Journal articles on the topic 'Distributed locks'

To see the other types of publications on this topic, follow the link: Distributed locks.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Distributed locks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Huo, Qiu Yan, and Yu Zhang. "Semi-Preemptible Range Lock in Parallel Network File System (pNFS)." Advanced Materials Research 546-547 (July 2012): 1250–55. http://dx.doi.org/10.4028/www.scientific.net/amr.546-547.1250.

Full text
Abstract:
Distributed file systems use file lock mechanism to ensure consistency when the shared data are accessed by multiple nodes. In this paper, using the feature of distributed systems that the same file would be accessed frequently and the advantage of high concurrency of range lock, the semi-preemptible range lock for pNFS is proposed. Clients locally cache the finer-grained locks for ranges of files they hold. Clients retain or cache range locks even without the file instances. When an access lock is cached, a client answers some requests without a server message, improving performance by exploiting locality. Simulation results indicate that the proposed locking mechanism can effectively increase concurrency and decrease the communication cost of pNFS.
APA, Harvard, Vancouver, ISO, and other styles
2

Kvet, Michal. "Concept of Select Unlocking Optimization." IPSI Transactions on Internet Research 19, no. 01 (January 1, 2023): 4–11. http://dx.doi.org/10.58245/ipsi.tir.2301.02.

Full text
Abstract:
Ensuring data integrity stored in a database requires change encapsulation in a transaction. Transaction maintains consistency by shifting the database from one consistent state to another, protected by atomicity, isolation, and durability. This paper focuses on the isolation and parallelism allowing distributed access to the data tuple across multiple transactions. Access to the data tuple is marked by the locks applied on the row level. Locks can be shared expressing data retrieval process or exclusive intended to change the values of the columns. The general locking rule takes the lock before the operation and releases it just after the operation or at the end of the transaction. Oracle database, however, does not release the lock physically, whereas the data block access would be necessary to be reloaded during the transaction approval. Therefore, this paper aims in optimizing the process of unlocking data before the data retrieval process using multiple strategies.
APA, Harvard, Vancouver, ISO, and other styles
3

Johnson, Theodore, and Richard Newman-Wolfe. "A Comparison of Fast and Low Overhead Distributed Priority Locks." Journal of Parallel and Distributed Computing 32, no. 1 (January 1996): 74–89. http://dx.doi.org/10.1006/jpdc.1996.0006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jaber, Nouraldin, Christopher Wagner, Swen Jacobs, Milind Kulkarni, and Roopsha Samanta. "QuickSilver: modeling and parameterized verification for distributed agreement-based systems." Proceedings of the ACM on Programming Languages 5, OOPSLA (October 20, 2021): 1–31. http://dx.doi.org/10.1145/3485534.

Full text
Abstract:
The last decade has sparked several valiant efforts in deductive verification of distributed agreement protocols such as consensus and leader election. Oddly, there have been far fewer verification efforts that go beyond the core protocols and target applications that are built on top of agreement protocols. This is unfortunate, as agreement-based distributed services such as data stores, locks, and ledgers are ubiquitous and potentially permit modular, scalable verification approaches that mimic their modular design. We address this need for verification of distributed agreement-based systems through our novel modeling and verification framework, QuickSilver, that is not only modular, but also fully automated. The key enabling feature of QuickSilver is our encoding of abstractions of verified agreement protocols that facilitates modular, decidable, and scalable automated verification. We demonstrate the potential of QuickSilver by modeling and efficiently verifying a series of tricky case studies, adapted from real-world applications, such as a data store, a lock service, a surveillance system, a pathfinding algorithm for mobile robots, and more.
APA, Harvard, Vancouver, ISO, and other styles
5

Mousavian, Elham, and Claudia Casapulla. "Structurally informed design of interlocking block assemblages using limit analysis." Journal of Computational Design and Engineering 7, no. 4 (April 16, 2020): 448–68. http://dx.doi.org/10.1093/jcde/qwaa038.

Full text
Abstract:
Abstract This paper presents a computational framework to design assemblages of interlocking blocks and to analyze their structural feasibility. The core of this framework is an extension of limit analysis to corrugated interfaces with orthotropic sliding behavior. Such block interfaces are made of a number of locks (i.e. projections on the corrugated faces, locking the blocks together) with rectangular cross section. The sliding resistance at the block interfaces is governed by the shear resistance of the locks and Coulomb’s friction law, normal to and along the locks, respectively. This resistance is assumed as a function of different interface geometric parameters and the stress state on an interface is represented by using a number of contact points distributed over the lock centerlines. The abstraction model has been validated through the comparison of the torsion–shear behavior of an interface obtained by the proposed model and experimental tests reported in the literature. The extended limit analysis has been implemented to model single-layer shells. When the model is infeasible, the geometry of the overall shell, blocks, and interlocking interfaces can be adjusted by the designer to make the model structurally feasible. The performance of the framework is presented through several examples, which demonstrate the relationships between the geometry of the interlocking interfaces and the stability of the assemblages.
APA, Harvard, Vancouver, ISO, and other styles
6

Halici, U., and A. Dogac. "Concurrency control in distributed databases through time intervals and short-term locks." IEEE Transactions on Software Engineering 15, no. 8 (1989): 994–1003. http://dx.doi.org/10.1109/32.31355.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Yu, Qian, Tong Li, Zhong Wen Xie, Na Zhao, and Ying Lin. "Distributed Computing Design Methods for Multicore Application Programming." Advanced Materials Research 756-759 (September 2013): 1295–99. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1295.

