352 resultados para contention
Resumo:
Monocyte macrophages (M phi) are thought to be the principal target cells for the dengue viruses (DV), the cause of dengue fever and hemorrhagic fever. Cell attachment is mediated by the virus envelope (E) protein, but the host-cell receptors remain elusive. Currently, candidate receptor molecules include proteins, Fc receptors, glycosaminoglycans (GAGs) and lipopolysaccharide binding CD14-associated molecules. Here, we show that in addition to M phi, cells of the T- and B-cell lineages, and including cells lacking GAGs, can bind and become infected with DV. The level of virus binding varied widely between cell lines and, notably, between virus strains within a DV serotype. The latter difference may be ascribable to one or more amino acid differences in domain II of the E protein. Heparin had no significant effect on DV binding, while heparinase treatment of cells in all cases increased DV binding, further supporting the contention that GAGs are not required for DV binding and infection of human cells. In contrast to a recent report, we found that lipopolysaccharide (LPS) had either no effect or enhanced DV binding to, and infection of various human leukocyte cell lines, while in all virus-cell combinations, depletion of Ca2+/Mg2+ enhanced DV binding. This argues against involvement of beta (2) integrins in virus-host cell interactions, a conclusion in accord with the demonstration of three virus binding membrane proteins of < 75 kDa. Collectively, the results of this study question the purported exclusive importance of the E protein domain III in DV binding to host cells and point to a far more complex interaction between various target cells and, notably, individual DV strains. (C) 2001 Elsevier Science B.V. All rights reserved.
Resumo:
The green macroalgal species Caulerpa taxifolia is indigenous to tropical/subtropical Australia, ranging as far south as 28degrees and 29degrees 15' S on the Australian mainland east and west coasts, respectively. The origin of disjunct populations of the species, discovered in 2000 on the Australian mainland east coast at localities to 35degrees S remains unknown, variously attributed to introduced exotic strains or range extensions from other eastern Australian populations. Some naturally occurring Australian populations of C. taxifolia are similar to Mediterranean C. taxifolia. In Australia, large broad forms of the species, which have been known in the region since 1860, grow luxuriantly in sheltered seagrass meadows, with some of these populations tolerating minimum surface seawater temperatures in winter of 12.5 to 14.5degreesC. Accordingly, the contention that the Mediterranean has been invaded by a genetically-modified, large, cold-adapted strain of C. taxifolia may be incorrect. It is crucial that genetic markers (DNA fingerprinting, microsatellites) sensitive at the population level are used to accurately determine the genetic relatedness of C. taxifolia populations.
Resumo:
Land use intensification is estimated to result in an overall increase in sediment delivery to the Great Barrier Reef lagoon by a factor of approximately four. Modelling suggests that, following land use intensification, croplands cause the greatest increase of sediment yield and sediment concentration, whereas erosion of grazing land is the main contemporary source of sediments, primarily owing to the large spatial extent of this land use. The spatial pattern of sediment yield to the coast after land use intensification is strongly correlated with the pattern under natural conditions, although the greatest increase is estimated to have occurred in the wet-dry catchments. Sediment transport and resuspension processes have led to the development of a strongly sediment-partitioned shelf, with modern mud-rich sediments almost exclusively restricted to the inner and inner-middle shelf, northward-facing embayments and in the lee of headlands. Elevated sediment concentrations increase the potential transport rates of nutrients and other pollutants. Whether increased sediment supply to the coastal zone has impacted on reefs remains a point of contention. More sediment load data need to be collected and analysed in order to make detailed estimates of catchment yields and establish the possible sediment impact on the Great Barrier Reef.
Resumo:
Rumor research, in general, and its delayed incorporation of the work, of rumor researcher Jamuna Prasad, in particular, exemplify how the intellectual climate of American social psychology discouraged the development of social approaches. In the present paper, we explain his conceptualization of how rumors start and spread, and explore findings from subsequent research supporting or negating his propositions. It is our contention that, although Prasad had identified the basic variables involved in rumor generation and transmission correctly, mainstream social psychological research in the 1940s did not incorporate his contributions. Instead, mirroring the Zeitgeist of American social psychology, rumor research was approached from a predominantly individual level of analysis. In the present paper, the authors have tried to resurrect some of the group-level variables from Prasad's treatment of rumor and to suggest that social psychology adopt a more 'social' approach to rumor.
