922 resultados para Kernel Linux TED Wi-Fi VoIP
Resumo:
对现有HDFS的设计架构进行分析,并借与LinuxFS架构的对比凸显HDFS的分布式特性。通过分析得出:现有的HDFS架构使用Java的Map界面,不利于任务的分解和并行处理,因此HDFS仅在数据的存储上实现分布式,数据处理依然是集中式的,这就形成了对NameNode的依赖,随着集群的扩大,NameNode的性能成为系统瓶颈,并提出了解决方向。
Resumo:
门禁系统主要负责对出入通道进行管制,是社区楼宇安全监控系统的一部分。传统的门禁系统通常采用密码识别、卡片识别的方式进行验证,由于密码、卡片容易被盗用、丢失,系统安全性不高。在通信方式上传统门禁系统通常采用RS485或者RS232连接,传输距离、速度和连接终端数均受限制。本文提出的人像识别门禁系统解决方案采用ARM-Linux系统平台,依靠社区宽带综合业务网的传输和存储能力,结合密码、RFID和人像识别三种识别方式,利用网络技术和生物识别技术达到识别率高、响应速度快、扩展能力强的要求,并能够与驻地网的其它业务集成,提供业务级的联动服务。此外,该门禁系统还支持用户使用电话开门,由服务器完成对用户来电的识别和防伪验证。本文工作的主要贡献是:参与了ARM-Linux系统的裁剪、移植和声卡驱动的修改;建立了ARM-Linux交叉编译环境;完成了门禁前端软件系统的整体设计和实现;完成了服务器软件电话呼叫响应子系统的设计。
Resumo:
FI催化剂系一近几年发展起来的烯烃聚合高性能催化剂。以它的极高的活性、聚合物分子结构的可控性、多重活性聚合等特性而引人注目。本评述首先进行该催化剂的化学描述,然后分别介绍该催化剂的主要特征、活性中心结构、聚合机理和应用,重点介绍该催化剂的五大特征。
Resumo:
本文提出了一种基于MontaVista Linux操作系统的开放式机器人控制器,该系统采用CAN总线作为控制器的系统总线。由于MontaVista Linux操作系统的开放性和良好的移植性,使得系统可以方便扩展、定制不同的应用软件模块和操作系统模块,并且在各种硬件平台间具有良好的移植性。同时由于采用CAN总线作为系统总线,使得系统可灵活配置且可以通过现场总线与其它设备共享数据。
Resumo:
T-Kernel是日本T-Engine组织推出的开源免费的嵌入式实时操作系统(RTOS),以其强实时小体积内核著称。本文针对T-Kernel在Blackfin处理器(BF533)上的移植过程进行了分析,给出了中断管理,任务切换和系统调用入口的实现方法,并进行了稳定性和实时性测试,保证了移植系统的性能。
Resumo:
随着嵌入式计算技术的飞速发展,多种功能强大的微处理器和相应嵌入式操作系统也相继问世。选择合适的嵌入式操作系统和处理器平台进行移植成为嵌入式开发的重要技术环节。本文介绍了开源嵌入式实时操作系统RTOS(Real Time Operating System)T-Kernel和Blackfin(BF)533处理器及其开发环境VisualDSP++4.5Environment,给出了中断管理、任务切换和系统调用入口三个模块的移植方法,并讨论了相应的系统稳定性和实时性测试方法。日本T-Engine组织推出的T-Kernel RTOS拥有高实时性、小体积的内核,并强调对底层处理器全面封装;ADI Blackfin系列微处理器同时具有DSP和MCU的特点,非常适合于移植RTOS。因此T-Kernel在BF533上的移植是一个典型的开发应用实例,其移植分析方法对于其他嵌入式RTOS移植也具有参考价值。
Resumo:
探讨了Linux平台下多线程技术和套接字网络通讯问题,在此基础上利用互斥锁和条件变量技术设计了一个面向连接的多线程并发服务器的详细算法。最后给出了基于Posix线程库的Linux系统下用C++实现多线程并发服务器的基本程序框架。实际项目应用表明这种基于多线程的并发服务器结构在完善程序功能的同时还可以有效提高其服务性能。
Resumo:
启动一个新的进程必须分配给它独立的地址空间,建立众多的数据表来维护它的代码段、堆栈段和数据段,这是一种“昂贵”的多任务工作方式。相比之下,多线程技术是一种非常“节俭”的多任务操作方式。本文针对SPM纳米操作系统中的ARM嵌入式开发平台的任务特点,分析比较了Linux系统下多线程和多进程技术的性能,为设计实现ARM开发平台下的多线程程序起到关键的作用。
Resumo:
提出了一种基于嵌入式实时Linux的设备远程监控系统,重点针对现有远程监控系统体积、实时性问题加以改进。在自行研发的操作系统基础之上,一方面实现了嵌入式Internet技术;另一方面满足了系统硬实时性需求,为故障的实时预报、诊断、控制提供了强有力的支持。
Resumo:
Apesar de exigir maior grau de dificuldade do que a instalação via pacotes, a instalação via código-fonte oferece uma infinidade de recursos em relação à primeira, tais como: definir a estrutura de diretórios para binários, bibliotecas, módulos, manuais e demais arquivos do SGBD conforme o desejado, o que facilita a organização, localização e manutenção do PostgreSQL; ativar suporte a um determinado idioma, para tradução de mensagens; construir suporte a determinadas linguagens ou módulos; definir alguns parâmetros padrões; além de conceber maior controle e segurança nas atualizações de versões do SGBD, evitando assim, atualizações automáticas indesejáveis por meio do sistema operacional e a conseqüente perda de bases de dados; entre outros. Para este trabalho, foi utilizado o sistema operacional Ubuntu Server 8.04.1, contudo, este tutorial é totalmente aplicável e compatível a outras versões Ubuntu, bem como a outras distribuições Linux, respeitando, é claro, as particularidades de algumas distribuições, como a estrutura de diretórios destes. Quanto ao SGBD PostgreSQL, foi adotado a versão 8.3.4, lançada em Setembro/2008, contudo, este tutorial se aplica também à versões inferiores 8.x.x deste SGBD.