Full text
Abstract:
In order to solve the serial execution caused by multithreaded concurrent access to shared data and realize the dynamic load balance of tasks on shared memory symmetric multi-processor (multi-core) computing platform, new design methods are presented. By presenting multicore distributed locks, multicore shared data localization, multicore distributed queue, the new design methods can greatly decrease the number of accessing the shared data and realize the dynamic load balance of tasks. For illustration, design scheme of multicore task manager of server software are given by using new design methods. Results shows the new design methods reduce the number of access shared resources, partially resolve the serial execution of cooperative threads and realize the dynamic task balance of server software, which validate the superiority of this approach.
APA, Harvard, Vancouver, ISO, and other styles
8

ARANTES, LUCIANA, DENIS POITRENAUD, PIERRE SENS, and BERTIL FOLLIOT. "THE BARRIER-LOCK CLOCK: A SCALABLE SYNCHRONIZATION-ORIENTED LOGICAL CLOCK." Parallel Processing Letters 11, no. 01 (March 2001): 65–76. http://dx.doi.org/10.1142/s0129626401000439.

Full text
Abstract:
In this article, we introduce a new logical clock, the barrier-lock clock, whose conception is based on the lazy release consistency memory model (LRC) supported by several distributed shared memory (DSM) systems. Since in the LRC, the propagation of shared memory updates performed by the processes of a parallel application is induced by lock and barrier operations, our logical clock has been modeled on those operations. Each barrier-lock times-tamp encodes the synchronization operation with which it is associated. Its size is not dependent on the number of processes of the system, as the traditional logical vector clocks, but it is proportional to the number of locks. The barrier-lock time characterizes the causality of shared memory updates performed by processes of a parallel application running on a LRC-based DSM system. A formal proof and experimental tests have confirmed such property.
APA, Harvard, Vancouver, ISO, and other styles
9

Ruksasakchai, P., C. E. Cowdell, L. Sanchez, M. Weyland, and M. F. Andersen. "A microcontroller based self-locking laser system." Review of Scientific Instruments 93, no. 4 (April 1, 2022): 043008. http://dx.doi.org/10.1063/5.0087399.

Full text
Abstract:
We present a self-locking laser system that does not require operator interventions. The system automatically finds a desired atomic transition and subsequently locks to it. Moreover, it has the ability to automatically detect if the laser is out of lock and activate the re-locking process. The design was implemented on two different diode lasers, a distributed Bragg reflector (DBR) diode laser and a Fabry Perot (FP) diode laser, used as a repump laser for a magneto-optical trap in a laser cooling experiment and a Raman laser for a four-level Raman transition experiment, respectively. The design relies on frequency modulation transfer spectroscopy to obtain a sub-Doppler atomic spectrum of rubidium-85. This spectrum is then demodulated to obtain zero-crossing linear slopes at the exact points of each atomic and crossover transition. The frequency modulation, the signal analysis, and the automatic locking and re-locking of the lasers are all implemented using an Arduino Due microcontroller. The lock loop has a bandwidth of 7 kHz. The lasers used for the design are characterized, and the robustness of the lock is analyzed. The achieved linewidths of DBR and FP lasers are 1.4 and 5.5 MHz, respectively. The frequency drifts of both lasers are a few 100 kHz over a course of days. The capture range of the locking system is up to 4.9 GHz for the DBR laser and 725 MHz for the FP laser. Both lasers performed well under actual experimental conditions.
APA, Harvard, Vancouver, ISO, and other styles
10

Gu, Yongqiang, Xi Zhang, Huan Yang, and Jianlin Zhang. "Design of Fully Intelligent Quality Error Prevention System for Tobacco Production Line Based on Configuration Software and PLC Program." Journal of Physics: Conference Series 2206, no. 1 (February 1, 2022): 012038. http://dx.doi.org/10.1088/1742-6596/2206/1/012038.

Full text
Abstract:
Abstract Aiming at the problems of wrong brand, mixed batch and wrong transmission of electronic parameter information in the production of cut tobacco of different brands in the tobacco industry, a fully intelligent quality error prevention system based on WinCC configuration software and PLC distributed control program is designed. The information of the production and manufacturing execution system in the general control room and the brand, batch and other information stored in the PLC of the bottom electric control cabinet is compared and verified instead of manual self-inspection. If the information is consistent, production is allowed. Otherwise, the equipment locks itself and sends alarm feedback. The design and application of the system realize the automatic error prevention of process equipment and the implementation accuracy of production control parameters, to ensure that the production process meets the requirements of process technology, effectively avoid major quality accidents, and finally guarantee the product quality.
APA, Harvard, Vancouver, ISO, and other styles
11

HAWRYSZKIEWYCZ, IGOR, DIMITRIS KARAGIANNIS, LESZEK MACIASZEK, and BERND TEUFEL. "RESPONSE — REQUIREMENTS SPECIFIC OBJECT MODEL FOR WORKGROUP COMPUTING." International Journal of Cooperative Information Systems 03, no. 03 (September 1994): 293–318. http://dx.doi.org/10.1142/s021821579400017x.

