A Heterogeneous Runtime Environment for Scientific Desktop Computing

Author(s):  
Nuno Oliveira ◽  
Pedro D. Medeiros
Energies ◽  
2021 ◽  
Vol 14 (2) ◽  
pp. 420
Author(s):  
Phong B. Dao

Multiagent control system (MACS) has become a promising solution for solving complex control problems. Using the advantages of MACS-based design approaches, a novel solution for advanced control of mechatronic systems has been developed in this paper. The study has aimed at integrating learning control into MACS. Specifically, learning feedforward control (LFFC) is implemented as a pattern for incorporation in MACS. The major novelty of this work is that the feedback control part is realized in a real-time periodic MACS, while the LFFC algorithm is done on-line, asynchronously, and in a separate non-real-time aperiodic MACS. As a result, a MACS-based LFFC design method has been developed. A second-order B-spline neural network (BSN) is used as a function approximator for LFFC whose input-output mapping can be adapted during control and is intended to become equal to the inverse model of the plant. To provide real-time features for the MACS-based LFFC system, the open robot control software (OROCOS) has been employed as development and runtime environment. A case study using a simulated linear motor in the presence of nonlinear cogging and friction force as well as mass variations is used to illustrate the proposed method. A MACS-based LFFC system has been designed and implemented for the simulated plant. The system consists of a setpoint generator, a feedback controller, and a time-index LFFC that can learn on-line. Simulation results have demonstrated the applicability of the design method.


1989 ◽  
Vol 17 (2) ◽  
pp. 172-182
Author(s):  
Steven R. Vegdahl ◽  
Uwe F. Pleban
Keyword(s):  

2003 ◽  
Vol 127 (8) ◽  
pp. 1019-1025 ◽  
Author(s):  
James H. Harrison ◽  
Jimmie Stewart

Abstract Context.—Pathology informatics is generally recognized as an important component of pathology training, but the scope, form, and goals of informatics training vary substantially between pathology residency programs. The Training and Education Committee of the Association for Pathology Informatics (API TEC) has developed a standard set of knowledge and skills objectives that are recommended for inclusion in pathology informatics training and may serve to standardize and formalize training programs in this area. Objective.—The University of Pittsburgh (Pittsburgh, Pa) core rotation in pathology informatics includes most of these goals and is offered as an implementation model for pathology informatics training. Design.—The core rotation in pathology informatics is a 3-week, full-time rotation including didactic sessions and hands-on laboratories. Topics include general desktop computing and the Internet, but the primary focus of the rotation is vocabulary and concepts related to enterprise and pathology information systems, pathology practice, and research. The total contact time is 63 hours, and a total of 19 faculty and staff contribute. Pretests and posttests are given at the start and end of the rotation. Performance and course evaluation data were collected for 3 years (a total of 21 residents). Results.—The rotation implements 84% of the knowledge objectives and 94% of the skills objectives recommended by the API TEC. Residents scored an average of about 20% on the pretest and about 70% on the posttest for an average increase during the course of 50%. Posttest scores did not correlate with pretest scores or self-assessed computer skill level. The size of the pretest/posttest difference correlated negatively with the pretest scores and self-assessed computing skill level. Conclusions.—Pretest scores were generally low regardless of whether residents were familiar with desktop computing and productivity applications, indicating that even residents who are computer “savvy” have limited knowledge of pathology informatics topics. Posttest scores showed that all residents' knowledge increased substantially during the course and that residents who were computing novices were not disadvantaged. In fact, novices tended to have higher pretest/posttest differences, indicating that the rotation effectively supported initially less knowledgeable residents in “catching up” to their peers and achieving an appropriate competency level. This rotation provides a formal training model that implements the API TEC recommendations with demonstrated success.


Sensors ◽  
2018 ◽  
Vol 18 (11) ◽  
pp. 3807 ◽  
Author(s):  
Haonan Sun ◽  
Rongyu He ◽  
Yong Zhang ◽  
Ruiyun Wang ◽  
Wai Hung Ip ◽  
...  

Today cloud computing is widely used in various industries. While benefiting from the services provided by the cloud, users are also faced with some security issues, such as information leakage and data tampering. Utilizing trusted computing technology to enhance the security mechanism, defined as trusted cloud, has become a hot research topic in cloud security. Currently, virtual TPM (vTPM) is commonly used in a trusted cloud to protect the integrity of the cloud environment. However, the existing vTPM scheme lacks protections of vTPM itself at a runtime environment. This paper proposed a novel scheme, which designed a new trusted cloud platform security component, ‘enclave TPM (eTPM)’ to protect cloud and employed Intel SGX to enhance the security of eTPM. The eTPM is a software component that emulates TPM functions which build trust and security in cloud and runs in ‘enclave’, an isolation memory zone introduced by SGX. eTPM can ensure its security at runtime, and protect the integrity of Virtual Machines (VM) according to user-specific policies. Finally, a prototype for the eTPM scheme was implemented, and experiment manifested its effectiveness, security, and availability.


Author(s):  
Anton Michlmayr ◽  
Florian Rosenberg ◽  
Philipp Leitner ◽  
Schahram Dustdar

In general, provenance describes the origin and well-documented history of a given object. This notion has been applied in information systems, mainly to provide data provenance of scientific workflows. Similar to this, provenance in Service-oriented Computing has also focused on data provenance. However, the authors argue that in service-centric systems the origin and history of services is equally important. This paper presents an approach that addresses service provenance. The authors show how service provenance information can be collected and retrieved, and how security mechanisms guarantee integrity and access to this information, while also providing user-specific views on provenance. Finally, the paper gives a performance evaluation of the authors’ approach, which has been integrated into the VRESCo Web service runtime environment.


Sign in / Sign up

Export Citation Format

Share Document