950 resultados para Computational grids (Computer systems)


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The motivation for this research initiated from the abrupt rise and fall of minicomputers which were initially used both for industrial automation and business applications due to their significantly lower cost than their predecessors, the mainframes. Later industrial automation developed its own vertically integrated hardware and software to address the application needs of uninterrupted operations, real-time control and resilience to harsh environmental conditions. This has led to the creation of an independent industry, namely industrial automation used in PLC, DCS, SCADA and robot control systems. This industry employs today over 200'000 people in a profitable slow clockspeed context in contrast to the two mainstream computing industries of information technology (IT) focused on business applications and telecommunications focused on communications networks and hand-held devices. Already in 1990s it was foreseen that IT and communication would merge into one Information and communication industry (ICT). The fundamental question of the thesis is: Could industrial automation leverage a common technology platform with the newly formed ICT industry? Computer systems dominated by complex instruction set computers (CISC) were challenged during 1990s with higher performance reduced instruction set computers (RISC). RISC started to evolve parallel to the constant advancement of Moore's law. These developments created the high performance and low energy consumption System-on-Chip architecture (SoC). Unlike to the CISC processors RISC processor architecture is a separate industry from the RISC chip manufacturing industry. It also has several hardware independent software platforms consisting of integrated operating system, development environment, user interface and application market which enables customers to have more choices due to hardware independent real time capable software applications. An architecture disruption merged and the smartphone and tablet market were formed with new rules and new key players in the ICT industry. Today there are more RISC computer systems running Linux (or other Unix variants) than any other computer system. The astonishing rise of SoC based technologies and related software platforms in smartphones created in unit terms the largest installed base ever seen in the history of computers and is now being further extended by tablets. An underlying additional element of this transition is the increasing role of open source technologies both in software and hardware. This has driven the microprocessor based personal computer industry with few dominating closed operating system platforms into a steep decline. A significant factor in this process has been the separation of processor architecture and processor chip production and operating systems and application development platforms merger into integrated software platforms with proprietary application markets. Furthermore the pay-by-click marketing has changed the way applications development is compensated: Three essays on major trends in a slow clockspeed industry: The case of industrial automation 2014 freeware, ad based or licensed - all at a lower price and used by a wider customer base than ever before. Moreover, the concept of software maintenance contract is very remote in the app world. However, as a slow clockspeed industry, industrial automation has remained intact during the disruptions based on SoC and related software platforms in the ICT industries. Industrial automation incumbents continue to supply systems based on vertically integrated systems consisting of proprietary software and proprietary mainly microprocessor based hardware. They enjoy admirable profitability levels on a very narrow customer base due to strong technology-enabled customer lock-in and customers' high risk leverage as their production is dependent on fault-free operation of the industrial automation systems. When will this balance of power be disrupted? The thesis suggests how industrial automation could join the mainstream ICT industry and create an information, communication and automation (ICAT) industry. Lately the Internet of Things (loT) and weightless networks, a new standard leveraging frequency channels earlier occupied by TV broadcasting, have gradually started to change the rigid world of Machine to Machine (M2M) interaction. It is foreseeable that enough momentum will be created that the industrial automation market will in due course face an architecture disruption empowered by these new trends. This thesis examines the current state of industrial automation subject to the competition between the incumbents firstly through a research on cost competitiveness efforts in captive outsourcing of engineering, research and development and secondly researching process re- engineering in the case of complex system global software support. Thirdly we investigate the industry actors', namely customers, incumbents and newcomers, views on the future direction of industrial automation and conclude with our assessments of the possible routes industrial automation could advance taking into account the looming rise of the Internet of Things (loT) and weightless networks. Industrial automation is an industry dominated by a handful of global players each of them focusing on maintaining their own proprietary solutions. The rise of de facto standards like IBM PC, Unix and Linux and SoC leveraged by IBM, Compaq, Dell, HP, ARM, Apple, Google, Samsung and others have created new markets of personal computers, smartphone and tablets and will eventually also impact industrial automation through game changing commoditization and related control point and business model changes. This trend will inevitably continue, but the transition to a commoditized industrial automation will not happen in the near future.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

