Search results for "Unix"
showing 7 items of 7 documents
Relation between muscle mass, motor units and type of training in master athletes.
2014
OBJECTIVE: The aim of this study was to measure the number of motor units and muscle mass in power-trained and endurance-trained master athletes compared with community-dwelling older adults. METHODS: Seventy-five master athletes (52 power- and 23 endurance-trained athletes) were recruited at the 2012 European Veteran Athletics Championships in Zittau (Germany). One hundred and forty-nine community-dwelling older adults served as controls. In all participants, the motor unit number index (MUNIX) in the hypothenar muscle and whole body muscle mass was determined by bioelectrical impedance analysis (BIA). RESULTS: In both male and female master athletes, there were significant negative correl…
MECDAS/spl minus/a distributed data acquisition system for experiments at MAMI
1994
For coincidence experiments with the three-spectrometer setup at MAMI an experiment control and data acquisition system has been built and was put successfully into final operation in 1992. MECDAS is designed as a distributed system using communication via Ethernet and optical links. At the front end, VMEbus systems are used for real time purposes and direct hardware access via CAMAC, Fastbus or VMEbus. RISC workstations running UNIX are used for monitoring, data archiving and online and offline analysis of the experiment. MECDAS consists of several fixed programs and libraries, but large parts of readout and analysis can be configured by the user. Experiment specific configuration files ar…
Evaluation of a hash-compress-encrypt pipeline for storage system applications
2015
Great efforts are made to store data in a secure, reliable, and authentic way in large storage systems. Specialized, system specific clients help to achieve these goals. Nevertheless, often standard tools for hashing, compressing, and encrypting data are arranged in transparent pipelines. We analyze the potential of Unix shell pipelines with several high-speed and high-compression algorithms that can be used to achieve data security, reduction, and authenticity. Furthermore, we compare the pipelines of standard tools against a house made pipeline implemented in C++ and show that there is great potential for performance improvement.
Intruder Pattern Identification
2008
This paper considers the problem of intrusion detection in information systems as a classification problem. In particular the case of masquerader is treated. This kind of intrusion is one of the more difficult to discover because it may attack already open user sessions. Moreover, this problem is complex because of the large variability of user models and the lack of available data for the learning purpose. Here, flexible and robust similarity measures, suitable also for non-numeric data, are defined, they will be incorporated on a one-class training K N N and compared with several classification methods proposed in the literature using the Masquerading User Data set (www.schonlau.net) repr…
The Orchestra of Multiple Model Repositories
2013
This paper motivates and encourages the simultaneous use of multiple model repositories in model-driven software. A multi-repository mechanism is proposed for that. With this mechanism, multiple model repositories residing in the same or different technical spaces can be mounted into a single repository (in the same sense as file systems are mounted in UNIX) and accessed in a uniform way. Relations (including generalizations) between elements from the mounted repositories are supported. Some of the repositories may be “computable” (virtual), which leads to the on-the-fly model transformation concept.
Exemple d'organisation et de gestion informatique d'une bibliothèque d'unité
2004
National audience