Resumo:
This article argues that nuclear weapons serve no useful purpose in military calculations; moreover, their continued retention invites the dangers of further proliferation and of accidental use. They are thus defined here as obstacles to, rather than as facilitators of, international security. Seven reasons are presented to support this contention, including an assessment of the moral implications and the strategic limitations of nuclear weapons. Despite these limitations, and the recent commitments made by the nuclear weapon states to eliminate their arsenals, nuclear weapons remain central to the strategic doctrines of these states. Several reasons are put forward to explain why this retention continues, including the unchanging nature of strategic mindsets, the presence of vested interests, and now, in the case of the USA at least, a renewed reliance on nuclear weapons, regardless of how appropriate and effective such a strategy might be against emerging terrorist or `rogue state' threats.
Resumo:
We present an abstract model of the leader election protocol used in the IEEE 1394 High Performance Serial Bus standard. The model is expressed in the probabilistic Guarded Command Language. By formal reasoning based on this description, we establish the probability of the root contention part of the protocol successfully terminating in terms of the number of attempts to do so. Some simple calculations then allow us to establish an upper bound on the time taken for those attempts.
Resumo:
O artigo trata da posio terica de Keynes relativamente economia clssica e abordagem denominada hertica. A primeira seo resgata os traos distintivos das escolas clssica e neoclssica segundo a demarcao proposta por Keynes, bem como as crticas por ele dirigidas s principais teses defendidas por essas linhagens tericas. A seguir, retoma-se a sua avaliao dos argumentos subconsumistas, indicando-se os seus pontos de convergncia e distanciamento dessa viso econmica. Na continuao, apresentam-se as interpretaes neoclssicas ao problema da demanda, comentando-se a relao da obra de Keynes com a tradio marshalliana. A ltima seo avalia a teoria neoclssica do produto real sob condies cclicas e introduz a verso de Keynes para o equilbrio agregado definido pelas propenses a gastar e a investir, alm de indicar o componente de fragilidade da leitura marshalliana de sua estrutura terica. Por fim, comenta-se a contribuio de Keynes ao conhecimento econmico da poca perante a escola clssica e os hereges.
Resumo:
AIM: This work presents detailed experimental performance results from tests executed in the hospital environment for Health Monitoring for All (HM4All), a remote vital signs monitoring system based on a ZigBee (ZigBee Alliance, San Ramon, CA) body sensor network (BSN). MATERIALS AND METHODS: Tests involved the use of six electrocardiogram (ECG) sensors operating in two different modes: the ECG mode involved the transmission of ECG waveform data and heart rate (HR) values to the ZigBee coordinator, whereas the HR mode included only the transmission of HR values. In the absence of hidden nodes, a non-beacon-enabled star network composed of sensing devices working on ECG mode kept the delivery ratio (DR) at 100%. RESULTS: When the network topology was changed to a 2-hop tree, the performance degraded slightly, resulting in an average DR of 98.56%. Although these performance outcomes may seem satisfactory, further investigation demonstrated that individual sensing devices went through transitory periods with low DR. Other tests have shown that ZigBee BSNs are highly susceptible to collisions owing to hidden nodes. Nevertheless, these tests have also shown that these networks can achieve high reliability if the amount of traffic is kept low. Contrary to what is typically shown in scientific articles and in manufacturers' documentation, the test outcomes presented in this article include temporal graphs of the DR achieved by each wireless sensor device. CONCLUSIONS: The test procedure and the approach used to represent its outcomes, which allow the identification of undesirable transitory periods of low reliability due to contention between devices, constitute the main contribution of this work.
Resumo:
Mestrado em Interveno Scio-Organizacional na Sade. rea de especializao: Polticas de Administrao e Gesto de Servios de Sade.