El objetivo principal del presente proyecto es plasmar una clasificación de los diferentes tipos de proyectos informáticos existentes hoy en día. Presentamos una clasificación basada en algunos criterios diferenciadores para finalmente seleccionar una tipología de proyectos informáticos fuertemente diferenciados entre sí. Posteriormente analizaremos de forma exhaustiva las diferentes etapas y fases de las que se componen, con el fin de conocer las diferentes técnicas de trabajo para la correcta consecución de cada uno de los tipos indicados.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This report describes results from a study evaluating the use of stringless paving using a combination of global positioning and laser technologies. CMI and Geologic Computer Systems developed this technology and successfully implemented it on construction earthmoving and grading projects. Concrete paving is a new area for considering this technology. Fred Carlson Co. agreed to test the stringless paving technology on two challenging concrete paving projects located in Washington County, Iowa. The evaluation was conducted on two paving projects in Washington County, Iowa, during the summer of 2003. The research team from Iowa State University monitored the guidance and elevation conformance to the original design. They employed a combination of physical depth checks, surface location and elevation surveys, concrete yield checks, and physical survey of the control stakes and string line elevations. A final check on profile of the pavement surface was accomplished by the use of the Iowa Department of Transportation Light Weight Surface Analyzer (LISA). Due to the speed of paving and the rapid changes in terrain, the laser technology was abandoned for this project. Total control of the guidance and elevation controls on the slip-form paver were moved from string line to global positioning systems (GPS). The evaluation was a success, and the results indicate that GPS control is feasible and approaching the desired goals of guidance and profile control with the use of three dimensional design models. Further enhancements are needed in the physical features of the slipform paver oil system controls and in the computer program for controlling elevation.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The M-Coffee server is a web server that makes it possible to compute multiple sequence alignments (MSAs) by running several MSA methods and combining their output into one single model. This allows the user to simultaneously run all his methods of choice without having to arbitrarily choose one of them. The MSA is delivered along with a local estimation of its consistency with the individual MSAs it was derived from. The computation of the consensus multiple alignment is carried out using a special mode of the T-Coffee package [Notredame, Higgins and Heringa (T-Coffee: a novel method for fast and accurate multiple sequence alignment. J. Mol. Biol. 2000; 302: 205-217); Wallace, O'Sullivan, Higgins and Notredame (M-Coffee: combining multiple sequence alignment methods with T-Coffee. Nucleic Acids Res. 2006; 34: 1692-1699)] Given a set of sequences (DNA or proteins) in FASTA format, M-Coffee delivers a multiple alignment in the most common formats. M-Coffee is a freeware open source package distributed under a GPL license and it is available either as a standalone package or as a web service from www.tcoffee.org.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Trabajo de final de carrera incluido en el área de sistemas empotrados sobre una boya oceanográfica costera.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The reason for this study is to propose a new quantitative approach on how to assess the quality of Open Access University Institutional Repositories. The results of this new approach are tested in the Spanish University Repositories. The assessment method is based in a binary codification of a proposal of features that objectively describes the repositories. The purposes of this method are assessing the quality and an almost automatically system for updating the data of the characteristics. First of all a database was created with the 38 Spanish institutional repositories. The variables of analysis are presented and explained either if they are coming from bibliography or are a set of new variables. Among the characteristics analyzed are the features of the software, the services of the repository, the features of the information system, the Internet visibility and the licenses of use. Results from Spanish universities ARE provided as a practical example of the assessment and for having a picture of the state of the development of the open access movement in Spain.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Työssä kehitettin läpinäkyvä Internet Small Computer Systems Interface-verkkolevyä (iSCSI) käyttävä varmistusjärjestelmä. Verkkolevyn sisältö suojattiin asiakaspään salauskerroksella (dm-crypt). Järjestely mahdollisti sen, että verkkolevylle tallennetut varmuuskopiot pysyivät luottamuksellisina, vaikka levypalvelinta tarjoava taho oli joko epäluotettava tai suorastaan vihamielinen. Järjestelmän hyötykäyttöä varten kehitettiin helppokäyttöinen prototyyppisovellus. Järjestelmän riskit ja haavoittuvuudet käytiin läpi ja analysoitiin. Järjestelmälle tehtiin myös karkea kryptoanalyysi sen teknistenominaisuuksien pohjalta. Suorituskykymittaukset tehtiin sekä salatulle että salaamattomalle iSCSI-liikenteelle. Näistä todettiin, että salauksen vaikutus suorituskykyyn oli häviävän pieni jopa 100 megabittiä sekunnissa siirtävillä verkkonopeuksilla. Lisäksi pohdittiin teknologian muita sovelluskohteita ja tulevia tutkimusalueita.