Spelling suggestions: "subject:"isi"" "subject:"iss""
111 |
A Platform for reliable computing on clusters using group communications.Rough, Justin, mikewood@deakin.edu.au January 2001 (has links)
Shared clusters represent an excellent platform for the execution of parallel applications given their low price/performance ratio and the presence of cluster infrastructure in many organisations. The focus of recent research efforts are on parallelism management, transport and efficient access to resources, and making clusters easy to use. In this thesis, we examine reliable parallel computing on clusters. The aim of this research is to demonstrate the feasibility of developing an operating system facility providing transport fault tolerance using existing, enhanced and newly built operating system services for supporting parallel applications. In particular, we use existing process duplication and process migration services, and synthesise a group communications facility for use in a transparent checkpointing facility. This research is carried out using the methods of experimental computer science.
To provide a foundation for the synthesis of the group communications and checkpointing facilities, we survey and review related work in both fields. For group communications, we examine the V Distributed System, the x-kernel and Psync, the ISIS Toolkit, and Horus. We identify a need for services that consider the placement of processes on computers in the cluster. For Checkpointing, we examine Manetho, KeyKOS, libckpt, and Diskless Checkpointing. We observe the use of remote computer memories for storing checkpoints, and the use of copy-on-write mechanisms to reduce the time to create a checkpoint of a process.
We propose a group communications facility providing two sets of services: user-oriented services and system-oriented services. User-oriented services provide transparency and target application. System-oriented services supplement the user-oriented services for supporting other operating systems services and do not provide transparency. Additional flexibility is achieved by providing delivery and ordering semantics independently.
An operating system facility providing transparent checkpointing is synthesised using coordinated checkpointing. To ensure a consistent set of checkpoints are generated by the facility, instead of blindly blocking the processes of a parallel application, only non-deterministic events are blocked. This allows the processes of the parallel application to continue execution during the checkpoint operation. Checkpoints are created by adapting process duplication mechanisms, and checkpoint data is transferred to remote computer memories and disk for storage using the mechanisms of process migration. The services of the group communications facility are used to coordinate the checkpoint operation, and to transport checkpoint data to remote computer memories and disk.
Both the group communications facility and the checkpointing facility have been implemented in the GENESIS cluster operating system and provide proof-of-concept. GENESIS uses a microkernel and client-server based operating system architecture, and is demonstrated to provide an appropriate environment for the development of these facilities.
We design a number of experiments to test the performance of both the group communications facility and checkpointing facility, and to provide proof-of-performance. We present our approach to testing, the challenges raised in testing the facilities, and how we overcome them. For group communications, we examine the performance of a number of delivery semantics. Good speed-ups are observed and system-oriented group communication services are shown to provide significant performance advantages over user-oriented semantics in the presence of packet loss. For checkpointing, we examine the scalability of the facility given different levels of resource usage and a variable number of computers. Low overheads are observed for checkpointing a parallel application.
It is made clear by this research that the microkernel and client-server based cluster operating system provide an ideal environment for the development of a high performance group communications facility and a transparent checkpointing facility for generating a platform for reliable parallel computing on clusters.
|
112 |
Fertility goddesses from the Ancient Near EastRoux, Wanda 03 1900 (has links)
The purpose of this study is to illustrate the role of fertility goddesses in the lives and beliefs of the people of the Ancient Near East. Artefacts from the late Paleolithic period were crude female figures of pregnant women representing fertility. A mother goddess was specified as the giver and taker of life and vegetation. The polytheism of pre-exilic Israel that existed proves that not only Yahweh but also other gods existed.
In the creation stories of the Ancient Near East, creation myths played a major role; in the
Ugaritic myths the universe was ruled by powerful deities, and their presence could be felt in rain, vegetation and crops. Fertility cults were the force in their worship. Cultic sites
associated with deities were often located in groves of trees, which made them sacred to the people. There was a close relationship between tree and tree figures, as well as gods and goddess images. / Biblical and Ancient Studies / M.A. (Biblical Archaeology)
|
113 |
Konsolidace systémů správy identifikačních karet v prostředí VŠE v Praze / Harmonisation of Identification Card Management Systems at the University of Economics, PragueŘíha, Jan January 2010 (has links)
This thesis deals with problems of identification cards at the University of Economics, Prague. Its primary goal is to consider and evaluate the possibility of a transfer of the ID card management into the ISIS system. The thesis consists of four parts. The first one offers a complex analysis of the ID card management at the University. The second one analyses two ID card management systems: the NESA system, which is being used at the University now, and the ISIS system, which could also be used for the ID card management. The third part includes a proposal of adjustments in the ISIS system, which would make its ID card management implementation comply with the University's needs. The proposal describes general features of the system, relations to its environs and a graphical user interface. Finally the last part covers the actual state of the project and its differences from the proposal offered in the thesis. Information sources for the thesis were legal norms, University regulations and internal documents as well as the author's knowledge and experience gained through several years of the NESA system maintenance and numerous consultations with the University ID card management staff and ISIS developers. The main assets of this thesis lay in the comprehensive view of the ID card management at the University along with the proposal of the new ID card management system, which is to be integrated into ISIS.
