. The system had been commissioned into the STAR DAQ system, and worked successfully in the second year of STAR physics runs

  1. EMBEDDED LINUX BASED ALBUM BROWSER SYSTEM AT MUSIC STORES

    Suryadiputra Liawatimena

    2009-01-01

    Full Text Available The goal of this research is the creation of an album browser system at a music store based on embedded Linux. It is expected with this system; it will help the promotion of said music store and make the customers activity at the store simpler and easier. This system uses NFS for networking, database system, ripping software, and GUI development. The research method used are and laboratory experiments to test the system’s hardware using TPC-57 (Touch Panel Computer 5.7" SA2410 ARM-9 Medallion CPU Module and software using QtopiaCore. The result of the research are; 1. The database query process is working properly; 2. The audio data buffering process is working properly. With those experiment results, it can be concluded that the summary of this research is that the system is ready to be implemented and used in the music stores.

  2. Compact PCI/Linux platform in FTU slow control system

    Iannone, F.; Centioli, C.; Panella, M.; Mazza, G.; Vitale, V.; Wang, L.

    2004-01-01

    In large fusion experiments, such as tokamak devices, there is a common trend for slow control systems. Because of complexity of the plants, the so-called 'Standard Model' (SM) in slow control has been adopted on several tokamak machines. This model is based on a three-level hierarchical control: 1) High-Level Control (HLC) with a supervisory function; 2) Medium-Level Control (MLC) to interface and concentrate I/O field equipment; 3) Low-Level Control (LLC) with hard real-time I/O function, often managed by PLCs. FTU (Frascati Tokamak Upgrade) control system designed with SM concepts has underwent several stages of developments in its fifteen years duration of runs. The latest evolution was inevitable, due to the obsolescence of the MLC CPUs, based on VME-MOTOROLA 68030 with OS9 operating system. A large amount of C code was developed for that platform to route the data flow from LLC, which is constituted by 24 Westinghouse Numalogic PC-700 PLCs with about 8000 field-points, to HLC, based on a commercial Object-Oriented Real-Time database on Alpha/CompaqTru64 platform. Therefore, authors have to look for cost-effective solutions and finally a CompactPCI-Intel x86 platform with Linux operating system was chosen. A software porting has been done, taking into account the differences between OS9 and Linux operating system in terms of Inter/Network Processes Communications and I/O multi-ports serial driver. This paper describes the hardware/software architecture of the new MLC system, emphasizing the reliability and the low costs of the open source solutions. Moreover, a huge amount of software packages available in open source environment will assure a less painful maintenance, and will open the way to further improvements of the system itself. (authors)

  3. SOFTICE: Facilitating both Adoption of Linux Undergraduate Operating Systems Laboratories and Students' Immersion in Kernel Code

    Alessio Gaspar

    2007-06-01

    Full Text Available This paper discusses how Linux clustering and virtual machine technologies can improve undergraduate students' hands-on experience in operating systems laboratories. Like similar projects, SOFTICE relies on User Mode Linux (UML to provide students with privileged access to a Linux system without creating security breaches on the hosting network. We extend such approaches in two aspects. First, we propose to facilitate adoption of Linux-based laboratories by using a load-balancing cluster made of recycled classroom PCs to remotely serve access to virtual machines. Secondly, we propose a new approach for students to interact with the kernel code.

  4. Application of instrument platform based embedded Linux system on intelligent scaler

    Wang Jikun; Yang Run'an; Xia Minjian; Yang Zhijun; Li Lianfang; Yang Binhua

    2011-01-01

    It designs a instrument platform based on embedded Linux system and peripheral circuit, by designing Linux device driver and application program based on QT Embedded, various functions of the intelligent scaler are realized. The system architecture is very reasonable, so the stability and the expansibility and the integration level are increased, the development cycle is shorten greatly. (authors)

  5. Hard Real-Time Performances in Multiprocessor-Embedded Systems Using ASMP-Linux

    Daniel Pierre Bovet

    2008-01-01

    Full Text Available Multiprocessor systems, especially those based on multicore or multithreaded processors, and new operating system architectures can satisfy the ever increasing computational requirements of embedded systems. ASMP-LINUX is a modified, high responsiveness, open-source hard real-time operating system for multiprocessor systems capable of providing high real-time performance while maintaining the code simple and not impacting on the performances of the rest of the system. Moreover, ASMP-LINUX does not require code changing or application recompiling/relinking. In order to assess the performances of ASMP-LINUX, benchmarks have been performed on several hardware platforms and configurations.

  6. Hard Real-Time Performances in Multiprocessor-Embedded Systems Using ASMP-Linux

    Betti Emiliano

    2008-01-01

    Full Text Available Abstract Multiprocessor systems, especially those based on multicore or multithreaded processors, and new operating system architectures can satisfy the ever increasing computational requirements of embedded systems. ASMP-LINUX is a modified, high responsiveness, open-source hard real-time operating system for multiprocessor systems capable of providing high real-time performance while maintaining the code simple and not impacting on the performances of the rest of the system. Moreover, ASMP-LINUX does not require code changing or application recompiling/relinking. In order to assess the performances of ASMP-LINUX, benchmarks have been performed on several hardware platforms and configurations.

  7. Running Linux

    Dalheimer, Matthias Kalle

    2006-01-01

    The fifth edition of Running Linux is greatly expanded, reflecting the maturity of the operating system and the teeming wealth of software available for it. Hot consumer topics such as audio and video playback applications, groupware functionality, and spam filtering are covered, along with the basics in configuration and management that always made the book popular.

  8. Supporting the Secure Halting of User Sessions and Processes in the Linux Operating System

    Brock, Jerome

    2001-01-01

    .... Only when a session must be reactivated are its processes returned to a runnable state. This thesis presents an approach for adding this "secure halting" functionality to the Linux operating system...

  9. Parallel Processing Performance Evaluation of Mixed T10/T100 Ethernet Topologies on Linux Pentium Systems

    Decato, Steven

    1997-01-01

    ... performed on relatively inexpensive off the shelf components. Alternative network topologies were implemented using 10 and 100 megabit-per-second Ethernet cards under the Linux operating system on Pentium based personal computer platforms...

  10. Linux Desktop Pocket Guide

    Brickner, David

    2005-01-01

    While Mac OS X garners all the praise from pundits, and Windows XP attracts all the viruses, Linux is quietly being installed on millions of desktops every year. For programmers and system administrators, business users, and educators, desktop Linux is a breath of fresh air and a needed alternative to other operating systems. The Linux Desktop Pocket Guide is your introduction to using Linux on five of the most popular distributions: Fedora, Gentoo, Mandriva, SUSE, and Ubuntu. Despite what you may have heard, using Linux is not all that hard. Firefox and Konqueror can handle all your web bro

  11. Research on applications of ARM-LINUX embedded systems in manufacturing the nuclear equipment

    Nguyen Van Sy; Phan Luong Tuan; Nguyen Xuan Vinh; Dang Quang Bao

    2016-01-01

    A new microprocessor system that is ARM processor with open source Linux operating system is studied with the objective to apply ARM-Linux embedded systems in manufacturing the nuclear equipment. We use the development board of the company to learn and to build the workflow for an embedded system, then basing on the knowledge we design a motherboard embedded systems interface with the peripherals is buttons, LEDs through GPIO interface and connected with GM counting system via RS232 interface. The results of this study are: i) The procedures for working with embedded systems: process customization, installation embedded operating system and installation process, configure the development tools on the host computer; ii) ARM-Linux motherboard embedded systems interface with the peripherals and GM counting system, indicating the counts from GM counting system on the touch screen. (author)

  12. Beginning Ubuntu Linux

    Raggi, Emilio; Channelle, Andy; Parsons, Trevor; Van Vugt, Sander

    2010-01-01

    Ubuntu Linux is the fastest growing Linux-based operating system, and Beginning Ubuntu Linux, Fifth Edition teaches all of us - including those who have never used Linux - how to use it productively, whether you come from Windows or the Mac or the world of open source. Beginning Ubuntu Linux, Fifth Edition shows you how to take advantage of the newest Ubuntu release, Lucid Lynx. Based on the best-selling previous edition, Emilio Raggi maintains a fine balance between teaching Ubuntu and introducing new features. Whether you aim to use it in the home or in the office, you'll be introduced to th

  13. Web application for monitoring mainframe computer, Linux operating systems and application servers

    Dimnik, Tomaž

    2016-01-01

    This work presents the idea and the realization of web application for monitoring the operation of the mainframe computer, servers with Linux operating system and application servers. Web application is intended for administrators of these systems, as an aid to better understand the current state, load and operation of the individual components of the server systems.

  14. Design of software platform based on linux operating system for γ-spectrometry instrument

    Hong Tianqi; Zhou Chen; Zhang Yongjin

    2008-01-01

    This paper described the design of γ-spectrometry instrument software platform based on s3c2410a processor with arm920t core, emphases are focused on analyzing the integrated application of embedded linux operating system, yaffs file system and qt/embedded GUI development library. It presented a new software platform in portable instrument for γ measurement. (authors)

  15. Linux bible

    Negus, Christopher

    2015-01-01

    The industry favorite Linux guide, updated for Red Hat Enterprise Linux 7 and the cloud Linux Bible, 9th Edition is the ultimate hands-on Linux user guide, whether you're a true beginner or a more advanced user navigating recent changes. This updated ninth edition covers the latest versions of Red Hat Enterprise Linux 7 (RHEL 7), Fedora 21, and Ubuntu 14.04 LTS, and includes new information on cloud computing and development with guidance on Openstack and Cloudforms. With a focus on RHEL 7, this practical guide gets you up to speed quickly on the new enhancements for enterprise-quality file s

  16. Ubuntu Linux toolbox

    Negus, Christopher

    2012-01-01

    This bestseller from Linux guru Chris Negus is packed with an array of new and revised material As a longstanding bestseller, Ubuntu Linux Toolbox has taught you how to get the most out Ubuntu, the world?s most popular Linux distribution. With this eagerly anticipated new edition, Christopher Negus returns with a host of new and expanded coverage on tools for managing file systems, ways to connect to networks, techniques for securing Ubuntu systems, and a look at the latest Long Term Support (LTS) release of Ubuntu, all aimed at getting you up and running with Ubuntu Linux quickly.

  17. The Free Software Movement and the GNU/Linux Operating System

    CERN. Geneva

    2003-01-01

    Richard Stallman will speak about the purpose, goals, philosophy, methods, status, and future prospects of the GNU operating system, which in combination with the kernel Linux is now used by an estimated 17 to 20 million users world wide.BiographyRichard Stallman is the founder of the Gnu Project, launched in 1984 to develop the free operating system GNU (an acronym for ''GNU's Not Unix''), and thereby give computer users the freedom that most of them have lost. GNU is free software: everyone is free to copy it and redistribute it, as well as to make changes either large or small. Today, Linux-based variants of the GNU system, based on the kernel Linux developed by Linus Torvalds, are in widespread use. There are estimated to be some 20 million users of GNU/Linux systems today. Richard Stallman is the principal author of the GNU Compiler Collection, a portable optimizing compiler which was designed to support diverse architectures and multiple languages. The compiler now supports over 30 different architect...

  18. Development of Automatic Live Linux Rebuilding System with Flexibility in Science and Engineering Education and Applying to Information Processing Education

    Sonoda, Jun; Yamaki, Kota

    We develop an automatic Live Linux rebuilding system for science and engineering education, such as information processing education, numerical analysis and so on. Our system is enable to easily and automatically rebuild a customized Live Linux from a ISO image of Ubuntu, which is one of the Linux distribution. Also, it is easily possible to install/uninstall packages and to enable/disable init daemons. When we rebuild a Live Linux CD using our system, we show number of the operations is 8, and the rebuilding time is about 33 minutes on CD version and about 50 minutes on DVD version. Moreover, we have applied the rebuilded Live Linux CD in a class of information processing education in our college. As the results of a questionnaires survey from our 43 students who used the Live Linux CD, we obtain that the our Live Linux is useful for about 80 percents of students. From these results, we conclude that our system is able to easily and automatically rebuild a useful Live Linux in short time.

  19. Diskless Linux Cluster How-To

    Shumaker, Justin L

    2005-01-01

    Diskless linux clustering is not yet a turn-key solution. The process of configuring a cluster of diskless linux machines requires many modifications to the stock linux operating system before they can boot cleanly...

  20. High-speed data acquisition with the Solaris and Linux operating systems

    Zilker, M.; Heimann, P.

    2000-01-01

    In this paper, we discuss whether Solaris and Linux are suitable for data acquisition systems in soft real time conditions. As an example we consider a plasma diagnostic (Mirnov coils), which collects data for a complete plasma discharge of about 10 s from up to 72 channels. Each ADC-Channel generates a data stream of 4 MB/s. To receive these data streams an eight-channel Hotlink PCI interface board was designed. With a prototype system using Solaris and the driver developed by us we investigate important properties of the operating system such as the I/O performance and scheduling of processes. We compare the Solaris operating system on the Ultra Sparc platform with Linux on the Intel platform. Finally, some points of user program development are mentioned to show how the application can make the most efficient use of the underlying high-speed I/O system

  1. Development of a portable Linux-based ECG measurement and monitoring system.

    Tan, Tan-Hsu; Chang, Ching-Su; Huang, Yung-Fa; Chen, Yung-Fu; Lee, Cheng

    2011-08-01

    This work presents a portable Linux-based electrocardiogram (ECG) signals measurement and monitoring system. The proposed system consists of an ECG front end and an embedded Linux platform (ELP). The ECG front end digitizes 12-lead ECG signals acquired from electrodes and then delivers them to the ELP via a universal serial bus (USB) interface for storage, signal processing, and graphic display. The proposed system can be installed anywhere (e.g., offices, homes, healthcare centers and ambulances) to allow people to self-monitor their health conditions at any time. The proposed system also enables remote diagnosis via Internet. Additionally, the system has a 7-in. interactive TFT-LCD touch screen that enables users to execute various functions, such as scaling a single-lead or multiple-lead ECG waveforms. The effectiveness of the proposed system was verified by using a commercial 12-lead ECG signal simulator and in vivo experiments. In addition to its portability, the proposed system is license-free as Linux, an open-source code, is utilized during software development. The cost-effectiveness of the system significantly enhances its practical application for personal healthcare.

  2. A real-time data transmission method based on Linux for physical experimental readout systems

    Cao Ping; Song Kezhu; Yang Junfeng

    2012-01-01

    In a typical physical experimental instrument, such as a fusion or particle physical application, the readout system generally implements an interface between the data acquisition (DAQ) system and the front-end electronics (FEE). The key task of a readout system is to read, pack, and forward the data from the FEE to the back-end data concentration center in real time. To guarantee real-time performance, the VxWorks operating system (OS) is widely used in readout systems. However, VxWorks is not an open-source OS, which gives it has many disadvantages. With the development of multi-core processor and new scheduling algorithm, Linux OS exhibits performance in real-time applications similar to that of VxWorks. It has been successfully used even for some hard real-time systems. Discussions and evaluations of real-time Linux solutions for a possible replacement of VxWorks arise naturally. In this paper, a real-time transmission method based on Linux is introduced. To reduce the number of transfer cycles for large amounts of data, a large block of contiguous memory buffer for DMA transfer is allocated by modifying the Linux Kernel (version 2.6) source code slightly. To increase the throughput for network transmission, the user software is designed into formation of parallelism. To achieve high performance in real-time data transfer from hardware to software, mapping techniques must be used to avoid unnecessary data copying. A simplified readout system is implemented with 4 readout modules in a PXI crate. This system can support up to 48 MB/s data throughput from the front-end hardware to the back-end concentration center through a Gigabit Ethernet connection. There are no restrictions on the use of this method, hardware or software, which means that it can be easily migrated to other interrupt related applications.

  3. Low Cost Multisensor Kinematic Positioning and Navigation System with Linux/RTAI

    Baoxin Hu

    2012-09-01

    Full Text Available Despite its popularity, the development of an embedded real-time multisensor kinematic positioning and navigation system discourages many researchers and developers due to its complicated hardware environment setup and time consuming device driver development. To address these issues, this paper proposed a multisensor kinematic positioning and navigation system built on Linux with Real Time Application Interface (RTAI, which can be constructed in a fast and economical manner upon popular hardware platforms. The authors designed, developed, evaluated and validated the application of Linux/RTAI in the proposed system for the integration of the low cost MEMS IMU and OEM GPS sensors. The developed system with Linux/RTAI as the core of a direct geo-referencing system provides not only an excellent hard real-time performance but also the conveniences for sensor hardware integration and real-time software development. A software framework is proposed in this paper for a universal kinematic positioning and navigation system with loosely-coupled integration architecture. In addition, general strategies of sensor time synchronization in a multisensor system are also discussed. The success of the loosely-coupled GPS-aided inertial navigation Kalman filter is represented via post-processed solutions from road tests.

  4. The Linux based distributed data acquisition system for the ISTRA+ experiment

    Filin, A.; Inyakin, A.; Novikov, V.; Obraztsov, V.; Smirnov, N.; Vlassov, E.; Yuschenko, O.

    2001-01-01

    The DAQ hardware of the ISTRA+ experiment consists of the VME system crate that contains two PCI-VME bridges interfacing two PCs with VME, external interrupts receiver, the readout controller for dedicated front-end electronics, the readout controller buffer memory module, the VME-CAMAC interface, and additional control modules. The DAQ computing consist of 6 PCs running the Linux operating system and linked into LAN. The first PC serves the external interrupts and acquires the data from front-end electronic. The second one is the slow control computer. The remaining PCs host the monitoring and data analysis software. The Linux based DAQ software provides the external interrupts processing, the data acquisition, recording, and distribution between monitoring and data analysis tasks running at DAQ PCs. The monitoring programs are based on two packages for data visualization: home-written one and the ROOT system. MySQL is used as a DAQ database

  5. Embedded Linux in het onderwijs

    Dr Ruud Ermers

    2008-01-01

    Embedded Linux wordt bij steeds meer grote bedrijven ingevoerd als embedded operating system. Binnen de opleiding Technische Informatica van Fontys Hogeschool ICT is Embedded Linux geïntroduceerd in samenwerking met het lectoraat Architectuur van Embedded Systemen. Embedded Linux is als vakgebied

  6. Disk cloning program 'Dolly+' for system management of PC Linux cluster

    Atsushi Manabe

    2001-01-01

    The Dolly+ is a Linux application program to clone files and disk partition image from a PC to many others. By using several techniques such as logical ring connection, multi threading and pipelining, it could achieve high performance and scalability. For example, in typical condition, installations to a hundred PCs takes almost equivalent time for two PCs. Together with the Intel PXE and the RedHat kickstart, automatic and very fast system installation and upgrading could be performed

  7. The Case for A Hierarchal System Model for Linux Clusters

    Seager, M; Gorda, B

    2009-06-05

    The computer industry today is no longer driven, as it was in the 40s, 50s and 60s, by High-performance computing requirements. Rather, HPC systems, especially Leadership class systems, sit on top of a pyramid investment mode. Figure 1 shows a representative pyramid investment model for systems hardware. At the base of the pyramid is the huge investment (order 10s of Billions of US Dollars per year) in semiconductor fabrication and process technologies. These costs, which are approximately doubling with every generation, are funded from investments multiple markets: enterprise, desktops, games, embedded and specialized devices. Over and above these base technology investments are investments for critical technology elements such as microprocessor, chipsets and memory ASIC components. Investments for these components are spread across the same markets as the base semiconductor processes investments. These second tier investments are approximately half the size of the lower level of the pyramid. The next technology investment layer up, tier 3, is more focused on scalable computing systems such as those needed for HPC and other markets. These tier 3 technology elements include networking (SAN, WAN and LAN), interconnects and large scalable SMP designs. Above these is tier 4 are relatively small investments necessary to build very large, scalable systems high-end or Leadership class systems. Primary among these are the specialized network designs of vertically integrated systems, etc.

  8. Membangun Sistem Linux Mandrake Minimal Menggunakan Inisial Disk Ram

    Wagito, Wagito

    2006-01-01

    Minimal Linux system is commonly used for special systems like router, gateway, Linux installer and diskless Linux system. Minimal Linux system is a Linux system that use a few facilities of all Linux capabilities. Mandrake Linux, as one of Linux distribution is able to perform minimal Linux system. RAM is a computer resource that especially used as main memory. A part of RAM's function can be changed into disk called RAM disk. This RAM disk can be used to run the Linux system. This ...

  9. MEMBANGUN SISTEM LINUX MANDRAKE MINIMAL MENGGUNAKAN INISIAL DISK RAM

    Wagito, Wagito

    2009-01-01

            Minimal Linux system is commonly used for special systems like router, gateway, Linux installer and diskless Linux system. Minimal Linux system is a Linux system that use a few facilities of all Linux capabilities. Mandrake Linux, as one of Linux distribution is able to perform minimal Linux system.         RAM is a computer resource that especially used as main memory. A  part of RAM’s function can be changed into disk called RAM disk. This RAM disk can be used to run the Linux syste...

  10. [Design of an embedded stroke rehabilitation apparatus system based on Linux computer engineering].

    Zhuang, Pengfei; Tian, XueLong; Zhu, Lin

    2014-04-01

    A realizaton project of electrical stimulator aimed at motor dysfunction of stroke is proposed in this paper. Based on neurophysiological biofeedback, this system, using an ARM9 S3C2440 as the core processor, integrates collection and display of surface electromyography (sEMG) signal, as well as neuromuscular electrical stimulation (NMES) into one system. By embedding Linux system, the project is able to use Qt/Embedded as a graphical interface design tool to accomplish the design of stroke rehabilitation apparatus. Experiments showed that this system worked well.

  11. Remote Boot of a Diskless Linux Client for Operating System Integrity

    Allen, Bruce

    2002-01-01

    .... The diskless Linux client is organized to provide read-write files over NFS at home, read-only files over NFS for accessing bulky immutable utilities, and sone volatile RAM disk files to allow the Linux Kernel to boot...

  12. The visual and remote analyzing software for a Linux-based radiation information acquisition system

    Fan Zhaoyang; Zhang Li; Chen Zhiqiang

    2003-01-01

    A visual and remote analyzing software for the radiation information, which has the merit of universality and credibility, is developed based on the Linux operating system and the TCP/IP network protocol. The software is applied to visually debug and real time monitor of the high-speed radiation information acquisition system, and a safe, direct and timely control can assured. The paper expatiates the designing thought of the software, which provides the reference for other software with the same purpose for the similar systems

  13. AliEnFS - a Linux File System for the AliEn Grid Services

    Peters, Andreas J.; Saiz, P.; Buncic, P.

    2003-01-01

    Among the services offered by the AliEn (ALICE Environment http://alien.cern.ch) Grid framework there is a virtual file catalogue to allow transparent access to distributed data-sets using various file transfer protocols. $alienfs$ (AliEn File System) integrates the AliEn file catalogue as a new file system type into the Linux kernel using LUFS, a hybrid user space file system framework (Open Source http://lufs.sourceforge.net). LUFS uses a special kernel interface level called VFS (Virtual F...

  14. Pro Linux system administration learn to build systems for your business using free and open source software

    Matotek, Dennis; Lieverdink, Peter

    2017-01-01

    This book aims to ease the entry of businesses to the world of zero-cost software running on Linux. It takes a layered, component-based approach to open source business systems, while training system administrators as the builders of business infrastructure.

  15. CompactPCI/Linux platform for medium level control system on FTU

    Wang, L.; Centioli, C.; Iannone, F.; Panella, M.; Mazza, G.; Vitale, V.

    2004-01-01

    In large fusion experiments, such as tokamak devices, there are common trends for slow control systems. Because of complexity of the plants, several tokamaks adopt the so-called 'standard model' (SM) based on a three levels hierarchical control: (i) high level control (HLC) - the supervisor; (ii) medium level control (MLC) - I/O field equipments interface and concentration units and (iii) low level control (LLC) - the programmable logic controllers (PLC). FTU control system was designed with SM concepts and, in its 15 years life cycle, it underwent several developments. The latest evolution was mandatory, due to the obsolescence of the MLC CPUs, based on VME/Motorola 68030 with OS9 operating system. Therefore, we had to look for cost-effective solutions and we chose a CompactPCI-Intel x86 platform with Linux operating system. A software porting has been done taking into account the differences between OS9 and Linux operating system in terms of inter/network processes communications and I/O multi-ports serial driver. This paper describes the hardware/software architecture of the new MLC system emphasising the reliability and the low costs of the open source solutions. Moreover, the huge amount of software packages available in open source environment will assure a less painful maintenance, and will open the way to further improvements of the system itself

  16. Development and application of remote video monitoring system for combine harvester based on embedded Linux

    Chen, Jin; Wang, Yifan; Wang, Xuelei; Wang, Yuehong; Hu, Rui

    2017-01-01

    Combine harvester usually works in sparsely populated areas with harsh environment. In order to achieve the remote real-time video monitoring of the working state of combine harvester. A remote video monitoring system based on ARM11 and embedded Linux is developed. The system uses USB camera for capturing working state video data of the main parts of combine harvester, including the granary, threshing drum, cab and cut table. Using JPEG image compression standard to compress video data then transferring monitoring screen to remote monitoring center over the network for long-range monitoring and management. At the beginning of this paper it describes the necessity of the design of the system. Then it introduces realization methods of hardware and software briefly. And then it describes detailedly the configuration and compilation of embedded Linux operating system and the compiling and transplanting of video server program are elaborated. At the end of the paper, we carried out equipment installation and commissioning on combine harvester and then tested the system and showed the test results. In the experiment testing, the remote video monitoring system for combine harvester can achieve 30fps with the resolution of 800x600, and the response delay in the public network is about 40ms.

  17. Real-time head movement system and embedded Linux implementation for the control of power wheelchairs.

    Nguyen, H T; King, L M; Knight, G

    2004-01-01

    Mobility has become very important for our quality of life. A loss of mobility due to an injury is usually accompanied by a loss of self-confidence. For many individuals, independent mobility is an important aspect of self-esteem. Head movement is a natural form of pointing and can be used to directly replace the joystick whilst still allowing for similar control. Through the use of embedded LINUX and artificial intelligence, a hands-free head movement wheelchair controller has been designed and implemented successfully. This system provides for severely disabled users an effective power wheelchair control method with improved posture, ease of use and attractiveness.

  18. System-justifying ideologies and academic outcomes among first-year Latino college students.

    O'Brien, Laurie T; Mars, Dustin E; Eccleston, Collette

    2011-10-01

    The present study examines the relationship between system-justifying ideologies and academic outcomes among 78 first-year Latino college students (21 men, 57 women, mean age = 18.1 years) attending a moderately selective West Coast university. Endorsement of system-justifying ideologies was negatively associated with grade point average (GPA); however it was positively associated with feelings of belonging at the university. In addition, system-justifying ideologies were negatively associated with perceptions of personal discrimination. In contrast, ethnic identity centrality was unrelated to GPA, feelings of belonging, and perceptions of personal discrimination once the relationship between system-justifying ideologies and these outcomes was statistically taken into account. The results of the present study suggest that endorsement of system-justifying ideologies may be a double-edged sword for Latino college students, involving trade-offs between academic success and feelings of belonging.

  19. Use of Low-Cost Acquisition Systems with an Embedded Linux Device for Volcanic Monitoring.

    Moure, David; Torres, Pedro; Casas, Benito; Toma, Daniel; Blanco, María José; Del Río, Joaquín; Manuel, Antoni

    2015-08-19

    This paper describes the development of a low-cost multiparameter acquisition system for volcanic monitoring that is applicable to gravimetry and geodesy, as well as to the visual monitoring of volcanic activity. The acquisition system was developed using a System on a Chip (SoC) Broadcom BCM2835 Linux operating system (based on DebianTM) that allows for the construction of a complete monitoring system offering multiple possibilities for storage, data-processing, configuration, and the real-time monitoring of volcanic activity. This multiparametric acquisition system was developed with a software environment, as well as with different hardware modules designed for each parameter to be monitored. The device presented here has been used and validated under different scenarios for monitoring ocean tides, ground deformation, and gravity, as well as for monitoring with images the island of Tenerife and ground deformation on the island of El Hierro.

  20. Unsteady, Cooled Turbine Simulation Using a PC-Linux Analysis System

    List, Michael G.; Turner, Mark G.; Chen, Jen-Pimg; Remotigue, Michael G.; Veres, Joseph P.

    2004-01-01

    The fist stage of the high-pressure turbine (HPT) of the GE90 engine was simulated with a three-dimensional unsteady Navier-Sokes solver, MSU Turbo, which uses source terms to simulate the cooling flows. In addition to the solver, its pre-processor, GUMBO, and a post-processing and visualization tool, Turbomachinery Visual3 (TV3) were run in a Linux environment to carry out the simulation and analysis. The solver was run both with and without cooling. The introduction of cooling flow on the blade surfaces, case, and hub and its effects on both rotor-vane interaction as well the effects on the blades themselves were the principle motivations for this study. The studies of the cooling flow show the large amount of unsteadiness in the turbine and the corresponding hot streak migration phenomenon. This research on the GE90 turbomachinery has also led to a procedure for running unsteady, cooled turbine analysis on commodity PC's running the Linux operating system.

  1. Program to justify life extension of older nuclear piping systems

    Burr, T.K.; Dwight, J.E. Jr.; Morton, D.K.

    1991-01-01

    The Idaho National Engineering Laboratory (INEL) has a history of more than 40 years devoted to the operation of nuclear reactors designed for research and experiments. The Advanced Test Reactor (ATR) is one such operating reactor whose mission requires continued operation for an additional 25 years or more. Since the ATR is approaching its design life of twenty years, life extension evaluations have been initiated. Of particular importance are the associated high temperature, high pressure loop piping system supporting in--reactor experiments. Failure of this piping could challenge core safety margins. Since regulatory rules for nuclear power plant life extension are only in the formulation stage, the current technical guidance on this subject provided by the Department of Energy (DOE) or the commercial nuclear industry is incomplete. In the interim, order to assure continued safe operation of this piping beyond its initial design life, a program has been developed to provide the necessary technical justification for life extension. This paper describes a program that establishes Section 11 of the ASME Boiler and Pressure Vessel Code as the governing criteria document, retains B31.1 as the Code of record for Section 11 activities, specifies additional inservice inspection requirements more strict than Section 11, and relies heavily on flaw detection and fracture mechanics evaluations. 18 refs., 2 figs

  2. Linux all-in-one for dummies

    Dulaney, Emmett

    2014-01-01

    Eight minibooks in one volume cover every important aspect of Linux and everything you need to know to pass level-1 certification Linux All-in-One For Dummies explains everything you need to get up and running with the popular Linux operating system. Written in the friendly and accessible For Dummies style, the book ideal for new and intermediate Linux users, as well as anyone studying for level-1 Linux certification. The eight minibooks inside cover the basics of Linux, interacting with it, networking issues, Internet services, administration, security, scripting, and level-1 certification. C

  3. Kali Linux CTF blueprints

    Buchanan, Cameron

    2014-01-01

    Taking a highly practical approach and a playful tone, Kali Linux CTF Blueprints provides step-by-step guides to setting up vulnerabilities, in-depth guidance to exploiting them, and a variety of advice and ideas to build and customising your own challenges. If you are a penetration testing team leader or individual who wishes to challenge yourself or your friends in the creation of penetration testing assault courses, this is the book for you. The book assumes a basic level of penetration skills and familiarity with the Kali Linux operating system.

  4. Linux Security Cookbook

    Barrett, Daniel J; Byrnes, Robert G

    2003-01-01

    Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject each time you pick up a book. Sometimes you want to get straight to the point. That's exactly what the new Linux Security Cookbook does. Rather than provide a total security solution for Linux computers, the authors present a series of easy-to-fol

  5. PCI-VME bridge device driver design of a high-performance data acquisition and control system on LINUX

    Sun Yan; Ye Mei; Zhang Nan; Zhao Jingwei

    2000-01-01

    Data Acquisition and Control is an important part of Nuclear Electronic and Nuclear Detection application in HEP. The key methods are introduced for designing LINUX Device Driver of PCI-VME Bridge Device based on the realized Data Acquisition and Control System

  6. PCI-VME bridge device driver design of a high-performance data acquisition and control system on LINUX

    Sun Yan; Ye Mei; Zhang Nan; Zhao Jingwei

    2001-01-01

    Data acquisition and control is an important part of nuclear electronic and nuclear detection application in HEP. The key method has been introduced for designing LINUX device driver of PCI-VME bridge device based on realized by authors' data acquisition and control system

  7. The renewed HT-7 plasma control system based on real-time Linux cluster

    Yuan, Q.P., E-mail: qpyuan@ipp.ac.cn [Institute of Plasma Physics, Chinese Academy of Sciences, Hefei (China); Xiao, B.J.; Zhang, R.R. [Institute of Plasma Physics, Chinese Academy of Sciences, Hefei (China); Walker, M.L.; Penaflor, B.G.; Piglowski, D.A.; Johnson, R.D. [General Atomics, DIII-D National Fusion Facility, San Diego, CA (United States)

    2012-12-15

    Highlights: Black-Right-Pointing-Pointer The hardware and software structure of the new HT-7 plasma control system (HT-7 PCS) is reported. Black-Right-Pointing-Pointer All original systems were integrated in the new HT-7 PCS. And the implementation details of the control algorithms are given in the paper. Black-Right-Pointing-Pointer Different from EAST PCS, the AC operation mode is realized in HT-7 PCS. Black-Right-Pointing-Pointer The experiment results are discussed. Good control performance has been obtained. - Abstract: In order to improve the synchronization, flexibility and expansibility of the plasma control on HT-7, a new plasma control system (HT-7 PCS) was constructed. The HT-7 PCS was based on a real-time Linux cluster with a well-defined, robust and flexible software infrastructure which was adapted from DIII-D PCS. In this paper, the hardware structure and system customization details for HT-7 PCS are reported. The plasma position and current control, plasma density control and off-normal event detection, which were realized in separated systems originally, have been integrated and implemented in such HT-7 PCS. All these control algorithms have been successfully validated in the last several HT-7 experiment campaigns. Good control performance has been achieved and the experiment results are discussed in the paper.

  8. A self contained Linux based data acquisition system for 2D detectors with delay line readout

    Beltran, D.; Toledo, J.; Klora, A.C.; Ramos-Lerate, I.; Martinez, J.C.

    2007-01-01

    This article describes a fast and self-contained data acquisition system for 2D gas-filled detectors with delay line readout. It allows the realization of time resolved experiments in the millisecond scale. The acquisition system comprises of an industrial PC running Linux, a commercial time-to-digital converter and an in-house developed histogramming PCI card. The PC provides a mass storage for images and a graphical user interface for system monitoring and control. The histogramming card builds images with a maximum count rate of 5 MHz limited by the time-to-digital converter. Histograms are transferred to the PC at 85 MB/s. This card also includes a time frame generator, a calibration channel unit and eight digital outputs for experiment control. The control software was developed for easy integration into a beamline, including scans. The system is fully operational at the Spanish beamline BM16 at the ESRF in France, the neutron beamlines Adam and Eva at the ILL in France, the Max Plank Institute in Stuttgart in Germany, the University of Copenhagen in Denmark and at the future ALBA synchrotron in Spain. Some representative collected images from synchrotron and neutron beamlines are presented

  9. Super computer made with Linux cluster

    Lee, Jeong Hun; Oh, Yeong Eun; Kim, Jeong Seok

    2002-01-01

    This book consists of twelve chapters, which introduce super computer made with Linux cluster. The contents of this book are Linux cluster, the principle of cluster, design of Linux cluster, general things for Linux, building up terminal server and client, Bear wolf cluster by Debian GNU/Linux, cluster system with red hat, Monitoring system, application programming-MPI, on set-up and install application programming-PVM, with PVM programming and XPVM application programming-open PBS with composition and install and set-up and GRID with GRID system, GSI, GRAM, MDS, its install and using of tool kit

  10. Linux Command Line and Shell Scripting Bible

    Blum, Richard

    2011-01-01

    The authoritative guide to Linux command line and shell scripting?completely updated and revised [it's not a guide to Linux as a whole ? just to scripting] The Linux command line allows you to type specific Linux commands directly to the system so that you can easily manipulate files and query system resources, thereby permitting you to automate commonly used functions and even schedule those programs to run automatically. This new edition is packed with new and revised content, reflecting the many changes to new Linux versions, including coverage of alternative shells to the default bash shel

  11. Convolutional Neural Network on Embedded Linux System-on-Chip: A Methodology and Performance Benchmark

    2016-05-01

    Linux® is a registered trademark of Linus Torvalds. NVIDIA ® is a registered trademark of NVIDIA Corporation. Oracle® is a registered trademark of...two NVIDIA ® GTX580 GPUs [3]. Therefore, for this initial work, we decided to concentrate on small networks and small datasets until the methods are

  12. Real-time Linux operating system for plasma control on FTU--implementation advantages and first experimental results

    Vitale, V.; Centioli, C.; Iannone, F.; Mazza, G.; Panella, M.; Pangione, L.; Podda, S.; Zaccarian, L.

    2004-01-01

    In this paper, we report on the experiment carried out at the Frascati Tokamak Upgrade (FTU) on the porting of the plasma control system (PCS) from a LynxOS architecture to an open source Linux real-time architecture. The old LynxOS system was implemented on a VME/PPC604r embedded controller guaranteeing successful plasma position, density and current control. The new RTAI-Linux operating system has shown to easily adapt to the VME hardware via a VME/INTELx86 embedded controller. The advantages of the new solution versus the old one are not limited to the reduced cost of the new architecture (based on the open-source characteristic of the RTAI architecture) but also enhanced by the response time of the real-time system which, also through an optimization of the real-time code, has been reduced from 150 μs (LynxOS) to 70 μs (RTAI). The new real-time operating system is also shown to be suitable for new extended control activities, whose implementation is also possible based on the reduced duty cycle duration, which leaves space for the real-time implementation of nonlinear control laws. We report here on recent experiments related to the optimization of the coupling between additional radiofrequency power and plasma

  13. Real-time Linux operating system for plasma control on FTU--implementation advantages and first experimental results

    Vitale, V. E-mail: vitale@frascati.enea.it; Centioli, C.; Iannone, F.; Mazza, G.; Panella, M.; Pangione, L.; Podda, S.; Zaccarian, L

    2004-06-01

    In this paper, we report on the experiment carried out at the Frascati Tokamak Upgrade (FTU) on the porting of the plasma control system (PCS) from a LynxOS architecture to an open source Linux real-time architecture. The old LynxOS system was implemented on a VME/PPC604r embedded controller guaranteeing successful plasma position, density and current control. The new RTAI-Linux operating system has shown to easily adapt to the VME hardware via a VME/INTELx86 embedded controller. The advantages of the new solution versus the old one are not limited to the reduced cost of the new architecture (based on the open-source characteristic of the RTAI architecture) but also enhanced by the response time of the real-time system which, also through an optimization of the real-time code, has been reduced from 150 {mu}s (LynxOS) to 70 {mu}s (RTAI). The new real-time operating system is also shown to be suitable for new extended control activities, whose implementation is also possible based on the reduced duty cycle duration, which leaves space for the real-time implementation of nonlinear control laws. We report here on recent experiments related to the optimization of the coupling between additional radiofrequency power and plasma.

  14. Belief in School Meritocracy as a System-justifying Tool for Low Status Students

    Virginie eWiederkehr

    2015-07-01

    Full Text Available The belief that, in school, success only depends on will and hard work is widespread in Western societies despite evidence showing that several factors other than merit explain school success, including group belonging (e.g., social class, gender. In the present paper, we argue that because merit is the only track for low status students to reach upward mobility, Belief in School Meritocracy (BSM is a particularly useful system-justifying tool to help them perceive their place in society as being deserved. Consequently, for low status students (but not high status students, this belief should be related to more general system-justifying beliefs (Study 1. Moreover, low status students should be particularly prone to endorsing this belief when their place within a system on which they strongly depend to acquire status is challenged (Study 2. In Study 1, high status (boys and high SES were compared to low status (girls and low SES high school students. Results indicated that BSM was related to system-justifying beliefs only for low SES students and for girls, but not for high SES students or for boys. In Study 2, university students were exposed (or not to information about an important selection process that occurs at the university, depending on the condition. Their subjective status was assessed. Although such a confrontation reduced BSM for high subjective SES students, it tended to enhance it for low subjective SES students. Results are discussed in terms of system-justification motives and the palliative function meritocratic ideology may play for low status students.

  15. Belief in school meritocracy as a system-justifying tool for low status students.

    Wiederkehr, Virginie; Bonnot, Virginie; Krauth-Gruber, Silvia; Darnon, Céline

    2015-01-01

    The belief that, in school, success only depends on will and hard work is widespread in Western societies despite evidence showing that several factors other than merit explain school success, including group belonging (e.g., social class, gender). In the present paper, we argue that because merit is the only track for low status students to reach upward mobility, Belief in School Meritocracy (BSM) is a particularly useful system-justifying tool to help them perceive their place in society as being deserved. Consequently, for low status students (but not high status students), this belief should be related to more general system-justifying beliefs (Study 1). Moreover, low status students should be particularly prone to endorsing this belief when their place within a system on which they strongly depend to acquire status is challenged (Study 2). In Study 1, high status (boys and high SES) were compared to low status (girls and low SES) high school students. Results indicated that BSM was related to system-justifying beliefs only for low SES students and for girls, but not for high SES students or for boys. In Study 2, university students were exposed (or not) to information about an important selection process that occurs at the university, depending on the condition. Their subjective status was assessed. Although such a confrontation reduced BSM for high subjective SES students, it tended to enhance it for low subjective SES students. Results are discussed in terms of system justification motives and the palliative function meritocratic ideology may play for low status students.

  16. Recent advances in PC-Linux systems for electronic structure computations by optimized compilers and numerical libraries.

    Yu, Jen-Shiang K; Yu, Chin-Hui

    2002-01-01

    One of the most frequently used packages for electronic structure research, GAUSSIAN 98, is compiled on Linux systems with various hardware configurations, including AMD Athlon (with the "Thunderbird" core), AthlonMP, and AthlonXP (with the "Palomino" core) systems as well as the Intel Pentium 4 (with the "Willamette" core) machines. The default PGI FORTRAN compiler (pgf77) and the Intel FORTRAN compiler (ifc) are respectively employed with different architectural optimization options to compile GAUSSIAN 98 and test the performance improvement. In addition to the BLAS library included in revision A.11 of this package, the Automatically Tuned Linear Algebra Software (ATLAS) library is linked against the binary executables to improve the performance. Various Hartree-Fock, density-functional theories, and the MP2 calculations are done for benchmarking purposes. It is found that the combination of ifc with ATLAS library gives the best performance for GAUSSIAN 98 on all of these PC-Linux computers, including AMD and Intel CPUs. Even on AMD systems, the Intel FORTRAN compiler invariably produces binaries with better performance than pgf77. The enhancement provided by the ATLAS library is more significant for post-Hartree-Fock calculations. The performance on one single CPU is potentially as good as that on an Alpha 21264A workstation or an SGI supercomputer. The floating-point marks by SpecFP2000 have similar trends to the results of GAUSSIAN 98 package.

  17. Kali Linux assuring security by penetration testing

    Ali, Shakeel; Allen, Lee

    2014-01-01

    Written as an interactive tutorial, this book covers the core of Kali Linux with real-world examples and step-by-step instructions to provide professional guidelines and recommendations for you. The book is designed in a simple and intuitive manner that allows you to explore the whole Kali Linux testing process or study parts of it individually.If you are an IT security professional who has a basic knowledge of Unix/Linux operating systems, including an awareness of information security factors, and want to use Kali Linux for penetration testing, then this book is for you.

  18. Linux utilities cookbook

    Lewis, James Kent

    2013-01-01

    A Cookbook-style guide packed with examples and illustrations, it offers organized learning through recipes and step-by-step instructions. The book is designed so that you can pick exactly what you need, when you need it.Written for anyone that would like to familiarize themselves with Linux. This book is perfect migrating from Windows to Linux and will save your time and money, learn exactly how to and where to begin working with Linux and troubleshooting in easy steps.

  19. Linux Networking Cookbook

    Schroder, Carla

    2008-01-01

    If you want a book that lays out the steps for specific Linux networking tasks, one that clearly explains the commands and configurations, this is the book for you. Linux Networking Cookbook is a soup-to-nuts collection of recipes that covers everything you need to know to perform your job as a Linux network administrator. You'll dive straight into the gnarly hands-on work of building and maintaining a computer network

  20. Kali Linux wireless penetration testing essentials

    Alamanni, Marco

    2015-01-01

    This book is targeted at information security professionals, penetration testers and network/system administrators who want to get started with wireless penetration testing. No prior experience with Kali Linux and wireless penetration testing is required, but familiarity with Linux and basic networking concepts is recommended.

  1. Superiority of CT imaging reconstruction on Linux OS

    Lin Shaochun; Yan Xufeng; Wu Tengfang; Luo Xiaomei; Cai Huasong

    2010-01-01

    Objective: To compare the speed of CT reconstruction using the Linux and Windows OS. Methods: Shepp-Logan head phantom in different pixel size was projected to obtain the sinogram by using the inverse Fourier transformation, filtered back projection and Radon transformation on both Linux and Windows OS. Results: CT image reconstruction using the Linux operating system was significantly better and more efficient than Windows. Conclusion: CT image reconstruction using the Linux operating system is more efficient. (authors)

  2. Minimalist's linux cluster

    Choi, Chang-Yeong; Kim, Jeong-Hyun; Kim, Seyong

    2004-01-01

    Using barebone PC components and NIC's, we construct a linux cluster which has 2-dimensional mesh structure. This cluster has smaller footprint, is less expensive, and use less power compared to conventional linux cluster. Here, we report our experience in building such a machine and discuss our current lattice project on the machine

  3. The Research on Linux Memory Forensics

    Zhang, Jun; Che, ShengBing

    2018-03-01

    Memory forensics is a branch of computer forensics. It does not depend on the operating system API, and analyzes operating system information from binary memory data. Based on the 64-bit Linux operating system, it analyzes system process and thread information from physical memory data. Using ELF file debugging information and propose a method for locating kernel structure member variable, it can be applied to different versions of the Linux operating system. The experimental results show that the method can successfully obtain the sytem process information from physical memory data, and can be compatible with multiple versions of the Linux kernel.

  4. Linux Server Security

    Bauer, Michael D

    2005-01-01

    Linux consistently appears high up in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services such as DNS and delivering mail. But security is the foremost concern of anyone providing such a service. Any server experiences casual probe attempts dozens of time a day, and serious break-in attempts with some frequency as well. This highly regarded book, originally titled Building Secure Servers with Linux, combines practical advice with a firm knowledge of the technical tools needed to ensure security. The book focuses on the most common use of Linux--

  5. Preparing a scientific manuscript in Linux: Today's possibilities and limitations.

    Tchantchaleishvili, Vakhtang; Schmitto, Jan D

    2011-10-22

    Increasing number of scientists are enthusiastic about using free, open source software for their research purposes. Authors' specific goal was to examine whether a Linux-based operating system with open source software packages would allow to prepare a submission-ready scientific manuscript without the need to use the proprietary software. Preparation and editing of scientific manuscripts is possible using Linux and open source software. This letter to the editor describes key steps for preparation of a publication-ready scientific manuscript in a Linux-based operating system, as well as discusses the necessary software components. This manuscript was created using Linux and open source programs for Linux.

  6. Linux command line and shell scripting bible

    Blum, Richard

    2014-01-01

    Talk directly to your system for a faster workflow with automation capability Linux Command Line and Shell Scripting Bible is your essential Linux guide. With detailed instruction and abundant examples, this book teaches you how to bypass the graphical interface and communicate directly with your computer, saving time and expanding capability. This third edition incorporates thirty pages of new functional examples that are fully updated to align with the latest Linux features. Beginning with command line fundamentals, the book moves into shell scripting and shows you the practical application

  7. LPI Linux Certification in a Nutshell

    Haeder, Adam; Pessanha, Bruno; Stanger, James

    2010-01-01

    Linux deployment continues to increase, and so does the demand for qualified and certified Linux system administrators. If you're seeking a job-based certification from the Linux Professional Institute (LPI), this updated guide will help you prepare for the technically challenging LPIC Level 1 Exams 101 and 102. The third edition of this book is a meticulously researched reference to these exams, written by trainers who work closely with LPI. You'll find an overview of each exam, a summary of the core skills you need, review questions and exercises, as well as a study guide, a practice test,

  8. Tuning Linux to meet real time requirements

    Herbel, Richard S.; Le, Dang N.

