885 resultados para deadlock avoidance
Resumo:
High Performance Computing is a rapidly evolving area of computer science which attends to solve complicated computational problems with the combination of computational nodes connected through high speed networks. This work concentrates on the networks problems that appear in such networks and specially focuses on the Deadlock problem that can decrease the efficiency of the communication or even destroy the balance and paralyze the network. Goal of this work is the Deadlock avoidance with the use of virtual channels, in the switches of the network where the problem appears. The deadlock avoidance assures that will not be loss of data inside network, having as result the increased latency of the served packets, due to the extra calculation that the switches have to make to apply the policy.
Resumo:
Simulation has traditionally been used for analyzing the behavior of complex real world problems. Even though only some features of the problems are considered, simulation time tends to become quite high even for common simulation problems. Parallel and distributed simulation is a viable technique for accelerating the simulations. The success of parallel simulation depends heavily on the combination of the simulation application, algorithm and message population in the simulation is sufficient, no additional delay is caused by this environment. In this thesis a conservative, parallel simulation algorithm is applied to the simulation of a cellular network application in a distributed workstation environment. This thesis presents a distributed simulation environment, Diworse, which is based on the use of networked workstations. The distributed environment is considered especially hard for conservative simulation algorithms due to the high cost of communication. In this thesis, however, the distributed environment is shown to be a viable alternative if the amount of communication is kept reasonable. Novel ideas of multiple message simulation and channel reduction enable efficient use of this environment for the simulation of a cellular network application. The distribution of the simulation is based on a modification of the well known Chandy-Misra deadlock avoidance algorithm with null messages. The basic Chandy Misra algorithm is modified by using the null message cancellation and multiple message simulation techniques. The modifications reduce the amount of null messages and the time required for their execution, thus reducing the simulation time required. The null message cancellation technique reduces the processing time of null messages as the arriving null message cancels other non processed null messages. The multiple message simulation forms groups of messages as it simulates several messages before it releases the new created messages. If the message population in the simulation is suffiecient, no additional delay is caused by this operation A new technique for considering the simulation application is also presented. The performance is improved by establishing a neighborhood for the simulation elements. The neighborhood concept is based on a channel reduction technique, where the properties of the application exclusively determine which connections are necessary when a certain accuracy for simulation results is required. Distributed simulation is also analyzed in order to find out the effect of the different elements in the implemented simulation environment. This analysis is performed by using critical path analysis. Critical path analysis allows determination of a lower bound for the simulation time. In this thesis critical times are computed for sequential and parallel traces. The analysis based on sequential traces reveals the parallel properties of the application whereas the analysis based on parallel traces reveals the properties of the environment and the distribution.
Resumo:
Using current software engineering technology, the robustness required for safety critical software is not assurable. However, different approaches are possible which can help to assure software robustness to some extent. For achieving high reliability software, methods should be adopted which avoid introducing faults (fault avoidance); then testing should be carried out to identify any faults which persist (error removal). Finally, techniques should be used which allow any undetected faults to be tolerated (fault tolerance). The verification of correctness in system design specification and performance analysis of the model, are the basic issues in concurrent systems. In this context, modeling distributed concurrent software is one of the most important activities in the software life cycle, and communication analysis is a primary consideration to achieve reliability and safety. By and large fault avoidance requires human analysis which is error prone; by reducing human involvement in the tedious aspect of modelling and analysis of the software it is hoped that fewer faults will persist into its implementation in the real-time environment. The Occam language supports concurrent programming and is a language where interprocess interaction takes place by communications. This may lead to deadlock due to communication failure. Proper systematic methods must be adopted in the design of concurrent software for distributed computing systems if the communication structure is to be free of pathologies, such as deadlock. The objective of this thesis is to provide a design environment which ensures that processes are free from deadlock. A software tool was designed and used to facilitate the production of fault-tolerant software for distributed concurrent systems. Where Occam is used as a design language then state space methods, such as Petri-nets, can be used in analysis and simulation to determine the dynamic behaviour of the software, and to identify structures which may be prone to deadlock so that they may be eliminated from the design before the program is ever run. This design software tool consists of two parts. One takes an input program and translates it into a mathematical model (Petri-net), which is used for modeling and analysis of the concurrent software. The second part is the Petri-net simulator that takes the translated program as its input and starts simulation to generate the reachability tree. The tree identifies `deadlock potential' which the user can explore further. Finally, the software tool has been applied to a number of Occam programs. Two examples were taken to show how the tool works in the early design phase for fault prevention before the program is ever run.
Resumo:
40
Resumo:
Universidade Estadual de Campinas . Faculdade de Educação Física
Resumo:
The purpose of the current study was to understand how visual information about an ongoing change in obstacle size is used during obstacle avoidance for both lead and trail limbs. Participants were required to walk in a dark room and to step over an obstacle edged with a special tape visible in the dark. The obstacle's dimensions were manipulated one step before obstacle clearance by increasing or decreasing its size. Two increasing and two decreasing obstacle conditions were combined with seven control static conditions. Results showed that information about the obstacle's size was acquired and used to modulate trail limb trajectory, but had no effect on lead limb trajectory. The adaptive step was influenced by the time available to acquire and process visual information. In conclusion, visual information about obstacle size acquired during lead limb crossing was used in a feedforward manner to modulate trail limb trajectory.