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In the cerebral cortex, the activity levels of neuronal populations are continuously fluctuating. When neuronal activity, as measured using functional MRI (fMRI), is temporally coherent across 2 populations, those populations are said to be functionally connected. Functional connectivity has previously been shown to correlate with structural (anatomical) connectivity patterns at an aggregate level. In the present study we investigate, with the aid of computational modeling, whether systems-level properties of functional networks-including their spatial statistics and their persistence across time-can be accounted for by properties of the underlying anatomical network. We measured resting state functional connectivity (using fMRI) and structural connectivity (using diffusion spectrum imaging tractography) in the same individuals at high resolution. Structural connectivity then provided the couplings for a model of macroscopic cortical dynamics. In both model and data, we observed (i) that strong functional connections commonly exist between regions with no direct structural connection, rendering the inference of structural connectivity from functional connectivity impractical; (ii) that indirect connections and interregional distance accounted for some of the variance in functional connectivity that was unexplained by direct structural connectivity; and (iii) that resting-state functional connectivity exhibits variability within and across both scanning sessions and model runs. These empirical and modeling results demonstrate that although resting state functional connectivity is variable and is frequently present between regions without direct structural linkage, its strength, persistence, and spatial statistics are nevertheless constrained by the large-scale anatomical structure of the human cerebral cortex.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Desarrollo de un sistema robótico auxiliar de limpieza autónomo en movimiento, conectado a una red wireless, dotado de un sistema de protección contra la perdida de conexión.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Sistema embebido capaz de almacenar y posteriormente reconocer patrones de movimiento realizados con él y avisar de la detección de un patrón reconocido a otro sistema mediante una conexión TCP/IP vía Wi-Fi.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Este trabajo evalúa la usabilidad de la web de Renfe, comparándola con sitios de características similares, particularmente en Francia y Alemania. Para este análisis se efectúa un test de usuario con personas enmarcadas dentro de las características de los usuarios potenciales.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Diplomityön tavoitteena on tutkia kunnossapitoyhtiöiden materiaalilogistiikan nykytilaa ja organisoitumista. Lisäksi työssä selvitetään materiaalilogistiikan merkittävimmät kehityskohteet ja ehdotetaan uutta organisoitumisratkaisua kunnossapitoyhtiön materiaalilogistiikkatoiminnoille. Työn teoriaosa käsittelee kunnossapidon ulkoistamista ja kunnossapidon materiaalilogistiikkaa. Soveltavassa osassa kuvataan materiaalilogistiikasta aiheutuvaa työkuormaa ja materiaalilogistiikan organisoitumista. Työssä käsitellään myös toimintatapoja ja tietojärjestelmien hyväksikäyttöä materiaalilogistiikkatoiminnoissa. Analysointi on toteutettu vierailemalla kunnossapitokohteissa ja mittaamalla materiaalilogistiikasta aiheutuvaa työkuormaa. Materiaalilogistiikka ei ole tehostunut, vaikka kunnossapitovastuu on siirtynyt kunnossapitoyhtiölle. Kunnossapitokohteiden materiaalilogistiikkatoiminnot perustuvat edelleen perinteisiin toimintatapoihin ja organisoitumiseen. Materiaalilogistiikkatoimintojen vastuita ei ole määritelty selkeästi. Materiaalilogistiikasta aiheutuva työkuorma on lähes 15 prosenttia kokonaistyöajasta kunnossapitokohteessa. Materiaalilogistiikkatoiminnoissa on tehtävä muutoksia lähitulevaisuudessa. Kunnossapitokohteissa on muutettava henkilöstön toimintatapoja ja materiaalilogistiikan organisoitumista.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Käyttäjien tunnistaminen tietojärjestelmissä on ollut yksi tietoturvan kulmakivistä vuosikymmenten ajan. Ajatus käyttäjätunnuksesta ja salasanasta on kaikkein kustannustehokkain ja käytetyin tapa säilyttää luottamus tietojärjestelmän ja käyttäjien välillä. Tietojärjestelmien käyttöönoton alkuaikoina, jolloin yrityksissä oli vain muutamia tietojärjestelmiä ja niitä käyttivät vain pieni ryhmä käyttäjiä, tämä toimintamalli osoittautui toimivaksi. Vuosien mittaan järjestelmien määrä kasvoi ja sen mukana kasvoi salasanojen määrä ja monimuotoisuus. Kukaan ei osannut ennustaa, kuinka paljon salasanoihin liittyviä ongelmia käyttäjät kohtaisivat ja kuinka paljon ne tulisivat ruuhkauttamaan yritysten käyttäjätukea ja minkälaisia tietoturvariskejä salasanat tulisivat aiheuttamaan suurissa yrityksissä. Tässä diplomityössä tarkastelemme salasanojen aiheuttamia ongelmia suuressa, globaalissa yrityksessä. Ongelmia tarkastellaan neljästä eri näkökulmasta; ihmiset, teknologia, tietoturva ja liiketoiminta. Ongelmat osoitetaan esittelemällä tulokset yrityksen työntekijöille tehdystä kyselystä, joka toteutettiin osana tätä diplomityötä. Ratkaisu näihin ongelmiin esitellään keskitetyn salasanojenhallintajärjestelmän muodossa. Järjestelmän eri ominaisuuksia arvioidaan ja kokeilu -tyyppinen toteutus rakennetaan osoittamaan tällaisen järjestelmän toiminnallisuus.