    2007-04-01

    There is a desire to use Linux in military systems. Customers are requesting contractors to use open source to the maximal possible extent in contracts. Linux is probably the best operating system of choice to meet this need. It is widely used. It is free. It is royalty free, and, best of all, it is completely open source. However, there is a problem. Linux was not originally built to be a real time operating system. There are many places where interrupts can and will be blocked for an indeterminate amount of time. There have been several attempts to bridge this gap. One of them is from RTLinux, which attempts to build a microkernel underneath Linux. The microkernel will handle all interrupts and then pass it up to the Linux operating system. This does insure good interrupt latency; however, it is not free [1]. Another is RTAI, which provides a similar typed interface; however, the PowerPC platform, which is used widely in real time embedded community, was stated as "recovering" [2]. Thus this is not suited for military usage. This paper provides a method for tuning a standard Linux kernel so it can meet the real time requirement of an embedded system.

  9. Application of Ethernet Powerlink for communication in a Linux RTAI open CNC control system

    Erwiński, Krystian; Paprocki, Marcin; Grzesiak, Lech; Karwowski, Kazimierz; Wawrzak, Andrzej

    2013-01-01

    In computerized numerical control (CNC) systems, the communication bus between the controller and axis servo drives must offer high bandwidth, noise immunity, and time determinism. More and more CNC systems use real-time Ethernet protocols such as Ethernet Powerlink (EPL). Many modern controllers are closed costly hardware-based solutions. In this paper, the implementation of EPL communication bus in a PC-based CNC system is presented. The CNC system includes a PC, a s...

  10. Convolutional Neural Network on Embedded Linux(trademark) System-on-Chip: A Methodology and Performance Benchmark

    2016-05-01

    Linux® is a registered trademark of Linus Torvalds. NVIDIA ® is a registered trademark of NVIDIA Corporation. Oracle® is a registered trademark of...two NVIDIA ® GTX580 GPUs [3]. Therefore, for this initial work, we decided to concentrate on small networks and small datasets until the methods are

  11. Linux block IO: introducing multi-queue SSD access on multi-core systems

    Bjørling, Matias; Axboe, Jens; Nellans, David

    2013-01-01

    The IO performance of storage devices has accelerated from hundreds of IOPS five years ago, to hundreds of thousands of IOPS today, and tens of millions of IOPS projected in five years. This sharp evolution is primarily due to the introduc- tion of NAND-flash devices and their data parallel desig...... generation block layer that is capable of handling tens of millions of IOPS on a multi-core system equipped with a single storage device. Our experiments show that our design scales graciously with the number of cores, even on NUMA systems with multiple sockets....

  12. An Open Source Rapid Computer Aided Control System Design Toolchain Using Scilab, Scicos and RTAI Linux

    Bouchpan-Lerust-Juéry, L.

    2007-08-01

    Current and next generation on-board computer systems tend to implement real-time embedded control applications (e.g. Attitude and Orbit Control Subsystem (AOCS), Packet Utililization Standard (PUS), spacecraft autonomy . . . ) which must meet high standards of Reliability and Predictability as well as Safety. All these requirements require a considerable amount of effort and cost for Space Sofware Industry. This paper, in a first part, presents a free Open Source integrated solution to develop RTAI applications from analysis, design, simulation and direct implementation using code generation based on Open Source and in its second part summarises this suggested approach, its results and the conclusion for further work.

  13. Kali Linux social engineering

    Singh, Rahul

    2013-01-01

    This book is a practical, hands-on guide to learning and performing SET attacks with multiple examples.Kali Linux Social Engineering is for penetration testers who want to use BackTrack in order to test for social engineering vulnerabilities or for those who wish to master the art of social engineering attacks.

  14. Faults in Linux

    Palix, Nicolas Jean-Michel; Thomas, Gaël; Saha, Suman

    2011-01-01

    In 2001, Chou et al. published a study of faults found by applying a static analyzer to Linux versions 1.0 through 2.4.1. A major result of their work was that the drivers directory contained up to 7 times more of certain kinds of faults than other directories. This result inspired a number...... of development and research efforts on improving the reliability of driver code. Today Linux is used in a much wider range of environments, provides a much wider range of services, and has adopted a new development and release model. What has been the impact of these changes on code quality? Are drivers still...... a major problem? To answer these questions, we have transported the experiments of Chou et al. to Linux versions 2.6.0 to 2.6.33, released between late 2003 and early 2010. We find that Linux has more than doubled in size during this period, but that the number of faults per line of code has been...

  15. The Linux Operating System

    of America to exercise control over the production, management and use of information resources by promoting the .... development of stable 'production quality' versions. This ... obscurity', to hide potential security problems from malicious.

  16. MARS Code in Linux Environment

    Hwang, Moon Kyu; Bae, Sung Won; Jung, Jae Joon; Chung, Bub Dong [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)

    2005-07-01

    The two-phase system analysis code MARS has been incorporated into Linux system. The MARS code was originally developed based on the RELAP5/MOD3.2 and COBRA-TF. The 1-D module which evolved from RELAP5 alone could be applied for the whole NSSS system analysis. The 3-D module developed based on the COBRA-TF, however, could be applied for the analysis of the reactor core region where 3-D phenomena would be better treated. The MARS code also has several other code units that could be incorporated for more detailed analysis. The separate code units include containment analysis modules and 3-D kinetics module. These code modules could be optionally invoked to be coupled with the main MARS code. The containment code modules (CONTAIN and CONTEMPT), for example, could be utilized for the analysis of the plant containment phenomena in a coupled manner with the nuclear reactor system. The mass and energy interaction during the hypothetical coolant leakage accident could, thereby, be analyzed in a more realistic manner. In a similar way, 3-D kinetics could be incorporated for simulating the three dimensional reactor kinetic behavior, instead of using the built-in point kinetics model. The MARS code system, developed initially for the MS Windows environment, however, would not be adequate enough for the PC cluster system where multiple CPUs are available. When parallelism is to be eventually incorporated into the MARS code, MS Windows environment is not considered as an optimum platform. Linux environment, on the other hand, is generally being adopted as a preferred platform for the multiple codes executions as well as for the parallel application. In this study, MARS code has been modified for the adaptation of Linux platform. For the initial code modification, the Windows system specific features have been removed from the code. Since the coupling code module CONTAIN is originally in a form of dynamic load library (DLL) in the Windows system, a similar adaptation method

  17. MARS Code in Linux Environment

    Hwang, Moon Kyu; Bae, Sung Won; Jung, Jae Joon; Chung, Bub Dong

    2005-01-01

    The two-phase system analysis code MARS has been incorporated into Linux system. The MARS code was originally developed based on the RELAP5/MOD3.2 and COBRA-TF. The 1-D module which evolved from RELAP5 alone could be applied for the whole NSSS system analysis. The 3-D module developed based on the COBRA-TF, however, could be applied for the analysis of the reactor core region where 3-D phenomena would be better treated. The MARS code also has several other code units that could be incorporated for more detailed analysis. The separate code units include containment analysis modules and 3-D kinetics module. These code modules could be optionally invoked to be coupled with the main MARS code. The containment code modules (CONTAIN and CONTEMPT), for example, could be utilized for the analysis of the plant containment phenomena in a coupled manner with the nuclear reactor system. The mass and energy interaction during the hypothetical coolant leakage accident could, thereby, be analyzed in a more realistic manner. In a similar way, 3-D kinetics could be incorporated for simulating the three dimensional reactor kinetic behavior, instead of using the built-in point kinetics model. The MARS code system, developed initially for the MS Windows environment, however, would not be adequate enough for the PC cluster system where multiple CPUs are available. When parallelism is to be eventually incorporated into the MARS code, MS Windows environment is not considered as an optimum platform. Linux environment, on the other hand, is generally being adopted as a preferred platform for the multiple codes executions as well as for the parallel application. In this study, MARS code has been modified for the adaptation of Linux platform. For the initial code modification, the Windows system specific features have been removed from the code. Since the coupling code module CONTAIN is originally in a form of dynamic load library (DLL) in the Windows system, a similar adaptation method

  18. Communication to Linux users

    IT Department

    We would like to inform you that the aging “phone” Linux command will stop working: On lxplus on 30 November 2009, On lxbatch on 4 January 2010, and is replaced by the new “phonebook” command, currently available on SLC4 and SLC5 Linux. As the new “phonebook” command has different syntax and output formats from the “phone” command, please update and test all scripts currently using “phone” before the above dates. You can refer to the article published on the IT Service Status Board, under the Service Changes section. Please send any comments to it-dep-phonebook-feedback@cern.ch Best regards, IT-UDS User Support Section

  19. Replacing OSE with Real Time capable Linux

    Boman, Simon; Rutgersson, Olof

    2009-01-01

    For many years OSE has been a common used operating system, with real time extensions enhancements, in embed-ded systems. But in the last decades, Linux has grown and became a competitor to common operating systems and, in recent years, even as an operating system with real time extensions. With this in mind, ÅF was interested in replacing the quite expensive OSE with some distribution of the open source based Linux on a PowerPC MPC8360. Therefore, our purpose with thesis is to implement Linu...

  20. Abstract of talk for Silicon Valley Linux Users Group

    Clanton, Sam

    2003-01-01

    The use of Linux for research at NASA Ames is discussed.Topics include:work with the Atmospheric Physics branch on software for a spectrometer to be used in the CRYSTAL-FACE mission this summer; work on in the Neuroengineering Lab with code IC including an introduction to the extension of the human senses project,advantages with using linux for real-time biological data processing,algorithms utilized on a linux system, goals of the project,slides of people with Neuroscan caps on, and progress that has been made and how linux has helped.

  1. Kali Linux cookbook

    Pritchett, Willie

    2013-01-01

    A practical, cookbook style with numerous chapters and recipes explaining the penetration testing. The cookbook-style recipes allow you to go directly to your topic of interest if you are an expert using this book as a reference, or to follow topics throughout a chapter to gain in-depth knowledge if you are a beginner.This book is ideal for anyone who wants to get up to speed with Kali Linux. It would also be an ideal book to use as a reference for seasoned penetration testers.

  2. Linux software for large topology optimization problems

    evolving product, which allows a parallel solution of the PDE, it lacks the important feature that the matrix-generation part of the computations is localized to each processor. This is well-known to be critical for obtaining a useful speedup on a Linux cluster and it motivates the search for a COMSOL......-like package for large topology optimization problems. One candidate for such software is developed for Linux by Sandia Nat’l Lab in the USA being the Sundance system. Sundance also uses a symbolic representation of the PDE and a scalable numerical solution is achieved by employing the underlying Trilinos...

  3. Are multi-paddock grazing systems economically justifiable? | M.T. ...

    The financial implications of few- and multi-paddock systems were modelled by a discounted cash flow analysis with the (discounted) present value as the dependent variable, and number of paddocks, farm run-down time, time horizon and discount rate as the independent variables. Present values were higher for few- ...

  4. INTERDISCIPLINARY SYSTEMIC JURIDICAL ARGUMENTATION: A NEW WAY TO JUSTIFY EMPHATICALLY AND EFFECTIVELLY

    Jorge Isaac Torres Manrique

    2018-04-01

    Full Text Available The article discusses the interdisciplinary systemic juridical argumentation. We propose to elevate the legal argumentation to a complete and integral level. That is, to provide a kind of tool that facilitates and ensures a full and complete analysis and foundation, in order to achieve a due as expected justice administration, in justice proper.

  5. Empathizing and systemizing (un)justified mediated violence: Psychophysiological indicators of emotional response

    Samson, L.; Potter, R.F.

    2016-01-01

    This article examines individual variability in empathizing and systemizing abilities (Baron-Cohen, 2003, 2009) on emotional responses to mediated violence. It is predicted that these abilities influence feelings of distress and enjoyment while processing violent media and that they interact with

  6. Applied ELT: A Paradigm Justifying Complex Adaptive System of Language Teaching?

    Masoud Mahmoodzadeh

    2013-12-01

    Full Text Available In an endeavor to reflect on the advent of Applied ELT paradigm pioneered by Pishghadam (2011 in the area of second language education, this article delves into the unexplored nature of this emerging paradigm via a contemporary complexity-driven voice. The crux of the argument addressed in this article suggests that Applied ELT is a pragmatic manifestation of complex adaptive system of language teaching. To set the grounds expressly for such enquiry, firstly it draws on both premises and axioms associated with complexity theory and its existing literature in the circle of second language research. It then tracks down the evolutionary course of the new developed paradigm of Applied ELT within the realm of second language education and also elaborates the cornerstone and manifold tenets of this paradigm sufficiently. Finally, the article attempts to critically elucidate and rationalize the recent emergence of Applied ELT paradigm through the lens of complexity theory. To broaden our thinking and understanding about the potential and multi-directional influence of ELT field, the article ends by calling for a reshaped educational direction for ELT position in second language education.

  7. Linux, OpenBSD, and Talisker: A Comparative Complexity Analysis

    Smith, Kevin

    2002-01-01

    .... Rigorous engineering principles are applicable across a broad range of systems. The purpose of this study is to analyze and compare three operating systems, including two general-purpose operating systems (Linux and OpenBSD...

  8. Using Linux PCs in DAQ applications

    Ünel, G; Beck, H P; Cetin, S A; Conka, T; Crone, G J; Fernandes, A; Francis, D; Joosb, M; Lehmann, G; López, J; Mailov, A A; Mapelli, Livio P; Mornacchi, Giuseppe; Niculescu, M; Petersen, J; Tremblet, L J; Veneziano, Stefano; Wildish, T; Yasu, Y

    2000-01-01

    ATLAS Data Acquisition/Event Filter "-1" (DAQ/EF1) project provides the opportunity to explore the use of commodity hardware (PCs) and Open Source Software (Linux) in DAQ applications. In DAQ/EF-1 there is an element called the LDAQ which is responsible for providing local run-control, error-handling and reporting for a number of read- out modules in front end crates. This element is also responsible for providing event data for monitoring and for the interface with the global control and monitoring system (Back-End). We present the results of an evaluation of the Linux operating system made in the context of DAQ/EF-1 where there are no strong real-time requirements. We also report on our experience in implementing the LDAQ on a VMEbus based PC (the VMIVME-7587) and a desktop PC linked to VMEbus with a Bit3 interface both running Linux. We then present the problems encountered during the integration with VMEbus, the status of the LDAQ implementation and draw some conclusions on the use of Linux in DAQ applica...

  9. Feasibility study of BES data processing and physics analysis on a PC/Linux platform

    Rong Gang; He Kanglin; Zhao Jiawei; Heng Yuekun; Zhang Chun

    1999-01-01

    The authors report a feasibility study of off-line BES data processing (data reconstruction and Detector simulation) on a PC/Linux platform and an application of the PC/Linux system in D/Ds physics analysis. The authors compared the results obtained from the PC/Linux with that from HP workstation. It shows that PC/Linux platform can do BES data offline analysis as good as UNIX workstation do, but it is much powerful and economical

  10. Fedora Bible 2010 Edition Featuring Fedora Linux 12

    Negus, Christopher

    2010-01-01

    The perfect companion for mastering the latest version of Fedora. As a free, open source Linux operating system sponsored by Red Hat, Fedora can either be a stepping stone to Enterprise or used as a viable operating system for those looking for frequent updates. Written by veteran authors of perennial bestsellers, this book serves as an ideal companion for Linux users and offers a thorough look at the basics of the new Fedora 12. Step-by-step instructions make the Linux installation simple while clear explanations walk you through best practices for taking advantage of the desktop interface. Y

  11. CompTIA Linux+ Complete Study Guide (Exams LX0-101 and LX0-102)

    Smith, Roderick W

    2010-01-01

    Prepare for CompTIA's Linux+ Exams. As the Linux server and desktop markets continue to grow, so does the need for qualified Linux administrators. CompTIA's Linux+ certification (Exams LX0-101 and LX0-102) includes the very latest enhancements to the popular open source operating system. This detailed guide not only covers all key exam topics—such as using Linux command-line tools, understanding the boot process and scripts, managing files and file systems, managing system security, and much more—it also builds your practical Linux skills with real-world examples. Inside, you'll find:. Full co

  12. Research on application of VME based embedded linux

    Ji Xiaolu; Ye Mei; Zhu Kejun; Li Xiaonan; Wang Yifang

    2010-01-01

    It describes the feasibility and realization of using embedded Linux in DAQ readout system of high energy physics experiment. The first part, the hardware and software framework is introduced. And then emphasis is placed on the key technologies during the system realization. The development is based on the VME bus and vme u niverse driver. Finally, the test result is presented: the readout system can work well in Embedded Linux OS. (authors)

  13. Real-time data collection in Linux: a case study.

    Finney, S A

    2001-05-01

    Multiuser UNIX-like operating systems such as Linux are often considered unsuitable for real-time data collection because of the potential for indeterminate timing latencies resulting from preemptive scheduling. In this paper, Linux is shown to be fully adequate for precisely controlled programming with millisecond resolution or better. The Linux system calls that subserve such timing control are described and tested and then utilized in a MIDI-based program for tapping and music performance experiments. The timing of this program, including data input and output, is shown to be accurate at the millisecond level. This demonstrates that Linux, with proper programming, is suitable for real-time experiment software. In addition, the detailed description and test of both the operating system facilities and the application program itself may serve as a model for publicly documenting programming methods and software performance on other operating systems.

  14. Lecture 11: Systemtap : Patching the linux kernel on the fly

    CERN. Geneva

    2013-01-01

    The presentation will describe the usage of Systemtap, in CERN Scientific Linux environment. Systemtap is a tool that allows developers and administrators to write and reuse simple scripts to deeply examine the activities of a live Linux system. We will go through the life cycle of a system tap module : creation, packaging, deployment. It will focus on how we used it recently at CERN as a workaround to patch a 0-day. Thomas Oulevey is a member if the IT department at CERN where he is an active member of the Linux team which supports 9’000 servers, 3’000 desktop systems and more than 5’000 active users. Before CERN he worked at the former astrophysics department of CERN, now called the European Southern Observatory, based in Chile. He was used to maintain the core telescope Linux systems and monitoring infrastructure.

  15. Rebootless Linux Kernel Patching with Ksplice Uptrack at BNL

    Hollowell, Christopher; Pryor, James; Smith, Jason

    2012-01-01

    Ksplice/Oracle Uptrack is a software tool and update subscription service which allows system administrators to apply security and bug fix patches to the Linux kernel running on servers/workstations without rebooting them. The RHIC/ATLAS Computing Facility (RACF) at Brookhaven National Laboratory (BNL) has deployed Uptrack on nearly 2,000 hosts running Scientific Linux and Red Hat Enterprise Linux. The use of this software has minimized downtime, and increased our security posture. In this paper, we provide an overview of Ksplice's rebootless kernel patch creation/insertion mechanism, and our experiences with Uptrack.

  16. Shell Scripting Expert Recipes for Linux, Bash and more

    Parker, Steve

    2011-01-01

    A compendium of shell scripting recipes that can immediately be used, adjusted, and applied The shell is the primary way of communicating with the Unix and Linux systems, providing a direct way to program by automating simple-to-intermediate tasks. With this book, Linux expert Steve Parker shares a collection of shell scripting recipes that can be used as is or easily modified for a variety of environments or situations. The book covers shell programming, with a focus on Linux and the Bash shell; it provides credible, real-world relevance, as well as providing the flexible tools to get started

  17. Justify your alpha

    Lakens, Daniel; Adolfi, Federico G.; Albers, Casper J.; Anvari, Farid; Apps, Matthew A.J.; Argamon, Shlomo E.; Baguley, Thom; Becker, Raymond B.; Benning, Stephen D.; Bradford, Daniel E.; Buchanan, Erin M.; Caldwell, Aaron R.; Van Calster, Ben; Carlsson, Rickard; Chen, Sau Chin; Chung, Bryan; Colling, Lincoln J.; Collins, Gary S.; Crook, Zander; Cross, Emily S.; Daniels, Sameera; Danielsson, Henrik; Debruine, Lisa; Dunleavy, Daniel J.; Earp, Brian D.; Feist, Michele I.; Ferrell, Jason D.; Field, James G.; Fox, Nicholas W.; Friesen, Amanda; Gomes, Caio; Gonzalez-Marquez, Monica; Grange, James A.; Grieve, Andrew P.; Guggenberger, Robert; Grist, James; Van Harmelen, Anne Laura; Hasselman, Fred; Hochard, Kevin D.; Hoffarth, Mark R.; Holmes, Nicholas P.; Ingre, Michael; Isager, Peder M.; Isotalus, Hanna K.; Johansson, Christer; Juszczyk, Konrad; Kenny, David A.; Khalil, Ahmed A.; Konat, Barbara; Lao, Junpeng; Larsen, Erik Gahner; Lodder, Gerine M.A.; Lukavský, Jiří; Madan, Christopher R.; Manheim, David; Martin, Stephen R.; Martin, Andrea E.; Mayo, Deborah G.; McCarthy, Randy J.; McConway, Kevin; McFarland, Colin; Nio, Amanda Q.X.; Nilsonne, Gustav; De Oliveira, Cilene Lino; De Xivry, Jean Jacques Orban; Parsons, Sam; Pfuhl, Gerit; Quinn, Kimberly A.; Sakon, John J.; Saribay, S. Adil; Schneider, Iris K.; Selvaraju, Manojkumar; Sjoerds, Zsuzsika; Smith, Samuel G.; Smits, Tim; Spies, Jeffrey R.; Sreekumar, Vishnu; Steltenpohl, Crystal N.; Stenhouse, Neil; Świątkowski, Wojciech; Vadillo, Miguel A.; Van Assen, Marcel A.L.M.; Williams, Matt N.; Williams, Samantha E.; Williams, Donald R.; Yarkoni, Tal; Ziano, Ignazio; Zwaan, Rolf A.

    2018-01-01

    In response to recommendations to redefine statistical significance to P ≤ 0.005, we propose that researchers should transparently report and justify all choices they make when designing a study, including the alpha level.

  18. Real Time Linux - The RTOS for Astronomy?

    Daly, P. N.

    The BoF was attended by about 30 participants and a free CD of real time Linux-based upon RedHat 5.2-was available. There was a detailed presentation on the nature of real time Linux and the variants for hard real time: New Mexico Tech's RTL and DIAPM's RTAI. Comparison tables between standard Linux and real time Linux responses to time interval generation and interrupt response latency were presented (see elsewhere in these proceedings). The present recommendations are to use RTL for UP machines running the 2.0.x kernels and RTAI for SMP machines running the 2.2.x kernel. Support, both academically and commercially, is available. Some known limitations were presented and the solutions reported e.g., debugging and hardware support. The features of RTAI (scheduler, fifos, shared memory, semaphores, message queues and RPCs) were described. Typical performance statistics were presented: Pentium-based oneshot tasks running > 30kHz, 486-based oneshot tasks running at ~ 10 kHz, periodic timer tasks running in excess of 90 kHz with average zero jitter peaking to ~ 13 mus (UP) and ~ 30 mus (SMP). Some detail on kernel module programming, including coding examples, were presented showing a typical data acquisition system generating simulated (random) data writing to a shared memory buffer and a fifo buffer to communicate between real time Linux and user space. All coding examples were complete and tested under RTAI v0.6 and the 2.2.12 kernel. Finally, arguments were raised in support of real time Linux: it's open source, free under GPL, enables rapid prototyping, has good support and the ability to have a fully functioning workstation capable of co-existing hard real time performance. The counter weight-the negatives-of lack of platforms (x86 and PowerPC only at present), lack of board support, promiscuous root access and the danger of ignorance of real time programming issues were also discussed. See ftp://orion.tuc.noao.edu/pub/pnd/rtlbof.tgz for the StarOffice overheads

  19. Distributed MDSplus database performance with Linux clusters

    Minor, D.H.; Burruss, J.R.

    2006-01-01

    The staff at the DIII-D National Fusion Facility, operated for the USDOE by General Atomics, are investigating the use of grid computing and Linux technology to improve performance in our core data management services. We are in the process of converting much of our functionality to cluster-based and grid-enabled software. One of the most important pieces is a new distributed version of the MDSplus scientific data management system that is presently used to support fusion research in over 30 countries worldwide. To improve data handling performance, the staff is investigating the use of Linux clusters for both data clients and servers. The new distributed capability will result in better load balancing between these clients and servers, and more efficient use of network resources resulting in improved support of the data analysis needs of the scientific staff

  20. Design of the data management system for hard X-ray modulation telescope based on real-time Linux

    Jia Tao; Zhang Zhi

    2004-01-01

    Hard X-ray Modulation Telescope is an electronic subsystem, the data management system for capturing the data of the telescope, then managing and transferring them. The data management system also deals with the communication with the satellite. Because of these functions, it needs highly steady quality and good real-time performance. This paper describes the design of the system. (authors)

  1. Analyzing Security-Enhanced Linux Policy Specifications

    Archer, Myla

    2003-01-01

    NSA's Security-Enhanced (SE) Linux enhances Linux by providing a specification language for security policies and a Flask-like architecture with a security server for enforcing policies defined in the language...

  2. Ubuntu Linux Toolbox 1000 + Commands for Ubuntu and Debian Power Users

    Negus, Christopher

    2008-01-01

    In this handy, compact guide, you'll explore a ton of powerful Ubuntu Linux commands while you learn to use Ubuntu Linux as the experts do: from the command line. Try out more than 1,000 commands to find and get software, monitor system health and security, and access network resources. Then, apply the skills you learn from this book to use and administer desktops and servers running Ubuntu, Debian, and KNOPPIX or any other Linux distribution.

  3. Analysis of Linux kernel as a complex network

    Gao, Yichao; Zheng, Zheng; Qin, Fangyun

    2014-01-01

    Operating system (OS) acts as an intermediary between software and hardware in computer-based systems. In this paper, we analyze the core of the typical Linux OS, Linux kernel, as a complex network to investigate its underlying design principles. It is found that the Linux Kernel Network (LKN) is a directed network and its out-degree follows an exponential distribution while the in-degree follows a power-law distribution. The correlation between topology and functions is also explored, by which we find that LKN is a highly modularized network with 12 key communities. Moreover, we investigate the robustness of LKN under random failures and intentional attacks. The result shows that the failure of the large in-degree nodes providing basic services will do more damage on the whole system. Our work may shed some light on the design of complex software systems

  4. How can interventions for inhabitants be justified after a nuclear accident? An approach based on the radiological protection system of the international commission on radiological protection

    Takahara, Shogo; Homma, Toshimitsu; Yoneda, Minoru; Shimada, Yoko

    2016-01-01

    Management of radiation-induced risks in areas contaminated by a nuclear accident is characterized by three ethical issues: (1) risk trade-off, (2) paternalistic intervention and (3) individualization of responsibilities. To deal with these issues and to clarify requirements of justification of interventions for the purpose of reduction in radiation-induced risks, we explored the ethical basis of the radiological protection system of the International Commission on Radiological Protection (ICRP). The ICRP's radiological protection system is established based on three normative ethics, i.e. utilitarianism, deontology and virtue ethics. The three ethical issues can be resolved based on the decision-making framework which is constructed in combination with these ethical theories. In addition, the interventions for inhabitants have the possibility to be justified in accordance with two ways. Firstly, when the dangers are severe and far-reaching, interventions could be justified with a sufficient explanation about the nature of harmful effects (or beneficial consequences). Secondly, if autonomy of intervened-individuals can be promoted, those interventions could be justified. (author)

  5. Design and Implementation of Linux Access Control Model

    Wei Xiaomeng; Wu Yongbin; Zhuo Jingchuan; Wang Jianyun; Haliqian Mayibula

    2017-01-01

    In this paper,the design and implementation of an access control model for Linux system are discussed in detail. The design is based on the RBAC model and combines with the inherent characteristics of the Linux system,and the support for the process and role transition is added.The core idea of the model is that the file is divided into different categories,and access authority of every category is distributed to several roles.Then,roles are assigned to users of the system,and the role of the user can be transited from one to another by running the executable file.

  6. First experiences with large SAN storage and Linux

    Wezel, Jos van; Marten, Holger; Verstege, Bernhard; Jaeger, Axel

    2004-01-01

    The use of a storage area network (SAN) with Linux opens possibilities for scalable and affordable large data storage and poses a new challenge for cluster computing. The GridKa center uses a commercial parallel file system to create a highly available high-speed data storage using a combination of Fibre Channel (SAN) and Ethernet (LAN) to optimize between data throughput and costs. This article describes the design, implementation and optimizations of the GridKa storage solution which will offer over 400 TB online storage for 600 nodes. Presented are some throughput measurements of one of the largest Linux-based parallel storage systems in the world

  7. Using Real Time Workshop for rapid and reliable control implementation in the Frascati Tokamak Upgrade Feedback Control System running under RTAI-GNU/Linux

    Centioli, C.; Iannone, F.; Ledauphin, M.; Panella, M.; Pangione, L.; Podda, S.; Vitale, V.; Zaccarian, L.

    2005-01-01

    The Feedback Control System running at FTU has been recently ported from a commercial platform (based on LynxOS) to an open-source GNU/Linux-based RTAI-LXRT platform, thereby, obtaining significant performance and cost improvements. Based on the new open-source platform, it is now possible to experiment novel control strategies aimed at improving the robustness and accuracy of the feedback control. Nevertheless, the implementation of control ideas still requires a great deal of coding of the control algorithms that, if carried out manually, may be prone to coding errors, therefore time consuming both in the development phase and in the subsequent validation tests consisting of dedicated experiments carried out on FTU. In this paper, we report on recent developments based on Mathworks' Simulink and Real Time Workshop (RTW) packages to obtain a user-friendly environment where the real time code implementing novel control algorithms can be easily generated, tested and validated. Thanks to this new tool, the control designer only needs to specify the block diagram of the control task (namely, a high level and functional description of the new algorithm under consideration) and the corresponding real time code generation and testing is completely automated without any need of dedicated experiments. In the paper, the necessary work carried out to adapt the Real Time Workshop to our RTAI-LXRT context will be illustrated. A necessary re-organization of the previous real time software, aimed at incorporating the code coming from the adapted RTW, will also be discussed. Moreover, we will report on a performance comparison between the code obtained using the automated RTW-based procedure and the hand-written C code, appropriately optimised; at the moment, a preliminary performance comparison consisting of dummy algorithms has shown that the code automatically generated from RTW is faster (about 30% up) than the manually written one. This preliminary result combined with the

  8. Evaluation of mosix-Linux farm performances in GRID environment

    Barone, F.; Rosa, M.de; Rosa, R.de.; Eleuteri, A.; Esposito, R.; Mastroserio, P.; Milano, L.; Taurino, F.; Tortone, G.

    2001-01-01

    The MOSIX extensions to the Linux Operating System allow the creation of high-performance Linux Farms and an excellent integration of the several CPUs of the Farm, whose computational power can be furtherly increased and made more effective by networking them within the GRID environment. Following this strategy, the authors started to perform computational tests using two independent farms within the GRID environment. In particular, the authors performed a preliminary evaluation of the distributed computing efficiency with a MOSIX Linux farm in the simulation of gravitational waves data analysis from coalescing binaries. To this task, two different techniques were compared: the classical matched filters technique and one of its possible evolutions, based on a global optimisation technique

  9. Measuring performances of linux hyper visors

    Chierici, A.; Veraldi, R.; Salomoni, D.

    2009-01-01

    Virtualisation is a now proven software technology that is rapidly transforming the I T landscape and fundamentally changing the way people make computations and implement services. Recently, all major software producers (e.g., Microsoft and Red Hat) developed or acquired virtualisation technologies. Our institute (http://www.CNAF.INFN.it) is a Tier l for experiments carried on at the Large Hadron Collider at CERN (http://lhc.web.CERN.ch/lhc/) and is experiencing several benefits from virtualisation technologies, like improving fault tolerance, providing efficient hardware resource usage and increasing security. Currently, the virtualisation solution we adopted is xen, which is well supported by the Scientific Linux distribution, widely used by the High-Energy Physics (HEP) community. Since Scientific Linux is based on Red Hat E S, we felt the need to investigate performances and usability differences with the new k vm technology, recently acquired by Red Hat. The case study of this work is the Tier2 site for the LHCb experiment hosted at our institute; all major grid elements for this Tier2 run on xen virtual machines smoothly. We will investigate the impact on performance and stability that a migration to k vm would entail on the Tier2 site, as well as the effort required by a system administrator to deploy the migration.

  10. Using Vega Linux Cluster at Reactor Physics Dept

    Zefran, B.; Jeraj, R.; Skvarc, J.; Glumac, B.

    1999-01-01

    Experience using a Linux-based cluster for the reactor physics calculations are presented in this paper. Special attention is paid to the MCNP code in this environment and to practical guidelines how to prepare and use the paralel version of the code. Our results of a time comparison study are presented for two sets of inputs. The results are promising and speedup factor achieved on the Linux cluster agrees with previous tests on other parallel systems. We also tested tools for parallelization of other programs used at our Dept..(author)

  11. Linux thin-client conversion in a large cardiology practice: initial experience.

    Echt, Martin P; Rosen, Jordan

    2004-01-01

    Capital Cardiology Associates (CCA) is a single-specialty cardiology practice with offices in New York and Massachusetts. In 2003, CCA converted its IT system from a Microsoft-based network to a Linux network employing Linux thin-client technology with overall positive outcomes.

  12. Justifying Clinical Nudges.

    Gorin, Moti; Joffe, Steven; Dickert, Neal; Halpern, Scott

    2017-03-01

    The shift away from paternalistic decision-making and toward patient-centered, shared decision-making has stemmed from the recognition that in order to practice medicine ethically, health care professionals must take seriously the values and preferences of their patients. At the same time, there is growing recognition that minor and seemingly irrelevant features of how choices are presented can substantially influence the decisions people make. Behavioral economists have identified striking ways in which trivial differences in the presentation of options can powerfully and predictably affect people's choices. Choice-affecting features of the decision environment that do not restrict the range of choices or significantly alter the incentives have come to be known as "nudges." Although some have criticized conscious efforts to influence choice, we believe that clinical nudges may often be morally justified. The most straightforward justification for nudge interventions is that they help people bypass their cognitive limitations-for example, the tendency to choose the first option presented even when that option is not the best for them-thereby allowing people to make choices that best align with their rational preferences or deeply held values. However, we argue that this justification is problematic. We argue that, if physicians wish to use nudges to shape their patients' choices, the justification for doing so must appeal to an ethical and professional standard, not to patients' preferences. We demonstrate how a standard with which clinicians and bioethicists already are quite familiar-the best-interest standard-offers a robust justification for the use of nudges. © 2017 The Hastings Center.

  13. For Better or Worse? System-Justifying Beliefs in Sixth-Grade Predict Trajectories of Self-Esteem and Behavior Across Early Adolescence.

    Godfrey, Erin B; Santos, Carlos E; Burson, Esther

    2017-06-19

    Scholars call for more attention to how marginalization influences the development of low-income and racial/ethnic minority youth and emphasize the importance of youth's subjective perceptions of contexts. This study examines how beliefs about the fairness of the American system (system justification) in sixth grade influence trajectories of self-esteem and behavior among 257 early adolescents (average age 11.4) from a diverse, low-income, middle school in an urban southwestern city. System justification was associated with higher self-esteem, less delinquent behavior, and better classroom behavior in sixth grade but worse trajectories of these outcomes from sixth to eighth grade. These findings provide novel evidence that system-justifying beliefs undermine the well-being of marginalized youth and that early adolescence is a critical developmental period for this process. © 2017 The Authors. Child Development © 2017 Society for Research in Child Development, Inc.

  14. Modeling Security-Enhanced Linux Policy Specifications for Analysis (Preprint)

    Archer, Myla; Leonard, Elizabeth; Pradella, Matteo

    2003-01-01

    Security-Enhanced (SE) Linux is a modification of Linux initially released by NSA in January 2001 that provides a language for specifying Linux security policies and, as in the Flask architecture, a security server...

  15. Justifying a Set of Basic Characteristics of High Temperature Cold Accumulators in Their Designing for the Ground-Based Systems

    E. S. Khromov

    2015-01-01

    Full Text Available The ground-based systems use a wide variety of heat-emitting equipment. For temperature control of equipment and facilities, the thermal management systems (TMS are included in the ground-based systems. However, in operation, the off-nominal situations with increased heat emission are possible. To avoid overheating of equipment or environment in facilities, where equipment is placed, is possible through completing a set of TMS by high-temperature cold accumulators (CA.When filling CA by thermal accumulating materials (TAM with change in phase at the temperature level exceeding the ambient temperature, CA integration in TMS is simplified and the need to increase the cooling capacity of the sources of its cold is eliminated. Among the known multiple-cycle TAMs with change in phase "melting-solidification" in a set of characteristics, the most promising are crystal hydrates of salts and their systems, as well as paraffin, especially clean. However, advantages and disadvantages of these classes of TAM are different and disable us to develop a generic version of the CA design.The objective of this work is to identify a set of the main characteristics that significantly affect the CA efficiency. To achieve the goal is used a mathematical simulation of heat exchange and phase change processes, using CA with intermediate coolant as an example. Simulation is based on generation and solution of the system of equations of a thermal balance for the coolant circulating through the inner tube of CA container. The system of equations is solved using Excel tools.Varying values of studied characteristics and generalization of results allowed to us define a following set: TAM thermal conductivity, temperature difference in the coolant – TAM system, TAM container dimensions. The results can be applied when developing a CA, as a part of the "TMS-CA heat generation facility" of the ground-based systems with a specified heat absorption capacity at given temperature

  16. The use of computer decision-making support systems to justify address rehabilitation of the Semipalatinsk test site area

    Viktoria V. Zaets; Alexey V. Panov

    2011-01-01

    The paper describes the development of a range of optimal protective measures for remediation of the territory of the Semipalatinsk Test Site. The computer system for decision-making support, ReSCA, was employed for the estimations. Costs and radiological effectiveness of countermeasures were evaluated.

  17. The use of computer decision-making support systems to justify address rehabilitation of the Semipalatinsk test site area

    Viktoria V. Zaets

    2011-05-01

    Full Text Available The paper describes the development of a range of optimal protective measures for remediation of the territory of the Semipalatinsk Test Site. The computer system for decision-making support, ReSCA, was employed for the estimations. Costs and radiological effectiveness of countermeasures were evaluated.

  18. Is minimally invasive surgical treatment justified for severe acute necrotizing pancreatitis patients with dysfunction of two or more organ systems?

    Šileikis, Audrius; Pečiulytė, Emilija; Misenkienė, Agnė; Klimašauskas, Andrius; Beiša, Virgilijus; Strupas, Kęstutis

    2017-09-01

    When minimally invasive therapy was introduced, it became possible to cure some patients without open surgery, or at least delay the operation for longer than a month. To determine the optimal timing to operate on patients with severe acute necrotizing pancreatitis based on the severity of organ insufficiency. A retrospective analysis was performed in all severe acute necrotizing pancreatitis patients treated in Vilnius University Hospital Santaros Klinikos (VUL SK) from 2007 to 2016. The patients were divided into groups based on the number of dysfunctional organ systems (one or more) and whether the minimally invasive step-up approach to treatment was used. The patients with one organ dysfunction had a delay of 35 (without the step-up approach) and 36 (with the step-up approach) days before the open surgery, while the patients with two or more organ systems' dysfunction had almost an identical delay of 28 days, using both surgical treatment methods. The mortality of the patients who had one organ dysfunction and in whom the step-up approach was used was 0%, while in patients without the step-up approach it was 41.7%. In the two or more organ systems' dysfunction group, the mortality for those treated with a step-up approach was 64.3%, and without it 70.7%. The surgical treatment should be initiated with a minimally invasive procedure. Additionally, the surgery on patients with two or more organ systems' dysfunction should not be delayed for more than one month.

  19. Justify of implementation of a hot water layer system in swimming pool research reactor IEA-R1m

    Toyoda, Eduardo Yoshio; Gordon, Ana Maria Pinho Leite; Sordi, Gian-Maria A.A.

    2001-01-01

    The IPEN/CNEN-SP has a swimming pool research reactor (IEA-R1m) in operation since 1957 at 2 MW. In 1998, after some modifications, its nominal power increased to 5 MW. Among these modifications some adaptations had to be accomplished in the radiological protection and operational procedure. The present work aim to study the need of implementation of a hot water layer in order to reduce the dose in the workers in the vicinity of the reactor swimming pool. Applying the principles of radioprotection optimization, it was concluded that the decision of the construction of one hot water layer system in the reactor swimming pool, is not necessary. (author)

  20. CompTIA Linux+ study guide exam LX0-103 and exam LX0-104

    Bresnahan, Christine

    2015-01-01

    CompTIA Authorized Linux+ prepCompTIA Linux+ Study Guide is your comprehensive study guide for the Linux+ Powered by LPI certification exams. With complete coverage of 100% of the objectives on both exam LX0-103 and exam LX0-104, this study guide provides clear, concise information on all aspects of Linux administration, with a focus on the latest version of the exam. You'll gain the insight of examples drawn from real-world scenarios, with detailed guidance and authoritative coverage of key topics, including GNU and Unix commands, system operation, system administration, system services, secu

  1. Is nuclear energy ethically justifiable?

    Zuend, H.

    1988-01-01

    Nuclear technology brings the chance to provide an essential long term contribution to the energy supply of the world population and to use the raw materials uranium and thorium which have no other use. The use of nuclear energy is ethically justifiable providing certain simple fundamental rules for the design of nuclear facilities are observed. Such rules were clearly violated before the reactor accident at Chernobyl. They are, however, observed in our existing nuclear power plants. Compared with other energy systems nuclear energy has, with the exception of natural gas, the lowest risk. The consideration of the ethical justification of nuclear energy must also include the question of withdrawal. A withdrawal would have considerable social consequences for the industrial nations as well as for the developing countries. The problem of spreading alarm (and concern) by the opponents of nuclear energy should also be included in the ethical justification. 8 refs., 2 figs

  2. ISAC EPICS on Linux: the march of the penguins

    Richards, J.; Nussbaumer, R.; Rapaz, S.; Waters, G.

    2012-01-01

    The DC linear accelerators of the ISAC radioactive beam facility at TRIUMF do not impose rigorous timing constraints on the control system. Therefore a real-time operating system is not essential for device control. The ISAC Control System is completing a move to the use of the Linux operating system for hosting all EPICS IOCs. The IOC platforms include GE-Fanuc VME based CPUs for control of most optics and diagnostics, rack mounted servers for supervising PLCs, small desktop PCs for GPIB and RS232 instruments, as well as embedded ARM processors controlling CAN-bus devices that provide a suitcase sized control system. This article focuses on the experience of creating a customized Linux distribution for front-end IOC deployment. Rationale, a road-map of the process, and efficiency advantages in personnel training and system management realized by using a single OS will be discussed. (authors)

  3. Understanding Collateral Evolution in Linux Device Drivers

    Padioleau, Yoann; Lawall, Julia Laetitia; Muller, Gilles

    2006-01-01

    no tools to help in this process, collateral evolution is thus time consuming and error prone.In this paper, we present a qualitative and quantitative assessment of collateral evolution in Linux device driver code. We provide a taxonomy of evolutions and collateral evolutions, and use an automated patch......-analysis tool that we have developed to measure the number of evolutions and collateral evolutions that affect device drivers between Linux versions 2.2 and 2.6. In particular, we find that from one version of Linux to the next, collateral evolutions can account for up to 35% of the lines modified in such code....

  4. Web penetration testing with Kali Linux

    Muniz, Joseph

    2013-01-01

    Web Penetration Testing with Kali Linux contains various penetration testing methods using BackTrack that will be used by the reader. It contains clear step-by-step instructions with lot of screenshots. It is written in an easy to understand language which will further simplify the understanding for the user.""Web Penetration Testing with Kali Linux"" is ideal for anyone who is interested in learning how to become a penetration tester. It will also help the users who are new to Kali Linux and want to learn the features and differences in Kali versus Backtrack, and seasoned penetration testers

  5. The Linux command line a complete introduction

    Shotts, William E

    2012-01-01

    You've experienced the shiny, point-and-click surface of your Linux computer—now dive below and explore its depths with the power of the command line. The Linux Command Line takes you from your very first terminal keystrokes to writing full programs in Bash, the most popular Linux shell. Along the way you'll learn the timeless skills handed down by generations of gray-bearded, mouse-shunning gurus: file navigation, environment configuration, command chaining, pattern matching with regular expressions, and more.

  6. Kali Linux wireless penetration testing beginner's guide

    Ramachandran, Vivek

    2015-01-01

    If you are a security professional, pentester, or anyone interested in getting to grips with wireless penetration testing, this is the book for you. Some familiarity with Kali Linux and wireless concepts is beneficial.

  7. Two-factor Authorization in Linux

    L. S. Nosov

    2010-03-01

    Full Text Available Identification and authentication realization in OS Linux on basis of external USB-device and on basis of PAM-module program realization by the example answer on control question (enigma is considered.

  8. The Linux farm at the RCF

    Chan, A.W.; Hogue, R.W.; Throwe, T.G.; Yanuklis, T.A.

    2001-01-01

    A description of the Linux Farm at the RHIC Computing Facility (RCF) is presented. The RCF is a dedicated data processing facility for RHIC, which became operational in the summer of 2000 at Brookhaven National Laboratory

  9. Channel Bonding in Linux Ethernet Environment using Regular Switching Hub

    Chih-wen Hsueh

    2004-06-01

    Full Text Available Bandwidth plays an important role for quality of service in most network systems. There are many technologies developed to increase host bandwidth in a LAN environment. Most of them need special hardware support, such as switching hub that supports IEEE Link Aggregation standard. In this paper, we propose a Linux solution to increase the bandwidth between hosts with multiple network adapters connected to a regular switching hub. The approach is implemented as two Linux kernel modules in a LAN environment without modification to the hardware and operating systems on host machines. Packets are dispatched to bonding network adapters for transmission. The proposed approach is backward compatible, flexible and transparent to users and only one IP address is needed for multiple bonding network adapters. Evaluation experiments in TCP and UDP transmission are shown with bandwidth gain proportionally to the number of network adapters. It is suitable for large-scale LAN systems with high bandwidth requirement, such as clustering systems.

  10. Installing, Running and Maintaining Large Linux Clusters at CERN

    Bahyl, V; van Eldik, Jan; Fuchs, Ulrich; Kleinwort, Thorsten; Murth, Martin; Smith, Tim; Bahyl, Vladimir; Chardi, Benjamin; Eldik, Jan van; Fuchs, Ulrich; Kleinwort, Thorsten; Murth, Martin; Smith, Tim

    2003-01-01

    Having built up Linux clusters to more than 1000 nodes over the past five years, we already have practical experience confronting some of the LHC scale computing challenges: scalability, automation, hardware diversity, security, and rolling OS upgrades. This paper describes the tools and processes we have implemented, working in close collaboration with the EDG project [1], especially with the WP4 subtask, to improve the manageability of our clusters, in particular in the areas of system installation, configuration, and monitoring. In addition to the purely technical issues, providing shared interactive and batch services which can adapt to meet the diverse and changing requirements of our users is a significant challenge. We describe the developments and tuning that we have introduced on our LSF based systems to maximise both responsiveness to users and overall system utilisation. Finally, this paper will describe the problems we are facing in enlarging our heterogeneous Linux clusters, the progress we have ...

  11. Development of a laboratory model of SSSC using RTAI on Linux ...

    ... capability to Linux Gen- eral Purpose Operating System (GPOS) over and above the capabilities of non ... Introduction. Power transfer ... of a controller prototyping environment is Matlab/Simulink/Real-time Workshop software, which can be ...

  12. O Linux e a perspectiva da dádiva

    Renata Apgaua

    2004-06-01

    Full Text Available O objetivo deste trabalho é analisar o surgimento e consolidação do sistema operacional Linux em um contexto marcado pela hegemonia de sistemas operacionais comerciais, sendo o Windows/Microsoft o exemplo paradigmático. O idealizador do Linux optou por abrir o seu código-fonte e oferecê-lo, gratuitamente, na Internet. Desde então, pessoas de diversas partes do mundo têm participado do seu desenvolvimento. Busca-se, assim, através deste estudo, analisar as características desse espaço de sociabilidade, onde as trocas apontam para outra lógica que não a do mercado. A proposta de compreender os laços sociais no universo Linux, a partir da perspectiva da dádiva, acaba remetendo a outra discussão, que também merecerá atenção nesse estudo, qual seja: a atualidade da dádiva. Releituras de Mauss, feitas por Godbout e Caillé, indicam que a dádiva, em seu "sistema de transformações", encontra-se presente nas sociedades contemporâneas, mas não apenas nos interstícios sociais, conforme afirmava o próprio Mauss.This work's goal is to analyze the appearance and consolidation of the Linux operational system in a context marked by the hegemony of commercial operational systems, taking the Windows/Microsoft as the paradigmatic example. The creator of Linux chose to make it open-source and offer it free of charge, in the Internet. Since then, people from the various parts of the world have participated in its development. This study, therefore, seeks to analyse the features of this space of sociability, where the exchange points to another logic different of that one adopted by the market. The proposal of comprehending the social ties of the Linux universe through the perspective of gift ends up sending us into another discussion, which will also deserve attention in this study, that would be: the recentness of gift. Re-interpretations of Mauss, made by Godbout and Caillé, indicate that gif, in its "changing system", is present in

  13. The performance analysis of linux networking - packet receiving

    Wu, Wenji; Crawford, Matt; Bowden, Mark; /Fermilab

    2006-11-01

    The computing models for High-Energy Physics experiments are becoming ever more globally distributed and grid-based, both for technical reasons (e.g., to place computational and data resources near each other and the demand) and for strategic reasons (e.g., to leverage equipment investments). To support such computing models, the network and end systems, computing and storage, face unprecedented challenges. One of the biggest challenges is to transfer scientific data sets--now in the multi-petabyte (10{sup 15} bytes) range and expected to grow to exabytes within a decade--reliably and efficiently among facilities and computation centers scattered around the world. Both the network and end systems should be able to provide the capabilities to support high bandwidth, sustained, end-to-end data transmission. Recent trends in technology are showing that although the raw transmission speeds used in networks are increasing rapidly, the rate of advancement of microprocessor technology has slowed down. Therefore, network protocol-processing overheads have risen sharply in comparison with the time spent in packet transmission, resulting in degraded throughput for networked applications. More and more, it is the network end system, instead of the network, that is responsible for degraded performance of network applications. In this paper, the Linux system's packet receive process is studied from NIC to application. We develop a mathematical model to characterize the Linux packet receiving process. Key factors that affect Linux systems network performance are analyzed.

