Search results for "computer program"

showing 10 items of 807 documents

The gypsy database (GyDB) of mobile genetic elements: release 2.0

2011

This article introduces the second release of the Gypsy Database of Mobile Genetic Elements (GyDB 2.0): a research project devoted to the evolutionary dynamics of viruses and transposable elements based on their phylogenetic classification (per lineage and protein domain). The Gypsy Database (GyDB) is a long-term project that is continuously progressing, and that owing to the high molecular diversity of mobile elements requires to be completed in several stages. GyDB 2.0 has been powered with a wiki to allow other researchers participate in the project. The current database stage and scope are long terminal repeats (LTR) retroelements and relatives. GyDB 2.0 is an update based on the analys…

0106 biological sciencesProtein domainretroelementsLineage (evolution)[SDV]Life Sciences [q-bio]Retroviridae ProteinsCaulimoviridaeEukaryote evolutioncomputer.software_genrephylogeny01 natural sciencesDatabases GeneticRefSeqPhylogenyPriority journalbase de données0303 health sciencesRetrovirusPhylogenetic treeDatabaseSequence analysisdatabases geneticArticlesClassificationChemistryGenetic lineRetroelementsGenetic databaseComputer programBiologyArticleMobile genetic element03 medical and health sciencesLong terminal repeatWeb pagephylogénieVirus proteinGeneticsLife Science[SDV.BV]Life Sciences [q-bio]/Vegetal BiologyAccess to informationTransposon030304 developmental biologyretroelements;phylogeny;software;terminal repeat sequences;databases geneticHidden Markov modelCauliflower mosaic virusCaulimovirussoftwareRetroposonTerminal Repeat SequencesDNA structureInterspersed Repetitive Sequencesterminal repeat sequencesNonhumanRetroviridaeData analysis softwareGenetic variabilityMobile genetic elementscomputerLENGUAJES Y SISTEMAS INFORMATICOSSoftware010606 plant biology & botanyPhylogenetic nomenclaturePhylogenetic tree
researchProduct

Stealthy Attacks in Cloud-Connected Linear Impulsive Systems

2018

This paper studies a security problem for a class cloud-connected multi-agent systems, where autonomous agents coordinate via a combination of short-range ad-hoc commu- nication links and long-range cloud services. We consider a simplified model for the dynamics of a cloud-connected multi- agent system and attacks, where the states evolve according to linear time-invariant impulsive dynamics, and attacks are modeled as exogenous inputs designed by an omniscent attacker that alters the continuous and impulsive updates. We propose a definition of attack detectability, characterize the existence of stealthy attacks as a function of the system parameters and attack properties, and design a fami…

0209 industrial biotechnologyClass (computer programming)Authenticationbusiness.industryComputer scienceDistributed computingData_MISCELLANEOUS020208 electrical & electronic engineeringAutonomous agentCyber-physical systemCloud computing02 engineering and technologyFunction (mathematics)Security robotics distributed control and estimation020901 industrial engineering & automationControl theoryComputer Science::Multimedia0202 electrical engineering electronic engineering information engineeringbusinessComputer Science::Cryptography and Security
researchProduct

Distributed adaptive leader–follower and leaderless consensus control of a class of strict-feedback nonlinear systems : a unified approach

2020

In this paper, distributed adaptive consensus for a class of strict-feedback nonlinear systems under directed topology condition is investigated. Both leader–follower and leaderless cases are considered in a unified framework. To design distributed controller for each subsystem, a local compensatory variable is generated based on the signals collected from its neighbors. Such a technique enables us to solve the leader–follower consensus and leaderless consensus problems in a unified framework. And it further allows us to treat the leaderless consensus as a special case of the leader–follower consensus. For leader–follower consensus, the assumption that the leader trajectory is linearly para…