Full text
Abstract:
Assisted by the client-server architectures, power of contemporary workstations, and new multimedia, database and communication techniques, the workgroup computing (perhaps better known as CSCW — Computer-Supported Cooperative Work) is bound to change the way people in organizations collaborate to achieve common goals. New computer technologies change the way the cooperative work is conducted and they frequently lead to new practices that increase inter-personal productivity and business efficiency. This article defines a conceptual and technological framework for a class of workgroup computing applications characterized by an asynchronous distributed interaction (different-time/different-place) during the development of shared artifacts. The proposed object model is called RESPONSE (REquirements SPecific Object Network System Environment). The model is "requirements specific" as it aims specifically at one, albeit dominant, class of workgroup applications. A particular workgroup application, chosen as representative of our model and used in examples, is the co-authoring of documents. The proposed model determines functions and support required from hardware/ software platforms for workgroup computing. The object database component of such a platform is emphasized. A distributed management of versioned objects using four levels of workspaces is proposed. The model supports long transactions with persistent locks, checkout/checkin of versioned and unversioned objects, social and technical protocols to enhance the cooperation between users, etc. The workgroup interface for the RESPONSE model is also addressed.
APA, Harvard, Vancouver, ISO, and other styles
12

Dekeyser, Stijn. "Guaranteeing Correctness for Collaboration on Documents Using an Optimal Locking Protocol." International Journal of Distributed Systems and Technologies 2, no. 4 (October 2011): 17–29. http://dx.doi.org/10.4018/jdst.2011100102.

Full text
Abstract:
Collaboration on documents has been supported for several decades through a variety of systems and tools; recently a renewed interest is apparent through the appearance of new collaborative editors and applications. Some distributed groupware systems are plug-ins for standalone word processors while others have a purely web-based existence. Most exemplars of the new breed of systems are based on Operational Transformations, although some are using traditional version management tools and still others utilize document-level locking techniques. All existing techniques have their drawbacks, creating opportunities for new methods. The authors present a novel collaborative technique for documents which is based on transactions, schedulers, conflicts, and locks. It is not meant to replace existing techniques; rather, it can be used in specific situations where a strict form of concurrency control is required. While the approach of presentation in this article is highly formal with an emphasis on proving desirable properties such as guaranteed correctness, the work is part of a project which aims to fully implement the technique.
APA, Harvard, Vancouver, ISO, and other styles
13

Alfalouji, Qamar, Thomas Schranz, Alexander Kümpel, Markus Schraven, Thomas Storek, Stephan Gross, Antonello Monti, Dirk Müller, and Gerald Schweiger. "IoT Middleware Platforms for Smart Energy Systems: An Empirical Expert Survey." Buildings 12, no. 5 (April 21, 2022): 526. http://dx.doi.org/10.3390/buildings12050526.

Full text
Abstract:
Middleware platforms are key technology in any Internet of Things (IoT) system, considering their role in managing the intermediary communications between devices and applications. In the energy sector, it has been shown that IoT devices enable the integration of all network assets to one large distributed system. This comes with significant benefits, such as improving energy efficiency, boosting the generation of renewable energy, reducing maintenance costs and increasing comfort. Various existing IoT middlware solutions encounter several problems that limit their performance, such as vendor locks. Hence, this paper presents a literature review and an expert survey on IoT middleware platforms in energy systems, in order to provide a set of tools and functionalities to be supported by any future efficient, flexible and interoperable IoT middleware considering the market needs. The analysis of the results shows that experts currently use the IoT middleware mainly to deploy services such as visualization, monitoring and benchmarking of energy consumption, and energy optimization is considered as a future application to target. Likewise, non-functional requirements, such as security and privacy, play vital roles in the IoT platforms’ performances.
APA, Harvard, Vancouver, ISO, and other styles
14

Skrzypzcak, Jan, and Florian Schintke. "Towards Log-Less, Fine-Granular State Machine Replication." Datenbank-Spektrum 20, no. 3 (October 15, 2020): 231–41. http://dx.doi.org/10.1007/s13222-020-00358-4.

Full text
Abstract:
Abstract State machine replication is used to increase the availability of a service such as a data management system while ensuring consistent access to it. State-of-the-art implementations are based on a command log to gain linear write access to storage and avoid repeated transmissions of large replicas. However, the command log requires non-trivial state management such as allocation and pruning to prevent unbounded growth. By introducing in-place replicated state machines that do not use command logs, the log overhead can be avoided. Instead, replicas agree on a sequence of states, and former states are directly overwritten. This method enables the consistent, fault-tolerant replication of basic data management primitives such as counters, sets, or individual locks with little to no overhead. It matches the properties of fast, byte-addressable, non-volatile memory particularly well, where it is no longer necessary to rely on sequential access for good performance. Our approach is especially well suited for small states and fine-granular distributed data management as it occurs in key-value stores, for example.
APA, Harvard, Vancouver, ISO, and other styles
15

Costa, Joana, and João C. O. Matias. "Open Innovation 4.0 as an Enhancer of Sustainable Innovation Ecosystems." Sustainability 12, no. 19 (October 1, 2020): 8112. http://dx.doi.org/10.3390/su12198112.

Full text
Abstract:
Innovation matters. Business success increasingly depends upon sustainable innovation. Observing recent innovation best practices, the emergence of a new paradigm is traceable. Creating an innovative ecosystem has a multilayer effect: It contributes to regional digitalization, technological start-up emergence, open innovation promotion, and new policy enhancement retro-feeding the system. Public policy must create open innovation environments accordingly with the quintuple helix harmonizing the ecosystem to internalize emerging spillovers. The public sector should enhance the process, providing accurate legal framework, procurement of innovation, and shared risks in R&D. Opening the locks that confine the trunks of community, academic, industry, and government innovation will harness each dimension exploiting collective and collaborative potential of individuals towards a brighter sustainable future. In this sense, the aim of this study is to present how open innovation can enhance sustainable innovation ecosystems and boost the digital transition. For that, firstly, a diachronic perspective of the sustainable innovation ecosystem is traced, its connection to open innovation, and identification of the university linkages. Secondly, database exploration and econometric estimations are performed. Then, we will ascertain how far open innovation frameworks and in particular the knowledge flows unveiled by the university promote smart and responsible innovation cycles. Lastly, we will propose a policy package towards green governance, empowering the university in governance distributed ecosystem, embedded in the community, self-sustained with shared gains, and a meaningful sense of identity.
APA, Harvard, Vancouver, ISO, and other styles
16