|
114 |
The Impossible Homecoming? : A Study of the Evolution of the French Government’s Discourses on French ISIS Returnees Between 2017 and 2020.Bieber, Hannah January 2021 (has links)
Over 5,000 European citizens joined the ranks of the so-called Islamic State of Iraq and Syria (ISIS) in the early 2010s. Since the rollback of the terrorist organization in 2016, European Union (EU) member states have had to decide whether or not to repatriate these individuals who were made prisoners mainly by Iraqi, or Kurdish authorities. France, the EU country that saw the highest number of its citizens join ISIS was also directly targeted by terrorist attacks orchestrated by ISIS returnees. From 2017 to 2019, it relied heavily on a non-repatriation approach, a measure which was welcomed by the general public but criticized by human rights and legal experts. However, in 2019, the withdrawal of US troops and the Turkish offensive in North-East Syria have further destabilized the region and pushed the French government to adapt its strategy. This study aims at understanding how the Macron administration legitimized the measures it implemented to tackle the ISIS returnees phenomenon and whether its approach has evolved. Through critical discourse analysis (CDA) and by drawing from the securitization theory, this research investigates the official communications of the French government between 2017 and 2020. The data will reveal that the “low-probability, high impact” threat posed by ISIS returnees has been over-securitized. This might lead an over-perception of this threat, which could threaten the social cohesion of the country and make measures bargaining with human rights and the rule of law acceptable for the public opinion. While many contributions have analyzed the policies and laws related to the issue of ISIS returnees in the EU, few have investigated how states responded to it in their official communications. With a focus on the EU country that has been the most concerned by this phenomenon, this study will help to bridge this gap in knowledge and will have broader implications for discursive practices regarding ISIS returnees and terrorism in Europe and the West.
|
115 |
Sekuritizace veteránského efektu zahraničních bojovníků z řad ISIS v Evropě / Securitization of the Veteran Effect of Foreign Fighters from ISIS in EuropePěčková, Miroslava January 2018 (has links)
The aim of this Master's thesis is to examine the securitization discourse used to construct the security threat coming from the veteran effect of the Islamic State's foreign fighters in Europe, and to see what kind of policies were adopted to counter it so far. The phenomenon of departing European citizens, who are becoming foreign fighters in the Syrian conflict, joining the ranks of the Islamic State, and then return back to their country of origin after having acquired combat experience or other training, has become a hot topic of discussion not only for academics, but also for politicians and ordinary citizens. To precise, this thesis is working with three main case studies, whose securitization discourse and security policies are analysed. These are: European Union, United Kingdom and France. The author was interested in finding out what similarities and differences can be found between the analysed countries, plus, whether there is some pattern of influence between the European Union and its member states in this area. The author of this thesis chose to use a comparative case study as a research design. It is useful to realize a contrast of contexts and therefore to discover specifics of the analysed cases. Two tables were created in order to clarify the operationalization of the analysed...
|
116 |
Shared identity as a cause for rivalry between rebel groups : A comparative case study of the conflict between Ahrar Al-Sham and IS in 2014 and the conflict between Ahrar Al-Sham and the Al Nusra Front in 2017Modig, Karl January 2021 (has links)
The aim of this thesis is to answer the question of why rebel groups engage in conflict with each other despite sharing an identity. Previous research suggests that a shared identity should promote cooperation, but recent conflicts between rebel groups in Syria seem to suggest that shared identity can instead be a cause for rivalry. This thesis investigates this puzzle by using Pischedda’s theory on windows of opportunity and vulnerability and Hafez theory on proxidistant ideologies. The cases of the thesis are the conflicts between Ahrar Al-Sham and IS in 2014 and between Ahrar Al-Sham and the Al Nusra Front in 2017. The results indicate that shared identity does cause rivalry, and both theories receive support for their explanation of inter-rebel conflict. All three rebel groups are labeled as extremists, which supports Hafez theory that extremist groups are more likely to engage in conflict with rivals. The military strength and the possible costs of attack of the rebel groups seem to support Pischedda’s theory that rebel groups use specific windows in time to attack their rivals. There are however some problems that neither theory can explain, such as Ahrar Al-Shams friendly relationship to Al Nusra between 2014 and 2017. This thesis provide insight into the understudied field of inter-rebel conflict of War Studies by highlighting the importance of identity.
