WorldWideScience

Sample records for addresses

  1. IP Addressing

    2006-01-01

    tut quiz anim This interactive tutorial covers the following: The concept of halving a binary number space., Using the halving concept to explain how the Internet IP space is segmented into the A, B, and C address classifications., How the first octet ranges for the A, B, and C IP space are produced.In this tutorial, explanations are illustrated by simple animations. Students are asked to observe number patterns, and check their observations against automated 'answers.' There is a qu...

  2. Inaugural Address

    Syed Yousaf Raza Gilani

    2008-01-01

    Sardar Aseff Ahmad Ali, Deputy Chairman, Planning Commission, Dr Rashid Amjad, President, Pakistan Society of Development Economists, Honourable Ministers, Excellencies, Ladies and Gentlemen! It is indeed a privilege and honour to address this distinguished gathering of economists. I am very happy that this meeting is being attended by internationally acclaimed economists and academics from both within and outside the country. I am especially heartened to see that students of economics from a...

  3. Keynote address

    This paper addresses various aspects of the bases underlying the nuclear third party liability regime, and also analyses the distinction between danger and risk and the manner in which damage caused by flood, mass unemployment (economic damage mainly) and certain diseases is dealt with in the absence of liability provisions similar to those applicable to nuclear incidents. It also is suggested that the State because of its duty under the Basic Law to ensure adequate energy supplies, should be co-responsible for liability questions along with the nuclear operator. (NEA)

  4. Welcome Address

    2001-01-01

    @@  On behalf of the International Life Sciences Institute, I welcome you to Beijing and to the Third Asian Conference on Food Safety and Nutrition. Many of you will remember the first Asian conference on Food Safety held in Kuala Lumpur in 1990 and the second held in Bangkok in 1994. These meetings have been so successful that ILSI made the commitment to host such a conference periodically in order to provide a forum to share the latest information and to set new goals and priorities.   This year, we have broadened the scope of the agenda to include issues on nutrition. I want to thank all of our co-sponsors and members of the Planning Committee for preparing such a comprehensive and timely program. Some of the issues and challenges facing Asia that will be addressed at this meeting are:

  5. Opening address

    The impact of the Chernobyl accident on health has been dramatic but different than expected. It has posed a tremendous health, social and economic burden on the people of Belarus, the Russian Federation and Ukraine. Now the picture of the impact of the accident on health and environment is clearer and the agenda can further move towards development and focused health programmes. The work of the Chernobyl Forum, which allowed this important objective to be reached, is an example of the multiplied added value that different United Nations agencies working together can achieve when addressing complex problems affecting large communities in an independent, comprehensive and credible way. This model should be the basis for future action with the Member States towards reconstruction, development and better health

  6. Inaugural address

    Joshi, P. S.

    2014-03-01

    From jets to cosmos to cosmic censorship P S Joshi Tata Institute of Fundamental Research, Homi Bhabha Road, Colaba, Mumbai 400005, India E-mail: psj@tifr.res.in 1. Introduction At the outset, I should like to acknowledge that part of the title above, which tries to capture the main flavour of this meeting, and has been borrowed from one of the plenary talks at the conference. When we set out to make the programme for the conference, we thought of beginning with observations on the Universe, but then we certainly wanted to go further and address deeper questions, which were at the very foundations of our inquiry, and understanding on the nature and structure of the Universe. I believe, we succeeded to a good extent, and it is all here for you in the form of these Conference Proceedings, which have been aptly titled as 'Vishwa Mimansa', which could be possibly translated as 'Analysis of the Universe'! It is my great pleasure and privilege to welcome you all to the ICGC-2011 meeting at Goa. The International Conference on Gravitation and Cosmology (ICGC) series of meetings are being organized by the Indian Association for General Relativity and Gravitation (IAGRG), and the first such meeting was planned and conducted in Goa in 1987, with subsequent meetings taking place at a duration of about four years at various locations in India. So, it was thought appropriate to return to Goa to celebrate the 25 years of the ICGC meetings. The recollections from that first meeting have been recorded elsewhere here in these Proceedings. The research and teaching on gravitation and cosmology was initiated quite early in India, by V V Narlikar at the Banares Hindu University, and by N R Sen in Kolkata in the 1930s. In course of time, this activity grew and gained momentum, and in early 1969, at the felicitation held for the 60 years of V V Narlikar at a conference in Ahmedabad, P C Vaidya proposed the formation of the IAGRG society, with V V Narlikar being the first President. This

  7. Opening Address

    Yamada, T.

    2014-12-01

    Ladies and Gentlemen, it is my great honor and pleasure to present an opening address of the 3rd International Workshop on "State of the Art in Nuclear Cluster Physics"(SOTANCP3). On the behalf of the organizing committee, I certainly welcome all your visits to KGU Kannai Media Center belonging to Kanto Gakuin University, and stay in Yokohama. In particular, to whom come from abroad more than 17 countries, I would appreciate your participations after long long trips from your homeland to Yokohama. The first international workshop on "State of the Art in Nuclear Cluster Physics", called SOTANCP, was held in Strasbourg, France, in 2008, and the second one was held in Brussels, Belgium, in 2010. Then the third workshop is now held in Yokohama. In this period, we had the traditional 10th cluster conference in Debrecen, Hungary, in 2012. Thus we have the traditional cluster conference and SOTANCP, one after another, every two years. This obviously shows our field of nuclear cluster physics is very active and flourishing. It is for the first time in about 10 years to hold the international workshop on nuclear cluster physics in Japan, because the last cluster conference held in Japan was in Nara in 2003, about 10 years ago. The president in Nara conference was Prof. K. Ikeda, and the chairpersons were Prof. H. Horiuchi and Prof. I. Tanihata. I think, quite a lot of persons in this room had participated at the Nara conference. Since then, about ten years passed. So, this workshop has profound significance for our Japanese colleagues. The subjects of this workshop are to discuss "the state of the art in nuclear cluster physics" and also discuss the prospect of this field. In a couple of years, we saw significant progresses of this field both in theory and in experiment, which have brought better and new understandings on the clustering aspects in stable and unstable nuclei. I think, the concept of clustering has been more important than ever. This is true also in the

  8. Opening address

    Full text: Honourable Representatives of His Majesty King Mohammed VI and of the Government of Morocco, representatives of sponsoring organizations, distinguished participants, on behalf of the Director General of the IAEA, it is my pleasure and privilege to welcome you to this International Conference on National Infrastructures for Radiation Safety: Towards Effective and Sustainable Systems. I would like to express my sincere appreciation to His Majesty King Mohammed VI for his patronage, to the Government of Morocco and the University Mohammed V, Agdal, for hosting this conference in the beautiful and historic city of Rabat, and to the local organizers for their diligent planning and gracious hospitality. I would also like to thank the four organizations that are co-operating with the IAEA in holding this conference: the World Health Organization, the Pan American Health Organization, the International Labour Organization, the European Commission and the OECD/Nuclear Energy Agency. National infrastructure for radiation safety has emerged as an issue of international concern over the last two decades. Systematic and strategic consideration of infrastructure has become widely recognized as an essential prerequisite for safety. The first IAEA conference to address the topic was in Munich, Germany, in 1990. The 1996 edition of the International Basic Safety Standards for Protection against Ionizing Radiation and for the Safety of Radiation Sources (known as the Basic Safety Standards or BSS) highlighted the issue, and the IAEA's technical co-operation Model Project for Upgrading Radiation Protection Infrastructure was introduced to help address it. The Model Project has helped, and continues to help, more than 85 IAEA Member States to work towards the goal of a radiation safety infrastructure in accordance with the Basic Safety Standards. A great deal has been achieved, but this work is not complete. Furthermore, not all States are members of the IAEA or the Model

  9. Keynote address

    This keynote address describes the reasons why Ontario restructured its electricity sector to include open market competition. Much effort, time, money and expertise have been devoted to developing the Ontario competitive market. The 1997 White Paper issued by the Ontario Ministry of Energy, Science and Technology was the first paper to express the urgent need for change because the old system was failing. Prices increased by 60 per cent between 1986 and 1993. Although governments imposed a price freeze, it is recognized that such prices freezes cannot be sustained. Between 1980 and 1986, Ontario Hydro's debt rose from $12 billion to over $30 billion. The cause was attributed to poor business performance which was putting the taxpayers at risk. The author states that the potential and social benefits of competitive electricity markets are significant. Opening the power markets improves the efficiency of electricity systems and offers significant benefits. It is noted that restructuring does not mean deregulation. The Ontario Energy Board and the Independent Market Operator continue to regulate the market to ensure its proper operation and to protect consumers. In a properly functioning competitive market, prices change in response to market conditions. Electricity prices have generally declined where competitive markets have been introduced in other jurisdictions around the world. The author also cautions that it is easy to create unfounded fears about a competitive market and cited California as an example. California's problems arose from a lack of generating capacity, regulation which discouraged new power generation, inadequate transmission capacity, lack of snow in the northeast where hydropower is produced, and a consumer price cap that encouraged power consumption at a time when supply was short. The author notes that these factors do not exist in Ontario and that the competitive market should not be abandoned

  10. Keynote address

    DOE biomass R ampersand D programs have the potential to provide America with both plentiful, clean-burning domestic transportation fuels and cost-competitive industrial and utility fuels, benefiting energy security in the United States. Biofuels developed under our programs will also help improve air quality, reduce greenhouse gases, reduce the large daily quantities of waste we produce, and revitalize rural America. These research motivations have been documented in the National Energy Strategy. DOE looks forward to expanding its biofuels research program and to forging a partnership with private sector for cost-shared commercialization of new fuels and vehicle technologies. Many alternative fuels (e.g., ethanol, methanol, compressed natural gas, propane, or electricity) are candidates for gaining market share. Indeed, there may be significant regional variation in the future fuel mix. Alcohol fuels from biomass, particularly ethanol, have the potential to make a major contribution. Currently, ethanol in the United States is almost entirely made from corn; and the limitations of that process are well known (e.g., costly feedstock, end product requiring subsidy to be competitive, use of fossil fuels in renewable feedstock production and processing, and potential adverse impact of corn ethanol production on the price of food). To address these concerns, the DOE biofuels program is pursuing an ambitious research program to develop the technologies needed to convert these crops into alternative transportation fuels, primarily cellulose-based ethanol and methanol. Program R ampersand D has reduced the estimated cost per gallon of cellulose-based ethanol from $3.60 in 1980 to the current $1.35, with a program goal of $0.60 by the year 2000. DOE is also investigating the thermochemical conversion of biomass to methanol. The program goal is to achieve commercial production of methanol (like ethanol) at the gasoline equivalent of $0.90 per gallon by the year 2000. 4 figs

  11. Opening address

    This opening address covers two main areas: first, a snapshot of the continuing threat and the recent changes having been made to the United Kingdom's counterterrorism structures to respond to it; and second, how the United Kingdom is combating nuclear terrorism through a range of measures covering physical security, decreasing vulnerability to attack and increasing resilience. Combating the threat of nuclear terrorism requires an international effort. Radiological and fissile materials are present throughout the world and, as such, it should be secured wherever it is found. All countries are encouraged to continue to enhance security and protection mechanisms for radiological and fissile material; and to develop contingency plans should the worst happen. The United Kingdom has responded to the very serious and real threat by consolidating and strengthening elements of its counterterrorist planning via the creation in May this year of the Office for Security and Counter-Terrorism (OSCT). These changes have been coupled with an unprecedented level of investment to enable the delivery of the United Kingdom counterterrorist strategy - known as CONTEST - through which we aim to (a) stop terrorist attacks; (b) where it cannot be stopped, to mitigate its impact; (c) strengthen our overall protection against terrorist attack; (d) stop people becoming terrorists or supporting violent extremism. In the case of radiological and nuclear terrorism, it is not sufficient merely to prepare for such an attack; one must also devote efforts to preventing such attacks in the first instance by intercepting dangerous materials before they reach their intended target; and by strengthening the protection of vulnerable places and detecting or mitigating any devices before they are placed or activated. As such, in terms of the United Kingdom's efforts on radiological and nuclear terrorism, there are three main strands to this work: physical protection of materials including the global

  12. Presidential address.

    Vohra, U

    1993-07-01

    The Secretary of India's Ministry of Health and Family Welfare serves as Chair of the Executive Council of the International Institute for Population Sciences in Bombay. She addressed its 35th convocation in 1993. Global population stands at 5.43 billion and increases by about 90 million people each year. 84 million of these new people are born in developing countries. India contributes 17 million new people annually. The annual population growth rate in India is about 2%. Its population size will probably surpass 1 billion by the 2000. High population growth rates are a leading obstacle to socioeconomic development in developing countries. Governments of many developing countries recognize this problem and have expanded their family planning programs to stabilize population growth. Asian countries that have done so and have completed the fertility transition include China, Japan, Singapore, South Korea, and Thailand. Burma, Malaysia, North Korea, Sri Lanka, and Vietnam have not yet completed the transition. Afghanistan, Bangladesh, Iran, Nepal, and Pakistan are half-way through the transition. High population growth rates put pressure on land by fragmenting finite land resources, increasing the number of landless laborers and unemployment, and by causing considerable rural-urban migration. All these factors bring about social stress and burden civic services. India has reduced its total fertility rate from 5.2 to 3.9 between 1971 and 1991. Some Indian states have already achieved replacement fertility. Considerable disparity in socioeconomic development exists among states and districts. For example, the states of Bihar, Madhya Pradesh, Rajasthan, and Uttar Pradesh have female literacy rates lower than 27%, while that for Kerala is 87%. Overall, infant mortality has fallen from 110 to 80 between 1981 and 1990. In Uttar Pradesh, it has fallen from 150 to 98, while it is at 17 in Kerala. India needs innovative approaches to increase contraceptive prevalence rates

  13. Opening address

    and become more technical. Involving experts from all fields is then crucial for success. This perception is reflected in the goals of this meeting. It is designed as an extensive information exchange forum between decision makers, regulators, radiation and waste safety specialists, and the nuclear industry. It is this mix which promises high efficiency with respect to solving the problems that you are addressing. I am sure that the safe termination of practices involving radioactive materials during the decommissioning of nuclear installations is one of the major challenges that industrialized nations will have to face during the next decades

  14. Welcome Address

    Kiku, H.

    2014-12-01

    Ladies and Gentlemen, It is an honor for me to present my welcome address in the 3rd International Workshop on "State of the Art in Nuclear Cluster Physics"(SOTANCP3), as the president of Kanto Gakuin University. Particularly to those from abroad more than 17 countries, I am very grateful for your participation after long long trips from your home to Yokohama. On the behalf of the Kanto Gakuin University, we certainly welcome your visit to our university and stay in Yokohama. First I would like to introduce Kanto Gakuin University briefly. Kanto Gakuin University, which is called KGU, traces its roots back to the Yokohama Baptist Seminary founded in 1884 in Yamate, Yokohama. The seminary's founder was Albert Arnold Bennett, alumnus of Brown University, who came to Japan from the United States to establish a theological seminary for cultivating and training Japanese missionaries. Now KGU is a major member of the Kanto Gakuin School Corporation, which is composed of two kindergartens, two primary schools, two junior high schools, two senior high schools as well as KGU. In this university, we have eight faculties with graduate school including Humanities, Economics, Law, Sciences and Engineering, Architecture and Environmental Design, Human and Environmental Studies, Nursing, and Law School. Over eleven thousands students are currently learning in our university. By the way, my major is the geotechnical engineering, and I belong to the faculty of Sciences and Engineering in my university. Prof. T. Yamada, here, is my colleague in the same faculty. I know that the nuclear physics is one of the most active academic fields in the world. In fact, about half of the participants, namely, more than 50 scientists, come from abroad in this conference. Moreover, I know that the nuclear physics is related to not only the other fundamental physics such as the elementary particle physics and astrophysics but also chemistry, medical sciences, medical cares, and radiation metrology

  15. Opening address

    The opening address by the host country started by thanking to the International Atomic Energy Agency for holding this important scientific event in in Morocco. The themes to be considered by this conference are among the priorities of the Scientific Research Department in its endeavour to promote scientific research in the field of nuclear science and technology for peaceful uses in Morocco. By so doing, this Department is following and supporting the efforts being made by our country to provide training, and elaborate rules and regulations, and to create infrastructure, acquire material and, equipment and encourage qualified and active researchers. Hence, the convening of this conference responds to a strategic interest of our country, which, similar to other countries, is committed to the achievement of comprehensive and sustainable development for the protection of human kind and the environment. This is considered nowadays as a strategic and vital objective as it entails the protection of people from radiation and against all kinds of professional risks and health hazards. Morocco attaches great importance to radiation safety issues. Our country adhered to all international conventions related to nuclear safety. It is in the process of adapting its internal regulations to international norms and standards, and it is making progress towards the establishment of a national safety body which meets those norms and standards, with the assistance of the IAEA. For this purpose, a standing committee for the follow-up of nuclear affairs has been created on the basis of Royal Instructions, and placed under the authority of the Prime Minister. Its task is to serve as a think-tank on nuclear safety issues and to make proposals on ways and means of reinforcing radiation safety measures. It goes without saying that the peaceful uses of nuclear energy must meet the safety standards elaborated by the IAEA. However, we are convinced that the elaboration of safety standards

  16. Opening address

    Nuclear terrorism has been recognized as a potential threat to human security and economic prosperity since at least the 1970s. Evidence of Al Qaeda's interest in acquiring nuclear material came to light during the 1990s. However, it is since the attacks of 11 September 2001 that the risk of nuclear terrorist acts has come to be a widespread public and governmental concern, for understandable reasons, and that efforts to combat illicit trafficking, which could lead to nuclear or other radioactive materials falling into the hands of terrorists, have intensified. Six years on, it makes sense to take stock of what has been achieved in the combat to stem illicit trafficking and of where further actions - actions of individual States and cooperative international actions - might usefully be initiated. The IAEA has maintained an Illicit Trafficking Database since 1995. Information reported to this database confirms that concerns about illicit trafficking in nuclear material are justified. Database information points to persistent theft and loss of radioactive sources. States' international obligations relevant to international nuclear trafficking are based on the Convention on the Physical Protection of Nuclear Material (CPPNM), the International Convention for the Suppression of Acts of Nuclear Terrorism, the United Nations Security Council Resolution 1540, which deals with weapons of mass destruction, including nuclear weapons and non-State actors, and the United Nations Security Council Resolution 1375, which requires all States to take the necessary steps to prevent the commission of terrorist acts, including early warning to other States. In addition to these legally binding instruments, there is the non-binding Code of Conduct on the Safety and Security of Radioactive Sources, which Member States of the IAEA agreed in 2003. The Code addresses the establishment of an adequate system of regulatory control, from the production of radioactive sources to their final

  17. Opening address

    Being fully aware of the IAEA's central and important roles in the field of nuclear security, Japan has cooperated closely with the IAEA in the field of nuclear security. One of Japan's efforts was holding a seminar on strengthening nuclear security in Asian countries in November 2006, making use of Japan's contribution to the IAEA Nuclear Security Fund. The seminar was organized for the first time in Asia to address nuclear security matters, in which more than 100 experts from 19 countries participated. Japan also hosted a seminar, aimed at promoting the accession to the international counterterrorism conventions and protocols, inviting government officials and experts from Asia Pacific countries. At the seminar, Japan presented its experience and lessons learned with regard to its ratification of relevant international conventions such as the International Convention for the Suppression of Acts of Nuclear Terrorism and the Convention on the Physical Protection of Nuclear Material. Japan has also provided assistance for capacity building in the field of physical protection measures, and is preparing three projects for Asian countries through the IAEA Nuclear Security Fund. In Thailand, Japan has a project aimed at improving physical protection of nuclear research facilities. In Vietnam, Japan plans to host a workshop on radiation detection equipment for border officials and is also preparing for a seminar aimed at capacity building of control on nuclear material in Vietnam. Japan is committed to continue its efforts to make the IAEA Comprehensive Safeguards Agreement together with an Additional Protocol the universally accepted verification standard for the peaceful use undertakings of the Nuclear Non-Proliferation Treaty. Japan's basic policy on bilateral nuclear cooperation agreements is as follows. Considering the dual nature of nuclear material and technology, Japan is of the view that three Ss, that is, S for 'safeguards' (non-proliferation), S for 'safety

  18. Address Points - Volusia County Addresses (Point)

    NSGIC GIS Inventory (aka Ramona) — Situs Addresses for Volusia County. Maintained by Growth and Resource Management. Addresses are determined by the cities for their jurisdiction and by the County...