Skoba, Andrey, Vladislav Mikhaylov, and Ayesh Achmed Nafea Ayesh. "Model of Optimal Placing of Information Resources Across Nodes of Distributed System of Information Processing of the Enterprise Based on the Three-Level Architecture «Client-Server» with the Influence of Locks." Известия высших учебных заведений. Электромеханика 61, no. 3 (2018): 68–75. http://dx.doi.org/10.17213/0136-3360-2018-3-68-75.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Bowlyn, Kevin, and Sena Hounsinou. "An Improved Distributed Multiplier-Less Approach for Radix-2 FFT." IEEE Letters of the Computer Society 3, no. 2 (July 1, 2020): 54–57. http://dx.doi.org/10.1109/locs.2020.3014354.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Marshall, Lindsay. "The Locus distributed system architecture." Microprocessors and Microsystems 10, no. 9 (November 1986): 511. http://dx.doi.org/10.1016/0141-9331(86)90194-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Rosenthal, David S. H., and Daniel L. Vargas. "Distributed Digital Preservation in the Cloud." International Journal of Digital Curation 8, no. 1 (June 14, 2013): 107–19. http://dx.doi.org/10.2218/ijdc.v8i1.248.

Full text
Abstract:
The LOCKSS system is a leading technology in the field of Distributed Digital Preservation. Libraries run LOCKSS boxes to collect and preserve content published on the Web in PC servers with local disk storage. They form nodes in a network that continually audits their content and repairs any damage. Libraries wondered whether they could use cloud storage for their LOCKSS boxes instead of local disks. We review the possible configurations, evaluate their technical feasibility, assess their economic feasibility, report on an experiment in which we ran a production LOCKSS box in Amazon’s cloud service, and describe some simulations of future costs of cloud and local storage. We conclude that current cloud storage services are not cost-competitive with local hardware for long term storage, including for LOCKSS boxes.
APA, Harvard, Vancouver, ISO, and other styles
20

Kennedy, M. "Distributed generation: harder than it looks." Power Engineer 17, no. 1 (2003): 16. http://dx.doi.org/10.1049/pe:20030103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Yao, Nianmin. "The Distributed Lock Scheme in SAN." Journal of Computer Research and Development 42, no. 2 (2005): 338. http://dx.doi.org/10.1360/crad20050223.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Oladimeji, Damilola, Khushi Gupta, Nuri Alperen Kose, Kubra Gundogan, Linqiang Ge, and Fan Liang. "Smart Transportation: An Overview of Technologies and Applications." Sensors 23, no. 8 (April 11, 2023): 3880. http://dx.doi.org/10.3390/s23083880.

Full text
Abstract:
As technology continues to evolve, our society is becoming enriched with more intelligent devices that help us perform our daily activities more efficiently and effectively. One of the most significant technological advancements of our time is the Internet of Things (IoT), which interconnects various smart devices (such as smart mobiles, intelligent refrigerators, smartwatches, smart fire alarms, smart door locks, and many more) allowing them to communicate with each other and exchange data seamlessly. We now use IoT technology to carry out our daily activities, for example, transportation. In particular, the field of smart transportation has intrigued researchers due to its potential to revolutionize the way we move people and goods. IoT provides drivers in a smart city with many benefits, including traffic management, improved logistics, efficient parking systems, and enhanced safety measures. Smart transportation is the integration of all these benefits into applications for transportation systems. However, as a way of further improving the benefits provided by smart transportation, other technologies have been explored, such as machine learning, big data, and distributed ledgers. Some examples of their application are the optimization of routes, parking, street lighting, accident prevention, detection of abnormal traffic conditions, and maintenance of roads. In this paper, we aim to provide a detailed understanding of the developments in the applications mentioned earlier and examine current researches that base their applications on these sectors. We aim to conduct a self-contained review of the different technologies used in smart transportation today and their respective challenges. Our methodology encompassed identifying and screening articles on smart transportation technologies and its applications. To identify articles addressing our topic of review, we searched for articles in the four significant databases: IEEE Xplore, ACM Digital Library, Science Direct, and Springer. Consequently, we examined the communication mechanisms, architectures, and frameworks that enable these smart transportation applications and systems. We also explored the communication protocols enabling smart transportation, including Wi-Fi, Bluetooth, and cellular networks, and how they contribute to seamless data exchange. We delved into the different architectures and frameworks used in smart transportation, including cloud computing, edge computing, and fog computing. Lastly, we outlined current challenges in the smart transportation field and suggested potential future research directions. We will examine data privacy and security issues, network scalability, and interoperability between different IoT devices.
APA, Harvard, Vancouver, ISO, and other styles
23

WATANABE, KENICHI, YOUSUKE SUGIYAMA, TOMOYA ENOKIDO, and MAKOTO TAKIZAWA. "MODERATE CONCURRENCY CONTROL IN DISTRIBUTED OBJECT SYSTEMS." Journal of Interconnection Networks 05, no. 02 (June 2004): 181–91. http://dx.doi.org/10.1142/s021926590400109x.

