943 resultados para Developers of Java system


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Comments on an article by Kashima et al. (see record 2007-10111-001). In their target article Kashima and colleagues try to show how a connectionist model conceptualization of the self is best suited to capture the self's temporal and socio-culturally contextualized nature. They propose a new model and to support this model, the authors conduct computer simulations of psychological phenomena whose importance for the self has long been clear, even if not formally modeled, such as imitation, and learning of sequence and narrative. As explicated when we advocated connectionist models as a metaphor for self in Mischel and Morf (2003), we fully endorse the utility of such a metaphor, as these models have some of the processing characteristics necessary for capturing key aspects and functions of a dynamic cognitive-affective self-system. As elaborated in that chapter, we see as their principal strength that connectionist models can take account of multiple simultaneous processes without invoking a single central control. All outputs reflect a distributed pattern of activation across a large number of simple processing units, the nature of which depends on (and changes with) the connection weights between the links and the satisfaction of mutual constraints across these links (Rummelhart & McClelland, 1986). This allows a simple account for why certain input features will at times predominate, while others take over on other occasions. (PsycINFO Database Record (c) 2008 APA, all rights reserved)

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Neuromorphic computing has become an emerging field in wide range of applications. Its challenge lies in developing a brain-inspired architecture that can emulate human brain and can work for real time applications. In this report a flexible neural architecture is presented which consists of 128 X 128 SRAM crossbar memory and 128 spiking neurons. For Neuron, digital integrate and fire model is used. All components are designed in 45nm technology node. The core can be configured for certain Neuron parameters, Axon types and synapses states and are fully digitally implemented. Learning for this architecture is done offline. To train this circuit a well-known algorithm Restricted Boltzmann Machine (RBM) is used and linear classifiers are trained at the output of RBM. Finally, circuit was tested for handwritten digit recognition application. Future prospects for this architecture are also discussed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

File system security is fundamental to the security of UNIX and Linux systems since in these systems almost everything is in the form of a file. To protect the system files and other sensitive user files from unauthorized accesses, certain security schemes are chosen and used by different organizations in their computer systems. A file system security model provides a formal description of a protection system. Each security model is associated with specified security policies which focus on one or more of the security principles: confidentiality, integrity and availability. The security policy is not only about “who” can access an object, but also about “how” a subject can access an object. To enforce the security policies, each access request is checked against the specified policies to decide whether it is allowed or rejected. The current protection schemes in UNIX/Linux systems focus on the access control. Besides the basic access control scheme of the system itself, which includes permission bits, setuid and seteuid mechanism and the root, there are other protection models, such as Capabilities, Domain Type Enforcement (DTE) and Role-Based Access Control (RBAC), supported and used in certain organizations. These models protect the confidentiality of the data directly. The integrity of the data is protected indirectly by only allowing trusted users to operate on the objects. The access control decisions of these models depend on either the identity of the user or the attributes of the process the user can execute, and the attributes of the objects. Adoption of these sophisticated models has been slow; this is likely due to the enormous complexity of specifying controls over a large file system and the need for system administrators to learn a new paradigm for file protection. We propose a new security model: file system firewall. It is an adoption of the familiar network firewall protection model, used to control the data that flows between networked computers, toward file system protection. This model can support decisions of access control based on any system generated attributes about the access requests, e.g., time of day. The access control decisions are not on one entity, such as the account in traditional discretionary access control or the domain name in DTE. In file system firewall, the access decisions are made upon situations on multiple entities. A situation is programmable with predicates on the attributes of subject, object and the system. File system firewall specifies the appropriate actions on these situations. We implemented the prototype of file system firewall on SUSE Linux. Preliminary results of performance tests on the prototype indicate that the runtime overhead is acceptable. We compared file system firewall with TE in SELinux to show that firewall model can accommodate many other access control models. Finally, we show the ease of use of firewall model. When firewall system is restricted to specified part of the system, all the other resources are not affected. This enables a relatively smooth adoption. This fact and that it is a familiar model to system administrators will facilitate adoption and correct use. The user study we conducted on traditional UNIX access control, SELinux and file system firewall confirmed that. The beginner users found it easier to use and faster to learn then traditional UNIX access control scheme and SELinux.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This investigation was started in an effort to find an accurate and efficient method of determining the freezing points of ferrous and cuprous sulphides, mixtures of the two substances, and from this to establish the liquidus line of the equilibrium dia­gram.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Real-time battery impedance spectrum is acquired using a one-time record. Fast Summation Transformation (FST) is a parallel method of acquiring a real-time battery impedance spectrum using a one-time record that enables battery diagnostics. An excitation current to a battery is a sum of equal amplitude sine waves of frequencies that are octave harmonics spread over a range of interest. A sample frequency is also octave and harmonically related to all frequencies in the sum. The time profile of this signal has a duration that is a few periods of the lowest frequency. The voltage response of the battery, average deleted, is the impedance of the battery in the time domain. Since the excitation frequencies are known and octave and harmonically related, a simple algorithm, FST, processes the time record by rectifying relative to the sine and cosine of each frequency. Another algorithm yields real and imaginary components for each frequency.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Methods of rapidly measuring an impedance spectrum of an energy storage device in-situ over a limited number of logarithmically distributed frequencies are described. An energy storage device is excited with a known input signal, and aresponse is measured to ascertain the impedance spectrum. An excitation signal is a limited time duration sum-of-sines consisting of a select number offrequencies. In one embodiment, magnitude and phase of each frequency ofinterest within the sum-of-sines is identified when the selected frequencies and sample rate are logarithmic integer steps greater than two. This technique requires a measurement with a duration of one period of the lowest frequency. In another embodiment, where selected frequencies are distributed in octave steps, the impedance spectrum can be determined using a captured time record that is reduced to a half-period of the lowest frequency.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Real time battery impedance spectrum is acquired using one time record, Compensated Synchronous Detection (CSD). This parallel method enables battery diagnostics. The excitation current to a test battery is a sum of equal amplitude sin waves of a few frequencies spread over range of interest. The time profile of this signal has duration that is a few periods of the lowest frequency. The voltage response of the battery, average deleted, is the impedance of the battery in the time domain. Since the excitation frequencies are known, synchronous detection processes the time record and each component, both magnitude and phase, is obtained. For compensation, the components, except the one of interest, are reassembled in the time domain. The resulting signal is subtracted from the original signal and the component of interest is synchronously detected. This process is repeated for each component.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