  14. BSD Portals for LINUX 2.0

    McNab, A. David; woo, Alex (Technical Monitor)

    1999-01-01

    Portals, an experimental feature of 4.4BSD, extend the file system name space by exporting certain open () requests to a user-space daemon. A portal daemon is mounted into the file name space as if it were a standard file system. When the kernel resolves a pathname and encounters a portal mount point, the remainder of the path is passed to the portal daemon. Depending on the portal "pathname" and the daemon's configuration, some type of open (2) is performed. The resulting file descriptor is passed back to the kernel which eventually returns it to the user, to whom it appears that a "normal" open has occurred. A proxy portalfs file system is responsible for kernel interaction with the daemon. The overall effect is that the portal daemon performs an open (2) on behalf of the kernel, possibly hiding substantial complexity from the calling process. One particularly useful application is implementing a connection service that allows simple scripts to open network sockets. This paper describes the implementation of portals for LINUX 2.0.

  15. Is nuclear energy ethically justifiable?

    Zuend, H.

    1987-01-01

    Nuclear technology offers the chance to make an extremely long term contribution to the energy supply of the earth. The use of nuclear energy is ethically justifiable, provided that several fundamental rules are obeyed during the technical design of nuclear installations. Such fundamental rules were unequivocally violated in the nuclear power plant Chernobyl. They are, however, fulfilled in the existing Swiss nuclear power plants. Improvements are possible in new nuclear power plants. Compared to other usable energy systems nuclear energy is second only to natural gas in minimal risk per generated energy unit. The question of ethical justification also may rightly be asked of the non-use of nuclear energy. The socially weakest members of the Swiss population would suffer most under a renunciation of nuclear energy. Future prospects for the developing countries would deteriorate considerably with a renunciation by industrial nations of nuclear energy. The widely spread fear concerning the nuclear energy in the population is a consequence of non-objective discussion. 8 refs., 2 figs

  16. Diversifying the Department of Defense Network Enterprise with Linux

    2010-03-01

    protection of DoD infrastructure. In the competitive marketplace, strategy is defined as a firm’s theory on how it gains high levels of performance...practice of discontinuing support to legacy systems. Microsoft also needs to convey it was in the user’s best interest to upgrade the operating... stockholders , Microsoft acknowledged recent notable competitors in the market place threatening their long time monopolistic enterprise. Linux (a popular

  17. Developing and Benchmarking Native Linux Applications on Android

    Batyuk, Leonid; Schmidt, Aubrey-Derrick; Schmidt, Hans-Gunther; Camtepe, Ahmet; Albayrak, Sahin

    Smartphones get increasingly popular where more and more smartphone platforms emerge. Special attention was gained by the open source platform Android which was presented by the Open Handset Alliance (OHA) hosting members like Google, Motorola, and HTC. Android uses a Linux kernel and a stripped-down userland with a custom Java VM set on top. The resulting system joins the advantages of both environments, while third-parties are intended to develop only Java applications at the moment.

  18. Infecting Windows, Linux & Mac in one go

    Computer Security Team

    2012-01-01

    Still love bashing on Windows as you believe it is an insecure operating system? Hold on a second! Just recently, a vulnerability has been published for Java 7.   It affects Windows/Linux PCs and Macs, Internet Explorer, Safari and Firefox. In fact, it affects all computers that have enabled the Java 7 plug-in in their browser (Java 6 and earlier is not affected). Once you visit a malicious website (and there are plenty already out in the wild), your computer is infected… That's "Game Over" for you.      And this is not the first time. For a while now, attackers have not been targeting the operating system itself, but rather aiming at vulnerabilities inherent in e.g. your Acrobat Reader, Adobe Flash or Java programmes. All these are standard plug-ins added into your favourite web browser which make your web-surfing comfortable (or impossible when you un-install them). A single compromised web-site, however, is sufficient to prob...

  19. Perbandingan proxy pada linux dan windows untuk mempercepat browsing website

    Dafwen Toresa

    2017-05-01

    Full Text Available AbstrakPada saat ini sangat banyak organisasi, baik pendidikan, pemerintahan,  maupun perusahaan swasta berusaha membatasi akses para pengguna ke internet dengan alasan bandwidth yang dimiliki mulai terasa lambat ketika para penggunanya mulai banyak yang melakukan browsing ke internet. Mempercepat akses browsing menjadi perhatian utama dengan memanfaatkan teknologi Proxy server. Penggunaan proxy server perlu mempertimbangkan sistem operasi pada server dan tool yang digunakan belum diketahui performansi terbaiknya pada sistem operasi apa.  Untuk itu dirasa perlu untuk menganalisis performan Proxy server pada sistem operasi berbeda yaitu Sistem Operasi Linux dengan tools Squid  dan Sistem Operasi Windows dengan tool Winroute. Kajian ini dilakukan untuk mengetahui perbandingan kecepatan browsing dari komputer pengguna (client. Browser yang digunakan di komputer pengguna adalah Mozilla Firefox. Penelitian ini menggunakan 2 komputer klien dengan pengujian masing-masingnya 5 kali pengujian pengaksesan/browsing web yang dituju melalui proxy server. Dari hasil pengujian yang dilakukan, diperoleh kesimpulan bahwa penerapan proxy server di sistem operasi linux dengan tools squid lebih cepat browsing dari klien menggunakan web browser yang sama dan komputer klien yang berbeda dari pada proxy server sistem operasi windows dengan tools winroute.  Kata kunci: Proxy, Bandwidth, Browsing, Squid, Winroute AbstractAt this time very many organizations, both education, government, and private companies try to limit the access of users to the internet on the grounds that the bandwidth owned began to feel slow when the users began to do a lot of browsing to the internet. Speed up browsing access is a major concern by utilizing Proxy server technology. The use of proxy servers need to consider the operating system on the server and the tool used is not yet known the best performance on what operating system. For that it is necessary to analyze Performance Proxy

  20. Climate tools in mainstream Linux distributions

    McKinstry, Alastair

    2015-04-01

    Debian/meterology is a project to integrate climate tools and analysis software into the mainstream Debian/Ubuntu Linux distributions. This work describes lessons learnt, and recommends practices for scientific software to be adopted and maintained in OS distributions. In addition to standard analysis tools (cdo,, grads, ferret, metview, ncl, etc.), software used by the Earth System Grid Federation was chosen for integraion, to enable ESGF portals to be built on this base; however exposing scientific codes via web APIs enables security weaknesses, normally ignorable, to be exposed. How tools are hardened, and what changes are required to handle security upgrades, are described. Secondly, to enable libraries and components (e.g. Python modules) to be integrated requires planning by writers: it is not sufficient to assume users can upgrade their code when you make incompatible changes. Here, practices are recommended to enable upgrades and co-installability of C, C++, Fortran and Python codes. Finally, software packages such as NetCDF and HDF5 can be built in multiple configurations. Tools may then expect incompatible versions of these libraries (e.g. serial and parallel) to be simultaneously available; how this was solved in Debian using "pkg-config" and shared library interfaces is described, and best practices for software writers to enable this are summarised.

  1. Linux real-time framework for fusion devices

    Neto, Andre [Associacao Euratom-IST, Instituto de Plasmas e Fusao Nuclear, Av. Rovisco Pais, 1049-001 Lisboa (Portugal)], E-mail: andre.neto@cfn.ist.utl.pt; Sartori, Filippo; Piccolo, Fabio [Euratom-UKAEA, Culham Science Centre, Abingdon, Oxon OX14 3DB (United Kingdom); Barbalace, Antonio [Euratom-ENEA Association, Consorzio RFX, 35127 Padova (Italy); Vitelli, Riccardo [Dipartimento di Informatica, Sistemi e Produzione, Universita di Roma, Tor Vergata, Via del Politecnico 1-00133, Roma (Italy); Fernandes, Horacio [Associacao Euratom-IST, Instituto de Plasmas e Fusao Nuclear, Av. Rovisco Pais, 1049-001 Lisboa (Portugal)

    2009-06-15

    A new framework for the development and execution of real-time codes is currently being developed and commissioned at JET. The foundations of the system are Linux, the Real Time Application Interface (RTAI) and a wise exploitation of the new i386 multi-core processors technology. The driving motivation was the need to find a real-time operating system for the i386 platform able to satisfy JET Vertical Stabilisation Enhancement project requirements: 50 {mu}s cycle time. Even if the initial choice was the VxWorks operating system, it was decided to explore an open source alternative, mostly because of the costs involved in the commercial product. The work started with the definition of a precise set of requirements and milestones to achieve: Linux distribution and kernel versions to be used for the real-time operating system; complete characterization of the Linux/RTAI real-time capabilities; exploitation of the multi-core technology; implementation of all the required and missing features; commissioning of the system. Latency and jitter measurements were compared for Linux and RTAI in both user and kernel-space. The best results were attained using the RTAI kernel solution where the time to reschedule a real-time task after an external interrupt is of 2.35 {+-} 0.35 {mu}s. In order to run the real-time codes in the kernel-space, a solution to provide user-space functionalities to the kernel modules had to be designed. This novel work provided the most common functions from the standard C library and transparent interaction with files and sockets to the kernel real-time modules. Kernel C++ support was also tested, further developed and integrated in the framework. The work has produced very convincing results so far: complete isolation of the processors assigned to real-time from the Linux non real-time activities, high level of stability over several days of benchmarking operations and values well below 3 {mu}s for task rescheduling after external interrupt. From

  2. Linux real-time framework for fusion devices

    Neto, Andre; Sartori, Filippo; Piccolo, Fabio; Barbalace, Antonio; Vitelli, Riccardo; Fernandes, Horacio

    2009-01-01

    A new framework for the development and execution of real-time codes is currently being developed and commissioned at JET. The foundations of the system are Linux, the Real Time Application Interface (RTAI) and a wise exploitation of the new i386 multi-core processors technology. The driving motivation was the need to find a real-time operating system for the i386 platform able to satisfy JET Vertical Stabilisation Enhancement project requirements: 50 μs cycle time. Even if the initial choice was the VxWorks operating system, it was decided to explore an open source alternative, mostly because of the costs involved in the commercial product. The work started with the definition of a precise set of requirements and milestones to achieve: Linux distribution and kernel versions to be used for the real-time operating system; complete characterization of the Linux/RTAI real-time capabilities; exploitation of the multi-core technology; implementation of all the required and missing features; commissioning of the system. Latency and jitter measurements were compared for Linux and RTAI in both user and kernel-space. The best results were attained using the RTAI kernel solution where the time to reschedule a real-time task after an external interrupt is of 2.35 ± 0.35 μs. In order to run the real-time codes in the kernel-space, a solution to provide user-space functionalities to the kernel modules had to be designed. This novel work provided the most common functions from the standard C library and transparent interaction with files and sockets to the kernel real-time modules. Kernel C++ support was also tested, further developed and integrated in the framework. The work has produced very convincing results so far: complete isolation of the processors assigned to real-time from the Linux non real-time activities, high level of stability over several days of benchmarking operations and values well below 3 μs for task rescheduling after external interrupt. From being the

  3. Mastering Kali Linux for advanced penetration testing

    Beggs, Robert W

    2014-01-01

    This book provides an overview of the kill chain approach to penetration testing, and then focuses on using Kali Linux to provide examples of how this methodology is applied in the real world. After describing the underlying concepts, step-by-step examples are provided that use selected tools to demonstrate the techniques. If you are an IT professional or a security consultant who wants to maximize the success of your network testing using some of the advanced features of Kali Linux, then this book is for you. This book will teach you how to become an expert in the pre-engagement, management,

  4. Embedded Linux projects using Yocto project cookbook

    González, Alex

    2015-01-01

    If you are an embedded developer learning about embedded Linux with some experience with the Yocto project, this book is the ideal way to become proficient and broaden your knowledge with examples that are immediately applicable to your embedded developments. Experienced embedded Yocto developers will find new insight into working methodologies and ARM specific development competence.

  5. Kernel Korner : The Linux keyboard driver

    Brouwer, A.E.

    1995-01-01

    Our Kernel Korner series continues with an article describing the Linux keyboard driver. This article is not for "Kernel Hackers" only--in fact, it will be most useful to those who wish to use their own keyboard to its fullest potential, and those who want to write programs to take advantage of the

  6. Linux Incident Response Volatile Data Analysis Framework

    McFadden, Matthew

    2013-01-01

    Cyber incident response is an emphasized subject area in cybersecurity in information technology with increased need for the protection of data. Due to ongoing threats, cybersecurity imposes many challenges and requires new investigative response techniques. In this study a Linux Incident Response Framework is designed for collecting volatile data…

  7. Journalism as Justified True Belief

    Sílvia Lisboa

    2015-12-01

    Full Text Available If it is important to think of journalism as a form of knowledge, then how does it become knowledge? How does this process work? In order to answer this question, this article proposes a new understanding of journalism as a subject; presenting it as a justified true belief. We think of journalism being based on pillars of truth and justification, conditions necessary in order for Epistemology to grant it the status of knowledge. We address the concept of truth and show how journalistic reports are justified to the public as well as consider the central role of credibility in this process. We add to the epistemic conception by using concepts of discourse that help to understand how journalism provides evidence through its intentions, its authority and its ability. This evidence acts like a guide for the reader towards forming opinions on journalistic reports and recognizing journalism as a form of knowledge.

  8. Supplemental Material, PWQ42_2_747845_Choma_and_Prusaczyk - The Effects of System Justifying Beliefs on Skin-Tone Surveillance, Skin-Color Dissatisfaction, and Skin-Bleaching Behavior

    Choma, Becky L.; Prusaczyk, Elvira

    2018-01-01

    Supplemental Material, PWQ42_2_747845_Choma_and_Prusaczyk for The Effects of System Justifying Beliefs on Skin-Tone Surveillance, Skin-Color Dissatisfaction, and Skin-Bleaching Behavior by Becky L. Choma, and Elvira Prusaczyk in Psychology of Women Quarterly

  9. About 'restriction', 'justified' and 'necessary'

    Werlauff, Erik

    2016-01-01

    The article is an academic fairy tale about why and how all national corporate tax protection legislation should undergo a 3-part test to ensure its consistency with EU law. Each Member State introduce a compulsory 3-step test for each new (corporate) tax provision. The test is simple: (1) Does...... the tax provision constitute a restriction in the sense of EU law? (2) If the answer is yes: Is the restriction justified? (3) If the answer is yes: Is the restriction necessary?"...

  10. Enforcing the use of API functions in Linux code

    Lawall, Julia; Muller, Gilles; Palix, Nicolas Jean-Michel

    2009-01-01

    In the Linux kernel source tree, header files typically define many small functions that have a simple behavior but are critical to ensure readability, correctness, and maintainability. We have observed, however, that some Linux code does not use these functions systematically. In this paper, we...... in the header file include/linux/usb.h....

  11. KNBD: A Remote Kernel Block Server for Linux

    Becker, Jeff

    1999-01-01

    I am developing a prototype of a Linux remote disk block server whose purpose is to serve as a lower level component of a parallel file system. Parallel file systems are an important component of high performance supercomputers and clusters. Although supercomputer vendors such as SGI and IBM have their own custom solutions, there has been a void and hence a demand for such a system on Beowulf-type PC Clusters. Recently, the Parallel Virtual File System (PVFS) project at Clemson University has begun to address this need (1). Although their system provides much of the functionality of (and indeed was inspired by) the equivalent file systems in the commercial supercomputer market, their system is all in user-space. Migrating their 10 services to the kernel could provide a performance boost, by obviating the need for expensive system calls. Thanks to Pavel Machek, the Linux kernel has provided the network block device (2) with kernels 2.1.101 and later. You can configure this block device to redirect reads and writes to a remote machine's disk. This can be used as a building block for constructing a striped file system across several nodes.

  12. Millisecond accuracy video display using OpenGL under Linux.

    Stewart, Neil

    2006-02-01

    To measure people's reaction times to the nearest millisecond, it is necessary to know exactly when a stimulus is displayed. This article describes how to display stimuli with millisecond accuracy on a normal CRT monitor, using a PC running Linux. A simple C program is presented to illustrate how this may be done within X Windows using the OpenGL rendering system. A test of this system is reported that demonstrates that stimuli may be consistently displayed with millisecond accuracy. An algorithm is presented that allows the exact time of stimulus presentation to be deduced, even if there are relatively large errors in measuring the display time.

  13. Migration of alcator C-Mod computer infrastructure to Linux

    Fredian, T.W.; Greenwald, M.; Stillerman, J.A.

    2004-01-01

    The Alcator C-Mod fusion experiment at MIT in Cambridge, Massachusetts has been operating for twelve years. The data handling for the experiment during most of this period was based on MDSplus running on a cluster of VAX and Alpha computers using the OpenVMS operating system. While the OpenVMS operating system provided a stable reliable platform, the support of the operating system and the software layered on the system has deteriorated in recent years. With the advent of extremely powerful low cost personal computers and the increasing popularity and robustness of the Linux operating system a decision was made to migrate the data handling systems for C-Mod to a collection of PC's running Linux. This paper will describe the new system configuration, the effort involved in the migration from OpenVMS, the results of the first run campaign under the new configuration and the impact the switch may have on the rest of the MDSplus community

  14. Journalism as Justified True Belief

    Lisboa, Sílvia; Benetti, Marcia

    2015-01-01

    If it is important to think of journalism as a form of knowledge, then how does it become knowledge? How does this process work? In order to answer this question, this article proposes a new understanding of journalism as a subject; presenting it as a justified true belief. We think of journalism being based on pillars of truth and justification, conditions necessary in order for Epistemology to grant it the status of knowledge. We address the concept of truth and show how journalistic report...

  15. IP Security für Linux

    Parthey, Mirko

    2001-01-01

    Die Nutzung des Internet für sicherheitskritische Anwendungen erfordert kryptographische Schutzmechanismen. IP Security (IPsec) definiert dafür geeignete Protokolle. Diese Arbeit gibt einen Überblick über IPsec. Eine IPsec-Implementierung für Linux (FreeS/WAN) wird auf Erweiterbarkeit und Praxistauglichkeit untersucht. Using the Internet in security-critical areas requires cryptographic protection, for which IP Security (IPsec) defines suitable protocols. This paper gives an overview of IP...

  16. GSI operation software: migration from OpenVMS TO Linux

    Huhmann, R.; Froehlich, G.; Juelicher, S.; Schaa, V.R.W.

    2012-01-01

    The current operation software at GSI, controlling the linac, beam transfer lines, synchrotron and storage ring, has been developed over a period of more than two decades using OpenVMS on Alpha-Workstations. The GSI accelerator facilities will serve as an injector chain for the new FAIR accelerator complex for which a control system is currently developed. To enable reuse and integration of parts of the distributed GSI software system, in particular the linac operation software, within the FAIR control system, the corresponding software components must be migrated to Linux. Inter-operability with FAIR controls applications is achieved by adding a generic middle-ware interface accessible from Java applications. For porting applications to Linux a set of libraries and tools has been developed covering the necessary OpenVMS system functionality. Currently, core applications and services are already ported or rewritten and functionally tested but not in operational usage. This paper presents the current status of the project and concepts for putting the migrated software into operation. (authors)

  17. Quality of service on Linux for the Atlas TDAQ event building network

    Yasu, Y.; Manabe, A.; Fujii, H.; Watase, Y.; Nagasaka, Y.; Hasegawa, Y.; Shimojima, M.; Nomachi, M.

    2001-01-01

    Congestion control for packets sent on a network is important for DAQ systems that contain an event builder using switching network technologies. Quality of Service (QoS) is a technique for congestion control. Recent Linux releases provide QoS in the kernel to manage network traffic. The authors have analyzed the packet-loss and packet distribution for the event builder prototype of the Atlas TDAQ system. The authors used PC/Linux with Gigabit Ethernet network as the testbed. The results showed that QoS using CBQ and TBF eliminated packet loss on UDP/IP transfer while the UDP/IP transfer in best effort made lots of packet loss. The result also showed that the QoS overhead was small. The authors concluded that QoS on Linux performed efficiently in TCP/IP and UDP/IP and will have an important role of the Atlas TDAQ system

  18. ARTiS, an Asymmetric Real-Time Scheduler for Linux on Multi-Processor Architectures

    Piel , Éric; Marquet , Philippe; Soula , Julien; Osuna , Christophe; Dekeyser , Jean-Luc

    2005-01-01

    The ARTiS system is a real-time extension of the GNU/Linux scheduler dedicated to SMP (Symmetric Multi-Processors) systems. It allows to mix High Performance Computing and real-time. ARTiS exploits the SMP architecture to guarantee the preemption of a processor when the system has to schedule a real-time task. The implementation is available as a modification of the Linux kernel, especially focusing (but not restricted to) IA-64 architecture. The basic idea of ARTiS is to assign a selected se...

  19. Berkeley lab checkpoint/restart (BLCR) for Linux clusters

    Hargrove, Paul H; Duell, Jason C

    2006-01-01

    This article describes the motivation, design and implementation of Berkeley Lab Checkpoint/Restart (BLCR), a system-level checkpoint/restart implementation for Linux clusters that targets the space of typical High Performance Computing applications, including MPI. Application-level solutions, including both checkpointing and fault-tolerant algorithms, are recognized as more time and space efficient than system-level checkpoints, which cannot make use of any application-specific knowledge. However, system-level checkpointing allows for preemption, making it suitable for responding to ''fault precursors'' (for instance, elevated error rates from ECC memory or network CRCs, or elevated temperature from sensors). Preemption can also increase the efficiency of batch scheduling; for instance reducing idle cycles (by allowing for shutdown without any queue draining period or reallocation of resources to eliminate idle nodes when better fitting jobs are queued), and reducing the average queued time (by limiting large jobs to running during off-peak hours, without the need to limit the length of such jobs). Each of these potential uses makes BLCR a valuable tool for efficient resource management in Linux clusters

  20. Tri-Laboratory Linux Capacity Cluster 2007 SOW

    Seager, M.

    2007-01-01

    well, the budget demands are extreme and new, more cost effective ways of fielding these systems must be developed. This Tri-Laboratory Linux Capacity Cluster (TLCC) procurement represents the ASC first investment vehicle in these capacity systems. It also represents a new strategy for quickly building, fielding and integrating many Linux clusters of various sizes into classified and unclassified production service through a concept of Scalable Units (SU). The programmatic objective is to dramatically reduce the overall Total Cost of Ownership (TCO) of these 'capacity' systems relative to the best practices in Linux Cluster deployments today. This objective only makes sense in the context of these systems quickly becoming very robust and useful production clusters under the crushing load that will be inflicted on them by the ASC and SSP scientific simulation capacity workload.

  1. Implementing Discretionary Access Control with Time Character in Linux and Performance Analysis

    TAN Liang; ZHOU Ming-Tian

    2006-01-01

    DAC (Discretionary Access Control Policy) is access control based on ownership relations between subject and object, the subject can discretionarily decide on that who, by what methods, can access his owns object. In this paper, the system time is looked as a basic secure element. The DAC_T (Discretionary Access Control Policy with Time Character) is presented and formalized. The DAC_T resolves that the subject can discretionarily decide that who, on when, can access his owns objects. And then the DAC_T is implemented on Linux based on GFAC (General Framework for Access Control), and the algorithm is put forward. Finally, the performance analysis for the DAC_T_Linux is carried out. It is proved that the DAC_T_Linux not only can realize time constraints between subject and object but also can still be accepted by us though its performance have been decreased.

  2. Research and implementation of intelligent gateway driver layer based on Linux bus

    ZHANG Jian

    2016-10-01

    Full Text Available Currently,in the field of smart home,there is no relevant organization that yet has proposed an unified protocol standard.It increases the complexity and limitations of heterogeneous gateway software framework design that different vendor′s devices have different communication mode and protocol standards.In this paper,a serial of interfaces are provided by Linux kernel,and a virtual bus is registered under Linux.The physical device drivers are able to connect to the virtual bus.The detailed designs of the communication protocol are placed in the underlying adapters,making the integration of heterogeneous networks more natural.At the same time,designing the intelligent gateway system driver layer based on Linux bus can let the application layer be more unified and clear logical.And it also let the hardware access network become more convenient and distinct.

  3. Linux toys II 9 Cool New Projects for Home, Office, and Entertainment

    Negus, Christopher

    2006-01-01

    Builds on the success of the original Linux Toys (0-7645-2508-5) and adds projects using different Linux distributionsAll-new toys in this edition include a car computer system with built-in entertainment and navigation features, bootable movies, a home surveillance monitor, a LEGO Mindstorms robot, and a weather mapping stationIntroduces small business opportunities with an Internet radio station and Internet caf ̌projectsCompanion Web site features specialized hardware drivers, software interfaces, music and game software, project descriptions, and discussion forumsIncludes a CD-ROM with scr

  4. LPIC-2 Linux Professional Institute Certification Study Guide Exams 201 and 202

    Smith, Roderick W

    2011-01-01

    The first book to cover the LPIC-2 certification Linux allows developers to update source code freely, making it an excellent, low-cost, secure alternative to alternate, more expensive operating systems. It is for this reason that the demand for IT professionals to have an LPI certification is so strong. This study guide provides unparalleled coverage of the LPIC-2 objectives for exams 201 and 202. Clear and concise coverage examines all Linux administration topics while practical, real-world examples enhance your learning process. On the CD, you'll find the Sybex Test Engine, electronic flash

  5. Memanfaatkan Sistem Operasi Linux Untuk Keamanan Data Pada E-commerce

    Isnania

    2012-01-01

    E-commerce is one of the major networks to do the transaction, where security is an issue that must be considered vital to the security of customer data and transactions. To realize the process of e-commerce, let prepared operating system (OS) that are reliable to secure the transaction path and also Dynamic Database back end that provides a product catalog that will be sold online. For technology, we can adopt open source technologies that are all available on linux. On linux it's too bundle...

  6. PhyLIS: A Simple GNU/Linux Distribution for Phylogenetics and Phyloinformatics

    Robert C. Thomson

    2009-01-01

    Full Text Available PhyLIS is a free GNU/Linux distribution that is designed to provide a simple, standardized platform for phylogenetic and phyloinformatic analysis. The operating system incorporates most commonly used phylogenetic software, which has been pre-compiled and pre-configured, allowing for straightforward application of phylogenetic methods and development of phyloinformatic pipelines in a stable Linux environment. The software is distributed as a live CD and can be installed directly or run from the CD without making changes to the computer. PhyLIS is available for free at http://www.eve.ucdavis.edu/rcthomson/phylis/.

  7. PhyLIS: a simple GNU/Linux distribution for phylogenetics and phyloinformatics.

    Thomson, Robert C

    2009-07-30

    PhyLIS is a free GNU/Linux distribution that is designed to provide a simple, standardized platform for phylogenetic and phyloinformatic analysis. The operating system incorporates most commonly used phylogenetic software, which has been pre-compiled and pre-configured, allowing for straightforward application of phylogenetic methods and development of phyloinformatic pipelines in a stable Linux environment. The software is distributed as a live CD and can be installed directly or run from the CD without making changes to the computer. PhyLIS is available for free at http://www.eve.ucdavis.edu/rcthomson/phylis/.

  8. Aplicación de RT-Linux en el control de motores de pasos. Parte II; Appication of RT-Linux in the Control of Steps Motors. Part II

    Ernesto Duany Renté

    2011-02-01

    Full Text Available Este trabajo complementa al presentado anteriormente: "Aplicación de RT-Linux en el control de motoresde pasos. Primera parte", de manera que se puedan relacionar a las tareas de adquisición y control para laobtención de un sistema lo más exacto posible. Las técnicas empleadas son las de tiempo real aprovechandolas posibilidades del microkernel RT-Linux y los software libres contenidos en sistemas Unix/Linux. Lasseñales se obtienen mediante un conversor AD y mostradas en pantalla empleando el Gnuplot.  The work presented in this paper is a complement to the control and acquisition tasks which were explainedin "Application of RT-Linux in the Control of Steps Motors. First Part", so that those both real time taskscan be fully related in order to make the whole control system more accurate. The employed techniquesare those of Real Time Taking advantage of the possibilities of the micro kernel RT-Linux and the freesoftware distributed in the Unix/Linux operating systems. The signals are obtained by means of an ADconverter and are shown in screen using Gnuplot.

  9. NSC KIPT Linux cluster for computing within the CMS physics program

    Levchuk, L.G.; Sorokin, P.V.; Soroka, D.V.

    2002-01-01

    The architecture of the NSC KIPT specialized Linux cluster constructed for carrying out work on CMS physics simulations and data processing is described. The configuration of the portable batch system (PBS) on the cluster is outlined. Capabilities of the cluster in its current configuration to perform CMS physics simulations are pointed out

  10. Impact on TRMM Products of Conversion to Linux

    Stocker, Erich Franz; Kwiatkowski, John

    2008-01-01

    In June 2008, TRMM data processing will be assumed by the Precipitation Processing System (PPS). This change will also mean a change in the hardware production environment from an SGI 32 bit IRIX processing environment to a Linux (Beowulf) 64 bit processing environment. This change of platform and operating system addressing (32 to 64) has some influence on data values in the TRMM data products. This paper will describe the transition architecture and scheduling. It will also provide an analysis of what the nature of the product differences will be. It will demonstrate that the differences are not scientifically significant and are generally not visible. However, they are not always identical with those which the SGI would produce.

  11. Extracting Feature Model Changes from the Linux Kernel Using FMDiff

    Dintzner, N.J.R.; Van Deursen, A.; Pinzger, M.

    2014-01-01

    The Linux kernel feature model has been studied as an example of large scale evolving feature model and yet details of its evolution are not known. We present here a classification of feature changes occurring on the Linux kernel feature model, as well as a tool, FMDiff, designed to automatically

  12. Malware Memory Analysis of the Jynx2 Linux Rootkit (Part 1): Investigating a Publicly Available Linux Rootkit Using the Volatility Memory Analysis Framework

    2014-10-01

    represented by the Minister of National Defence, 2014 © Sa Majesté la Reine (en droit du Canada), telle que représentée par le ministre de la Défense...analysis techniques is outside the scope of this work, as it requires a comprehensive study of operating system internals and software reverse engineering...2 Peripheral concerns 2.1 Why examine Linux memory images or make them available? After extensively searching the available public

  13. FLUKA-LIVE-an embedded framework, for enabling a computer to execute FLUKA under the control of a Linux OS

    Cohen, A.; Battistoni, G.; Mark, S.

    2008-01-01

    This paper describes a Linux-based OS framework for integrating the FLUKA Monte Carlo software (currently distributed only for Linux) into a CD-ROM, resulting in a complete environment for a scientist to edit, link and run FLUKA routines-without the need to install a UNIX/Linux operating system. The building process includes generating from scratch a complete operating system distribution which will, when operative, build all necessary components for successful operation of FLUKA software and libraries. Various source packages, as well as the latest kernel sources, are freely available from the Internet. These sources are used to create a functioning Linux system that integrates several core utilities in line with the main idea-enabling FLUKA to act as if it was running under a popular Linux distribution or even a proprietary UNIX workstation. On boot-up a file system will be created and the contents from the CD will be uncompressed and completely loaded into RAM-after which the presence of the CD is no longer necessary, and could be removed for use on a second computer. The system can operate on any i386 PC as long as it can boot from a CD

  14. A Quantitative Analysis of Variability Warnings in Linux

    Melo, Jean; Flesborg, Elvis; Brabrand, Claus

    2015-01-01

    In order to get insight into challenges with quality in highly-configurable software, we analyze one of the largest open source projects, the Linux kernel, and quantify basic properties of configuration-related warnings. We automatically analyze more than 20 thousand valid and distinct random...... configurations, in a computation that lasted more than a month. We count and classify a total of 400,000 warnings to get an insight in the distribution of warning types, and the location of the warnings. We run both on a stable and unstable version of the Linux kernel. The results show that Linux contains...

  15. Pro Oracle database 11g RAC on Linux

    Shaw, Steve

    2010-01-01

    Pro Oracle Database 11g RAC on Linux provides full-life-cycle guidance on implementing Oracle Real Application Clusters in a Linux environment. Real Application Clusters, commonly abbreviated as RAC, is Oracle's industry-leading architecture for scalable and fault-tolerant databases. RAC allows you to scale up and down by simply adding and subtracting inexpensive Linux servers. Redundancy provided by those multiple, inexpensive servers is the basis for the failover and other fault-tolerance features that RAC provides. Written by authors well-known for their talent with RAC, Pro Oracle Database

  16. Tri-Laboratory Linux Capacity Cluster 2007 SOW

    Seager, M

    2007-03-22

    ). However, given the growing need for 'capability' systems as well, the budget demands are extreme and new, more cost effective ways of fielding these systems must be developed. This Tri-Laboratory Linux Capacity Cluster (TLCC) procurement represents the ASC first investment vehicle in these capacity systems. It also represents a new strategy for quickly building, fielding and integrating many Linux clusters of various sizes into classified and unclassified production service through a concept of Scalable Units (SU). The programmatic objective is to dramatically reduce the overall Total Cost of Ownership (TCO) of these 'capacity' systems relative to the best practices in Linux Cluster deployments today. This objective only makes sense in the context of these systems quickly becoming very robust and useful production clusters under the crushing load that will be inflicted on them by the ASC and SSP scientific simulation capacity workload.

  17. Open discovery: An integrated live Linux platform of Bioinformatics tools.

    Vetrivel, Umashankar; Pilla, Kalabharath

    2008-01-01

    Historically, live linux distributions for Bioinformatics have paved way for portability of Bioinformatics workbench in a platform independent manner. Moreover, most of the existing live Linux distributions limit their usage to sequence analysis and basic molecular visualization programs and are devoid of data persistence. Hence, open discovery - a live linux distribution has been developed with the capability to perform complex tasks like molecular modeling, docking and molecular dynamics in a swift manner. Furthermore, it is also equipped with complete sequence analysis environment and is capable of running windows executable programs in Linux environment. Open discovery portrays the advanced customizable configuration of fedora, with data persistency accessible via USB drive or DVD. The Open Discovery is distributed free under Academic Free License (AFL) and can be downloaded from http://www.OpenDiscovery.org.in.

  18. Linux containers networking: performance and scalability of kernel modules

    Claassen, J.; Koning, R.; Grosso, P.; Oktug Badonnel, S.; Ulema, M.; Cavdar, C.; Zambenedetti Granville, L.; dos Santos, C.R.P.

    2016-01-01

    Linux container virtualisation is gaining momentum as lightweight technology to support cloud and distributed computing. Applications relying on container architectures might at times rely on inter-container communication, and container networking solutions are emerging to address this need.

  19. After the first five years: central Linux support at DESY

    Knut Woller; Thorsten Kleinwort; Peter Jung

    2001-01-01

    The authors will describe how Linux is embedded into DESY's unix computing, their support concept and policies, tools used and developed, and the challenges which they are facing now that the number of supported PCs is rapidly approaching one thousand

  20. On methods to increase the security of the Linux kernel

    Matvejchikov, I.V.

    2014-01-01

    Methods to increase the security of the Linux kernel for the implementation of imposed protection tools have been examined. The methods of incorporation into various subsystems of the kernel on the x86 architecture have been described [ru

  1. Linux vallutab arvutiilma / Scott Handy ; interv. Kristjan Otsmann

    Handy, Scott

    2000-01-01

    IBM tarkvaragrupi Linuxi lahenduste turundusdirektor S. Handy prognoosib, et kolme-nelja aasta pärast kasutab tasuta operatsioonisüsteemi Linux sama palju arvuteid kui Windowsi operatsioonisüsteemi

  2. Vabavarana levitatav Linux alles viib end massidesse / Erik Aru

    Aru, Erik

    2004-01-01

    Tasuta operatsioonisüsteem Linux leiab maailmas aina laialdasemat kasutust. Operatsioonisüsteemi eeldusteks peetakse töö- ja viirusekindlust. Lisad: Toshiba lahing DVD tuleviku pärast. Vastuseks vt. Maaleht 16. dets. lk. 12

  3. Assessment of VME-PCI Interfaces with Linux Drivers

    Schossmater, K; CERN. Geneva

    2000-01-01

    Abstract This report summarises the performance measurements and experiences recorded by testing three commercial VME-PCI interfaces with their Linux drivers. These interfaces are manufactured by Wiener, National Instruments and SBS Bit 3. The developed C programs are reading/writing a VME memory in different transfer modes via these interfaces. A dual processor HP Kayak XA-s workstation was used with the CERN certified Red Hat Linux 6.1 running on it.

  4. Argonne National Lab gets Linux network teraflop cluster

    2003-01-01

    "Linux NetworX, Salt Lake City, Utah, has delivered an Evolocity II (E2) Linux cluster to Argonne National Laboratory that is capable of performing more than one trillion calculations per second (1 teraFLOP). The cluster, named "Jazz" by Argonne, is designed to provide optimum performance for multiple disciplines such as chemistry, physics and reactor engineering and will be used by the entire scientific community at the Lab" (1 page).

  5. Empirical tests of Zipf's law mechanism in open source Linux distribution.

    Maillart, T; Sornette, D; Spaeth, S; von Krogh, G

    2008-11-21

    Zipf's power law is a ubiquitous empirical regularity found in many systems, thought to result from proportional growth. Here, we establish empirically the usually assumed ingredients of stochastic growth models that have been previously conjectured to be at the origin of Zipf's law. We use exceptionally detailed data on the evolution of open source software projects in Linux distributions, which offer a remarkable example of a growing complex self-organizing adaptive system, exhibiting Zipf's law over four full decades.

  6. Debugging Nondeterministic Failures in Linux Programs through Replay Analysis

    Shakaiba Majeed

    2018-01-01

    Full Text Available Reproducing a failure is the first and most important step in debugging because it enables us to understand the failure and track down its source. However, many programs are susceptible to nondeterministic failures that are hard to reproduce, which makes debugging extremely difficult. We first address the reproducibility problem by proposing an OS-level replay system for a uniprocessor environment that can capture and replay nondeterministic events needed to reproduce a failure in Linux interactive and event-based programs. We then present an analysis method, called replay analysis, based on the proposed record and replay system to diagnose concurrency bugs in such programs. The replay analysis method uses a combination of static analysis, dynamic tracing during replay, and delta debugging to identify failure-inducing memory access patterns that lead to concurrency failure. The experimental results show that the presented record and replay system has low-recording overhead and hence can be safely used in production systems to catch rarely occurring bugs. We also present few concurrency bug case studies from real-world applications to prove the effectiveness of the proposed bug diagnosis framework.

  7. LPIC-1 Linux Professional Institute certification study guide exam 101-400 and exam 102-400

    Bresnahan, Christine

    2015-01-01

    Thorough LPIC-1 exam prep, with complete coverage and bonus study tools LPIC-1Study Guide is your comprehensive source for the popular Linux Professional Institute Certification Level 1 exam, fully updated to reflect the changes to the latest version of the exam. With 100% coverage of objectives for both LPI 101 and LPI 102, this book provides clear and concise information on all Linux administration topics and practical examples drawn from real-world experience. Authoritative coverage of key exam topics includes GNU and UNIX commands, devices, file systems, file system hierarchy, user interf

  8. MySQL databases as part of the Online Business, using a platform based on Linux

    Ion-Sorin STROE

    2011-09-01

    Full Text Available The Internet is a business development environment that has major advantages over traditional environment. From a financial standpoint, the initial investment is much reduced and, as yield, the chances of success are considerably higher. Developing an online business also depends on the manager’s ability to use the best solutions, sustainable on a long term. The current trend is to decrease the costs for the technical platform by adopting open-source license products. Such platform is based on a Linux operating system and a database system based on MySQL product. This article aims to answer two basic questions: “A platform based on Linux and MySQL can handle the demands of an online business?” and “Adopting such a solution has the effect of increasing profitability?”

  9. Free and open source software at CERN: integration of drivers in the Linux kernel

    Gonzalez Cobas, J.D.; Iglesias Gonsalvez, S.; Howard Lewis, J.; Serrano, J.; Vanga, M.; Cota, E.G.; Rubini, A.; Vaga, F.

    2012-01-01

    Most device drivers written for accelerator control systems suffer from a severe lack of portability due to the ad hoc nature of the code, often embodied with intimate knowledge of the particular machine it is deployed in. In this paper we challenge this practice by arguing for the opposite approach: development in the open, which in our case translates into the integration of our code within the Linux kernel. We make our case by describing the upstream merge effort of the tsi148 driver, a critical (and complex) component of the control system. The encouraging results from this effort have then led us to follow the same approach with two more ambitious projects, currently in the works: Linux support for the upcoming FMC boards and a new I/O subsystem. (authors)

  10. Application of the Linux cluster for exhaustive window haplotype analysis using the FBAT and Unphased programs.

    Mishima, Hiroyuki; Lidral, Andrew C; Ni, Jun

    2008-05-28

    Genetic association studies have been used to map disease-causing genes. A newly introduced statistical method, called exhaustive haplotype association study, analyzes genetic information consisting of different numbers and combinations of DNA sequence variations along a chromosome. Such studies involve a large number of statistical calculations and subsequently high computing power. It is possible to develop parallel algorithms and codes to perform the calculations on a high performance computing (HPC) system. However, most existing commonly-used statistic packages for genetic studies are non-parallel versions. Alternatively, one may use the cutting-edge technology of grid computing and its packages to conduct non-parallel genetic statistical packages on a centralized HPC system or distributed computing systems. In this paper, we report the utilization of a queuing scheduler built on the Grid Engine and run on a Rocks Linux cluster for our genetic statistical studies. Analysis of both consecutive and combinational window haplotypes was conducted by the FBAT (Laird et al., 2000) and Unphased (Dudbridge, 2003) programs. The dataset consisted of 26 loci from 277 extended families (1484 persons). Using the Rocks Linux cluster with 22 compute-nodes, FBAT jobs performed about 14.4-15.9 times faster, while Unphased jobs performed 1.1-18.6 times faster compared to the accumulated computation duration. Execution of exhaustive haplotype analysis using non-parallel software packages on a Linux-based system is an effective and efficient approach in terms of cost and performance.

  11. The Self-Justifying Desire for Happiness

    Rodogno, Raffaele

    2004-01-01

    In Happiness, Tabensky equates the notion of happiness to Aristotelian eudaimonia. I shall claim that doing so amounts to equating two concepts that moderns cannot conceptually equate, namely, the good for a person and the good person or good life. In §2 I examine the way in which Tabensky deals...... with this issue and claim that his idea of happiness is as problematic for us moderns as is any translation of the notion of eudaimonia in terms of happiness. Naturally, if happiness understood as eudaimonia is ambiguous, so will be the notion of a desire for happiness, which we find at the core of Tabensky......'s whole project. In §3 I shall be concerned with another aspect of the desire for happiness; namely, its alleged self-justifying nature. I will attempt to undermine the idea that this desire is self-justifying by undermining the criterion on which Tabensky takes self-justifiability to rest, i.e. its...

  12. An integrated genetic data environment (GDE)-based LINUX interface for analysis of HIV-1 and other microbial sequences.

    De Oliveira, T; Miller, R; Tarin, M; Cassol, S

    2003-01-01

    Sequence databases encode a wealth of information needed to develop improved vaccination and treatment strategies for the control of HIV and other important pathogens. To facilitate effective utilization of these datasets, we developed a user-friendly GDE-based LINUX interface that reduces input/output file formatting. GDE was adapted to the Linux operating system, bioinformatics tools were integrated with microbe-specific databases, and up-to-date GDE menus were developed for several clinically important viral, bacterial and parasitic genomes. Each microbial interface was designed for local access and contains Genbank, BLAST-formatted and phylogenetic databases. GDE-Linux is available for research purposes by direct application to the corresponding author. Application-specific menus and support files can be downloaded from (http://www.bioafrica.net).

  13. Fast scalar data buffering interface in Linux 2.6 kernel

    Homs, A.

    2012-01-01

    Key instrumentation devices like counter/timers, analog-to-digital converters and encoders provide scalar data input. Many of them allow fast acquisitions, but do not provide hardware triggering or buffering mechanisms. A Linux 2.4 kernel driver called Hook was developed at the ESRF as a generic software-triggered buffering interface. This work presents the portage of the ESRF Hook interface to the Linux 2.6 kernel. The interface distinguishes 2 independent functional groups: trigger event generators and data channels. Devices in the first group create software events, like hardware interrupts generated by timers or external signals. On each event, one or more device channels on the second group are read and stored in kernel buffers. The event generators and data channels to be read are fully configurable before each sequence. Designed for fast acquisitions, the Hook implementation is well adapted to multi-CPU systems, where the interrupt latency is notably reduced. On heavily loaded dual-core PCs running standard (non real time) Linux, data can be taken at 1 KHz without losing events. Additional features include full integration into the /sys virtual file-system and hot-plug devices support. (author)

  14. Parity, Incomparability and Rationally Justified Choice

    Boot, Martijn

    2009-01-01

    This article discusses the possibility of a rationally justified choice between two options neither of which is better than the other while they are not equally good either (‘3NT’). Joseph Raz regards such options as incomparable and argues that reason cannot guide the choice between them. Ruth

  15. A General Purpose High Performance Linux Installation Infrastructure

    Wachsmann, Alf

    2002-01-01

    With more and more and larger and larger Linux clusters, the question arises how to install them. This paper addresses this question by proposing a solution using only standard software components. This installation infrastructure scales well for a large number of nodes. It is also usable for installing desktop machines or diskless Linux clients, thus, is not designed for cluster installations in particular but is, nevertheless, highly performant. The infrastructure proposed uses PXE as the network boot component on the nodes. It uses DHCP and TFTP servers to get IP addresses and a bootloader to all nodes. It then uses kickstart to install Red Hat Linux over NFS. We have implemented this installation infrastructure at SLAC with our given server hardware and installed a 256 node cluster in 30 minutes. This paper presents the measurements from this installation and discusses the bottlenecks in our installation

  16. Servidor Linux para conexiones seguras de una LAN a Internet

    Escartín Vigo, José Antonio

    2005-01-01

    Este documento esta elaborado para describir la implementación de un servidor GNU/Linux, así como especificar y resolver los principales problemas que un administrador se encuentra al poner en funcionamiento un servidor. Se aprenderá a configurar un servidor GNU/Linux describiendo los principales servicios utilizados para compartir archivos, páginas web, correo y otros que veremos más adelante. La herramienta de configuración Webmin, que se detalla en uno de los últimos capítulos es indepe...

  17. Hard Real-Time Linux for Off-The-Shelf Multicore Architectures

    Radder, Dirk

    2015-01-01

    This document describes the research results that were obtained from the development of a real-time extension for the Linux operating system. The paper describes a full extension of the kernel, which enables hard real-time performance on a 64-bit x86 architecture. In the first part of this study, real-time systems are categorized and concepts of real-time operating systems are introduced to the reader. In addition, numerous well-known real-time operating systems are considered. QNX Neutrino, ...

  18. ClusterControl: a web interface for distributing and monitoring bioinformatics applications on a Linux cluster.

    Stocker, Gernot; Rieder, Dietmar; Trajanoski, Zlatko

    2004-03-22

    ClusterControl is a web interface to simplify distributing and monitoring bioinformatics applications on Linux cluster systems. We have developed a modular concept that enables integration of command line oriented program into the application framework of ClusterControl. The systems facilitate integration of different applications accessed through one interface and executed on a distributed cluster system. The package is based on freely available technologies like Apache as web server, PHP as server-side scripting language and OpenPBS as queuing system and is available free of charge for academic and non-profit institutions. http://genome.tugraz.at/Software/ClusterControl

  19. Drug companies' evidence to justify advertising.

    Wade, V A; Mansfield, P R; McDonald, P J

    1989-11-25

    Ten international pharmaceutical companies were asked by letter to supply their best evidence in support of marketing claims for seventeen products. Fifteen replies were received. Seven replies cited a total of 67 references: 31 contained relevant original data and only 13 were controlled trials, all of which had serious methodological flaws. There were four reports of changes in advertising claims and one company ceased marketing nikethamide in the third world. Standards of evidence used to justify advertising claims are inadequate.