Full text
Abstract:
Objects are concurrently manipulated only through methods issued by multiple transactions in object-based systems. We first extend traditional read and write lock modes to methods on objects. We newly introduce availability and exclusion types of conflicting relations among methods. Then, we define a partially ordered relation on lock modes showing which modes are stronger than others. We newly propose a moderate concurrency control algorithm. Before manipulating an object through a method, the object is locked in a weaker mode than an intrinsic mode of the method. Then, the lock mode is escalated to the method mode. The weaker the initial mode is, the more concurrency is obtained but the more frequently deadlock occurs.
APA, Harvard, Vancouver, ISO, and other styles
24

Crawford, Megan. "Solo and Distributed Leadership." Educational Management Administration & Leadership 40, no. 5 (September 2012): 610–20. http://dx.doi.org/10.1177/1741143212451175.

Full text
Abstract:
This article discusses solo and distributed leadership. Using the anniversary of Educational Management Administration & Leadership as a focal point, it looks back over the last 40 years of EMAL, using this to frame a wider discussion of the relationship between solo and distributed leadership approaches. It acknowledges other approaches to shared leadership but uses distributed leadership to see how this idea has become part of the rhetoric of both leadership practice and policy. The article then asks what we have learnt from these foci, and where the field might like to look next.
APA, Harvard, Vancouver, ISO, and other styles
25

Lubowich, Yuval, and Gadi Taubenfeld. "On the performance of distributed lock-based synchronization?" ACM SIGOPS Operating Systems Review 45, no. 2 (July 18, 2011): 28–37. http://dx.doi.org/10.1145/2007183.2007187.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Yang, B., and C. D. Mote. "Frequency-Domain Vibration Control of Distributed Gyroscopic Systems." Journal of Dynamic Systems, Measurement, and Control 113, no. 1 (March 1, 1991): 18–25. http://dx.doi.org/10.1115/1.2896350.

Full text
Abstract:
A new method is presented for vibration control of distributed gyroscopic systems. The control is formulated in the Laplace transform domain. The transfer function of a closed-loop system, consisting of the plant, a feedback control law and the dynamics of the sensing and actuation devices, is derived. Stability analyses of the closed-loop system use both the root locus method and the generalized Nyquist criterion. Two stability criteria are obtained. Design of stabilizing controllers is carried out for both colocation and noncolocation of the sensor and actuator. The effects of time-delay and noncolocation of the sensor and actuator on the system stability are analyzed. In addition, the relationship between the root locus method and the generalized Nyquist criterion is discussed.
APA, Harvard, Vancouver, ISO, and other styles
27

Born, Eike. "Analytical performance modelling of lock management in distributed systems." Distributed Systems Engineering 3, no. 1 (March 1996): 68–76. http://dx.doi.org/10.1088/0967-1846/3/1/008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Anita, S. "Security In Distributed Computing: Did You Lock The Door?" IEEE Concurrency 5, no. 3 (July 1997): 76–77. http://dx.doi.org/10.1109/mcc.1997.605924.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Armes, N., and M. Fried. "Surfeit locus gene homologs are widely distributed in invertebrate genomes." Molecular and Cellular Biology 16, no. 10 (October 1996): 5591–96. http://dx.doi.org/10.1128/mcb.16.10.5591.

Full text
Abstract:
The mouse Surfeit locus contains six sequence-unrelated genes (Surf-1 to -6) arranged in the tightest gene cluster so far described for mammals. The organization and juxtaposition of five of the Surfeit genes (Surf-1 to -5) are conserved between mammals and birds, and this may reflect a functional or regulatory requirement for the gene clustering. We have undertaken an evolutionary study to determine whether the Surfeit genes are conserved and clustered in invertebrate genomes. Drosophila melanogaster and Caenorhabditis elegans homologs of the mouse Surf-4 gene, which encodes an integral membrane protein associated with the endoplasmic reticulum, have been isolated. The amino acid sequences of the Drosophila and C. elegans homologs are highly conserved in comparison with the mouse Surf-4 protein. In particular, a dilysine motif implicated in endoplasmic reticulum localization of the mouse protein is conserved in the invertebrate homologs. We show that the Drosophila Surf-4 gene, which is transcribed from a TATA-less promoter, is not closely associated with other Drosophila Surfeit gene homologs but rather is located upstream from sequences encoding a homolog of a yeast seryl-tRNA synthetase protein. There are at least two closely linked Surf-3/rpL7a genes or highly polymorphic alleles of a single Surf-3/rpL7a gene in the C. elegans genome. The chromosomal locations of the C. elegans Surf-1, Surf-3/rpL7a, and Surf-4 genes have been determined. In D. melanogaster the Surf-3/rpL7a, Surf-4, and Surf-5 gene homologs and in C. elegans the Surf-1, Surf-3/rpL7a, Surf-4, and Surf-5 gene homologs are located on completely different chromosomes, suggesting that any requirement for the tight clustering of the genes in the Surfeit locus is restricted to vertebrate lineages.
APA, Harvard, Vancouver, ISO, and other styles
30

Li, Z., J. Möttönen, and M. J. Sillanpää. "A robust multiple-locus method for quantitative trait locus analysis of non-normally distributed multiple traits." Heredity 115, no. 6 (July 15, 2015): 556–64. http://dx.doi.org/10.1038/hdy.2015.61.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Sato, M., K. Ohtomo, T. Daimon, T. Sugiyama, and K. Iijima. "Localization of copper to afferent terminals in rat locus ceruleus, in contrast to mitochondrial copper in cerebellum." Journal of Histochemistry & Cytochemistry 42, no. 12 (December 1994): 1585–91. http://dx.doi.org/10.1177/42.12.7983358.

