449 research outputs found

    INTERRACTIVE AND GRAPHICAL MANAGEMENT SYSTEM AT THE MARAMUREª COUNTY COUNCIL

    Get PDF
    The Maramures County Council (Romania) implements a computerized graphic system for assisted public management. A performing public administration is a key issue for the present local and regional development. Having an interactive graphic interface based on the county geographical map, the SIGMA2 system act as a scoreboard for the management of the County Council, as well as an integrator of different software modules that consolidate local administration data. Among its results are the automatization of different financial operations and the provision of informational support for managerial analyses and decision making.assisted management, scoreboard, computer system, county council, Maramureº

    Application of Fiber Ring for Protection of Passive Optical Infrastructure

    Get PDF
    Today, passive optical networks (PONs) are mostly used as modern high-speed access networks for various applications. However, there are also several specific applications, such as in business, office, army or science sector, which require a complex protection and backup system against failures and malfunctions. Typically, tree or star topologies are used for passive optical networks PONs. These topologies are vulnerable mainly against the failures of central optical line termination (OLT) unit. This paper presents an innovative method for protecting PONs by using ring topologies, especially the OLT unit. The method is described in the article, and an elementary mathematical model for calculations of asymmetric passive optical splitters together with an example is included as well

    An Architecture for Integrated Intelligence in Urban Management using Cloud Computing

    Get PDF
    With the emergence of new methodologies and technologies it has now become possible to manage large amounts of environmental sensing data and apply new integrated computing models to acquire information intelligence. This paper advocates the application of cloud capacity to support the information, communication and decision making needs of a wide variety of stakeholders in the complex business of the management of urban and regional development. The complexity lies in the interactions and impacts embodied in the concept of the urban-ecosystem at various governance levels. This highlights the need for more effective integrated environmental management systems. This paper offers a user-orientated approach based on requirements for an effective management of the urban-ecosystem and the potential contributions that can be supported by the cloud computing community. Furthermore, the commonality of the influence of the drivers of change at the urban level offers the opportunity for the cloud computing community to develop generic solutions that can serve the needs of hundreds of cities from Europe and indeed globally.Comment: 6 pages, 3 figure

    Genetic Interaction Maps in Escherichia coli Reveal Functional Crosstalk among Cell Envelope Biogenesis Pathways

    Get PDF
    As the interface between a microbe and its environment, the bacterial cell envelope has broad biological and clinical significance. While numerous biosynthesis genes and pathways have been identified and studied in isolation, how these intersect functionally to ensure envelope integrity during adaptive responses to environmental challenge remains unclear. To this end, we performed high-density synthetic genetic screens to generate quantitative functional association maps encompassing virtually the entire cell envelope biosynthetic machinery of Escherichia coli under both auxotrophic (rich medium) and prototrophic (minimal medium) culture conditions. The differential patterns of genetic interactions detected among >235,000 digenic mutant combinations tested reveal unexpected condition-specific functional crosstalk and genetic backup mechanisms that ensure stress-resistant envelope assembly and maintenance. These networks also provide insights into the global systems connectivity and dynamic functional reorganization of a universal bacterial structure that is both broadly conserved among eubacteria (including pathogens) and an important target

    Integrating model checking with HiP-HOPS in model-based safety analysis

    Get PDF
    The ability to perform an effective and robust safety analysis on the design of modern safety–critical systems is crucial. Model-based safety analysis (MBSA) has been introduced in recent years to support the assessment of complex system design by focusing on the system model as the central artefact, and by automating the synthesis and analysis of failure-extended models. Model checking and failure logic synthesis and analysis (FLSA) are two prominent MBSA paradigms. Extensive research has placed emphasis on the development of these techniques, but discussion on their integration remains limited. In this paper, we propose a technique in which model checking and Hierarchically Performed Hazard Origin and Propagation Studies (HiP-HOPS) – an advanced FLSA technique – can be applied synergistically with benefit for the MBSA process. The application of the technique is illustrated through an example of a brake-by-wire system

    Competitive Assessments for HAP Delivery of Mobile Services in Emerging Countries

    Full text link
    In recent years, network deployment based on High Altitude Platforms (HAPs) has gained momentum through several initiatives where air vehicles and telecommunications payloads have been adapted and refined, resulting in more efficient and less expensive platforms. In this paper, we study HAP as an alternative or complementary fast-evolving technology to provide mobile services in rural areas of emerging countries, where business models need to be carefully tailored to the reality of their related markets. In these large areas with low user density, mobile services uptake is likely to be slowed by a service profitability which is in turn limited by a relatively low average revenue per user. Through three architectures enabling different business roles and using different terrestrial, HAP and satellite backhaul solutions, we devise how to use in an efficient and profitable fashion these multi-purpose aerial platforms, in complement to existing access and backhauling satellite or terrestrial technologies

    Robustness of transcriptional regulatory program influences gene expression variability

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Most genes are not affected when any transcription factor (TF) is knocked out, indicating that they have robust transcriptional regulatory program. Yet the mechanism underlying robust transcriptional regulatory program is less clear.</p> <p>Results</p> <p>Here, we studied the cause and effect of robust transcriptional regulatory program. We found that cooperative TFs in the robust transcriptional regulatory program regulate their common target genes in an activity-redundant fashion, and they are able to compensate for each other's loss. As a result, their target genes are insensitive to their single perturbation. We next revealed that the degree of robustness of transcriptional regulatory program influences gene expression variability. Genes with fragile (unrobust) transcriptional regulatory program under normal growth condition could be readily reprogrammed to significantly modulate gene expression upon changing conditions. They also have high evolutionary rates of gene expression. We further showed that the fragile transcriptional regulatory program is a major source of expression variability.</p> <p>Conclusion</p> <p>We showed that activity-redundant TFs guarantee the robustness of transcriptional regulatory programs, and the fragility of transcriptional regulatory program plays a major role in gene expression variability. These findings reveal the mechanisms underlying robust transcription and expression variability.</p

    The internet worm

    Get PDF
    In November 1988 a worm program invaded several thousand UNIX-operated Sun workstations and VAX computers attached to the Research Internet, seriously disrupting service for several days but damaging no files. An analysis of the work's decompiled code revealed a battery of attacks by a knowledgeable insider, and demonstrated a number of security weaknesses. The attack occurred in an open network, and little can be inferred about the vulnerabilities of closed networks used for critical operations. The attack showed that passwork protection procedures need review and strengthening. It showed that sets of mutually trusting computers need to be carefully controlled. Sharp public reaction crystalized into a demand for user awareness and accountability in a networked world

    A batch scheduler with high level components

    Get PDF
    In this article we present the design choices and the evaluation of a batch scheduler for large clusters, named OAR. This batch scheduler is based upon an original design that emphasizes on low software complexity by using high level tools. The global architecture is built upon the scripting language Perl and the relational database engine Mysql. The goal of the project OAR is to prove that it is possible today to build a complex system for ressource management using such tools without sacrificing efficiency and scalability. Currently, our system offers most of the important features implemented by other batch schedulers such as priority scheduling (by queues), reservations, backfilling and some global computing support. Despite the use of high level tools, our experiments show that our system has performances close to other systems. Furthermore, OAR is currently exploited for the management of 700 nodes (a metropolitan GRID) and has shown good efficiency and robustness
    corecore