Resumo:
Os sistemas de tempo real modernos geram, cada vez mais, cargas computacionais pesadas e dinmicas, comeando-se a tornar pouco expectvel que sejam implementados em sistemas uniprocessador. Na verdade, a mudana de sistemas com um nico processador para sistemas multi- processador pode ser vista, tanto no domnio geral, como no de sistemas embebidos, como uma forma eficiente, em termos energticos, de melhorar a performance das aplicaes. Simultaneamente, a proliferao das plataformas multi-processador transformaram a programao paralela num tpico de elevado interesse, levando o paralelismo dinmico a ganhar rapidamente popularidade como um modelo de programao. A ideia, por detrs deste modelo, encorajar os programadores a exporem todas as oportunidades de paralelismo atravs da simples indicao de potenciais regies paralelas dentro das aplicaes. Todas estas anotaes so encaradas pelo sistema unicamente como sugestes, podendo estas serem ignoradas e substitudas, por construtores sequenciais equivalentes, pela prpria linguagem. Assim, o modo como a computao na realidade subdividida, e mapeada nos vrios processadores, da responsabilidade do compilador e do sistema computacional subjacente. Ao retirar este fardo do programador, a complexidade da programao consideravelmente reduzida, o que normalmente se traduz num aumento de produtividade. Todavia, se o mecanismo de escalonamento subjacente no for simples e rpido, de modo a manter o overhead geral em nveis reduzidos, os benefcios da gerao de um paralelismo com uma granularidade to fina sero meramente hipotticos. Nesta perspetiva de escalonamento, os algoritmos que empregam uma poltica de workstealing so cada vez mais populares, com uma eficincia comprovada em termos de tempo, espao e necessidades de comunicao. Contudo, estes algoritmos no contemplam restries temporais, nem outra qualquer forma de atribuio de prioridades s tarefas, o que impossibilita que sejam diretamente aplicados a sistemas de tempo real. Alm disso, so tradicionalmente implementados no runtime da linguagem, criando assim um sistema de escalonamento com dois nveis, onde a previsibilidade, essencial a um sistema de tempo real, no pode ser assegurada. Nesta tese, descrita a forma como a abordagem de work-stealing pode ser resenhada para cumprir os requisitos de tempo real, mantendo, ao mesmo tempo, os seus princpios fundamentais que to bons resultados tm demonstrado. Muito resumidamente, a nica fila de gesto de processos convencional (deque) substituda por uma fila de deques, ordenada de forma crescente por prioridade das tarefas. De seguida, aplicamos por cima o conhecido algoritmo de escalonamento dinmico G-EDF, misturamos as regras de ambos, e assim nasce a nossa proposta: o algoritmo de escalonamento RTWS. Tirando partido da modularidade oferecida pelo escalonador do Linux, o RTWS adicionado como uma nova classe de escalonamento, de forma a avaliar na prtica se o algoritmo proposto vivel, ou seja, se garante a eficincia e escalonabilidade desejadas. Modificar o ncleo do Linux uma tarefa complicada, devido complexidade das suas funes internas e s fortes interdependncias entre os vrios subsistemas. No obstante, um dos objetivos desta tese era ter a certeza que o RTWS mais do que um conceito interessante. Assim, uma parte significativa deste documento dedicada discusso sobre a implementao do RTWS e exposio de situaes problemticas, muitas delas no consideradas em teoria, como o caso do desfasamento entre vrios mecanismo de sincronizao. Os resultados experimentais mostram que o RTWS, em comparao com outro trabalho prtico de escalonamento dinmico de tarefas com restries temporais, reduz significativamente o overhead de escalonamento atravs de um controlo de migraes, e mudanas de contexto, eficiente e escalvel (pelo menos at 8 CPUs), ao mesmo tempo que alcana um bom balanceamento dinmico da carga do sistema, at mesmo de uma forma no custosa. Contudo, durante a avaliao realizada foi detetada uma falha na implementao do RTWS, pela forma como facilmente desiste de roubar trabalho, o que origina perodos de inatividade, no CPU em questo, quando a utilizao geral do sistema baixa. Embora o trabalho realizado se tenha focado em manter o custo de escalonamento baixo e em alcanar boa localidade dos dados, a escalonabilidade do sistema nunca foi negligenciada. Na verdade, o algoritmo de escalonamento proposto provou ser bastante robusto, no falhando qualquer meta temporal nas experincias realizadas. Portanto, podemos afirmar que alguma inverso de prioridades, causada pela sub-poltica de roubo BAS, no compromete os objetivos de escalonabilidade, e at ajuda a reduzir a conteno nas estruturas de dados. Mesmo assim, o RTWS tambm suporta uma sub-poltica de roubo determinstica: PAS. A avaliao experimental, porm, no ajudou a ter uma noo clara do impacto de uma e de outra. No entanto, de uma maneira geral, podemos concluir que o RTWS uma soluo promissora para um escalonamento eficiente de tarefas paralelas com restries temporais.