  19. Allegheny County Address Points

    Allegheny County / City of Pittsburgh / Western PA Regional Data Center — This dataset contains address points which represent physical address locations assigned by the Allegheny County addressing authority. Data is updated by County...

  20. Reach Address Database (RAD)

    U.S. Environmental Protection Agency — The Reach Address Database (RAD) stores the reach address of each Water Program feature that has been linked to the underlying surface water features (streams,...

  1. Addressivity in cogenerative dialogues

    Hsu, Pei-Ling

    2014-03-01

    Ashraf Shady's paper provides a first-hand reflection on how a foreign teacher used cogens as culturally adaptive pedagogy to address cultural misalignments with students. In this paper, Shady drew on several cogen sessions to showcase his journey of using different forms of cogens with his students. To improve the quality of cogens, one strategy he used was to adjust the number of participants in cogens. As a result, some cogens worked and others did not. During the course of reading his paper, I was impressed by his creative and flexible use of cogens and at the same time was intrigued by the question of why some cogens work and not others. In searching for an answer, I found that Mikhail Bakhtin's dialogism, especially the concept of addressivity, provides a comprehensive framework to address this question. In this commentary, I reanalyze the cogen episodes described in Shady's paper in the light of dialogism. My analysis suggests that addressivity plays an important role in mediating the success of cogens. Cogens with high addressivity function as internally persuasive discourse that allows diverse consciousnesses to coexist and so likely affords productive dialogues. The implications of addressivity in teaching and learning are further discussed.

  2. Addressing the nuclear misconception

    There is a perception, fostered and encouraged by the anti-nuclear groups, that the nuclear industry generates large quantities of waste with no idea how to deal with it, that it is unsafe, uneconomic, and environmentally damaging. The task is to change these perceptions, by demonstrating that the industry is not a problem in itself, but in fact provides solutions to problems. This paper, while primarily concerned with waste, addresses all of these issues as each has a bearing on the perception of the industry and therefore must be considered when addressing the issue of waste. The paper concludes that evidence exists to support the industry view, but that the mission of the industry should be to change the perception of the industry, by influencing and working together with its stake holders to address their concerns, rather than merely presenting more and more facts. (author)

  3. Addressing the nuclear misconception

    There is a perception, fostered and encouraged by the anti-nuclear groups, that the nuclear industry generates large quantities of waste with no idea how to deal with it, is unsafe, uneconomic, and environmentally damaging. The task of the industry is to change the perception by demonstrating that the industry provides solutions to problems, and is not a problem in itself. This paper, whilst primarily concerned with waste, addresses all of these issues as each has a bearing on the perception of the industry and therefore must be considered when addressing the issue of waste. The paper concludes that evidence exists to support the industry, but that the mission of the industry should be to change the perception of it, by influencing and working together with its stakeholders to address their concerns, rather than merely presenting more and more facts. (author)

  4. Addressing Sexual Harassment

    Young, Ellie L.; Ashbaker, Betty Y.

    2008-01-01

    This article discusses ways on how to address the problem of sexual harassment in schools. Sexual harassment--simply defined as any unwanted and unwelcome sexual behavior--is a sensitive topic. Merely providing students, parents, and staff members with information about the school's sexual harassment policy is insufficient; schools must take…

  5. Bioreactors Addressing Diabetes Mellitus

    Minteer, Danielle M.; Gerlach, Jorg C; Marra, Kacey G.

    2014-01-01

    The concept of bioreactors in biochemical engineering is a well-established process; however, the idea of applying bioreactor technology to biomedical and tissue engineering issues is relatively novel and has been rapidly accepted as a culture model. Tissue engineers have developed and adapted various types of bioreactors in which to culture many different cell types and therapies addressing several diseases, including diabetes mellitus types 1 and 2. With a rising world of bioreactor develop...

  6. Holographic content addressable storage

    Chao, Tien-Hsin; Lu, Thomas; Reyes, George

    2015-03-01

    We have developed a Holographic Content Addressable Storage (HCAS) architecture. The HCAS systems consists of a DMD (Digital Micromirror Array) as the input Spatial Light Modulator (SLM), a CMOS (Complementary Metal-oxide Semiconductor) sensor as the output photodetector and a photorefractive crystal as the recording media. The HCAS system is capable of performing optical correlation of an input image/feature against massive reference data set stored in the holographic memory. Detailed system analysis will be reported in this paper.

  7. Addressing mathematics & statistics anxiety

    Kotecha, Meena

    2015-01-01

    This paper should be of interest to mathematics and statistics educators ranging from pre-university to university education sectors. It will discuss some features of the author’s teaching model developed over her longitudinal study conducted to understand and address mathematics and statistics anxiety, which is one of the main barriers to engaging with these subjects especially in non-specialist undergraduates. It will demonstrate how a range of formative assessments are used to kindle, as w...

  8. Address delivered in Vilnius

    Piłsudski, Józef

    2013-01-01

    Title: Przemówienie w Wilnie 20 kwietnia 1922 roku (Address delivered in Vilnius, 20 April, 1922) Originally published: Pisma-mowy-rozkazy, vol. V, Warsaw, Instytut Józefa Piłsudskiego, 1933, pp. 255–260. Language: PolishThe excerpt used is from the original About the author Józef Piłsudski [1867, Zułów (in the district of Święciany, Lit. Zalave/Švenčionys, present-day Lithuania) – 1935, Warsaw]: politician. Piłsudski was born to a family belonging to the Polish-speaking gentry in the Lithuan...

  9. Conference President's address

    The objective of the Conference is to promote the development of a coherent international policy on the protection of the environment from the effects of ionizing radiation and to foster information exchange on this subject. The organizers, the IAEA in cooperation with United Nations Scientific Committee on the Effects of Atomic Radiation (UNSCEAR), the European Commission (EC) and the International Union of Radioecology (IUR), as well as the hosts of the conference, the Government of Sweden through the Swedish Radiation Protection Authority (SSI), are pleased that so nearly 300 delegates from 53 countries have been nominated by their governments to attend this meeting. Another objective is to discuss the implications of the ICRP's proposal for a framework to assess radiation effects in the environment. A framework for radiological protection of the environment must be practical and simple, as should be international standards for discharges into the environment that take account of such an approach. This is a task for the IAEA, in cooperation with other international organizations. This conference therefore provides an opportunity for you to influence the development of both ICRP and IAEA policy in this area. The background session today will give information on the current situation as well as social and political drivers for change. A number of organizations will provide an insight to the present status of international policies on the radiological protection related to releases to the environment. During the course of the conference, there will be five topical sessions that will cover selected subjects related to protection of the environment, such as stakeholders' views, case studies, approaches for non-radioactive pollutants, the state of current scientific knowledge and, finally, the implications of ICRP proposals for international safety standards. Keynote speakers will address key issues within each topical session, and a rapporteur will summarize the

  10. Observations of IPv6 Addresses

    Malone, David

    2008-01-01

    IPv6 addresses are longer than IPv4 addresses, and are so capable of greater expression. Given an IPv6 address, conventions and standards allow us to draw conclusions about how IPv6 is being used on the node with that address. We show a technique for analysing IPv6 addresses and apply it to a number of datasets. The datasets include addresses seen at a busy mirror server, at an IPv6-enabled TLD DNS server and when running traceroute across the production IPv6 network. The technique quantif...

  11. Port virtual addressing for PC

    Instruments for nuclear signal measurements based on add-on card for a personal computer (PC) are designed often. Then one faces the problem of the addressing of data input/output devices which show an integration level or intelligence that makes the use of several port address indispensable, and these are limited in the PC. The virtual addressing offers the advantage of the occupation of few addresses to accede to many of these devices. The principles of this technique and the appliances of a solution in radiometric in a radiometric card based on programmed logic are discussed in this paper

  12. Reclaiming unused IPv4 addresses

    IT Department

    2016-01-01

    As many people might know, the number of IPv4 addresses is limited and almost all have been allocated (see here and here for more information).   Although CERN has been allocated some 340,000 addresses, the way these are allocated across the site is not as efficient as we would like. As we face an increasing demand for IPv4 addresses with the growth in virtual machines, the IT Department’s Communication Systems Group will be reorganising address allocation during 2016 to make more efficient use of the IPv4 address ranges that have been allocated to CERN. We aim, wherever possible, to avoid giving out fixed IP addresses, and have all devices connected to the campus network obtain an address dynamically each time they connect. As a first stage, starting in February, IP addresses that have not been used for more than 9 months will be reclaimed. No information about the devices concerned will be deleted from LANDB, but a new IP address will have to be requested if they are ever reconnected to t...

  13. An address by AECL's president

    This complete address given by Reid Morden, the President of Atomic Energy of Canada Limited, at the June 1997 meeting of the Canadian Nuclear Association. In his address, Morden discusses Canada's success in at home and abroad. He also corrects myths about nuclear energy

  14. A Life’s Addresses

    Balle, Søren Hattesen

    2006-01-01

    number of different aspects of Koch’s own life such as marijuana, the Italian language, World War Two, etc. In this way, the book quite conventionally inscribes itself in the tradition of post-enlightenment apostrophic poetry as characterized by Culler, just as all its poems belong to the favourite......, are literally troped as and addressed in the manner of so many acquaintances, personal connections, relatives, friends, lovers, and family members in Koch’s life. My main claim is that Koch’s poetics in New Addresses is one that slightly dislocates the romantic dichotomy between the world of things...

  15. Agenda to address climate change

    This document looks at addressing climate change in the 21st century. Topics covered are: Responding to climate change; exploring new avenues in energy efficiency; energy efficiency and alternative energy; residential sector; commercial sector; industrial sector; transportation sector; communities; renewable energy; understanding forests to mitigate and adapt to climate change; the Forest Carbon budget; mitigation and adaptation

  16. Introduction to IP address management

    Rooney, Tim

    2010-01-01

    "The book begins with a basic overview of IP networking, followed by chapters describing each of the three core IPAM technologies: IPv4 and IPv6 addressing, DHCP, and DNS. The next three chapters describe IPAM management techniques and practice, followed by chapters on IPv4-IPv6 co-existence, security and the IPAM business case"--

  17. Keynote Address: Rev. Mark Massa

    Massa, Mark S.

    2011-01-01

    Rev. Mark S. Massa, S.J., is the dean and professor of Church history at the School of Theology and Ministry at Boston College. He was invited to give a keynote to begin the third Catholic Higher Education Collaborative Conference (CHEC), cosponsored by Boston College and Fordham University. Fr. Massa's address posed critical questions about…

  18. Communities Address Barriers to Connectivity.

    Byers, Anne

    1996-01-01

    Rural areas lag behind urban areas in access to information technologies. Public institutions play a critical role in extending the benefits of information technologies to those who would not otherwise have access. The most successful rural telecommunications plans address barriers to use, such as unawareness of the benefits, technophobia, the…

  19. Improved Secure Address Resolution Protocol

    Abhishek Samvedi; Sparsh Owlak; Vijay Kumar Chaurasia

    2014-01-01

    In this paper, an improved secure address resolution protocol is presented where ARP spoofing attack is prevented. The proposed methodology is a centralised methodology for preventing ARP spoofing attack. In the proposed model there is a central server on a network or subnet which prevents ARP spoofing attack.

  20. Addressing the workforce pipeline challenge

    Leonard Bond; Kevin Kostelnik; Richard Holman

    2006-11-01

    A secure and affordable energy supply is essential for achieving U.S. national security, in continuing U.S. prosperity and in laying the foundations to enable future economic growth. To meet this goal the next generation energy workforce in the U.S., in particular those needed to support instrumentation, controls and advanced operations and maintenance, is a critical element. The workforce is aging and a new workforce pipeline, to support both current generation and new build has yet to be established. The paper reviews the challenges and some actions being taken to address this need.

  1. Addressing the workforce pipeline challenge

    A secure and affordable energy supply is essential for achieving U.S. national security, in continuing U.S. prosperity and in laying the foundations to enable future economic growth. To meet this goal the next generation energy workforce in the U.S., in particular those needed to support instrumentation, controls and advanced operations and maintenance, is a critical element. The workforce is aging and a new workforce pipeline, to support both current generation and new build has yet to be established. The paper reviews the challenges and some actions being taken to address this need. (authors)

  2. Nanoscale content-addressable memory

    Davis, Bryan (Inventor); Principe, Jose C. (Inventor); Fortes, Jose (Inventor)

    2009-01-01

    A combined content addressable memory device and memory interface is provided. The combined device and interface includes one or more one molecular wire crossbar memories having spaced-apart key nanowires, spaced-apart value nanowires adjacent to the key nanowires, and configurable switches between the key nanowires and the value nanowires. The combination further includes a key microwire-nanowire grid (key MNG) electrically connected to the spaced-apart key nanowires, and a value microwire-nanowire grid (value MNG) electrically connected to the spaced-apart value nanowires. A key or value MNGs selects multiple nanowires for a given key or value.

  3. Addressing concrete cracking in NPPs

    The phenomenon of concrete cracking is one of the most frequently encountered deterioration at NPPs as it has been shown by a wide Survey of NPPs performed by IAEA in 1994-95 It can be due to a multitude of causes such as the normal ageing process (shrinkage, creep, prestressing force loss) as well as exposure to the environment (temperature variation, moisture, freeze/thaw, etc) The above mentioned Survey has also shown that in 64% of cases, no action was taken or required. It became also obvious that there is a lack of guidance as when remedial actions are needed. The paper describes, with the help of a Flow Chart, the various stages to be considered, from the first step of identification of cracks, to the definition of causes, evaluation of extent of damage, evaluation of effect/implications (safety, reliability), to the final step of deciding if repair action is required. Finally, based upon a wide literature survey the paper proposes in a Chart format, Criteria for addressing concrete cracks in NPPs., when taking in considerations all these factors. This paper discusses the process which should lead to the selection of an effective repair method and proposes, based upon worldwide standards and literature, criteria which should lead to the decision whether to repair or not concrete cracks, after the cracks have been identified and evaluated, addressing the entire range of aspects involved. (author)

  4. Addressing viral resistance through vaccines

    Laughlin, Catherine; Schleif, Amanda; Heilman, Carole A

    2015-01-01

    Antimicrobial resistance is a serious healthcare concern affecting millions of people around the world. Antiviral resistance has been viewed as a lesser threat than antibiotic resistance, but it is important to consider approaches to address this growing issue. While vaccination is a logical strategy, and has been shown to be successful many times over, next generation viral vaccines with a specific goal of curbing antiviral resistance will need to clear several hurdles including vaccine design, evaluation and implementation. This article suggests that a new model of vaccination may need to be considered: rather than focusing on public health, this model would primarily target sectors of the population who are at high risk for complications from certain infections. PMID:26604979

  5. Addressing failures in exascale computing

    Snir, Marc; Wisniewski, Robert W.; Abraham, Jacob A.; Adve, Sarita; Bagchi, Saurabh; Balaji, Pavan; Belak, Jim; Bose, Pradip; Cappello, Franck; Carlson, William; Chien, Andrew A.; Coteus, Paul; Debardeleben, Nathan A.; Diniz, Pedro; Engelmann, Christian; Erez, Mattan; Saverio, Fazzari; Geist, Al; Gupta, Rinku; Johnson, Fred; Krishnamoorthy, Sriram; Leyffer, Sven; Liberty, Dean; Mitra, Subhasish; Munson, Todd; Schreiber, Robert; Stearly, Jon; Van Hensbergen, Eric

    2014-05-01

    We present here a report produced by a workshop on “Addressing Failures in Exascale Computing” held in Park City, Utah, August 4–11, 2012. The charter of this workshop was to establish a common taxonomy about resilience across all the levels in a computing system; discuss existing knowledge on resilience across the various hardware and software layers of an exascale system; and build on those results, examining potential solutions from both a hardware and software perspective and focusing on a combined approach. The workshop brought together participants with expertise in applications, system software, and hardware; they came from industry, government, and academia; and their interests ranged from theory to implementation. The combination allowed broad and comprehensive discussions and led to this document, which summarizes and builds on those discussions.

  6. Addressing Failures in Exascale Computing

    Snir, Marc [Argonne National Laboratory (ANL); Wisniewski, Robert [Intel Corporation; Abraham, Jacob [unknown; Adve, Sarita [University of Illinois, Urbana-Champaign; Bagchi, Saurabh [Purdue University; Balaji, Pavan [Argonne National Laboratory (ANL); Belak, J. [Lawrence Livermore National Laboratory (LLNL); Bose, Pradip [IBM T. J. Watson Research Center; Cappello, Franck [Argonne National Laboratory (ANL); Carlson, Bill [unknown; Chien, Andrew [University of Chicago; Coteus, Paul [IBM T. J. Watson Research Center; DeBardeleben, Nathan [Los Alamos National Laboratory (LANL); Diniz, Pedro [University of Southern California; Engelmann, Christian [ORNL; Erez, Mattan [University of Texas at Austin; Fazzari, Saverio [Booz Allen Hamilton; Geist, Al [ORNL; Gupta, Rinku [Argonne National Laboratory (ANL); Johnson, Fred [Science Applications International Corporation (SAIC), Oak Ridge, TN; Krishnamoorthy, Sriram [Pacific Northwest National Laboratory (PNNL); Leyffer, Sven [Argonne National Laboratory (ANL); Liberty, Dean [AMD; Mitra, Subhasish [Stanford University; Munson, Todd [Argonne National Laboratory (ANL); Schreiber, Rob [HP Labs; Stearley, Jon [Sandia National Laboratories (SNL); Van Hensbergen, Eric [ARM

    2014-01-01

    We present here a report produced by a workshop on Addressing failures in exascale computing' held in Park City, Utah, 4-11 August 2012. The charter of this workshop was to establish a common taxonomy about resilience across all the levels in a computing system, discuss existing knowledge on resilience across the various hardware and software layers of an exascale system, and build on those results, examining potential solutions from both a hardware and software perspective and focusing on a combined approach. The workshop brought together participants with expertise in applications, system software, and hardware; they came from industry, government, and academia, and their interests ranged from theory to implementation. The combination allowed broad and comprehensive discussions and led to this document, which summarizes and builds on those discussions.

  7. Building Footprints - Montana Structures/Addresses Framework

    NSGIC GIS Inventory (aka Ramona) — The Montana Structures/Addresses Framework is a statewide spatial database of structure and address points in the State of Montana. The Montana Structures/Addresses...

  8. Gender: addressing a critical focus.

    Thornton, L; Wegner, M N

    1995-01-01

    The definition of gender was addressed at the Fourth World Conference on Women (Beijing, China). After extensive debate, the definition developed by the UN Population Fund in 1995 was adopted: "a set of qualities and behaviors expected from a female or male by society." The sustainability of family planning (FP) programs depends on acknowledgment of the role gender plays in contraceptive decision-making and use. For example, programs must consider the fact that women in many cultures do not make FP decisions without the consent of their spouse. AVSC is examining providers' gender-based ideas about clients and the effects of these views on the quality of reproductive health services. Questions such as how service providers can encourage joint responsibility for contraception without requiring spousal consent or how they can make men feel comfortable about using a male method in a society where FP is considered a woman's issue are being discussed. Also relevant is how service providers can discuss sexual matters openly with female clients in cultures that do not allow women to enjoy their sexuality. Another concern is the potential for physical violence to a client as a result of the provision of FP services. PMID:12294397

  9. Addressing verification challenges [International safeguards symposium on addressing verification challenges

    In his welcome address the Director General of the International Atomic Energy Agency (IAEA), Mr. M. ElBaradei, stated that safeguards activities are probably the most difficult task entrusted to an international organization and to determine all the details of a country's nuclear programme is a daunting challenge that raises a number of questions. There is an increase in nuclear power around the globe as a result of shortages of energy and concerns about energy independence and climate change. On the one hand, this is good, because without energy there is no hope for development on the other hand, however, it means that nuclear know-how and nuclear technology will continue to spread to more and more countries. There is also an increase in the number of countries interested in developing nuclear fuel cycle capabilities: sensitive fuel cycle activities, reprocessing and above all uranium enrichment. It even seems that some countries might be hedging their bets in order to have the know-how should they need to develop their own deterrence. Verifying enrichment or reprocessing facilities is quite difficult, and the so-called conversion time is extremely short. Thus, the IAEA is dealing with what is called 'virtual nuclear weapon States'. The IAEA has been talking for a number of years about the need to develop a new international or multinational approach to the fuel cycle in order to avoid a situation with nine nuclear weapon States and another 20 or 30 States having the capacity to develop nuclear weapons in a very short period of time. There is a need to remember that there is a linkage between nuclear disarmament and non-proliferation. Furthermore safeguards activities, though fundamentally technical in nature, are carried out in a political charged environment. The security dimension - that is, nuclear terrorism - also presents a new challenge, because State systems of accounting for and control of nuclear material are no longer simply tools for safeguards, but

  10. An address geocoding solution for Chinese cities

    Zhang, Xuehu; Ma, Haoming; Li, Qi

    2006-10-01

    We introduce the challenges of address geocoding for Chinese cities and present a potential solution along with a prototype system that deal with these challenges by combining and extending current geocoding solutions developed for United States and Japan. The proposed solution starts by separating city addresses into "standard" addresses which meet a predefined address model and non-standard ones. The standard addresses are stored in a structured relational database in their normalized forms, while a selected portion of the non-standard addresses are stored as aliases to the standard addresses. An in-memory address index is then constructed from the address database and serves as the basis for real-time address matching. Test results were obtained from two trials conducted in the city Beijing. On average 80% matching rate were achieved. Possible improvements to the current design are also discussed.

