Using Linux PCs in DAQ applications
نویسندگان
چکیده
منابع مشابه
Using Linux Containers in Telecom Applications
Container Technology is one of the most hyped virtualization technologies in the last couple of years. It enables not only higher application density on the same HW environment compared to hypervisor-based technologies but it also gives performance benefits regarding to starting and stopping applications. Container technologies are not new, but more recently an entire ecosystem has been built a...
متن کاملTurbo Codes for PCS Applications
Turbo codes are the most exciting and potentially important development in coding theory in many years. They were introduced in 1993 by Berrou, Glavieux and Thitimajshima [1], and claimed to achieve near Shannon-limit error correction performance with relatively simple component codes and large interleavers. A required Eb/No of 0.7 dB was reported for BER of 10−5 and code rate of 1/2 [1]. Howev...
متن کاملLinux in Safety-Critical Applications
Modern society depends on a range of systems that need to guarantee the safety of their users and the environment. Therefore it is crucial which operating system is used for such safety-critical systems. This thesis examines the potential use of the operating system kernel Linux, and the GNU/Linux operating system for safety-critical systems. To gain confidence that GNU/Linux can be used as a p...
متن کاملApplications of CORBA in the Atlas prototype DAQ
This paper prescnts tlic cxpericnce of using the Common Object Requcst Broker Architecture (CORBA)[ I] in tlic ATLAS prototype DAQ project[2]. Many coiiiniunication links in the DAQ systcm have been dcsigned and implcmentcd using thc CORBA standard. A public domain package, callcd Inter-Language Unification (ILU)[3] has bccn used to implement C O R M based communications between DAQ componcnts ...
متن کاملIntrusion Detection System for Applications Using Linux Containers
Linux containers are gaining increasing traction in both individual and industrial use, and as these containers get integrated into mission-critical systems, real-time detection of malicious cyber attacks becomes a critical operational requirement. This paper introduces a realtime host-based intrusion detection system that can be used to passively detect malfeasance against applications within ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Nuclear Science
سال: 2000
ISSN: 0018-9499,1558-1578
DOI: 10.1109/23.846127