896 resultados para store
Resumo:
One of the most pervasive classes of services needed to support e-Science applications are those responsible for the discovery of resources. We have developed a solution to the problem of service discovery in a Semantic Web/Grid setting. We do this in the context of bioinformatics, which is the use of computational and mathematical techniques to store, manage, and analyse the data from molecular biology in order to answer questions about biological phenomena. Our specific application is myGrid (www.mygrid.org.uk) that is developing open source, service-based middleware upon which bioinformatics applications can be built. myGrid is specifically targeted at developing open source high-level service Grid middleware for bioinformatics.
Resumo:
One of the most pervasive classes of services needed to support e-Science applications are those responsible for the discovery of resources. We have developed a solution to the problem of service discovery in a Semantic Web/Grid setting. We do this in the context of bioinformatics, which is the use of computational and mathematical techniques to store, manage, and analyse the data from molecular biology in order to answer questions about biological phenomena. Our specific application is myGrid (http: //www.mygrid.org.uk) that is developing open source, service-based middleware upon which bioin- formatics applications can be built. myGrid is specif- ically targeted at developing open source high-level service Grid middleware for bioinformatics.
Resumo:
The authors take a broad view that ultimately Grid- or Web-services must be located via personalised, semantic-rich discovery processes. They argue that such processes must rely on the storage of arbitrary metadata about services that originates from both service providers and service users. Examples of such metadata are reliability metrics, quality of service data, or semantic service description markup. This paper presents UDDI-MT, an extension to the standard UDDI service directory approach that supports the storage of such metadata via a tunnelling technique that ties the metadata store to the original UDDI directory. They also discuss the use of a rich, graph-based RDF query language for syntactic queries on this data. Finally, they analyse the performance of each of these contributions in our implementation.
Resumo:
We take a broad view that ultimately Grid- or Web-services must be located via personalised, semantic-rich discovery processes. We argue that such processes must rely on the storage of arbitrary metadata about services that originates from both service providers and service users. Examples of such metadata are reliability metrics, quality of service data, or semantic service description markup. This paper presents UDDI-MT, an extension to the standard UDDI service directory approach that supports the storage of such metadata via a tunnelling technique that ties the metadata store to the original UDDI directory. We also discuss the use of a rich, graph-based RDF query language for syntactic queries on this data. Finally, we analyse the performance of each of these contributions in our implementation.
Resumo:
The Grid is a large-scale computer system that is capable of coordinating resources that are not subject to centralised control, whilst using standard, open, general-purpose protocols and interfaces, and delivering non-trivial qualities of service. In this chapter, we argue that Grid applications very strongly suggest the use of agent-based computing, and we review key uses of agent technologies in Grids: user agents, able to customize and personalise data; agent communication languages offering a generic and portable communication medium; and negotiation allowing multiple distributed entities to reach service level agreements. In the second part of the chapter, we focus on Grid service discovery, which we have identified as a prime candidate for use of agent technologies: we show that Grid-services need to be located via personalised, semantic-rich discovery processes, which must rely on the storage of arbitrary metadata about services that originates from both service providers and service users. We present UDDI-MT, an extension to the standard UDDI service directory approach that supports the storage of such metadata via a tunnelling technique that ties the metadata store to the original UDDI directory. The outcome is a flexible service registry which is compatible with existing standards and also provides metadata-enhanced service discovery.
Resumo:
In e-Science experiments, it is vital to record the experimental process for later use such as in interpreting results, verifying that the correct process took place or tracing where data came from. The process that led to some data is called the provenance of that data, and a provenance architecture is the software architecture for a system that will provide the necessary functionality to record, store and use process documentation. However, there has been little principled analysis of what is actually required of a provenance architecture, so it is impossible to determine the functionality they would ideally support. In this paper, we present use cases for a provenance architecture from current experiments in biology, chemistry, physics and computer science, and analyse the use cases to determine the technical requirements of a generic, technology and application-independent architecture. We propose an architecture that meets these requirements and evaluate a preliminary implementation by attempting to realise two of the use cases.
