73 resultados para Soft real-time distributed systems

em Deakin Research Online - Australia


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The thesis analyses the issues of implementing real-time software systems in industrial applications. The benefit is the development of the Integrated Mega Project Development Model, to improve the effectiveness of planning and timely delivery of software, the quality of the delivered software and reducing problems associated with integrating software systems.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Using additional store-checkpoinsts (SCPs) and compare-checkpoints (CCPs), we present an adaptive checkpointing for double modular redundancy (DMR) in this paper. The proposed approach can dynamically adjust the checkpoint intervals. We also design methods to calculate the optimal numbers of checkpoints, which can minimize the average execution time of tasks. Further, the adaptive checkpointing is combined with the DVS (dynamic voltage scaling) scheme to achieve energy reduction. Simulation results show that, compared with the previous methods, the proposed approach significantly increases the likelihood of timely task completion and reduces energy consumption in the presence of faults.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The objective of the research for this thesis is to develop techniques in order to build an executable model of a real-time system. This model is to be used early in the development of the system not only to detect errors in the specification of the system but also to validate expectations of the developer as to the operation of the system. A graphical specification of a real-time system called the transformation schema was chosen to be used to build the model. Two executable models of a real-time system are described.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The use of emerging technologies ( such as RFID - Radio Frequency Identification and remote sensing) can be employed to reduce health care costs and also to facilitate the automatic streamlining of infectious disease outbreak detection and monitoring processes in local health departments. It can assist medical practitioners with fast and accurate diagnosis and treatments. In this paper we outline the design and application of a real-time RFID and sensor-base Early Infectious (e.g., cholera) Outbreak Detection and Monitoring (IODM) system for health care.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Adverse drug events are one of the major causes of morbidity in developed countries, yet the drugs involved in these events have been trialled and approved on the basis of randomised controlled trials (RCTs), regarded as the study design that will produce the best evidence.

Though the focus on adverse drug events has been primarily on processes and outcomes associated with the use of these approved drugs, attention needs to be directed to the way in which the RCT study design is structured. The implementation of controls to achieve internal validity in RCTs may be the very controls that reduce external validity, and contribute to the levels of adverse drug events associated with the release of a new drug to the wider patient population.

An examination of these controls, and the effects they can have on patient safety, underscore the importance of knowing about how the clinical trials of a drug are undertaken, rather than relying only on the recorded outcomes.

As the majority of new drugs are likely to be prescribed to older patients who have one or more comorbidities in addition to that targeted by a new drug, and as the RCTs of those drugs typically under-represent the elderly and exclude patients with multiple comorbidities, timely assessment of drug safety signals is essential.

It is unlikely that regulatory jurisdictions will undertake a reassessment of safety issues for drugs that are already approved. Instead, reliance has been placed on adverse drug event reporting systems. Such systems have a very low reporting rate, and most adverse drug events remain unreported, to the eventual cost to patients and healthcare systems.

This makes it essential for near real-time systems that can pick up safety signals as they occur, so that modifications to the product information (or removal of the drug) can be implemented.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper considers the design of reduced-order distributed functional observers for interconnected linear systems with the presence of time delays in the interconnections. Unlike observers which consider only the ideal non-delayed output information transfer, the proposed observer is capable of dealing with delayed output information from geographically separated subsystems. It is shown that by accepting measurement data from other subsystems, the conditions under which an observer exists can be made less conservative. Existence conditions, systematic and a straightforward procedure for the synthesis of the observers are given along with numerical examples illustrating the effectiveness and simplicity of the design algorithm.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Orthotopic or intracardiac injection of human breast cancer cell lines into immunocompromised mice allows study of the molecular basis of breast cancer metastasis. We have established a quantitative real-time PCR approach to analyze metastatic spread of human breast cancer cells inoculated into nude mice via these routes. We employed MDA-MB-231 human breast cancer cells genetically tagged with a bacterial β-galactosidase (Lac-Z) retroviral vector, enabling their detection by TaqMan® real-time PCR. PCR detection was linear, specific, more sensitive than conventional PCR, and could be used to directly quantitate metastatic burden in bone and soft organs. Attesting to the sensitivity and specificity of the PCR detection strategy, as few as several hundred metastatic MDA-MB-231 cells were detectable in 100 μm segments of paraffin-embedded lung tissue, and only in samples adjacent to sections that scored positive by histological detection. Moreover, the measured real-time PCR metastatic burden in the bone environment (mouse hind-limbs, n=48) displayed a high correlation to the degree of osteolytic damage observed by high resolution X-ray analysis (r 2=0.972). Such a direct linear relationship to tumor burden and bone damage substantiates the so-called `vicious cycle' hypothesis in which metastatic tumor cells promote the release of factors from the bone which continue to stimulate the tumor cells. The technique provides a useful tool for molecular and cellular analysis of human breast cancer metastasis to bone and soft organs, can easily be extended to other cell/marker/organ systems, and should also find application in preclinical assessment of anti-metastatic modalities.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

