967 resultados para Shell do Linux
Resumo:
kuv., 12 x 16 cm
Resumo:
kuv., 14 x 22 cm
Resumo:
kuv., 15 x 23 cm
Resumo:
kuv., 13 x 19 cm
Resumo:
kuv., 12 x 19 cm
Resumo:
1 kartta seitsemällätoista lehdellä :, vär. ;, 20 x 22,5 cm +, 1:1000000
Resumo:
Abstract Pecan nutshell is a residue from food industry that has potential to be used as biopreservative in foods. The objective of this study was to evaluate the antimicrobial activity of pecan nutshell aqueous extract in vitro and its effectiveness to inhibit spoilage microorganisms on lettuce leaves. The results indicate that the aqueous extract presents inhibitory activity against important foodborne pathogenic bacteria such as Listeria monocytogenes, Salmonella Enteritidis, Staphylococcus aureus, Bacillus cereus, Aeromonas hydrophila and Pseudomonas aeruginosa. Antimicrobial activity was not observed against Corynebacterium fimi, Clostridium perfringens, Escherichia coli, and the phytopathogenic fungi tested. When applied onto lettuce leaves, pecan nutshell extract reduced the counts of mesophilic and psychrotrophic bacteria in 2 and 4 log CFU/g, respectively, during storage of leafy for 5 days at refrigeration temperature (5 °C). The extract was not effective to inhibit yeast on lettuce leaves. Thus, the aqueous extract of pecan shell showed great potential to be used as a natural preservative in foods, acting mainly in the inhibition of spoilage and pathogenic bacteria.
Resumo:
Inside cyber security threats by system administrators are some of the main concerns of organizations about the security of systems. Since operating systems are controlled and managed by fully trusted administrators, they can negligently or intentionally break the information security and privacy of users and threaten the system integrity. In this thesis, we propose some solutions for enhancing the security of Linux OS by restricting administrators’ access to superuser’s privileges while they can still manage the system. We designed and implemented an interface for administrators in Linux OS called Linux Admins’ User Interface (LAUI) for managing the system in secure ways. LAUI along with other security programs in Linux like sudo protect confidentiality and integrity of users’ data and provide a more secure system against administrators’ mismanagement. In our model, we limit administrators to perform managing tasks in secure manners and also make administrators accountable for their acts. In this thesis we present some scenarios for compromising users’ data and breaking system integrity by system administrators in Linux OS. Then we evaluate how our solutions and methods can secure the system against these administrators’ mismanagement.
Resumo:
Many, if not all, aspects of our everyday lives are related to computers and control. Microprocessors and wireless communications are involved in our lives. Embedded systems are an attracting field because they combine three key factors, small size, low power consumption and high computing capabilities. The aim of this thesis is to study how Linux communicates with the hardware, to answer the question if it is possible to use an operating system like Debian for embedded systems and finally, to build a Mechatronic real time application. In the thesis a presentation of Linux and the Xenomai real time patch is given, the bootloader and communication with the hardware is analyzed. BeagleBone the evaluation board is presented along with the application project consisted of a robot cart with a driver circuit, a line sensor reading a black line and two Xbee antennas. It makes use of Xenomai threads, the real time kernel. According to the obtained results, Linux is able to operate as a real time operating system. The issue of future research is the area of embedded Linux is also discussed.
Resumo:
Members of the Brock University Rowing Club and their new $3000 shell, named Cete, meaning a group of Badgers. Tony Biernacki is pictured here pouring pond water onto the shell in a mock christening.
Resumo:
The Verulam Formation (Middle Ordovician) at the Lakefield Quarry and Gamebridge Quarry, southern Ontario, is comprised of five main lithofacies. These include shoal deposits consisting of Lithofacies 1, winnowed crinoidal grainstones and, shelf deposits consisting of: Lithofacies 2, wackestones, packstones, grainstones, and rudstones; Lithofacies 3, laminated calcisiltites; Lithofacies 4, nodular wackestones and mudstones; and, Lithofacies 5, laminated mudstones and shales. The distribution of the lithofacies was influenced by variations in storm frequency and intensity during a relative sea level fall. Predominant convex-up attitudes of concavo-convex shells within shell beds suggest syndepositional reworking during storm events. The bimodal orientations of shell axes on the upper surfaces of the shell beds indicates deposition under wave-generated currents. The sedimentary features and shell orientations indicate that the shell beds were deposited during storm events and not by the gradual accumulation of shelly material. Cluster and principal component analysis of relative abundance data of the taxa in the shell beds, interbedded nodular wackestones and mudstones, and laminated mudstones and shales, indicates one biofacies comprised of three main assemblages: a strophomenid (Sowerbyelladominated) assemblage, a transitional mixed strophomenid-atrypid assemblage and an atrypid (Zygospira-dominatQd) assemblage. The occurrence of the strophomenid, the strophomenid-atrypid and atrypid assemblages were controlled by storm-driven allogenic taphonomic feedback.