  20. Teaching Hands-On Linux Host Computer Security

    Shumba, Rose

    2006-01-01

    In the summer of 2003, a project to augment and improve the teaching of information assurance courses was started at IUP. Thus far, ten hands-on exercises have been developed. The exercises described in this article, and presented in the appendix, are based on actions required to secure a Linux host. Publicly available resources were used to…

  1. Drowning in PC Management: Could a Linux Solution Save Us?

    Peters, Kathleen A.

    2004-01-01

    Short on funding and IT staff, a Western Canada library struggled to provide adequate public computing resources. Staff turned to a Linux-based solution that supports up to 10 users from a single computer, and blends Web browsing and productivity applications with session management, Internet filtering, and user authentication. In this article,…

  2. Fedora Linux A Complete Guide to Red Hat's Community Distribution

    Tyler, Chris

    2009-01-01

    Whether you are running the stable version of Fedora Core or bleeding-edge Rawhide releases, this book has something for every level of user. The modular, lab-based approach not only shows you how things work--but also explains why--and provides you with the answers you need to get up and running with Fedora Linux.

  3. Linux Adventures on a Laptop. Computers in Small Libraries

    Roberts, Gary

    2005-01-01

    This article discusses the pros and cons of open source software, such as Linux. It asserts that despite the technical difficulties of installing and maintaining this type of software, ultimately it is helpful in terms of knowledge acquisition and as a beneficial investment librarians can make in themselves, their libraries, and their patrons.…

  4. LHC@home online tutorial for Linux users - recording

    CERN. Geneva

    2016-01-01

    A step-by-step online tutorial for LHC@home by Karolina Bozek It contains detailed instructions for Linux users on how-to-join this volunteer computing project.  This 5' linked from http://lhcathome.web.cern.ch/join-us CLICK Here to see the commands to copy/paste for installing BOINC and the VirtualBox.

  5. The Linux kernel as flexible product-line architecture

    M. de Jonge (Merijn)

    2002-01-01

    textabstractThe Linux kernel source tree is huge ($>$ 125 MB) and inflexible (because it is difficult to add new kernel components). We propose to make this architecture more flexible by assembling kernel source trees dynamically from individual kernel components. Users then, can select what

  6. Argonne Natl Lab receives TeraFLOP Cluster Linux NetworX

    2002-01-01

    " Linux NetworX announced today it has delivered an Evolocity II (E2) Linux cluster to Argonne National Laboratory that is capable of performing more than one trillion calculations per second (1 teraFLOP)" (1/2 page).

  7. Setup of the development tools for a small-sized controller built in a robot using Linux

    Lee, Jae Cheol; Jun, Hyeong Seop; Choi, Yu Rak; Kim, Jae Hee

    2004-03-01

    This report explains a setup method of practical development tools for robot control software programming. Well constituted development tools make a programmer more productive and a program more reliable. We ported a proven operating system to the target board (our robot's controller) to avoid such convention. We selected open source Linux as operating system, because it is free, reliable, flexible and widely used. First, we setup the host computer with Linux, and installed a cross compiler on it. And we ported Linux to the target board and connected to the host computer with ethernet, and setup NFS to both the host and the target. So the target board can use host computer's hard disk as it's own disk. Next, we installed gdb server on the target board and gdb client and DDD to the host computer for debugging the target program in the host computer with graphic environment. Finally, we patched the target board's Linux kernel with another one which have realtime capability. In this way, we can have a realtime embedded hardware controller for a robot with convenient software developing tools. All source programs are edited and compiled on the host computer, and executable codes exist in the NFS mounted directory that can be accessed from target board's directory. We can execute and debugging the code by means of logging into the target through the ethernet or the serial line

  8. Implementasi Manajemen Bandwidth Dengan Disiplin Antrian Hierarchical Token Bucket (HTB Pada Sistem Operasi Linux

    Muhammad Nugraha

    2016-09-01

    Full Text Available Important Problem on Internet networking is exhausted resource and bandwidth by some user while other user did not get service properly. To overcome that problem we need to implement traffic control and bandwidth management system in router. In this research author want to implement Hierarchical Token Bucket algorithm as queue discipline (qdisc to get bandwidth management accurately in order the user can get bandwidth properly. The result of this research is form the management bandwidth cheaply and efficiently by using Hierarchical Token Bucket qdisc on Linux operating system were able to manage the user as we want.

  9. IMPLEMENTASI MANAJEMEN BANDWIDTH DENGAN DISIPLIN ANTRIAN HIERARCHICAL TOKEN BUCKET (HTB PADA SISTEM OPERASI LINUX

    Muhammad Nugraha

    2017-01-01

    Full Text Available Important Problem on Internet networking is exhausted resource and bandwidth by some user while other user did not get service properly. To overcome that problem we need to implement traffic control and bandwidth management system in router. In this research author want to implement Hierarchical Token Bucket algorithm as queue discipline (qdisc to get bandwidth management accurately in order the user can get bandwidth properly. The result of this research is form the management bandwidth cheaply and efficiently by using Hierarchical Token Bucket qdisc on Linux operating system were able to manage the user as we want.

  10. Audio Arduino - an ALSA (Advanced Linux Sound Architecture) audio driver for FTDI-based Arduinos

    Dimitrov, Smilen; Serafin, Stefania

    2011-01-01

    be considered to be a system, that encompasses design decisions on both hardware and software levels - that also demand a certain understanding of the architecture of the target PC operating system. This project outlines how an Arduino Duemillanove board (containing a USB interface chip, manufactured by Future...... Technology Devices International Ltd [FTDI] company) can be demonstrated to behave as a full-duplex, mono, 8-bit 44.1 kHz soundcard, through an implementation of: a PC audio driver for ALSA (Advanced Linux Sound Architecture); a matching program for the Arduino's ATmega microcontroller - and nothing more...

  11. Transitioning to Intel-based Linux Servers in the Payload Operations Integration Center

    Guillebeau, P. L.

    2004-01-01

    The MSFC Payload Operations Integration Center (POIC) is the focal point for International Space Station (ISS) payload operations. The POIC contains the facilities, hardware, software and communication interface necessary to support payload operations. ISS ground system support for processing and display of real-time spacecraft and telemetry and command data has been operational for several years. The hardware components were reaching end of life and vendor costs were increasing while ISS budgets were becoming severely constrained. Therefore it has been necessary to migrate the Unix portions of our ground systems to commodity priced Intel-based Linux servers. hardware architecture including networks, data storage, and highly available resources. This paper will concentrate on the Linux migration implementation for the software portion of our ground system. The migration began with 3.5 million lines of code running on Unix platforms with separate servers for telemetry, command, Payload information management systems, web, system control, remote server interface and databases. The Intel-based system is scheduled to be available for initial operational use by August 2004 The overall migration to Intel-based Linux servers in the control center involves changes to the This paper will address the Linux migration study approach including the proof of concept, criticality of customer buy-in and importance of beginning with POSlX compliant code. It will focus on the development approach explaining the software lifecycle. Other aspects of development will be covered including phased implementation, interim milestones and metrics measurements and reporting mechanisms. This paper will also address the testing approach covering all levels of testing including development, development integration, IV&V, user beta testing and acceptance testing. Test results including performance numbers compared with Unix servers will be included. need for a smooth transition while maintaining

  12. A case study in application I/O on Linux clusters

    Ross, R.; Nurmi, D.; Cheng, A.; Zingale, M.

    2001-01-01

    A critical but often ignored component of system performance is the I/O system. Today's applications expect a great deal from underlying storage systems and software, and both high performance distributed storage and high level interfaces have been developed to fill these needs. In this paper they discuss the I/O performance of a parallel scientific application on a Linux cluster, the FLASH astrophysics code. This application relies on three I/O software components to provide high performance parallel I/O on Linux clusters: the Parallel Virtual File System (PVFS), the ROMIO MPI-IO implementation, and the Hierarchical Data Format (HDF5) library. First they discuss the roles played by each of these components in providing an I/O solution. Next they discuss the FLASH I/O benchmark and point out its relevance. Following this they examine the performance of the benchmark, and through instrumentation of both the application and underlying system software code they discover the location of major software bottlenecks. They work around the most inhibiting of these bottlenecks, showing substantial performance improvement. Finally they point out similarities between the inefficiencies found here and those found in message passing systems, indicating that research in the message passing field could be leveraged to solve similar problems in high-level I/O interfaces

  13. LXtoo: an integrated live Linux distribution for the bioinformatics community.

    Yu, Guangchuang; Wang, Li-Gen; Meng, Xiao-Hua; He, Qing-Yu

    2012-07-19

    Recent advances in high-throughput technologies dramatically increase biological data generation. However, many research groups lack computing facilities and specialists. This is an obstacle that remains to be addressed. Here, we present a Linux distribution, LXtoo, to provide a flexible computing platform for bioinformatics analysis. Unlike most of the existing live Linux distributions for bioinformatics limiting their usage to sequence analysis and protein structure prediction, LXtoo incorporates a comprehensive collection of bioinformatics software, including data mining tools for microarray and proteomics, protein-protein interaction analysis, and computationally complex tasks like molecular dynamics. Moreover, most of the programs have been configured and optimized for high performance computing. LXtoo aims to provide well-supported computing environment tailored for bioinformatics research, reducing duplication of efforts in building computing infrastructure. LXtoo is distributed as a Live DVD and freely available at http://bioinformatics.jnu.edu.cn/LXtoo.

  14. 42 Variability Bugs in the Linux Kernel

    Abal, Iago; Brabrand, Claus; Wasowski, Andrzej

    2014-01-01

    Feature-sensitive verification pursues effective analysis of the exponentially many variants of a program family. However, researchers lack examples of concrete bugs induced by variability, occurring in real large-scale systems. Such a collection of bugs is a requirement for goal-oriented research...... provide self-contained simplified C99 versions of the bugs, facilitating understanding and tool evaluation. Our study provides insights into the nature and occurrence of variability bugs in a large C software system, and shows in what ways variability affects and increases the complexity of software bugs....

  15. LightNVM: The Linux Open-Channel SSD Subsystem

    Bjørling, Matias; Gonzalez, Javier; Bonnet, Philippe

    2017-01-01

    resource utilization. We propose that SSD management trade-offs should be handled through Open-Channel SSDs, a new class of SSDs, that give hosts control over their internals. We present our experience building LightNVM, the Linux Open-Channel SSD subsystem. We introduce a new Physical Page Ad- dress I...... to limit read latency variability and that it can be customized to achieve predictable I/O latencies....

  16. Real-time data acquisition and feedback control using Linux Intel computers

    Penaflor, B.G.; Ferron, J.R.; Piglowski, D.A.; Johnson, R.D.; Walker, M.L.

    2006-01-01

    This paper describes the experiences of the DIII-D programming staff in adapting Linux based Intel computing hardware for use in real-time data acquisition and feedback control systems. Due to the highly dynamic and unstable nature of magnetically confined plasmas in tokamak fusion experiments, real-time data acquisition and feedback control systems are in routine use with all major tokamaks. At DIII-D, plasmas are created and sustained using a real-time application known as the digital plasma control system (PCS). During each experiment, the PCS periodically samples data from hundreds of diagnostic signals and provides these data to control algorithms implemented in software. These algorithms compute the necessary commands to send to various actuators that affect plasma performance. The PCS consists of a group of rack mounted Intel Xeon computer systems running an in-house customized version of the Linux operating system tailored specifically to meet the real-time performance needs of the plasma experiments. This paper provides a more detailed description of the real-time computing hardware and custom developed software, including recent work to utilize dual Intel Xeon equipped computers within the PCS

  17. Efficient Parallel Engineering Computing on Linux Workstations

    Lou, John Z.

    2010-01-01

    A C software module has been developed that creates lightweight processes (LWPs) dynamically to achieve parallel computing performance in a variety of engineering simulation and analysis applications to support NASA and DoD project tasks. The required interface between the module and the application it supports is simple, minimal and almost completely transparent to the user applications, and it can achieve nearly ideal computing speed-up on multi-CPU engineering workstations of all operating system platforms. The module can be integrated into an existing application (C, C++, Fortran and others) either as part of a compiled module or as a dynamically linked library (DLL).

  18. Lin4Neuro: a customized Linux distribution ready for neuroimaging analysis.

    Nemoto, Kiyotaka; Dan, Ippeita; Rorden, Christopher; Ohnishi, Takashi; Tsuzuki, Daisuke; Okamoto, Masako; Yamashita, Fumio; Asada, Takashi

    2011-01-25

    A variety of neuroimaging software packages have been released from various laboratories worldwide, and many researchers use these packages in combination. Though most of these software packages are freely available, some people find them difficult to install and configure because they are mostly based on UNIX-like operating systems. We developed a live USB-bootable Linux package named "Lin4Neuro." This system includes popular neuroimaging analysis tools. The user interface is customized so that even Windows users can use it intuitively. The boot time of this system was only around 40 seconds. We performed a benchmark test of inhomogeneity correction on 10 subjects of three-dimensional T1-weighted MRI scans. The processing speed of USB-booted Lin4Neuro was as fast as that of the package installed on the hard disk drive. We also installed Lin4Neuro on a virtualization software package that emulates the Linux environment on a Windows-based operation system. Although the processing speed was slower than that under other conditions, it remained comparable. With Lin4Neuro in one's hand, one can access neuroimaging software packages easily, and immediately focus on analyzing data. Lin4Neuro can be a good primer for beginners of neuroimaging analysis or students who are interested in neuroimaging analysis. It also provides a practical means of sharing analysis environments across sites.

  19. Memory Analysis of the KBeast Linux Rootkit: Investigating Publicly Available Linux Rootkit Using the Volatility Memory Analysis Framework

    2015-06-01

    examine how a computer forensic investigator/incident handler, without specialised computer memory or software reverse engineering skills , can successfully...memory images and malware, this new series of reports will be directed at those who must analyse Linux malware-infected memory images. The skills ...disable 1287 1000 1000 /usr/lib/policykit-1-gnome/polkit-gnome-authentication- agent-1 1310 1000 1000 /usr/lib/pulseaudio/pulse/gconf- helper 1350

  20. 40 Variability Bugs in the Linux Kernel

    Abal Rivas, Iago; Brabrand, Claus; Wasowski, Andrzej

    2014-01-01

    Feature-sensitive verification is a recent field that pursues the effective analysis of the exponential number of variants of a program family. Today researchers lack examples of concrete bugs induced by variability, and occurring in real large-scale software. Such a collection of bugs is a requi......Feature-sensitive verification is a recent field that pursues the effective analysis of the exponential number of variants of a program family. Today researchers lack examples of concrete bugs induced by variability, and occurring in real large-scale software. Such a collection of bugs...... the outcome of our analysis into a database. In addition, we provide self-contained simplified C99 versions of the bugs, facilitating understanding and tool evaluation. Our study provides insights about the nature and occurrence of variability bugs in a large C software system, and shows in what ways...

  1. A package of Linux scripts for the parallelization of Monte Carlo simulations

    Badal, Andreu; Sempau, Josep

    2006-09-01

    sequential code. Program summary 1Title of program:clonEasy Catalogue identifier:ADYD_v1_0 Program summary URL:http://cpc.cs.qub.ac.uk/summaries/ADYD_v1_0 Program obtainable from:CPC Program Library, Queen's University of Belfast, Northern Ireland Computer for which the program is designed and others in which it is operable:Any computer with a Unix style shell (bash), support for the Secure Shell protocol and a FORTRAN compiler Operating systems under which the program has been tested:Linux (RedHat 8.0, SuSe 8.1, Debian Woody 3.1) Compilers:GNU FORTRAN g77 (Linux); g95 (Linux); Intel Fortran Compiler 7.1 (Linux) Programming language used:Linux shell (bash) script, FORTRAN 77 No. of bits in a word:32 No. of lines in distributed program, including test data, etc.:1916 No. of bytes in distributed program, including test data, etc.:18 202 Distribution format:tar.gz Nature of the physical problem:There are many situations where a Monte Carlo simulation involves a huge amount of CPU time. The parallelization of such calculations is a simple way of obtaining a relatively low statistical uncertainty using a reasonable amount of time. Method of solution:The presented collection of Linux scripts and auxiliary FORTRAN programs implement Secure Shell-based communication between a "master" computer and a set of "clones". The aim of this communication is to execute a code that performs a Monte Carlo simulation on all the clones simultaneously. The code is unique, but each clone is fed with a different set of random seeds. Hence, clonEasy effectively permits the parallelization of the calculation. Restrictions on the complexity of the program:clonEasy can only be used with programs that produce statistically independent results using the same code, but with a different sequence of random numbers. Users must choose the initialization values for the random number generator on each computer and combine the output from the different executions. A FORTRAN program to combine the final results is

  2. Linux OS integrated modular avionics application development framework with apex API of ARINC653 specification

    Anna V. Korneenkova

    2017-01-01

    Full Text Available The framework is made to provide tools to develop the integrated modular avionics (IMA applications, which could be launched on the target platform LynxOs-178 without modifying their source code. The framework usage helps students to form skills for developing modern modules of the avionics. In addition, students obtain deeper knowledge for the development of competencies in the field of technical creativity by using of the framework.The article describes the architecture and implementation of the Linux OS framework for ARINC653 compliant OS application development.The proposed approach reduces ARINC-653 application development costs and gives a unified tool to implement OS vendor independent code that meets specification. To achieve import substitution free and open-source Linux OS is used as an environment for developing IMA applications.The proposed framework is applicable for using as the tool to develop IMA applications and as the tool for development of the following competencies: the ability to master techniques of using software to solve practical problems, the ability to develop components of hardware and software systems and databases, using modern tools and programming techniques, the ability to match hardware and software tools in the information and automated systems, the readiness to apply the fundamentals of informatics and programming to designing, constructing and testing of software products, the readiness to apply basic methods and tools of software development, knowledge of various technologies of software development.

  3. Laboratorio de Seguridad Informática con Kali Linux

    Gutiérrez Benito, Fernando

    2014-01-01

    Laboratorio de Seguridad Informática usando la distribución Linux Kali, un sistema operativo dedicado a la auditoría de seguridad informática. Se emplearán herramientas especializadas en los distintos campos de la seguridad, como nmap, Metaspoit, w3af, John the Ripper o Aircrack-ng. Se intentará que los alumnos comprendan la necesidad de crear aplicaciones seguras así como pueda servir de base para aquellos que deseen continuar en el mundo de la seguridad informática. Grado en Ingeniería T...

  4. Documenting and automating collateral evolutions in Linux device drivers

    Padioleau, Yoann; Hansen, René Rydhof; Lawall, Julia

    2008-01-01

    . Manually performing such collateral evolutions is time-consuming and unreliable, and has lead to errors when modifications have not been done consistently. In this paper, we present an automatic program transformation tool, Coccinelle, for documenting and automating device driver collateral evolutions...... programmer. We have evaluated our approach on 62 representative collateral evolutions that were previously performed manually in Linux 2.5 and 2.6. On a test suite of over 5800 relevant driver files, the semantic patches for these collateral evolutions update over 93% of the files completely...

  5. Empirical Testing of the CySeMoL Tool for Cyber Security Assessment – Case Study of Linux Server and MySQL

    Rabbani, Talvia

    2016-01-01

    In this Master Thesis, several common applications used with MySQL and Linux server are modelled using the Enterprise Architecture Analysis Tool (EAAT) and the Cyber Security Modelling Language (CySeMoL), both developed by the Department of Industrial Information and Control System (ICS) at KTH. The objective of this study is to use the CySeMoL tool to evaluate the feasibility and correctness of the tool by simulating some particular type of attacks on a real life Linux server. A few common a...

  6. FIREWALL E SEGURANÇA DE SISTEMAS APLICADO AO LINUX

    Rodrigo Ribeiro

    2017-04-01

    Full Text Available Tendo em vista a evolução da internet no mundo, torna-se necessário investir na segurança da informação, alguns importantes conceitos referentes as redes de computadores e sua evolução direcionam para o surgimento de novas vulnerabilidades. O objetivo principal deste trabalho é comprovar que, por meio da utilização de software livre como o Linux e suas ferramentas, é possível criar um cenário seguro contra alguns ataques, por meio de testes em ambientes controlados utilizando-se de arquiteturas testadas em tempo real e verificando qual o potencial de uso entre uma pesquisa autoral sobre o assunto, a partir dessa ideia, foi possível reconhecer a grande utilização dos mecanismos de segurança, validando a eficiência de tais ferramentas estudadas na mitigação de ataques a redes de computares. Os sistemas de defesa da plataforma Linux são extremamente eficientes e atende ao objetivo de prevenir uma rede de acesso indevido.

  7. FTAP: a Linux-based program for tapping and music experiments.

    Finney, S A

    2001-02-01

    This paper describes FTAP, a flexible data collection system for tapping and music experiments. FTAP runs on standard PC hardware with the Linux operating system and can process input keystrokes and auditory output with reliable millisecond resolution. It uses standard MIDI devices for input and output and is particularly flexible in the area of auditory feedback manipulation. FTAP can run a wide variety of experiments, including synchronization/continuation tasks (Wing & Kristofferson, 1973), synchronization tasks combined with delayed auditory feedback (Aschersleben & Prinz, 1997), continuation tasks with isolated feedback perturbations (Wing, 1977), and complex alterations of feedback in music performance (Finney, 1997). Such experiments have often been implemented with custom hardware and software systems, but with FTAP they can be specified by a simple ASCII text parameter file. FTAP is available at no cost in source-code form.

  8. A Linux cluster for between-pulse magnetic equilibrium reconstructions and other processor bound analyses

    Peng, Q.; Groebner, R. J.; Lao, L. L.; Schachter, J.; Schissel, D. P.; Wade, M. R.

    2001-01-01

    A 12-processor Linux PC cluster has been installed to perform between-pulse magnetic equilibrium reconstructions during tokamak operations using the EFIT code written in FORTRAN. The MPICH package implementing message passing interface is employed by EFIT for data distribution and communication. The new system calculates equilibria eight times faster than the previous system yielding a complete equilibrium time history on a 25 ms time scale 4 min after the pulse ends. A graphical interface is provided for users to control the time resolution and the type of EFITs. The next analysis to benefit from the cluster is CERQUICK written in IDL for ion temperature profile analysis. The plan is to expand the cluster so that a full profile analysis (Te, Ti, ne, Vr, Zeff) can be made available between pulses, which lays the ground work for Kinetic EFIT and/or ONETWO power balance analyses

  9. Enabling rootless Linux containers in multi-user environments. The udocker tool

    Gomes, Jorge; David, Mario; Alves, Luis; Martins, Jo ao; Pina, Jo ao [Laboratorio de Instrumentacao e Fisica Experimental de Particulas (LIP), Lisboa (Portugal); Bagnaschi, Emanuele [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Campos, Isabel; Lopez-Garcia, Alvaro; Orviz, Pablo [IFCA, Consejo Superior de Investigaciones Cientificas-CSIC, Santander (Spain)

    2017-11-15

    Containers are increasingly used as means to distribute and run Linux services and applications. In this paper we describe the architectural design and implementation of udocker a tool to execute Linux containers in user mode and we describe a few practical applications for a range of scientific codes meeting different requirements: from single core execution to MPI parallel execution and execution on GPGPUs.

  10. Enabling rootless Linux containers in multi-user environments. The udocker tool

    Gomes, Jorge; David, Mario; Alves, Luis; Martins, Jo ao; Pina, Jo ao; Bagnaschi, Emanuele; Campos, Isabel; Lopez-Garcia, Alvaro; Orviz, Pablo

    2017-11-01

    Containers are increasingly used as means to distribute and run Linux services and applications. In this paper we describe the architectural design and implementation of udocker a tool to execute Linux containers in user mode and we describe a few practical applications for a range of scientific codes meeting different requirements: from single core execution to MPI parallel execution and execution on GPGPUs.

  11. SmPL: A Domain-Specific Language for Specifying Collateral Evolutions in Linux Device Drivers

    Padioleau, Yoann; Lawall, Julia Laetitia; Muller, Gilles

    2007-01-01

    identifying the affected files and modifying all of the code fragments in these files that in some way depend on the changed interface. We have studied the collateral evolution problem in the context of Linux device drivers. Currently, collateral evolutions in Linux are mostly done manually using a text...

  12. Big Data demonstrator using Hadoop to build a Linux cluster for log data analysis using R

    Torbensen, Rune Sonnich; Top, Søren

    2017-01-01

    This article walks through the steps to create a Hadoop Linux cluster in the cloud and outlines how to analyze device log data via an example in the R programming language.......This article walks through the steps to create a Hadoop Linux cluster in the cloud and outlines how to analyze device log data via an example in the R programming language....

  13. Automating the Port of Linux to the VirtualLogix Hypervisor using Semantic Patches

    Armand, Francois; Muller, Gilles; Lawall, Julia Laetitia

    2008-01-01

    of Linux to the VLX hypervisor.  Coccinelle provides a notion of semantic patches, which are more abstract than standard patches, and thus are potentially applicable to a wider range of OS versions.  We have applied this approach in the context of Linux versions 2.6.13, 2.6.14, and 2.6.15, for the ARM...

  14. Porting oxbash to linux and its application in SD-shell calculations

    Suman, H.; Suleiman, S.

    1998-01-01

    Oxbash, a code for nuclear structure calculations within the shell model approach, was ported to Linux that is a UNIX clone for PC's. Due to many faults in the code version we had, deep corrective actions in the code had to be undertaken. This was done through intensive use of UNIX utilities like sed, nm, make in addition to proper shell script programming. Our version contained calls for missing subroutines. Some of these were included from C- and f90 libraries. Others had to be written separately. All these actions were organized and automated through a robust system of M akefiles . Finally the code was tested and applied for nuclei with 18 and 20 nucleons. (author)

  15. Čiščenje operacijskega sistema GNU/Linux

    OBLAK, DENIS

    2018-01-01

    Cilj diplomskega dela je izdelava aplikacije, ki bo pomagala očistiti operacijski sistem Linux in bo delala v večini distribucij. V teoretičnem delu je obravnavano čiščenje operacijskega sistema Linux, ki sprosti prostor na disku in omogoči boljše delovanje sistema. Sistematično so pregledani in teoretično predstavljeni tehnike čiščenja in obstoječa orodja za operacijski sistem Linux. V nadaljevanju je predstavljeno čiščenje operacijskih sistemov Windows in MacOS. Hkrati so predstavljen...

  16. Electrical stimulation in dysphagia treatment: a justified controversy?

    Bogaardt, H. C. A.

    2008-01-01

    Electrical stimulation in dysphagia treatment: a justified controversy? Neuromuscular electrostimulation (LAMES) is a method for stimulating muscles with short electrical pulses. Neuromuscular electrostimulation is frequently used in physiotherapy to strengthen healthy muscles (as in sports

  17. An analysis of personnel dose records which justifies the application of cost-benefit analysis techniques in the design of an afterloading facility and the use of controlled areas and systems of work within suite to control occupational exposure

    Gifford, D; Kear, D [Bristol General Hospital (UK); Godden, T J [Bristol Radiotherapy and Oncology Centre (UK)

    1990-03-01

    The sealed source operational policies employed at the Bristol Radiotherapy and Oncology Centre are reviewed. On the basis of the cost-benefit analysis, it was decided not to provide additional shielding but rather to introduce administrative controls based on local rules which contained systems of work and the operational policies for the afterloading systems. After using the MDR afterloading systems for 2 years, a period in which there has also been a marked increase in interstitial brachytherapy, an analysis was made of the doses received by nursing staff over the past 8 years. This has shown that, in spite of higher dose rates in the corridor areas because of the use of an MDR system and the increase in interstitial techniques, the doses to ward nurses have been significantly reduced by encouraging staff to comply with the ALARA principle and the introduction of afterloading systems. (author).

  18. ZIO: The Ultimate Linux I/O Framework

    Gonzalez Cobas, J D; Rubini, A; Nellaga, S; Vaga, F

    2014-01-01

    ZIO (with Z standing for “The Ultimate I/O” Framework) was developed for CERN with the specific needs of physics labs in mind, which are poorly addressed in the mainstream Linux kernel. ZIO provides a framework for industrial, high-bandwith, high-channel count I/O device drivers (digitizers, function generators, timing devices like TDCs) with performance, generality and scalability as design goals. Among its features, it offers abstractions for • both input and output channels, and channel sets • run-time selection of trigger types • run-time selection of buffer types • sysfs-based configuration • char devices for data and metadata • a socket interface (PF ZIO) as alternative to char devices In this paper, we discuss the design and implementation of ZIO, and describe representative cases of driver development for typical and exotic applications: drivers for the FMC (FPGAMezzanine Card, see [1]) boards developed at CERN like the FMC ADC 100Msps digitizer, FMC TDC timestamp counter, and FMC DEL ...

  19. Multi-terabyte EIDE disk arrays running Linux RAID5

    Sanders, D.A.; Cremaldi, L.M.; Eschenburg, V.; Godang, R.; Joy, M.D.; Summers, D.J.; Petravick, D.L.

    2004-01-01

    High-energy physics experiments are currently recording large amounts of data and in a few years will be recording prodigious quantities of data. New methods must be developed to handle this data and make analysis at universities possible. Grid Computing is one method; however, the data must be cached at the various Grid nodes. We examine some storage techniques that exploit recent developments in commodity hardware. Disk arrays using RAID level 5 (RAID-5) include both parity and striping. The striping improves access speed. The parity protects data in the event of a single disk failure, but not in the case of multiple disk failures. We report on tests of dual-processor Linux Software RAID-5 arrays and Hardware RAID-5 arrays using a 12-disk 3ware controller, in conjunction with 250 and 300 GB disks, for use in offline high-energy physics data analysis. The price of IDE disks is now less than $1/GB. These RAID-5 disk arrays can be scaled to sizes affordable to small institutions and used when fast random access at low cost is important

  20. Multi-terabyte EIDE disk arrays running Linux RAID5

    Sanders, D.A.; Cremaldi, L.M.; Eschenburg, V.; Godang, R.; Joy, M.D.; Summers, D.J.; /Mississippi U.; Petravick, D.L.; /Fermilab

    2004-11-01

    High-energy physics experiments are currently recording large amounts of data and in a few years will be recording prodigious quantities of data. New methods must be developed to handle this data and make analysis at universities possible. Grid Computing is one method; however, the data must be cached at the various Grid nodes. We examine some storage techniques that exploit recent developments in commodity hardware. Disk arrays using RAID level 5 (RAID-5) include both parity and striping. The striping improves access speed. The parity protects data in the event of a single disk failure, but not in the case of multiple disk failures. We report on tests of dual-processor Linux Software RAID-5 arrays and Hardware RAID-5 arrays using a 12-disk 3ware controller, in conjunction with 250 and 300 GB disks, for use in offline high-energy physics data analysis. The price of IDE disks is now less than $1/GB. These RAID-5 disk arrays can be scaled to sizes affordable to small institutions and used when fast random access at low cost is important.

  1. Research on Linux Trusted Boot Method Based on Reverse Integrity Verification

    Chenlin Huang

    2016-01-01

    Full Text Available Trusted computing aims to build a trusted computing environment for information systems with the help of secure hardware TPM, which has been proved to be an effective way against network security threats. However, the TPM chips are not yet widely deployed in most computing devices so far, thus limiting the applied scope of trusted computing technology. To solve the problem of lacking trusted hardware in existing computing platform, an alternative security hardware USBKey is introduced in this paper to simulate the basic functions of TPM and a new reverse USBKey-based integrity verification model is proposed to implement the reverse integrity verification of the operating system boot process, which can achieve the effect of trusted boot of the operating system in end systems without TPMs. A Linux operating system booting method based on reverse integrity verification is designed and implemented in this paper, with which the integrity of data and executable files in the operating system are verified and protected during the trusted boot process phase by phase. It implements the trusted boot of operation system without TPM and supports remote attestation of the platform. Enhanced by our method, the flexibility of the trusted computing technology is greatly improved and it is possible for trusted computing to be applied in large-scale computing environment.

  2. [Study for lung sound acquisition module based on ARM and Linux].

    Lu, Qiang; Li, Wenfeng; Zhang, Xixue; Li, Junmin; Liu, Longqing

    2011-07-01

    A acquisition module with ARM and Linux as a core was developed. This paper presents the hardware configuration and the software design. It is shown that the module can extract human lung sound reliably and effectively.

  3. Linux aitab olla sõltumatu / Jon Hall ; interv. Kristjan Otsmann

    Hall, Jon

    2002-01-01

    Eesti peaks kasutama rohkem avatud lähtekoodil põhinevat tarkvara, sest see seab Eesti väiksemasse sõltuvusse välismaistest tarkvaratootjatest, ütles intervjuus Postimehele Linux Internationali juht

  4. Operating system MINIX

    JIRKŮ, Radek

    2012-01-01

    This thesis introduces readers to the MINIX operating system, which was used in the creation of the Linux OS. It discusses the history and development of the system and explains its core and the file system. Also solves MINIX installation and configuration of the virtual machine at each step and deals with disputes that had a creator of Minix creator of Linux. In conclusion, compared with Linux MINIX and summarizes the advantages and disadvantages and the use of the operating system at present.

  5. MEMBANGUN SERVER BERBASIS LINUX PADA JARINGAN LAN DI LABOR SISTEM INFORMASI JURUSAN TEKNOLOGI INFORMASI POLITEKNIK NEGERI PADANG

    Fifi Rasyidah

    2014-03-01

    Full Text Available The System Information Laboratory of Information Technology Department Polytechnic State of Padang has 30 units computer as education facilities to support learning process. All of computers used at same time in a learning section. This case causing trouble to monitoring each students activities. In order to get the solution for the lecturer, the writer then construct a server by using Linux operation system and client by using windows system operation in which Samba File Server is needed. By using this samba, the lecturer will be able to share the data and will be able to use the server as data storage media. Besides that, the writer will also use VNC (Virtual network connection to simplify the process of monitoring and supervising client working system. Based on the result gotten after the writer done some experiment, it can be concluded that Samba File Server can also be used after some configuration is applied on certain files. Moreover, the writer also conclude that VNC can control the entire of the client. The writer suggests that Samba File server which will be used is the latest version one which has more feature than the previous one, it is suggested that the configuration of VNC is applied on Ubuntu Linux since the service is available. Kata Kunci : Samba File Server, VNC, Ubuntu installation

  6. NSTX-U Advances in Real-Time C++11 on Linux

    Erickson, Keith G.

    2015-01-01

    Programming languages like C and Ada combined with proprietary embedded operating systems have dominated the real-time application space for decades. The new C++11standard includes native, language-level support for concurrency, a required feature for any nontrivial event-oriented real-time software. Threads, Locks, and Atomics now exist to provide the necessary tools to build the structures that make up the foundation of a complex real-time system. The National Spherical Torus Experiment Upgrade (NSTX-U) at the Princeton Plasma Physics Laboratory (PPPL) is breaking new ground with the language as applied to the needs of fusion devices. A new Digital Coil Protection System (DCPS) will serve as the main protection mechanism for the magnetic coils, and it is written entirely in C++11 running on Concurrent Computer Corporation's real-time operating system, RedHawk Linux. It runs over 600 algorithms in a 5 kHz control loop that determine whether or not to shut down operations before physical damage occurs. To accomplish this, NSTX-U engineers developed software tools that do not currently exist elsewhere, including real-time atomic synchronization, real-time containers, and a real-time logging framework. Together with a recent (and carefully configured) version of the GCC compiler, these tools enable data acquisition, processing, and output using a conventional operating system to meet a hard real-time deadline (that is, missing one periodic is a failure) of 200 microseconds

  7. NSTX-U Advances in Real-Time C++11 on Linux

    Erickson, Keith G.

    2015-08-01

    Programming languages like C and Ada combined with proprietary embedded operating systems have dominated the real-time application space for decades. The new C++11 standard includes native, language-level support for concurrency, a required feature for any nontrivial event-oriented real-time software. Threads, Locks, and Atomics now exist to provide the necessary tools to build the structures that make up the foundation of a complex real-time system. The National Spherical Torus Experiment Upgrade (NSTX-U) at the Princeton Plasma Physics Laboratory (PPPL) is breaking new ground with the language as applied to the needs of fusion devices. A new Digital Coil Protection System (DCPS) will serve as the main protection mechanism for the magnetic coils, and it is written entirely in C++11 running on Concurrent Computer Corporation's real-time operating system, RedHawk Linux. It runs over 600 algorithms in a 5 kHz control loop that determine whether or not to shut down operations before physical damage occurs. To accomplish this, NSTX-U engineers developed software tools that do not currently exist elsewhere, including real-time atomic synchronization, real-time containers, and a real-time logging framework. Together with a recent (and carefully configured) version of the GCC compiler, these tools enable data acquisition, processing, and output using a conventional operating system to meet a hard real-time deadline (that is, missing one periodic is a failure) of 200 microseconds.

  8. DEBROS: design and use of a Linux-like RTOS on an inexpensive 8-bit single board computer

    Davis, M.A.

    2012-01-01

    As the power, complexity, and capabilities of embedded processors continue to grow, it is easy to forget just how much can be done with inexpensive Single Board Computers (SBCs) based on 8-bit processors. When the proprietary, non-standard tools from the vendor for one such embedded computer became a major roadblock, I embarked on a project to expand my own knowledge and provide a more flexible, standards based alternative. Inspired by the early work done on operating systems such as UNIX TM , Linux, and Minix, I wrote DEBROS (the Davis Embedded Baby Real-time Operating System), which is a fully preemptive, priority-based OS with soft real-time capabilities that provides a subset of standard Linux/UNIX compatible system calls such as stdio, BSD sockets, pipes, semaphores, etc. The end result was a much more flexible, standards-based development environment which allowed me to simplify my programming model, expand diagnostic capabilities, and reduce the time spent monitoring and applying updates to the hundreds of devices in the lab currently using such inexpensive hardware. (author)

  9. Aplicación de RT-Linux en el control de motores de pasos. Parte I; Application of RT-Linux in the Control of Steps Mators. Part I

    Ernesto Duany Renté

    2011-02-01

    Full Text Available La idea fundamental de este artículo es mostrar cómo controlar un motor de paso empleando el puertoparalelo de una computadora, y demostrar la eficiencia temporal de las aplicaciones que se desarrollan ensistemas preparados para ejecutar tareas de precisión; aprovechar al máximo la capacidad de tiempo realestricto que brinda RT-Linux para el control de accionamientos eléctricos. Se desarrolla un pequeño softwareen lenguaje C que envía las señales al puerto paralelo en el tiempo necesario. Este software no estádiseñado con fines comerciales, solo permite realizar pruebas sobre el circuito de control diseñado paraeste propósito.  The fundamental idea of this article is to control a steps motor using the parallel port of a computer anddemonstrate the temporary efficiency of the applications that are executed in prepared systems to executetasks of real time. To take advantage of to the maximum capacity of strict real time that RT-Linux offers usfor the control of electric workings. A small software is developed in language C that sent the signs to theparallel port in the necessary time. This software is not designed with commercial, only allows to carry outtests on the control circuit designed for this purpose.

  10. Justifying a recommendation: tell a story or present an argument?

    van den Hoven, P.J.

    2017-01-01

    In the deliberative genre there is a complex ‘playground’ of choices to present a recommendation; a rhetorician has to determine his or her position. Relevant dimensions are the coerciveness of the recommendation and the strength of its justifi cation, but also the presentation format, varying from

  11. Justifying Innovative Language Programs in an Environment of ...

    pkurgat

    Justifying Innovative Language Programs in an Environment of Change: The Case ... Key words: project management, change management, educational management, .... the sustainability of the course considering that there were and continue to be problems .... language teaching in general on a sound scientific base.

  12. Suing One's Sense Faculties for Fraud: 'Justifiable Reliance' in the ...

    The law requires that plaintiffs in fraud cases be 'justified' in relying on a misrepresentation. I deploy the accumulated intuitions of the law to defend externalist accounts of epistemic justification and knowledge against Laurence BonJour's counterexamples involving clairvoyance. I suggest that the law can offer a ...

  13. Investigation into How Managers Justify Investments in IT Infrastructure

    Ibe, Richmond Ikechukwu

    2012-01-01

    Organization leaders are dependent on information technology for corporate productivity; however, senior managers have expressed concerns about insufficient benefits from information technology investments. The problem researched was to understand how midsized businesses justify investments in information technology infrastructure. The purpose of…

  14. The RAppArmor Package: Enforcing Security Policies in R Using Dynamic Sandboxing on Linux

    Jeroen Ooms

    2013-11-01

    Full Text Available The increasing availability of cloud computing and scientific super computers brings great potential for making R accessible through public or shared resources. This allows us to efficiently run code requiring lots of cycles and memory, or embed R functionality into, e.g., systems and web services. However some important security concerns need to be addressed before this can be put in production. The prime use case in the design of R has always been a single statistician running R on the local machine through the interactive console. Therefore the execution environment of R is entirely unrestricted, which could result in malicious behavior or excessive use of hardware resources in a shared environment. Properly securing an R process turns out to be a complex problem. We describe various approaches and illustrate potential issues using some of our personal experiences in hosting public web services. Finally we introduce the RAppArmor package: a Linux based reference implementation for dynamic sandboxing in R on the level of the operating system.

  15. Smartphone qualification & linux-based tools for CubeSat computing payloads

    Bridges, C. P.; Yeomans, B.; Iacopino, C.; Frame, T. E.; Schofield, A.; Kenyon, S.; Sweeting, M. N.

    Modern computers are now far in advance of satellite systems and leveraging of these technologies for space applications could lead to cheaper and more capable spacecraft. Together with NASA AMES's PhoneSat, the STRaND-1 nanosatellite team has been developing and designing new ways to include smart-phone technologies to the popular CubeSat platform whilst mitigating numerous risks. Surrey Space Centre (SSC) and Surrey Satellite Technology Ltd. (SSTL) have led in qualifying state-of-the-art COTS technologies and capabilities - contributing to numerous low-cost satellite missions. The focus of this paper is to answer if 1) modern smart-phone software is compatible for fast and low-cost development as required by CubeSats, and 2) if the components utilised are robust to the space environment. The STRaND-1 smart-phone payload software explored in this paper is united using various open-source Linux tools and generic interfaces found in terrestrial systems. A major result from our developments is that many existing software and hardware processes are more than sufficient to provide autonomous and operational payload object-to-object and file-based management solutions. The paper will provide methodologies on the software chains and tools used for the STRaND-1 smartphone computing platform, the hardware built with space qualification results (thermal, thermal vacuum, and TID radiation), and how they can be implemented in future missions.

  16. STATUS OF THE LINUX PC CLUSTER FOR BETWEEN-PULSE DATA ANALYSES AT DIII-D

    PENG, Q; GROEBNER, R.J; LAO, L.L; SCHACHTER, J.; SCHISSEL, D.P; WADE, M.R.

    2001-08-01

    OAK-B135 Some analyses that survey experimental data are carried out at a sparse sample rate between pulses during tokamak operation and/or completed as a batch job overnight because the complete analysis on a single fast workstation cannot fit in the narrow time window between two pulses. Scientists therefore miss the opportunity to use these results to guide experiments quickly. With a dedicated Beowulf type cluster at a cost less than that of a workstation, these analyses can be accomplished between pulses and the analyzed data made available for the research team during the tokamak operation. A Linux PC cluster comprises of 12 processors was installed at DIII-D National Fusion Facility in CY00 and expanded to 24 processors in CY01 to automatically perform between-pulse magnetic equilibrium reconstructions using the EFIT code written in Fortran, CER analyses using CERQUICK code written in IDL and full profile fitting analyses (n e , T e , T i , V r , Z eff ) using IDL code ZIPFIT. This paper reports the current status of the system and discusses some problems and concerns raised during the implementation and expansion of the system

  17. Getting Priorities Straight: Improving Linux Support for Database I/O

    Hall, Christoffer; Bonnet, Philippe

    2005-01-01

    advantage of Linux asynchronous I/O and how Linux can help MySQL/InnoDB best take advantage of the underlying I/O bandwidth. This is a crucial problem for the increasing number of MySQL servers deployed for very large database applications. In this paper, we rst show that the conservative I/O submission......The Linux 2.6 kernel supports asynchronous I/O as a result of propositions from the database industry. This is a positive evolution but is it a panacea? In the context of the Badger project, a collaboration between MySQL AB and University of Copenhagen, we evaluate how MySQL/InnoDB can best take...... policy used by InnoDB (as well as Oracle 9.2) leads to an under-utilization of the available I/O bandwidth. We then show that introducing prioritized asynchronous I/O in Linux will allow MySQL/InnoDB and the other Linux databases to fully utilize the available I/O bandwith using a more aggressive I...

  18. BioSMACK: a linux live CD for genome-wide association analyses.

    Hong, Chang Bum; Kim, Young Jin; Moon, Sanghoon; Shin, Young-Ah; Go, Min Jin; Kim, Dong-Joon; Lee, Jong-Young; Cho, Yoon Shin

    2012-01-01

    Recent advances in high-throughput genotyping technologies have enabled us to conduct a genome-wide association study (GWAS) on a large cohort. However, analyzing millions of single nucleotide polymorphisms (SNPs) is still a difficult task for researchers conducting a GWAS. Several difficulties such as compatibilities and dependencies are often encountered by researchers using analytical tools, during the installation of software. This is a huge obstacle to any research institute without computing facilities and specialists. Therefore, a proper research environment is an urgent need for researchers working on GWAS. We developed BioSMACK to provide a research environment for GWAS that requires no configuration and is easy to use. BioSMACK is based on the Ubuntu Live CD that offers a complete Linux-based operating system environment without installation. Moreover, we provide users with a GWAS manual consisting of a series of guidelines for GWAS and useful examples. BioSMACK is freely available at http://ksnp.cdc. go.kr/biosmack.

  19. BioconductorBuntu: a Linux distribution that implements a web-based DNA microarray analysis server.

    Geeleher, Paul; Morris, Dermot; Hinde, John P; Golden, Aaron

    2009-06-01

    BioconductorBuntu is a custom distribution of Ubuntu Linux that automatically installs a server-side microarray processing environment, providing a user-friendly web-based GUI to many of the tools developed by the Bioconductor Project, accessible locally or across a network. System installation is via booting off a CD image or by using a Debian package provided to upgrade an existing Ubuntu installation. In its current version, several microarray analysis pipelines are supported including oligonucleotide, dual-or single-dye experiments, including post-processing with Gene Set Enrichment Analysis. BioconductorBuntu is designed to be extensible, by server-side integration of further relevant Bioconductor modules as required, facilitated by its straightforward underlying Python-based infrastructure. BioconductorBuntu offers an ideal environment for the development of processing procedures to facilitate the analysis of next-generation sequencing datasets. BioconductorBuntu is available for download under a creative commons license along with additional documentation and a tutorial from (http://bioinf.nuigalway.ie).

  20. Reuse of the compact nuclear simulator software under PC with Linux

    Cha, K. H.; Park, J. C.; Kwon, K. C.; Lee, G. Y.

    2000-01-01

    This study was approached to reuse source programs for a nuclear simulator under PC with Open Source Software(OSS) and to extend its applicability. Source programs in the Compact Nuclear Simulator(CNS), which has been operated for institutional research and training in KAERI, were reused and implemented for Linux-PC environment with the aim of supporting the study. PC with 500 MHz processor and Linux 2.2.5-22 kernel were utilized for the reuse implementation and it was investigated for some applications, through the functional testing for its main functions as interfaced with compact control panels in the current CNS. Development and upgrade of small-scale simulators, establishment of process simulation for PC, and development of prototype predictive simulation, can effectively be enabled with the experience though the reuse implementation was limited to port only CNS programs for PC with Linux

  1. Italian Physical Society Justifying the QCD parton model

    Veneziano, G

    2018-01-01

    I will focus my attention on the two papers I wrote with Roberto and Daniele Amati on justifying the QCD-improved parton model, a very basic tool used every day to estimate a variety of processes involving strong (as well as possibly other) interactions. While doing so, I will also touch on other occasions I had to work —or just interact— with Roberto during more than 30 years of our respective careers.

  2. Thumba X-ray plant: Are radiation fears justified

    Madhvanath, U.

    1978-01-01

    Technical facts about the X-ray unit located at Vikram Sarabhai Space Centre, Thumba (India) are set down to explain that it is not posing any radiation hazard as reported in a newspaper and thus radiation fears are not justifiable. It is stated that, after thorough checking, X-ray installations in this space centre cause negligible exposure even to workers who handle these units, and others practically do not get any exposure at all. (B.G.W.)

  3. Getting priorities straight: improving Linux support for database I/O

    Hall, Christoffer; Bonnet, Philippe

    2005-01-01

    The Linux 2.6 kernel supports asynchronous I/O as a result of propositions from the database industry. This is a positive evolution but is it a panacea? In the context of the Badger project, a collaboration between MySQL AB and University of Copenhagen, ......The Linux 2.6 kernel supports asynchronous I/O as a result of propositions from the database industry. This is a positive evolution but is it a panacea? In the context of the Badger project, a collaboration between MySQL AB and University of Copenhagen, ...

  4. An approach to improving the structure of error-handling code in the linux kernel

    Saha, Suman; Lawall, Julia; Muller, Gilles

    2011-01-01

    The C language does not provide any abstractions for exception handling or other forms of error handling, leaving programmers to devise their own conventions for detecting and handling errors. The Linux coding style guidelines suggest placing error handling code at the end of each function, where...... an automatic program transformation that transforms error-handling code into this style. We have applied our transformation to the Linux 2.6.34 kernel source code, on which it reorganizes the error handling code of over 1800 functions, in about 25 minutes....

  5. WYSIWIB: A Declarative Approach to Finding API Protocols and Bugs in Linux Code

    Lawall, Julia; Brunel, Julien Pierre Manuel; Palix, Nicolas Jean-Michel

    2009-01-01

    the tools on specific kinds of bugs and to relate the results to patterns in the source code. We propose a declarative approach to bug finding in Linux OS code using a control-flow based program search engine. Our approach is WYSIWIB (What You See Is Where It Bugs), since the programmer expresses...

  6. Implementation of the On-the-fly Encryption for the Linux OS Based on Certified CPS

    Alexander Mikhailovich Korotin

    2013-02-01

    Full Text Available The article is devoted to tools for on-the-fly encryption and a method to implement such tool for the Linux OS based on a certified CPS.The idea is to modify the existing tool named eCryptfs. Russian cryptographic algorithms will be used in the user and kernel modes.

  7. Cost-justifying usability an update for the internet age

    Bias, Randolph G; Bias, Randolph G

    2005-01-01

    You just know that an improvement of the user interface will reap rewards, but how do you justify the expense and the labor and the time-guarantee a robust ROI!-ahead of time? How do you decide how much of an investment should be funded? And what is the best way to sell usability to others? In this completely revised and new edition, Randolph G. Bias (University of Texas at Austin, with 25 years' experience as a usability practitioner and manager) and Deborah J. Mayhew (internationally recognized usability consultant and author of two other seminal books including The Usability Enginee

  8. NixOS : A purely functional Linux distribution

    Dolstra, E.; Löh, A.; Pierron, N.

    2010-01-01

    Existing package and system configuration management tools suffer from an imperative model, where system administration actions such as package upgrades or changes to system configuration files are stateful: they destructively update the state of the system. This leads to many problems, such as the

  9. Distributed One Time Password Infrastructure for Linux Environments

    Alberto Benito Peral

    2018-04-01

    Full Text Available Nowadays, there is a lot of critical information and services hosted on computer systems. The proper access control to these resources is essential to avoid malicious actions that could cause huge losses to home and professional users. The access control systems have evolved from the first password based systems to the modern mechanisms using smart cards, certificates, tokens, biometric systems, etc. However, when designing a system, it is necessary to take into account their particular limitations, such as connectivity, infrastructure or budget. In addition, one of the main objectives must be to ensure the system usability, but this property is usually orthogonal to the security. Thus, the use of password is still common. In this paper, we expose a new password based access control system that aims to improve password security with the minimum impact in the system usability.

  10. Analysing the Linux kernel feature model changes using FMDiff

    Dintzner, N.J.R.; van Deursen, A.; Pinzger, M.

    Evolving a large scale, highly variable system is a challenging task. For such a system, evolution operations often require to update consistently both their implementation and its feature model. In this context, the evolution of the feature model closely follows the evolution of the system. The

  11. Analysing the Linux kernel feature model changes using FMDiff

    Dintzner, N.J.R.; Van Deursen, A.; Pinzger, M.

    2015-01-01

    Evolving a large scale, highly variable system is a challenging task. For such a system, evolution operations often require to update consistently both their implementation and its feature model. In this context, the evolution of the feature model closely follows the evolution of the system. The

  12. Justifying the design and selection of literacy and thinking tools

    David Whitehead

    2008-10-01

    Full Text Available Criteria for the design and selection of literacy and thinking tools that allow educators to justify what they do are described within a wider framework of learning theory and research into best practice. Based on a meta-analysis of best practice, results from a three year project designed to evaluate the effectiveness of a secondary school literacy initiative in New Zealand, together with recent research from cognitive and neuro-psychologists, it is argued that the design and selection of literacy and thinking tools used in elementary schools should be consistent with (i teaching focused (ii learner focused, (iii thought linked (iv neurologically consistent, (v subject specific, (vi text linked, (vii developmentally appropriate, and (viii assessment linked criteria.

  13. [Making a low cost IPSec router on Linux and the assessment for practical use].

    Amiki, M; Horio, M

    2001-09-01

    We installed Linux and FreeS/WAN on a PC/AT compatible machine to make an IPSec router. We measured the time of ping/ftp, only in the university, between the university and the external network. Between the university and the external network (the Internet), there were no differences. Therefore, we concluded that CPU load was not remarkable at low speed networks, because packets exchanged via the Internet are small, or compressions of VPN are more effective than encoding and decoding. On the other hand, in the university, the IPSec router performed down about 20-30% compared with normal IP communication, but this is not a serious problem for practical use. Recently, VPN machines are becoming cheaper, but they do not function sufficiently to create a fundamental VPN environment. Therefore, if one wants a fundamental VPN environment at a low cost, we believe you should select a VPN router on Linux.

  14. A PC parallel port button box provides millisecond response time accuracy under Linux.

    Stewart, Neil

    2006-02-01

    For psychologists, it is sometimes necessary to measure people's reaction times to the nearest millisecond. This article describes how to use the PC parallel port to receive signals from a button box to achieve millisecond response time accuracy. The workings of the parallel port, the corresponding port addresses, and a simple Linux program for controlling the port are described. A test of the speed and reliability of button box signal detection is reported. If the reader is moderately familiar with Linux, this article should provide sufficient instruction for him or her to build and test his or her own parallel port button box. This article also describes how the parallel port could be used to control an external apparatus.

  15. Embedded Real-Time Linux for Instrument Control and Data Logging

    Clanton, Sam; Gore, Warren J. (Technical Monitor)

    2002-01-01

    When I moved to the west. coast to take a job at NASA's Ames Research Center in Mountain View, CA, I was impressed with the variety of equipment and software which scientists at the center use to conduct their research. was happy to find that I was just as likely to see a machine running Lenox as one running Windows in the offices and laboratories of NASA Ames (although many people seem to use Moos around here). I was especially happy to find that the particular group with whom I was going to work, the Atmospheric Physics Branch at Ames, relied almost entirely on Lenox machines for their day-to-day work. So it was no surprise that when it was time to construct a new control system for one of their most important pieces of hardware, a switch from an unpredictable DOS-based platform to an Embedded Linux-based one was a decision easily made. The system I am working on is called the Solar Spectral Flux Radiometer (SSFR), a PC-104 based system custom-built by Dr. Warren Gore at Ames. Dr. Gore, Dr. Peter Pilewskie, Dr. Maura Robberies and Larry Pezzolo use the SSFR in their research. The team working on the controller project consists of Dr. Gore, John Pommier, and myself. The SSFR is used by the ,cities Atmospheric Radiation Group to measure solar spectral irradiance at moderate resolution to determine the radiative effect of clouds, aerosols, and gases on climate, and also to infer the physical properties of aerosols and clouds. Two identical SSFR's have been built and successfully deployed in three field missions: 1) the Department of Energy Atmospheric Radiation Measurement (ARM) Enhanced Shortwave Experiment (ARESE) II in February/March, 2000; 2) the Puerto Rico Dust Experiment (PRIDE) in July, 2000; and 3) the South African Regional Science Initiative (SAFARI) in August/September, 2000. Additionally, the SSFR was used to acquire water vapor spectra using the Ames Diameter base-path multiple-reflection absorption cell in a laboratory experiment.

  16. An update on perfmon and the struggle to get into the Linux kernel

    Nowak, Andrzej, E-mail: Andrzej.Nowak@cern.c [CERN openlab (Switzerland)

    2010-04-01

    At CHEP2007 we reported on the perfmon2 subsystem as a tool for interfacing to the PMUs (Performance Monitoring Units) which are found in the hardware of all modern processors (from AMD, Intel, SUN, IBM, MIPS, etc.). The intent was always to get the subsystem into the Linux kernel by default. This paper reports on how progress was made (after long discussions) and will also show the latest additions to the subsystems.

  17. An update on perfmon and the struggle to get into the Linux kernel

    Nowak, Andrzej

    2010-01-01

    At CHEP2007 we reported on the perfmon2 subsystem as a tool for interfacing to the PMUs (Performance Monitoring Units) which are found in the hardware of all modern processors (from AMD, Intel, SUN, IBM, MIPS, etc.). The intent was always to get the subsystem into the Linux kernel by default. This paper reports on how progress was made (after long discussions) and will also show the latest additions to the subsystems.

  18. genepop'007: a complete re-implementation of the genepop software for Windows and Linux.

    Rousset, François

    2008-01-01

    This note summarizes developments of the genepop software since its first description in 1995, and in particular those new to version 4.0: an extended input format, several estimators of neighbourhood size under isolation by distance, new estimators and confidence intervals for null allele frequency, and less important extensions to previous options. genepop now runs under Linux as well as under Windows, and can be entirely controlled by batch calls. © 2007 The Author.

  19. A Trusted Path Design and Implementation for Security Enhanced Linux

    2004-09-01

    functionality by a member of the team? Witten, et al., [21] provides an excellent discussion of some aspects of the subject. Ultimately, open vs ...terminal window is a program like gnome - terminal that provides a TTY-like environment as a window inside an X Windows session. The phrase computer...Editors selected No sound or video No graphics Check all development boxes except KDE Administrative tools System tools No printing support

  20. Improved productivity justifies world record underbalanced perforating operation

    Johnson, A. M.; Bakker, E. R. [NAM B.V. (Netherlands); Hungerford, K.

    1998-12-31

    To achieve vertical connectivity with all the layers, and thus long term sustained productivity in a highly stratified reservoir, a one run underbalanced perforating operation was considered necessary. Due to coiled tube limitations in this deep (5136 m along hole, 3700 m true vertical depth, with a maximum deviation of 89 degrees), high pressure well a hydraulic workover unit (HWU) was selected to deploy and retrieve the guns. The operation is considered a world record since this is the longest section (total gross interval of 1026 m perforated) of guns conveyed, fired underbalanced and deployed out of a live well. It is concluded that the improved productivity more than justified the additional time, effort and expenditure; considering the full life cycle of the well it is readily apparent that the operation was an economic and technical success. Details of the considerations leading to the perforating technique selection, the planning and the execution of the operation, and the validation of the technique in terms of productivity gains, are provided. 13 refs., 7 figs.

  1. Justifying British Advertising in War and Austerity, 1939-51.

    Haughton, Philippa

    2017-09-01

    Drawing together institutional papers, the trade- and national-press, and Mass-Observation documents, this article examines the changing ways that the Advertising Association justified commercial advertising from 1939 to 1951. It argues that the ability to repeatedly re-conceptualize the social and economic purposes of advertising was central to the industry's survival and revival during the years of war and austerity. This matters because the survival and revival of commercial advertising helps to explain the composition of the post-war mixed economy and the emergence of a consumer culture that became the 'golden age' of capitalism. While commercial advertising's role in supporting periods of affluence is well documented, much less is known about its relationship with war and austerity. This omission is problematic. Advertising was only able to shape the 1950s and 1960s economy because its corporate structures remained intact during the 1940s, as the industry withstood the challenges of wartime and the difficulties presented under Attlee's government. Recognizing the deliberate attempts of advertising people to promote a role for commercial advertising invites us to reconsider the inevitability of post-war affluence, while offering fresh insight into the debate around consumer education, freedom of choice, and the centrality of advertising and communication in democratic society: issues central to the society Britain was, and hoped to become. © The Author [2017]. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  2. Calculation-experimental method justifies the life of wagons

    Валерія Сергіївна Воропай

    2015-11-01

    Full Text Available The article proposed a method to evaluate the technical state of tank wagons operating in chemical industry. An algorithm for evaluation the technical state of tank wagons was developed, that makes it possible on the basis of diagnosis and analysis of current condition to justify a further period of operation. The complex of works on testing the tanks and mathematical models for calculations of the design strength and reliability were proposed. The article is devoted to solving the problem of effective exploitation of the working fleet of tank wagons. Opportunities for further exploitation of cars, the complex of works on the assessment of their technical state and the calculation of the resources have been proposed in the article. Engineering research of the chemical industries park has reduced the shortage of the rolling stock for transportation of ammonia. The analysis of the chassis numerous faults and the main elements of tank wagons supporting structure after 20 years of exploitation was made. The algorithm of determining the residual life of the specialized tank wagons operating in an industrial plant has been proposed. The procedure for resource conservation of tank wagons carrying cargo under high pressure was first proposed. The improved procedure for identifying residual life proposed in the article has both theoretical and practical importance

  3. Photonic jet etching: Justifying the shape of optical fiber tip

    Abdurrochman, Andri; Zelgowski, Julien; Lecler, Sylvain; Mermet, Frédéric; Tumbelaka, Bernard; Fontaine, Joël

    2016-02-01

    Photonic jet (PJ) is a low diverging and highly concentrated beam in the shadow side of dielectric particle (cylinder or sphere). The concentration can be more than 200 times higher than the incidence wave. It is a non-resonance phenomenon in the near-field can propagate in a few wavelengths. Many potential applications have been proposed, including PJ etching. Hence, a guided-beam is considered increasing the PJ mobility control. While the others used a combination of classical optical fibers and spheres, we are concerned on a classical optical fiber with spherical tip to generate the PJ. This PJ driven waveguide has been realized using Gaussian mode beam inside the core. It has different variable parameters compared to classical PJ, which will be discussed in correlation with the etching demonstrations. The parameters dependency between the tip and PJ properties are complex; and theoretical aspect of this interaction will be exposed to justify the shape of our tip and optical fiber used in our demonstrations. Methods to achieve such a needed optical fiber tip will also be described. Finally the ability to generate PJ out of the shaped optical fiber will be experimentally demonstrated and the potential applications for material processing will be exposed.

  4. Implantación de una Plataforma GNU/Linux en la gestión del hogar digital focalizada a la domótica,multimedia-ocio y las TICs.

    Zálvez Rico, Juan Pedro

    2011-01-01

    In the near future, access to data and home automation systems in the home supported by the implementation of GNU-Linux operating systems in our homes, a reality of the first order for the implementation of real homes and automated digital awarding a cost reduction by the intensive use of the resources provided directly by the Open Software Community. The future possibilities seem almost endless: telecommuting, centralized household accounts, software distributed online training for young peo...

  5. Design and Achievement of User Interface Automation Testing of Linux Based on Element Tree of DogTail

    Yuan Wen-Chao

    2017-01-01

    Full Text Available As Linux gets more popular around the world, the advantage of the open source on software makes people do automated UI test by unified testing framework. UI software testing can guarantee the rationality of User Interface of Linux and accuracy of the UI’s widgets. In order to set free from fuzzy and repeated manual testing, and improve efficiency, this paper achieves automation testing of UI under Linux, and proposes a method to identify and test UI widgets under Linux, which is according to element tree of DogTail automaton testing framework. It achieves automation test of UI under Linux. According to this method, Aiming at the product of Red Hat Subscription Manager under Red Hat Enterprise Linux, it designs the automation test plan of this series of product’s dialogs. After many tests, it is indicated that this plan can identify UI widgets accurately and rationally, describe the structure of software clearly, avoid software errors and improve efficiency of the software. Simultaneously, it also can be used in the internationalization testing for checking translation during software internationalization.

  6. Real-Time linux dynamic clamp: a fast and flexible way to construct virtual ion channels in living cells.

    Dorval, A D; Christini, D J; White, J A

    2001-10-01

    We describe a system for real-time control of biological and other experiments. This device, based around the Real-Time Linux operating system, was tested specifically in the context of dynamic clamping, a demanding real-time task in which a computational system mimics the effects of nonlinear membrane conductances in living cells. The system is fast enough to represent dozens of nonlinear conductances in real time at clock rates well above 10 kHz. Conductances can be represented in deterministic form, or more accurately as discrete collections of stochastically gating ion channels. Tests were performed using a variety of complex models of nonlinear membrane mechanisms in excitable cells, including simulations of spatially extended excitable structures, and multiple interacting cells. Only in extreme cases does the computational load interfere with high-speed "hard" real-time processing (i.e., real-time processing that never falters). Freely available on the worldwide web, this experimental control system combines good performance. immense flexibility, low cost, and reasonable ease of use. It is easily adapted to any task involving real-time control, and excels in particular for applications requiring complex control algorithms that must operate at speeds over 1 kHz.

  7. Communication Software Performance for Linux Clusters with Mesh Connections

    Jie Chen; William Watson

    2003-09-01

    Recent progress in copper based commodity Gigabit Ethernet interconnects enables constructing clusters to achieve extremely high I/O bandwidth at low cost with mesh connections. However, the TCP/IP protocol stack cannot match the improved performance of Gigabit Ethernet networks especially in the case of multiple interconnects on a single host. In this paper, we evaluate and compare the performance characteristics of TCP/IP and M-VIA software that is an implementation of VIA.In particular, we focus on the performance of the software systems for a mesh communication architecture and demonstrate the feasibility of using multiple Gigabit Ethernet cards on one host to achieve aggregated bandwidth and latency that are not only better than what TCP provides but also compare favorably to some of the special purpose high-speed networks. In addition, implementation of a new M-VIA driver for one type of Gigabit Ethernet card will be discussed.

  8. Low latency protocol for transmission of measurement data from FPGA to Linux computer via 10 Gbps Ethernet link

    Zabolotny, W.M.

    2015-01-01

    This paper presents FADE-10G—an integrated solution for modern multichannel measurement systems. Its main aim is a low latency, reliable transmission of measurement data from FPGA-based front-end electronic boards (FEBs) to a computer-based node in the Data Acquisition System (DAQ), using a standard Ethernet 1 Gbps or 10 Gbps link. In addition to transmission of data, the system allows the user to send reliably simple control commands from DAQ to FEB and to receive responses. The aim of the work is to provide a possible simple base solution, which can be adapted by the end user to his or her particular needs. Therefore, the emphasis is put on the minimal consumption of FPGA resources in FEB and the minimal CPU load in the DAQ computer. The open source implementation of the FPGA IP core and the Linux kernel driver published under permissive license facilitates modifications and reuse of the solution. The system has been successfully tested in real hardware, both with 1 Gbps and 10 Gbps links

  9. When is deliberate killing of young children justified? Indigenous interpretations of infanticide in Bolivia.

    de Hilari, Caroline; Condori, Irma; Dearden, Kirk A

    2009-01-01

    In the Andes, as elsewhere, infanticide is a difficult challenge that remains largely undocumented and misunderstood. From January to March 2004 we used community-based vital event surveillance systems, discussions with health staff, ethnographic interviews, and focus group discussions among Aymara men and women from two geographically distinct sites in the Andes of Bolivia to provide insights into the practice of infanticide. We noted elevated mortality at both sites. In one location, suspected causes of infanticide were especially high for girls. We also observed that community members maintain beliefs that justify infanticide under certain circumstances. Among the Aymara, justification for infanticide was both biological (deformities and twinship) and social (illegitimate birth, family size and poverty). Communities generally did not condemn killing when reasons for doing so were biological, but the taking of life for social reasons was rarely justified. In this cultural context, strategies to address the challenge of infanticide should include education of community members about alternatives to infanticide. At a program level, planners and implementers should target ethnic groups with high levels of infanticide and train health care workers to detect and address multiple warning signs for infanticide (for example, domestic violence and child maltreatment) as well as proxies for infant neglect and abuse such as mother/infant separation and bottle use.

  10. Can conditional health policies be justified? A policy analysis of the new NHS dental contract reforms.

    Laverty, Louise; Harris, Rebecca

    2018-06-01

    Conditional policies, which emphasise personal responsibility, are becoming increasingly common in healthcare. Although used widely internationally, they are relatively new within the UK health system where there have been concerns about whether they can be justified. New NHS dental contracts include the introduction of a conditional component that restricts certain patients from accessing a full range of treatment until they have complied with preventative action. A policy analysis of published documents on the NHS dental contract reforms from 2009 to 2016 was conducted to consider how conditionality is justified and whether its execution is likely to cause distributional effects. Contractualist, paternalistic and mutualist arguments that reflect notions of responsibility and obligation are used as justification within policy. Underlying these arguments is an emphasis on preserving the finite resources of a strained NHS. We argue that the proposed conditional component may differentially affect disadvantaged patients, who do not necessarily have access to the resources needed to meet the behavioural requirements. As such, the conditional component of the NHS dental contract reform has the potential to exacerbate oral health inequalities. Conditional health policies may challenge core NHS principles and, as is the case with any conditional policy, should be carefully considered to ensure they do not exacerbate health inequities. Copyright © 2018 The Authors. Published by Elsevier Ltd.. All rights reserved.

  11. Implementação de um sistema SIP para o sistema operacional Linux

    Davison Gonzaga da Silva

    2003-01-01

    Resumo: Este trabalho apresenta a implementação de um Sistema de VoIP usando o Protocolo SIP. Este Sistema SIP foi desenvolvido para o Linux, usando-se a linguagem C++ em conjunto com a biblioteca QT. O Sistema SIP é composto de três entidades básicas: o Terminal SIP, o Proxy e o Servidor de Registros. O Terminal SIP é a entidade responsável por estabelecer sessões SIP com outros Terminais SIP. Para o Terminal SIP, foi desenvolvida uma biblioteca de acesso à placa de áudio, que permite a modi...

  12. Programación de LEGO MindStorms bajo GNU/Linux

    Matellán Olivera, Vicente; Heras Quirós, Pedro de las; Centeno González, José; González Barahona, Jesús

    2002-01-01

    GNU/Linux sobre un ordenador personal es la opción libre preferida por muchos desarrolladores de aplicaciones, pero también es una plataforma de desarrollo muy popular para otros sistemas, incluida la programación de robots, en particular es muy adecuada para jugar con los LEGO Mindstorms. En este artículo presentaremos las dos opciones más extendidas a la hora de programar estos juguetes: NQC y LegOS. NQC es una versión reducida de C que permite el desarrollo rápido de programas ...

  13. DB2 9 for Linux, Unix, and Windows database administration certification study guide

    Sanders, Roger E

    2007-01-01

    In DB2 9 for Linux, UNIX, and Windows Database Administration Certification Study Guide, Roger E. Sanders-one of the world's leading DB2 authors and an active participant in the development of IBM's DB2 certification exams-covers everything a reader needs to know to pass the DB2 9 UDB DBA Certification Test (731).This comprehensive study guide steps you through all of the topics that are covered on the test, including server management, data placement, database access, analyzing DB2 activity, DB2 utilities, high availability, security, and much more. Each chapter contains an extensive set of p

  14. LINK codes TRAC-BF1/PARCSv2.7 in LINUX without external communication interface

    Barrachina, T.; Garcia-Fenoll, M.; Abarca, A.; Miro, R.; Verdu, G.; Concejal, A.; Solar, A.

    2014-01-01

    The TRAC-BF1 code is still widely used by the nuclear industry for safety analysis. The plant models developed using this code are highly validated, so it is advisable to continue improving this code before migrating to another completely different code. The coupling with the NRC neutronic code PARCSv2.7 increases the simulation capabilities in transients in which the power distribution plays an important role. In this paper, the procedure for the coupling of TRAC-BF1 and PARCSv2.7 codes without PVM and in Linux is presented. (Author)

  15. Using a Linux Cluster for Parallel Simulations of an Active Magnetic Regenerator Refrigerator

    Petersen, T.F.; Pryds, N.; Smith, A.

    2006-01-01

    This paper describes the implementation of a Comsol Multiphysics model on a Linux computer Cluster. The Magnetic Refrigerator (MR) is a special type of refrigerator with potential to reduce the energy consumption of household refrigeration by a factor of two or more. To conduct numerical analysis....... The coupled set of equations and the transient convergence towards the final steady state means that the model has an excessive solution time. To make parametric studies practical, the developed model was implemented on a Cluster to allow parallel simulations, which has decreased the solution time...

  16. Feasibility study of BES data off-line processing and D/Ds physics analysis on a PC/Linux platform

    Rong Gang; He Kanglin; Heng Yuekun; Zhang Chun; Liu Huaimin; Cheng Baosen; Yan Wuguang; Mai Jimao; Zhao Haiwen

    2000-01-01

    The authors report a feasibility study of BES data off-line processing (BES data off-line reconstruction and Monte Carlo simulation) and D/Ds physics analysis on a PC/Linux platform. The authors compared the results obtained from the PC/Linux with that from HP/UNIX workstation. It shows that PC/Linux platform can do BES data off-line analysis as good as HP/UNIX workstation, and is much powerful and economical

  17. Linux: Hacia una revolución silenciosa de la sociedad de la información

    Pascuale Sofia

    2004-01-01

    Full Text Available l presente artículo intenta realizar una demostración de las cualidades globales que posee el nuevo sistema operativo LINUX a nivel técnico, y develar el cambio que está engendrando en el sector económico y en el mundo cultural. Esto se realiza por medio, de un análisis comparativo entre los sistemas operativos: Comerciales (Microsoft y Open Source (LINUX. El mundo de hoy está caracterizado por cambios rádicales y rápidos, ocurriendo con mayor frecuencia en el sector de la informática. Actualmente en éste sector y específicamente en el ámbito del sofware, es LINUX el nuevo sistema operativo que está modificando el mundo de la informática. Todo ello se efectuó sobre los lineamientos metodológicos exploratorios, porque la literatura sobre los avances de Linux es escasa, por lo tanto el trabajo responde a la sintesis de un amplio trabajo (Conferencias, Exposiciones en Universidades, Asociaciones de empresas, entre otros de los autores, llevaron a cabo desde que el producto LINUX es conocido y trabajado por una pequeña elite de técnicos.

  18. Developing Online Communities with LAMP (Linux, Apache, MySQL, PHP) - the IMIA OSNI and CHIRAD Experiences.

    Murray, Peter J; Oyri, Karl

    2005-01-01

    Many health informatics organisations do not seem to use, on a practical basis, for the benefit of their activities and interaction with their members, the very technologies that they often promote for use within healthcare environments. In particular, many organisations seem to be slow to take up the benefits of interactive web technologies. This paper presents an introduction to some of the many free/libre and open source (FLOSS) applications currently available and using the LAMP - Linux, Apache, MySQL, PHP architecture - as a way of cheaply deploying reliable, scalable, and secure web applications. The experience of moving to applications using LAMP architecture, in particular that of the Open Source Nursing Informatics (OSNI) Working Group of the Special Interest Group in Nursing Informatics of the International Medical Informatics Association (IMIA-NI), in using PostNuke, a FLOSS Content Management System (CMS) illustrates many of the benefits of such applications. The experiences of the authors in installing and maintaining a large number of websites using FLOSS CMS to develop dynamic, interactive websites that facilitate real engagement with the members of IMIA-NI OSNI, the IMIA Open Source Working Group, and the Centre for Health Informatics Research and Development (CHIRAD), as well as other organisations, is used as the basis for discussing the potential benefits that could be realised by others within the health informatics community.

  19. Kualitas Jaringan Pada Jaringan Virtual Local Area Network (VLAN Yang Menerapkan Linux Terminal Server Project (LTSP

    Lipur Sugiyanta

    2017-12-01

    Full Text Available Virtual Local Area Network (VLAN merupakan sebuah teknik dalam jaringan komputer untuk menciptakan beberapa jaringan yang berbeda tetapi masih merupakan sebuah jaringan lokal yang tidak terbatas pada lokasi fisik seperti LAN sedangkan Linux Terminal Server Project (LTSP merupakan sebuah teknik terminal server yang dapat memperbanyak workstation dengan hanya menggunakan sebuah Linux server. Dalam membangun sebuah jaringan komputer perlu memperhatikan beberapa hal dan salah satunya adalah kualitas jaringan dari jaringan yang dibangun. Pada penelitian ini bertujuan untuk mengetahui pengaruh jumlah client terhadap kualitas jaringan berdasarkan parameter delay dan packet loss pada jaringan VLAN yang menerapkan LTSP. Oleh karena itu, penelitian ini menggunakan jenis metode penelitian kualitatif dengan memperhatikan standar yang digunakan dalam penelitian yaitu standar International Telecommunication Union – Telecommunication (ITU-T. Penerapan penelitian ini menggunakan sistem operasi pada server adalah Ubuntu Desktop 14.04 LTS. Berdasarkan dari hasil penelitian yang ditemukan dapat disimpulkan bahwa benar terbukti bahwa makin banyak client yang dilayani oleh server maka akan menurunkan kualitas jaringan berdasarkan parameter Quality of Service (QoS yang digunakan yaitu delay dan packet loss.

  20. PsyToolkit: a software package for programming psychological experiments using Linux.

    Stoet, Gijsbert

    2010-11-01

    PsyToolkit is a set of software tools for programming psychological experiments on Linux computers. Given that PsyToolkit is freely available under the Gnu Public License, open source, and designed such that it can easily be modified and extended for individual needs, it is suitable not only for technically oriented Linux users, but also for students, researchers on small budgets, and universities in developing countries. The software includes a high-level scripting language, a library for the programming language C, and a questionnaire presenter. The software easily integrates with other open source tools, such as the statistical software package R. PsyToolkit is designed to work with external hardware (including IoLab and Cedrus response keyboards and two common digital input/output boards) and to support millisecond timing precision. Four in-depth examples explain the basic functionality of PsyToolkit. Example 1 demonstrates a stimulus-response compatibility experiment. Example 2 demonstrates a novel mouse-controlled visual search experiment. Example 3 shows how to control light emitting diodes using PsyToolkit, and Example 4 shows how to build a light-detection sensor. The last two examples explain the electronic hardware setup such that they can even be used with other software packages.

  1. Is the term "fasciculus opticus cerebralis" more justifiable than the term "optic nerve"?

    Vojniković, Bojo; Bajek, Snjezana; Bajek, Goran; Strenja-Linić, Ines; Grubesić, Aron

    2013-04-01

    The terminology of the optic nerve had already been changed three times, since 1895 until 1955 when the term "nervus opticus" was introduced in the "Terminologia Anatomica". Following our study we claim that, from the aspect of phylogenetic evolution of binocular vision development as well as optical embryogenesis where opticus is evidently presented as a product of diencephalic structures, the addition of the term "nervus" to opticus is not adequate and justified. From the clinical aspect the term "nervus opticus" is also inadequate, both as a "nerve" that has no functional regenerative properties, unlike other cranial nerves, as well as from a pedagogical and didactical aspect of educating future physicians. We suggest that the term "Fasciculus Opticus Cerebralis" should be used as it much better explains the origin as well as its affiliation to the central nervous system.

  2. RELAP5-3D developmental assessment: Comparison of version 4.2.1i on Linux and Windows

    Bayless, Paul D. [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2014-06-01

    Figures have been generated comparing the parameters used in the developmental assessment of the RELAP5-3D code, version 4.2i, compiled on Linux and Windows platforms. The figures, which are the same as those used in Volume III of the RELAP5-3D code manual, compare calculations using the semi-implicit solution scheme with available experiment data. These figures provide a quick, visual indication of how the code predictions differ between the Linux and Windows versions.

  3. RELAP5-3D Developmental Assessment. Comparison of Version 4.3.4i on Linux and Windows

    Bayless, Paul David

    2015-01-01

    Figures have been generated comparing the parameters used in the developmental assessment of the RELAP5-3D code, version 4.3i, compiled on Linux and Windows platforms. The figures, which are the same as those used in Volume III of the RELAP5-3D code manual, compare calculations using the semi-implicit solution scheme with available experiment data. These figures provide a quick, visual indication of how the code predictions differ between the Linux and Windows versions.

  4. A real-time computer simulation of nuclear simulator software using standard PC hardware and linux environments

    Cha, K. H.; Kweon, K. C.

    2001-01-01

    A feasibility study, which standard PC hardware and Real-Time Linux are applied to real-time computer simulation of software for a nuclear simulator, is presented in this paper. The feasibility prototype was established with the existing software in the Compact Nuclear Simulator (CNS). Throughout the real-time implementation in the feasibility prototype, we has identified that the approach can enable the computer-based predictive simulation to be approached, due to both the remarkable improvement in real-time performance and the less efforts for real-time implementation under standard PC hardware and Real-Time Linux envrionments

  5. Formal structures for extracting analytically justifiable decisions from ...

    This paper identifies the benefits of transforming business process models into Decision Support Systems (DSS). However, the literature reveals that a business process model “should have a formal foundation” as a major requirement for transforming it into a DSS. The paper further ascertains that formal structures refer to ...

  6. PENGUKURAN KINERJA ROUND-ROBIN SCHEDULER UNTUK LINUX VIRTUAL SERVER PADA KASUS WEB SERVER

    Royyana Muslim Ijtihadie

    2005-07-01

    Full Text Available Normal 0 false false false IN X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin:0cm; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} Dengan meningkatnya perkembangan jumlah pengguna internet dan mulai diadopsinya penggunaan internet dalam kehidupan sehari-hari, maka lalulintas data di Internet telah meningkat secara signifikan. Sejalan dengan itu pula beban kerja server-server yang memberikan service di Internet juga mengalami kenaikan yang cukup signifikan. Hal tersebut dapat mengakibatkan suatu server mengalami kelebihan beban pada suatu saat. Untuk mengatasi hal tersebut maka diterapkan skema konfigurasi server cluster menggunakan konsep load balancing. Load balancing server menerapkan algoritma dalam melakukan pembagian tugas. Algoritma round robin telah digunakan pada Linux Virtual Server. Penelitian ini melakukan pengukuran kinerja terhadap Linux Virtual Server yang menggunakan algoritma round robin untuk melakukan penjadwalan pembagian beban terhadap server. Penelitian ini mengukur performa dari sisi client yang mencoba mengakses web server.performa yang diukur adalah jumlah request yang bisa diselesaikan perdetik (request per second, waktu untuk menyelesaikan per satu request, dan   throughput yang dihasilkan. Dari hasil percobaan didapatkan bahwa penggunaan LVS bisa meningkatkan performa, yaitu menaikkan jumlah request per detik

  7. DB2 9 for Linux, Unix, and Windows database administration upgrade certification study guide

    Sanders, Roger E

    2007-01-01

    Written by one of the world's leading DB2 authors who is an active participant in the development of the DB2 certification exams, this resource covers everything a database adminstrator needs to know to pass the DB2 9 for Linux, UNIX, and Windows Database Administration Certification Upgrade exam (Exam 736). This comprehensive study guide discusses all exam topics: server management, data placement, XML concepts, analyzing activity, high availability, database security, and much more. Each chapter contains an extensive set of practice questions along with carefully explained answers. Both information-technology professionals who have experience as database administrators and have a current DBA certification on version 8 of DB2 and individuals who would like to learn the new features of DB2 9 will benefit from the information in this reference guide.

  8. RTSPM: real-time Linux control software for scanning probe microscopy.

    Chandrasekhar, V; Mehta, M M

    2013-01-01

    Real time computer control is an essential feature of scanning probe microscopes, which have become important tools for the characterization and investigation of nanometer scale samples. Most commercial (and some open-source) scanning probe data acquisition software uses digital signal processors to handle the real time data processing and control, which adds to the expense and complexity of the control software. We describe here scan control software that uses a single computer and a data acquisition card to acquire scan data. The computer runs an open-source real time Linux kernel, which permits fast acquisition and control while maintaining a responsive graphical user interface. Images from a simulated tuning-fork based microscope as well as a standard topographical sample are also presented, showing some of the capabilities of the software.

  9. Dugong: a Docker image, based on Ubuntu Linux, focused on reproducibility and replicability for bioinformatics analyses.

    Menegidio, Fabiano B; Jabes, Daniela L; Costa de Oliveira, Regina; Nunes, Luiz R

    2018-02-01

    This manuscript introduces and describes Dugong, a Docker image based on Ubuntu 16.04, which automates installation of more than 3500 bioinformatics tools (along with their respective libraries and dependencies), in alternative computational environments. The software operates through a user-friendly XFCE4 graphic interface that allows software management and installation by users not fully familiarized with the Linux command line and provides the Jupyter Notebook to assist in the delivery and exchange of consistent and reproducible protocols and results across laboratories, assisting in the development of open science projects. Source code and instructions for local installation are available at https://github.com/DugongBioinformatics, under the MIT open source license. Luiz.nunes@ufabc.edu.br. © The Author (2017). Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com

  10. 77 FR 5864 - BluePoint Linux Software Corp., China Bottles Inc., Long-e International, Inc., and Nano...

    2012-02-06

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] BluePoint Linux Software Corp., China Bottles Inc., Long-e International, Inc., and Nano Superlattice Technology, Inc.; Order of Suspension of... that there is a lack of current and accurate information concerning the securities of Nano Superlattice...

  11. ANALISIS DAN PERANCANGAN ARSITEKTUR SISTEM OTENTIKASI TERINTEGRASI ANTARA PLATFORM LINUX, WINDOWS 2000, DAN NOVELL NETWARE: STUDI KASUS JURUSAN TEKNIK INFORMATIKA FTIF ITS

    Rully Soelaiman

    2003-07-01

    Full Text Available Normal 0 false false false IN X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin:0cm; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} Jurusan Teknik Infomatika merupakan suatu organisasi yang menggunakan jaringan komputer yang diakses dari beberapa domain dan menggunakan sistem operasi terpisah. Masing-masing sistem tersebut menggunakan pengelolaan autentikasi yang terpisah, dengan kenyataan bahwa seharusnya dapat diakses oleh setiap anggota organisasi ini. Kebutuhan pengguna dan pengelola jaringan akan efisiensi pemakaian informasi autentikasi menjadi permasalahan yang akan dibahasa dana makalah ini. Pada makalah ini, dilakukan analisis kemungkinan dilakukannya otentikasi terintegrasi pada jaringan komputer Teknik Informatika yang menggunakan Windows 2000, Linux, dan Novell Netware. Analisis dilakukan dengan meninjau kemampuan integrasi direktori, metode otentikasi, dan kerjasama dengan sistem lain. Dari hasil pemetaan terhadap kebutuhan dan ketersediaan sumber daya teknologi pada jurusan, dipilih solusi otentikasi menggunakan Samba dan OpenLDAP untuk melayani permintaan otentikasi dari Windows 2000 dan Linux. Uji coba telah dilakukan untuk otentikasi client Windows 2000 dan Linux , mencakup login dari masing-masing sistem operasi, domain yang berbeda, menggunakan satu username dan password. Uji coba juga dilakukan terhadap proses

  12. Implementación del servicio de voz sobre IP en redes Linux y redes telefónicas análogas, utilizando software de comunicación sobre Linux

    Campos, Jorge Alberto; Guzmán, Mauricio Orlando; González Jiménez, Francisco Alirio

    2007-01-01

    Implementación del servicio de voz sobre IP en redes Linux y redes telefónicas análogas, utilizando software de comunicación sobre Linux La tecnología de voz sobre protocolos de comunicación TCP/IP (VoIP, Voice over IP) es la que permite la transmisión de la voz a través de redes digitales (LAN WAN, INTERNET, etc) en forma de paquetes de datos, utilizando para ello la infraestructura de intercambio de datos instalada. La telefonía IP es una aplicación inmediata de esta tecnología de forma ...

  13. Digital and multimedia forensics justified: An appraisal on professional policy and legislation

    Popejoy, Amy Lynnette

    Recent progress in professional policy and legislation at the federal level in the field of forensic science constructs a transformation of new outcomes for future experts. An exploratory and descriptive qualitative methodology was used to critique and examine Digital and Multimedia Science (DMS) as a justified forensic discipline. Chapter I summarizes Recommendations 1, 2, and 10 of the National Academy of Sciences (NAS) Report 2009 regarding disparities and challenges facing the forensic science community. Chapter I also delivers the overall foundation and framework of this thesis, specifically how it relates to DMS. Chapter II expands on Recommendation 1: "The Promotion and Development of Forensic Science," and focuses chronologically on professional policy and legislative advances through 2014. Chapter III addresses Recommendation 2: "The Standardization of Terminology in Reporting and Testimony," and the issues of legal language and terminology, model laboratory reports, and expert testimony concerning DMS case law. Chapter IV analyzes Recommendation 10: "Insufficient Education and Training," identifying legal awareness for the digital and multimedia examiner to understand the role of the expert witness, the attorney, the judge and the admission of forensic science evidence in litigation in our criminal justice system. Finally, Chapter V studies three DME specific laboratories at the Texas state, county, and city level, concentrating on current practice and procedure.

  14. How to Justify Purchase of an iPad: Users of the Latest Launch

    Emílio José Montero Arruda Filho

    2014-09-01

    Full Text Available Contemporary technology innovation is increasingly based on convergence and the multiple uses of products. This change is detailed in the literature about new product development, as well as that on systems integration. This article focuses on the factors that determine the justification for using advanced technology products in which the perceived value of the product is not based on its functionality, as much as on its hedonistic or social value as an “all-in-one” product. In this study, consumer behaviors toward the Apple iPad are analyzed using netnographic evidence taken from internet postings by the consumers themselves. Since Apple initially marketed the iPad as a revolutionary product, with integrated services and features, our analysis concentrates on how consumers perceived these new, innovative features, in an effort to justify their purchase of the product. Our findings indicate that consumers’ justifications are based not only on the iPad’s functionality, but also its hedonic traits, and its similarity to the previously released innovative product, the iPhone.

  15. Web-based Quality Control Tool used to validate CERES products on a cluster of Linux servers

    Chu, C.; Sun-Mack, S.; Heckert, E.; Chen, Y.; Mlynczak, P.; Mitrescu, C.; Doelling, D.

    2014-12-01

    There have been a few popular desktop tools used in the Earth Science community to validate science data. Because of the limitation on the capacity of desktop hardware such as disk space and CPUs, those softwares are not able to display large amount of data from files.This poster will talk about an in-house developed web-based software built on a cluster of Linux servers. That allows users to take advantage of a few Linux servers working in parallel to generate hundreds images in a short period of time. The poster will demonstrate:(1) The hardware and software architecture is used to provide high throughput of images. (2) The software structure that can incorporate new products and new requirement quickly. (3) The user interface about how users can manipulate the data and users can control how the images are displayed.

  16. Cloud BioLinux: pre-configured and on-demand bioinformatics computing for the genomics community

    2012-01-01

    Background A steep drop in the cost of next-generation sequencing during recent years has made the technology affordable to the majority of researchers, but downstream bioinformatic analysis still poses a resource bottleneck for smaller laboratories and institutes that do not have access to substantial computational resources. Sequencing instruments are typically bundled with only the minimal processing and storage capacity required for data capture during sequencing runs. Given the scale of sequence datasets, scientific value cannot be obtained from acquiring a sequencer unless it is accompanied by an equal investment in informatics infrastructure. Results Cloud BioLinux is a publicly accessible Virtual Machine (VM) that enables scientists to quickly provision on-demand infrastructures for high-performance bioinformatics computing using cloud platforms. Users have instant access to a range of pre-configured command line and graphical software applications, including a full-featured desktop interface, documentation and over 135 bioinformatics packages for applications including sequence alignment, clustering, assembly, display, editing, and phylogeny. Each tool's functionality is fully described in the documentation directly accessible from the graphical interface of the VM. Besides the Amazon EC2 cloud, we have started instances of Cloud BioLinux on a private Eucalyptus cloud installed at the J. Craig Venter Institute, and demonstrated access to the bioinformatic tools interface through a remote connection to EC2 instances from a local desktop computer. Documentation for using Cloud BioLinux on EC2 is available from our project website, while a Eucalyptus cloud image and VirtualBox Appliance is also publicly available for download and use by researchers with access to private clouds. Conclusions Cloud BioLinux provides a platform for developing bioinformatics infrastructures on the cloud. An automated and configurable process builds Virtual Machines, allowing the

  17. Cloud BioLinux: pre-configured and on-demand bioinformatics computing for the genomics community.

    Krampis, Konstantinos; Booth, Tim; Chapman, Brad; Tiwari, Bela; Bicak, Mesude; Field, Dawn; Nelson, Karen E

    2012-03-19

    A steep drop in the cost of next-generation sequencing during recent years has made the technology affordable to the majority of researchers, but downstream bioinformatic analysis still poses a resource bottleneck for smaller laboratories and institutes that do not have access to substantial computational resources. Sequencing instruments are typically bundled with only the minimal processing and storage capacity required for data capture during sequencing runs. Given the scale of sequence datasets, scientific value cannot be obtained from acquiring a sequencer unless it is accompanied by an equal investment in informatics infrastructure. Cloud BioLinux is a publicly accessible Virtual Machine (VM) that enables scientists to quickly provision on-demand infrastructures for high-performance bioinformatics computing using cloud platforms. Users have instant access to a range of pre-configured command line and graphical software applications, including a full-featured desktop interface, documentation and over 135 bioinformatics packages for applications including sequence alignment, clustering, assembly, display, editing, and phylogeny. Each tool's functionality is fully described in the documentation directly accessible from the graphical interface of the VM. Besides the Amazon EC2 cloud, we have started instances of Cloud BioLinux on a private Eucalyptus cloud installed at the J. Craig Venter Institute, and demonstrated access to the bioinformatic tools interface through a remote connection to EC2 instances from a local desktop computer. Documentation for using Cloud BioLinux on EC2 is available from our project website, while a Eucalyptus cloud image and VirtualBox Appliance is also publicly available for download and use by researchers with access to private clouds. Cloud BioLinux provides a platform for developing bioinformatics infrastructures on the cloud. An automated and configurable process builds Virtual Machines, allowing the development of highly

  18. Migration of the Three-dimensional Wind Field (3DWF) Model from Linux to Windows and Mobile Platforms

    2017-11-01

    Results in netCDF 11 4.3 Morphological Data Generation 16 5. 3DWF on Mobile Platforms 17 5.1 3DWF on Windows Mobile Devices 18 5.2 3DWF Migration to...Windows and Mobile Platforms by Giap Huynh and Yansen Wang Approved for public release; distribution is unlimited. NOTICES...Migration of the Three-dimensional Wind Field (3DWF) Model from Linux to Windows and Mobile Platforms by Giap Huynh and Yansen Wang

  19. Physicians and strikes: can a walkout over the malpractice crisis be ethically justified?

    Fiester, Autumn

    2004-01-01

    Malpractice insurance rates have created a crisis in American medicine. Rates are rising and reimbursements are not keeping pace. In response, physicians in the states hardest hit by this crisis are feeling compelled to take political action, and the current action of choice seems to be physician strikes. While the malpractice insurance crisis is acknowledged to be severe, does it justify the extreme action of a physician walkout? Should physicians engage in this type of collective action, and what are the costs to patients and the profession when such action is taken? I will offer three related arguments against physician strikes that constitute a prima facie prohibition against such action: first, strikes are intended to cause harm to patients; second, strikes are an affront to the physician-patient relationship; and, third, strikes risk decreasing the public's respect for the medical profession. As with any prima facie obligation, there are justifying conditions that may override the moral prohibition, but I will argue that the current malpractice crisis does not rise to the level of such a justifying condition. While the malpractice crisis demands and justifies a political response on the part of the nation's physicians, strikes and slow-downs are not an ethically justified means to the legitimate end of controlling insurance costs.

  20. Design and implementation of a scalable monitor system (IF-monitor) for Linux clusters

    Zhang Weiyi; Yu Chuansong; Sun Gongxing; Gu Ming

    2003-01-01

    PC clusters have become a cost-effective solution for high performance computing, usually only with the abilities of resource management and job scheduling, and unfortunately, with lack of powerful monitoring for built PC Farms. Therefore it is like a 'black box' for administrators who don't know how they run and where the bottlenecks are. In present there are a few of running PC Farms such as BES-Farm, LHC-Farm, YBJ-Farm at IHEP, CAS. As the scale of PC Farms growing and the IHEP campus grid computing environment implemented, it is more difficult to predict how these PC Farms perform. As a result, the SNMP-based tool called IF-Monitor that allows effective monitoring of large clusters have been designed and developed at IHEP. (authors)

  1. Covert Android Rootkit Detection: Evaluating Linux Kernel Level Rootkits on the Android Operating System

    2012-06-14

    modifies the same kernel memory as the first. Race conditions can be prevented using synchronization primitives (e.g., locks, semaphores ...exception and provides generic data structures and primitives to encourage code reuse by developers [Bov05]. These structures, that all programmers are

  2. Compatriot partiality and cosmopolitan justice: Can we justify compatriot partiality within the cosmopolitan framework?

    Rachelle Bascara

    2016-10-01

    Full Text Available This paper shows an alternative way in which compatriot partiality could be justified within the framework of global distributive justice. Philosophers who argue that compatriot partiality is similar to racial partiality capture something correct about compatriot partiality. However, the analogy should not lead us to comprehensively reject compatriot partiality. We can justify compatriot partiality on the same grounds that liberation movements and affirmative action have been justified. Hence, given cosmopolitan demands of justice, special consideration for the economic well-being of your nation as a whole is justified if and only if the country it identifies is an oppressed developing nation in an unjust global order.This justification is incomplete. We also need to say why Person A, qua national of Country A, is justified in helping her compatriots in Country A over similarly or slightly more oppressed non-compatriots in Country B. I argue that Person A’s partiality towards her compatriots admits further vindication because it is part of an oppressed group’s project of self-emancipation, which is preferable to paternalistic emancipation.Finally, I identify three benefits in my justification for compatriot partiality. First, I do not offer a blanket justification for all forms of compatriot partiality. Partiality between members of oppressed groups is only a temporary effective measure designed to level an unlevel playing field. Second, because history attests that sovereign republics could arise as a collective response to colonial oppression, justifying compatriot partiality on the grounds that I have identified is conducive to the development of sovereignty and even democracy in poor countries, thereby avoiding problems of infringement that many humanitarian poverty alleviation efforts encounter. Finally, my justification for compatriot partiality complies with the implicit cosmopolitan commitment to the realizability of global justice

  3. VISPA - Visual Physics Analysis on Linux, Mac OS X and Windows

    Brodski, M.; Erdmann, M.; Fischer, R.; Hinzmann, A.; Klimkovich, T.; Mueller, G.; Muenzer, T.; Steggemann, J.; Winchen, T.

    2009-01-01

    Modern physics analysis is an iterative task consisting of prototyping, executing and verifying the analysis procedure. For supporting scientists in each step of this process, we developed VISPA: a toolkit based on graphical and textual elements for visual physics analysis. Unlike many other analysis frameworks VISPA runs on Linux, Windows and Mac OS X. VISPA can be used in any experiment with serial data flow. In particular, VISPA can be connected to any high energy physics experiment. Furthermore, datatypes for the usage in astroparticle physics have recently been successfully included. An analysis on the data is performed in several steps, each represented by an individual module. While modules e.g. for file input and output are already provided, additional modules can be written by the user with C++ or the Python language. From individual modules, the analysis is designed by graphical connections representing the data flow. This modular concept assists the user in fast prototyping of the analysis and improves the reusability of written source code. The execution of the analysis can be performed directly from the GUI, or on any supported computer in batch mode. Therefore the analysis can be transported from the laptop to other machines. The recently improved GUI of VISPA is based on a plug-in mechanism. Besides components for the development and execution of physics analysis, additional plug-ins are available for the visualization of e.g. the structure of high energy physics events or the properties of cosmic rays in an astroparticle physics analysis. Furthermore plug-ins have been developed to display and edit configuration files of individual experiments from within the VISPA GUI. (author)

  4. Hierarchical Image Segmentation of Remotely Sensed Data using Massively Parallel GNU-LINUX Software

    Tilton, James C.

    2003-01-01

    A hierarchical set of image segmentations is a set of several image segmentations of the same image at different levels of detail in which the segmentations at coarser levels of detail can be produced from simple merges of regions at finer levels of detail. In [1], Tilton, et a1 describes an approach for producing hierarchical segmentations (called HSEG) and gave a progress report on exploiting these hierarchical segmentations for image information mining. The HSEG algorithm is a hybrid of region growing and constrained spectral clustering that produces a hierarchical set of image segmentations based on detected convergence points. In the main, HSEG employs the hierarchical stepwise optimization (HSWO) approach to region growing, which was described as early as 1989 by Beaulieu and Goldberg. The HSWO approach seeks to produce segmentations that are more optimized than those produced by more classic approaches to region growing (e.g. Horowitz and T. Pavlidis, [3]). In addition, HSEG optionally interjects between HSWO region growing iterations, merges between spatially non-adjacent regions (i.e., spectrally based merging or clustering) constrained by a threshold derived from the previous HSWO region growing iteration. While the addition of constrained spectral clustering improves the utility of the segmentation results, especially for larger images, it also significantly increases HSEG s computational requirements. To counteract this, a computationally efficient recursive, divide-and-conquer, implementation of HSEG (RHSEG) was devised, which includes special code to avoid processing artifacts caused by RHSEG s recursive subdivision of the image data. The recursive nature of RHSEG makes for a straightforward parallel implementation. This paper describes the HSEG algorithm, its recursive formulation (referred to as RHSEG), and the implementation of RHSEG using massively parallel GNU-LINUX software. Results with Landsat TM data are included comparing RHSEG with classic

  5. Debian 7 system administration best practices

    Pollei, Rich

    2013-01-01

    A step-by-step, example-based guide to learning how to install and administer the Debian Linux distribution.Debian 7: System Administration Best Practices is for users and administrators who are new to Debian, or for seasoned administrators who are switching to Debian from another Linux distribution. A basic knowledge of Linux or UNIX systems is useful, but not strictly required. Since the book is a high level guide, the reader should be willing to go to the referenced material for further details and practical examples.

  6. The Luckless and the Doomed: Contractualism on Justified Risk-Imposition

    Holm, Sune Hannibal

    2018-01-01

    Several authors have argued that contractualism faces a dilemma when it comes to justifying risks generated by socially valuable activities. At the heart of the matter is the question of whether contractualists should adopt an ex post or an ex ante perspective when assessing whether an action...... to prohibit a range of intuitively permissible and socially valuable activities....

  7. Context Based Inferences in Research Methodology: The Role of Culture in Justifying Knowledge Claims

    Evers, Colin W.; Mason, Mark

    2011-01-01

    Drawing on work in epistemology and the philosophy of science, this paper seeks to provide very general reasons for why a comparative perspective needs to be applied to the inferential procedures of research methodologies where these concern the issue of justifying knowledge claims. In particular, the paper explores the role of culture on a number…

  8. Justifying the Use of Internet Sources in School Assignments on Controversial Issues

    Mikkonen, Teemu

    2018-01-01

    Introduction: This study concerns students' criteria in the evaluation of Internet sources for a school assignment requiring reflections on a controversial issue. The findings are elaborated by analysing students' discursive accounts in justifying the use or non-use of sources. Method: The interview data was collected in a Finnish upper secondary…

  9. Mandatory Personal Therapy: Does the Evidence Justify the Practice? In Debate

    Chaturvedi, Surabhi

    2013-01-01

    The article addresses the question of whether the practice of mandatory personal therapy, followed by several training organisations, is justified by existing research and evidence. In doing so, it discusses some implications of this training requirement from an ethical and ideological standpoint, raising questions of import for training…

  10. "Men Are Dogs": Is The Stereotype Justified? Data On the Cheating College Male

    Knox, David; Vail-Smith, Karen; Zusman, Marty

    2008-01-01

    Analysis of data from 1394 undergraduates at a large southeastern university were used to assess the degree to which the stereotype that "men are dogs" (sexually-focused cheaters) is justified. Results suggest that this stereotype is unjustified since the majority of males: (1) define behaviors from kissing to anal sex as cheating; (2)…

  11. "Teach Your Children Well": Arguing in Favor of Pedagogically Justifiable Hospitality Education

    Potgieter, Ferdinand J.

    2016-01-01

    This paper is a sequel to the paper which I delivered at last year's BCES conference in Sofia. Making use of hermeneutic phenomenology and constructive interpretivism as methodological apparatus, I challenge the pedagogic justifiability of the fashionable notion of religious tolerance. I suggest that we need, instead, to reflect "de…

  12. LINK codes TRAC-BF1/PARCSv2.7 in LINUX without external communication interface; Acoplamiento de los codigos TRAC-BF1/PARCSv2.7 en Linux sin interfaz externa de comunicacion

    Barrachina, T.; Garcia-Fenoll, M.; Abarca, A.; Miro, R.; Verdu, G.; Concejal, A.; Solar, A.

    2014-07-01

    The TRAC-BF1 code is still widely used by the nuclear industry for safety analysis. The plant models developed using this code are highly validated, so it is advisable to continue improving this code before migrating to another completely different code. The coupling with the NRC neutronic code PARCSv2.7 increases the simulation capabilities in transients in which the power distribution plays an important role. In this paper, the procedure for the coupling of TRAC-BF1 and PARCSv2.7 codes without PVM and in Linux is presented. (Author)

  13. SS-Wrapper: a package of wrapper applications for similarity searches on Linux clusters

    Lefkowitz Elliot J

    2004-10-01

    Full Text Available Abstract Background Large-scale sequence comparison is a powerful tool for biological inference in modern molecular biology. Comparing new sequences to those in annotated databases is a useful source of functional and structural information about these sequences. Using software such as the basic local alignment search tool (BLAST or HMMPFAM to identify statistically significant matches between newly sequenced segments of genetic material and those in databases is an important task for most molecular biologists. Searching algorithms are intrinsically slow and data-intensive, especially in light of the rapid growth of biological sequence databases due to the emergence of high throughput DNA sequencing techniques. Thus, traditional bioinformatics tools are impractical on PCs and even on dedicated UNIX servers. To take advantage of larger databases and more reliable methods, high performance computation becomes necessary. Results We describe the implementation of SS-Wrapper (Similarity Search Wrapper, a package of wrapper applications that can parallelize similarity search applications on a Linux cluster. Our wrapper utilizes a query segmentation-search (QS-search approach to parallelize sequence database search applications. It takes into consideration load balancing between each node on the cluster to maximize resource usage. QS-search is designed to wrap many different search tools, such as BLAST and HMMPFAM using the same interface. This implementation does not alter the original program, so newly obtained programs and program updates should be accommodated easily. Benchmark experiments using QS-search to optimize BLAST and HMMPFAM showed that QS-search accelerated the performance of these programs almost linearly in proportion to the number of CPUs used. We have also implemented a wrapper that utilizes a database segmentation approach (DS-BLAST that provides a complementary solution for BLAST searches when the database is too large to fit into

  14. SS-Wrapper: a package of wrapper applications for similarity searches on Linux clusters.

    Wang, Chunlin; Lefkowitz, Elliot J

    2004-10-28

    Large-scale sequence comparison is a powerful tool for biological inference in modern molecular biology. Comparing new sequences to those in annotated databases is a useful source of functional and structural information about these sequences. Using software such as the basic local alignment search tool (BLAST) or HMMPFAM to identify statistically significant matches between newly sequenced segments of genetic material and those in databases is an important task for most molecular biologists. Searching algorithms are intrinsically slow and data-intensive, especially in light of the rapid growth of biological sequence databases due to the emergence of high throughput DNA sequencing techniques. Thus, traditional bioinformatics tools are impractical on PCs and even on dedicated UNIX servers. To take advantage of larger databases and more reliable methods, high performance computation becomes necessary. We describe the implementation of SS-Wrapper (Similarity Search Wrapper), a package of wrapper applications that can parallelize similarity search applications on a Linux cluster. Our wrapper utilizes a query segmentation-search (QS-search) approach to parallelize sequence database search applications. It takes into consideration load balancing between each node on the cluster to maximize resource usage. QS-search is designed to wrap many different search tools, such as BLAST and HMMPFAM using the same interface. This implementation does not alter the original program, so newly obtained programs and program updates should be accommodated easily. Benchmark experiments using QS-search to optimize BLAST and HMMPFAM showed that QS-search accelerated the performance of these programs almost linearly in proportion to the number of CPUs used. We have also implemented a wrapper that utilizes a database segmentation approach (DS-BLAST) that provides a complementary solution for BLAST searches when the database is too large to fit into the memory of a single node. Used together

  15. Letter: Can Islamic Jurisprudence Justify Procurement of Transplantable Vital Organs in Brain Death?

    Rady, Mohamed Y

    2018-01-01

    In their article, "An International Legal Review of the Relationship between Brain Death and Organ Transplantation," in The Journal of Clinical Ethics 29, no. 1, Aramesh, Arima, Gardiner, and Shah reported on diverse international legislative approaches for justifying procurement of transplantable vital organs in brain death. They stated, "In Islamic traditions in particular, the notion of unstable life is a way to justify organ donation from brain-dead patients that we believe has not been fully described previously in the literature." This commentary queries the extent to which this concept is valid in accordance with the primary source of Islamic law, that is, the Quran. Copyright 2018 The Journal of Clinical Ethics. All rights reserved.

  16. Justifying decisions in social dilemmas: justification pressures and tacit coordination under environmental uncertainty.

    de Kwaadsteniet, Erik W; van Dijk, Eric; Wit, Arjaan; De Cremer, David; de Rooij, Mark

    2007-12-01

    This article investigates how justification pressures influence harvesting decisions in common resource dilemmas. The authors argue that when a division rule prescribes a specific harvest level, such as under environmental certainty, people adhere more strongly to this division rule when they have to justify their decisions to fellow group members. When a division rule does not prescribe a specific harvest level, such as under environmental uncertainty, people restrict their harvests when they have to justify their decisions to fellow group members. The results of two experimental studies corroborate this line of reasoning. The findings are discussed in terms of tacit coordination. The authors specify conditions under which justification pressures may or may not facilitate efficient coordination.

  17. How arguments are justified in the media debate on climate change in the USA and France

    Ylä-Anttila, Tuomas; Kukkonen, Anna

    2014-01-01

    This paper examines the differences in the values that are evoked to justify arguments in the media debate on climate change in USA and France from 1997 to 2011. We find that climate change is more often discussed in terms of justice, democracy, and legal regulation in France, while monetary value plays a more important role as a justification for climate policy arguments in the USA. Technological and scientific arguments are more often made in France, and ecological arguments equally in both...

  18. Why Do Women Justify Violence Against Wives More Often Than Do Men in Vietnam?

    Krause, Kathleen H; Gordon-Roberts, Rachel; VanderEnde, Kristin; Schuler, Sidney Ruth; Yount, Kathryn M

    2015-05-06

    Intimate partner violence (IPV) harms the health of women and their children. In Vietnam, 31% of women report lifetime exposure to physical IPV, and surprisingly, women justify physical IPV against wives more often than do men. We compare men's and women's rates of finding good reason for wife hitting and assess whether differences in childhood experiences and resources and constraints in adulthood account for observed differences. Probability samples of married men (n = 522) and women (n = 533) were surveyed in Vietnam. Ordered logit models assessed the proportional odds for women versus men of finding more "good reasons" to hit a wife (never, 1-3 situations, 4-6 situations). In all situations, women found good reason to hit a wife more often than did men. The unadjusted odds for women versus men of reporting more good reasons to hit a wife were 6.55 (95% confidence interval [CI] = [4.82, 8.91]). This gap disappeared in adjusted models that included significant interactions of gender with age, number of children ever born, and experience of physical IPV as an adult. Having children was associated with justifying wife hitting among women but not men. Exposure to IPV in adulthood was associated with justifying wife hitting among men, but was negatively associated with justification of IPV among women. Further study of the gendered effects of resources and constraints in adulthood on attitudes about IPV against women will clarify women's more frequent reporting than men's that IPV against women is justified. © The Author(s) 2015.

  19. Animal Models in Forensic Science Research: Justified Use or Ethical Exploitation?

    Mole, Calvin Gerald; Heyns, Marise

    2018-05-01

    A moral dilemma exists in biomedical research relating to the use of animal or human tissue when conducting scientific research. In human ethics, researchers need to justify why the use of humans is necessary should suitable models exist. Conversely, in animal ethics, a researcher must justify why research cannot be carried out on suitable alternatives. In the case of medical procedures or therapeutics testing, the use of animal models is often justified. However, in forensic research, the justification may be less evident, particularly when research involves the infliction of trauma on living animals. To determine how the forensic science community is dealing with this dilemma, a review of literature within major forensic science journals was conducted. The frequency and trends of the use of animals in forensic science research was investigated for the period 1 January 2012-31 December 2016. The review revealed 204 original articles utilizing 5050 animals in various forms as analogues for human tissue. The most common specimens utilized were various species of rats (35.3%), pigs (29.3%), mice (17.7%), and rabbits (8.2%) although different specimens were favored in different study themes. The majority of studies (58%) were conducted on post-mortem specimens. It is, however, evident that more needs to be done to uphold the basic ethical principles of reduction, refinement and replacement in the use of animals for research purposes.

  20. Influenza vaccination in Dutch nursing homes: is tacit consent morally justified?

    Verweij, M F; van den Hoven, M A

    2005-01-01

    Efficient procedures for obtaining informed (proxy) consent may contribute to high influenza vaccination rates in nursing homes. Yet are such procedures justified? This study's objective was to gain insight in informed consent policies in Dutch nursing homes; to assess how these may affect influenza vaccination rates and to answer the question whether deviating from standard informed consent procedures could be morally justified. A survey among nursing home physicians. We sent a questionnaire to all (356) nursing homes in the Netherlands, to be completed by one of the physicians. We received 245 completed questionnaires. As 21 institutions appeared to be closed or merged into other institutions, the response was 73.1% (245/335). Of all respondents 81.9% reported a vaccination rate above 80%. Almost 50% reported a vaccination rate above 90%. Most respondents considered herd immunity to be an important consideration for institutional policy. Freedom of choice for residents was considered important by almost all. Nevertheless, 106 out of 245 respondents follow a tacit consent procedure, according to which vaccination will be administered unless the resident or her proxy refuses. These institutions show significantly higher vaccination rates (p tacit consent procedures can be morally justifiable. Such procedures assume that vaccination is good for residents either as individuals or as a group. Even though this assumption may be true for most residents, there are good reasons for preferring express consent procedures.

  1. An Overview of Android Operating System and Its Security Features

    Rajinder Singh

    2014-01-01

    Android operating system is one of the most widely used operating system these days. Android Operating System is mainly divided into four main layers: the kernel, libraries, application framework and applications. Its kernel is based on Linux. Linux kernel is used to manage core system services such as virtual memory, networking, drivers, and power management. In these paper different features of architecture of Android OS as well security features of Android OS are discussed.

  2. EVTux: Uma Distribuição Linux para a Disciplina de EVT e para as Artes

    José Alberto Rodrigues

    2012-09-01

    Full Text Available O EVTux é uma distribuição de Linux que tem por base o trabalho de investigação que desenvolvemos sobre a integração de ferramentas digitais na disciplina de Educação Visual e Tecnológica. Após dezoito meses de estudo e desenvolvimento do projeto com um grupo de cerca de noventa colaboradores, recensearam-se quatrocentas e trinta ferramentas digitais passíveis de integração em contexto de Educação Visual e Tecnológica. Dessa listagem surgiu a posterior catalogação e categorização das ferramentas, tendo em conta os conteúdos e áreas de exploração da disciplina. O EVTux tem pré-instaladas todas as aplicações para Linux, bem como, integradas no browser, as ferramentas digitais que não necessitam de instalação e abrem diretamente a partir de uma página na internet, para além dos mais de trezentos e cinquenta manuais de apoio à utilização dessas ferramentas. Já disponível, o EVTux constitui-se como um poderoso recurso que agrega todo o trabalho do EVTdigital, sendo uma ferramenta de eleição para os docentes desta disciplina e das Artes utilizarem em contexto de sala de aula.

  3. Justifiability and Animal Research in Health: Can Democratisation Help Resolve Difficulties?

    2018-01-01

    Simple Summary Scientists justify animal use in medical research because the benefits to human health outweigh the costs or harms to animals. However, whether it is justifiable is controversial for many people. Even public interests are divided because an increasing proportion of people do not support animal research, while demand for healthcare that is based on animal research is also rising. The wider public should be given more influence in these difficult decisions. This could be through requiring explicit disclosure about the role of animals in drug labelling to inform the public out of respect for people with strong objections. It could also be done through periodic public consultations that use public opinion and expert advice to decide which diseases justify the use of animals in medical research. More public input will help ensure that animal research projects meet public expectations and may help to promote changes to facilitate medical advances that need fewer animals. Abstract Current animal research ethics frameworks emphasise consequentialist ethics through cost-benefit or harm-benefit analysis. However, these ethical frameworks along with institutional animal ethics approval processes cannot satisfactorily decide when a given potential benefit is outweighed by costs to animals. The consequentialist calculus should, theoretically, provide for situations where research into a disease or disorder is no longer ethical, but this is difficult to determine objectively. Public support for animal research is also falling as demand for healthcare is rising. Democratisation of animal research could help resolve these tensions through facilitating ethical health consumerism or giving the public greater input into deciding the diseases and disorders where animal research is justified. Labelling drugs to disclose animal use and providing a plain-language summary of the role of animals may help promote public understanding and would respect the ethical beliefs of

  4. Scalability of a Low-Cost Multi-Teraflop Linux Cluster for High-End Classical Atomistic and Quantum Mechanical Simulations

    Kikuchi, Hideaki; Kalia, Rajiv K.; Nakano, Aiichiro; Vashishta, Priya; Shimojo, Fuyuki; Saini, Subhash

    2003-01-01

    Scalability of a low-cost, Intel Xeon-based, multi-Teraflop Linux cluster is tested for two high-end scientific applications: Classical atomistic simulation based on the molecular dynamics method and quantum mechanical calculation based on the density functional theory. These scalable parallel applications use space-time multiresolution algorithms and feature computational-space decomposition, wavelet-based adaptive load balancing, and spacefilling-curve-based data compression for scalable I/O. Comparative performance tests are performed on a 1,024-processor Linux cluster and a conventional higher-end parallel supercomputer, 1,184-processor IBM SP4. The results show that the performance of the Linux cluster is comparable to that of the SP4. We also study various effects, such as the sharing of memory and L2 cache among processors, on the performance.

  5. Switching the JLab Accelerator Operations Environment from an HP-UX Unix-based to a PC/Linux-based environment

    Mcguckin, Theodore

    2008-01-01

    The Jefferson Lab Accelerator Controls Environment (ACE) was predominantly based on the HP-UX Unix platform from 1987 through the summer of 2004. During this period the Accelerator Machine Control Center (MCC) underwent a major renovation which included introducing Redhat Enterprise Linux machines, first as specialized process servers and then gradually as general login servers. As computer programs and scripts required to run the accelerator were modified, and inherent problems with the HP-UX platform compounded, more development tools became available for use with Linux and the MCC began to be converted over. In May 2008 the last HP-UX Unix login machine was removed from the MCC, leaving only a few Unix-based remote-login servers still available. This presentation will explore the process of converting an operational Control Room environment from the HP-UX to Linux platform as well as the many hurdles that had to be overcome throughout the transition period

  6. REMASTERING SISTEM OPERASI BERBASIS OPEN SOURCE LINUX UNTUK PEMBELAJARAN KIMIA (STUDI KASUS PADA MATA KULIAH KOMPUTASI DATA JURUSAN ANALIS KIMIA UNDIKSHA

    Ni Wayan Martiningsih

    2015-01-01

    Full Text Available Penelitian ini bertujuan untuk merancang pengembangan remastering sistem operasi berbasis open source linux untuk pembelajaran kimia pada mata kuliah Komputasi Data dan mengetahui respon mahasiswa terhadap remastering sistem operasi tersebut. Rancangan yang digunakan dalam penelitian ini adalah rancangan penelitian pengembangan (Research and Development. Pengumpulan data respon mahasiswa dilakukan dengan cara pemberian angket kepada mahasiswa. Data yang terkumpul dianalisis secara statistik deskriptif. Rancangan remastering dilakukan berdasarkan analisis kebutuhan pada mata kuliah Komputasi Data. Remastering dirancang menggunakan Linux Ubuntu 10.4 dan menggabungkan program aplikasi kimia yaitu Avogadro, Bkchen, Chemical calculator, dwawXTL, GabEdit, GchemPaint, Gperiodic, Kalzium, PeriodicTable, XdrawChem. Respon mahasiswa terhadap  pengembangan remastering sistem operasi linux untuk pembelajaran kimia pada mata kuliah Komputasi Data adalah sangat positif

  7. An easy-to-build, low-budget point-of-care ultrasound simulator: from Linux to a web-based solution.

    Damjanovic, Domagoj; Goebel, Ulrich; Fischer, Benedikt; Huth, Martin; Breger, Hartmut; Buerkle, Hartmut; Schmutz, Axel

    2017-12-01

    Hands-on training in point-of-care ultrasound (POC-US) should ideally comprise bedside teaching, as well as simulated clinical scenarios. High-fidelity phantoms and portable ultrasound simulation systems are commercially available, however, at considerable costs. This limits their suitability for medical schools. A Linux-based software for Emergency Department Ultrasound Simulation (edus2TM) was developed by Kulyk and Olszynski in 2011. Its feasibility for POC-US education has been well-documented, and shows good acceptance. An important limitation to an even more widespread use of edus2, however, may be due to the need for a virtual machine for WINDOWS ® systems. Our aim was to adapt the original software toward an HTML-based solution, thus making it affordable and applicable in any simulation setting. We created an HTML browser-based ultrasound simulation application, which reads the input of different sensors, triggering an ultrasound video to be displayed on a respective device. RFID tags, NFC tags, and QR Codes™ have been integrated into training phantoms or were attached to standardized patients. The RFID antenna was hidden in a mock ultrasound probe. The application is independent from the respective device. Our application was used successfully with different trigger/scanner combinations and mounted readily into simulated training scenarios. The application runs independently from operating systems or electronic devices. This low-cost, browser-based ultrasound simulator is easy-to-build, very adaptive, and independent from operating systems. It has the potential to facilitate POC-US training throughout the world, especially in resource-limited areas.

  8. [Justifying measures to correct functional state of operators varying in personal anxiety].

    2012-01-01

    Workers of operating and dispatching occupations are exposed to high nervous and emotional exertion that result in increased personal anxiety, working stress and overstrain. That requires physiologically justified correction of hazardous psycho-physiologic states via various prophylactic measures (stay in schungite room, autogenous training, central electric analgesia, electric acupuncture). Attempted relaxation sessions in schungite room revealed in highly anxious individuals an increased velocity of visual signals perception, of attention concentration and shifting. Autogenous training sessions improve memory and have significant hypotensive effect in highly anxious individuals.

  9. Is Investment in Maize Research Balanced and Justified? An Empirical Study

    Hari Krishna Shrestha

    2016-12-01

    Full Text Available The objective of this study was to investigate whether the investment in maize research was adequate and balanced in Nepalese context. Resource use in maize research was empirically studied with standard congruency analysis by using Full Time Equivalent (FTE of researchers as a proxy measure of investment. The number of researchers involved in maize was 61 but it was only 21.25 on FTE basis, indicating that full time researchers were very few as compared to the cultivated area of maize in the country. Statistical analysis revealed that the investment in maize research was higher in Tarai and lower in the Hills. Congruency index on actual production basis was found low across the eco-zones and even lower across the geographical regions indicating that the investment in maize research was a mismatch and not justified. While adjusted with the equity factor and the research progress factor in the analysis substantial difference was not found in congruency index. This study recommends that substantial increase in investment in maize research is needed with balanced and justified manner across the eco-zones and the geographical regions. Hills need special attention to increase the investment as maize output value is higher in this eco-zone. Eastern and western regions also need increased investment in maize according to their contribution in the output value.

  10. Low Overhead Real-Time Computing With General Purpose Operating Systems

    Raymond, Michael

    2004-01-01

    .... In larger systems and more recently, general-purpose operating systems such as SGI IRIX and Linux are used for new projects because they already have multiprocessor and device driver support as well a large user base...

  11. Arlequin suite ver 3.5: a new series of programs to perform population genetics analyses under Linux and Windows.

    Excoffier, Laurent; Lischer, Heidi E L

    2010-05-01

    We present here a new version of the Arlequin program available under three different forms: a Windows graphical version (Winarl35), a console version of Arlequin (arlecore), and a specific console version to compute summary statistics (arlsumstat). The command-line versions run under both Linux and Windows. The main innovations of the new version include enhanced outputs in XML format, the possibility to embed graphics displaying computation results directly into output files, and the implementation of a new method to detect loci under selection from genome scans. Command-line versions are designed to handle large series of files, and arlsumstat can be used to generate summary statistics from simulated data sets within an Approximate Bayesian Computation framework. © 2010 Blackwell Publishing Ltd.

  12. Perancangan Laboratorium Komputer Menggunakan Jaringan Diskless Berbasis Linux Terminal Server Project dan Pemanfaatan Epoptes Sebagai Aplikasi Monitoring

    Gufron Gufron

    2016-05-01

    Full Text Available Keberadaan laboratorium komputer sebagai media dan sarana pembelajaran memegang peranan yang sangat penting terhadap proses keberhasilan pembelajaran di institusi pendidikan, sehingga dengan demikian diharapkan guru dan siswa dapat menguasai teknologi dan informasi yang sangat penting di era globalisasi sekarang ini. Namun pengadaan komputer dalam jumlah banyak membutuhkan investasi yang tidak sedikit. Permasalahan lain adalah kurang optimalnya pengawasan komputer yang digunakan siswa. Solusi untuk mengatasi hal tersebut adalah membuat laboratorium komputer menggunakan jaringan diskless berbasis Linux Terminal Server Project (LTSP, sehingga satu komputer dapat digunakan oleh dua orang atau lebih dalam waktu bersamaan dan dengan menjalankan aplikasi yang sama ataupun berbeda, serta memanfaatkan epoptes sebagai aplikasi untuk monitoring dan pengawasan penggunaan komputer.

  13. The upper level of control system of electron accelerators

    Gribov, I.V.; Nedeoglo, F.N.; Shvedunov, I.V.

    2005-01-01

    The upper level software of a three-level control system that supports several electron accelerators is described. This software operates in the Linux and RTLinux (Real Time Linux) environment. The object information model functions on the basis of a parametric description supported by the SQLite Data Base Management System. The Javascript sublanguage is used for script forming, and the Qt Designer application is used to construct the user interface [ru

  14. How can health care organisations make and justify decisions about risk reduction? Lessons from a cross-industry review and a health care stakeholder consensus development process

    Sujan, Mark A.; Habli, Ibrahim; Kelly, Tim P.; Gühnemann, Astrid; Pozzi, Simone; Johnson, Christopher W.

    2017-01-01

    Interventions to reduce risk often have an associated cost. In UK industries decisions about risk reduction are made and justified within a shared regulatory framework that requires that risk be reduced as low as reasonably practicable. In health care no such regulatory framework exists, and the practice of making decisions about risk reduction is varied and lacks transparency. Can health care organisations learn from relevant industry experiences about making and justifying risk reduction decisions? This paper presents lessons from a qualitative study undertaken with 21 participants from five industries about how such decisions are made and justified in UK industry. Recommendations were developed based on a consensus development exercise undertaken with 20 health care stakeholders. The paper argues that there is a need in health care to develop a regulatory framework and an agreed process for managing explicitly the trade-off between risk reduction and cost. The framework should include guidance about a health care specific notion of acceptable levels of risk, guidance about standardised risk reduction interventions, it should include regulatory incentives for health care organisations to reduce risk, and it should encourage the adoption of an approach for documenting explicitly an organisation's risk position. - Highlights: • Empirical description of industry perceptions on making risk reduction decisions. • Health care consensus development identified five recommendations. • Risk concept should be better integrated into safety management. • Education and awareness about risk concept are required. • Health systems need to start a dialogue about acceptable levels of risk.

  15. Justifying molecular images in cell biology textbooks: From constructions to primary data.

    Serpente, Norberto

    2016-02-01

    For scientific claims to be reliable and productive they have to be justified. However, on the one hand little is known on what justification precisely means to scientists, and on the other the position held by philosophers of science on what it entails is rather limited; for justifications customarily refer to the written form (textual expressions) of scientific claims, leaving aside images, which, as many cases from the history of science show are relevant to this process. The fact that images can visually express scientific claims independently from text, plus their vast variety and origins, requires an assessment of the way they are currently justified and in turn used as sources to justify scientific claims in the case of particular scientific fields. Similarly, in view of the different nature of images, analysis is required to determine on what side of the philosophical distinction between data and phenomena these different kinds of images fall. This paper historicizes and documents a particular aspect of contemporary life sciences research: the use of the molecular image as vehicle of knowledge production in cell studies, a field that has undergone a significant shift in visual expressions from the early 1980s onwards. Focussing on textbooks as sources that have been overlooked in the historiography of contemporary biomedicine, the aim is to explore (1) whether the shift of cell studies, entailing a superseding of the optical image traditionally conceptualised as primary data, by the molecular image, corresponds with a shift of justificatory practices, and (2) to assess the role of the molecular image as primary data. This paper also explores the dual role of images as teaching resources and as resources for the construction of knowledge in cell studies especially in its relation to discovery and justification. Finally, this paper seeks to stimulate reflection on what kind of archival resources could benefit the work of present and future epistemic

  16. How to justify enforcing a Ulysses contract when Ulysses is competent to refuse.

    Davis, John K

    2008-03-01

    Sometimes the mentally ill have sufficient mental capacity to refuse treatment competently, and others have a moral duty to respect their refusal. However, those with episodic mental disorders may wish to precommit themselves to treatment, using Ulysses contracts known as "mental health advance directives." How can health care providers justify enforcing such contracts over an agent's current, competent refusal? I argue that providers respect an agent's autonomy not retrospectively--by reference to his or her past wishes-and not merely synchronically--so that the agent gets what he or she wants right now-but diachronically and prospectively, acting so that the agent can shape his or her circumstances as the agent wishes over time, for the agent will experience the consequences of providers' actions over time. Mental health directives accomplish this, so they are a way of respecting the agent's autonomy even when providers override the agent's current competent refusal.

  17. Justifying gender discrimination in the workplace: The mediating role of motherhood myths.

    Verniers, Catherine; Vala, Jorge

    2018-01-01

    The issue of gender equality in employment has given rise to numerous policies in advanced industrial countries, all aimed at tackling gender discrimination regarding recruitment, salary and promotion. Yet gender inequalities in the workplace persist. The purpose of this research is to document the psychosocial process involved in the persistence of gender discrimination against working women. Drawing on the literature on the justification of discrimination, we hypothesized that the myths according to which women's work threatens children and family life mediates the relationship between sexism and opposition to a mother's career. We tested this hypothesis using the Family and Changing Gender Roles module of the International Social Survey Programme. The dataset contained data collected in 1994 and 2012 from 51632 respondents from 18 countries. Structural equation modellings confirmed the hypothesised mediation. Overall, the findings shed light on how motherhood myths justify the gender structure in countries promoting gender equality.

  18. What justifies the United States ban on federal funding for nonreproductive cloning?

    Cunningham, Thomas V

    2013-11-01

    This paper explores how current United States policies for funding nonreproductive cloning are justified and argues against that justification. I show that a common conceptual framework underlies the national prohibition on the use of public funds for cloning research, which I call the simple argument. This argument rests on two premises: that research harming human embryos is unethical and that embryos produced via fertilization are identical to those produced via cloning. In response to the simple argument, I challenge the latter premise. I demonstrate there are important ontological differences between human embryos (produced via fertilization) and clone embryos (produced via cloning). After considering the implications my argument has for the morality of publicly funding cloning for potential therapeutic purposes and potential responses to my position, I conclude that such funding is not only ethically permissible, but also humane national policy.

  19. Justifying gender discrimination in the workplace: The mediating role of motherhood myths

    2018-01-01

    The issue of gender equality in employment has given rise to numerous policies in advanced industrial countries, all aimed at tackling gender discrimination regarding recruitment, salary and promotion. Yet gender inequalities in the workplace persist. The purpose of this research is to document the psychosocial process involved in the persistence of gender discrimination against working women. Drawing on the literature on the justification of discrimination, we hypothesized that the myths according to which women’s work threatens children and family life mediates the relationship between sexism and opposition to a mother’s career. We tested this hypothesis using the Family and Changing Gender Roles module of the International Social Survey Programme. The dataset contained data collected in 1994 and 2012 from 51632 respondents from 18 countries. Structural equation modellings confirmed the hypothesised mediation. Overall, the findings shed light on how motherhood myths justify the gender structure in countries promoting gender equality. PMID:29315326

  20. Do the ends justify the means? Nursing and the dilemma of whistleblowing.

    Firtko, Angela; Jackson, Debra

    2005-01-01

    Patient advocacy and a desire to rectify misconduct in the clinical setting are frequently cited reasons for whistleblowing in nursing and healthcare. This paper explores current knowledge about whistleblowing in nursing and critiques current definitions of whistleblowing. The authors draw on published perspectives of whistleblowing including the media, to reflect on the role of the media in health related whistleblowing. Whistleblowing represents a dilemma for nurses. It strikes at the heart of professional values and raises questions about the responsibilities nurses have to communities and clients, the profession, and themselves. In its most damaging forms, whistleblowing necessarily involves a breach of ethical standards, particularly confidentiality. Despite the pain that can be associated with whistleblowing, if the ends are improved professional standards, enhanced outcomes, rectification of wrongdoings, and, increased safety for patients and staff in our health services, then the ends definitely justify the means.

  1. Justifying continuous sedation until death: a focus group study in nursing homes in Flanders, Belgium.

    Rys, Sam; Deschepper, Reginald; Deliens, Luc; Mortier, Freddy; Bilsen, Johan

    2013-01-01

    Continuous Sedation until Death (CSD), the act of reducing or removing the consciousness of an incurably ill patient until death, has become a common practice in nursing homes in Flanders (Belgium). Quantitative research has suggested that CSD is not always properly applied. This qualitative study aims to explore and describe the circumstances under which nursing home clinicians consider CSD to be justified. Six focus groups were conducted including 10 physicians, 24 nurses, and 14 care assistants working in either Catholic or non-Catholic nursing homes of varying size. Refractory suffering, limited life expectancy and respecting patient autonomy are considered essential elements in deciding for CSD. However, multiple factors complicate the care of nursing home residents at the end of life, and often hinder clinicians from putting these elements into practice. Nursing home clinicians may benefit from more information and instruction about managing CSD in the complex care situations which typically occur in nursing homes. Copyright © 2013 Mosby, Inc. All rights reserved.

  2. Is development of geothermal energy resource in Macedonia justified or not?

    Popovski, Kiril; Popovska Vasilevska, Sanja

    2007-01-01

    During the 80-ies of last century, Macedonia has been one of the world leaders in development of direct application of geothermal energy. During a period of only 6-7 years a participation of 0,7% in the State energy balance has been reached. However, situation has been changed during the last 20 years and the development of this energy resource has been not only stopped but some of the existing projects have been abandoned leading to regression. This situation is illogical, due the fact that it practically proved of being technically feasible and absolutely economically justified. A summary of the present situation with geothermal projects in Macedonia is made in the paper, and possibilities for their improvement and possibilities and justifications for development of new resources foreseen. Final conclusion is that the development of direct application of geothermal energy in Macedonia offer (in comparison with other renewable energy resources) the best energy and economic effects. (Author)

  3. Laboratory experiments cannot be utilized to justify the action of early streamer emission terminals

    Becerra, Marley; Cooray, Vernon

    2008-01-01

    The early emission of streamers in laboratory long air gaps under switching impulses has been observed to reduce the time of initiation of leader positive discharges. This fact has been arbitrarily extrapolated by the manufacturers of early streamer emission devices to the case of upward connecting leaders initiated under natural lightning conditions, in support of those non-conventional terminals that claim to perform better than Franklin lightning rods. In order to discuss the physical basis and validity of these claims, a self-consistent model based on the physics of leader discharges is used to simulate the performance of lightning rods in the laboratory and under natural lightning conditions. It is theoretically shown that the initiation of early streamers can indeed lead to the early initiation of self-propagating positive leaders in laboratory long air gaps under switching voltages. However, this is not the case for positive connecting leaders initiated from the same lightning rod under the influence of the electric field produced by a downward moving stepped leader. The time evolution of the development of positive leaders under natural conditions is different from the case in the laboratory, where the leader inception condition is closely dependent upon the initiation of the first streamer burst. Our study shows that the claimed similarity between the performance of lightning rods under switching electric fields applied in the laboratory and under the electric field produced by a descending stepped leader is not justified. Thus, the use of existing laboratory results to validate the performance of the early streamer lightning rods under natural conditions is not justified

  4. Is routine antenatal venereal disease research laboratory test still justified? Nigerian experience

    Nwosu BO

    2015-01-01

    Full Text Available Betrand O Nwosu,1 George U Eleje,1 Amaka L Obi-Nwosu,2 Ita F Ahiarakwem,3 Comfort N Akujobi,4 Chukwudi C Egwuatu,4 Chukwudumebi O Onyiuke5 1Department of Obstetrics and Gynecology, Nnamdi Azikiwe University, Nnewi Campus, Nnewi, Anambra State, Nigeria; 2Department of Family Medicine, Nnamdi Azikiwe University Teaching Hospital, Nnewi, Nigeria; 3Department of Medical Microbiology, Imo State University Teaching Hospital, Orlu, Imo State, Nigeria; 4Department of Medical Microbiology, Nnamdi Azikiwe University, Nnewi Campus, Nnewi, Anambra State, Nigeria; 5Department of Medical Microbiology, Nnamdi Azikiwe University Teaching Hospital, Nnewi, Anambra State, NigeriaObjective: To determine the seroreactivity of pregnant women to syphilis in order to justify the need for routine antenatal syphilis screening.Methods: A multicenter retrospective analysis of routine antenatal venereal disease research laboratory (VDRL test results between 1 September 2010 and 31 August 2012 at three specialist care hospitals in south-east Nigeria was done. A reactive VDRL result is subjected for confirmation using Treponema pallidum hemagglutination assay test. Analysis was by Epi Info 2008 version 3.5.1 and Stata/IC version 10.Results: Adequate records were available regarding 2,156 patients and were thus reviewed. The mean age of the women was 27.4 years (±3.34, and mean gestational age was 26.4 weeks (±6.36. Only 15 cases (0.70% were seropositive to VDRL. Confirmatory T. pallidum hemagglutination assay was positive in 4 of the 15 cases, giving an overall prevalence of 0.19% and a false-positive rate of 73.3%. There was no significant difference in the prevalence of syphilis in relation to maternal age and parity (P>0.05.Conclusion: While the prevalence of syphilis is extremely low in the antenatal care population at the three specialist care hospitals in south-east Nigeria, false-positive rate is high and prevalence did not significantly vary with maternal age or

  5. SPECT detector system design based on embedded system

    Zhang Weizheng; Zhao Shujun; Zhang Lei; Sun Yuanling

    2007-01-01

    A single-photon emission computed tomography detector system based on embedded Linux designed. This system is composed of detector module, data acquisition module, ARM MPU module, network interface communication module and human machine interface module. Its software uses multithreading technology based on embedded Linux. It can achieve high speed data acquisition, real-time data correction and network data communication. It can accelerate the data acquisition and decrease the dead time. The accuracy and the stability of the system can be improved. (authors)

  6. PENGEMBANGAN MEKANISME OTENTIKASI DAN OTORISASI MANAJEMEN CONFIG PADA KASUS SHARED WEB HOSTING BERBASIS LINUX CONTAINER

    Saifuddin Saifuddin

    2016-08-01

    The results show config on web applications that are in the directory in a single server can be read using these methods but can not be decoded to read user, password, and dbname, because it has given authorization can be decoded only from the directory already listed. on testing performance for latency, memory, and CPU system be followed, to get good results the previous system. The test results using the cache, the response time generated when accessed simultaneously by 20 click per user amounted to 941.4 ms for the old system and amounted to 786.6 ms.

  7. Evidence-based, ethically justified counseling for fetal bilateral renal agenesis

    Thomas, Alana N.; McCullough, Laurence B.; Chervenak, Frank A.; Placencia, Frank X.

    2017-01-01

    Background Not much data are available on the natural history of bilateral renal agenesis, as the medical community does not typically offer aggressive obstetric or neonatal care asbilateral renal agenesis has been accepted as a lethal condition. Aim To provide an evidence-based, ethically justified approach to counseling pregnant women about the obstetric management of bilateral renal agenesis. Study design A systematic literature search was performed using multiple databases. We deploy an ethical analysis of the results of the literature search on the basis of the professional responsibility model of obstetric ethics. Results Eighteen articles met the inclusion criteria for review. With the exception of a single case study using serial amnioinfusion, there has been no other case of survival following dialysis and transplantation documented. Liveborn babies die during the neonatal period. Counseling pregnant women about management of pregnancies complicated by bilateral renal agenesis should be guided by beneficence-based judgment informed by evidence about outcomes. Conclusions Based on the ethical analysis of the results from this review, without experimental obstetric intervention, neonatal mortality rates will continue to be 100%. Serial amnioinfusion therefore should not be offered as treatment, but only as approved innovation or research. PMID:28222038

  8. Dear Critics: Addressing Concerns and Justifying the Benefits of Photography as a Research Method

    Kyle Elizabeth Miller

    2015-08-01

    Full Text Available Photography serves as an important tool for researchers to learn about the contextualized lives of individuals. This article explores the process of integrating photo elicitation interviews (PEI into research involving children and families. Much literature is dedicated to the general debate surrounding the ethics of visual methods in research, with little attention directed at the actual process of gaining study approval and publishing one's findings. There are two main critiques that researchers must face in order to conduct and disseminate studies involving visual images—ethics committees and peer reviewers. In this article, I identify and discuss some of the challenges that emerged across gaining protocol approval from an ethics committee in the United States. Ethical concerns and restrictions related to the use of photography can delay data collection and create barriers to research designs. Similarly, I describe the process of responding to reviewers' concerns as part of the publication process. Peer reviewers' lack of familiarity with the use of photography as a research tool may lead to misunderstandings and inappropriate requests for manuscript changes. While many concerns are sound, the range of benefits stemming from the use of visual data help to justify the time and energy required to defend this type of research. Implications are discussed for researchers using visual methods in their work. URN: http://nbn-resolving.de/urn:nbn:de:0114-fqs1503274

  9. Are stock prices too volatile to be justified by the dividend discount model?

    Akdeniz, Levent; Salih, Aslıhan Altay; Ok, Süleyman Tuluğ

    2007-03-01

    This study investigates excess stock price volatility using the variance bound framework of LeRoy and Porter [The present-value relation: tests based on implied variance bounds, Econometrica 49 (1981) 555-574] and of Shiller [Do stock prices move too much to be justified by subsequent changes in dividends? Am. Econ. Rev. 71 (1981) 421-436.]. The conditional variance bound relationship is examined using cross-sectional data simulated from the general equilibrium asset pricing model of Brock [Asset prices in a production economy, in: J.J. McCall (Ed.), The Economics of Information and Uncertainty, University of Chicago Press, Chicago (for N.B.E.R.), 1982]. Results show that the conditional variance bounds hold, hence, our hypothesis of the validity of the dividend discount model cannot be rejected. Moreover, in our setting, markets are efficient and stock prices are neither affected by herd psychology nor by the outcome of noise trading by naive investors; thus, we are able to control for market efficiency. Consequently, we show that one cannot infer any conclusions about market efficiency from the unconditional variance bounds tests.

  10. Quadrilatero ferrifero, MG, Brazil. Regional characteristics justify application for global geoparks network

    Mantesso-Neto, V.; Azevedo, U.; Guimarães, R.; Nascimento, M.; Beato, D.; Castro, P.; Liccardo, A.

    2010-01-01

    Geopark, a concept created in 2000, is neither strictly geological nor a park in the usual sense. Geopark is a holistic concept, aimed at promoting sustainable economic development based on unique geological features (represented by “geosites”, outcrops with special value, under some point of view), but also having a social objective. The Global Geoparks Network (GGN), working in synergy with UNESCO, has 64 members in 19 countries. This paper presents a brief history and some characteristics of a few European Geoparks, followed by some aspects of the Quadrilátero Ferrífero. As shall be seen, this area is rich in geosites, and in historical, social and cultural attractions. On the other hand, foreseeing a decline in mineral exploitation in mid-century, it urgently seeks a good plan for regional development. As a conclusion, it will be seen that its characteristics fit the Geopark concept, and justify the support of the geoscientific community, and that of society in general, to its application, recently submitted to UNESCO, for admission to the GGN

  11. Ethical analysis of the justifiability of labelling with COPD for smoking cessation.

    Kotz, D; Vos, R; Huibers, M J H

    2009-09-01

    Spirometry for early detection of chronic obstructive pulmonary disease (COPD) and smoking cessation is criticised because of the potential negative effects of labelling with disease. To assess the effects of opinions of smokers with mild to moderate COPD on the effectiveness of spirometry for smoking cessation, the justification of early detection of airflow limitation in smokers and the impact of confrontation with COPD. Qualitative study with data from a randomised controlled trial. General population of Dutch and Belgian Limburg. Semistructured ethical exit interviews were conducted with 205 smokers who were motivated to quit smoking and had no prior diagnosis of COPD but were detected with airflows limitation by means of spirometry. They received either (1) counselling, including labelling with COPD, plus with nortriptyline for smoking cessation, (2) counselling excluding labelling with COPD, plus nortriptyline for smoking cessation or (3) care as usual for smoking cessation by the general practitioner, without labelling with COPD. Of the participants, 177 (86%) agreed or completely agreed that it is justified to measure lung function in heavy smokers. These participants argued that measuring lung function raises consciousness of the negative effects of smoking, helps to prevent disease or increases motivation to stop smoking. Most of the 18 participants who disagreed argued that routinely measuring lung function in smokers would interfere with freedom of choice. Labelling with disease is probably a less important issue in the discussion about the pros and cons of early detection of COPD.