5-HT1A receptors of the lateral septum regulate inhibitory avoidance but not escape behavior in rats
Resumo:
Serotonin in the lateral septum (LS) has been implicated in the modulation of defensive behaviors and in anxiety. However, it is currently unknown whether changes in 5-HT mechanisms in this brain area may selectively affect defensive responses associated with specific subtypes of anxiety disorders recognized in clinical settings. To address this question, we evaluated the effect of the intra-LS injection of the 5-HT1A/7 receptor agonist 8-CH-DPAT (0.6, 3.0, 15.0 nmol) in male Wistar rats exposed to the elevated T-maze animal model of anxiety. This test allows the measurement of two behavioral defensive responses in the same rat: inhibitory avoidance and escape behavior. In clinical terms, these responses have been respectively related to generalized anxiety and panic disorder. The effects of 8-OH-DPAT were compared to those caused by a standard anxiolytic compound, the benzodiazepine receptor agonist midazolam (MDZ, 20 nmol). We also investigated whether the intra-LS injection of the 5-HT1A receptor antagonist WAY-100635 (0.37 nmol) was able to block the effects of 8-OH-DPAT. All animals were also tested in an open field for locomotor activity assessments. Results showed that whereas intra-LS administration of MDZ decreased avoidance latencies, suggesting an anxiolytic action, 8-OH-DPAT caused the opposite effect. Neither drug affected the escape performance. Intra-LS administration of WAY-100635 blocked the anxiogenic effect caused by 8-OH-DPAT. No changes to locomotion were detected in the open field. The data suggests that LS 5-HT1A receptors are involved in the control of inhibitory avoidance behavior and that a failure in this regulatory mechanism may be of importance to the physiopathology of generalized anxiety disorder. (c) 2008 Elsevier Inc. All rights reserved.
Resumo:
How to deal with a rising China constitutes one of the most seminal challenges facing the ANZUS alliance since its inception a half a century ago. Australia must reconcile its geography and economic interests in Asia with its post-war strategic and historic cultural orientation towards the United States. It must succeed in this policy task without alienating either Beijing or Washington in the process. The extent to which this is achieved will shape Australia's national security posture for decades to come. Three specific components of the 'Sino-American-Australian' triangle are assessed here: the future of Taiwan, the American development of a National Missile Defence (NMD), and the interplay between Sino-American power balancing and multilateral security politics. The policy stakes for Australia and for the continued viability of ANZUS are high in all three policy areas as a new US Administration takes office in early 2001. The article concludes that Australia's best interest is served by applying deliberate modes of decisionmaking in its own relations with both China and the US and by facilitating consistent and systematic dialogue and consultations with both of those great powers on key strategic issues.
Resumo:
INJECTABLE HEROIN MAINTENANCE has been advocated as a form of treatment for opioid dependence that would attract, and retain in treatment, addicts who have either not sought treatment or who have failed at other forms of treatment, including methadone maintenance. Advocates of heroin maintenance argue that it would increase the proportion of addicts in treatment and reduce heroin use, drug related crime, and deaths due to overdose.
Resumo:
1. Between 1988 and 2001, we studied social relationships in the superb fairy-wren Malurus cyaneus (Latham), a cooperative breeder with male helpers in which extra-group fertilizations are more common than within-pair fertilizations. 2. Unlike other fairy-wren species, females never bred on their natal territory. First-year females dispersed either directly from their natal territory to a breeding vacancy or to a foreign 'staging-post' territory where they spent their first winter as a subordinate. Females dispersing to a foreign territory settled in larger groups. Females on foreign territories inherited the territory if the dominant female died, and were sometimes able to split the territory into two by pairing with a helper male. However, most dispersed again to obtain a vacancy. 3. Females dispersing from a staging post usually gained a neighbouring vacancy, but females gaining a vacancy directly from their natal territory travelled further, perhaps to avoid pairing or mating with related males. 4. Females frequently divorced their partner, although the majority of relationships were terminated by the death of one of the pair. If death did not intervene, one-third of pairings were terminated by female-initiated divorce within 1000 days. 5. Three divorce syndromes were recognized. First, females that failed to obtain a preferred territory moved to territories with more helpers. Secondly, females that became paired to their sons when their partner died usually divorced away from them. Thirdly, females that have been in a long relationship divorce once a son has gained the senior helper position. 6. Dispersal to avoid pairing with sons is consistent with incest avoidance. However, there may be two additional benefits. Mothers do not mate with their sons, so dispersal by the mother liberates her sons to compete for within-group matings. Further, divorcing once their son has become a breeder or a senior helper allows the female to start sons in a queue for dominance on another territory. Females that do not take this option face constraints on their ability to recruit more sons into the local neighbourhood.
Resumo:
The ability to recall the location of a predator and later avoid it was tested in nine populations of rainbowfish (Melanotaenia spp.), representing three species from a variety of environments. Following the introduction of a model predator into a particular microhabitat, the model was removed, the arena rotated and the distribution of the fish recorded again. In this manner it could be determined what cues the fish relied on in order to recall the previous location of the predator model. Fish from all populations but one (Dirran Creek) were capable of avoiding the predator by remembering either the location and/or the microhabitat in which the predator was recently observed. Reliance on different types of visual cues appears to vary between populations but the reason for this variation remains elusive. Of the ecological variables tested (flow variability, predator density and habitat complexity), only the level of predation appeared to be correlated with the orientation technique employed by each population. There was no effect of species identity, which suggests that the habitat that each population occupies plays a strong role in the development of both predator avoidance responses and the cues used to track predators in the wild.