Full text
Abstract:
We examined copper localization in the locus ceruleus and cerebellum of rat brain by Timm's sulfide-silver staining, as modified by Danscher. Dense silver particles revealing copper localization were observed in sections of the locus ceruleus and cerebellum after pre-treatment with trichloroacetic acid. In the locus ceruleus, copper appeared to be distributed to neuropil rather than glial or neuronal cell bodies, and at the ultrastructural level copper was mainly localized on synaptic membranes of afferent terminals in contact with somatic spines or dendrites of locus ceruleus neurons, whereas copper was distributed to mitochondria in the granular layers of cerebellum and fine, sparse silver particles were observed throughout ependymal cells and epithelial cells of blood vessels. The specific localization of copper to afferent terminals in the locus ceruleus was confirmed by X-ray microanalysis, which showed a significant level of copper, but not zinc, in synaptic membranes. These results suggest a distinct role of copper depending on its regional distribution. Copper or copper protein may be involved in neurotransmission in the locus ceruleus but in mitochondrial activity in the cerebellum.
APA, Harvard, Vancouver, ISO, and other styles
32

Wahab, Bella Mutiara. "PROGRESIFITAS HUKUM PENGEMBALIAN DEVIDEN SAHAM INTERIM PERSEROAN TERBATAS PADA UUPT NO.40 TAHUN 2007." Legal Standing : Jurnal Ilmu Hukum 5, no. 1 (January 23, 2021): 1. http://dx.doi.org/10.24269/ls.v5i1.3552.

Full text
Abstract:
AbstractProgressive law must place the law in a very close position with the law's community or stakeholders. This position is called responsive, progressive law and is always associated with stakeholders' reality and needs to create justice and happiness as law aspired itself. Also, progressive law emphasizes social integration to overcome public moral insularity.Starting from the viewpoint of progressive law, the author looks at the laws and regulations that discuss the return of interim dividends as stated in the Limited Liability Company Law No. 40 of 2007, article 72, article 72 states that companies allow rules related to dividend distribution in a temporary (interim) way. The article is then interpreted as that if the company has positive profits, the company is allowed to distribute dividends before the company closes the book at the end of the year, provided that the board of directors officially announces the distribution with the approval of the GMS that the positive profits obtained by the company before closing the book will come as dividends interim. As a result, the company competes to distribute interim dividends to increase and show its credibility to investors. It was recorded on the Indonesian stock exchange (IDX) that in September 2020, 73 companies distributed interim dividends.However, article 72 paragraph 5 of the Limited Liability Company Law No. 40 of 2007 explains that if after the company distributes interim dividends to shareholders and at the end of the closing of the annual book the company suffers a loss, the shareholders must return the dividends they have received. If the shareholder does not return it, the directors and commissioners are jointly responsible for covering the company's losses.This viewpoint is the basis for finding the location of the value and form of legal progressivity regarding the mechanism of interim share dividends in limited liability companies as stated in UUPT No.40 of 2007 Article 72 using a normative research method with a conceptual approach.
APA, Harvard, Vancouver, ISO, and other styles
33

Obasi, Chukwuemeka, Ikharo A. B., and Victor Oisamoje. "Security in Distributed System: A Review Perspective." International Journal of Latest Technology in Engineering, Management & Applied Science 11, no. 10 (2022): 49–55. http://dx.doi.org/10.51583/ijltemas.2022.111003.

Full text
Abstract:
Computer over the years has grown from single user to multi-user systems and then presently to distributed system, implying that computing resources can be distributed to different host and can be access by multiple users. This scenario is required for horizontally scaling of systems’ requirement against vertical scaling now known as distributed systems, which cannot be improved beyond certain threshold. Security in such a heterogeneous system becomes a paramount issue of concern. This paper looks at distributed system, while highlighting the security challenges inherent in such system and reviewing the various progress in providing solution to the security challenges.
APA, Harvard, Vancouver, ISO, and other styles
34

Geetha, V., and N. Sreenath. "Semantic Multi-granular Lock model for Object Oriented Distributed Systems." International Journal of Information Technology and Computer Science 5, no. 5 (April 1, 2013): 74–84. http://dx.doi.org/10.5815/ijitcs.2013.05.10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Ulusoy†, Özgür. "Lock-Based Concurrency Control in Distributed Real-Time Database Systems." Journal of Database Management 4, no. 2 (April 1993): 3–17. http://dx.doi.org/10.4018/jdm.1993040101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Knottenbelt, W. J., S. Zertal, and P. G. Harrison. "Performance analysis of three implementation strategies for distributed lock management." IEE Proceedings - Computers and Digital Techniques 148, no. 4 (December 1, 2001): 176–87. http://dx.doi.org/10.1049/ip-cdt:20010664.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Fleisch, B. D. "Distributed system V IPC in LOCUS: a design and implementation retrospective." ACM SIGCOMM Computer Communication Review 16, no. 3 (August 1986): 386–96. http://dx.doi.org/10.1145/1013812.18215.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Wang, Gang, Yimeng Yao, Jingtian Wang, Weiye Huo, Guosheng Xu, and Xi Hu. "Layout Design and Verification of a Space Payload Distributed Capture and Lock System." Aerospace 9, no. 7 (June 28, 2022): 345. http://dx.doi.org/10.3390/aerospace9070345.

