66 resultados para Alarm message

em Consorci de Serveis Universitaris de Catalunya (CSUC), Spain


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Fault tolerance has become a major issue for computer and software engineers because the occurrence of faults increases the cost of using a parallel computer. RADIC is the fault tolerance architecture for message passing systems which is transparent, decentralized, flexible and scalable. This master thesis presents the methodology used to implement the RADIC architecture over Open MPI, a well-know large-used message passing library. This implementation kept the RADIC architecture characteristics. In order to validate the implementation we have executed a synthetic ping program, besides, to evaluate the implementation performance we have used the NAS Parallel Benchmarks. The results prove that the RADIC architecture performance depends on the communication pattern of the parallel application which is running. Furthermore, our implementation proves that the RADIC architecture could be implemented over an existent message passing library.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

El proyecto Internal Message consiste en el desarrollo de un sistema de mensajería interna que comunique de forma fiable y segura a los usuarios de cualquier sistema de gestión de contenidos Joomla.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Removal of introns during pre-mRNA splicing is a critical process in gene expression, and understanding its control at both single-gene and genomic levels is one of the great challenges in Biology. Splicing takes place in a dynamic, large ribonucleoprotein complex known as the spliceosome. Combining Genetics and Biochemistry, Saccharomyces cerevisiae provides insights into its mechanisms, including its regulation by RNA-protein interactions. Recent genome-wide analyses indicate that regulated splicing is broad and biologically relevant even in organisms with a relatively simple intronic structure, such as yeast. Furthermore, the possibility of coordination in splicing regulation at genomic level is becoming clear in this model organism. This should provide a valuable system to approach the complex problem of the role of regulated splicing in genomic expression.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Avui en dia s’ha convertit en una necessitat tenir cura del medi ambient i optimitzar els recursos naturals. En el camp per estalviar energia s’han fet grans progressos i disposem d’un gran ventall de dispositius que ens ajuden i ens faciliten l’optimització del consum d’energia. Però és una realitat que en l’estalvi del consum d’aigua el progrés ha estat molt menor i es limita molt a donar consells i repartir dosificadors d’aigua. Qui no ha vist carrers o jardins o cases inundades amb milers de litres d’aigua? Aquesta realitat m’ha portat a dissenyar i desenvolupar un prototip que em permeti tenir un millor control del consum d’aigua. El prototip, a trets principals, consta d’un sensor, una electrovàlvula i una placa Arduino Atmega. El sensor ens permet mesurar els litres consumits durant un cert període de temps. Passat aquest temps de mostreig es compara els litres consumits amb el consum habitual, en aquell període de temps. En cas de sobrepassar el volum programat es tancarà l’electrovàlvula de forma automàtica i rebrem un SMS al telèfon. L’activació de l’alarma es pot ajustar que sigui al igualar-se els dos valors, litres programats i litres consumits. També es pot programar el percentatge que cal sobrepassar de litres consumits per activar l’alarma, com el temps de mostreig. El fet de poder programar tots aquests valors ens permet fer un ajust ideal per a la instal·lació que es vol tenir controlada. A més, el prototip es pot utilitzar per enviar a la companyia d’aigua el valor del comptador de forma automàtica. D’aquesta forma la companyia d’aigua també optimitza recursos estalviant-se el desplaçament de personal a la instal·lació per fer la lectura corresponent. El prototip està basat amb un Arduino Atmega que ens permet el processament de les dades programades i capturades pel sensor. També s’ha incorporat una pantalla TFT Touch 2’8”, que permet visualitzar i programar els valors d’una forma molt més intuïtiva. Per enviar els SMS s’utilitza una placa d’Arduino Cel·lular Shield - SM5100B, a la qual només cal afegir una targeta SIM. A priori, el prototip té un elevat cost al fabricar una sola unitat i pot semblar poc útil. Però ens pot estalviar alguna sorpresa en les factures d’aigua si tenim una fuita i no ens n’adonem fins a veure el rebut de la companyia. Si es fabriqués a grans quantitats es podria abaratir el preu i fer-lo encara més engrescador.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