  11. E6 Addressing Scheme and Network Architecture

    Dmitry Anatolyevich Zaitsev; Sergey Ivanovich Bolshakov

    2012-01-01

    The paper describes new E6 addressing scheme for the creation of world-wide networks totally constructed on the base of Ethernet technology. Hierarchic E6 addresses with the length of 6 octets are used instead of both Ethernet MAC-addresses and IP-addresses that allows the routing within world-wide networks and cuts overhead of TCP, IP headers; the address space is extended in 16K times regarding IP addresses. Standard Ethernet LLC2 facilities are employed for guaranteed delivery of informati...

  12. A Novel Approach for TNA Address Management

    2003-01-01

    We present a new scheme to allocate/de-allocate Transport Network Assigned (TN A) address using Link Management Protocol (LMP) and to register/resolution these addresses using Lightweight Directory Access Protocol (LDAP) for Automatically Switched Optical Network (ASON).

  13. SAVI: The IETF Standard in Address Validation

    Bagnulo, Marcelo; García-Martínez, Alberto

    2013-01-01

    In this article we describe Source Address Validation Implementation (SAVI), a security architecture being standardized by the IETF to prevent source address spoofing within a link. SAVI devices, usually layer 2 switches, create bindings between the IP address of a node and a property of the host¿s network attachment, such as the port through which the packet is received. Bindings are created by monitoring the packet exchange associated with IP address configuration mechanisms such as DHCP, S...

  14. Address allocation to mobile ad hoc networks

    Sakander, Zeeshan

    2006-01-01

    Addressing in MANETs is of significant importance, as a mobile device cannot participate in unicast communications until it is assigned a conflict-free IP address. All routing protocols assume nodes to be configured a priori with a unique IP address. Allocating addresses to mobile nodes is a fundamental and difficult problem. Unlike infrastructure based networks, MANETs support autonomous and spontaneous networking and therefore, should be capable of self-organization and self-configuration. ...

  15. 32 CFR 516.7 - Mailing addresses.

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Mailing addresses. 516.7 Section 516.7 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY AID OF CIVIL AUTHORITIES AND PUBLIC RELATIONS LITIGATION General § 516.7 Mailing addresses. Mailing addresses for organizations referenced...

  16. Improving IPV6 Addressing Types and Size

    Khaldoun Batiha

    2013-07-01

    Full Text Available IPv6 protocol is the next candidate protocol after IPv4 protocolthatused foralong time. For this protocoltheaddressing types and address sizeare discussedto list some modifications that could improve itsperformancethrough the internet. Atthe same time, we prove that multicast addressing type is the mostimportant addressing type since it can mimic any other addressing type. Finally,a short studyis developedin order to reduce the current IPv6 address size to haveless overhead in the basic header packet, thisreductionomitsabout 40% of the over all basic IPv6 basic packet overhead.

  17. IP MASQUERADING: A Network Address Translation Technique

    Chiranji Lal Chowdhary; Prashant P.J.

    2010-01-01

    IP Masquerade, called "IPMASQ" or "MASQ" for short, is a form of Network Address Translation (NAT) which allows internally connected computers that do not have one or more registered Internet IP addresses to communicate to the Internet via the server's Internet IP address. Since IPMASQ is a generic technology, you can connect the server's internal and external to other computers through LAN technologies like Ethernet, Token Ring, and FDDI, as well as dialup connections line PPP or SLIP links....

  18. Organization of Control Units with Operational Addressing

    Alexander A. Barkalov; Roman M. Babakov; Larysa A. Titarenko

    2012-01-01

    The using of operational addressing unit as the block of control unit is proposed. The new structure model of Moore finite-state machine with reduced hardware amount is developed. The generalized structure of operational addressing unit is suggested. An example of synthesis process for Moore finite-state machine with operational addressing unit is given. The analytical researches of proposed structure of control unit are executed.

  19. IP Address Management Principles and Practice

    Rooney, Timothy

    2010-01-01

    This book will be the first covering the subject of IP address management (IPAM). The practice of IPAM includes the application of network management disciplines to IP address space and associated network services, namely DHCP (Dynamic Host Configuration Protocol) and DNS (Domain Name System). The consequence of inaccurately configuring DHCP is that end users may not be able to obtain IP addresses to access the network. Without proper DNS configuration, usability of the network will greatly suffer as the name-to-address lookup process may fail. Imagine having to navigate to a website or send a

  20. Novel Duplicate Address Detection with Hash Function.

    Song, GuangJia; Ji, ZhenZhou

    2016-01-01

    Duplicate address detection (DAD) is an important component of the address resolution protocol (ARP) and the neighbor discovery protocol (NDP). DAD determines whether an IP address is in conflict with other nodes. In traditional DAD, the target address to be detected is broadcast through the network, which provides convenience for malicious nodes to attack. A malicious node can send a spoofing reply to prevent the address configuration of a normal node, and thus, a denial-of-service attack is launched. This study proposes a hash method to hide the target address in DAD, which prevents an attack node from launching destination attacks. If the address of a normal node is identical to the detection address, then its hash value should be the same as the "Hash_64" field in the neighboring solicitation message. Consequently, DAD can be successfully completed. This process is called DAD-h. Simulation results indicate that address configuration using DAD-h has a considerably higher success rate when under attack compared with traditional DAD. Comparative analysis shows that DAD-h does not require third-party devices and considerable computing resources; it also provides a lightweight security resolution. PMID:26991901

  1. An Experimental of IPv6 Address Assignment for Global Unicast Address Using NS-3

    Dr. P. Sumathi

    2015-11-01

    Full Text Available Internet Protocol Version 6 (IPv6 is the next generation protocol and in the near future, routers are going to become more faster and new technologies are going to reduce the Internet delay. IPv6 global unicast address is similar to IPv4 public address and globally routable. This Global unicast address assignment process provides new function called Stateless Address Auto Configuration (SLAAC is a significant feature for host itself generating and configuring own addresses to enable communication. In this paper aims to describe experimental about IPv6 address assignment for global unicast address and evaluation of a host using various parameters such as Default router IP address, Throughput, Average End to End Delay and Domain Name Server (DNS IP address. The study was carried out using an open source Network Simulator (NS-3 to study and analyses the behavior of IPv6 address assignment.

  2. 7 CFR 1730.3 - RUS addresses.

    2010-01-01

    ... 7 Agriculture 11 2010-01-01 2010-01-01 false RUS addresses. 1730.3 Section 1730.3 Agriculture... ELECTRIC SYSTEM OPERATIONS AND MAINTENANCE General § 1730.3 RUS addresses. (a) Persons wishing to obtain...) Documents required to be submitted to RUS under this part are to be sent to the office of the...

  3. Approaches for Resolving Dynamic IP Addressing.

    Foo, Schubert; Hui, Siu Cheung; Yip, See Wai; He, Yulan

    1997-01-01

    A problem with dynamic Internet protocol (IP) addressing arises when the Internet connection is through an Internet provider since the IP address is allocated only at connection time. This article examines a number of online and offline methods for resolving the problem. Suggests dynamic domain name system (DNS) and directory service look-up are…

  4. A Novel Approach for TNA Address Management

    Xiaodong Wang; Yaohui Jin; Weishen Hu; Shenli Zhu

    2003-01-01

    We present a new scheme to allocate/de- allocate Transport Network Assigned (TNA) address using Link ManagementProtocol (LMP) and to register/resolution these addresses using Lightweight Directory Access Protocol (LDAP) forAutomatically Switched Optical Network (ASON).

  5. Tradition and Change in Swedish Address Forms.

    Mitchell, Stephen A.

    In most European languages, choice of address form classifies the relation between speakers. The first theoretical framework for analyzing address form usage was established by Brown and Gilman (1960) in their investigation of the semantics of pronoun use in a wide variety of Indo-European languages, which concluded that Europeans use the informal…

  6. Data structure, method and system for address lookup

    Stefanakis, G.; Sourdis, I.; Nedeltchev, G.G.; De Smet, R.

    2010-01-01

    Method and computer system for constructing a decision tree for use in address lookup of a requested address in an address space. The address space is arranged as a set of basic address ranges. Each basic address range is defined by a lower and an upper bound address, and an address in the address space is represented by a predetermined number of bits.

  7. An Experimental of IPv6 Address Assignment for Global Unicast Address Using NS-3

    DR.P.SUMATHI; Dr. Saroj Patel; Prabhakaran,, Dorairaj

    2015-01-01

    Internet Protocol Version 6 (IPv6) is the next generation protocol and in the near future, routers are going to become more faster and new technologies are going to reduce the Internet delay. IPv6 global unicast address is similar to IPv4 public address and globally routable. This Global unicast address assignment process provides new function called Stateless Address Auto Configuration (SLAAC) is a significant feature for host itself generating and configuring own addresses to enable communi...

  8. Address forms in Chinese audit opinions

    Ziye; Zhao

    2014-01-01

    Although forms of address are widely used in textual and other types of disclosure,empirical evidence of their effects is rare.China provides a unique setting in which to test the economic consequences of the forms of address used in audit reports.From 2003 to 2011,about 60%of auditors surveyed addressed their clients by their real names in audit opinions,while the others used honorifics.Based on a sample of Chinese audit opinions,I report the following findings.First,the announcement of an audit opinion that uses the client’s real name elicits a greater market response than the announcement of an opinion featuring an honorific form of address.Second,the effects of real-name forms of address are stronger in firms with weak board governance.Third,the association between audit fees and audit risk factors,such as loss-making,is stronger in firms that are addressed by their real names in audit reports.I conclude from these findings that the forms of address used in audit opinions may reveal private information on audit quality.The results of this study are consistent with the power-solidarity effect described by sociolinguists.

  9. Local address and emergency contact details

    2013-01-01

    The HR Department would like to remind members of the personnel that they are responsible for ensuring that their personal data concerning local address and preferred emergency contact details remains valid and up-to-date.   Both are easily accessible via the links below: Local address: https://edh.cern.ch/Document/Personnel/LocalAddressChange   Emergency contacts: https://edh.cern.ch/Document/Personnel/EC   Please take a few minutes to check your details and modify if necessary. Thank you in advance. HR Department Head Office

  10. Addressing Your Child's Weight at the Doctor

    ... Beverage Toolkit Addressing your Child's Weight at the Doctor Updated:Aug 4,2014 The discussion of weight ... tips on how to make talking with your doctor about weight and childhood obesity less daunting: Come ...

  11. Radiation and occupational health: opening address

    The part of address discusses the following issue: benefits of radiological protection in Malaysia, traceability and accountability as assurance of the validity of radiation measurement, Laboratory Accreditation Scheme, Atomic Energy Licensing Act

  12. Census Bureau Planned Acquisition: Address Data

    US Census Bureau, Department of Commerce — The Census Bureau updates and maintains address data to support the correct allocation of population and housing for censuses and surveys. Boundaries, streets,...

  13. Address Points, Published in unknown, SWGRC.

    NSGIC GIS Inventory (aka Ramona) — This Address Points dataset as of unknown. Data by this publisher are often provided in Geographic coordinate system; in a Not Sure projection; The extent of these...

  14. Addressing non-tariff measures in ASEAN

    Gloria O. Pasadilla

    2013-01-01

    Intra-ASEAN trade has increased six-fold since 1993 but greater integration challenge looms in addressing non-tariff measures. The paper discusses the various ASEAN work programs on NTMs and assesses the incidence of Members' NTMs on various products. Various ways of accelerating the reduction of non-tariff barriers are discussed, including dispute settlement mechanisms. The paper highlights the importance of a unilateral approach in addressing NTMs and the use of regulatory impact analysis t...

  15. Addressing Non-tariff Measures in ASEAN

    Gloria O. Pasadilla

    2013-01-01

    Intra-ASEAN trade has increased six-fold since 1993 but greater integration challenge looms in addressing non-tariff measures. The paper discusses the various ASEAN work programs on NTMs and assesses the incidence of Members‘ NTMs on various products. Various ways of accelerating the reduction of non-tariff barriers are discussed, including dispute settlement mechanisms. The paper highlights the importance of a unilateral approach in addressing NTMs and the use of regulatory impact analysis t...

  16. Instrument Mixes Addressing Mercury Emissions to Air

    OECD

    2007-01-01

    This study deals with "instruments used to address mercury emissions to air", by which is meant all legislation, regulation and other measures intended to control or reduce anthropogenic, atmospheric mercury emissions. As the links are complex between actual inputs of mercury to society (consumption for intended use and mobilisation of mercury-impurities via industrial processes) and the final release sources, all types of measures addressing any phase in the life-cycle of mercury which may u...

  17. Measuring the Density Matrix by Local Addressing

    Kis, Z

    2001-01-01

    We introduce a procedure to measure the density matrix of a material system. The density matrix is addressed locally in this scheme by applying a sequence of delayed light pulses. The procedure is based on the stimulated Raman adiabatic passage (STIRAP) technique. It is shown that a series of population measurements on the target state of the population transfer process yields unambiguous information about the populations and coherences of the addressed states, which therefore can be determined.

  18. FPGA Implementation of Content Addressable Memory

    A. M. V. Pathi; M. Premchand; Ramesh Chandra; B. Prudhvi Raj

    2013-01-01

    Content Addressable Memory (CAM) is a special type of computer memory used in certain very high speed searching applications. It is also known as associative memory or associative storage or associative array. Content Addressable Memory (CAM) is frequently used in applications, such as lookup tables, databases, associative computing and networking, that requires high-speed searches due to its ability to improve application performance by using parallel comparison to reduce search time. Althou...

  19. Address Points, address, Published in 2008, 1:24000 (1in=2000ft) scale, Juab County.

    NSGIC GIS Inventory (aka Ramona) — This Address Points dataset, published at 1:24000 (1in=2000ft) scale, was produced all or in part from Other information as of 2008. It is described as 'address'....

  20. 46 CFR 67.113 - Managing owner designation; address; requirement to report change of address.

    2010-10-01

    ... 46 Shipping 2 2010-10-01 2010-10-01 false Managing owner designation; address; requirement to... Required for Vessel Documentation § 67.113 Managing owner designation; address; requirement to report change of address. The owner of each vessel must designate a managing owner on the Application...

  1. Strategies for Addressing Spreadsheet Compliance Challenges

    Weber, Brandon

    2006-01-01

    Most organizations today use spreadsheets in some form or another to support critical business processes. However the financial resources, and developmental rigor dedicated to them are often minor in comparison to other enterprise technology. The increasing focus on achieving regulatory and other forms of compliance over key technology assets has made it clear that organizations must regard spreadsheets as an enterprise resource and account for them when developing an overall compliance strategy. This paper provides the reader with a set of practical strategies for addressing spreadsheet compliance from an organizational perspective. It then presents capabilities offered in the 2007 Microsoft Office System which can be used to help customers address compliance challenges.

  2. Addressing techniques of liquid crystal displays

    Ruckmongathan, Temkar N

    2014-01-01

    Unique reference source that can be used from the beginning to end of a design project to aid choosing an appropriate LCD addressing technique for a given application This book will be aimed at design engineers who are likely to embed LCD drivers and controllers in many systems including systems on chip. Such designers face the challenge of making the right choice of an addressing technique that will serve them with best performance at minimal cost and complexity. Readers will be able to learn about various methods available for driving matrix LCDs and the comparisons at the end of each chap

  3. Welfare work addressing immigrants and refugees

    Øland, Trine

    integrationist visions in their quest to protect immigrants’ and refugees’ fundamental wellbeing and status as human beings with equal rights, group life and history. These opposing elements generate ambiguity and contradiction within integrationist welfare work. The ambition of the presentation is to enquire......In this presentation I will discuss the ways in which welfare workers addressing immigrants and refugees (re)produce integrationist visions, symbolizing society as an integrated whole and immigrants/refugees as a distraction to that whole. Paradoxically, welfare workers also oppose these......, nurses and more) addressing immigrants and refugees and their families and descendants in the Danish welfare nation-state....

  4. 37 CFR 251.1 - Official addresses.

    2010-07-01

    ... ARBITRATION ROYALTY PANEL RULES AND PROCEDURES COPYRIGHT ARBITRATION ROYALTY PANEL RULES OF PROCEDURE... Copyright Arbitration Royalty Panels (CARPs) must be addressed as follows: (a) If hand delivered by a... Friday between 8:30 a.m. and 5 p.m. (b) If hand delivered by a commercial courier (excluding...

  5. Road Map to Address Cognitive Health

    2014-06-09

    In this podcast, CDC’s Dr. Lynda Anderson highlights the important roles that states and communities can play in addressing cognitive health as part of overall health.  Created: 6/9/2014 by National Center for Chronic Disease Prevention and Health Promotion (NCCDPHP).   Date Released: 6/9/2014.

  6. IP Address Use in Internetworking Routing

    2003-01-01

    tut quiz present anim This interactive tutorial covers the following: How routers use the elements of the IP address to forward packets of information., How information travels through the Internet.The interactions consists of pop-up definitions of terms, animations and self-check questions. EC3760 Introduction to Information Operations Engineering

  7. 37 CFR 301.2 - Official addresses.

    2010-07-01

    ... Section 301.2 Patents, Trademarks, and Copyrights COPYRIGHT ROYALTY BOARD, LIBRARY OF CONGRESS GENERAL...., and be addressed as follows: Copyright Royalty Board, Library of Congress, James Madison Memorial... Royalty Board, Library of Congress, James Madison Memorial Building, 101 Independence Avenue,...

  8. How Sociology Texts Address Gun Control

    Tonso, William R.

    2004-01-01

    William R. Tonso has chosen an issue that he knows something about to examine how sociology textbooks address controversy. Appealing for gun control is fashionable, but it is at odds with a fondness that ordinary Americans have for their firearms--one that is supported by a growing body of research on deterrence to crime. There are two sides to…

  9. The Conversational Frame in Public Address.

    Branham, Robert James; Pearce, W. Barnett

    1996-01-01

    Explores the diverse forms and motives of the conversational frame in public address. Argues that, by framing their remarks and transactions with their listeners as conversational, orators may attempt to reconstruct or seem to reconstruct speaker-audience relationships and to position themselves and their audiences within networks of reciprocal…

  10. Registering Names and Addresses for Information Technology.

    Knapp, Arthur A.

    The identification of administrative authorities and the development of associated procedures for registering and accessing names and addresses of communications data systems are considered in this paper. It is noted that, for data communications systems using standards based on the Open Systems Interconnection (OSI) Reference Model specified by…

  11. Addressing South Africa's Engineering Skills Gaps

    Hall, Jonathan; Sandelands, Eric

    2009-01-01

    Purpose: This paper aims to provide a case study of how engineering skills gaps are being addressed by Murray & Roberts in South Africa. Design/methodology/approach: The paper focuses on skills challenges in South Africa from a reflective practitioner perspective, exploring a case example from an industry leader. Findings: The paper explores how…

  12. Addressing production stops in the food industry

    Hansen, Zaza Nadja Lee; Herbert, Luke Thomas; Jacobsen, Peter

    2014-01-01

    This paper investigates the challenges in the food industry which causes the production lines to stop, illustrated by a case study of an SME size company in the baked goods sector in Denmark. The paper proposes key elements this sector needs to be aware of to effectively address production stops......, and gives examples of the unique challenges faced by the SME food industry....