Resumo:
Some of the themes discussed are: • Colby—student life (page 2) • Colby—Greek life (3, 8) • Colby—student interaction with Waterville Jews (5, 12) • Holidays (6, 9, 12) • Marriage (6) • Colby—Jewish students from away (8) • Levine’s Store (9) • Food (10) • Occupation—woolen mills (11) • Occupation— real estate development (11) • Jewish education (12, 15) • Yiddish (13)
Resumo:
Some of the themes discussed are: • Occupation—store, The Jefferson Hotel (2, 4-6, 11, 17-18) • Food (2) • Colby—Greek life (3, 7) • Military service (3-4) • Bar Mitzvah (6, 12) • Life in Waterville—Circus (6) • Anti-semitism (10-12) • Occupation—law (8-9) • Occupation—legislature (14) • Jewish education (12) • Synagogue (13) • Civic engagement—United Way (15) • Civic engagement (26-28) • Camp—Modin (18) • College—attendance (19) • Colby—football (20-21, 23, 30)
Resumo:
Some of the themes discussed are: • Colby—student life (page 2) • Colby—Greek life (3, 8) • Colby—student interaction with Waterville Jews (5, 12) • Holidays (6, 9, 12) • Marriage (6) • Colby—Jewish students from away (8) • Levine’s Store (9) • Food (10) • Occupation—woolen mills (11) • Occupation— real estate development (11) • Jewish education (12, 15) • Yiddish (13)
Resumo:
Some themes discussed are: • Jewish identity—prayer (1, 3) • Jewish identity—modern changes (3) • Jewish education—Hebrew/Sunday School (1, 4, 5) • Food—family picnics (2) • Food—favorites (13) • Food—kosher (14) • Occupation—store/tailoring (2) • Occupation—law (8-9) • Occupation—legislature (8-9) • Education—Bowdoin (8) • Education—Harvard Law (8) • Marriage—parents (9-10) • Intermarriage (11) • Social life—Center Youth (11) • Dating—non-Jews (12)
Resumo:
Some of the themes discussed are: • Occupation—store, The Jefferson Hotel (2, 4-6, 11, 17-18) • Food (2) • Colby—Greek life (3, 7) • Military service (3-4) • Bar Mitzvah (6, 12) • Life in Waterville—Circus (6) • Anti-semitism (10-12) • Occupation—law (8-9) • Occupation—legislature (14) • Jewish education (12) • Synagogue (13) • Civic engagement—United Way (15) • Civic engagement (26-28) • Camp—Modin (18) • College—attendance (19) • Colby—football (20-21, 23, 30)
Resumo:
The Levine family held an extensive reunion during the Summer of 2009 during which 29 DVDs of raw material were recorded for use in the creation of a Levine family mini-documentary. Many of these DVDs contain oral history interviews conducted by Wendy Miller, one of the organizers of the reunion. Although these interviews were not designed for historical research, they contain valuable historical information. Some of the family members interviewed include: Ben Arnon (4/5), Marjorie, Stephen, and Michael Kaplan (8), Glenyce Miller Kaplan (starts in 15, continues in 9; separate interview in 13), Burt, Phyllis, and Louis Shiro (9) [Burt Shiro also in 26/27], Myrt and Gordon Wolman (9), Ted and Billy Alfond (10), Barbara and Joan Alfond (10), Susan and Peter Alfond (10), Alice Emory [caregiver for Bibby] (11), Eric Bloom and Stu Cushner (11), Saralee Kaplan Bloom (11), Sarah Miller Arnon (12), Kayla and Jenna Cushner (12), Josh Soros and Eliana Miller-Kaplan (12), Sarah, Wendy, and Julie Miller (starts in 12, continues in 14), Bill Shutzer (13), Maschia and Glicka Kaplan, Sharon Kushner, Dan Hood (13), Gene, Alex, Kate Cohen (14), Ben, Jeremy, Joselyn Arnon (14), Wendy and Julie Miller at the store (15), and Eric Bloom (15).