Resumo:
"L’auteure Lucie Guibault aborde la question des ""logiciels libres"" dans le cadre des droits d’auteurs et des brevets. Ces logiciels sont des programmes informatiques qui sont gratuitement distribués au public, dont la modification et la redistribution sont fortement encouragées, mais dont la vente ou la commercialisation est découragée ou même carrément prohibée. Ces caractéristiques particulières distinguent les logiciels libres des ""programmes propriétés"" traditionnels, qui se basent sur le principe que le créateur d’un programme en possède les droits de propriété et qu’il est le seul autorisé à le modifier ou le vendre, sous réserve de sa capacité à faire cession de ces droits. Les logiciels libres sont fondés sur une idéologie de coopération, qui promeut la propagation des idées et des connaissances et qui favorise ainsi la création de meilleurs logiciels. L’auteure présente les grandes caractéristiques des trois principales licences de logiciels libres, soit la ""General Public License"", la licence ""Berkeley Software Distribution"" et la ""Mozilla Public License"". Elle soutient que ces logiciels libres et les régimes normatifs qui les encadrent sont à l’origine d’un changement de paradigme au sein des régimes européens et hollandais de protection des droits d’auteurs et des brevets. La première partie de l’article analyse les régimes des droits d’auteur des trois licences de logiciels libres. L’auteure souligne que ces régimes ont été établis en se basant sur la prémisse qu’il n’y a pas de distinction significative entre les créateurs et les utilisateurs de logiciels libres. Les régimes normatifs reflètent cette situation en prévoyant un ensemble de droits et d’obligations pour les utilisateurs dans le cadre de l’utilisation, de la reproduction, de la modification et de la redistribution gratuite des logiciels libres. L’auteur explique comment ces régimes normatifs s’intègrent au sein de la législation européenne et hollandaise, entre autre au niveau du droit de propriété, du droit commercial, du droit des communications et du droit des obligations. L’auteur démontre que, de façon générale, ces régimes normatifs législatifs semblent s’être adéquatement adaptés aux nouvelles réalités posées par les règles de droits d’auteurs des logiciels libres. La seconde partie aborde la problématique du droit des brevets, tel que défini par la législation européenne et hollandaise. La plupart des utilisateurs et créateurs de logiciels libres s’opposent aux régimes de brevets traditionnels, qui limitent l’innovation et les possibilités de développement techniques. L’auteur décrit les différents régimes alternatifs de brevets offerts par les trois licences de logiciels libres. De plus, l’auteur présente l’encadrement légal pour ces nouveaux brevets, tel que défini par les législations européennes et hollandaises. Elle soutient que cet encadrement légal est inadéquat et qu’il n’est pas adapté aux besoins des utilisateurs de logiciels libres."
Resumo:
This work envisages the fermentation of prawn shell waste into a more nutritious product with simpler components for application as a feed ingredient in aquaculture. This product would be a rich source of protein along with chitin, minerals, vitamins and N-acetyl glucosamine. A brief description of the various processing (chemical and bioprocess) methods employed for chitin, chitosan and single sell protein preparations from shell waste. It deals with the isolation of micro flora associated with prawn shell degradation. It describes the methods adopted for fermentation of prawn shell degradation and fermentation of prawn shell waste with the selected highly chitinoclastic strains. The comparison of SSF and SmF for each selected strain in terms of enrichment of protein, lipid and carbohydrate in the fermented product was done. Detailed analysis of product quality is discussed. The feed for mulation and feeding experiment explained in detail. Statistical analysis of various biogrowth parameters was done with Duncan’s multiple range test. Very briefly explains 28 days of feeding experiment. A method for the complete utilization of shell waste explains with the help of experiments.