|
117 |
Policy Implications of News Media Coverage of the Islamic State of Iraq and Syria.Ababio, Godfred A 01 January 2018 (has links)
The Islamic State of Iraq and Syria (ISIS) garnered global news media attention in Summer 2014 when it seized a significant section of land in Iraq and Syria. The group then mishandled and executed its captives. There is a lack of consensus among the international community, led by Russia and the United States, on how best to address the threat posed by ISIS. An understanding of the function of Russian and U.S. news media coverage of the ISIS threat is an appropriate research topic. The purpose of this qualitative content analysis study was to explore how the U.S, Russian, and Qatari news media represented ISIS between May 1, 2014, and May 1, 2015. The theoretical framework for this study was the agenda-setting theory. The research questions centered on how 3 news media outlets from the 3 countries represented ISIS within this time frame. The study design was a qualitative deductive content analysis with purposeful sampling. Data were coded in a binary manner and analyzed using the data software program Dedoose. Themes identified in the analysis were mitigation, insecurity, foreign fighters, responsibility, and propaganda. The results of this study suggest that there are similarities and differences in Russian, Qatari, and U.S. media outlets' depiction of ISIS between May 1, 2014, and May 1, 2015, which can be explained by agenda-setting theory. The significance of this study is twofold. First, the information arising from the study may influence social change by assisting counterterrorism officials and policy makers in making informed decisions about how to mitigate the ISIS threat. Second, this study contributes to the existing literature on ISIS and its global media representation for future researchers.
|
118 |
The Neglected Facsimile: An Examination and Comparative Study of Facsimile No. 3 of the Book of AbrahamBarney, Quinten Zehn 01 August 2019 (has links)
Facsimile No. 3 of the Book of Abraham contains parallels to other Egyptian throne scenes found elsewhere, which fact has led many to pass Facsimile No. 3 off as commonplace. However, the lack of a broad comparative study examining these types of scenes in their varying contexts has rendered most conclusions regarding Facsimile No. 3 superficial at best. Hugh Nibley was perhaps the first to notice this problem, arguing that "The great abundance of pictures of the Facsimile No. 3 variety calls for the widest possible comparative study. In a case like this the student's first obligation is to compare, as widely and as carefully as possible." This thesis takes a critical step in solving this problem by looking at both the textual and iconographic elements found in Facsimile No.3 and comparing them with the larger corpus of Egyptian texts, temples, tombs, and stelae. Significantly, this study compares Facsimile No. 3 with the throne scenes from every other publicly known copy of the Book of Breathings, the ancient Egyptian document on which Facsimile No. 3 was found.In this thesis, I argue that Facsimile No. 3 is not as commonplace as some scholars have argued in the past. I begin this thesis with an introduction which presents some of the main issues surrounding Facsimile No. 3, including some of the likely reasons as to why it has remained the least studied of the three Facsimiles of the Book of Abraham. The first chapter contains a literature review of the published writings and theories that deal with Facsimile No. 3. Chapter Two gives a closer look at the hieroglyphs of Facsimile No. 3 and discusses some of the challenges relating to the translations that have been offered for them. The iconography of Facsimile No. 3 is discussed in the third chapter, where it is compared with the larger corpus of Book of Breathings vignettes. This discussion is especially important, as it is the first study to date which compares Facsimile No. 3 with the vignettes from all other extant copies of the Book of Breathings. In Chapter Four, this comparative study broadens, and parallels to Facsimile No. 3 are looked for in Ptolemaic copies of the Book of the Dead, Temples, Tombs, and funerary stelae.
|
119 |
Properties of Bright Variable Stars in Unusual Metal Rich Cluster NGC 6388Cardona Velasquez, Gustavo Adolfo 23 June 2011 (has links)
No description available.
|
120 |
A 6-Year Study of Long Period Variable Stars in the Globular Cluster NGC 6388Aljassim, Mohammad A. 02 August 2017 (has links)
No description available.
|
Page generated in 0.0451 seconds