Resumo:
We live in a world full of social media and portable technology that allows for the effortless access to, and sharing of, information. While this constant connection can be viewed as a benefit by some, there have been recent, sometimes embarrassing, instances throughout the world that show just how quickly any expectation of privacy can be destroyed. From pictures of poorly dressed shoppers at a grocery store to customers recording interactions with their servers at restaurants, the internet is full of media (all with the potential to go viral) created and posted without consent of all parties captured. This risk to privacy is not just limited to retail and restaurants, as being in any situation amongst people puts you at risk, including being in an academic classroom. Anyone providing in-class instruction, be they professor or librarian, can be at risk for this type of violation of privacy. In addition, the students in the class are also at risk for being unwittingly captured by their classmates. To combat this, colleges and universities are providing recommendations to faculty regarding this issue, such as including suggested syllabus statements about classroom recording by students. In some instances, colleges and universities have instituted formal policies with strict penalties for violators. An overview of current privacy law as it relates to an academic setting is discussed as well as recent, newsworthy instances of student recording in the classroom and the resulting controversies. Additionally, there is a discussion highlighting various recommendations and formal policies that have been issued and adopted by colleges and universities around the country. Finally, advice is offered about what librarians can do to educate students, faculty, and staff about the privacy rights of others and the potential harm that could come from posting to social media and the open web images and video of others without their consent.
Resumo:
An underwater gas pipeline is the portion of the pipeline that crosses a river beneath its bottom. Underwater gas pipelines are subject to increasing dangers as time goes by. An accident at an underwater gas pipeline can lead to technological and environmental disaster on the scale of an entire region. Therefore, timely troubleshooting of all underwater gas pipelines in order to prevent any potential accidents will remain a pressing task for the industry. The most important aspect of resolving this challenge is the quality of the automated system in question. Now the industry doesn't have any automated system that fully meets the needs of the experts working in the field maintaining underwater gas pipelines. Principle Aim of this Research: This work aims to develop a new system of automated monitoring which would simplify the process of evaluating the technical condition and decision making on planning and preventive maintenance and repair work on the underwater gas pipeline. Objectives: Creation a shared model for a new, automated system via IDEF3; Development of a new database system which would store all information about underwater gas pipelines; Development a new application that works with database servers, and provides an explanation of the results obtained from the server; Calculation of the values MTBF for specified pipelines based on quantitative data obtained from tests of this system. Conclusion: The new, automated system PodvodGazExpert has been developed for timely and qualitative determination of the physical conditions of underwater gas pipeline; The basis of the mathematical analysis of this new, automated system uses principal component analysis method; The process of determining the physical condition of an underwater gas pipeline with this new, automated system increases the MTBF by a factor of 8.18 above the existing system used today in the industry.
Resumo:
Audio coding is used to compress digital audio signals, thereby reducing the amount of bits needed to transmit or to store an audio signal. This is useful when network bandwidth or storage capacity is very limited. Audio compression algorithms are based on an encoding and decoding process. In the encoding step, the uncompressed audio signal is transformed into a coded representation, thereby compressing the audio signal. Thereafter, the coded audio signal eventually needs to be restored (e.g. for playing back) through decoding of the coded audio signal. The decoder receives the bitstream and reconverts it into an uncompressed signal. ISO-MPEG is a standard for high-quality, low bit-rate video and audio coding. The audio part of the standard is composed by algorithms for high-quality low-bit-rate audio coding, i.e. algorithms that reduce the original bit-rate, while guaranteeing high quality of the audio signal. The audio coding algorithms consists of MPEG-1 (with three different layers), MPEG-2, MPEG-2 AAC, and MPEG-4. This work presents a study of the MPEG-4 AAC audio coding algorithm. Besides, it presents the implementation of the AAC algorithm on different platforms, and comparisons among implementations. The implementations are in C language, in Assembly of Intel Pentium, in C-language using DSP processor, and in HDL. Since each implementation has its own application niche, each one is valid as a final solution. Moreover, another purpose of this work is the comparison among these implementations, considering estimated costs, execution time, and advantages and disadvantages of each one.