  13. Addressing Student Debt in the Classroom

    Perkins, David; Johnston, Tim; Lytle, Rick

    2016-01-01

    Student debt is a national concern. The authors address debt in the classroom to enhance students' understanding of the consequences of debt and the need for caution when financing their education. However, student feedback indicates this understanding has a delayed effect on borrowing behavior and underscores the importance of making difficult…

  14. Addressing Issues Related to Technology and Engineering

    Technology Teacher, 2008

    2008-01-01

    This article presents an interview with Michael Hacker and David Burghardt, codirectors of Hoftra University's Center for Technological Literacy. Hacker and Burghardt address issues related to technology and engineering. They argue that teachers need to be aware of the problems kids are facing, and how to present these problems in an engaging…

  15. CANE: The Content Addressed Network Environment

    Gardner-Stephen, Paul

    2007-01-01

    The fragmented nature and asymmetry of local and remote file access and network access, combined with the current lack of robust authenticity and privacy, hamstrings the current internet. The collection of disjoint and often ad-hoc technologies currently in use are at least partially responsible for the magnitude and potency of the plagues besetting the information economy, of which spam and email borne virii are canonical examples. The proposed replacement for the internet, Internet Protocol Version 6 (IPv6), does little to tackle these underlying issues, instead concentrating on addressing the technical issues of a decade ago. This paper introduces CANE, a Content Addressed Network Environment, and compares it against current internet and related technologies. Specifically, CANE presents a simple computing environment in which location is abstracted away in favour of identity, and trust is explicitly defined. Identity is cryptographically verified and yet remains pervasively open in nature. It is argued tha...

  16. Addressing food waste reduction in Denmark

    Halloran, Afton Marina Szasz; Clement, Jesper; Kornum, Niels;

    2014-01-01

    environmental challenge. Using the case of Denmark, this paper analyses causes of food waste, and discusses how different stakeholders address the prevention and reuse of the €1.18. billion of annual edible food waste. Currently, the majority of food waste is still incinerated with energy recovery. However......Global food demand is driven by population and economic growth, and urbanization. One important instrument to meet this increasing demand and to decrease the pressure on food production is to minimize food losses and food waste. Food waste and loss is a major societal, economic, nutritional and......, improvements in technology have made it more efficient to utilize food waste for biogas and compost, which improves nutrient cycling through the food system. Major efforts to address food waste in Denmark have mainly been promoted through civil society groups with governmental support, as well as by industry...

  17. FPGA Implementation of Content Addressable Memory

    A. M. V. Pathi

    2013-07-01

    Full Text Available Content Addressable Memory (CAM is a special type of computer memory used in certain very high speed searching applications. It is also known as associative memory or associative storage or associative array. Content Addressable Memory (CAM is frequently used in applications, such as lookup tables, databases, associative computing and networking, that requires high-speed searches due to its ability to improve application performance by using parallel comparison to reduce search time. Although the use of parallel comparison results in reduced search time, it also significantly increases power consumption. This project proposes a Parameter Extractor, based on ones-count approach. The major contribution of this project is that it proposed ones-count Parameter Extractor can achieve faster search capability compared to the conventional CAM

  18. Forest Policies Addressing Climate Change in China

    2010-01-01

    As a developing country with a large population and a fragile ecological environment, China is particularly vulnerable to the adverse effects of climate change. Beginning with the Rio Conference of 1992 China has played a progressively enhanced role in combating climate change. A series of policies and measures to address climate change have been taken in the overall context of national sustainable development strategy, making positive contributions to the mitigation and adaptation to climate change, among ...

  19. Addressing consumerization of IT risks with nudging

    Iryna Yevseyeva; James Turland; Charles Morisset; Lynne Coventry; Thomas Groß

    2015-01-01

    In this work we address the main issues of Information Technology (IT) consumerization that are related to security risks, and vulnerabilities of devices used within Bring Your Own Device (BYOD) strategy in particular. We propose a ‘soft’ mitigation strategy for user actions based on nudging, widely applied to health and social behavior influence. In particular, we propose a complementary, less strict, more flexible Information Security policies, based on risk assessment of device vulnerabili...

  20. Addressing the UN Millennium Development Goals

    David Ojcius

    2010-11-01

    Full Text Available The United Nations Summit on the Millennium Development Goals concluded on 22 September 2010 with the adoption of a global action plan to achieve the eight anti-poverty goals by their 2015 target date and the announcement of major new commitments for women's and children's health and other initiatives against poverty, hunger and disease. FACTS Reports is determined to play an important role in communicating about specific field actions that address one or more of the Millenium Development Goa...

  1. Addressing the UN Millennium Development Goals

    David Ojcius; Jan Wallander

    2010-01-01

    The United Nations Summit on the Millennium Development Goals concluded on 22 September 2010 with the adoption of a global action plan to achieve the eight anti-poverty goals by their 2015 target date and the announcement of major new commitments for women's and children's health and other initiatives against poverty, hunger and disease. FACTS Reports is determined to play an important role in communicating about specific field actions that address one or more of the Millenium Development Goa...

  2. Partnerships as panacea for addressing global problems?

    Kolk, Ans

    2013-01-01

    textabstractThis chapter examines partnerships and their peculiarities, based on recent research from various disciplines, in the context of the large problems faced by (global) society. These problems are very complex, often cross national boundaries, and cannot easily be 'solved' by one single actor. Previous 'unilateral' attempts to address them have not been particularly successful, and there are limits to what a single actor can do. Cooperation also enables different actors to leverage t...

  3. Innovative Legal Approaches to Address Obesity

    Pomeranz, Jennifer L; Teret, Stephen P; Sugarman, Stephen D; Rutkow, Lainie; Brownell, Kelly D

    2009-01-01

    Context: The law is a powerful public health tool with considerable potential to address the obesity issue. Scientific advances, gaps in the current regulatory environment, and new ways of conceptualizing rights and responsibilities offer a foundation for legal innovation. Methods: This article connects developments in public health and nutrition with legal advances to define promising avenues for preventing obesity through the application of the law. Findings: Two sets of approaches are defined: (1) direct application of the law to factors known to contribute to obesity and (2) original and innovative legal solutions that address the weak regulatory stance of government and the ineffectiveness of existing policies used to control obesity. Specific legal strategies are discussed for limiting children's food marketing, confronting the potential addictive properties of food, compelling industry speech, increasing government speech, regulating conduct, using tort litigation, applying nuisance law as a litigation strategy, and considering performance-based regulation as an alternative to typical regulatory actions. Finally, preemption is an overriding issue and can play both a facilitative and a hindering role in obesity policy. Conclusions: Legal solutions are immediately available to the government to address obesity and should be considered at the federal, state, and local levels. New and innovative legal solutions represent opportunities to take the law in creative directions and to link legal, nutrition, and public health communities in constructive ways. PMID:19298420

  4. Matching Alternative Addresses: a Semantic Web Approach

    Ariannamazi, S.; Karimipour, F.; Hakimpour, F.

    2015-12-01

    Rapid development of crowd-sourcing or volunteered geographic information (VGI) provides opportunities for authoritatives that deal with geospatial information. Heterogeneity of multiple data sources and inconsistency of data types is a key characteristics of VGI datasets. The expansion of cities resulted in the growing number of POIs in the OpenStreetMap, a well-known VGI source, which causes the datasets to outdate in short periods of time. These changes made to spatial and aspatial attributes of features such as names and addresses might cause confusion or ambiguity in the processes that require feature's literal information like addressing and geocoding. VGI sources neither will conform specific vocabularies nor will remain in a specific schema for a long period of time. As a result, the integration of VGI sources is crucial and inevitable in order to avoid duplication and the waste of resources. Information integration can be used to match features and qualify different annotation alternatives for disambiguation. This study enhances the search capabilities of geospatial tools with applications able to understand user terminology to pursuit an efficient way for finding desired results. Semantic web is a capable tool for developing technologies that deal with lexical and numerical calculations and estimations. There are a vast amount of literal-spatial data representing the capability of linguistic information in knowledge modeling, but these resources need to be harmonized based on Semantic Web standards. The process of making addresses homogenous generates a helpful tool based on spatial data integration and lexical annotation matching and disambiguating.

  5. Addressing language barriers to healthcare in India.

    Narayan, Lalit

    2013-01-01

    In spite of a growing recognition of the importance of doctor-patient communication, the issue of language barriers to healthcare has received very little attention in India. The Indian population speaks over 22 major languages with English used as the lingua franca for biomedicine. Large-scale internal migration has meant that health workers are encountering increasing instances of language discordance within clinical settings. Research done predominantly in the West has shown language discordance to significantly affect access to care, cause problems of comprehension and adherence, and decrease the satisfaction and quality of care. Addressing language barriers to healthcare in India requires a stronger political commitment to providing non-discriminatory health services, especially to vulnerable groups such as illiterate migrant workers. Research will have to address three broad areas: the ways in which language barriers affect health and healthcare, the efficacy of interventions to overcome language barriers, and the costs of language barriers and efforts to overcome them. There is a need to address such barriers in health worker education and clinical practice. Proven strategies such as hiring multilingual healthcare workers, providing language training to health providers, employing in situ translators or using telephone interpretation services will have to be evaluated for their appropriateness to the Indian context. Internet-based initiatives, the proliferation of mobile phones and recent advances in machine translation promise to contribute to the solution. PMID:24758452

  6. Building technology services that address student needs.

    Le Ber, Jeanne M; Lombardo, Nancy T; Wimmer, Erin

    2015-01-01

    A 16-question technology use survey was conducted to assess incoming health sciences students' knowledge of and interest in current technologies, and to identify student device and tool preferences. Survey questions were developed by colleagues at a peer institution and then edited to match this library's student population. Two years of student responses have been compiled, compared, and reviewed as a means for informing library decisions related to technology and resource purchases. Instruction and event programming have been revised to meet student preferences. Based on the number of students using Apple products, librarians are addressing the need to become more proficient with this platform. PMID:25611437

  7. Addressing the Crisis in Fundamental Physics

    Stubbs, Christopher W

    2007-01-01

    I present the case for fundamental physics experiments in space playing an important role in addressing the current "dark energy'' crisis. If cosmological observations continue to favor a value of the dark energy equation of state parameter w=-1, with no change over cosmic time, then we will have difficulty understanding this new fundamental physics. We will then face a very real risk of stagnation unless we detect some other experimental anomaly. The advantages of space-based experiments could prove invaluable in the search for the a more complete understanding of dark energy. This talk was delivered at the start of the Fundamental Physics Research in Space Workshop in May 2006.

  8. A Task Force to Address Bullying.

    Keller, Ronald; Budin, Wendy C; Allie, Tammy

    2016-02-01

    Bullying in the workplace can create a dysfunctional environment that is associated with serious physical and psychological harm to the person being bullied. Nurses' experience with bullying has gained considerable attention in recent years, and warrants further discussion. Nurse leaders need to develop and implement effective bullying prevention initiatives that will foster the functioning of a professional and productive staff in a healthy work environment. The aim of this article is to review workplace bullying as experienced by nurses, and describe how nurses at a Magnet-designated academic medical center developed and implemented a bullying task force to address the problem. PMID:26817556

  9. Grid Added Value to Address Malaria

    Breton, V; Hofmann, M

    2008-01-01

    Through this paper, we call for a distributed, internet-based collaboration to address one of the worst plagues of our present world, malaria. The spirit is a non-proprietary peer-production of information-embedding goods. And we propose to use the grid technology to enable such a world wide "open source" like collaboration. The first step towards this vision has been achieved during the summer on the EGEE grid infrastructure where 46 million ligands were docked for a total amount of 80 CPU years in 6 weeks in the quest for new drugs.

  10. HEP technologies to address medical imaging challenges

    CERN. Geneva

    2016-01-01

    Developments in detector technologies aimed at solving challenges in present and future CERN experiments, particularly at the LHC, have triggered exceptional advances in the performance of medical imaging devices, allowing for a spectacular progress in in-vivo molecular imaging procedures, which are opening the way for tailored therapies of major diseases. This talk will briefly review the recent history of this prime example of technology transfer from HEP experiments to society, will describe the technical challenges being addressed by some ongoing projects, and will present a few new ideas for further developments and their foreseeable impact.

  11. Results Analysis of IP Address Auto- Configuration in Wireless Manets

    S.Zahoor Ul Huq; S. Shabana Begum; Dr. K.E.Sreenivasa Murthy; Prof. B. Satyanaryana

    2011-01-01

    The main task of an address allocation protocol is to manage the address allocation to the nodes in the ad hoc MANETs. All routing protocols assume nodes to be configured a priori with a uniqueIP address. Allocating addresses to mobile nodes is a fundamental and difficult problem. A mobile device cannot participate in unicast communications until it is assigned a conflict-free IP address. So addressing in MANETs is of significant importance, and the address configuration process should be fas...

  12. Addressing firefighter safety around solar PV systems

    Harris, B. [Sustainable Energy Technologies, Calgary, AB (Canada)

    2010-11-15

    The article discussed new considerations for installing photovoltaic (PV) systems that address the needs of fire service personnel. The presence of a PV system presents a multitude of dangers for firefighters, including electrical shock, the inhalation of toxic gases from being unable to cut a hole through the roof, falling debris and flying glass, and dead loading on a compromised structure and tripping on conduits. Mapping systems should be modified so that buildings with PV systems are identified for first responders, including firefighters who should learn that solar modules present an electrical hazard during the day but not at night; covering PV modules with foam or salvage covers may not shut the system down to a safe level; it takes a few moments for the power in PV modules to reduce to zero; and PV modules or conduit should never be cut, broke, chopped, or walked upon. The California Department of Forestry and Fire Protection recommends creating pathways and allowing easier access to the roof by setting the modules back from roof edges, creating a structurally sound pathway for firefighters to walk on and space to cut ventilation holes. However, the setback rule makes the economics of solar installation less viable for residential applications. The technological innovations aimed at addressing system safety all focus on limiting firefighter contact with live electrical components to within the extra-low-voltage (ELV) band. Some of the inverters on the market that support ELV system architecture were described. 1 fig.

  13. Integrated optical addressing of an ion qubit

    Mehta, Karan K; McConnell, Robert; Ram, Rajeev J; Sage, Jeremy M; Chiaverini, John

    2015-01-01

    Scalable implementation of the optics required to control trapped atomic ions' quantum states will be required to construct large-scale ion trap quantum information processors. All experiments in ion traps so far have employed approaches cumbersome to scale to even a few tens of qubits, with the majority relying on manipulation of free space beams with bulk optics. Here we demonstrate lithographically defined nanophotonic dielectric waveguides integrated within a linear surface-electrode ion trap chip, and qubit addressing at multiple locations via focusing grating couplers that emit through openings in the trap electrodes to an ion trapped 50 $\\mu$m above the chip. We perform quantum coherent operations using visible light routed in and emitted from silicon nitride waveguides and couplers, on the optical qubit transition in individual $^{88}$Sr$^+$ ions. The addressing beam is focused near the ion position with a 2 $\\mu$m 1/$e^2$-radius along the trap axis, and we measure crosstalk errors between $10^{-2}$ a...

  14. Notation for national and international telephone numbers, e-mail addresses and Web addresses

    International Telecommunication Union. Geneva

    2001-01-01

    Recommendation E.123 defines a standard way to write telephone numbers, e-mail addresses, and web addresses. It recommends the following formats (when dialing the area code is optional for local calling): Telephone number: National notation (042) 123 4567 International notation +31 (0)42 123 4567 E-mail address: name@provider.com Internet address / URL: www.company.com It also recommends that a hypen (-), space ( ), or period (.) can be used to visually separate groups of numbers. The parentheses are used to indicate digits that are sometimes not dialed. a slash (/) is used to indicate alternate numbers. This information is important if you want to make sure people know how to dail a phone number in a specific country.

  15. Addressing submarine geohazards through scientific drilling

    Camerlenghi, A.

    2009-04-01

    Natural submarine geohazards (earthquakes, volcanic eruptions, landslides, volcanic island flank collapses) are geological phenomena originating at or below the seafloor leading to a situation of risk for off-shore and on-shore structures and the coastal population. Addressing submarine geohazards means understanding their spatial and temporal variability, the pre-conditioning factors, their triggers, and the physical processes that control their evolution. Such scientific endeavour is nowadays considered by a large sector of the international scientific community as an obligation in order to contribute to the mitigation of the potentially destructive societal effects of submarine geohazards. The study of submarine geohazards requires a multi-disciplinary scientific approach: geohazards must be studied through their geological record; active processes must be monitored; geohazard evolution must be modelled. Ultimately, the information must be used for the assessment of vulnerability, risk analysis, and development of mitigation strategies. In contrast with the terrestrial environment, the oceanic environment is rather hostile to widespread and fast application of high-resolution remote sensing techniques, accessibility for visual inspection, sampling and installation of monitoring stations. Scientific Drilling through the IODP (including the related pre site-survey investigations, sampling, logging and in situ measurements capability, and as a platform for deployment of long term observatories at the surface and down-hole) can be viewed as the centre of gravity of an international, coordinated, multi-disciplinary scientific approach to address submarine geohazards. The IODP Initial Science Plan expiring in 2013 does not address openly geohazards among the program scientific objectives. Hazards are referred to mainly in relation to earthquakes and initiatives towards the understanding of seismogenesis. Notably, the only drilling initiative presently under way is the

  16. Address Forms in Chinese and English-Speaking Culture

    王晓茹

    2015-01-01

    Address forms is one of markers of politeness and is an indispensable part of communication. An appropriate address form promotes interpersonal communication smoothly. An address form is polite in one culture, but might be inappropriate in an⁃other culture. The paper contrasts address forms in English and Chinese culture and explores the reasons for their different choice of address terms.

  17. How is environmental conflict addressed by SIA?

    The fields of Environmental Conflict Management (ECM), Environmental Conflict Resolution (ECR), and Peace and Conflict Impact Assessment (PCIA) have become well established; however, as yet there has not been much use of Social Impact Assessment (SIA) to manage environmental conflicts. ECM, ECR and PCIA are mainly undertaken when problems are advanced or, more likely, have run their course (post-conflict). This paper examines how conflict is addressed by SIA and whether there is potential to develop it for more proactive assessment of conflicts (pre-conflict or while things develop). SIA has the potential to identify and clarify the cause(s) of environmental and natural resources conflicts, and could possibly enable some avoidance or early mitigation. A promising approach may be for 'conflict-aware' SIA to watch for critical conflict stages or thresholds and to monitor stakeholders. Effective conflict-aware SIA might also significantly contribute to efforts to achieve sustainable development.

  18. World Federation of Vascular Societies: presidential address

    Sillesen, Henrik Hegaard

    2010-01-01

    The presidential address describes briefly the history of the World Federation for Vascular Societies (WFVS) and its objectives. Vascular Surgery today includes interventional procedures (open surgical and endovascular) in addition to risk factor reduction and medical treatment. It is equally....... Similar, in order to be able to train with relevant case mix and numbers, and in order always to have both complex open and endovascular skills on call 24 hours per day, 365 days a year, centralisation into larger units is necessary. The WFVS is important simply looking at the huge demographic differences...... throughout the world. In addition, for introduction of new treatments, training issues and dissemination of science a global organisation like the WFVS is needed....

  19. Addressing consumerization of IT risks with nudging

    Iryna Yevseyeva

    2015-01-01

    Full Text Available In this work we address the main issues of Information Technology (IT consumerization that are related to security risks, and vulnerabilities of devices used within Bring Your Own Device (BYOD strategy in particular. We propose a ‘soft’ mitigation strategy for user actions based on nudging, widely applied to health and social behavior influence. In particular, we propose a complementary, less strict, more flexible Information Security policies, based on risk assessment of device vulnerabilities and threats to corporate data and devices, combined with a strategy of influencing security behavior by nudging. We argue that nudging, by taking into account the context of the decision-making environment, and the fact that the employee may be in better position to make a more appropriate decision, may be more suitable than strict policies in situations of uncertainty of security-related decisions. Several examples of nudging are considered for different tested and potential scenarios in security context.