Resumo:
A recent trend in distributed computer-controlled systems (DCCS) is to interconnect the distributed computing elements by means of multi-point broadcast networks. Since the network medium is shared between a number of network nodes, access contention exists and must be solved by a medium access control (MAC) protocol. Usually, DCCS impose real-time constraints. In essence, by real-time constraints we mean that traffic must be sent and received within a bounded interval, otherwise a timing fault is said to occur. This motivates the use of communication networks with a MAC protocol that guarantees bounded access and response times to message requests. PROFIBUS is a communication network in which the MAC protocol is based on a simplified version of the timed-token protocol. In this paper we address the cycle time properties of the PROFIBUS MAC protocol, since the knowledge of these properties is of paramount importance for guaranteeing the real-time behaviour of a distributed computer-controlled system which is supported by this type of network.
Resumo:
It is generally challenging to determine end-to-end delays of applications for maximizing the aggregate system utility subject to timing constraints. Many practical approaches suggest the use of intermediate deadline of tasks in order to control and upper-bound their end-to-end delays. This paper proposes a unified framework for different time-sensitive, global optimization problems, and solves them in a distributed manner using Lagrangian duality. The framework uses global viewpoints to assign intermediate deadlines, taking resource contention among tasks into consideration. For soft real-time tasks, the proposed framework effectively addresses the deadline assignment problem while maximizing the aggregate quality of service. For hard real-time tasks, we show that existing heuristic solutions to the deadline assignment problem can be incorporated into the proposed framework, enriching their mathematical interpretation.
Resumo:
This paper proposes a global multiprocessor scheduling algorithm for the Linux kernel that combines the global EDF scheduler with a priority-aware work-stealing load balancing scheme, enabling parallel real-time tasks to be executed on more than one processor at a given time instant. We state that some priority inversion may actually be acceptable, provided it helps reduce contention, communication, synchronisation and coordination between parallel threads, while still guaranteeing the expected systems predictability. Experimental results demonstrate the low scheduling overhead of the proposed approach comparatively to an existing real-time deadline-oriented scheduling class for the Linux kernel.
Resumo:
The recent trends of chip architectures with higher number of heterogeneous cores, and non-uniform memory/non-coherent caches, brings renewed attention to the use of Software Transactional Memory (STM) as a fundamental building block for developing parallel applications. Nevertheless, although STM promises to ease concurrent and parallel software development, it relies on the possibility of aborting conflicting transactions to maintain data consistency, which impacts on the responsiveness and timing guarantees required by embedded real-time systems. In these systems, contention delays must be (efficiently) limited so that the response times of tasks executing transactions are upper-bounded and task sets can be feasibly scheduled. In this paper we assess the use of STM in the development of embedded real-time software, defending that the amount of contention can be reduced if read-only transactions access recent consistent data snapshots, progressing in a wait-free manner. We show how the required number of versions of a shared object can be calculated for a set of tasks. We also outline an algorithm to manage conflicts between update transactions that prevents starvation.
Resumo:
The IEEE 802.15.4 standard provides appealing features to simultaneously support real-time and non realtime traffic, but it is only capable of supporting real-time communications from at most seven devices. Additionally, it cannot guarantee delay bounds lower than the superframe duration. Motivated by this problem, in this paper we propose an Explicit Guaranteed time slot Sharing and Allocation scheme (EGSA) for beacon-enabled IEEE 802.15.4 networks. This scheme is capable of providing tighter delay bounds for real-time communications by splitting the Contention Free access Period (CFP) into smaller mini time slots and by means of a new guaranteed bandwidth allocation scheme for a set of devices with periodic messages. At the same the novel bandwidth allocation scheme can maximize the duration of the CFP for non real-time communications. Performance analysis results show that the EGSA scheme works efficiently and outperforms competitor schemes both in terms of guaranteed delay and bandwidth utilization.