  12. Modelling severe Staphylococcus aureus sepsis in conscious pigs: are implications for animal welfare justified?

    Olsen, Helle G; Kjelgaard-Hansen, Mads; Tveden-Nyborg, Pernille

    2016-01-01

    A porcine model of haematogenous Staphylococcus aureus sepsis has previously been established in our research group. In these studies, pigs developed severe sepsis including liver dysfunction during a 48 h study period. As pigs were awake during the study, animal welfare was challenged by the sev......A porcine model of haematogenous Staphylococcus aureus sepsis has previously been established in our research group. In these studies, pigs developed severe sepsis including liver dysfunction during a 48 h study period. As pigs were awake during the study, animal welfare was challenged....... Prior to euthanasia, a galactose elimination capacity test was performed to assess liver function. Pigs were euthanised 48 h post inoculation for necropsy and histopathological evaluation. While infusion times of 6.66 min, and higher, did not induce liver dysfunction (n = 3), the infusion time of 3......, according to humane endpoints. A usable balance between scientific purpose and animal welfare could not be achieved, and we therefore find it hard to justify further use of this conscious porcine sepsis model. In order to make a model of translational relevance for human sepsis, we suggest that future model...

  13. Can context justify an ethical double standard for clinical research in developing countries?

    Landes Megan

    2005-07-01

    Full Text Available Abstract Background The design of clinical research deserves special caution so as to safeguard the rights of participating individuals. While the international community has agreed on ethical standards for the design of research, these frameworks still remain open to interpretation, revision and debate. Recently a breach in the consensus of how to apply these ethical standards to research in developing countries has occurred, notably beginning with the 1994 placebo-controlled trials to reduce maternal to child transmission of HIV-1 in Africa, Asia and the Caribbean. The design of these trials sparked intense debate with the inclusion of a placebo-control group despite the existence of a 'gold standard' and trial supporters grounded their justifications of the trial design on the context of scarcity in resource-poor settings. Discussion These 'contextual' apologetics are arguably an ethical loophole inherent in current bioethical methodology. However, this convenient appropriation of 'contextual' analysis simply fails to acknowledge the underpinnings of feminist ethical analysis upon which it must stand. A more rigorous analysis of the political, social, and economic structures pertaining to the global context of developing countries reveals that the bioethical principles of beneficence and justice fail to be met in this trial design. Conclusion Within this broader, and theoretically necessary, understanding of context, it becomes impossible to justify an ethical double standard for research in developing countries.

  14. Explorations of the implementation of a parallel IDW interpolation algorithm in a Linux cluster-based parallel GIS

    Huang, Fang; Liu, Dingsheng; Tan, Xicheng; Wang, Jian; Chen, Yunping; He, Binbin

    2011-04-01

    To design and implement an open-source parallel GIS (OP-GIS) based on a Linux cluster, the parallel inverse distance weighting (IDW) interpolation algorithm has been chosen as an example to explore the working model and the principle of algorithm parallel pattern (APP), one of the parallelization patterns for OP-GIS. Based on an analysis of the serial IDW interpolation algorithm of GRASS GIS, this paper has proposed and designed a specific parallel IDW interpolation algorithm, incorporating both single process, multiple data (SPMD) and master/slave (M/S) programming modes. The main steps of the parallel IDW interpolation algorithm are: (1) the master node packages the related information, and then broadcasts it to the slave nodes; (2) each node calculates its assigned data extent along one row using the serial algorithm; (3) the master node gathers the data from all nodes; and (4) iterations continue until all rows have been processed, after which the results are outputted. According to the experiments performed in the course of this work, the parallel IDW interpolation algorithm can attain an efficiency greater than 0.93 compared with similar algorithms, which indicates that the parallel algorithm can greatly reduce processing time and maximize speed and performance.

  15. MiniDLNA_tweaker : Aplicació per configurar i previsualitzar el servidor MiniDLNA per a GNU/Linux

    Martínez Lloveras, Jordi

    2013-01-01

    L'aplicació MiniDLNA per a GNU/Linux és un servidor lleuger que compleix els estàndards DLNA/UPnP configurable a través d'un simple arxiu de text, això la fa ideal per al propòsit d'implantació d'un servidor que ofereixi els continguts a tots els dispositius que compleixin els estàndards esmentats. La aplicación MiniDLNA para GNU/Linux es un servidor ligero que cumple los estándares DLNA/UPnP configurable a través de un simple archivo de texto, esto la hace ideal para el propósito de impla...

  16. Understanding Unix/Linux programming a guide to theory and practice

    Molay, Bruce

    2003-01-01

    This book explains in a clear and coherent manner how Unix works, how to understand existing Unix programs, and how to design and create new Unix programs. The book is organized by subsystem, each presented in visual terms and explained using vivid metaphors. It breaks the information into manageable parts that can be presented, explained, and mastered. By using case studies and an extremely reader-friendly manner to illustrate complex ideas and concepts, the book covers the basics of systems programming, users, files and manuals, how to read a directory, using 1S, writing PWD, studying STTY, writing a video game, studying SH, environment and shell variables, I/O redirection and pipes, servers and sockets, writing a web server, license servers, and concurrent functions. For Unix system administrators and programmers, network programmers, and others who have used other operating systems and need to learn Unix programming to expand their skill sets.

  17. Linux Server Hacks, 2 Tips & Tools for Connecting, Monitoring, and Troubleshooting

    von Hagen, William

    2009-01-01

    This handy reference offers 100 completely new server management tips and techniques designed to improve your productivity and sharpen your administrative skills. Each hack represents a clever way to accomplish a specific task, saving you countless hours of searching for the right answer. And you don't have to be a system administrator with hundreds of boxen to get something useful from this book as many of the hacks apply equally well to a single system or a home network. Whether they help you recover lost data, collect information from distributed clients, or synchronize administrative envir

  18. NSTX-U Control System Upgrades

    Erickson, K.G.; Gates, D.A.; Gerhardt, S.P.; Lawson, J.E.; Mozulay, R.; Sichta, P.; Tchilinguirian, G.J.

    2014-01-01

    The National Spherical Tokamak Experiment (NSTX) is undergoing a wealth of upgrades (NSTX-U). These upgrades, especially including an elongated pulse length, require broad changes to the control system that has served NSTX well. A new fiber serial Front Panel Data Port input and output (I/O) stream will supersede the aging copper parallel version. Driver support for the new I/O and cyber security concerns require updating the operating system from Redhat Enterprise Linux (RHEL) v4 to RedHawk (based on RHEL) v6. While the basic control system continues to use the General Atomics Plasma Control System (GA PCS), the effort to forward port the entire software package to run under 64-bit Linux instead of 32-bit Linux included PCS modifications subsequently shared with GA and other PCS users. Software updates focused on three key areas: (1) code modernization through coding standards (C99/C11), (2) code portability and maintainability through use of the GA PCS code generator, and (3) support of 64-bit platforms. Central to the control system upgrade is the use of a complete real time (RT) Linux platform provided by Concurrent Computer Corporation, consisting of a computer (iHawk), an operating system and drivers (RedHawk), and RT tools (NightStar). Strong vendor support coupled with an extensive RT toolset influenced this decision. The new real-time Linux platform, I/O, and software engineering will foster enhanced capability and performance for NSTX-U plasma control

  19. NSTX-U Control System Upgrades

    Erickson, K.G., E-mail: kerickso@pppl.gov; Gates, D.A.; Gerhardt, S.P.; Lawson, J.E.; Mozulay, R.; Sichta, P.; Tchilinguirian, G.J.

    2014-06-15

    The National Spherical Tokamak Experiment (NSTX) is undergoing a wealth of upgrades (NSTX-U). These upgrades, especially including an elongated pulse length, require broad changes to the control system that has served NSTX well. A new fiber serial Front Panel Data Port input and output (I/O) stream will supersede the aging copper parallel version. Driver support for the new I/O and cyber security concerns require updating the operating system from Redhat Enterprise Linux (RHEL) v4 to RedHawk (based on RHEL) v6. While the basic control system continues to use the General Atomics Plasma Control System (GA PCS), the effort to forward port the entire software package to run under 64-bit Linux instead of 32-bit Linux included PCS modifications subsequently shared with GA and other PCS users. Software updates focused on three key areas: (1) code modernization through coding standards (C99/C11), (2) code portability and maintainability through use of the GA PCS code generator, and (3) support of 64-bit platforms. Central to the control system upgrade is the use of a complete real time (RT) Linux platform provided by Concurrent Computer Corporation, consisting of a computer (iHawk), an operating system and drivers (RedHawk), and RT tools (NightStar). Strong vendor support coupled with an extensive RT toolset influenced this decision. The new real-time Linux platform, I/O, and software engineering will foster enhanced capability and performance for NSTX-U plasma control.

  20. Controlling Mechatronic Set-up Using Real-time Linux and CTC ++

    Broenink, Johannes F.; Jovanovic, D.S.; Hilderink, G.H.; van Amerongen, J.; Jonker, B.; Regtien, P.; Stramigioli, S.

    2002-01-01

    The development of control software for mechatronic systems is presented by means of a case study: a 2 DOF mechanical rotational set-up usable as a camera-positioning device. The control software is generated using the code generation facility of 20-SIM, thus guaranteeing the generated code being

  1. LINUX, Virtualization, and the Cloud: A Hands-On Student Introductory Lab

    Serapiglia, Anthony

    2013-01-01

    Many students are entering Computer Science education with limited exposure to operating systems and applications other than those produced by Apple or Microsoft. This gap in familiarity with the Open Source community can quickly be bridged with a simple exercise that can also be used to strengthen two other important current computing concepts,…

  2. Lawrence Livermore National Laboratory selects Intel Itanium 2 processors for world's most powerful Linux cluster

    2003-01-01

    "Intel Corporation, system manufacturer California Digital and the University of California at Lawrence Livermore National Laboratory (LLNL) today announced they are building one of the world's most powerful supercomputers. The supercomputer project, codenamed "Thunder," uses nearly 4,000 Intel® Itanium® 2 processors... is expected to be complete in January 2004" (1 page).

  3. Justifying Reasons for Giving Employment Priorities to Isargaran and Veterans in Iranian and American Law

    Ali Akbar Gorji Azandaryani

    2012-11-01

    Full Text Available Equality is one of the principles and fundamental rights of human being. There has been lots of talk about equality and justice, but the legal aspect of this principle is still under dispute. Human beings are born equal, so their life has an equal moral value. This principle, along with prohibiting discrimination and bias rejection, has a great impact in the legislative and administrative decisions and is accepted in the Constitution and international norms. But here the important point in this matter is a formation of a paradox in the concept of the principle of equality in today's law. There is a kind of discrimination in the legal and social relationship, within the quest for equality. Privileges that granted to soldiers returning from war and their descendants is an issue that arises during or immediately after every war and because of its discriminatory nature becomes a controversial matter at first glance, and there are widespread opinions regarding this issue. In this article, we try to examine justifying reasons for giving employment priorities to veterans based on the theory of permissible discrimination and equality and to allude to isargaran and veterans' employment priority in Iran and the United States law. Therefore, at first, we examine the theoretical discussions and preference of veterans in America's law. In the next part, in the light of the findings of the first part, veterans and isargaran employment preference will be debated in the United States and Iran's judicial system. Discussing this privilege, we conclude that this privilege is granted to veterans and isargaran according to the theory of permissible discrimination and equality and none of these theories is completely accepted by the legislature of Iran and America and various theories have been used according to time and place. برابری یکی از اصول و حقوق بنیادین بشر به شمار می‌رود این اصل در کنار منع ت

  4. PERANCANGAN VIRTUAL PRIVATE NETWORK DENGAN SERVER LINUX PADA PT. DHARMA GUNA SAKTI

    Siswa Trihadi

    2008-05-01

    Full Text Available Purpose of this research is to analyze and design a network between head and branch office, andcompany mobile user, which can be used to increase performance and effectiveness of company in doingtheir business process. There were 3 main methods used in this research, which were: library study, analysis,and design method. Library study method was done by searching theoretical sources, knowledge, and otherinformation from books, articles in library, and internet pages. Analysis method was done by doing anobservation on company network, and an interview to acquire description of current business process andidentify problems which can be solved by using a network technology. Meanwhile, the design method wasdone by making a topology network diagram, and determining elements needed to design a VPN technology,then suggesting a configuration system, and testing to know whether the suggested system could run well ornot. The result is that network between the head and branch office, and the mobile user can be connectedsuccessfully using a VPN technology. In conclusion, with the connected network between the head andbranch office can create a centralization of company database, and a suggested VPN network has run well byencapsulating data packages had been sent.Keywords: network, Virtual Private Network (VPN, library study, analysis, design

  5. GLCTA control system

    Terunuma, N.; Hayano, H.; Higo, T.; Saeki, T.; Suehara, T.; Watanabe, K.

    2004-01-01

    Research and development for the high power X-band RF technologies have been performed on the GLC Test Accelerator, GLCTA, since fall of 2003. The control system of this facility is based on the PC-Linux servers that handle the CAMAC, VME and PLC modules. Automated RF processing and data accumulation of the RF breakdown have been performed. (author)

  6. Scientific and technical conference Thermophysical experimental and calculating and theoretical studies to justify characteristics and safety of fast reactors. Thermophysics-2012. Book of abstracts

    Kalyakin, S.G.; Kukharchuk, O.F.; Sorokin, A.P.

    2012-01-01

    The collection includes abstracts of reports of scientific and technical conference Thermophysics-2012 which has taken place on October 24-26, 2012 in Obninsk. In abstracts the following questions are considered: experimental and calculating and theoretical studies of thermal hydraulics of liquid-metal cooled fast reactors to justify their characteristics and safety; physico-chemical processes in the systems with liquid-metal coolants (LMC); physico-chemical characteristics and thermophysical properties of LMC; development of models, computational methods and calculational codes for simulating processes of of hydrodynamics, heat and mass transfer, including impurities mass transfer in the systems with LMC; methods and means for control of composition and condition of LMC in fast reactor circuits on impurities and purification from them; apparatuses, equipment and technological processes at the work with LMC taking into account the ecology, including fast reactors decommissioning; measuring techniques, sensors and devices for experimental studies of heat and mass transfer in the systems with LMC [ru

  7. What the eye doesn’t see: An analysis of strategies for justifying acts by an appeal for conealing them

    Tellings, A.E.J.M.

    2006-01-01

    This article analyzes the moral reasoning implied in a very commonly used expression, namely, “What the eye doesn't see, the heart doesn't grieve over”, or “What you don't know won't hurt you.” It especially deals with situations in which it is used for trying to justify acts that are, in

  8. Numerical Weather Prediction Models on Linux Boxes as tools in meteorological education in Hungary

    Gyongyosi, A. Z.; Andre, K.; Salavec, P.; Horanyi, A.; Szepszo, G.; Mille, M.; Tasnadi, P.; Weidiger, T.

    2012-04-01

    . Numerical modeling became a common tool in the daily practice of weather experts forecasters due to the i) increasing user demands for weather data by the costumers, ii) the growth in computer resources, iii) numerical weather prediction systems available for integration on affordable, off the shelf computers and iv) available input data (from ECMWF or NCEP) for model integrations. Beside learning the theoretical basis, since the last year. Students in their MSc or BSc Thesis Research or in Student's Research ProjectsStudent's Research Projects h have the opportunity to run numerical models and to analyze the outputs for different purposes including wind energy estimation, simulation of the dynamics of a polar low, and subtropical cyclones, analysis of the isentropic potential vorticity field, examination of coupled atmospheric dispersion models, etc. A special course in the application of numerical modeling has been held (is being announced for the upcoming semester) (is being announced for the upcoming semester) for our students in order to improve their skills on this field. Several numerical model (NRIPR ETA and WRF) systems have been adapted in the University and integrated WRF have been tested and used for the geographical region of the Carpathian Basin (NRIPR, ETA and WRF). Recently ALADIN/CHAPEAU the academic version of the ARPEGE ALADIN cy33t1 meso-scale numerical weather prediction model system (which is the operational forecasting tool of our National Weather Service) has been installed at our Institute. ALADIN is the operational forecasting model of the Hungarian Meteorological Service and developed in the framework of the international ALADIN co-operation. Our main objectives are i) the analysis of different typical weather situations, ii) fine tuning of parameterization schemes and the iii) comparison of the ALADIN/CHAPEAU and WRF model outputs based on case studies. The necessary hardware and software innovations has have been done. In the presentation the

  9. Is radiography justified for the evaluation of patients presenting with cervical spine trauma?

    Theocharopoulos, Nicholas; Chatzakis, Georgios; Damilakis, John [Department of Medical Physics, Faculty of Medicine, University of Crete, P.O. Box 2208, Iraklion, 71003 Crete (Greece) and Department of Natural Sciences, Technological Education Institute of Crete, P.O. Box 140, Iraklion 71004 Crete (Greece); Department of Radiology, Faculty of Medicine, University of Crete, P.O. Box 2208, Iraklion, 71003 Crete (Greece); Department of Medical Physics, Faculty of Medicine, University of Crete, P.O. Box 2208, Iraklion, 71003 Crete (Greece)

    2009-10-15

    radiogenic lethal cancer incidents. According to the decision model calculations, the use of CT is more favorable over the use of radiography alone or radiography with CT by a factor of 13, for low risk 20 yr old patients, to a factor of 23, for high risk patients younger than 80 yr old. The radiography/CT imaging strategy slightly outperforms plain radiography for high and moderate risk patients. Regardless of the patient age, sex, and fracture risk, the higher diagnostic accuracy obtained by the CT examination counterbalances the increase in dose compared to plain radiography or radiography followed by CT only for positive radiographs and renders CT utilization justified and the radiographic screening redundant.

  10. Design of multi-channel analyzer's monitoring system based on embedded system

    Yang Tao; Wei Yixiang

    2007-01-01

    A new Multi-Channel Analyzer's Monitoring system based on ARM9 Embedded system is introduced in this paper. Some solutions to problem are also discussed during the procedure of design, installation and debugging on Linux system. The Monitoring system is developed by using MiniGUI and Linux software system API, with the functions of collecting, displaying and I/O data controlling 1024 channels datum. They are all realized in real time, with the merits of low cost, small size and portability. All these lay the foundation of developing homemade Digital and Portable nuclear spectrometers. (authors)

  11. Current Evidence to Justify, and the Methodological Considerations for a Randomised Controlled Trial Testing the Hypothesis that Statins Prevent the Malignant Progression of Barrett's Oesophagus

    David Thurtle

    2014-12-01

    Full Text Available Barrett’s oesophagus is the predominant risk factor for oesophageal adenocarcinoma, a cancer whose incidence is increasing and which has a poor prognosis. This article reviews the latest experimental and epidemiological evidence justifying the development of a randomised controlled trial investigating the hypothesis that statins prevent the malignant progression of Barrett’s oesophagus, and explores the methodological considerations for such a trial. The experimental evidence suggests anti-carcinogenic properties of statins on oesophageal cancer cell lines, based on the inhibition of the mevalonate pathway and the production of pro-apoptotic proteins. The epidemiological evidence reports inverse associations between statin use and the incidence of oesophageal carcinoma in both general population and Barrett’s oesophagus cohorts. Such a randomised controlled trial would be a large multi-centre trial, probably investigating simvastatin, given the wide clinical experience with this drug, relatively low side-effect profile and low financial cost. As with any clinical trial, high adherence is important, which could be increased with therapy, patient, doctor and system-focussed interventions. We would suggest there is now sufficient evidence to justify a full clinical trial that attempts to prevent this aggressive cancer in a high-risk population.

  12. PCIe40 temperature protection system

    Romero Aguilar, Angel

    2017-01-01

    PCIe40 is a high-throughput data-acquisition card based on PCI Express that is currently under development for the next upgrade of the LHCb experiment readout system. As part of this development, SMBus is intended to be used as a lightweight, out-of-band protocol to monitor the health of each data acquisition board. Starting from a simple prototype, the student will work on enabling SMBus communication between a COTS linux host and various on-board sensors, on top of existing linux facilities.

  13. [Cesarean birth: justifying indication or justified concern?].

    Muñoz-Enciso, José Manuel; Rosales-Aujang, Enrique; Domínguez-Ponce, Guillermo; Serrano-Díaz, César Leopoldo

    2011-02-01

    Caesarean section is the most common surgery performed in all hospitals of second level of care in the health sector and more frequently in private hospitals in Mexico. To determine the behavior that caesarean section in different hospitals in the health sector in the city of Aguascalientes and analyze the indications during the same period. A descriptive and cross in the top four secondary hospitals in the health sector of the state of Aguascalientes, which together account for 81% of obstetric care in the state, from 1 September to 31 October 2008. Were analyzed: indication of cesarean section and their classification, previous pregnancies, marital status, gestational age, weight and minute Apgar newborn and given birth control during the event. were recorded during the study period, 2.964 pregnancies after 29 weeks, of whom 1.195 were resolved by Caesarean section with an overall rate of 40.3%. We found 45 different indications, which undoubtedly reflect the great diversity of views on the institutional medical staff to schedule a cesarean section. Although each institution has different resources and a population with different characteristics, treatment protocols should be developed by staff of each hospital to have the test as a cornerstone of labor, also request a second opinion before a caesarean section, all try to reduce the frequency of cesarean section.

  14. Instant Kali Linux

    Singh, Abhinav

    2013-01-01

    Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. A quick and handy guide for those who are willing to get straight into the business. This book will build a strong foundation for those who are willing to cover different security assessment areas by mastering various tools and techniques.If you are a beginners or an experienced security professional who is willing to dive deeper into the world of information security, then this book is perfect for you. The book is written is simple technical la

  15. Linux shell scripting cookbook

    Tushar, Shantanu

    2013-01-01

    This book is written in a Cookbook style and it offers learning through recipes with examples and illustrations. Each recipe contains step-by-step instructions about everything necessary to execute a particular task. The book is designed so that you can read it from start to end for beginners, or just open up any chapter and start following the recipes as a reference for advanced users.If you are a beginner or an intermediate user who wants to master the skill of quickly writing scripts to perform various tasks without reading the entire manual, this book is for you. You can start writing scri

  16. In lung cancer patients where a malignant pleural effusion is found at operation could resection ever still be justified?

    Fiorelli, Alfonso; Santini, Mario

    2013-08-01

    A best evidence topic in thoracic surgery was written according to a structured protocol. The question addressed was whether surgery could ever be justified in non-small cell lung cancer patients with an unexpected malignant pleural effusion at surgery. Eight papers were chosen to answer the question. The authors, journal, date and country of publication, patient group studied, study type, relevant outcomes and results of these papers were tabulated. Study limitations included a lack of retrospective studies, the heterogeneous patient population and various treatments applied. Three papers found that surgery--compared to exploratory thoracotomy--was associated with a survival advantage in cases of minimal pleural disease. One paper showed that the median survival time of 58.8 months in patients with pleural effusion was better than that of patients with more extensive pleural dissemination as pleural nodule (10 months; P=0.0001) or pleural nodule with effusion (19.3 months; P=0.019). Another study showed that pleural effusion patients with N0-1 status had a median survival time more than 5 years longer than patients with similar or more extensive pleural dissemination but with N2-N3 status. A further study showed a better 5-year survival time in patients with pleural effusion, than in patients with pleural nodule (22.9% vs 8.9%, respectively; P=0.45). In two papers, surgery vs exploratory thoracotomy had better survival in cases of N0 status and of complete tumour resection independently of pleural dissemination. Different strategies were employed to obtain freedom from macroscopic residual tumour, including pneumonectomy, lobar resection or, to a lesser extent, pleurectomy in patients having pleural dissemination. Only one paper reported a worse median survival time after pneumonectomy than for more limited resections (12.8 vs 24.1 months, respectively; P=0.0018). In the remaining papers, no comparison between the different resections was made. In all studies

  17. TVF-NMCRC-A powerful program for writing and executing simulation inputs for the FLUKA Monte Carlo Code system

    Mark, S.; Khomchenko, S.; Shifrin, M.; Haviv, Y.; Schwartz, J.R.; Orion, I.

    2007-01-01

    We at the Negev Monte Carlo Research Center (NMCRC) have developed a powerful new interface for writing and executing FLUKA input files-TVF-NMCRC. With the TVF tool a FLUKA user has the ability to easily write an input file without requiring any previous experience. The TVF-NMCRC tool is a LINUX program that has been verified for the most common LINUX-based operating systems, and is suitable for the latest version of FLUKA (FLUKA 2006.3)

  18. Army Justified Initial Production Plan for the Paladin Integrated Management Program but Has Not Resolved Two Vehicle Performance Deficiencies (Redacted)

    2016-08-05

    model oversight organization in the Federal Government by leading change, speaking truth, and promoting excellence—a diverse organization, working ...VIRGINIA 22350-1500 August 5, 2016 MEMORANDUM FOR AUDITOR GENERAL, DEPARTMENT OF THE ARMY SUBJECT: Army Justified Initial Production Plan for the Paladin... Family of Vehicles, M109A7 Self-Propelled Howitzer and M992A3 Carrier, Ammunition, Tracked, October 2015; • M109A7 AFES Overview, September 2015

  19. Technical Data to Justify Full Burnup Credit in Criticality Safety Licensing Analysis

    2011-01-01

    Enercon Services, Inc. (ENERCON) was requested under Task Order No.2 to identify scientific and technical data needed to benchmark and justify Full Burnup Credit, which adds 16 fission products and 4 minor actinides1 to Actinide-Only burnup credit. The historical perspective for Full Burnup Credit is discussed, and interviews of organizations participating in burnup credit activities are summarized as a basis for identifying additional data needs and making recommendation. Input from burnup credit participants representing two segments of the commercial nuclear industry is provided. First, the Electric Power Research Institute (EPRI) has been very active in the development of Full Burnup Credit, representing the interests of nuclear utilities in achieving capacity gains for storage and transport casks. EPRI and its utility customers are interested in a swift resolution of the validation issues that are delaying the implementation of Full Burnup Credit [EPRI 2010b]. Second, used nuclear fuel storage and transportation Cask Vendors favor improving burnup credit beyond Actinide-Only burnup credit, although their discussion of specific burnup credit achievements and data needs was limited citing business sensitive and technical proprietary concerns. While Cask Vendor proprietary items are not specifically identified in this report, the needs of all nuclear industry participants are reflected in the conclusions and recommendations of this report. In addition, Oak Ridge National Laboratory (ORNL) and Sandia National Laboratory (SNL) were interviewed for their input into additional data needs to achieve Full Burnup Credit. ORNL was very open to discussions of Full Burnup Credit, with several telecoms and a visit by ENERCON to ORNL. For many years, ORNL has provided extensive support to the NRC regarding burnup credit in all of its forms. Discussions with ORNL focused on potential resolutions to the validation issues for the use of fission products. SNL was helpful in

  20. Technical Data to Justify Full Burnup Credit in Criticality Safety Licensing Analysis

    Enercon Services, Inc.

    2011-03-14

    Enercon Services, Inc. (ENERCON) was requested under Task Order No.2 to identify scientific and technical data needed to benchmark and justify Full Burnup Credit, which adds 16 fission products and 4 minor actinides1 to Actinide-Only burnup credit. The historical perspective for Full Burnup Credit is discussed, and interviews of organizations participating in burnup credit activities are summarized as a basis for identifying additional data needs and making recommendation. Input from burnup credit participants representing two segments of the commercial nuclear industry is provided. First, the Electric Power Research Institute (EPRI) has been very active in the development of Full Burnup Credit, representing the interests of nuclear utilities in achieving capacity gains for storage and transport casks. EPRI and its utility customers are interested in a swift resolution of the validation issues that are delaying the implementation of Full Burnup Credit [EPRI 2010b]. Second, used nuclear fuel storage and transportation Cask Vendors favor improving burnup credit beyond Actinide-Only burnup credit, although their discussion of specific burnup credit achievements and data needs was limited citing business sensitive and technical proprietary concerns. While Cask Vendor proprietary items are not specifically identified in this report, the needs of all nuclear industry participants are reflected in the conclusions and recommendations of this report. In addition, Oak Ridge National Laboratory (ORNL) and Sandia National Laboratory (SNL) were interviewed for their input into additional data needs to achieve Full Burnup Credit. ORNL was very open to discussions of Full Burnup Credit, with several telecoms and a visit by ENERCON to ORNL. For many years, ORNL has provided extensive support to the NRC regarding burnup credit in all of its forms. Discussions with ORNL focused on potential resolutions to the validation issues for the use of fission products. SNL was helpful in

  1. Hydroaerothermal investigations conducted in the USSR to justify the construction of large cooling towers

    Goncharov, V.V.

    1989-01-01

    The multi-purpose task of improving water cooling systems of thermal and nuclear power plants is aimed at the development of efficient designs of cooling towers and other types of industrial coolers which call for comprehensive scientific justification. Cooling towers of 60-70 thou m 3 /h capacity with a chimney height of 130 m and those of 80-100 thou m 3 /h capacity with a chimney height of 150 m were developed. For circulating water systems of large power plants the design of a counterflow chimney cooling tower of 180 thou m 3 /h capacity has been recently developed. At present the work is being conducted on developing a new three-cell cooling tower featuring high reliability, operational flexibility and cost-effectiveness of the design. This cooling tower, besides having higher operating reliability than the conventional one of circular shape, can ensure the commissioning, current repairs and overhauls of water cooling arrangements in a cell-wise sequence, i.e. without shutting down the power generating units. Laboratory and field investigations of the spray-type cooling towers having no packing (fill), studies on heat and mass exchanges processes, aerodynamics of droplet flows and new designs of sprayers made it possible to come to a conclusion that their cooling capacity can be substantially increased and brought up to the level of the cooling towers with film packings. The pilot cooling towers were designed according to the counterflow, crossflow and cross-counterflow schemes. The basic investigation method remains to be the experimental one. On the test rigs and aerodynamic models the heat and mass transfer and aerodynamic resistance coefficients are determined. These studies and subsequent calculations are based on the heat balance equation

  2. La guerre en Irak peut-elle être justifiée comme un cas d’intervention humanitaire?

    Stéphane Courtois

    2006-05-01

    Full Text Available Most current criticisms against the intervention in Iraq have tackled the two justifications articulated by the members of the coalition:(1 that the United States had to neutralize the threats that Iraq generated for their own security and to the political stability in the Middle Eastand (2 that the war in Iraq can be justified as a necessary stage in the war against international terrorism. The principal objection against justification (1 is that it was, and remains, unfounded. Against justification (2, many have replied that the intervention in Iraq had no connection,or at best had merely an indirect connection, with the fight against terrorism. In a recent text,Fernando Tesón claims that the American intervention in Iraq can nevertheless be morally justified as a case of humanitarian intervention. By “humanitarian intervention”, one must understand a coercive action taken by a state or a group of states inside the sphere of jurisdiction of an independent political community, without the permission of the latter, in order to preventor to end a massive violation of individual rights perpetrated against innocent persons which are not co-nationals inside this political community. I argue in this article that the American intervention in Iraq does not satisfy the conditions of a legitimate humanitarian intervention, as opposed to what Fernando Tesón claims.

  3. Beyond Conflict and Spoilt Identities: How Rwandan Leaders Justify a Single Recategorization Model for Post-Conflict Reconciliation

    Sigrun Marie Moss

    2014-08-01

    Full Text Available Since 1994, the Rwandan government has attempted to remove the division of the population into the ‘ethnic’ identities Hutu, Tutsi and Twa and instead make the shared Rwandan identity salient. This paper explores how leaders justify the single recategorization model, based on nine in-depth semi-structured interviews with Rwandan national leaders (politicians and bureaucrats tasked with leading unity implementation conducted in Rwanda over three months in 2011/2012. Thematic analysis revealed this was done through a meta-narrative focusing on the shared Rwandan identity. Three frames were found in use to “sell” this narrative where ethnic identities are presented as a an alien construction; b which was used to the disadvantage of the people; and c non-essential social constructs. The material demonstrates the identity entrepreneurship behind the single recategorization approach: the definition of the category boundaries, the category content, and the strategies for controlling and overcoming alternative narratives. Rwandan identity is presented as essential and legitimate, and as offering a potential way for people to escape spoilt subordinate identities. The interviewed leaders insist Rwandans are all one, and that the single recategorization is the right path for Rwanda, but this approach has been criticised for increasing rather than decreasing intergroup conflict due to social identity threat. The Rwandan case offers a rare opportunity to explore leaders’ own narratives and framing of these ‘ethnic’ identities to justify the single recategorization approach.

  4. Proposing an Empirically Justified Reference Threshold for Blood Culture Sampling Rates in Intensive Care Units

    Castell, Stefanie; Schwab, Frank; Geffers, Christine; Bongartz, Hannah; Brunkhorst, Frank M.; Gastmeier, Petra; Mikolajczyk, Rafael T.

    2014-01-01

    Early and appropriate blood culture sampling is recommended as a standard of care for patients with suspected bloodstream infections (BSI) but is rarely taken into account when quality indicators for BSI are evaluated. To date, sampling of about 100 to 200 blood culture sets per 1,000 patient-days is recommended as the target range for blood culture rates. However, the empirical basis of this recommendation is not clear. The aim of the current study was to analyze the association between blood culture rates and observed BSI rates and to derive a reference threshold for blood culture rates in intensive care units (ICUs). This study is based on data from 223 ICUs taking part in the German hospital infection surveillance system. We applied locally weighted regression and segmented Poisson regression to assess the association between blood culture rates and BSI rates. Below 80 to 90 blood culture sets per 1,000 patient-days, observed BSI rates increased with increasing blood culture rates, while there was no further increase above this threshold. Segmented Poisson regression located the threshold at 87 (95% confidence interval, 54 to 120) blood culture sets per 1,000 patient-days. Only one-third of the investigated ICUs displayed blood culture rates above this threshold. We provided empirical justification for a blood culture target threshold in ICUs. In the majority of the studied ICUs, blood culture sampling rates were below this threshold. This suggests that a substantial fraction of BSI cases might remain undetected; reporting observed BSI rates as a quality indicator without sufficiently high blood culture rates might be misleading. PMID:25520442

  5. Justifying quasiparticle self-consistent schemes via gradient optimization in Baym-Kadanoff theory.

    Ismail-Beigi, Sohrab

    2017-09-27

    The question of which non-interacting Green's function 'best' describes an interacting many-body electronic system is both of fundamental interest as well as of practical importance in describing electronic properties of materials in a realistic manner. Here, we study this question within the framework of Baym-Kadanoff theory, an approach where one locates the stationary point of a total energy functional of the one-particle Green's function in order to find the total ground-state energy as well as all one-particle properties such as the density matrix, chemical potential, or the quasiparticle energy spectrum and quasiparticle wave functions. For the case of the Klein functional, our basic finding is that minimizing the length of the gradient of the total energy functional over non-interacting Green's functions yields a set of self-consistent equations for quasiparticles that is identical to those of the quasiparticle self-consistent GW (QSGW) (van Schilfgaarde et al 2006 Phys. Rev. Lett. 96 226402-4) approach, thereby providing an a priori justification for such an approach to electronic structure calculations. In fact, this result is general, applies to any self-energy operator, and is not restricted to any particular approximation, e.g., the GW approximation for the self-energy. The approach also shows that, when working in the basis of quasiparticle states, solving the diagonal part of the self-consistent Dyson equation is of primary importance while the off-diagonals are of secondary importance, a common observation in the electronic structure literature of self-energy calculations. Finally, numerical tests and analytical arguments show that when the Dyson equation produces multiple quasiparticle solutions corresponding to a single non-interacting state, minimizing the length of the gradient translates into choosing the solution with largest quasiparticle weight.

  6. Effective electron-density map improvement and structure validation on a Linux multi-CPU web cluster: The TB Structural Genomics Consortium Bias Removal Web Service.

    Reddy, Vinod; Swanson, Stanley M; Segelke, Brent; Kantardjieff, Katherine A; Sacchettini, James C; Rupp, Bernhard

    2003-12-01

    Anticipating a continuing increase in the number of structures solved by molecular replacement in high-throughput crystallography and drug-discovery programs, a user-friendly web service for automated molecular replacement, map improvement, bias removal and real-space correlation structure validation has been implemented. The service is based on an efficient bias-removal protocol, Shake&wARP, and implemented using EPMR and the CCP4 suite of programs, combined with various shell scripts and Fortran90 routines. The service returns improved maps, converted data files and real-space correlation and B-factor plots. User data are uploaded through a web interface and the CPU-intensive iteration cycles are executed on a low-cost Linux multi-CPU cluster using the Condor job-queuing package. Examples of map improvement at various resolutions are provided and include model completion and reconstruction of absent parts, sequence correction, and ligand validation in drug-target structures.

  7. Should she be granted asylum? Examining the justifiability of the persecution criterion and nexus clause in asylum law

    Noa Wirth Nogradi

    2016-10-01

    Full Text Available The current international asylum regime recognizes only persecuted persons as rightful asylum applicants. The Geneva Convention and Protocol enumerate specific grounds upon which persecution is recognized. Claimants who cannot demonstrate a real risk of persecution based on one of the recognized grounds are unlikely to be granted asylum. This paper aims to relate real-world practices to normative theories, asking whether the Convention’s restricted preference towards persecuted persons is normatively justified. I intend to show that the justifications of the persecution criterion also apply to grounds currently lacking recognition. My main concern will be persecution on the grounds of gender.The first section introduces the dominant standpoints in theories of asylum, which give different answers to the question of who should be granted asylum, based on different normative considerations. Humanitarian theories base their claims on the factual neediness of asylum-seekers, holding that whoever is in grave danger of harm or deprivation should be granted asylum. Political theories base their justifications on conceptions of legitimacy and membership, holding that whoever has been denied membership in their original state should be granted asylum. Under political theories, Matthew Price’s theory will be discussed, which provides a normative justification of the currently recognized persecution criterion. The second section provides a descriptive definition of persecution based on Kuosmanen (2014, and evaluates the normative relevance of the different elements of this definition based on the theories presented previously. The third section is devoted to the examination of the normative justifiability of the nexus clause’s exclusive list of the bases (grounds upon which persons might be persecuted. The section argues that while the clause does not recognize that persecution might be based on gender, in fact many women experience harms based on

  8. MONO FOR CROSS-PLATFORM CONTROL SYSTEM ENVIRONMENT

    Nishimura, Hiroshi; Timossi, Chris

    2006-01-01

    Mono is an independent implementation of the .NET Framework by Novell that runs on multiple operating systems (including Windows, Linux and Macintosh) and allows any .NET compatible application to run unmodified. For instance Mono can run programs with graphical user interfaces (GUI) developed with the C(number s ign) language on Windows with Visual Studio (a full port of WinForm for Mono is in progress). We present the results of tests we performed to evaluate the portability of our controls system .NET applications from MS Windows to Linux

  9. PET/CT in cancer: moderate sample sizes may suffice to justify replacement of a regional gold standard

    Gerke, Oke; Poulsen, Mads Hvid; Bouchelouche, Kirsten

    2009-01-01

    PURPOSE: For certain cancer indications, the current patient evaluation strategy is a perfect but locally restricted gold standard procedure. If positron emission tomography/computed tomography (PET/CT) can be shown to be reliable within the gold standard region and if it can be argued that PET...... of metastasized prostate cancer. RESULTS: An added value in accuracy of PET/CT in adjacent areas can outweigh a downsized target level of accuracy in the gold standard region, justifying smaller sample sizes. CONCLUSIONS: If PET/CT provides an accuracy benefit in adjacent regions, then sample sizes can be reduced....../CT also performs well in adjacent areas, then sample sizes in accuracy studies can be reduced. PROCEDURES: Traditional standard power calculations for demonstrating sensitivities of both 80% and 90% are shown. The argument is then described in general terms and demonstrated by an ongoing study...

  10. A Closer Look at the Junior Doctor Crisis in the United Kingdom's National Health Services: Is Emigration Justifiable?

    Teo, Wendy Zi Wei

    2018-07-01

    This article attempts to tackle the ethically and morally troubling issue of emigration of physicians from the United Kingdom, and whether it can be justified. Unlike most research that has already been undertaken in this field, which looks at migration from developing countries to developed countries, this article takes an in-depth look at the migration of physicians between developed countries, in particular from the United Kingdom (UK) to other developed countries such as Canada, Australia, New Zealand, and the United States (US). This examination was written in response to a current and critical crisis in the National Health Service (NHS), where impending contract changes may bring about a potential exodus of junior doctors.

  11. A Lacanian Reading of the Two Novels The Scarlet Letter And Private Memoirs And Confessions of A Justified Sinner

    Marjan Yazdanpanahi

    2016-07-01

    Full Text Available This paper discusses two novels The Private Memoirs and Confessions of a Justified Sinner and The Scarlet Letter written by James Hogg and Nathaniel Hawthorn from the perspective of Jacques Lacan theories: the mirror stage, the-name-of-the-father and desire. The mirror stage refers to historical value and an essential libidinal relationship with the body-image. The-name-of-the-father is defined as the prohibitive role of the father as the one who lays down the incest taboo in the Oedipus complex. Meanwhile, desire is neither the appetite for satisfaction, nor the demand for love, but the difference that results from the subtraction of the first from the second.

  12. Is a Clean Development Mechanism project economically justified? Case study of an International Carbon Sequestration Project in Iran.

    Katircioglu, Salih; Dalir, Sara; Olya, Hossein G

    2016-01-01

    The present study evaluates a carbon sequestration project for the three plant species in arid and semiarid regions of Iran. Results show that Haloxylon performed appropriately in the carbon sequestration process during the 6 years of the International Carbon Sequestration Project (ICSP). In addition to a high degree of carbon dioxide sequestration, Haloxylon shows high compatibility with severe environmental conditions and low maintenance costs. Financial and economic analysis demonstrated that the ICSP was justified from an economic perspective. The financial assessment showed that net present value (NPV) (US$1,098,022.70), internal rate of return (IRR) (21.53%), and payback period (6 years) were in an acceptable range. The results of the economic analysis suggested an NPV of US$4,407,805.15 and an IRR of 50.63%. Therefore, results of this study suggest that there are sufficient incentives for investors to participate in such kind of Clean Development Mechanism (CDM) projects.

  13. Are chest radiographs justified in pre-employment examinations. Presentation of legal position and medical evidence based on 1760 cases

    Ladd, S.C.; Krause, U.; Ladd, M.E.

    2006-01-01

    The legal and medical basis for chest radiographs as part of pre-employment examinations (PEE) at a University Hospital is evaluated. The radiographs are primarily performed to exclude infectious lung disease. A total of 1760 consecutive chest radiographs performed as a routine part of PEEs were reviewed retrospectively. Pathologic findings were categorized as ''nonrelevant'' or ''relevant.'' No positive finding with respect to tuberculosis or any other infectious disease was found; 94.8% of the chest radiographs were completely normal. Only five findings were regarded as ''relevant'' for the individual. No employment-relevant diagnosis occurred. The performance of chest radiography as part of a PEE is most often not justified. The practice is expensive, can violate national and European law, and lacks medical justification. (orig.) [de

  14. Is nuclear energy justifiable?

    Roth, E.

    1988-01-01

    This is a comment on an article by Prof. Haerle a theologist, published earlier under the same heading, in which the use of nuclear energy is rejected for ethical reasons. The comment contents the claim mode by the first author that theologists, because they have general ethical competency, must needs have competency to decide on the fittest technique (of energy conversion) for satisfying, or potentially satisfying, the criteria of responsible action. Thus, an ethical comment on, for instance, nuclear energy is beyond the scope of the competency of the churches. One is only entitled as a private person to objecting to nuclear energy, not because of one's position in the church. (HSCH) [de

  15. Justified Self-Esteem

    Kristjansson, Kristjan

    2007-01-01

    This paper develops a thread of argument from previous contributions to this journal by Richard Smith and Ruth Cigman about the educational salience of self-esteem. It is argued--contra Smith and Cigman--that the social science conception of self-esteem does serve a useful educational function, most importantly in undermining the inflated…

  16. Justifier l’injustifiable

    Olivier Jouanjan

    2006-04-01

    Full Text Available Le « droit » tient aussi dans les discours qu’on tient sur lui, notamment les discours des juristes. L’analyse des discours des juristes engagés du Troisième Reich fait ressortir un schéma général de justification, un principe grammatical génératif de ces discours qu’on peut qualifier de « décisionnisme substantiel ». Le positivisme juridique, parce qu’abstrait et « juif », fut désigné comme l’ennemi principal de la science du « droit » nazi, une « science » qui ne pouvait se concevoir elle-même que comme politique. En analysant la construction idéologico-juridique de l’État total, la destruction de la notion de droits subjectifs, la substitution au concept de personnalité juridique d’une notion « concrète » de l’« être-membre-de-la-communauté », puis en montrant le fonctionnement de ces discours dans la pratique, la présente contribution met en évidence la double logique de l’incorporation et de l’incarnation à l’œuvre dans la science nazie du droit, une « science » dont Carl Schmitt fait la « théorie » en 1934 à travers la « pensée de l’ordre concret ».

  17. Real-time mobile customer short message system design and implementation

    Han, Qirui; Sun, Fang

    To expand the current mobile phone short message service, and to make the contact between schools, teachers, parents and feedback of the modern school office system more timely and conveniently, designed and developed the Short Message System based on the Linux platform. The state-of-the-art principles and designed proposals in the Short Message System based on the Linux platform are introduced. Finally we propose an optimized secure access authentication method. At present, many schools,vbusinesses and research institutions ratify the promotion and application the messaging system gradually, which has shown benign market prospects.

  18. Benchmark Comparison of Dual- and Quad-Core Processor Linux Clusters with Two Global Climate Modeling Workloads

    McGalliard, James

    2008-01-01

    This viewgraph presentation details the science and systems environments that NASA High End computing program serves. Included is a discussion of the workload that is involved in the processing for the Global Climate Modeling. The Goddard Earth Observing System Model, Version 5 (GEOS-5) is a system of models integrated using the Earth System Modeling Framework (ESMF). The GEOS-5 system was used for the Benchmark tests, and the results of the tests are shown and discussed. Tests were also run for the Cubed Sphere system, results for these test are also shown.

  19. Packaging of control system software

    Zagar, K.; Kobal, M.; Saje, N.; Zagar, A.; Sabjan, R.; Di Maio, F.; Stepanov, D.

    2012-01-01

    Control system software consists of several parts - the core of the control system, drivers for integration of devices, configuration for user interfaces, alarm system, etc. Once the software is developed and configured, it must be installed to computers where it runs. Usually, it is installed on an operating system whose services it needs, and also in some cases dynamically links with the libraries it provides. Operating system can be quite complex itself - for example, a typical Linux distribution consists of several thousand packages. To manage this complexity, we have decided to rely on Red Hat Package Management system (RPM) to package control system software, and also ensure it is properly installed (i.e., that dependencies are also installed, and that scripts are run after installation if any additional actions need to be performed). As dozens of RPM packages need to be prepared, we are reducing the amount of effort and improving consistency between packages through a Maven-based infrastructure that assists in packaging (e.g., automated generation of RPM SPEC files, including automated identification of dependencies). So far, we have used it to package EPICS, Control System Studio (CSS) and several device drivers. We perform extensive testing on Red Hat Enterprise Linux 5.5, but we have also verified that packaging works on CentOS and Scientific Linux. In this article, we describe in greater detail the systematic system of packaging we are using, and its particular application for the ITER CODAC Core System. (authors)

  20. Real time kernel performance monitoring with SystemTap

    CERN. Geneva

    2018-01-01

    SystemTap is a dynamic method of monitoring and tracing the operation of a running Linux kernel. In this talk I will present a few practical use cases where SystemTap allowed me to turn otherwise complex userland monitoring tasks in simple kernel probes.