0209 industrial biotechnologyClass (computer programming)Computer science020208 electrical & electronic engineeringParameterized complexity02 engineering and technologyComputer Science::Multiagent SystemsVariable (computer science)Nonlinear systemAdaptive Control020901 industrial engineering & automationControl and Systems EngineeringControl theory0202 electrical engineering electronic engineering information engineeringTrajectory:Electrical and electronic engineering [Engineering]Uniform boundednessElectrical and Electronic EngineeringSpecial caseDistributed Consensus Control
researchProduct

Collaborative engineering decision-making for building information channels and improving Web visibility of product manufacturers

2018

Abstract Product manufacturers have spent the last years improving productivity and process efficiency in order to face increasingly competitive markets. Today, the visibility of technological innovations has become essential to achieve the targeted market. It is now very difficult for a product manufacturer to reach customers without owning a website that is visible on search engine results pages. The goal of this paper is to build information channels between a company and its customers through improving both a company’s content of information on the Web and its website rank on the Internet through search engine results pages. Company information and knowledge are distributed through mult…

0209 industrial biotechnologyComputer sciencebusiness.industryCollaborative engineering[SHS.INFO]Humanities and Social Sciences/Library and information sciencesVisibility (geometry)Rank (computer programming)02 engineering and technology[SHS]Humanities and Social SciencesProduct (business)Search engineEngineering management020901 industrial engineering & automationArtificial IntelligenceOrder (business)0202 electrical engineering electronic engineering information engineeringComputer-aided020201 artificial intelligence & image processingThe InternetbusinessComputingMilieux_MISCELLANEOUSInformation SystemsAdvanced Engineering Informatics
researchProduct

Robotic geometric and volumetric inspection of high value and large scale aircraft wings

2019

Increased demands in performance and production rates require a radical new approach to the design and manufacturing of aircraft wings. Performance of modern robotic manipulators has enabled research and development of fast automated non-destructive testing (NDT) systems for complex geometries. This paper presents recent outcomes of work aimed at removing the bottleneck due to data acquisition rates, to fully exploit the scanning speed of modern 6-DoF manipulators. The geometric assessment of the parts is carried out with a robotised dynamic laser scanner encoded through an absolute laser tracker. This method allows scanning speeds up to 330mm/s at 1mm pitch. State of the art ultrasonic ins…

0209 industrial biotechnologyLaser scanningComputer sciencebusiness.industryPhased array02 engineering and technology01 natural sciencesSettore ING-IND/14 - Progettazione Meccanica E Costruzione Di Macchine020901 industrial engineering & automationData acquisitionLaser trackerNondestructive testing0103 physical sciencesCFRP Laser scanning Phased array Robotic NDTSystem integrationUltrasonic sensorInstrumentation (computer programming)business010301 acousticsComputer hardware
researchProduct

Fast ultrasonic phased array inspection of complex geometries delivered through robotic manipulators and high speed data acquisition instrumentation

2016

Performance of modern robotic manipulators has enabled research and development of fast automated non-destructive testing (NDT) systems for complex geometries. This paper presents recent outcomes of work aimed at removing the bottleneck due to data acquisition rates, to fully exploit the scanning speed of modern 6-DoF manipulators. State of the art ultrasonic instrumentation has been integrated into a large robot cell to enable fast data acquisition, high scan resolutions and accurate positional encoding. A fibre optic connection between the ultrasonic instrument and the server computer enables data transfer rates up to 1.6GB/s. Multiple data collection methods are compared. Performance of …

0209 industrial biotechnologybusiness.industryPhased arrayComputer scienceTKFrame (networking)Electrical engineering02 engineering and technology01 natural sciencesPhased array ultrasonics020901 industrial engineering & automationData acquisitionLinear ScanNondestructive testingPhased array0103 physical sciencesFMCUltrasonic sensorInstrumentation (computer programming)CFRPbusiness010301 acousticsRobotic NDTComputer hardwareData transmission
researchProduct