JXTA is a mature set of open protocols, with morethan 10 years of history, that enable the creation and deployment of peer-to-peer (P2P) networks, allowing the execution of services in a distributed manner. Throughout its lifecycle, ithas slowly evolved in order to appeal a broad set of different applications. Part of this evolution includes providing basic security capabilities in its protocols in order to achieve some degree of message privacy and authentication. However, undersome contexts, more advanced security requirements should be met, such as anonymity. There are several methods to attain anonymity in generic P2P networks. In this paper, we proposehow to adapt a replicated message-based approach to JXTA, by taking advantage of its idiosyncracies and capabilities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

JXTA is an open peer-to-peer (P2P) protocols specification that, in its about 10 years of history, has slowly evolved to appeal to a broad set of applications. As part of this process,some long awaited security improvements have been included in the latest versions. However, under some contexts, even more advanced security requirements should be met, such as anonymity. Several approaches exist to deploy anonymity in P2P networks, but no perfect solution exists. Even though path-based approaches are quite popular, it is considered that, in dynamicgroups, using a split message-based one is better. In this work, we propose an anonymity service for JXTA using such approach. The proposal takes advantage JXTA's core services, in a manner so that it can be easily integrated to existing end applications and services.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Information sharing in oligopoly has been analyzed by assuming that firms behave as a sole economic agent. In this paper I assume that ownership and management are separated. Managers are allowed to falsely report their costs to owners and rivals. Under such circumstances, if owners want to achieve information sharing they must use managerial contracts that implement truthful cost reporting by managers as a dominant strategy. I show that, contrary to the classical result, without the inclusion of message-dependent payments in managerial contracts there will be no information sharing. On the other hand, with the inclusion of such publicly observable payments and credible ex-ante commitment by owners not to modify these payments, there will be perfect information sharing without the need for third parties. Keywords: Information sharing, Delegation, Managerial contracts. JEL classification numbers: D21, D82, L13, L21

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We use a two-person 3-stage game to investigate whether people choose to punish or reward another player by sacrificing money to increase or decrease the other person’s payoff. One player sends a message indicating an intended play, which is either favorable or unfavorable to the other player in the game. After the message, the sender and the receiver play a simultaneous 2x2 game. A deceptive message may be made, in an effort to induce the receiver to make a play favorable to the sender. Our focus is on whether receivers’ rates of monetary sacrifice depend on the process and the perceived sender’s intention, as is suggested by the literature on deception and procedural satisfaction. Models such as Rabin (1993), Sen (1997), and Charness and Rabin (1999) also permit rates of sacrifice to be sensitive to the sender’s perceived intention, while outcome-based models such as Fehr and Schmidt (1999) and Bolton and Ockenfels (1997) predict otherwise. We find that deception substantially increases the punishment rate as a response to an action that is unfavorable to the receiver. We also find that a small but significant percentage of subjects choose to reward a favorable action choice made by the sender.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper investigates the role of variable capacity utilization as a source of asymmetries in the relationship between monetary policy and economic activity within a dynamic stochastic general equilibrium framework. The source of the asymmetry is directly linked to the bottlenecks and stock-outs that emerge from the existence of capacity constraints in the real side of the economy. Money has real effects due to the presence of rigidities in households' portfolio decisions in the form of a Luces-Fuerst 'limited participation' constraint. The model features variable capacity utilization rates across firms due to demand uncertainty. A monopolistic competitive structure provides additional effects through optimal mark-up changes. The overall message of this paper for monetary policy is that the same actions may have different effects depending on the capacity utilization rate of the economy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Regular stair climbing has well-documented health dividends, such as increased fitness and strength, weight loss and reduced body fat, improved lipid profiles and reduced risk of osteoporosis. The general absence of barriers to participation makes stair climbing an ideal physical activity (PA) for health promotion. Studies in the US and the UK have consistently shown that interventions to increase the accumulation of lifestyle PA by climbing stairs rather than using the escalators are effective. However, there are no previous in Catalonia. This project tested one message for their ability to prompt travelers on the Montjuïc site to choose the stairs rather than the escalator when climbing up the Monjuïc hill. One standard message, " Take the stairs! 7 minutes of stair climbing a day protects your heart" provided a comparison with previous research done in the UK. Translated into Catalan and Spanish, it was presented on a poster positioned at the point of choice between the stairs and the escalator. The study used a quasi-experimental, interrupted time series design. Travelers, during several and specific hours on two days of the week, were coded for stair or escalator use, gender, age, ethnic status, presence of accompanying children or bags by one observer. Overall, the intervention resulted in a 81% increase in stair climbing. In the follow-up period without messages, stair climbing dropped out to baseline levels. This preliminary study showed a significant effect on stair use. However, caution is needed since results are based on a small sample and, only a low percentage of the sample took the stairs at baseline or the intervention phase . Future research on stair use in Catalonia should focus on using bigger samples, different sites (metro stations, airports, shopping centers, etc) , different messages and techniques to promote stair climbing.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The demand for computational power has been leading the improvement of the High Performance Computing (HPC) area, generally represented by the use of distributed systems like clusters of computers running parallel applications. In this area, fault tolerance plays an important role in order to provide high availability isolating the application from the faults effects. Performance and availability form an undissociable binomial for some kind of applications. Therefore, the fault tolerant solutions must take into consideration these two constraints when it has been designed. In this dissertation, we present a few side-effects that some fault tolerant solutions may presents when recovering a failed process. These effects may causes degradation of the system, affecting mainly the overall performance and availability. We introduce RADIC-II, a fault tolerant architecture for message passing based on RADIC (Redundant Array of Distributed Independent Fault Tolerance Controllers) architecture. RADIC-II keeps as maximum as possible the RADIC features of transparency, decentralization, flexibility and scalability, incorporating a flexible dynamic redundancy feature, allowing to mitigate or to avoid some recovery side-effects.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Las redes de interconexión juegan un papel importante en el rendimiento de los sistemas de altas prestaciones. Actualmente la gestión del encaminamiento de los mensajes es un factor determinante para mantener las prestaciones de la red. Nuestra propuesta es trabajar sobre un algoritmo de encaminamiento adaptativo, que distribuye el encaminamiento de los mensajes para evitar los problemas de congestión en las redes de interconexión, que aparecen por el gran volumen de comunicaciones de aplicaciones científicas ó comerciales. El objetivo es ajustar el algoritmo a una topología muy utilizada en los sistemas actuales como lo es el fat‐tree, e implementarlo en una tecnología Infiniband. En la experimentación realizada comparamos el método de control de congestión de la arquitectura Infiniband, con nuestro algoritmo. Los resultados obtenidos muestran que mejoramos los niveles de latencia por encima de un 50% y de throughput entre un 38% y un 81%.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Con la deforestación, los incendios y la utilización indebida de los agrotóxicos, las abejas nativas de Brasil corren un serio peligro de extinción. Ello se debe a que estas abejas construyen sus nidos en los huecos de los troncos de los árboles y también a que sus fuentes de alimentación son cada vez más escasas. Por ello cada vez son más los que se dedican a la meliponicultura, de esta manera se conservan las abejas y además, se obtiene una renta extra. Mediante el presente proyecto se capacitó en meliponicultura a una muestra de la población de Poço Redondo, para que de esta manera se empiece a recuperar su entorno y también su situación económica actual. Para poder conseguirlo se llevó a cabo el diseño del curso mediante la documentación previa, el trabajo de campo y el análisis de los datos. El resultado fue la capacitación, con la que se formó y concienció ambientalmente a personas para que se dedicaran a la meliponicultura de manera profesional.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Using theory and empirical data from social psychology to measure for cultural differences between countries, we study the effect of individualism as defined by Hofstede (1980) and egalitarianism as defined by Schwartz (1994, 1999, 2004) on earnings management. We find a significant influence of both cultural measures. In line with Licht et al. (2004), who argue that individualistic societies may be less susceptible to corruption, we find that countries scoring high on individualism tend to have lower levels of earnings management. In addition, we find that egalitarianism, defined as a society's cultural orientation with respect to intolerance for abuses of market and political power, is negatively related with earnings management. Our results are robust to different specifications and controls. The main message of this paper is that besides formal institutions, cultural differences are relevant to explain earnings management behaviour. We think that our work adds to the understanding of the importance of cultural values in managerial behaviour across countries contributing to the literature on earnings management and law and institutions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

En este proyecto se implementan tres algoritmos esteganográficos diferentes usando JPEG2000 como portador del mensaje, se calcula el rendimiento de cada uno de ellos y se comparan usando una gráfica. El objetivo es visualizar para unos casos específicos que el algoritmo basado en el producto de dos códigos lineales perfectos tiene mejor rendimiento que el obtenido con algoritmos como el F5 y el LSB.