  1. Computed tomography is not justified in every pediatric blunt trauma patient with a suspicious mechanism of injury.

    Hershkovitz, Yehuda; Zoarets, Itai; Stepansky, Albert; Kozer, Eran; Shapira, Zahar; Klin, Baruch; Halevy, Ariel; Jeroukhimov, Igor

    2014-07-01

    Computed tomography (CT) has become an important tool for the diagnosis of intra-abdominal and chest injuries in patients with blunt trauma. The role of CT in conscious asymptomatic patients with a suspicious mechanism of injury remains controversial. This controversy intensifies in the management of pediatric blunt trauma patients, who are much more susceptible to radiation exposure. The objective of this study was to evaluate the role of abdominal and chest CT imaging in asymptomatic pediatric patients with a suspicious mechanism of injury. Forty-two pediatric patients up to 15 years old were prospectively enrolled. All patients presented with a suspicious mechanism of blunt trauma and multisystem injury. They were neurologically intact and had no signs of injury to the abdomen or chest. Patients underwent CT imaging of the chest and abdomen as part of the initial evaluation. Thirty-one patients (74%) had a normal CT scan. Two patients of 11 with an abnormal CT scan required a change in management and were referred for observation in the Intensive Care Unit. None of the patients required surgical intervention. The routine use of CT in asymptomatic pediatric patients with a suspicious mechanism of blunt trauma injury is not justified. Copyright © 2014 Elsevier Inc. All rights reserved.

  2. Specifying a Realistic File System

    Sidney Amani

    2015-11-01

    Full Text Available We present the most interesting elements of the correctness specification of BilbyFs, a performant Linux flash file system. The BilbyFs specification supports asynchronous writes, a feature that has been overlooked by several file system verification projects, and has been used to verify the correctness of BilbyFs's fsync( C implementation. It makes use of nondeterminism to be concise and is shallowly-embedded in higher-order logic.

  3. The frequency of Tay-Sachs disease causing mutations in the Brazilian Jewish population justifies a carrier screening program

    Roberto Rozenberg

    Full Text Available CONTEXT: Tay-Sachs disease is an autosomal recessive disease characterized by progressive neurologic degeneration, fatal in early childhood. In the Ashkenazi Jewish population the disease incidence is about 1 in every 3,500 newborns and the carrier frequency is 1 in every 29 individuals. Carrier screening programs for Tay-Sachs disease have reduced disease incidence by 90% in high-risk populations in several countries. The Brazilian Jewish population is estimated at 90,000 individuals. Currently, there is no screening program for Tay-Sachs disease in this population. OBJECTIVE: To evaluate the importance of a Tay-Sachs disease carrier screening program in the Brazilian Jewish population by determining the frequency of heterozygotes and the acceptance of the program by the community. SETTING: Laboratory of Molecular Genetics - Institute of Biosciences - Universidade de São Paulo. PARTICIPANTS: 581 senior students from selected Jewish high schools. PROCEDURE: Molecular analysis of Tay-Sachs disease causing mutations by PCR amplification of genomic DNA, followed by restriction enzyme digestion. RESULTS: Among 581 students that attended educational classes, 404 (70% elected to be tested for Tay-Sachs disease mutations. Of these, approximately 65% were of Ashkenazi Jewish origin. Eight carriers were detected corresponding to a carrier frequency of 1 in every 33 individuals in the Ashkenazi Jewish fraction of the sample. CONCLUSION: The frequency of Tay-Sachs disease carriers among the Ashkenazi Jewish population of Brazil is similar to that of other countries where carrier screening programs have led to a significant decrease in disease incidence. Therefore, it is justifiable to implement a Tay-Sachs disease carrier screening program for the Brazilian Jewish population.

  4. The frequency of Tay-Sachs disease causing mutations in the Brazilian Jewish population justifies a carrier screening program.

    Rozenberg, R; Pereira, L da V

    2001-07-05

    Tay-Sachs disease is an autosomal recessive disease characterized by progressive neurologic degeneration, fatal in early childhood. In the Ashkenazi Jewish population the disease incidence is about 1 in every 3,500 newborns and the carrier frequency is 1 in every 29 individuals. Carrier screening programs for Tay-Sachs disease have reduced disease incidence by 90% in high-risk populations in several countries. The Brazilian Jewish population is estimated at 90,000 individuals. Currently, there is no screening program for Tay-Sachs disease in this population. To evaluate the importance of a Tay-Sachs disease carrier screening program in the Brazilian Jewish population by determining the frequency of heterozygotes and the acceptance of the program by the community. Laboratory of Molecular Genetics--Institute of Biosciences--Universidade de São Paulo. 581 senior students from selected Jewish high schools. Molecular analysis of Tay-Sachs disease causing mutations by PCR amplification of genomic DNA, followed by restriction enzyme digestion. Among 581 students that attended educational classes, 404 (70%) elected to be tested for Tay-Sachs disease mutations. Of these, approximately 65% were of Ashkenazi Jewish origin. Eight carriers were detected corresponding to a carrier frequency of 1 in every 33 individuals in the Ashkenazi Jewish fraction of the sample. The frequency of Tay-Sachs disease carriers among the Ashkenazi Jewish population of Brazil is similar to that of other countries where carrier screening programs have led to a significant decrease in disease incidence. Therefore, it is justifiable to implement a Tay-Sachs disease carrier screening program for the Brazilian Jewish population.

  5. Sentinel lymph node biopsy in patients with a needle core biopsy diagnosis of ductal carcinoma in situ: is it justified?

    Doyle, B

    2012-02-01

    BACKGROUND: The incidence of ductal carcinoma in situ (DCIS) has increased markedly with the introduction of population-based mammographic screening. DCIS is usually diagnosed non-operatively. Although sentinel lymph node biopsy (SNB) has become the standard of care for patients with invasive breast carcinoma, its use in patients with DCIS is controversial. AIM: To examine the justification for offering SNB at the time of primary surgery to patients with a needle core biopsy (NCB) diagnosis of DCIS. METHODS: A retrospective analysis was performed of 145 patients with an NCB diagnosis of DCIS who had SNB performed at the time of primary surgery. The study focused on rates of SNB positivity and underestimation of invasive carcinoma by NCB, and sought to identify factors that might predict the presence of invasive carcinoma in the excision specimen. RESULTS: 7\\/145 patients (4.8%) had a positive sentinel lymph node, four macrometastases and three micrometastases. 6\\/7 patients had invasive carcinoma in the final excision specimen. 55\\/145 patients (37.9%) with an NCB diagnosis of DCIS had invasive carcinoma in the excision specimen. The median invasive tumour size was 6 mm. A radiological mass and areas of invasion <1 mm, amounting to "at least microinvasion" on NCB were predictive of invasive carcinoma in the excision specimen. CONCLUSIONS: SNB positivity in pure DCIS is rare. In view of the high rate of underestimation of invasive carcinoma in patients with an NCB diagnosis of DCIS in this study, SNB appears justified in this group of patients.

  6. Validation of image quality in full-field digital mammography: Is the replacement of wet by dry laser printers justified?

    Schueller, Gerd; Kaindl, Elisabeth; Langenberger, Herbert; Stadler, Alfred; Schueller-Weidekamm, Claudia; Semturs, Friedrich; Helbich, Thomas H.

    2007-01-01

    Objective: Dry laser printers have replaced wet laser printers to produce hard copies of high-resolution digital images, primarily because of environmental concerns. However, no scientific research data have been published that compare the image quality of dry and wet laser printers in full-field digital mammography (FFDM). This study questions the image quality of these printers. Materials and methods: Objective image quality parameters of both printers were evaluated using a standardized printer test image, i.e., optical density and detectability of specific image elements (lines, curves, and shapes). Furthermore, mammograms of 129 patients with different breast tissue composition patterns were imaged with both printers. A total of 1806 subjective image quality parameters (brightness, contrast, and detail detection of anatomic structures), the detectability of breast lesions, as well as diagnostic performance according to the BI-RADS classification were evaluated. In addition, the presence of film artifacts was investigated. Results: Optical density values were equal for the dry and the wet laser printer. Detection of specific image elements on the printer test image was not different. Ratings of subjective image quality parameters were equal, as were the detectability of breast lesions and the diagnostic performance. Dry laser printer images showed more artifacts (164 versus 27). However, these artifacts did not influence image quality. Conclusion: Based on the evidence of objective and subjective parameters, a dry laser printer equals the image quality of a wet laser printer in FFDM. Therefore, not only for reasons of environmental preference, the replacement of wet laser printers by dry laser printers in FFDM is justified

  7. Is febrile neutropenia prophylaxis with granulocyte-colony stimulating factors economically justified for adjuvant TC chemotherapy in breast cancer?

    Skedgel, Chris; Rayson, Daniel; Younis, Tallal

    2016-01-01

    Febrile neutropenia (FN) during adjuvant chemotherapy is associated with morbidity, mortality risk, and substantial cost, and subsequent chemotherapy dose reductions may result in poorer outcomes. Patients at high risk of, or who develop FN, often receive prophylaxis with granulocyte colony-stimulating factors (G-CSF). We investigated whether different prophylaxis strategies with G-CSF offered favorable value-for-money. We developed a decision model to estimate the short- and long-term costs and outcomes of a hypothetical cohort of women with breast cancer receiving adjuvant taxotere + cyclophosphamide (TC) chemotherapy. The short-term phase estimated upfront costs and FN risks with adjuvant TC chemotherapy without G-CSF prophylaxis (i.e., chemotherapy dose reductions) as well as with secondary and primary G-CSF prophylaxis strategies. The long-term phase estimated the expected costs and quality-adjusted life years (QALYs) for patients who completed adjuvant TC chemotherapy with or without one or more episodes of FN. Secondary G-CSF was associated with lower costs and greater QALY gains than a no G-CSF strategy. Primary G-CSF appears likely to be cost-effective relative to secondary G-CSF at FN rates greater than 28%, assuming some loss of chemotherapy efficacy at lower dose intensities. The cost-effectiveness of primary vs. secondary G-CSF was sensitive to FN risk and mortality, and loss of chemotherapy efficacy following FN. Secondary G-CSF is more effective and less costly than a no G-CSF strategy. Primary G-CSF may be justified at higher willingness-to-pay thresholds and/or higher FN risks, but this threshold FN risk appears to be higher than the 20% rate recommended by current clinical guidelines.

  8. Simulation of advanced ultrasound systems using Field II

    Jensen, Jørgen Arendt

    2004-01-01

    impulse responses is explained. A simulation example for a synthetic aperture spread spectrum flow systems is described. It is shown how the advanced coded excitation can be set up, and how the simulation can be parallelized to reduce the simulation time from 17 months to 391 hours using a 32 CPU Linux...

  9. SARUS: A Synthetic Aperture Real-Time Ultrasound System

    Jensen, Jørgen Arendt; Holten-Lund, Hans; Nilsson, Ronnie Thorup

    2013-01-01

    -resolution images/s. Both RF element data and beamformed data can be stored in the system for later storage and processing. The stored data can be transferred in parallel using the system’s sixty-four 1-Gbit Ethernet interfaces at a theoretical rate of 3.2 GB/s to a 144-core Linux cluster....

  10. Probabilistic Anomaly Detection Based On System Calls Analysis

    Przemysław Maciołek

    2007-01-01

    Full Text Available We present an application of probabilistic approach to the anomaly detection (PAD. Byanalyzing selected system calls (and their arguments, the chosen applications are monitoredin the Linux environment. This allows us to estimate “(abnormality” of their behavior (bycomparison to previously collected profiles. We’ve attached results of threat detection ina typical computer environment.

  11. Innovative tools for real-time simulation of dynamic systems

    Palli, Gianluca; Carloni, Raffaella; Melchiorri, Claudio

    2008-01-01

    In this paper, we present a software architecture, based on RTAI-Linux, for the real-time simulation of dynamic systems and for the rapid prototyping of digital controllers. Our aim is to simplify the testing phase of digital controllers by providing the real-time simulation of the plant with the

  12. A WEB-BASED SOLUTION TO VISUALIZE OPERATIONAL MONITORING LINUX CLUSTER FOR THE PROTODUNE DATA QUALITY MONITORING CLUSTER

    Mosesane, Badisa

    2017-01-01

    The Neutrino computing cluster made of 300 Dell PowerEdge 1950 U1 nodes serves an integral role to the CERN Neutrino Platform (CENF). It represents an effort to foster fundamental research in the field of Neutrino physics as it provides data processing facility. We cannot begin to over emphasize the need for data quality monitoring coupled with automating system configurations and remote monitoring of the cluster. To achieve these, a software stack has been chosen to implement automatic propagation of configurations across all the nodes in the cluster. The bulk of these discusses and delves more into the automated configuration management system on this cluster to enable the fast online data processing and Data Quality (DQM) process for the Neutrino Platform cluster (npcmp.cern.ch).

  13. An algorithm of a real time image tracking system using a camera with pan/tilt motors on an embedded system

    Kim, Hie-Sik; Nam, Chul; Ha, Kwan-Yong; Ayurzana, Odgeral; Kwon, Jong-Won

    2005-12-01

    The embedded systems have been applied to many fields, including households and industrial sites. The user interface technology with simple display on the screen was implemented more and more. The user demands are increasing and the system has more various applicable fields due to a high penetration rate of the Internet. Therefore, the demand for embedded system is tend to rise. An embedded system for image tracking was implemented. This system is used a fixed IP for the reliable server operation on TCP/IP networks. Using an USB camera on the embedded Linux system developed a real time broadcasting of video image on the Internet. The digital camera is connected at the USB host port of the embedded board. All input images from the video camera are continuously stored as a compressed JPEG file in a directory at the Linux web-server. And each frame image data from web camera is compared for measurement of displacement Vector. That used Block matching algorithm and edge detection algorithm for past speed. And the displacement vector is used at pan/tilt motor control through RS232 serial cable. The embedded board utilized the S3C2410 MPU, which used the ARM 920T core form Samsung. The operating system was ported to embedded Linux kernel and mounted of root file system. And the stored images are sent to the client PC through the web browser. It used the network function of Linux and it developed a program with protocol of the TCP/IP.

  14. What justifies a hospital admission at the end of life? A focus group study on perspectives of family physicians and nurses

    Reyniers, T.; Houttekieri, D.; Cohen, J.; Pasman, H.R.; Deliens, L.

    2014-01-01

    Background: Despite a majority preferring not to die in hospital and health policies aimed at increasing home death, the proportion of hospital deaths remains high. Gaining insight into professional caregiver perspectives about what justifies them could be helpful in understanding the persistently

  15. 32 CFR 37.560 - Must I be able to estimate project expenditures precisely in order to justify use of a fixed...

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Must I be able to estimate project expenditures... I be able to estimate project expenditures precisely in order to justify use of a fixed-support TIA... purposes of this illustration, let that minimum recipient cost sharing be 40% of the total project costs...

  16. Brand Cigarillos: Low Price but High Particulate Matter Levels-Is Their Favorable Taxation in the European Union Justified?

    Wasel, Julia; Boll, Michael; Schulze, Michaela; Mueller, Daniel; Bundschuh, Matthias; Groneberg, David A; Gerber, Alexander

    2015-08-06

    taxation of cigarillos is not justifiable.

  17. Docker: a Software as a Service, Operating System-Level Virtualization Framework

    John Fink

    2014-01-01

    Docker is a relatively new method of virtualization available natively for 64-bit Linux. Compared to more traditional virtualization techniques, Docker is lighter on system resources, offers a git-like system of commits and tags, and can be scaled from your laptop to the cloud.

  18. Docker: a Software as a Service, Operating System-Level Virtualization Framework

    John Fink

    2014-07-01

    Full Text Available Docker is a relatively new method of virtualization available natively for 64-bit Linux. Compared to more traditional virtualization techniques, Docker is lighter on system resources, offers a git-like system of commits and tags, and can be scaled from your laptop to the cloud.

  19. Web-Based Search and Plot System for Nuclear Reaction Data

    Otuka, N.; Nakagawa, T.; Fukahori, T.; Katakura, J.; Aikawa, M.; Suda, T.; Naito, K.; Korennov, S.; Arai, K.; Noto, H.; Ohnishi, A.; Kato, K.

    2005-01-01

    A web-based search and plot system for nuclear reaction data has been developed, covering experimental data in EXFOR format and evaluated data in ENDF format. The system is implemented for Linux OS, with Perl and MySQL used for CGI scripts and the database manager, respectively. Two prototypes for experimental and evaluated data are presented

  20. Technical Evaluation Report 24: Open Source Software: an alternative to costly Learning Management Systems

    Jim Depow

    2003-10-01

    Full Text Available This is the first in a series of two reports discussing the use of open source software (OSS and free software (FS in online education as an alternative to expensive proprietary software. It details the steps taken in a Canadian community college to download and install the Linux Operating System in order to support an OSS/ FS learning management system (LMS.

  1. Advanced OS deployment system

    Galiano Molina, Sebastián

    2007-01-01

    The main project’s objective is to design and build an OS deployment system taking advantage of the Linux OS and the Open Source community developments. This means to use existing technologies that modularize the system. With this philosophy in mind, the number of developed code lines within the project is keeping as small as possible. As REMBO, the OS deployment system to develop has to be transparent to the user. This means a system with a friendly user interface and no te...

  2. Recommendations for secure initialization routines in operating systems

    Dodge, Catherine A.

    2004-01-01

    Approved for public release; distribution in unlimited. While a necessity of all operating systems, the code that initializes a system can be notoriously difficult to understand. This thesis explores the most common architectures used for bringing an operating system to its initial state, once the operating system gains control from the boot loader. Specifically, the ways in which the OpenBSD and Linux operating systems handle initialization are dissected. With this understanding, a set ...

  3. High speed real-time wavefront processing system for a solid-state laser system

    Liu, Yuan; Yang, Ping; Chen, Shanqiu; Ma, Lifang; Xu, Bing

    2008-03-01

    A high speed real-time wavefront processing system for a solid-state laser beam cleanup system has been built. This system consists of a core2 Industrial PC (IPC) using Linux and real-time Linux (RT-Linux) operation system (OS), a PCI image grabber, a D/A card. More often than not, the phase aberrations of the output beam from solid-state lasers vary fast with intracavity thermal effects and environmental influence. To compensate the phase aberrations of solid-state lasers successfully, a high speed real-time wavefront processing system is presented. Compared to former systems, this system can improve the speed efficiently. In the new system, the acquisition of image data, the output of control voltage data and the implementation of reconstructor control algorithm are treated as real-time tasks in kernel-space, the display of wavefront information and man-machine conversation are treated as non real-time tasks in user-space. The parallel processing of real-time tasks in Symmetric Multi Processors (SMP) mode is the main strategy of improving the speed. In this paper, the performance and efficiency of this wavefront processing system are analyzed. The opened-loop experimental results show that the sampling frequency of this system is up to 3300Hz, and this system can well deal with phase aberrations from solid-state lasers.

  4. Installation of JMTR core management system

    Imaizumi, Tomomi; Ide, Hiroshi; Naka, Michihiro; Komukai, Bunsaku; Nagao, Yoshiharu

    2013-01-01

    In order to carry out the core management after the reoperation of JMTR quickly and accurately, the authors took up the Standard Reactor Analysis Code (SRAC) system and core management support programs that are operating in a general-purpose large computer and transferred them to PC (OS: Linux), and newly established a JMTR core management system. As for the core analysis, this measure enabled an increase in the processing speed from the check of core arrangement to the result display of nuclear restriction values to about 60 times, compared with the conventional method. It was confirmed that the differences of calculation results originated from the difference of internal display of computers, associated with the transfer of each analysis code from GS21-400 system to PC-Linux, were within practically allowable level. In the future, this system will be applied to the core analysis of JMTR, as well as to the preparation of operation plans. (A.O.)

  5. JAX Colony Management System (JCMS): an extensible colony and phenotype data management system

    Donnelly, Chuck J.; McFarland, Mike; Ames, Abigail; Sundberg, Beth; Springer, Dave; Blauth, Peter; Bult, Carol J.

    2010-01-01

    The Jackson Laboratory Colony Management System (JCMS) is a software application for managing data and information related to research mouse colonies, associated biospecimens, and experimental protocols. JCMS runs directly on computers that run one of the PC Windows® operating systems, but can be accessed via web browser interfaces from any computer running a Windows, Macintosh®, or Linux® operating system. JCMS can be configured for a single user or multiple users in small- to medium-size wo...

  6. Development of a synchrotron timing system on a programmable chip

    Lin Feiyu; Qiao Weimin; Wang Yanyu; Guo Yuhui

    2009-01-01

    A synchrotron requires extremely high time constraints for timing signals, so timing system is very important for a synchrotron control system. A FPGA+ARM+Linux+DSP architecture has been mainly used in timing control of the HIRFL-CSR control system. In this paper, we report the development of the SOPC(System On a Programmable Chip) based on FPGA and uClinux.It can integrate all the functions of ARM+Linux in one single FPGA chip, hence no need of the dedicated ARM chip, and the reduced cost. The maximum operation frequency of this system is 185 MHz. The hardware consumes less than 4% of total resources of FPGA chip. And both the hardware system and the operating system of the SOPC are reconfigurable. The SOPC system has a wide prospect of applications in accelerator engineering and many fields of scientific research. (authors)

  7. Can the benefits of physical seabed restoration justify the costs? An assessment of a disused aggregate extraction site off the Thames Estuary, UK.

    Cooper, Keith; Burdon, Daryl; Atkins, Jonathan P; Weiss, Laura; Somerfield, Paul; Elliott, Michael; Turner, Kerry; Ware, Suzanne; Vivian, Chris

    2013-10-15

    Physical and biological seabed impacts can persist long after the cessation of marine aggregate dredging. Whilst small-scale experimental studies have shown that it may be possible to mitigate such impacts, it is unclear whether the costs of restoration are justified on an industrial scale. Here we explore this question using a case study off the Thames Estuary, UK. By understanding the nature and scale of persistent impacts, we identify possible techniques to restore the physical properties of the seabed, and the costs and the likelihood of success. An analysis of the ecosystem services and goods/benefits produced by the site is used to determine whether intervention is justified. Whilst a comparison of costs and benefits at this site suggests restoration would not be warranted, the analysis is site-specific. We emphasise the need to better define what is, and is not, an acceptable seabed condition post-dredging. Crown Copyright © 2013. Published by Elsevier Ltd. All rights reserved.

  8. On deciding to have a lobotomy: either lobotomies were justified or decisions under risk should not always seek to maximise expected utility.

    Cooper, Rachel

    2014-02-01

    In the 1940s and 1950s thousands of lobotomies were performed on people with mental disorders. These operations were known to be dangerous, but thought to offer great hope. Nowadays, the lobotomies of the 1940s and 1950s are widely condemned. The consensus is that the practitioners who employed them were, at best, misguided enthusiasts, or, at worst, evil. In this paper I employ standard decision theory to understand and assess shifts in the evaluation of lobotomy. Textbooks of medical decision making generally recommend that decisions under risk are made so as to maximise expected utility (MEU) I show that using this procedure suggests that the 1940s and 1950s practice of psychosurgery was justifiable. In making sense of this finding we have a choice: Either we can accept that psychosurgery was justified, in which case condemnation of the lobotomists is misplaced. Or, we can conclude that the use of formal decision procedures, such as MEU, is problematic.

  9. How to define and build an effective cyber threat intelligence capability how to understand, justify and implement a new approach to security

    Dalziel, Henry; Carnall, James

    2014-01-01

    Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Amo

  10. LINUX SEBAGAI ALTERNATIF PENDIDIKAN KOMPUTER

    Vensy Vydia

    2009-01-01

    Full Text Available Pendidikan komputer adalah salah satu perlu itu sangat elementer. Ini disebabkan oleh kurikulum dari permintaan Pendidikan nasional yang berlaku keterangan teknologi pada pelajaran intra curricular. Di sebelah tersebut, kemampuan pada era global permintaan itu keberadaan dari kesederhanaan pada masing-masing pekerjaan yang lakukan bahwa dibutuhkan keberadaan dari mesin komputer sama sekali. Bagaimanapun, dalam keselarasan permintaan, mahal dari satu sistem operasi adalah salah satu rintangan di komputer belajar untuk lebih kreatif.

  11. Justified requirements in private transportation and a recommendation for improving the efficiency of household energy utilisation through the use of small ecologically-friendly or 'ultralight' vehicles for mass private transportation in the 21st century

    Juravic, T.

    1999-01-01

    Needs and ownership are sociobiologically manifested in the alter-ego of a Homo sapiens where the natural progression of events (a household being the fundamental microlevel) and the social order, i.e. globalisation, are based on ownership and needs as sacred rights, and for this reason universal values like energy conservation end up as the waste of the mindless worship of consumption. Justified needs are phenomena of a consumerist (egocentric, pragmatic, voluntary) social conscience and instinctive behaviour - an unpredictable cause resulting from freedom being the foundation of the quality of life, socio-economic and political changes but are mutually exclusive to understanding (expressing and gaining deeper and richer knowledge). Inbuilt limits and/or control of consumption, which are already used in household appliances with aforeset processes (goals) for unknown consumers, to achieve large energy savings in 'routine' functions are more effective than attempts to prevent mistakes (lack of user knowledge through repression). A private vehicle, as a symbol of the freedom and quality of life, is a mechanism for achieving 'justified' needs and presents another means of household energy utilisation. The consumer's desires regarding private transportation are not sufficiently reconciled with intelligent microprocessors (expert systems), which achieve (the most) optimal behaviour in the process of transportation. This detailed consideration (as part of investigating the technical system) cannot be examined on a strictly logical or scientific basis, as it only proposes a method of co-agreement (not co-reponsability) of manufacturers and consumers and an alternative logical way of thinking, or organisation of the interaction between vehicles and traffic in order to form a judgement of really justifiable needs, and to achieve a robotic private vehicle, transportation and traffic. The goal of this consideration is to establish the DIVISION of energy with the help of

  12. Kajian dan Implementasi Real TIME Operating System pada Single Board Computer Berbasis Arm

    A, Wiedjaja; M, Handi; L, Jonathan; Christian, Benyamin; Kristofel, Luis

    2014-01-01

    Operating System is an important software in computer system. For personal and office use the operating system is sufficient. However, to critical mission applications such as nuclear power plants and braking system on the car (auto braking system) which need a high level of reliability, it requires operating system which operates in real time. The study aims to assess the implementation of the Linux-based operating system on a Single Board Computer (SBC) ARM-based, namely Pandaboard ES with ...

  13. An Analog I/O Interface Board for Audio Arduino Open Sound Card System

    Dimitrov, Smilen; Serafin, Stefania

    2011-01-01

    AudioArduino [1] is a system consisting of an ALSA (Advanced Linux Sound Architecture) audio driver and corresponding microcontroller code; that can demonstrate full-duplex, mono, 8-bit, 44.1 kHz soundcard behavior on an FTDI based Arduino. While the basic operation as a soundcard can...

  14. Notch Filters for Port-Hamiltonian Systems

    Dirksz, Danny; Scherpen, Jacquelien M.A.; van der Schaft, Abraham J.; Steinbuch, Maarten

    Many powerful tools exist for control design in the frequency domain, but are theoretically only justified for linear systems. On the other hand, nonlinear control deals with control design methodologies that are theoretically justified for a larger and more realistic class of systems, but primarily

  15. The Boa-based Remote Monitoring System on Embeded Linux Platform%嵌入式Linux下基于BOA的远程控制

    高巍; 钟梅; 徐松惠

    2009-01-01

    分析了在嵌入式Linux平台下构建Web服务器的应用前景,介绍了利用嵌入式Web服务器实现Web远程监控系统的体系结构,给出了在ARM9处理器上利用开源Boa作为Web服务器的远程监控系统的设计及关键技术的实现,并以远程灯光控制为例介绍了这一解决方案的典型应用.

  16. Numerical performance and throughput benchmark for electronic structure calculations in PC-Linux systems with new architectures, updated compilers, and libraries.

    Yu, Jen-Shiang K; Hwang, Jenn-Kang; Tang, Chuan Yi; Yu, Chin-Hui

    2004-01-01

    A number of recently released numerical libraries including Automatically Tuned Linear Algebra Subroutines (ATLAS) library, Intel Math Kernel Library (MKL), GOTO numerical library, and AMD Core Math Library (ACML) for AMD Opteron processors, are linked against the executables of the Gaussian 98 electronic structure calculation package, which is compiled by updated versions of Fortran compilers such as Intel Fortran compiler (ifc/efc) 7.1 and PGI Fortran compiler (pgf77/pgf90) 5.0. The ifc 7.1 delivers about 3% of improvement on 32-bit machines compared to the former version 6.0. Performance improved from pgf77 3.3 to 5.0 is also around 3% when utilizing the original unmodified optimization options of the compiler enclosed in the software. Nevertheless, if extensive compiler tuning options are used, the speed can be further accelerated to about 25%. The performances of these fully optimized numerical libraries are similar. The double-precision floating-point (FP) instruction sets (SSE2) are also functional on AMD Opteron processors operated in 32-bit compilation, and Intel Fortran compiler has performed better optimization. Hardware-level tuning is able to improve memory bandwidth by adjusting the DRAM timing, and the efficiency in the CL2 mode is further accelerated by 2.6% compared to that of the CL2.5 mode. The FP throughput is measured by simultaneous execution of two identical copies of each of the test jobs. Resultant performance impact suggests that IA64 and AMD64 architectures are able to fulfill significantly higher throughput than the IA32, which is consistent with the SpecFPrate2000 benchmarks.

  17. VNC Remote Control Based on Linux Operation System%基于Linux平台下的VNC远程控制实现方法

    陈虹

    2007-01-01

    为了保证服务器能正常有效运行,对服务器进行管理和维护是网络管理员最重要的工作之一,但由于服务器通常不在本地或者在地理位置上是分散的,所以常常要借助远程控制的方式对这些服务器进行管理,在Windows平台下,通常是采用终端服务实现远程控制,而在Linux平台下,采用VNC服务实现远程控制可大大提高管理效率.

  18. Configuration and management of Linux operating system VNC server%Linux操作系统VNC服务器的配置与管理

    孔祥真; 邢宏健

    2014-01-01

    远程管理工具Telnet和OpenSSH,它们是基于字符界面的,对于桌面用户来说,可能使用起来不太方便.VNC(Virtual Network Computing,虚拟网络计算)是一种图形桌面共享系统,通过网络把控制端的键盘和鼠标事件传输给被控端,并把被控端的屏幕显示回传给控制端,使在控制端的操作者感觉犹如坐在被控端电脑面前操作一样.在实际应用中,有着两者不可替代的的优势.本文讨论了架设VNC服务器的方法以及基于不同操作系统客户端的远程管理方式.

  19. PMICALC: an R code-based software for estimating post-mortem interval (PMI) compatible with Windows, Mac and Linux operating systems.

    Muñoz-Barús, José I; Rodríguez-Calvo, María Sol; Suárez-Peñaranda, José M; Vieira, Duarte N; Cadarso-Suárez, Carmen; Febrero-Bande, Manuel

    2010-01-30

    In legal medicine the correct determination of the time of death is of utmost importance. Recent advances in estimating post-mortem interval (PMI) have made use of vitreous humour chemistry in conjunction with Linear Regression, but the results are questionable. In this paper we present PMICALC, an R code-based freeware package which estimates PMI in cadavers of recent death by measuring the concentrations of potassium ([K+]), hypoxanthine ([Hx]) and urea ([U]) in the vitreous humor using two different regression models: Additive Models (AM) and Support Vector Machine (SVM), which offer more flexibility than the previously used Linear Regression. The results from both models are better than those published to date and can give numerical expression of PMI with confidence intervals and graphic support within 20 min. The program also takes into account the cause of death. 2009 Elsevier Ireland Ltd. All rights reserved.

  20. Creating and justifying research and development value: Scope, scale, skill and social networking of R&D

    Groen, Arend J.; de Weerd-Nederhof, Petronella C.; Kerssens-van Drongelen, I.C.; Badoux, Rob A.J.; Olthuis, Gerard P.H.

    2002-01-01

    In this paper we describe a framework for analysing the creation and justification of Research & Development. The 4S framework is developed for analysing the scope, scale, skills and social network aspects of Research & Development value. The framework is based on social system theory, a process

  1. [Hemolytic disease of the newborn has not vanished from Finland--routine protection of RhD negative mothers during pregnancy is justifiable].

    Sainio, Susanna; Kuosmanen, Malla

    2012-01-01

    Prophylaxis of RhD negative mothers with anti-D immunoglobulin after childbirth is the most important procedure reducing the immunization of the mother and the risk of severe hemolytic disease of the newborn. In spite of this, anti-D antibodies having relevance to pregnancy are later detected in 1.8% of RhD negative mothers. Half of these cases could be prevented by routine anti-D prophylaxis given to the mothers during weeks 28 to 34 of pregnancy. Convincing evidence of the effectiveness of this measure has accumulated in the last few years, and application of the treatment is justified also in Finland.

  2. Justifying the need for forensically ready protocols: A case study of identifying malicious web servers using client honeypots

    Seifert, Christian; Endicott-Popovsky, Barbara E.; Frincke, Deborah A.; Komisarczuk, Peter; Muschevici, Radu; Welch, Ian D.

    2008-01-03

    Abstract: Client honeypot technology can find malicious web servers that attack web browsers and push malware, so called drive-by-downloads, to the client machine. Merely recording the network traffic is insufficient to perform an efficient forensic analysis of the attack. Custom tools need to be developed to access and examine the embedded data of the network protocols. Once the information is extracted from the network data, it cannot be used to perform a behavioral analysis on the attack, therefore limiting the ability to answer what exactly happened on the attacked system. Implementation of a record/ replay mechanism is proposed that allows the forensic examiner to easily extract application data from recorded network streams and allows applications to interact with such data for behavioral analysis purposes. A concrete implementation of such a setup for HTTP and DNS protocols using the HTTP proxy Squid and DNS proxy pdnsd is presented and its effect on digital forensic analysis demonstrated.

  3. Are more restrictive food cadmium standards justifiable health safety measures or opportunistic barriers to trade? An answer from economics and public health

    Figueroa B, Eugenio

    2008-01-01

    In the past, Cd regulations have imposed trade restrictions on foodstuffs from some developing countries seeking to access markets in the developed world and in recent years, there has been a trend towards imposing more rigorous standards. This trend seems to respond more to public and private sectors strategies in some developed countries to create disguised barriers to trade and to improve market competitiveness for their industries, than to scientifically justified health precautions (sanitary and phytosanitary measures) and/or technical barriers to trade acceptable under the Uruguay Round Agreement of the WTO. Applying more rigorous Cd standards in some developed countries will not only increase production costs in developing countries but it will also have a large impact on their economies highly dependent on international agricultural markets. In the current literature there are large uncertainties in the cause-effect relationship between current levels of Cd intakes and eventual health effects in human beings; even the risk of Cd to kidney function is under considerable debate. Recent works on the importance of zinc:Cd ratio rather than Cd levels alone to determine Cd risk factors, on the one hand, and on the declining trends of Cd level in foods and soils, on the other, also indicate a lack of scientific evidence justifying more restrictive cadmium standards. This shows that developing countries should fight for changing and making more transparent the current international structures and procedures for setting sanitary and phytosanitary measures and technical barriers to trade

  4. Are more restrictive food cadmium standards justifiable health safety measures or opportunistic barriers to trade? An answer from economics and public health.

    Figueroa B, Eugenio

    2008-01-15

    In the past, Cd regulations have imposed trade restrictions on foodstuffs from some developing countries seeking to access markets in the developed world and in recent years, there has been a trend towards imposing more rigorous standards. This trend seems to respond more to public and private sectors strategies in some developed countries to create disguised barriers to trade and to improve market competitiveness for their industries, than to scientifically justified health precautions (sanitary and phytosanitary measures) and/or technical barriers to trade acceptable under the Uruguay Round Agreement of the WTO. Applying more rigorous Cd standards in some developed countries will not only increase production costs in developing countries but it will also have a large impact on their economies highly dependent on international agricultural markets. In the current literature there are large uncertainties in the cause-effect relationship between current levels of Cd intakes and eventual health effects in human beings; even the risk of Cd to kidney function is under considerable debate. Recent works on the importance of zinc:Cd ratio rather than Cd levels alone to determine Cd risk factors, on the one hand, and on the declining trends of Cd level in foods and soils, on the other, also indicate a lack of scientific evidence justifying more restrictive cadmium standards. This shows that developing countries should fight for changing and making more transparent the current international structures and procedures for setting sanitary and phytosanitary measures and technical barriers to trade.

  5. An Evaluation of Potential Operating Systems for Autonomous Underwater Vehicles

    2013-02-01

    at the New Mexico Institute of Technology [32] and is now owned by Wind River systems. It runs a thin Linux microkernel that separates and...at hard real-time systems. It has been developed since 1986 and is aimed to be a modular OS with a small microkernel of core functionality, with extra...modules that can be added for additional functionality, including networking tools and graphical interfaces [38]. The microkernel handles largely

  6. Outcome and survival of patients aged 75 years and older compared to younger patients after ruptured abdominal aortic aneurysm repair: do the results justify the effort?

    Shahidi, S; Schroeder, T Veith; Carstensen, M.

    2009-01-01

    We evaluated early mortality (preoperative variables that may be predictive of 30-day mortality in elderly patients compared to younger patients after emergency open repair of ruptured abdominal aortic aneurysm (RAAA). The survey is a retrospective analysis based...... patients compared to the younger group. Between the survivors of the two groups, there were no significant differences in the total length of stay (LOS) and the LOS in the intensive care unit. Advanced age (>or=75) and the combination of this advanced age and serum creatinine of >or=0.150 mmol/L were...... the only significant (p preoperative risk factors in our single-center study. However, we believe that treatment for RAAA can be justified in elderly patients. In our experience, surgical open repair has been life-saving in 33% of patients aged 75 years and older, at a relatively low price for each...

  7. Had We But World Enough, and Time... But We Don't!: Justifying the Thermodynamic and Infinite-Time Limits in Statistical Mechanics

    Palacios, Patricia

    2018-05-01

    In this paper, I compare the use of the thermodynamic limit in the theory of phase transitions with the infinite-time limit in the explanation of equilibrium statistical mechanics. In the case of phase transitions, I will argue that the thermodynamic limit can be justified pragmatically since the limit behavior (i) also arises before we get to the limit and (ii) for values of N that are physically significant. However, I will contend that the justification of the infinite-time limit is less straightforward. In fact, I will point out that even in cases where one can recover the limit behavior for finite t, i.e. before we get to the limit, one cannot recover this behavior for realistic time scales. I will claim that this leads us to reconsider the role that the rate of convergence plays in the justification of infinite limits and calls for a revision of the so-called Butterfield's principle.

  8. The EU Seal Products Ban – Why Ineffective Animal Welfare Protection Cannot Justify Trade Restrictions under European and International Trade Law

    Martin Hennig

    2015-03-01

    Full Text Available In this article, the author questions the legitimacy of the general ban on trade in seal products adopted by the European Union. It is submitted that the EU Seal Regime, which permits the marketing of Greenlandic seal products derived from Inuit hunts, but excludes Canadian and Norwegian seal products from the European market, does not ensure a satisfactory degree of animal welfare protection in order to justify the comprehensive trade restriction in place. It is argued that the current ineffective EU ban on seal products, which according to the WTO Appellate Body cannot be reconciled with the objective of protecting animal welfare, has no legal basis in EU Treaties and should be annulled.

  9. Had We But World Enough, and Time... But We Don't!: Justifying the Thermodynamic and Infinite-Time Limits in Statistical Mechanics

    Palacios, Patricia

    2018-04-01

    In this paper, I compare the use of the thermodynamic limit in the theory of phase transitions with the infinite-time limit in the explanation of equilibrium statistical mechanics. In the case of phase transitions, I will argue that the thermodynamic limit can be justified pragmatically since the limit behavior (i) also arises before we get to the limit and (ii) for values of N that are physically significant. However, I will contend that the justification of the infinite-time limit is less straightforward. In fact, I will point out that even in cases where one can recover the limit behavior for finite t, i.e. before we get to the limit, one cannot recover this behavior for realistic time scales. I will claim that this leads us to reconsider the role that the rate of convergence plays in the justification of infinite limits and calls for a revision of the so-called Butterfield's principle.

  10. Attitudes justifying domestic violence predict endorsement of corporal punishment and physical and psychological aggression towards children: a study in 25 low- and middle-income countries.

    Lansford, Jennifer E; Deater-Deckard, Kirby; Bornstein, Marc H; Putnick, Diane L; Bradley, Robert H

    2014-05-01

    The Convention on the Rights of the Child has prompted countries to protect children from abuse and exploitation. Exposure to domestic violence and corporal punishment are risk factors in children's development. This study investigated how women's attitudes about domestic violence are related to attitudes about corporal punishment and harsh behaviors toward children, and whether country-wide norms regarding domestic violence and corporal punishment are related to psychological aggression and physical violence toward children. Data were drawn from the Multiple Indicator Cluster Survey, a nationally representative and internationally comparable household survey developed by the United Nations Children's Fund. Measures of domestic violence and discipline were completed by 85 999 female caregivers of children between the ages of 2 and 14 years from families in 25 low- and middle-income countries. Mothers who believed that husbands were justified in hitting their wives were more likely to believe that corporal punishment is necessary to rear children. Mothers who believed that husbands were justified in hitting their wives and that corporal punishment is necessary to rear children were more likely to report that their child had experienced psychological aggression and physical violence. Countrywide norms regarding the acceptability of husbands hitting wives and advisability of corporal punishment moderated the links between mothers' attitudes and their behaviors toward children. Pediatricians can address parents' psychological aggression and physical violence toward children by discussing parents' attitudes and behaviors within a framework that incorporates social norms regarding the acceptability of domestic violence and corporal punishment. Copyright © 2014 Elsevier Inc. All rights reserved.

  11. Development of KOMAC Beam Monitoring System Using EPICS

    Song, Young-Gi; Yun, Sang-Pil; Kim, Han-Sung; Kwon, Hyeok-Jung; Cho, Yong-Sub [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2014-10-15

    The beam loss signals must be digitized and the sampling has to be synchronized to a reference signal which is an external trigger for beam operation. The digitized data must be accessible by the Experimental Physics and Industrial Control System (EPICS)-based control system, which manages the whole accelerator control. In order to satisfy the requirement, an Input /Output Controller (IOC), which runs Linux on a CPU module with PCI express based Analog to Digital Converter (ADC) modules, has been adopted. An associated linux driver and EPICS device support module also have been developed. The IOC meets the requirements and the development and maintenance of the software for the IOC is considerably efficient. The data acquisition system running EPICS will be used in increasing phase of KOrea Multi-purpose Accelerator Complex (KOMAC) beam power. The beam monitoring system integrates BLM and BPM signals into control system and offers real-time data to operators. The IOC, which is implemented with Linux and PCI driver, has supported data acquisition as a very flexible solution.

  12. Development of KOMAC Beam Monitoring System Using EPICS

    Song, Young-Gi; Yun, Sang-Pil; Kim, Han-Sung; Kwon, Hyeok-Jung; Cho, Yong-Sub

    2014-01-01

    The beam loss signals must be digitized and the sampling has to be synchronized to a reference signal which is an external trigger for beam operation. The digitized data must be accessible by the Experimental Physics and Industrial Control System (EPICS)-based control system, which manages the whole accelerator control. In order to satisfy the requirement, an Input /Output Controller (IOC), which runs Linux on a CPU module with PCI express based Analog to Digital Converter (ADC) modules, has been adopted. An associated linux driver and EPICS device support module also have been developed. The IOC meets the requirements and the development and maintenance of the software for the IOC is considerably efficient. The data acquisition system running EPICS will be used in increasing phase of KOrea Multi-purpose Accelerator Complex (KOMAC) beam power. The beam monitoring system integrates BLM and BPM signals into control system and offers real-time data to operators. The IOC, which is implemented with Linux and PCI driver, has supported data acquisition as a very flexible solution

  13. HOW TO JUSTIFY AUTOMATION PROJECTS

    Velásquez C., José

    2014-01-01

    This article deals with an Automation Project development. Important aspects with regard to its financial advantages are shown, with the purpose of knowing about the savings engaging a variety of areas within an enterprise, such as security, quality, marketing and logistics. El artículo trata sobre el desarrollo de un proyecto de automatización, se muestran aspectos importantes para su justificación económica, a fin de conocer los ahorros que pueden darse en distintas áreas de la empresa c...

  14. The Ends Justify the Memes

    Miller, Ian D.; Cupchik, Gerald C.

    2016-01-01

    This talk presents an update on my research into memes.  It begins with an introduction to memes that is suitable for any audience.  It concludes with a detailed description of human research and simulation results that converge with one another.  I also present a short online study on email forwarding chains.

  15. Networking systems design and development

    Chao, Lee

    2009-01-01

    Effectively integrating theory and hands-on practice, Networking Systems Design and Development provides students and IT professionals with the knowledge and skills needed to design, implement, and manage fully functioning network systems using readily available Linux networking tools. Recognizing that most students are beginners in the field of networking, the text provides step-by-step instruction for setting up a virtual lab environment at home. Grounded in real-world applications, this book provides the ideal blend of conceptual instruction and lab work to give students and IT professional

  16. Modeling learning technology systems as business systems

    Avgeriou, Paris; Retalis, Symeon; Papaspyrou, Nikolaos

    2003-01-01

    The design of Learning Technology Systems, and the Software Systems that support them, is largely conducted on an intuitive, ad hoc basis, thus resulting in inefficient systems that defectively support the learning process. There is now justifiable, increasing effort in formalizing the engineering

  17. ARCHANGEL: Galaxy Photometry System

    Schombert, James

    2011-07-01

    ARCHANGEL is a Unix-based package for the surface photometry of galaxies. While oriented for large angular size systems (i.e. many pixels), its tools can be applied to any imaging data of any size. The package core contains routines to perform the following critical galaxy photometry functions: sky determination; frame cleaning; ellipse fitting; profile fitting; and total and isophotal magnitudes. The goal of the package is to provide an automated, assembly-line type of reduction system for galaxy photometry of space-based or ground-based imaging data. The procedures outlined in the documentation are flux independent, thus, these routines can be used for non-optical data as well as typical imaging datasets. ARCHANGEL has been tested on several current OS's (RedHat Linux, Ubuntu Linux, Solaris, Mac OS X). A tarball for installation is available at the download page. The main routines are Python and FORTRAN based, therefore, a current installation of Python and a FORTRAN compiler are required. The ARCHANGEL package also contains Python hooks to the PGPLOT package, an XML processor and network tools which automatically link to data archives (i.e. NED, HST, 2MASS, etc) to download images in a non-interactive manner.

  18. The Development of Automatic Sequences for the RF and Cryogenic Systems at the Spallation Neutron Source

    Gurd, Pamela; Casagrande, Fabio; Mccarthy, Michael; Strong, William; Ganni, Venkatarao

    2005-01-01

    Automatic sequences both ease the task of operating a complex machine and ensure procedural consistency. At the Spallation Neutron Source project (SNS), a set of automatic sequences have been developed to perform the start up and shut down of the high power RF systems. Similarly, sequences have been developed to perform backfill, pump down, automatic valve control and energy management in the cryogenic system. The sequences run on Linux soft input-output controllers (IOCs), which are similar to ordinary EPICS (Experimental Physics and Industrial Control System) IOCs in terms of data sharing with other EPICS processes, but which share a Linux processor with other such processors. Each sequence waits for a command from an operator console and starts the corresponding set of instructions, allowing operators to follow the sequences either from an overview screen or from detail screens. We describe each system and our operational experience with it.

  19. A remote data acquisition and control system for Moessbauer spectroscopy

    Zhou Qingguo; Wang Li; Wang Yanlong; Zhao Hong; Zhou Rongjie

    2004-01-01

    A remote data acquisition and control system for Moessbauer spectroscopy based on an embedded computer with the Mini Real-Time Linux operating system is presented. This system can be accessed by an Internet browser or a Java application program, which is designed especially for this purpose. So controlling this system is simple and the interface is user friendly. The components of this system can easily be obtained. So it could be built in most laboratories. We have succeeded in designing and developing this system, as well as using the system at the Key Laboratory for Magnetism and Magnetic Material of Ministry of Education, Lanzhou University, PR China

  20. There are calls for a national screening programme for prostate cancer: what is the evidence to justify such a national screening programme?

    Green, A; Tait, C; Aboumarzouk, O; Somani, B K; Cohen, N P

    2013-05-01

    Prostate cancer is the commonest cancer in men and a major health issue worldwide. Screening for early disease has been available for many years, but there is still no national screening programme established in the United Kingdom. To assess the latest evidence regarding prostate cancer screening and whether it meets the necessary requirements to be established as a national programme for all men. Electronic databases and library catalogues were searched electronically and manual retrieval was performed. Only primary research results were used for the analysis. In recent years, several important randomised controlled trials have produced varied outcomes. In Europe the largest study thus far concluded that screening reduced prostate cancer mortality by 20%. On the contrary, a large American trial found no reduction in mortality after 7-10 years follow-up. Most studies comment on the adverse effects of screening - principally those of overdiagnosis and subsequent overtreatment. Further information about the natural history of prostate cancer and accuracy of screening is needed before a screening programme can be truly justified. In the interim, doctors and patients should discuss the risks, benefits and sequelae of taking part in voluntary screening for prostate cancer.