The Challenge of Coexistence in Socially Vulnerable Schools

2017

Abstract Society in general and schools in particular continue to express their concerns with regard to the many challenges posed nowadays by living in a globalized world, where learning to coexist involves knowing oneself and those around us. Therefore, the professionals from the education sector and specially from the most vulnerable contexts demand the necessity to know strategies and initiatives which enable them to build a democratic school, where learning to coexist is the key to educate engaged citizens living in an increasingly intercultural, changing world. The study presented here has been conducted in two differentiated, but complementary, phases. During the first phase a documen…

021110 strategic defence & security studiesClass (computer programming)business.industrymedia_common.quotation_subject05 social sciences0211 other engineering and technologies050301 education02 engineering and technologyPublic relationsPeer supportPhase (combat)DemocracyConvivència escolarReading (process)General Materials ScienceQuality (business)SociologyMarketingbusiness0503 educationmedia_commonProcedia - Social and Behavioral Sciences
researchProduct

HyperWall: A Hypervisor for Detection and Prevention of Malicious Communication

2020

Malicious programs vary widely in their functionality, from key-logging to disk encryption. However, most malicious programs communicate with their operators, thus revealing themselves to various security tools. The security tools incorporated within an operating system are vulnerable to attacks due to the large attack surface of the operating system kernel and modules. We present a kernel module that demonstrates how kernel-mode access can be used to bypass any security mechanism that is implemented in kernel-mode. External security tools, like firewalls, lack important information about the origin of the intercepted packets, thus their filtering policy is usually insufficient to prevent c…

021110 strategic defence & security studiesSoftware_OPERATINGSYSTEMSNetwork securitybusiness.industryComputer scienceNetwork packet0211 other engineering and technologiesHypervisor02 engineering and technologyAttack surfaceComputer securitycomputer.software_genreOperator (computer programming)Trusted computing baseDisk encryptionKernel (image processing)020204 information systems0202 electrical engineering electronic engineering information engineeringbusinesscomputer
researchProduct

Kick Detection and Influx Size Estimation during Offshore Drilling Operations using Deep Learning

2019

An uncontrolled or unobserved influx or kick during drilling has the potential to induce a well blowout, one of the most harmful incidences during drilling both in regards to economic and environmental cost. Since kicks during drilling are serious risks, it is important to improve kick and loss detection performance and capabilities and to develop automatic flux detection methodology. There are clear patterns during a influx incident. However, due to complex processes and sparse instrumentation it is difficult to predict the behaviour of kicks or losses based on sensor data combined with physical models alone. Emerging technologies within Deep Learning are however quite adapt at picking up …

021110 strategic defence & security studiesgeographygeography.geographical_feature_categoryArtificial neural networkComputer sciencebusiness.industryDeep learning0211 other engineering and technologiesDrilling0102 computer and information sciences02 engineering and technology01 natural sciencesWellboreVDP::Teknologi: 500Drilling machines010201 computation theory & mathematicsInstrumentation (computer programming)Artificial intelligencebusinessOffshore drillingMarine engineeringWater well2019 14th IEEE Conference on Industrial Electronics and Applications (ICIEA)
researchProduct

Development of a fast characterization setup for radionuclide generators demonstrated by a 227Ac-based generator

2021

Abstract The development of a setup for a fast online characterization of radionuclide generators is reported. A generator utilizing the mother nuclide 227Ac sorbed on a cation exchange resin is continuously eluted by using a peristaltic pump. To allow continuous and pulse-free elution of a large volume over extended time periods a 3D-printed interface designed to remove pressure-oscillations induced by the pump was placed between pump and generator column to ensure undisturbed generator elution. The eluate of the generator is passed through a 3D printed flow cell placed inside a borehole Na(Tl)-scintillation detector for high counting efficiency. Alternatively, a HPGe detector suitable for…

03 medical and health sciences0302 clinical medicineGenerator (computer programming)ChemistryNuclear engineeringPhysical and Theoretical ChemistryRadionuclide Generator010403 inorganic & nuclear chemistry01 natural sciences030218 nuclear medicine & medical imaging0104 chemical sciencesCharacterization (materials science)Radiochimica Acta
researchProduct