  20. Combined hepatocellular cholangiocarcinoma: Controversies to be addressed

    Wang, An-Qiang; Zheng, Yong-Chang; Du, Juan; Zhu, Cheng-Pei; Huang, Han-Chun; Wang, Shan-Shan; Wu, Liang-Cai; Wan, Xue-Shuai; Zhang, Hao-Hai; Miao, Ruo-Yu; Sang, Xin-Ting; Zhao, Hai-Tao

    2016-01-01

    Combined hepatocellular cholangiocarcinoma (CHC) accounts for 0.4%-14.2% of primary liver cancer cases and possesses pathological features of both hepatocellular carcinoma and cholangiocarcinoma. Since this disease was first described and classified in 1949, the classification of CHC has continuously evolved. The latest definition and classification of CHC by the World Health Organization is based on the speculation that CHC arises from hepatic progenitor cells. However, there is no evidence demonstrating the common origin of different components of CHC. Furthermore, the definition of CHC subtypes is still ambiguous and the identification of CHC subtype when a single tumor contains many components has remained unresolved. In addition, there is no summary on the newly recognized histopathology features or the contribution of CHC components to prognosis and outcome of this disease. Here we provide a review of the current literature to address these questions. PMID:27182157

  1. 27 CFR 4.35 - Name and address.

    2010-04-01

    ... the stated address, or (C) Produced sparkling wine by secondary fermentation at the stated address... alcoholic beverage business at such additional place or address, and (2) The label also contains in...

  2. 47 CFR 32.19 - Address for reports and correspondence.

    2010-10-01

    ... be addressed to the Wireless Competition Bureau, Federal Communications Commission, Washington, DC... UNIFORM SYSTEM OF ACCOUNTS FOR TELECOMMUNICATIONS COMPANIES General Instructions § 32.19 Address...

  3. Opening Address [Presented by D. Magliani

    Full text: I am very pleased to address you this morning on behalf of A.-M. Cetto, Head of the Department of Technical Cooperation, as we open this important international symposium. Interest in the symposium has been very high, with the number of registered participants greatly exceeding the number initially expected. Every region is represented in significant number, particularly Europe. The symposium's aim, to provide a forum to discuss and exchange information on advances over the past decade in radiation dosimetry and its supportive role in radiation medicine and radiation protection, is of high importance to the technical cooperation programme, which has a long standing, well-established focus on health. Accurate measurements in radiation dosimetry are critical in decisions making related to human health and to the safety of radiation workers and the general public, and the focus of this symposium strengthens technical cooperation activities in this sector. In each programme cycle, the IAEA receives large numbers of requests for technical cooperation support in the fields of dosimetry and medical radiation physics. Currently, we have 144 active projects that include these fields of activity. Under the scope of our interregional technical cooperation project on medical physics in radiation medicine (INT/6/054), the IAEA is working with Member States, international physics societies and the World Health Organization to promote the recognition of medical physics in radiation medicine, and to harmonize educational material in order to ensure the safe and effective diagnosis and treatment of patients. We are very pleased to support the attendance of 36 participants at the symposium under this project. Participants can expect to return home with a fresh overview of the latest developments and trends in radiation dosimetry, and a better understanding of the issues. This will contribute to standardization in the field, leading to improved diagnosis and treatment of

  4. Addressing Underrepresentation: Physics Teaching for All

    Rifkin, Moses

    2016-02-01

    Every physics teacher wants to give his or her students the opportunity to learn physics well. Despite these intentions, certain groups of students—including women and underrepresented minorities (URMs)—are not taking and not remaining in physics. In many cases, these disturbing trends are more significant in physics than in any other science. This is a missed opportunity for our discipline because demographic diversity strengthens science. The question is what we can do about these trends in our classrooms, as very few physics teachers have been explicitly prepared to address them. In this article, I will share some steps that I've taken in my classroom that have moved my class in the right direction. In the words of Nobel Prize-winning physicist Carl Wieman and psychologists Lauren Aguilar and Gregory Walton: "By investing a small amount of class time in carefully designed and implemented interventions, physics teachers can promote greater success among students from diverse backgrounds. Ultimately, we hope such efforts will indeed improve the diversity and health of the physics profession."

  5. Presidential address: Experimenting with the scientific past.

    Radick, Gregory

    2016-06-01

    When it comes to knowledge about the scientific pasts that might have been - the so-called 'counterfactual' history of science - historians can either debate its possibility or get on with the job. Taking the latter course means re-engaging with some of the most general questions about science. It can also lead to fresh insights into why particular episodes unfolded as they did and not otherwise. Drawing on recent research into the controversy over Mendelism in the early twentieth century, this address reports and reflects on a novel teaching experiment conducted in order to find out what biology and its students might be like now had the controversy gone differently. The results suggest a number of new options: for the collection of evidence about the counterfactual scientific past, for the development of collaborations between historians of science and science educators, for the cultivation of more productive relationships between scientists and their forebears, and for heightened self-awareness about the curiously counterfactual business of being historical. PMID:27353945

  6. Addressing social resistance in emerging security technologies.

    Mitchener-Nissen, Timothy

    2013-01-01

    In their efforts to enhance the safety and security of citizens, governments and law enforcement agencies look to scientists and engineers to produce modern methods for preventing, detecting, and prosecuting criminal activities. Whole body scanners, lie detection technologies, biometrics, etc., are all being developed for incorporation into the criminal justice apparatus. Yet despite their purported security benefits these technologies often evoke social resistance. Concerns over privacy, ethics, and function-creep appear repeatedly in analyses of these technologies. It is argued here that scientists and engineers continue to pay insufficient attention to this resistance; acknowledging the presence of these social concerns yet failing to meaningfully address them. In so doing they place at risk the very technologies and techniques they are seeking to develop, for socially controversial security technologies face restrictions and in some cases outright banning. By identifying sources of potential social resistance early in the research and design process, scientists can both engage with the public in meaningful debate and modify their security technologies before deployment so as to minimize social resistance and enhance uptake. PMID:23970863

  7. Vaccine hesitancy: understanding better to address better.

    Kumar, Dewesh; Chandra, Rahul; Mathur, Medha; Samdariya, Saurabh; Kapoor, Neelesh

    2016-01-01

    Vaccine hesitancy is an emerging term in the socio-medical literature which describes an approach to vaccine decision making. It recognizes that there is a continuum between full acceptance and outright refusal of some or all vaccines and challenges the previous understanding of individuals or groups, as being either anti-vaccine or pro-vaccine. The behaviours responsible for vaccine hesitancy can be related to confidence, convenience and complacency. The causes of vaccine hesitancy can be described by the epidemiological triad i.e. the complex interaction of environmental- (i.e. external), agent- (i.e. vaccine) and host (or parent)- specific factors. Vaccine hesitancy is a complex and dynamic issue; future vaccination programs need to reflect and address these context-specific factors in both their design and evaluation. Many experts are of the view that it is best to counter vaccine hesitancy at the population level. They believe that it can be done by introducing more transparency into policy decision-making before immunization programs, providing up-to-date information to the public and health providers about the rigorous procedures undertaken before introduction of new vaccines, and through diversified post-marketing surveillance of vaccine-related events. PMID:26839681

  8. Addressing Assessment in Libyan Medical Education

    Richardson J, Gill D, Woolf K

    2009-01-01

    Full Text Available Assessment is a powerful driver of student learning: it gives a message to learners about what theyshould be learning, what the learning organisation believes to be important, and how they should goabout learning. Assessment tools allow measurement of student achievement and thereby giveteachers insight into their students’ learning, and enable teachers to make systematic judgementsabout progress and achievement. It is vital then that assessment tools drive students to learn theright things as well as measure student learning appropriately. Any attempts to reform curricula andteaching methods must consider the role of assessment in the learning process.Libyan doctors and medical students have been calling for changes to teaching and assessmentmethods at undergraduate and postgraduate levels. A team from the Academic Centre for MedicalEducation at University College, London have been running workshops in conjunction with the LibyanBoard of Medical Specialties since 2006 to discuss strategic aims of assessment in medical educationin Libya for the 21st century and to deliver an assessment skills course to Libyan educators. Thisarticle outlines the course and the outcomes of preliminary discussions between academics from theUK, participants in the assessment courses and representatives from the Libyan Board of MedicalSpecialties. As a result of these discussions it was agreed by all that Libyan Medical Schoolassessment methods need updating and, despite significant challenges, changes in assessment mustbe made as soon as possible. There is a real need for support in both addressing these changes andfor practical training for assessors in contemporary assessment methods.

  9. Understanding And Addressing Equipment Limitations Through Testing

    Safeguards demands have brought about the use of new, advanced equipment. These new systems are typically more complex than previous systems sometimes making use of dense circuitry and complex controls that can bring out previously unseen susceptibilities to various environmental conditions. In addition to possibly being susceptible to ambient conditions such as temperature and humidity, there may be a misunderstanding regarding the operational limitations of the equipment. Will a radiation detector respond to a moving source? Will other types of radiation overwhelm the response of the detector to the radiation of interest? Will the electronics survive or become incapacitated after exposure to radiation? These questions and others need to be addressed through the use of a systematic testing program. The program should not be used as a tool for criticism, but as a method of improving the reliability of equipment in the field and as a technique for improving the operation of the equipment. This document presents some of the information that was obtained at Oak Ridge National Laboratory where a series of tests were performed on various types of equipment with differing functions. Equipment tested included data transmission devices and radiation sensors. Tests performed included ionizing radiation to test for effects from interfering radiation and as a characterization tool for such things as response to moving sources. Other tests involved the use of non-ionizing radiation to determine whether interference could occur when equipment is exposed to radio frequency or magnetic field environments. The remaining tests were performed to establish whether susceptibilities exist when equipment is exposed to various temperature and humidity environments. Although more testing may be needed, the test methodologies used could provide a direction to future qualification plans

  10. Computational strategies to address chromatin structure problems.

    Perišić, Ognjen; Schlick, Tamar

    2016-01-01

    While the genetic information is contained in double helical DNA, gene expression is a complex multilevel process that involves various functional units, from nucleosomes to fully formed chromatin fibers accompanied by a host of various chromatin binding enzymes. The chromatin fiber is a polymer composed of histone protein complexes upon which DNA wraps, like yarn upon many spools. The nature of chromatin structure has been an open question since the beginning of modern molecular biology. Many experiments have shown that the chromatin fiber is a highly dynamic entity with pronounced structural diversity that includes properties of idealized zig-zag and solenoid models, as well as other motifs. This diversity can produce a high packing ratio and thus inhibit access to a majority of the wound DNA. Despite much research, chromatin's dynamic structure has not yet been fully described. Long stretches of chromatin fibers exhibit puzzling dynamic behavior that requires interpretation in the light of gene expression patterns in various tissue and organisms. The properties of chromatin fiber can be investigated with experimental techniques, like in vitro biochemistry, in vivo imagining, and high-throughput chromosome capture technology. Those techniques provide useful insights into the fiber's structure and dynamics, but they are limited in resolution and scope, especially regarding compact fibers and chromosomes in the cellular milieu. Complementary but specialized modeling techniques are needed to handle large floppy polymers such as the chromatin fiber. In this review, we discuss current approaches in the chromatin structure field with an emphasis on modeling, such as molecular dynamics and coarse-grained computational approaches. Combinations of these computational techniques complement experiments and address many relevant biological problems, as we will illustrate with special focus on epigenetic modulation of chromatin structure. PMID:27345617

  11. Computational strategies to address chromatin structure problems

    Perišić, Ognjen; Schlick, Tamar

    2016-06-01

    While the genetic information is contained in double helical DNA, gene expression is a complex multilevel process that involves various functional units, from nucleosomes to fully formed chromatin fibers accompanied by a host of various chromatin binding enzymes. The chromatin fiber is a polymer composed of histone protein complexes upon which DNA wraps, like yarn upon many spools. The nature of chromatin structure has been an open question since the beginning of modern molecular biology. Many experiments have shown that the chromatin fiber is a highly dynamic entity with pronounced structural diversity that includes properties of idealized zig-zag and solenoid models, as well as other motifs. This diversity can produce a high packing ratio and thus inhibit access to a majority of the wound DNA. Despite much research, chromatin’s dynamic structure has not yet been fully described. Long stretches of chromatin fibers exhibit puzzling dynamic behavior that requires interpretation in the light of gene expression patterns in various tissue and organisms. The properties of chromatin fiber can be investigated with experimental techniques, like in vitro biochemistry, in vivo imagining, and high-throughput chromosome capture technology. Those techniques provide useful insights into the fiber’s structure and dynamics, but they are limited in resolution and scope, especially regarding compact fibers and chromosomes in the cellular milieu. Complementary but specialized modeling techniques are needed to handle large floppy polymers such as the chromatin fiber. In this review, we discuss current approaches in the chromatin structure field with an emphasis on modeling, such as molecular dynamics and coarse-grained computational approaches. Combinations of these computational techniques complement experiments and address many relevant biological problems, as we will illustrate with special focus on epigenetic modulation of chromatin structure.

  12. International partnership in lunar missions: Inaugural address

    Dr A P J Abdul Kalam

    2005-12-01

    I am delighted to participate in the 6th International Conference on Exploration and Utilization of the Moon organized by the Physical Research Laboratory,Ahmedabad.I greet the organizers, eminent planetary exploration and space scientists from India and abroad,academicians,industrialists,engineers,entrepreneurs and distinguished guests.I understand that the International Lunar Conference is a forum to discuss scienti fic results of the ongoing and future space missions related to lunar exploration.This conference will also be utilized to develop understanding on various strategies,initiatives and missions leading to a permanent human presence on our Moon as the future objective.I am happy to note that interactions that took place in the earlier conferences have been bene ficial to participating countries through the intense sharing of scientific knowledge,data and hands-on mission experiences of various space agencies pursuing lunar exploration programmes.I find that nearly 100 scientific papers are being presented in this conference and that the Moon missions being planned and conducted by all the space faring nations of the world are being presented,reviewed and discussed.I note with excitement that many key issues related to space science and Moon missions are being addressed in this conference.These deliberations are important for the world space science community.This will enable you to obtain a comprehensive picture of the goals and policies of all nations striving towards a common vision of space research,being made available for the bene fit of all mankind.Indeed this augurs well for progress towards universal peace and harmony that is a cherished goal of the people of the world as a whole.

  13. The new candidate IPV6 address size prediction

    Khaldoun Batiha

    2014-01-01

    Full Text Available IPv4 protocol is now no more sufficient due to its limited address space where this protocol uses only 32-bit for addressing. IPv6 protocol is the next protocol which was introduced as a new protocol that provide a huge address space .In This paper we discussed the significant overhead in the IPv6 standard packet due to its 128 bits address size, so we develop three different studies in order to generate a prediction of exhibition date for several address sizes so we can suggest another size for address size in IPv6 to improve the overall performance of the internet and tolerate the overhead by reducing the address size. In the same time this size should accommodate the accelerated growth in needs for unassigned blocks of addresses for very long time.   Keywords: Ipv4 Protocol, Ipv6 Protocol, Addressing Types, Ipv6 Header, Exhibition Date, Address Pool.

  14. Multi Sensor Approach to Address Sustainable Development

    Habib, Shahid

    2007-01-01

    The main objectives of Earth Science research are many folds: to understand how does this planet operates, can we model her operation and eventually develop the capability to predict such changes. However, the underlying goals of this work are to eventually serve the humanity in providing societal benefits. This requires continuous, and detailed observations from many sources in situ, airborne and space. By and large, the space observations are the way to comprehend the global phenomena across continental boundaries and provide credible boundary conditions for the mesoscale studies. This requires a multiple sensors, look angles and measurements over the same spot in accurately solving many problems that may be related to air quality, multi hazard disasters, public health, hydrology and more. Therefore, there are many ways to address these issues and develop joint implementation, data sharing and operating strategies for the benefit of the world community. This is because for large geographical areas or regions and a diverse population, some sound observations, scientific facts and analytical models must support the decision making. This is crucial for the sustainability of vital resources of the world and at the same time to protect the inhabitants, endangered species and the ecology. Needless to say, there is no single sensor, which can answer all such questions effectively. Due to multi sensor approach, it puts a tremendous burden on any single implementing entity in terms of information, knowledge, budget, technology readiness and computational power. And, more importantly, the health of planet Earth and its ability to sustain life is not governed by a single country, but in reality, is everyone's business on this planet. Therefore, with this notion, it is becoming an impractical problem by any single organization/country to bear this colossal responsibility. So far, each developed country within their means has proceeded along satisfactorily in implementing

  15. Moving to world's best uranium address

    Most exploration dollars spent in South Australia are focused on exploiting uranium. This is for good reason as South Australia is the world's best address for uranium. Pressure to cut CO2 emissions and the ballistic growth of the Chinese and Indian economies has heightened expectations that the worldwide use of uranium for power generation will mushroom beyond its current 17% market share. The recent Australia-China deal only seems to confirm this; hence uranium's growing popularity among miners and explorers. Such is the attractiveness of uranium-related floats, when Toro Energy sought $18m in March it was swamped with more than three times share application volume. In the north west, Southern Gold and Hindmarsh Resources are expectantly drilling for commercial uranium deposits all around the acreage that hosts the Challenger gold mine in the Gawler Craton. The first exploration drilling for uranium in quaternary-age river channels will take place in South Australia's far north in May. Red Metal says while older and deeper tertiary river channels in the area that host the Beverley uranium mine were explored for uranium, the younger near-surface channel has not had a single hole drilled for uranium. This is despite the area being one of the 'hottest radiogenic terrains in South Australia'. The company will target calcrete-style uranium mineralisation similar to the Yerrlirrie deposit in Western Australia (52,000t U308). Tasman Resources will start drilling to test seven uranium targets within 30km of Olympic Dam, the world's largest known uranium deposit, later this year. Tasman also holds tenements adjoining the Warrior uranium deposit near Tarcoola that contains known radiometric anomalies within the 40km-long Wynbring paleochannels. They are the fourth largest uranium explorer in South Australia. Alliance Resources and its JV partner Quasar Resources are exploring the Beverley 4 Mile uranium prospect at Arkaroola. Quasar is an affiliate of Heathgate Resources

  16. Evaluating Judicial Performance and Addressing Gender Bias

    Angela Melville

    2014-12-01

    Full Text Available Elek and Rottman argue that judicial evaluation is often biased against women and minority judges. The need to address bias is important, however often the desire for diversity seems so self-evident as to belie deeper analysis. This paper examines the two main rationales for gender equality on the bench. First, female judges are often considered necessary in order to bring a gendered perspective to judging, however it is argued that this rationale is flawed. Second, an alternative rationale based on equality and legitimacy is offered which avoids gender essentialism. While debates typically focus on these two rationales, a third rationale embraces both difference and equality/legitimacy. The presence of female judges has an important symbolic value which destabilises existing fraternal legal norms. Finally, increasing the number of female judges may not necessarily change judging, and this paper also analyses how the transformative potential offered by judicial diversity can work in practice. Elek y Rottman defienden que la evaluación judicial suele estar sesgada en contra de las mujeres y los jueces pertenecientes a minorías. La necesidad de abordar el sesgo es importante, sin embargo a menudo el deseo de diversidad parece tan evidente como para contradecir un análisis más profundo. Este artículo examina los dos motivos principales para la igualdad de género en el banquillo. En primer lugar, las mujeres jueces a menudo se consideran necesarias para aportar una perspectiva de género al hecho de juzgar, sin embargo, se defiende que este razonamiento es erróneo. En segundo lugar, se ofrece una alternativa lógica basada en la igualdad y la legitimidad que evita el esencialismo de género. Mientras que los debates suelen centrarse en estas dos razones, una tercera justificación abarca tanto la diferencia como la igualdad/legitimidad. La presencia de mujeres en la judicatura tiene un importante valor simbólico que desestabiliza las normas

  17. Addressing contrasting cognitive models in scientific collaboration

    Diviacco, P.