Full text
Abstract:
In this paper, the mechanism scheme and parametric design of a capture and lock system are studied based on the high reliability of locking systems. By analyzing the workflow and boundary conditions of the capture and lock system, a positioning design is carried out by combining it with the layout of a distributed capture and lock system. Based on the error domain for the passive end in the presence of errors in the manipulator, planning for the capture trajectory and configuration of the design for the active end are carried out. The influence of the passive end on the dynamic performance of the system is comprehensively considered to design the configuration of the passive end. According to the structure of the active end, a mathematical model for the capture and lock mechanism is established, and an analysis of the influence of trajectory parameters on the active end is carried out. The layout design of the capture hook for the active end is carried out based on an analysis of the influence of its layout on posture adjustment. The large-tolerance capability of the system layout is verified with a tolerance simulation analysis and a ground simulation capture test.
APA, Harvard, Vancouver, ISO, and other styles
39

Ebel, Henrik, and Peter Eberhard. "Cooperative transportation: realizing the promises of robotic networks using a tailored software/hardware architecture." at - Automatisierungstechnik 70, no. 4 (March 25, 2022): 378–88. http://dx.doi.org/10.1515/auto-2021-0105.

Full text
Abstract:
Abstract With cooperative transportation, the paper looks at a demanding problem from distributed robotics. At its heart, the proposed transportation scheme uses distributed model predictive control. Yet, distributed control alone does not suffice to solve the task. Thus, also distributed organization, a custom software architecture, simulation, and custom robotic hardware are dealt with, bridging the gap between distributed control theory and practical robotics. The robots are enabled to transport arbitrarily-shaped objects, automatically adapting to changing circumstances and numbers of robots.
APA, Harvard, Vancouver, ISO, and other styles
40

Yoon, Hyuk Jin, Kwang Yong Song, Jung Seok Kim, and Hee Seung Na. "Design of Distributed Brillouin Scattering Sensor System for Structural Health Monitoring." Advanced Materials Research 566 (September 2012): 484–87. http://dx.doi.org/10.4028/www.scientific.net/amr.566.484.

Full text
Abstract:
A fiber optic sensor system based on stimulated Brillouin scattering is realized to measure the strain distribution along the fiber itself as a sensing medium. Prototypes of the system are advanced from the partly integrated system to reinforced cooling system with fully integrated following the schematic diagram which improves the stability of the optical power with polarization maintaining fiber components. Single lock-in detection using optical chopper is used to achieve the high signal to noise ratio. Optical components are separated with optical logger to isolate the heats from electronic components such as electric power, lock-in amplifier, DAQ and lots of controllers. Electronic logger is designed with air cooling system. 3D design of optical and electronic logger is drafted.
APA, Harvard, Vancouver, ISO, and other styles
41

Board, Editorial. "Wizard in Building a Sustainable, Geographically Distributed Dark Archive to Ensure the Long-Term Survival of Web-Based Scholarly Publications." Global Journal of Enterprise Information System 9, no. 2 (June 28, 2017): 132. http://dx.doi.org/10.18311/gjeis/2017/16179.

Full text
Abstract:
CLOCKSS, or Controlled LOCKSS (for Lots of Copies Keep Stuff Safe), runs on LOCKSS technology, but unlike LOCKSS (an open network), CLOCKSS is a closed system. CLOCKSS (Controlled LOCKSS) is a not-for-profit joint venture between the world’s leading academic publishers and research libraries whose mission is to build a sustainable, geographically distributed dark archive with which to ensure the long-term survival of Web-based scholarly publications for the benefit of the greater global research community. CLOCKSS is for the entire world’s benefit. Content no longer available from any publisher (“triggered content”) is available for free. CLOCKSS uniquely assigns this abandoned and orphaned content a Creative Commons license to ensure it remains available forever.
APA, Harvard, Vancouver, ISO, and other styles
42

Koçi, Artur, and Betim Çiço. "Performance Evaluation of the Asymmetric Distributed Lock Management in Cloud Computing." International Journal of Computer Applications 180, no. 49 (June 15, 2018): 35–42. http://dx.doi.org/10.5120/ijca2018917331.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Roesler, M., and W. A. Burkhard. "Semantic lock models in object-oriented distributed systems and deadlock resolution." ACM SIGMOD Record 17, no. 3 (June 1988): 361–70. http://dx.doi.org/10.1145/971701.50246.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Sato, S., C. Ohnishi, Y. Uemoto, and E. Kobayashi. "Haplotype analysis within quantitative trait locus affecting intramuscular fat content on porcine chromosome." Czech Journal of Animal Science 56, No. 12 (December 22, 2011): 521–28. http://dx.doi.org/10.17221/4414-cjas.

Full text
Abstract:
Previous results of fine mapping for quantitative trait loci affecting intramuscular fat content identified a 3.0-Mb chromosome interval on porcine chromosome 7, which contains at least 9 genes, based on the pig genome assembly. Therefore, we proposed these nine genes (LOC100154481, LOC100155711, LOC100155276, SPATA7, PTPN21, ZCH14, EML5, TTC8, and FOXN3) as positional candidate genes. The coding exons of the nine genes were characterized, and 45 polymorphisms were detected in F<sub>2</sub> Duroc &times; Meishan population. Within the nine genes, 10 non-synonymous substitutions and 1 insertion were genotyped among three European breeds (Landrace, Large White, and Duroc) and 1 Chinese breed (Meishan). Genotyping data was used to perform the haplotype analysis. Polymorphisms were found in all the studied genes, except ZCH14. We surveyed the frequency of 33 haplotypes that formed non-synonymous substitutions in four breeds. One of them was distributed widely in the Landrace, Large White, and Meishan breeds, but not in Duroc. Each breed had different major haplotypes. &nbsp;
APA, Harvard, Vancouver, ISO, and other styles
45

Victoria Reich and David Rosenthal. "Distributed Digital Preservation: Private LOCKSS Networks as Business, Social, and Technical Frameworks." Library Trends 57, no. 3 (2009): 461–75. http://dx.doi.org/10.1353/lib.0.0047.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Meddah, Ishak H. A., and Nour El Houda REMIL. "Parallel and Distributed Pattern Mining." International Journal of Rough Sets and Data Analysis 6, no. 3 (July 2019): 1–17. http://dx.doi.org/10.4018/ijrsda.2019070101.