As clouds have been deployed widely in various fields, the reliability and availability of clouds become the major concern of cloud service providers and users. Thereby, fault tolerance in clouds receives a great deal of attention in both industry and academia, especially for real-time applications due to their safety critical nature. Large amounts of researches have been conducted to realize fault tolerance in distributed systems, among which fault-tolerant scheduling plays a significant role. However, few researches on the fault-tolerant scheduling study the virtualization and the elasticity, two key features of clouds, sufficiently. To address this issue, this paper presents a fault-tolerant mechanism which extends the primary-backup model to incorporate the features of clouds. Meanwhile, for the first time, we propose an elastic resource provisioning mechanism in the fault-tolerant context to improve the resource utilization. On the basis of the fault-tolerant mechanism and the elastic resource provisioning mechanism, we design novel fault-tolerant elastic scheduling algorithms for real-time tasks in clouds named FESTAL, aiming at achieving both fault tolerance and high resource utilization in clouds. Extensive experiments injecting with random synthetic workloads as well as the workload from the latest version of the Google cloud tracelogs are conducted by CloudSim to compare FESTAL with three baseline algorithms, i.e., Non-M igration-FESTAL (NMFESTAL), Non-Overlapping-FESTAL (NOFESTAL), and Elastic First Fit (EFF). The experimental results demonstrate that FESTAL is able to effectively enhance the performance of virtualized clouds.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In an environmental context, the use of RFID (radio frequency identification) and load cell sensor technology can be employed for not only bringing down waste management costs, but also to facilitate automating and streamlining waste (e.g., garbage, recycling, and green) identification and weight measurement processes for designing smart waste management systems. In this paper, we outline a RFID and sensor model for designing a system in real-time waste management. An application of the architecture is described in the area of RFID and sensor based automatic waste identity, weight, and stolen bins identification system (WIWSBIS).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Parallel transfer of large amounts of data is attractive as (i) the data can be received in less time and (ii) is more resilient to connection failures. This is often used in e-Science under the field of data sharing. Data from one research project should be easily assessable to others regardless of the size of the data thus parallelism is used to help share the data quickly. However, there are many tasks to be carried out to make it possible: replica discovery and load detection just to name two. A common problem with most solutions is they overlook some tasks such as load detection. PHTTP is an innovate protocol which handles the tasks behind parallel transfer while presenting itself as a normal sequential transfer.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Describes the design and implementation of an operating system kernel specifically designed to support real-time applications. It emphasises portability and aims to support state-of-the-art concepts in real-time programming. Discusses architectural aspects of the ARTOS kernel, and introduces new concepts on the areas of interrupt processing, scheduling, mutual exclusion and inter-task communication. Also explains the programming environment of ARTOS kernal and its task model, defines the real-time task states and system data structures and discusses exception handling mechanisms which are used to detect missed deadlines and take corrective action.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Currently, most human action recognition systems are trained with feature sets that have no missing data. Unfortunately, the use of human pose estimation models to provide more descriptive features also entails an increased sensitivity to occlusions, meaning that incomplete feature information will be unavoidable for realistic scenarios. To address this, our approach is to shift the responsibility for dealing with occluded pose data away from the pose estimator and onto the action classifier. This allows the use of a simple, real-time pose estimation (stick-figure) that does not estimate the positions of limbs it cannot find quickly. The system tracks people via background subtraction and extracts the (possibly incomplete) pose skeleton from their silhouette. Hidden Markov Models modified to handle missing data are then used to successfully classify several human actions using the incomplete pose features.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Previous studies in speculative prefetching focus on building and evaluating access models for the purpose of access prediction. This paper on the other hand investigates the performance of speculative prefetching. When prefetching is performed speculatively, there is bound to be an increase in the network load. Furthermore, the prefetched items must compete for space with existing cache occupants. These two factors-increased load and eviction of potentially useful cache entries-are considered in the analysis. We obtain the following conclusion: to maximise the improvement in access time, prefetch exclusively all items with access probabilities exceeding a certain threshold.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This research has explored methods for developing a large interactive dynamic 3D surface using an array of interconnected pneumatically actuated cylinders. People can control the surface using body movement, sound or pre-programmed sequences. The main contribution is a method for accurately positioning cylinders without the need for position feedback.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper initiates the study of two specific security threats on smart-card-based password authentication in distributed systems. Smart-card-based password authentication is one of the most commonly used security mechanisms to determine the identity of a remote client, who must hold a valid smart card and the corresponding password to carry out a successful authentication with the server. The authentication is usually integrated with a key establishment protocol and yields smart-card-based password-authenticated key agreement. Using two recently proposed protocols as case studies, we demonstrate two new types of adversaries with smart card: 1) adversaries with pre-computed data stored in the smart card, and 2) adversaries with different data (with respect to different time slots) stored in the smart card. These threats, though realistic in distributed systems, have never been studied in the literature. In addition to point out the vulnerabilities, we propose the countermeasures to thwart the security threats and secure the protocols. © 2013 IEEE.