    2012-04-01

    If the social aspects of scientific communities and their internal dynamics is starting to be recognized and acknowledged in the everyday lives of scientists, it is rather difficult for them to find tools that could support their activities consistently with this perspective. Issues span from gathering researchers to mutual awareness, from information sharing to building meaning, with the last one being particularly critical in research fields as the geo-sciences, that deal with the reconstruction of unique, often non-reproducible, and contingent processes. Reasoning here is, in fact, mainly abductive, allowing multiple and concurrent explanations for the same phenomenon to coexist. Scientists bias one hypothesis over another not only on strictly logical but also on sociological motivations. Following a vision, scientists tend to evolve and isolate themselves from other scientists creating communities characterized by different cognitive models, so that after some time these become incompatible and scientists stop understanding each other. We address these problems as a communication issue so that the classic distinction into three levels (syntactic, semantic and pragmatic) can be used. At the syntactic level, we highlight non-technical obstacles that condition interoperability and data availability and transparency. At the semantic level, possible incompatibilities of cognitive models are particularly evident, so that using ontologies, cross-domain reconciliation should be applied. This is a very difficult task to perform since the projection of knowledge by scientists, in the designated community, is political and thus can create a lot of tension. The strategy we propose to overcome these issues pertains to pragmatics, in the sense that it is intended to acknowledge the cultural and personal factors each partner brings into the collaboration and is based on the idea that meaning should remain a flexible and contingent representation of possibly divergent views

  18. MAC Address as a Key for Data Encryption

    Al-Husainy, Dr. Mohammed Abbas Fadhil

    2013-01-01

    In computer networking, the Media Access Control (MAC) address is a unique value associated with a network adapter. MAC addresses are also known as hardware addresses or physical addresses. TCP/IP and other mainstream networking architectures generally adopt the OSI model. MAC addresses function at the data link layer (layer 2 in the OSI model). They allow computers to uniquely identify themselves on a network at this relatively low level. In this paper, suggested data encryption technique is...

  19. Temporal and Spatial Classification of Active IPv6 Addresses

    Plonka, David; Berger, Arthur

    2015-01-01

    There is striking volume of World-Wide Web activity on IPv6 today. In early 2015, one large Content Distribution Network handles 50 billion IPv6 requests per day from hundreds of millions of IPv6 client addresses; billions of unique client addresses are observed per month. Address counts, however, obscure the number of hosts with IPv6 connectivity to the global Internet. There are numerous address assignment and subnetting options in use; privacy addresses and dynamic subnet pools significant...

  20. Research on the Mo del of a Lightweight Resource Addressing

    LUO Bingqing; SUN Zhixin

    2015-01-01

    This paper discussed the characteristics of addressing from the perspective of Internet address-ing mechanism. An Internet of things (IOT) resource ad-dressing iteration model was defined. In the model, a di-rect addressing mode for active nodes and an indirect addressing mode for passive codes were proposed, which meet the requirement for multiple encoding mode. A uni-fied IOT resource lightweight addressing scheme based on IPv6 has been proposed to implement the two addressing modes. The scheme utilized the virtual domain to solve the problem of the heterogeneous encoding. The paper imple-mented the addressing process from the Internet host to the sensor node based on IPv6 over low-power wireless personal area networks (6LoWPAN) protocol. The experi-ment results show that the scheme is performed to realize communication between wireless sensor networks and IPv6 networks.

  1. Opening Address: Japan's Nuclear Reactor Strategy

    Thank you very much Mr. Chairman for your kind introduction. Distinguished colleagues, ladies and gentlemen, it is a great pleasure for me to have the chance to address you here in Kyoto at this 'International Conference on Fast Reactors and Related Fuel Cycles (FR09)'. At the outset, I would like to thank the IAEA for organizing this conference and, taking this opportunity, I would like to assure its new Director General, Y. Amano, of Japan's continuing support for the IAEA. I am looking forward to continuing to work with the IAEA in order to extend the benefits of the peaceful uses of nuclear energy and science and technology to a global population. We are witnessing today a global emergence of interest in the construction of nuclear power plants. There are a number of reasons for this. Major factors are the urgent and ever growing need for energy, particularly in the developing world, fluctuations in fossil fuel prices, the pursuit of security of energy supply and the growing recognition of the need to combat global warming. Despite the global economic crisis, the IAEA's latest projections continue to show a significant increase in nuclear generating capacity in the medium term. The low projection for 2030 is now 511 GW(e) of generating capacity, compared with 370 GW(e) today. The high projection is 807 GW(e); more than a doubling of present levels. Most of the 30 countries that already use nuclear power plan to expand their output. Growth targets have been raised significantly in China, India and the Russian Federation. In addition, according to the IAEA, some 50 countries - mostly in the developing world - have informed the IAEA that they might be interested in launching nuclear power programmes and 12 of these are actively considering nuclear power. Even in the high case projection, however, nuclear power's share of global power generation will go down from the current 16% level to 14% by 2030 and then rise to 22% by 2050, according to the projection

  2. Opening Address: Meeting Tomorrow's Energy Needs

    I want to thank the IAEA, as well as the international and local organizing committees, for assembling this impressive group of conference attendees to share information and exchange ideas this week. I am honoured to be a part of this distinguished panel. I also want to thank our Japanese colleagues for their wonderful hospitality and for selecting the beautiful city of Kyoto as the venue. This is an historic time of challenge and opportunity. President Obama is seeking to accelerate our nation's transformation to a low carbon economy. He has set a goal of reducing carbon emissions by 80 per cent by 2050. As we meet here in Kyoto, the site of another historic climate change discussion, President Obama is preparing to attend the United Nations Climate Change Conference in Copenhagen, continuing his Administration's commitment to tackling climate change and building a clean energy economy. Four months ago, Dr. Warren 'Pete' Miller was confirmed by the United States Senate to serve as Assistant Secretary for the Department of Energy's Office of Nuclear Energy. Soon afterwards, I joined Pete as his Principal Deputy. In that short time, Pete and I have come to appreciate fully the enormous task we have before us. Transforming our economy from one reliant on fossil fuels to a low carbon future will take investments in energy efficiency and all forms of low carbon energy technologies, including nuclear energy. Our job is to assure that nuclear technologies can contribute to meeting this aggressive goal for reduced greenhouse gas emissions. Nuclear energy can contribute to the future energy supply in two basic areas: (i) in its traditional role of generating electricity and (ii) as a source of process heat for industrial, petrochemical and desalination purposes. Within the Office of Nuclear Energy, we are now developing a roadmap that will help us in 'meeting tomorrow's energy needs' by addressing these two vital areas. We have established five strategic goals as the

  3. Results Analysis of IP Address Auto- Configuration in Wireless Manets

    S. Zahoor Ul Huq

    2011-10-01

    Full Text Available The main task of an address allocation protocol is to manage the address allocation to the nodes in the ad hoc MANETs. All routing protocols assume nodes to be configured a priori with a uniqueIP address. Allocating addresses to mobile nodes is a fundamental and difficult problem. A mobile device cannot participate in unicast communications until it is assigned a conflict-free IP address. So addressing in MANETs is of significant importance, and the address configuration process should be fast, as the algorithm must be able to select, allocate and assign a unique network address to the unconfigured node before with a unique IP address. Here we are providing two solutions for unique address assignment. One is by the using the broadcasting method (BrM, in which unique addresses are assigned, unique addresses are assigned with the cost of network load. This method works fine whenever a new ad hoc network has to be initiated and at a same time a group of nodes have to be configured with a unique IP addresses. But this method loads the network with much network traffic, when new nodes are to be joined. In order to overcome this we are using another approach which uses Modular Arithmetic (MoA. Modular Arithmetic with some modifications is used to generate the unique IP Addresses without loading the network. The proposed scheme is capable of assigning a unique IP address with low communicationoverhead, even addresses distribution and low latency when applied to large scale MANETs and even supports network merging and partitioning..

  4. Address forms in Persian based on Iranian movies

    Derakhshan Rokni, Tina

    2012-01-01

    The present thesis: “Address forms in Persian language based on Iranian movies”, investigates address forms as socio-linguistic forms which are directly related to social factors such as age, gender and social class. In the Persian language there is a strong tradition of addressing each other in various ways, changing from one context to another. Addressing is a universal phenomenon, but the rules that govern the choice are different from one language to another. So, the hierarchical struc...

  5. 76 FR 22681 - Defense Logistics Agency (DLA) Address Directory

    2011-04-22

    ... of the Secretary Defense Logistics Agency (DLA) Address Directory AGENCY: Department of Defense. ACTION: Notice. SUMMARY: The Defense Logistics Agency (DLA) is updating its Address Directory which is.... Jody Sinkler, 703-767-5045. SUPPLEMENTARY INFORMATION: DLA Address Directory: Defense Logistics...

  6. Address Terms among University Students in Ghana: A Case Study

    Afful, Joseph Benjamin Archibald

    2006-01-01

    An important feature of the interface between language and society is the use of address terms. Following Brown and Gilman (1960), research studies of address terms have been extended to several cultural settings. This study contributes to this fertile area of sociolinguistic studies by describing the address terms used among undergraduates in an…

  7. 47 CFR 69.128 - Billing name and address.

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false Billing name and address. 69.128 Section 69.128... Computation of Charges § 69.128 Billing name and address. Appropriate subelements shall be established for the use of equipment or facilities that are associated with offerings of billing name and address....

  8. Name-Based Address Mapping for Virtual Private Networks

    Surányi, Péter; Shinjo, Yasushi; Kato, Kazuhiko

    IPv4 private addresses are commonly used in local area networks (LANs). With the increasing popularity of virtual private networks (VPNs), it has become common that a user connects to multiple LANs at the same time. However, private address ranges for LANs frequently overlap. In such cases, existing systems do not allow the user to access the resources on all LANs at the same time. In this paper, we propose name-based address mapping for VPNs, a novel method that allows connecting to hosts through multiple VPNs at the same time, even when the address ranges of the VPNs overlap. In name-based address mapping, rather than using the IP addresses used on the LANs (the real addresses), we assign a unique virtual address to each remote host based on its domain name. The local host uses the virtual addresses to communicate with remote hosts. We have implemented name-based address mapping for layer 3 OpenVPN connections on Linux and measured its performance. The communication overhead of our system is less than 1.5% for throughput and less than 0.2ms for each name resolution.

  9. Address Points, GLYNN.ADDRESSES - Glynn County 911 Address, Published in 2010, 1:2400 (1in=200ft) scale, Glynn County Board of Commissioners.

    NSGIC GIS Inventory (aka Ramona) — This Address Points dataset, published at 1:2400 (1in=200ft) scale, was produced all or in part from Field Survey/GPS information as of 2010. It is described as...

  10. A New Method to Detect Abnormal IP Address on DHCP

    Ling-Feng Chiang; Jiang-Whai Dai

    2009-01-01

    Dynamic Host Configuration Protocol (DHCP) provides a means of allocating and managing IP addresses dynamically over a network. An important characteristic of the DHCP server is that different hosts or network cards are not allowed to simultaneously use the same IP address in the DHCP mechanism. However, anyone can guest corresponding parameters such as IP address, subnet mask, and default gateway from the DHCP mode, and then reconfigure a static IP to access the network from DHCP mode. Accor...

  11. Discovery of IPv6 router interface addresses via heuristic methods

    Gray, Matthew D.

    2015-01-01

    With the assignment of the last available blocks of public IPv4 addresses from Internet Assigned Numbers Authority, there is continued pressure for widespread IPv6 adoption. Because the IPv6 address space is orders of magnitude larger than the IPv4 address space, researchers need new methods and techniques to accurately measure and characterize growth in IPv6. This thesis focuses on IPv6 router infrastructure and examines the possibility of using heuristic methods in order to discover IPv6 ro...

  12. The significance of addressing trauma in outpatient psychiatry.

    Al-Saffar, S; Borgå, P; Lawoko, S; Edman, G; Hällström, T

    2004-01-01

    Establishing post-traumatic stress disorder as a psychiatric diagnosis has only marginally increased awareness of traumatic experiences. Traumas are inconsistently recorded in initial psychiatric histories and, when observed, rarely reflected in the primary diagnosis and treatment. The present study aimed to investigate if there is an association between sufficiently addressing trauma and long-term outcome and what factors affect whether trauma, according to the patient's view, is sufficiently addressed or not. Socio-demographic data, experiences of trauma and treatment, and outcome, were collected retrospectively from Arabic, Iranian, Turkish and Swedish patients, who had visited a psychiatric clinic 3-4 years earlier. Fifty-one patients whose traumatic experiences had been sufficiently addressed were compared with 39 patients who perceived that their traumas had not been addressed. Logistic regression analyses were performed to examine relationships between clinical variables and whether or not traumas had been addressed. Patients with trauma sufficiently addressed reported high confidence in staff (odds ratio, OR=7.2, pSwede (OR=2.4, p<0.10) were the background variables independently related to having trauma sufficiently addressed. Addressing trauma may improve patients' confidence in staff, self-rated health and trauma-related symptoms. Multiplicity of traumas and belonging to an ethnic minority implied that trauma was less addressed. PMID:15370780

  13. IP ADDRESS AUTOCONFIGURATION FOR WIRELESS AD HOC NETWORKS

    阿姆贾德

    2002-01-01

    A novel mechanism was specified by which a node in ad hoc network may autoconfigure an IP address which is unique throughout the mobile ad hoc network. This new algorithm imposes less and constant overhead and delay in obtaining an IP address, and fully utilizes the available addresses space of an ad hoc network, and independent of the existing routing protocol, and less prone to security threats. Moreover, a new Join/Leave mechanism was proposed as an enhancement to the new IP address autoconfiguration algorithm, to support the overall operation of the existing routing protocol of wireless ad hoc networks.

  14. Student Perceptions of Peer Credibility Based on Email Addresses

    Livermore, Jeffrey A.; Scafe, Marla G.; Wiechowski, Linda S.; Maier, David J.

    2013-01-01

    The purpose of this study was to evaluate students' perceptions of their peer's credibility based on email addresses. The survey was conducted at a community college in Michigan where all students were registered and actively taking at least one course. The survey results show that a student's selection of an email address does influence other…

  15. The (Im)possibility of the Project: Radford Address

    Green, Bill

    2010-01-01

    In this address, the author engages both with the possibility "and" the impossibility of the educational project--and suggests something of what it means to say this. His presentation is specifically addressed to the theme of the (im)possibility of the educational project. He draws from philosophy, literature, psychoanalysis and history, as well…

  16. The "Depreciation" and "Appreciation" of Some Address Terms in China.

    Zhucheng, Ju

    1991-01-01

    Examines how the cultural revolution in China has changed, to some extent, the rules governing the use of address terms, discussing the close interrelation between the use of address terms and cultural values and how the change in mental outlook has led to the depreciation or appreciation of certain terms. (Author/CB)

  17. Chair's Address: Voices of the Company We Keep

    Anokye, Akua Duku

    2007-01-01

    This article presents a written version of the address Akua Duku Anokye, chairwoman of the Conference on College Composition and Communication (CCCC), gave at the CCCC meeting in New York on March 24, 2007. In her address, Anokye talked about the importance of how an entity or an individual is known by the company they keep. To learn with whom has…

  18. 77 FR 11116 - Draft National Plan To Address Alzheimer's Disease

    2012-02-24

    ... HUMAN SERVICES Draft National Plan To Address Alzheimer's Disease AGENCY: Office of the Assistant.... SUMMARY: HHS is soliciting public input on the draft National Plan to Address Alzheimer's Disease, which... Alzheimer's disease. Coordinate Alzheimer's disease research and services across all federal...

  19. Method for the electro-addressable functionalization of electrode arrays

    Harper, Jason C.; Polsky, Ronen; Dirk, Shawn M.; Wheeler, David R.; Arango, Dulce C.; Brozik, Susan M.

    2015-12-15

    A method for preparing an electrochemical biosensor uses bias-assisted assembly of unreactive -onium molecules on an electrode array followed by post-assembly electro-addressable conversion of the unreactive group to a chemical or biological recognition group. Electro-addressable functionalization of electrode arrays enables the multi-target electrochemical sensing of biological and chemical analytes.

  20. 32 CFR Appendix B to Part 516 - Mailing Addresses

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Mailing Addresses B Appendix B to Part 516 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY AID OF CIVIL AUTHORITIES AND PUBLIC RELATIONS LITIGATION Pt. 516, App. B Appendix B to Part 516—Mailing Addresses The following is...

  1. Student Perceptions of Faculty Credibility Based on Email Addresses

    Livermore, Jeffrey A.; Scafe, Marla G.; Wiechowski, Linda S.

    2010-01-01

    The purpose of this study was to evaluate students' perceptions of faculty credibility based on email addresses. The survey was conducted at an upper division business school in Michigan where all students have completed at least two years of college courses. The survey results show that a faculty member's selection of an email address does…

  2. Faculty Perceptions of Student Credibility Based on Email Addresses

    Livermore, Jeffrey A.; Wiechowski, Linda S.; Scafe, Marla G.

    2011-01-01

    The purpose of this study was to evaluate faculty perceptions of student credibility based on email addresses. The survey was conducted at an upper division business school in Michigan where all students have completed at least two years of college courses. The survey results show that a student's selection of an email address does influence the…

  3. Duplicate Address Detection Table in IPv6 Mobile Networks

    Alisherov, Farkhod; Kim, Taihoon

    In IP networks, each computer or communication equipment needs an IP address. To supply enough IP addresses, the new Internet protocol IPv6 is used in next generatoion mobile communication. Although IPv6 improves the existing IPv4 Internet protocol, Duplicate Address Detection (DAD) mechanism may consume resources and suffer from long delay. DAD is used to ensure whether the IP address is unique or not. When a mobile node performs an inter-domain handoff, it will first generate a new IP and perform a DAD procedure. The DAD procedure not only wastes time but also increases the signaling load on Internet. In this paper, the author proposes a new DAD mechanism to speed up the DAD procedure. A DAD table is created in access or mobility routers in IP networks and record all IP addresses of the area. When a new IP address needs to perform DAD, it can just search in the DAD table to confirm the uniqueness of the address.

  4. IPv6 addressing proxy: mapping native addressing from legacy technologies and devices to the Internet of Things (IPv6).

    Jara, Antonio J; Moreno-Sanchez, Pedro; Skarmeta, Antonio F; Varakliotis, Socrates; Kirstein, Peter

    2013-01-01

    Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT). IPv6 provides addressing space to reach this ubiquitous set of sensors, but legacy technologies, such as X10, European Installation Bus (EIB), Controller Area Network (CAN) and radio frequency ID (RFID) from the industrial, home automation and logistic application areas, do not support the IPv6 protocol. For that reason, a technique must be devised to map the sensor and identification technologies to IPv6, thus allowing homogeneous access via IPv6 features in the context of the IoT. This paper proposes a mapping between the native addressing of each technology and an IPv6 address following a set of rules that are discussed and proposed in this work. Specifically, the paper presents a technology-dependent IPv6 addressing proxy, which maps each device to the different subnetworks built under the IPv6 prefix addresses provided by the internet service provider for each home, building or user. The IPv6 addressing proxy offers a common addressing environment based on IPv6 for all the devices, regardless of the device technology. Thereby, this offers a scalable and homogeneous solution to interact with devices that do not support IPv6 addressing. The IPv6 addressing proxy has been implemented in a multi-protocol Sensors 2013, 13 6688 card and evaluated successfully its performance, scalability and interoperability through a protocol built over IPv6. PMID:23686145

  5. IPv6 Addressing Proxy: Mapping Native Addressing from Legacy Technologies and Devices to the Internet of Things (IPv6

    Peter Kirstein

    2013-05-01

    Full Text Available Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT. IPv6 provides addressing space to reach this ubiquitous set of sensors, but legacy technologies, such as X10, European Installation Bus (EIB, Controller Area Network (CAN and radio frequency ID (RFID from the industrial, home automation and logistic application areas, do not support the IPv6 protocol. For that reason, a technique must be devised to map the sensor and identification technologies to IPv6, thus allowing homogeneous access via IPv6 features in the context of the IoT. This paper proposes a mapping between the native addressing of each technology and an IPv6 address following a set of rules that are discussed and proposed in this work. Specifically, the paper presents a technology-dependent IPv6 addressing proxy, which maps each device to the different subnetworks built under the IPv6 prefix addresses provided by the internet service provider for each home, building or user. The IPv6 addressing proxy offers a common addressing environment based on IPv6 for all the devices, regardless of the device technology. Thereby, this offers a scalable and homogeneous solution to interact with devices that do not support IPv6 addressing. The IPv6 addressing proxy has been implemented in a multi-protocol Sensors 2013, 13 6688 card and evaluated successfully its performance, scalability and interoperability through a protocol built over IPv6.

  6. ALEX: Improving SIP Support in Systems with Multiple Network Addresses

    Torrero, Livio; Risso, Fulvio Giovanni Ottavio; Baldi, Mario

    2005-01-01

    The successful and increasingly adopted session initiation protocol (SIP) does not adequately support hosts with multiple network addresses, such as dual-stack (IPv4-IPv6) or IPv6 multi-homed devices. This paper presents the Address List Extension (ALEX) to SIP that adds effective support to systems with multiple addresses, such as dual-stack hosts or multi-homed IPv6 hosts. ALEX enables IPv6 transport to be used for SIP messages, as well as for communication sessions between SIP user agents ...