Full text
Abstract:
The treatment of large data is difficult and it looks like the arrival of the framework MapReduce is a solution of this problem. This framework can be used to analyze and process vast amounts of data. This happens by distributing the computational work across a cluster of virtual servers running in a cloud or a large set of machines. Process mining provides an important bridge between data mining and business process analysis. Its techniques allow for extracting information from event logs. Generally, there are two steps in process mining, correlation definition or discovery and the inference or composition. First of all, their work mines small patterns from log traces. Those patterns are the representation of the traces execution from a log file of a business process. In this step, the authors use existing techniques. The patterns are represented by finite state automaton or their regular expression; and the final model is the combination of only two types of different patterns whom are represented by the regular expressions (ab)* and (ab*c)*. Second, they compute these patterns in parallel, and then combine those small patterns using the Hadoop framework. They have two steps; the first is the Map Step through which they mine patterns from execution traces, and the second one is the combination of these small patterns as a reduce step. The results show that their approach is scalable, general and precise. It minimizes the execution time by the use of the Hadoop framework.
APA, Harvard, Vancouver, ISO, and other styles
47

Mathews, Debra J., Carl Kashuk, Gale Brightwell, Evan E. Eichler, and Aravinda Chakravarti. "Sequence Variation Within the Fragile X Locus." Genome Research 11, no. 8 (August 1, 2001): 1382–91. http://dx.doi.org/10.1101/gr.172601.

Full text
Abstract:
The human genome provides a reference sequence, which is a template for resequencing studies that aim to discover and interpret the record of common ancestry that exists in extant genomes. To understand the nature and pattern of variation and linkage disequilibrium comprising this history, we present a study of ∼31 kb spanning an ∼70 kb region of FMR1, sequenced in a sample of 20 humans (worldwide sample) and four great apes (chimp, bonobo, and gorilla). Twenty-five polymorphic sites and two insertion/deletions, distributed in 11 unique haplotypes, were identified among humans. Africans are the only geographic group that do not share any haplotypes with other groups. Parsimony analysis reveals two main clades and suggests that the four major human geographic groups are distributed throughout the phylogenetic tree and within each major clade. An African sample appears to be most closely related to the common ancestor shared with the three other geographic groups. Nucleotide diversity, π, for this sample is 2.63 ± 6.28 × 10−4. The mutation rate, μ, is 6.48 × 10−10 per base pair per year, giving an ancestral population size of ∼6200 and a time to the most recent common ancestor of ∼320,000 ± 72,000 per base pair per year. Linkage disequilibrium (LD) at the FMR1 locus, evaluated by conventional LD analysis and by the length of segment shared between any two chromosomes, is extensive across the region.
APA, Harvard, Vancouver, ISO, and other styles
48

Bourguet, Rémi, George Em Karniadakis, and Michael S. Triantafyllou. "Distributed lock-in drives broadband vortex-induced vibrations of a long flexible cylinder in shear flow." Journal of Fluid Mechanics 717 (February 1, 2013): 361–75. http://dx.doi.org/10.1017/jfm.2012.576.

Full text
Abstract:
AbstractA slender flexible body immersed in sheared cross-flow may exhibit vortex-induced vibrations (VIVs) involving a wide range of excited frequencies and structural wavenumbers. The mechanisms of broadband VIVs of a cylindrical tensioned beam of length-to-diameter aspect ratio 200 placed in shear flow, with an exponentially varying profile along the span, are investigated by means of direct numerical simulation. The Reynolds number is equal to 330 based on the maximum velocity, for comparison with previous work on narrowband vibrations in linear shear flow. The flow is found to excite the structure at a number of different locations under a condition of wake–body synchronization, or lock-in. Broadband responses are associated with a distributed occurrence of the lock-in condition along the span, as opposed to the localized lock-in regions limited to the high inflow velocity zone, reported for narrowband vibrations in sheared current. Despite the instantaneously multi-frequency nature of broadband responses, the lock-in phenomenon remains a locally mono-frequency event, since the vortex formation is generally synchronized with a single vibration frequency at a given location. The spanwise distribution of the excitation zones induces travelling structural waves moving in both directions; this contrasts with the narrowband case where the direction of propagation toward decreasing inflow velocity is preferred. A generalization of the mechanism of phase-locking between the in-line and cross-flow responses is proposed for broadband VIVs under the lock-in condition. A spanwise drift of the in-line/cross-flow phase difference is identified for the high-wavenumber vibration components; this drift is related to the strong travelling wave character of the corresponding structural waves.
APA, Harvard, Vancouver, ISO, and other styles
49

Yu, Deliang, Wensong Wang, Huibo Zhang, and Dongyue Xu. "Research on Anti-Lock Braking Control Strategy of Distributed-Driven Electric Vehicle." IEEE Access 8 (2020): 162467–78. http://dx.doi.org/10.1109/access.2020.3021193.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Jeong, Bodon, Awais Khan, and Sungyong Park. "Async-LCAM: a lock contention aware messenger for Ceph distributed storage system." Cluster Computing 22, no. 2 (July 24, 2018): 373–84. http://dx.doi.org/10.1007/s10586-018-2832-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography