Search results for "computer program"
showing 10 items of 807 documents
The gypsy database (GyDB) of mobile genetic elements: release 2.0
2011
This article introduces the second release of the Gypsy Database of Mobile Genetic Elements (GyDB 2.0): a research project devoted to the evolutionary dynamics of viruses and transposable elements based on their phylogenetic classification (per lineage and protein domain). The Gypsy Database (GyDB) is a long-term project that is continuously progressing, and that owing to the high molecular diversity of mobile elements requires to be completed in several stages. GyDB 2.0 has been powered with a wiki to allow other researchers participate in the project. The current database stage and scope are long terminal repeats (LTR) retroelements and relatives. GyDB 2.0 is an update based on the analys…
Stealthy Attacks in Cloud-Connected Linear Impulsive Systems
2018
This paper studies a security problem for a class cloud-connected multi-agent systems, where autonomous agents coordinate via a combination of short-range ad-hoc commu- nication links and long-range cloud services. We consider a simplified model for the dynamics of a cloud-connected multi- agent system and attacks, where the states evolve according to linear time-invariant impulsive dynamics, and attacks are modeled as exogenous inputs designed by an omniscent attacker that alters the continuous and impulsive updates. We propose a definition of attack detectability, characterize the existence of stealthy attacks as a function of the system parameters and attack properties, and design a fami…
Distributed adaptive leader–follower and leaderless consensus control of a class of strict-feedback nonlinear systems : a unified approach
2020
In this paper, distributed adaptive consensus for a class of strict-feedback nonlinear systems under directed topology condition is investigated. Both leader–follower and leaderless cases are considered in a unified framework. To design distributed controller for each subsystem, a local compensatory variable is generated based on the signals collected from its neighbors. Such a technique enables us to solve the leader–follower consensus and leaderless consensus problems in a unified framework. And it further allows us to treat the leaderless consensus as a special case of the leader–follower consensus. For leader–follower consensus, the assumption that the leader trajectory is linearly para…
Collaborative engineering decision-making for building information channels and improving Web visibility of product manufacturers
2018
Abstract Product manufacturers have spent the last years improving productivity and process efficiency in order to face increasingly competitive markets. Today, the visibility of technological innovations has become essential to achieve the targeted market. It is now very difficult for a product manufacturer to reach customers without owning a website that is visible on search engine results pages. The goal of this paper is to build information channels between a company and its customers through improving both a company’s content of information on the Web and its website rank on the Internet through search engine results pages. Company information and knowledge are distributed through mult…
Robotic geometric and volumetric inspection of high value and large scale aircraft wings
2019
Increased demands in performance and production rates require a radical new approach to the design and manufacturing of aircraft wings. Performance of modern robotic manipulators has enabled research and development of fast automated non-destructive testing (NDT) systems for complex geometries. This paper presents recent outcomes of work aimed at removing the bottleneck due to data acquisition rates, to fully exploit the scanning speed of modern 6-DoF manipulators. The geometric assessment of the parts is carried out with a robotised dynamic laser scanner encoded through an absolute laser tracker. This method allows scanning speeds up to 330mm/s at 1mm pitch. State of the art ultrasonic ins…
Fast ultrasonic phased array inspection of complex geometries delivered through robotic manipulators and high speed data acquisition instrumentation
2016
Performance of modern robotic manipulators has enabled research and development of fast automated non-destructive testing (NDT) systems for complex geometries. This paper presents recent outcomes of work aimed at removing the bottleneck due to data acquisition rates, to fully exploit the scanning speed of modern 6-DoF manipulators. State of the art ultrasonic instrumentation has been integrated into a large robot cell to enable fast data acquisition, high scan resolutions and accurate positional encoding. A fibre optic connection between the ultrasonic instrument and the server computer enables data transfer rates up to 1.6GB/s. Multiple data collection methods are compared. Performance of …
The Challenge of Coexistence in Socially Vulnerable Schools
2017
Abstract Society in general and schools in particular continue to express their concerns with regard to the many challenges posed nowadays by living in a globalized world, where learning to coexist involves knowing oneself and those around us. Therefore, the professionals from the education sector and specially from the most vulnerable contexts demand the necessity to know strategies and initiatives which enable them to build a democratic school, where learning to coexist is the key to educate engaged citizens living in an increasingly intercultural, changing world. The study presented here has been conducted in two differentiated, but complementary, phases. During the first phase a documen…
HyperWall: A Hypervisor for Detection and Prevention of Malicious Communication
2020
Malicious programs vary widely in their functionality, from key-logging to disk encryption. However, most malicious programs communicate with their operators, thus revealing themselves to various security tools. The security tools incorporated within an operating system are vulnerable to attacks due to the large attack surface of the operating system kernel and modules. We present a kernel module that demonstrates how kernel-mode access can be used to bypass any security mechanism that is implemented in kernel-mode. External security tools, like firewalls, lack important information about the origin of the intercepted packets, thus their filtering policy is usually insufficient to prevent c…
Kick Detection and Influx Size Estimation during Offshore Drilling Operations using Deep Learning
2019
An uncontrolled or unobserved influx or kick during drilling has the potential to induce a well blowout, one of the most harmful incidences during drilling both in regards to economic and environmental cost. Since kicks during drilling are serious risks, it is important to improve kick and loss detection performance and capabilities and to develop automatic flux detection methodology. There are clear patterns during a influx incident. However, due to complex processes and sparse instrumentation it is difficult to predict the behaviour of kicks or losses based on sensor data combined with physical models alone. Emerging technologies within Deep Learning are however quite adapt at picking up …
Development of a fast characterization setup for radionuclide generators demonstrated by a 227Ac-based generator
2021
Abstract The development of a setup for a fast online characterization of radionuclide generators is reported. A generator utilizing the mother nuclide 227Ac sorbed on a cation exchange resin is continuously eluted by using a peristaltic pump. To allow continuous and pulse-free elution of a large volume over extended time periods a 3D-printed interface designed to remove pressure-oscillations induced by the pump was placed between pump and generator column to ensure undisturbed generator elution. The eluate of the generator is passed through a 3D printed flow cell placed inside a borehole Na(Tl)-scintillation detector for high counting efficiency. Alternatively, a HPGe detector suitable for…