  7. IP address lookup for Internet routers using cache routing table

    Houassi Hichem; Bilami Azeddine

    2010-01-01

    So that the routers forward an IP packet with his destination, they are running a forwarding decision on an incoming packet to determine the packet's next-hop router. This is achieved by looking up the longest matching prefix with a packet destination address in the routing tables. Therefore, one major factor in the overall performance of a router is the speed of the IP address lookup operation due to the increase in routing table size, in this paper, a new IP address lookup algorithm based o...

  8. Bringing location to IP Addresses withIP Geolocation

    Jamie Taylor; Joseph Devlin; Kevin Curran

    2012-01-01

    IP Geolocation allows us to assign a geographicallocation to an IP addressallowing us to build up a picture of the person behind that IP address.This can have many potential benefits for business and other types of application.The IP address of a device is unique to that device and as such the location can be narrowed down from the continent to the country and even to the street address of the device. This method of tracking can have very broad resultsand can sometimes only get an accurate re...

  9. 32 CFR 806.26 - Addressing FOIA requests.

    2010-07-01

    ... AFCEE/MSI, 3207 North Road, Brooks AFB, TX 78235-5363. (4) Air Force Civil Engineering Support Agency... FREEDOM OF INFORMATION ACT PROGRAM § 806.26 Addressing FOIA requests. (a) FOIA requests concerning...

  10. 27 CFR 7.25 - Name and address.

    2010-04-01

    ... false or misleading impression as to the geographic origin of the beer. (2) If malt beverages are... address in connection with the particular malt beverage. (Approved by the Office of Management and...

  11. Building a next generation Internet with source address validation architecture

    WU JianPing; REN Gang; LI Xing

    2008-01-01

    The IP packet forwarding of current Internet is mainly destination based. In the forwarding process, the source IP address is not checked in most cases.This causes serious security, management and accounting problems. Based on the drastically increased IPv6 address space, a "source address validation architecture" (SAVA) is proposed in this paper, which can guarantee that every packet received and forwarded holds an authenticated source IP address. The design goals of the architecture are lightweight, loose coupling, "multi-fence support" and incremental deployment. This paper discusses the design and implementation for the architecture, including inter-AS, intra-AS and local subnet. The performance and scalability of SAVA are described. This architecture is deployed into the CNGI-CERNET2infrastructure--a large-scale native IPv6 backbone network of the China Next Generation Internet project. We believe that the SAVA will help the transition to a new, more secure and dependable Internet.

  12. Web Sites that Address Gestational Diabetes and Perinatal Obesity

    Montgomery, Kristen S.

    2003-01-01

    Obesity contributes to multiple health problems during pregnancy and predisposes a woman to develop gestational diabetes. This column reviews the currently best Web sites that address gestational diabetes and obesity during the perinatal period.

  13. Management of Address Information to Improve Quality of Customer Contact

    CHANG Taiwoo; PARK Jinwoo; PARK Chankwon; JEONG Hanil; NAM Yunseok

    2004-01-01

    Customer relationship management systems are gaining importance in today's business environment since customer satisfaction is crucial to the success of an enterprise, and especially so in e-business environment where customers can find substitute suppliers quite easily. In CRM, the quality of customer information is very important, and the address information even more so. It is because the address information plays a major role for customer contact channel and for timely and effective marketing service. Furthermore, it gives the basic source of geographic information for the offline delivery, the terminal activity of the e-commerce. In this study, we analyze various standards and proposals for the address information, and propose data models for the management of the information focusing on address components, and proto-type systems for management and service.

  14. Address Points, Greenclp, Published in 2005, Daggett County.

    NSGIC GIS Inventory (aka Ramona) — This Address Points dataset, was produced all or in part from Not Provided information as of 2005. It is described as 'Greenclp'. Data by this publisher are often...

  15. Address Points, areas, Published in 2008, Daggett County.

    NSGIC GIS Inventory (aka Ramona) — This Address Points dataset, was produced all or in part from Other information as of 2008. It is described as 'areas'. Data by this publisher are often provided in...

  16. Address Points, Manilaclp, Published in 2005, Daggett County.

    NSGIC GIS Inventory (aka Ramona) — This Address Points dataset, was produced all or in part from Not Provided information as of 2005. It is described as 'Manilaclp'. Data by this publisher are often...

  17. Address Points, birch, Published in 2005, Daggett County.

    NSGIC GIS Inventory (aka Ramona) — This Address Points dataset, was produced all or in part from Other information as of 2005. It is described as 'birch'. Data by this publisher are often provided in...

  18. Address Points, Birchclp, Published in 2005, Daggett County.

    NSGIC GIS Inventory (aka Ramona) — This Address Points dataset, was produced all or in part from Not Provided information as of 2005. It is described as 'Birchclp'. Data by this publisher are often...

  19. Address Points, gridTest, Published in 2005, Daggett County.

    NSGIC GIS Inventory (aka Ramona) — This Address Points dataset, was produced all or in part from Not Provided information as of 2005. It is described as 'gridTest'. Data by this publisher are often...

  20. Address Points, Clayclp, Published in 2005, Daggett County.

    NSGIC GIS Inventory (aka Ramona) — This Address Points dataset, was produced all or in part from Other information as of 2005. It is described as 'Clayclp'. Data by this publisher are often provided...

  1. Address Points, Dutchclp, Published in 2005, Daggett County.

    NSGIC GIS Inventory (aka Ramona) — This Address Points dataset, was produced all or in part from Other information as of 2005. It is described as 'Dutchclp'. Data by this publisher are often provided...

  2. Address Points, Manila, Published in 2005, Daggett County.

    NSGIC GIS Inventory (aka Ramona) — This Address Points dataset, was produced all or in part from Other information as of 2005. It is described as 'Manila'. Data by this publisher are often provided...

  3. Address Points, areas-bk, Published in 2005, Daggett County.

    NSGIC GIS Inventory (aka Ramona) — This Address Points dataset, was produced all or in part from Other information as of 2005. It is described as 'areas-bk'. Data by this publisher are often provided...

  4. Address Points, Published in Not Provided, Shield Engineering, Inc..

    NSGIC GIS Inventory (aka Ramona) — This Address Points dataset as of Not Provided. Data by this publisher are often provided in Not Applicable coordinate system; in a Not Applicable projection; The...

  5. Find Shortage Areas: HPSA & MUA/P by Address

    U.S. Department of Health & Human Services — The Find Shortage Areas: Health Professional Shortage Area (HPSA) and Medically Underserved Area/Population (MUA/P) by Address tool is a locator tool designed to...

  6. A Comparative Study of Chinese and American Ways of Address

    李静

    2009-01-01

    From a cross-cultural pragmatic perspective,this paper nakes a comparative study on American and Chinese ways of address,and finds that due to different cultural values,languages differ in the actual realization of address strategies and modifications,which leads to varied interactional styles,and thus holds that there exist distinctive cultural differences in the interactional styles of verbal behaviors,which challenges the universality of pragmatic rules among different languages and cultures.

  7. Presidential Address: Industry Location, Economic Development Incentives, and Clusters

    Woodward, Douglas P.

    2012-01-01

    In his Presidential Address, Professor Woodward uses South Carolina’s economic development experience as a case study of significant challenges in regional development. The state has re-industrialized and emerged as a leader in attracting capital investment through generous financial incentives, after watching the demise of its major industry cluster (textiles and apparel) since the 1970s. The address argues that regional science research continues to advance our understanding of regional pol...

  8. A DHCP-based IP address autoconfiguration for MANETs

    Calderón, María; Bernardos, Carlos J.

    2006-01-01

    Mobile Ad hoc Networks (MANETs) are expected to become more and more important in the upcoming years, playing a significant role in 4G networks. In order to enable the deployment of IP services in such networks, IP address autoconfiguration mechanisms are required. Although the ad hoc topic has been a very intense research area, with a plethora of published papers about routing, there is a lack of proposals of address autoconfiguration with enough support from the technical ...

  9. Addressing Limited Data for Textual Entailment Across Domains

    Shivade, Chaitanya; Raghavan, Preethi; Patwardhan, Siddharth

    2016-01-01

    We seek to address the lack of labeled data (and high cost of annotation) for textual entailment in some domains. To that end, we first create (for experimental purposes) an entailment dataset for the clinical domain, and a highly competitive supervised entailment system, ENT, that is effective (out of the box) on two domains. We then explore self-training and active learning strategies to address the lack of labeled data. With self-training, we successfully exploit unlabeled data to improve ...

  10. 43 CFR Appendix B to Part 2 - Internet Addresses

    2010-10-01

    ... Regulations (43 CFR, Part 2, Subparts A and B): http://www.doi.gov/foia/foiaregs.html 7. DOI FOIA Policy and... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Internet Addresses B Appendix B to Part 2... INFORMATION ACT Pt. 2, App. B Appendix B to Part 2—Internet Addresses 1. Department of the Interior (DOI)...

  11. The role of game design in addressing behavioural change

    Coulton, Paul

    2015-01-01

    With the increasing promotion of design for behavioural change as a means of addressing the complex societal and environmental challenges the world currently faces, comes the associated challenge of developing appropriate design techniques to achieve such change. Whilst many designers have sought inspiration from game design they have often drawn from the techniques associated with ‘gamification’ which has been heavily criticised as manipulative and only capable of addressing simplistic extri...

  12. A New Method to Detect Abnormal IP Address on DHCP

    Ling-Feng Chiang

    2009-08-01

    Full Text Available Dynamic Host Configuration Protocol (DHCP provides a means of allocating and managing IP addresses dynamically over a network. An important characteristic of the DHCP server is that different hosts or network cards are not allowed to simultaneously use the same IP address in the DHCP mechanism. However, anyone can guest corresponding parameters such as IP address, subnet mask, and default gateway from the DHCP mode, and then reconfigure a static IP to access the network from DHCP mode. According to the DHCP mechanism, this study traces abnormalities of the client IP or MAC address by comparing the ARP table and DHCP binding table in this paper. This work performs the proposed method to detect abnormal hosts on both DHCPv4 and DHCPv6. The difference between these two tables provides illegality information to transmit to relevant routers or switching devices via the DHCP server to block the illegal user from accessing network resources. This study approach requires no source address or MAC address retrieval of the packet. This work significantly improves system performance by effectively blocking illegal users before packets transmit.

  13. THE PRAGMATIC MEANINGS OF ADDRESS TERMS SAMPEYAN AND ANDA

    Djoko Susanto

    2014-07-01

    Full Text Available Abstract: This research investigates the use of sampeyan and anda by the students from Pasuruan and Probolinggo. Address terms is one of important tools in communication in Javanese society as it is used, for example, to designate the person they are talking to or to show the possession of formal and informal manners. However, the use of this address terms may have different interpretation across regions. This research is undertaken to find out (1 factors that influence the choice of address terms sampeyan and anda in Pasuruan and Probolinggo and (2 situations in which the interlocutors use the address terms sampeyan and anda. Several theories are used to help analyze the data, which include address terms (Wardhaugh, 2002, sampeyan and anda (Wolf & Poedjosoedarmo, 1982, Politeness theory (Brown & Levinson, 1987, and Power and Solidarity (Brown & Gilman, 1960. The data were obtained from the results of observations, questionnaires and interviews with the participants. The results of the study show that both sampeyan and anda were found to be commonly used by the participants to address their lecturer, instead of using Bapak. This is, of course, uncommon from either the perspective of standard usage of Javanese or Indonesian language. This study also indicates that the participants used sampeyan to lecturer/teacher, kyai, parent, and older sibling because they wanted to express (1 express politeness and (2 to indicate informality. Concerning to the use of anda, this study reveals that the participants use this address term because of (1 more formal and appropriate manners in environmental education, (2 respecting person of higher social status and older person, (3 more polite and more appropriate than sampeyan, and (4 the use of Indonesian as a formal language. In some respect, however, the participants use anda to lecturer/teacher, which is not appropriate because they were not socially equal to the lecturer/teacher.  This study provide

  14. Address Points, Richland Co Address Points, Published in 2006, 1:4800 (1in=400ft) scale, MSA Professional Services.

    NSGIC GIS Inventory (aka Ramona) — This Address Points dataset, published at 1:4800 (1in=400ft) scale, was produced all or in part from Published Reports/Deeds information as of 2006. It is described...

  15. Address Points, County Wide Address Points, Published in 2008, 1:2400 (1in=200ft) scale, Hamilton County.

    NSGIC GIS Inventory (aka Ramona) — This Address Points dataset, published at 1:2400 (1in=200ft) scale, was produced all or in part from Not Provided information as of 2008. It is described as 'County...

  16. Methods for generating addressable focus cues in stereoscopic displays

    Liu, Sheng

    Conventional stereoscopic displays present a pair of stereoscopic images on a single and fixed image plane decoupled with the vergence and accommodation responses of the viewer. In consequence, these displays lack the capability of correctly rendering focus cues (i.e. accommodation and retinal blur) and may induce the discrepancy between accommodation and convergence. A number of visual artifacts associated with incorrect focus cues in stereoscopic displays have been reported, limiting the applicability of these displays for demanding applications and daily usage. In this dissertation, methods and apparatus for generating addressable focus cues in conventional stereoscopic displays are proposed. Focus cues can be addressed throughout a volumetric space, either through dynamically varying the focal distance of a display enabled by an active optical element or by multiplexing a stack of 2-D image planes. Optimal depth-weighted fusing functions are developed to fuse a number of discrete image planes into a seamless volumetric space with continuous and near-correct focus cues similar to the real world counterparts. The optical design, driving methodology, and prototype implementation of the addressable focus displays are presented and discussed. Experimental results demonstrate continuously addressable focus cues from infinity to as close as the near eye distance. Experiments to further evaluate the depth perception in the display prototype are conducted. Preliminary results suggest that the perceived distance and accommodative response of the viewer match with the addressable accommodation cues rendered by the display, approximating the real-world viewing condition.

  17. Terms of Address in the Chinese Business Enterprise

    Xiaoyan Huang

    2014-06-01

    Full Text Available This study examines terms of address currently used by employees of Chinese business enterprises. The authors find that a speaker’s address selections are related significantly to the gender of the speaker, the location of the enterprise in Eastern or Western China, and the ownership type of the enterprise; that is, whether the enterprise is state-owned or privately owned.  The authors develop hypotheses to explain the social origins of these observations.  It is also observed that the semantics of address in the enterprise persist across changes in underlying terminology and are resilient with respect to mandated speech.  In examining this subject of persistence, the authors find that the term ‘gē/jiě’ (brother/sister has replaced the term ‘tóngzhì’ (comrade as the primary means of expressing solidarity within the business enterprise.  The authors consider the question of whether address choices can be predicted based on externally observable situations or whether such choices require knowledge of the speaker’s motivations, which are not externally observable.  It is concluded that address is most predictable in situations where power is salient and less predictable in other situations.   

  18. Achieving Load Balance by Separating IP Address Spaces

    Sanqi Zhou

    2013-01-01

    Full Text Available In this paper, we propose a load balance approach by separating the host and router IP addresses into two spaces. In addition, in our approach, we propose a scheduling algorithm, named Edge Stream Balance (ESB, which is used by the proposed multipath routing scheme based on the address space separation. Each router can schedule each stream that is initiated by the connected host onto the proper path to the destination host by ESB dynamically. The multiple paths between any pair of hosts can be obtained by the connected routers by using the address separating mechanism. The merit of our approach is that: it balances the network traffic dynamically while being free of traffic demand assumption and offline flow optimization. The path of each stream is selected by each router individually other than using central system based on the address separation. The time complexity of ESB is much lower than the linear programming (LP and integer linear programming (ILP which are used in flow optimization. Simulation results show that on average of all simulated scenarios, compared to the existing single path routing which is based on the address separating, the unused link ratio (ULR reduces by 82%. And in the relative sense, the traffic across the network is balanced 31%.

  19. Wind versus Biofuels for Addressing Climate, Health, and Energy

    The favored approach today for addressing global warming is to promote a variety of options: biofuels, wind, solar thermal, solar photovoltaic, geothermal, hydroelectric, and nuclear energy and to improve efficiency. However, by far, most emphasis has been on biofuels. It is shown here, though, that current-technology biofuels cannot address global warming and may slightly increase death and illness due to ozone-related air pollution. Future biofuels may theoretically slow global warming, but only temporarily and with the cost of increased air pollution mortality. In both cases, the land required renders biofuels an impractical solution. Recent measurements and statistical analyses of U.S. and world wind power carried out at Stanford University suggest that wind combined with other options can substantially address global warming, air pollution mortality, and energy needs simultaneously.

  20. Address switching: Reforming the architecture and traffic of Internet

    LI Xing; BAO CongXiao

    2009-01-01

    The success of the Internet is largely ascribable to the packet-switching scheme, which, however, also presents major challenges. Having identified three missing links in the current Internet architecture based on our long-term experiences of designing and operating large-scale backbones, we put forward a new, but incrementally deployable, network scheme-address switching. The address switching has both the advantages of packet switching and circuit switching; it supplies the missing links in the current Internet architecture and can reform the Internet traffic. Our analysis, protocol design and experiments indicate that the address switching can greatly improve the quality of service (QoS), security and routing scalability of today's Internet. So it can provide flexible, high-performance and "per-service" networking for the scientific research communities. Moreover, it can provide a fairer and more sustainable business model for the commodity Internet.

  1. No Address Space Operating System Prototype and Its Performance Test

    LIU Fuyan; YOU Jinyuan

    2001-01-01

    In this paper,we first analyze datastorage models in typical operating systems,the re-lation between distributed shared memory and datastorage model,as well as the relation between mem-ory hierarchy and data storage model.Then we pro-pose the concept of No Address Space Operating Sys-tem,discuss an implementation prototype,and ana-lyze its performance and advantages.We believe thatthe concept of process virtual address space should beabandoned in operating systems,instructions shouldaccess files directly,and processes should run on files.Compared with other operating systems,No AddressSpace Operating System has many advantages andshould be adopted in computer systems.

  2. High-capacity content-addressable memory architecture

    Henshaw, Philip D.; Lis, Steven A.

    1993-11-01

    This paper describes a new hardware architecture for searching and accessing data. This Content Addressable Memory (CAM) can be implemented using holographic storage in spectral hole burning media. The use of laser wavelength as a fourth dimension for volume holographic recording provides an additional addressing variable which can be used to advantage in a CAM architecture. This paper consists of three parts: definition of a CAM, presentation of two CAM concepts for digital data string and analog function search, and a discussion of architecture issues.

  3. Neurochip Based on Light-addressable Potentiometric Sensor

    Qingjun Liu; Hua Cai; Ying Xu; Lifeng Qin; Lijiang Wang; Ping Wang

    2006-01-01

    A novel neurochip based on light addressable potentiometric sensor (LAPS) is designed. Using its light addressable characteristic. The problems of the limitations of restricted discrete active sites of current neurochips, such as microelectrode array and field effect transistor array can be settled easily. Based on the theoretical analysis of the interface between cells and LAPS, spontaneously discharges of hippocampal neurons induced by Mg2+-free media treatment were recorded by LAPS. The results demonstrate that this kind of neurochip has potential to monitor electrophysiology of cultured cells in a non-invasive way.

  4. Actions States and Communities Can Take to Address Cognitive Health

    2014-06-09

    In this podcast, CDC’s Dr. Lynda Anderson highlights the important roles that states and communities can play in addressing cognitive health as part of overall health.  Created: 6/9/2014 by National Center for Chronic Disease Prevention and Health Promotion (NCCDPHP).   Date Released: 6/9/2014.

  5. Addressing the Needs of Students with Rett Syndrome.

    Katsiyannis, Antonis; Ellenburg, Jennifer S.; Acton, Olivia M.; Torrey, Gregory

    2001-01-01

    This article discusses symptoms of students with Rett Syndrome, a disability in females characterized by the development of multiple specific deficits following a period of normal functioning after birth. Specific interventions for students with Rett syndrome are provided and address communication, stereotypic movements, self-injurious behaviors,…

  6. Addressing Physical and Emotional Issues in Children's Literature

    Johnson, Jonathon

    2010-01-01

    The purpose of this paper is to examine how physical and mental disabilities are addressed in children's literature. Many authors are able to integrate the issues into their work in a way that enhances the story and benefits the reader. As young readers learn about the issues and struggles faced by children with mental and physical disabilities,…

  7. 31 CFR 337.14 - Address for further information.