Resumo:
After the 1980s it is diffi cult, following stylistic criteria, to draw a map of contemporary academic music. All styles are compossible, and all are practiced. In this context, the geographical entity “South of Italy” does not stand out for a musical identity with special technical-stylistic features. Rather, at a socio-cultural level, the South remains today – in music no less than in all areas where there is a gap between top development and stagnation – a land of emigrants: six out of the seven composers treated (Ivan Fedele, Giuseppe Colardo, Rosario Mirigliano, Giuseppe Soccio, Nicola Cisternino, Biagio Putignano, Paolo Aralla) live in the North of Italy. The positive aspect of this is the affi nity of the South with the transnational and superstructural community of contemporary music, which from European and Western has now become almost global. The composers under consideration belong to the generation of the ‘50s, rooted in the serial and post-serial movements (from which Franco Donatoni, Luciano Berio, Luigi Nono, Salvatore Sciarrino, Giacinto Scelsi, are the principals models, to mention only the Italians), dipped in the general phenomenon of timbrism (particularly spectralism), and acquainted with electronics. They draw from these sources various instruments of compositional technique and aspects of their poetics. In particular these composers, active from the ‘80s, develop new ways of construction of the temporal form of music. They share the goal to establish a new continuity, different from the tonal one but at the same time transcending the serial and post-serial disintegration and fragmentation. The primary means to this end is a new enhancement of the category of fi gure, as a clear and distinct, recognizable aggregate of pitches, intervals, register, durations, timbre, articulation, dynamics, and texture. Each composer elaborates the atonal fi gural material in different ways, emphasizing one aspect or another. For example, Fedele (1953) is a master in the management of form per se, Colardo (1953) in the activation of disturbed harmonic effects, Mirigliano (1950) in the creation of a slight tension from the smallest vibrations of sound, Soccio (1950) in the set up of movement by means of accumulations and discharges of energy, Cisternino (1957) in a Cagean-Scelsian emphasis on sound as such, Putignano (1960) in the suspension of time through the succession and transformation of images, Aralla (1960) in the foundation of form from below, from the concreteness of sound.
Resumo:
Wydział Biologii: Instytut Biologii Molekularnej i Biotechnologii
Resumo:
Internet Traffic Managers (ITMs) are special machines placed at strategic places in the Internet. itmBench is an interface that allows users (e.g. network managers, service providers, or experimental researchers) to register different traffic control functionalities to run on one ITM or an overlay of ITMs. Thus itmBench offers a tool that is extensible and powerful yet easy to maintain. ITM traffic control applications could be developed either using a kernel API so they run in kernel space, or using a user-space API so they run in user space. We demonstrate the flexibility of itmBench by showing the implementation of both a kernel module that provides a differentiated network service, and a user-space module that provides an overlay routing service. Our itmBench Linux-based prototype is free software and can be obtained from http://www.cs.bu.edu/groups/itm/.
Resumo:
Current low-level networking abstractions on modern operating systems are commonly implemented in the kernel to provide sufficient performance for general purpose applications. However, it is desirable for high performance applications to have more control over the networking subsystem to support optimizations for their specific needs. One approach is to allow networking services to be implemented at user-level. Unfortunately, this typically incurs costs due to scheduling overheads and unnecessary data copying via the kernel. In this paper, we describe a method to implement efficient application-specific network service extensions at user-level, that removes the cost of scheduling and provides protected access to lower-level system abstractions. We present a networking implementation that, with minor modifications to the Linux kernel, passes data between "sandboxed" extensions and the Ethernet device without copying or processing in the kernel. Using this mechanism, we put a customizable networking stack into a user-level sandbox and show how it can be used to efficiently process and forward data via proxies, or intermediate hosts, in the communication path of high performance data streams. Unlike other user-level networking implementations, our method makes no special hardware requirements to avoid unnecessary data copies. Results show that we achieve a substantial increase in throughput over comparable user-space methods using our networking stack implementation.