BDE-47 is one of the most widely found congeners of PBDEs in marine environments. The potential immunomodulatory effects of BDE-47 on fish complement system were studied using the marine medaka Oryzias melastigma as a model fish. Three-month-old O. melastigma were subjected to short-term (5 days) and long-term (21 days) exposure to two concentrations of BDE-47 (low dose at 290 +/- 172 ng/day; high dose at 580 +/- 344 ng/day) via dietary uptake of BDE-47 encapsulated in Artemia nauplii. Body burdens of BDE-47 and other metabolic products were analyzed in the exposed and control fish. Only a small amount of debrominated product, BDE-28, was detected, while other metabolic products were all under detection limit. Transcriptional expression of six major complement system genes involved in complement activation: C1r/s (classical pathway), MBL-2 (lectin pathway), CFP (alternative pathway), F2 (coagulation pathway), C3 (the central component of complement system), and C9 (cell lysis) were quantified in the liver of marine medaka. Endogenous expression of all six complement system genes was found to be higher in males than in females (p < 0.05). Upon dietary exposure of marine medaka to BDE-47, expression of all six complement genes were downregulated in males at day 5 (or longer), whereas in females, MBl-2, CFP, and F2 mRNAs expression were upregulated, but C3 and C9 remained stable with exposure time and dose. A significant negative relationship was found between BDE-47 body burden and mRNA expression of C1r/s, CFP, and C3 in male fish (r = -0.8576 to -0.9447). The above findings on changes in complement gene expression patterns indicate the complement system may be compromised in male O. melastigma upon dietary exposure to BDE-47. Distinct gender difference in expression of six major complement system genes was evident in marine medaka under resting condition and dietary BDE-47 challenge. The immunomodulatory effects of BDE-47 on transcriptional expression of these complement components in marine medaka were likely induced by the parent compound instead of biotransformed products. Our results clearly demonstrate that future direction for fish immunotoxicology and risk assessment of immunosuppressive chemicals must include parallel evaluation for both genders.