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Address for further information. 337.14 Section 337.14 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued... obtained from the Bureau of the Public Debt, Office of Public Debt Accounting, 200 Third Street, P.O....

  8. Listening for Women's Voices: Revisioning Courses in American Public Address.

    Vonnegut, Kristin S.

    1992-01-01

    Employs seventeenth- and eighteenth-century U.S. women's rhetoric as a case study to argue that the rhetoric of muted groups can and should be included in U.S. public address courses. Draws on theories of social history and literary criticism to illustrate how women's texts might be introduced into the classroom. (MG)

  9. Communicating one's local address and emergency contact details

    Information Technology Department, AIS (Administrative Information Services) Group; Human Resources Department, SPS (Services, Procedures and Social) Group

    2007-01-01

    As part of the ongoing simplification of procedures and rationalisation of administrative processes, the IT, PH (Users Office) and HR Departments have developed two new EDH forms for communicating or updating one's local address and emergency contact details. This is the first time that the forms relating to an official HR procedure can be accessed on a self-service basis and directly updated by the members of personnel themselves. The information recorded remains confidential and may only be accessed by the authorised administrative services and the emergency services. Local address: Members of the personnel must declare any change in their local address (Art. R V 1.38 of the Staff Regulations). This declaration is henceforth made by directly filling out the EDH document indicated below, and without requiring any other spontaneous formality vis-à-vis the department secretariat or the Users Office. It is also possible for any member of the personnel to check whether the local address in the Organizati...

  10. State Legislation to Address Childhood Obesity. Program Results Brief

    Fiester, Leila

    2012-01-01

    An estimated 12.5 million American children and teens are obese. Over time, the diseases and disabilities associated with obesity may undermine this population's health and result in substantial social and economic costs. Policies that address children's nutrition and physical activity are an important tool in reversing the obesity epidemic. More…

  11. Address by the Minister of Foreign Affairs of Lithuania

    Audronius Azubalis

    2010-08-01

    Full Text Available Address by the Minister of Foreign Affairs of Lithuania Audronius Azubalis to the participants of the First International Conference on Nordic and Baltic Studies in Romania:Romania and Lithuania in the Interwar International Relations: Bonds, Intersections and Encounters hosted by the Romanian Association for Baltic and Nordic Studies, Târgoviste, May 19-21, 2010.

  12. 27 CFR 5.36 - Name and address.

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Name and address. 5.36 Section 5.36 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY LIQUORS LABELING AND ADVERTISING OF DISTILLED SPIRITS Labeling Requirements...

  13. 78 FR 44438 - Notice of Organization Name and Address Change

    2013-07-24

    ... 501 Notice of Organization Name and Address Change AGENCY: Postal Service\\TM\\. ACTION: Final rule... successor organization. All submissions to the Postal Service required or invited by this part are to be... results, PT will issue a written acknowledgement and/or approval of the change to the provider. 0 7....

  14. Addressing Migrant Farmworkers' Perceptions of Schooling, Learning, and Education.

    Velazquez, Loida C.

    1995-01-01

    A study examined migrant farmworkers' perceptions regarding their early schooling, the significance of education, family support for learning, and their participation in adult basic education programs. Suggests that adult basic education programs should address the totality of needs that migrant learners bring to the educational setting. Overviews…

  15. A Breath of Fresh Air: Addressing Indoor Air Quality

    Palliser, Janna

    2011-01-01

    Indoor air pollution refers to "chemical, biological, and physical contamination of indoor air," which may result in adverse health effects (OECD 2003). The causes, sources, and types of indoor air pollutants will be addressed in this article, as well as health effects and how to reduce exposure. Learning more about potential pollutants in home…

  16. The Democratic Imperative to Address Sexual Equality Rights in Schools

    Gereluk, Dianne

    2013-01-01

    Issues of sexual orientation elicit ethical debates in schools and society. In jurisdictions where a legal right has not yet been established, one argument commonly rests on whether schools ought to address issues of same-sex relationships and marriage on the basis of civil equality, or whether such controversial issues ought to remain in the…

  17. Promoting Interdisciplinary Collaboration: Trainees Addressing Siloed Medical Education

    Kitts, Robert Li; Christodoulou, Joanna; Goldman, Stuart

    2011-01-01

    Objective: Professional siloing within medical institutions has been identified as a problem in medical education, including resident training. The authors discuss how trainees from different disciplines can collaborate to address this problem. Method: A group of trainees from psychiatry, developmental medicine, neurology, and education came…

  18. 7 CFR Appendix A to Part 2710 - List of Addresses

    2010-01-01

    ... records, and indexes to those records, is permitted. Section 2. List of Addresses Director, Office of Information Resources Management, 14th and Independence Ave., SW., Rm. 113-W, Washington, DC 20250; Hours: 8:30 a.m.-5:00 p.m. Chief, Planning Division, OIRM, 14th and Independence Ave., SW., Rm....

  19. Addressing the Need for Management Processes for Higher Education Accreditation.

    Brennan, Linda L.; Austin, Walter W.

    2003-01-01

    The accreditation standards of the Association to Advance Collegiate Schools of Business (AACSB International) ask business schools to describe consistent processes that provide for operational consistency and continuous improvement in support of the schools' stated missions. This article addresses the identification of requisite quality…

  20. Effective Organizational Structures and Processes: Addressing Issues of Change

    Andrade, Maureen Snow

    2016-01-01

    This chapter describes organizational structures and processes at the institutional and project levels for the development and support of distance learning initiatives. It addresses environmental and stakeholder issues and explores principles and strategies of effective leadership for change creation and management.

  1. Catholic Social Teaching: Addressing Globalization in Catholic Business Education

    Ball, James B.; Martinez, Zaida; Toyne, Brian

    2009-01-01

    Although business schools are increasingly aware of the importance of globalization in educating future business leaders, their business programs have addressed globalization from a limited perspective that fails to provide students with a broader understanding of its impact on societies and its moral consequences. The conventional approach to the…

  2. A WS-Addressing Profile for Distributed Process Documentation

    Munroe, S.; Groth, P.; Jiang, Sheng; Miles, S.; Tan, V.; Moreau, L

    2006-01-01

    Process documentation can often be distributed across different provenance stores. To enable the discovery of related process documentation, a mechanism is required to link disparate but related process documentation to enable the effective collection of such documentation in order to answer provenance queries. This document represents a WS-addressing profile on distributed process documentation that provides mechanisms to solve this problem.

  3. Addressing Parental Vaccination Questions in the School Setting

    Luthy, Karlen E.; Burningham, Jana; Eden, Lacey M.; Macintosh, Janelle L. B.; Beckstrand, Renea L.

    2016-01-01

    School nurses work in a unique environment with key opportunities to address parental concerns and questions regarding their child's health. A common concern for parents during school enrollment is childhood vaccination safety and efficacy. As public health leaders, school nurses are well respected among parents, therefore school nurses are in a…

  4. National Conference on Outdoor Leadership. 2008 Keynote Address

    Louv, Richard

    2008-01-01

    In this keynote address, Richard Louv laments that today's children lack direct connection to nature. Over the past 15 years, he interviewed families across the country about the changes in their lives, including their relationship with nature. With few exceptions, even in rural areas, parents say the same thing: Most children aren't playing…

  5. Secondary Data Analysis: An Important Tool for Addressing Developmental Questions

    Greenhoot, Andrea Follmer; Dowsett, Chantelle J.

    2012-01-01

    Existing data sets can be an efficient, powerful, and readily available resource for addressing questions about developmental science. Many of the available databases contain hundreds of variables of interest to developmental psychologists, track participants longitudinally, and have representative samples. In this article, the authors discuss the…

  6. Counter Measures to Combat Misuses of MAC Address Spoofing Techniques

    Alok Pandey

    2012-03-01

    Full Text Available In a computer network several communicating devices are connected to a common shared communication medium. A network interfacing card or a wireless network card is typically used to connect computers on a network. This gives rise to the need of unique identification mechanism to be followed for each of the connected devices. Media Access Control (MAC addressing is used to properly identify communicating devices. The term MAC spoofing refers to a situation when somebody changes the MAC address of his computer or the network communicating device to impersonate someone else based upon this MAC address identification. Although MAC spoofing may be essential in some situations yet it has become potential threat for the network security as it sets ground for formulating and launching different types of Attacks like ARP Spoofing, DNS Poisoning, Denial of Services, Session Hijacking, Man in the Middle Attack etc. on a network. The purpose of this paper is to spread the awareness about MAC addressing, MAC spoofing techniques normally used, different types of attacks that can be based upon MAC spoofing and some of the counter measures that can be adopted by common network users.

  7. Bullying in Schools: Addressing Desires, Not Only Behaviours

    Rigby, Ken

    2012-01-01

    Currently the main approach in responding to bullying in schools is to focus on undesired behaviours and to apply sanctions. This approach is often ineffective as well as failing to address the needs of children as persons as distinct from the behaviour they produce. A proposed alternative approach is to inquire into the motivation of children who…

  8. How Rhetorical Theories of Genre Address Common Core Writing Standards

    Collin, Ross

    2013-01-01

    This article begins with a review of the forms of writing promoted in the Common Core State Standards. Across content areas, Common Core encourages teachers to attune students' writing to rhetorical concerns of audience, purpose, task, and disciplinary thinking. To address these concerns, teachers might take a rhetorical approach to the study…

  9. Presidential Address: Culture and the Future of Education Research

    Halse, Christine

    2013-01-01

    Recent changes in higher education have confronted education research with a conundrum: how our traditionally multidisciplinary field can refine itself as a unified discipline. In this address I sketch out what this conundrum may mean for education research, both substantively and methodologically, in the future. I propose that one starting point…

  10. Utilizing Motivational Interviewing to Address Resistant Behaviors in Clinical Supervision

    Wahesh, Edward

    2016-01-01

    Motivational interviewing is presented as an approach to address resistant behaviors in clinical supervision. A case example is used to illustrate the process in which the relational and technical elements of motivational interviewing can be applied to supervisee resistance. Implications for supervisors and researchers are discussed.

  11. The role of health education in addressing the health divide

    Simovska, Venka

    2013-01-01

    The aim of this chapter is to argue that an approach to health education, consistent with critical education theory echoing Freire’s ideas, has the potential to play a significant role in addressing determinants of health by, first and foremost, providing children and young people with...

  12. Addressing Stereotypes by Moving along the Continuum of Cultural Proficiency

    Ward, Cheryl James

    2013-01-01

    Programs to help middle school students deal with racism and hate have been in place for some years, yet almost monthly we hear of students committing suicide or killing other students due to issues of isolation or harassment. Within the confines of a safe classroom, doctoral students in Educational Leadership addressed issues of stereotypes and…

  13. Addressing the Multi-scale lapsus of landscape

    Schoorl, J.M.

    2002-01-01

    "Addressing the Multi-scale Lapsus of Landscape" with the sub-title "Multi-scale landscape process modelling to support sustainable land use: A case study for the Lower Guadalhorce valley South Spain" focuses on the role of landscape as the main driving factor behind many geo-environm

  14. OPENING ADDRESS TO 2002 SINOAFRICAN SHP TRAINING WORKSHOP

    ZhuXiaozhang; HonoraryDirectorofHRC

    2002-01-01

    I am pleased to be here to give an opening address to this important training workshop specially designated for our African friends, which shows the sincere friendship between China and African countries. I'd also,together with our Director Dr. Chen,express my congratulations to you for your participation in the workshop.

  15. Sri Lanka: Addressing the Needs of an Aging Population

    World Bank

    2008-01-01

    This study is about the key issues that will have to be addressed in order to successfully avert serious problems, or even crisis, as Sri Lanka's inevitable population aging unfolds. The four main chapters of this report focus on these four critical areas in turn. The second chapter examines living arrangements, intergenerational transfers as well as the respect and authority old people en...

  16. The non addressed mail; Le courrier non adresse

    NONE

    2001-07-01

    In 1999, the non addressed mail aggregated i million tons. Today there is no selective collection of these wastes. The ADEME (french agency for the environment and the energy mastership) drove a study to propose and evaluate the cost of a selective collection. This document presents the results of the study. (A.L.B.)

  17. The Chamber of Mines' presidential address - 1992

    Steekamp, N. (Chamber of Mines of South Africa, Johannesburg (South Africa))

    1992-01-01

    The article consists of an abridged version of the address by the South African Chamber of Mines' President to the annual general meeting (June 1992). Aspects of South African mining discussed include: international relations; economic performance; cost containment; coal mining; commodity markets; diversification; mining's contribution to the South African economy; wages and wage agreements; and rationalisation.

  18. Bulimia: Issues a University Counseling Center Needs To Address.

    Whitner, Phillip A.; Shetterly, Arminta

    The eating disorder known as bulimia is a relatively new and baffling phenomenon. This paper raises questions that college and university counseling center professionals need to address regarding this phenomenon. The first section focuses on defining the term "bulimia" and its evolution. The second section identifies numerous symptoms that need to…

  19. Addressing Barriers to Learning. Volume 13, Number 2. Spring 2008

    Center for Mental Health in Schools at UCLA, 2008

    2008-01-01

    Concern about responding to behavior problems and promoting social and emotional learning are related and are embedded into the arenas we frame to encompass the content of student/learning supports. How these concerns are addressed is critical to the type of school and classroom climate that emerges and to student engagement and re-engagement in…

  20. Using Applied Theatre as a Tool to Address Netizenship

    Skeiker, Fadi Fayad

    2015-01-01

    This paper charts the ways in which a researcher uses applied theatre practice as a tool to address netizenship issues in the advancement of digital age by documenting a workshop he co-facilitated with graduate students at the University of Porto during the Future Places conference in 2013. The workshop used applied theatre both to catalyze…

  1. Addressing Cultural and Native Language Interference in Second Language Acquisition

    Allard, Daniele; Bourdeau, Jacqueline; Mizoguchi, Riichiro

    2011-01-01

    This paper addresses the problem of cultural and native language interference in second/foreign language acquisition. More specifically, it examines issues of interference that can be traced to a student's native language and that also have a cultural component. To this effect, an understanding of what actually comprises both interference and…

  2. Addressing Patient Sexual Orientation in the Undergraduate Medical Education Curriculum

    Tamas, Rebecca L.; Miller, Karen Hughes; Martin, Leslee J.; Greenberg, Ruth B.

    2010-01-01

    Objective: This study aims to estimate the number of hours dedicated to lesbian, gay, bisexual, and transgender content in one medical school's undergraduate curriculum, compare it to the national average, and identify barriers to addressing this content. Methods: Course and clerkship directors were asked to estimate how many hours they spent on…

  3. IPv6 Addressing Proxy: Mapping Native Addressing from Legacy Technologies and Devices to the Internet of Things (IPv6)

    Peter Kirstein; Socrates Varakliotis; Skarmeta, Antonio F.; Pedro Moreno-Sanchez; Jara, Antonio J.

    2013-01-01

    Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT). IPv6 provides addressing spa...

  4. The capability of national education systems to address ethnic diversity

    Charl C. Wolhuter

    2012-11-01

    Full Text Available Modern societies have become much more complex in recent decades, also in terms of ethnic identities and differences. The question arose whether education systems were capable of addressing the needs of ethnic and other minorities in countries across the globe. After examining a cross-section of education systems (in Australia, Canada, China, Israel, Malaysia, Rwanda, Russia and South Africa with the aid of a set of specially developed criteria, it was concluded that these systems seemed to comply with the criteria in various ways, albeit in different measures and in several configurations. It is recommended that policy makers apply such criteria for enhancing the capability of an education system to address the needs of ethnic minorities and to meet the demands of increased social complexity.

  5. Use of multicriteria decision analysis to address conservation conflicts.

    Davies, A L; Bryce, R; Redpath, S M

    2013-10-01

    Conservation conflicts are increasing on a global scale and instruments for reconciling competing interests are urgently needed. Multicriteria decision analysis (MCDA) is a structured, decision-support process that can facilitate dialogue between groups with differing interests and incorporate human and environmental dimensions of conflict. MCDA is a structured and transparent method of breaking down complex problems and incorporating multiple objectives. The value of this process for addressing major challenges in conservation conflict management is that MCDA helps in setting realistic goals; entails a transparent decision-making process; and addresses mistrust, differing world views, cross-scale issues, patchy or contested information, and inflexible legislative tools. Overall we believe MCDA provides a valuable decision-support tool, particularly for increasing awareness of the effects of particular values and choices for working toward negotiated compromise, although an awareness of the effect of methodological choices and the limitations of the method is vital before applying it in conflict situations. PMID:23869557

  6. Light addressable potentiometric sensor with an array of sensing regions

    Liang, Weiguo; Han, JingHong; Zhang, Hong; Chen, Deyong

    2001-09-01

    This paper describes the mechanism of light addressable poteniometric sensors (LAPS) from the viewpoints of Semiconductor Physics, and introduces the fabrication of a multi-parameter LAPS chip. The MEMS technology is applied to produce a matrix of sensing regions on the wafer. By doing that, the cross talk among these regions is reduced, and the precision of the LAPS is increased. An IR-LED matrix is used as the light source, and the flow-injection method is used to input samples. The sensor system is compact and highly integrated. The measure and control system is composed of a personal computer, a lock-in amplifier, a potentiostat, a singlechip system, and an addressing circuit. Some experiments have been done with this device. The results show that this device is very promising for practical use.

  7. Addressing single trapped ions for Rydberg quantum logic

    Bachor, P.; Feldker, T.; Walz, J.; Schmidt-Kaler, F.

    2016-08-01

    We demonstrate the excitation of ions to the Rydberg state 22F by vacuum ultraviolet radiation at a wavelength of 123 nm combined with the coherent manipulation of the optical qubit transition in {}40{{Ca}}+. With a tightly focused beam at 729 nm wavelength we coherently excite a single ion from a linear string into the metastable 3{D}5/2 state before a VUV pulse excites it to the Rydberg state. In combination with ion shuttling in the trap, we extend this approach to the addressed excitation of multiple ions. The coherent initialization as well as the addressed Rydberg excitation are key prerequisites for more complex applications of Rydberg ions in quantum simulation or quantum information processing.

  8. Address Counter Generators for Low Power Memory BIST

    Balwinder Singh

    2011-07-01

    Full Text Available In today's Integrated Circuits (IC's designs Built-in Self Test (BIST is becoming important for the memory which is the most necessary part of the System on Chip. The March algorithm has been widely used to test memory core of System on chip (SOC. LFSRs and counters are mainly used to generate the memory addresses, which can be serially applied to the memory cores under test. In this paper Address counters and Data generators (i.e. parts of the MBIST are designed. These implemented in Hardware Description Language (HDL, and the area and power analyzed for each case . From the analyzed results the low power LFSRs and counters can be identify for the low power memory BIST design.

  9. IPv6, To Enable Stateless Address Auto Configuration

    Vemulapalli Amrutha Sai1 , Gade Sindhu Meena2 , Kanuparthi Sravya3 , Bhuma Naresh

    2013-05-01

    Full Text Available Internet Protocol version 4, IPv4, is the standard for Internet ommunications. However, with the tremendous expansion of the Internet, IPv4 is proving to be incapable of handling the coming demand. A new standard will be accepted to allow the Internet to continue to grow in size as well as function. The shortage of addresses has led to the introduction of IPv6 which has 128-bit (16-byte source and destination IP addresses. Many organizations do not see a reason to convert to IPv6, and believe they are not running IPv6.2 Whether an organization knows it or not, any laptop/PC running Vista or Windows 7 is a vulnerability from which attacks can come that will be invisible to IPv4 networks. Three transition strategies are being employed: header translation, dual stack and tunneling of IPv6 inside IPv4.4 Tunneling is the most precarious method for today's

  10. Bioethicists Can and Should Contribute to Addressing Racism.

    Danis, Marion; Wilson, Yolonda; White, Amina

    2016-01-01

    The problems of racism and racially motivated violence in predominantly African American communities in the United States are complex, multifactorial, and historically rooted. While these problems are also deeply morally troubling, bioethicists have not contributed substantially to addressing them. Concern for justice has been one of the core commitments of bioethics. For this and other reasons, bioethicists should contribute to addressing these problems. We consider how bioethicists can offer meaningful contributions to the public discourse, research, teaching, training, policy development, and academic scholarship in response to the alarming and persistent patterns of racism and implicit biases associated with it. To make any useful contribution, bioethicists will require preparation and should expect to play a significant role through collaborative action with others. PMID:26982911