WorldWideScience

Sample records for cycle-true ip emulator

  1. A Reactive and Cycle-True IP Emulator for MPSoC Exploration

    DEFF Research Database (Denmark)

    Mahadevan, Shankar; Angiolini, Federico; Sparsø, Jens

    2008-01-01

    The design of MultiProcessor Systems-on-Chip (MPSoC) emphasizes intellectual-property (IP)-based communication-centric approaches. Therefore, for the optimization of the MPSoC interconnect, the designer must develop traffic models that realistically capture the application behavior as executing...... on the IP core. In this paper, we introduce a Reactive IP Emulator (RIPE) that enables an effective emulation of the IP-core behavior in multiple environments, including bit and cycle-true simulation. The RIPE is built as a multithreaded abstract instruction-set processor, and it can generate reactive...

  2. IPs

    African Journals Online (AJOL)

    Fr. Ikenga

    special rights to the under-privileged IPs based on their culture, religion and .... and exploitation of natural resources, political determination and autonomy, .... supportive and sustaining.33Balancing individualism and communalism will avoid ...

  3. Emulating Science

    Directory of Open Access Journals (Sweden)

    Carneiro, Larissa

    2017-11-01

    Full Text Available This article compares forms of visual argumentation in the scientific study of evolution and Young-Earth Creationism, arguing that secular forms of scientific representation have affected the way creationists visually construct their own. In order to affirm their view of the origin of the universe, creationists borrow from, mimic, and ultimately emulate the techniques, or at least the appearance, of scientific method and reasoning. The use of the word “emulation” is very deliberate since their aim is to match and surpass a rival scientific paradigm – evolution. The sermon preached by the design of the Creation Museum in Petersburg, Kentucky, is not content simply to look like science, but aims to do science that is affirmed by the Scriptures.

  4. Wireless Emulation Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — The Wireless Emulation Laboratory (WEL) is a researchtest bed used to investigate fundamental issues in networkscience. It is a research infrastructure that emulates...

  5. Microcontroller base process emulator

    OpenAIRE

    Jovrea Titus Claudiu

    2009-01-01

    This paper describes the design of a microcontroller base emulator for a conventional industrial process. The emulator is made with microcontroller and is used for testing and evaluating the performances of the industrial regulators. The parameters of the emulated process are fully customizable online and downloadable thru a serial communication from a personal computer.

  6. IP Centrex

    OpenAIRE

    Massa Torrelles, Roger

    2006-01-01

    Este documento recoge el trabajo realizado para diseñar e implementar una centralita o PBX para Telefonía IP basada en VoIP (Voz sobre IP) mediante SIP. Proporcionando una alternativa a las actuales centralitas de telefonía, basadas en hardware, que son caras y poco escalables. Se detallan los conceptos VoIP, IP Centrex, se plantean diferentes esquemas para el diseño de IP Centrex y se presentan los detalles de la implementación de IP Centrex. Para la implementación de IP...

  7. DDM Workload Emulation

    Science.gov (United States)

    Vigne, R.; Schikuta, E.; Garonne, V.; Stewart, G.; Barisits, M.; Beermann, T.; Lassnig, M.; Serfon, C.; Goossens, L.; Nairz, A.; Atlas Collaboration

    2014-06-01

    Rucio is the successor of the current Don Quijote 2 (DQ2) system for the distributed data management (DDM) system of the ATLAS experiment. The reasons for replacing DQ2 are manifold, but besides high maintenance costs and architectural limitations, scalability concerns are on top of the list. Current expectations are that the amount of data will be three to four times as it is today by the end of 2014. Further is the availability of more powerful computing resources pushing additional pressure on the DDM system as it increases the demands on data provisioning. Although DQ2 is capable of handling the current workload, it is already at its limits. To ensure that Rucio will be up to the expected workload, a way to emulate it is needed. To do so, first the current workload, observed in DQ2, must be understood in order to scale it up to future expectations. The paper discusses how selected core concepts are applied to the workload of the experiment and how knowledge about the current workload is derived from various sources (e.g. analysing the central file catalogue logs). Finally a description of the implemented emulation framework, used for stress-testing Rucio, is given.

  8. DDM workload emulation

    International Nuclear Information System (INIS)

    Vigne, R; Schikuta, E; Garonne, V; Stewart, G; Barisits, M; Beermann, T; Lassnig, M; Serfon, C; Goossens, L; Nairz, A

    2014-01-01

    Rucio is the successor of the current Don Quijote 2 (DQ2) system for the distributed data management (DDM) system of the ATLAS experiment. The reasons for replacing DQ2 are manifold, but besides high maintenance costs and architectural limitations, scalability concerns are on top of the list. Current expectations are that the amount of data will be three to four times as it is today by the end of 2014. Further is the availability of more powerful computing resources pushing additional pressure on the DDM system as it increases the demands on data provisioning. Although DQ2 is capable of handling the current workload, it is already at its limits. To ensure that Rucio will be up to the expected workload, a way to emulate it is needed. To do so, first the current workload, observed in DQ2, must be understood in order to scale it up to future expectations. The paper discusses how selected core concepts are applied to the workload of the experiment and how knowledge about the current workload is derived from various sources (e.g. analysing the central file catalogue logs). Finally a description of the implemented emulation framework, used for stress-testing Rucio, is given.

  9. Mobile IP

    NARCIS (Netherlands)

    Heijenk, Geert; Sallent, S.; Pras, Aiko

    1999-01-01

    The Internet is growing exponentially, both in the amount of traffic carried, and in the amount of hosts connected. IP technology is becoming more and more important, in company networks (Intranets), and also in the core networks for the next generation mobile networks. Further, wireless access to

  10. Ifabiyi, IP

    African Journals Online (AJOL)

    Ifabiyi, IP. Vol 11, No 1 (2013) - Articles Analysis of the Impacts of Rainfall Variability on Public Water Supply in Ilorin, Nigeria Abstract. ISSN: 2006-7003. AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors · FAQ's · More about AJOL · AJOL's Partners · Terms and Conditions of ...

  11. Small Signal Loudspeaker Impedance Emulator

    DEFF Research Database (Denmark)

    Iversen, Niels Elkjær; Knott, Arnold

    2014-01-01

    Specifying the performance of audio amplifiers is typically done by playing sine waves into a pure ohmic load. However real loudspeaker impedances are not purely ohmic but characterized by the mechanical resonance between the mass of the diaphragm and the compliance of its suspension which vary...... from driver to driver. Therefore, a loudspeaker emulator capable of adjusting its impedance to that of a given driver is desired for measurement purposes. This paper proposes a loudspeaker emulator circuit for small signals. Simulations and experimental results are compared and show that it is possible...... to emulate the loudspeaker impedance with an electric circuit and that its resonance frequency can be changed by tuning two resistors....

  12. DDM Workload Emulation

    CERN Document Server

    Vigne, R; The ATLAS collaboration; Garonne, V; Stewart, G; Barisits, M; Beermann, T; Lassnig, M; Serfon, C; Goossens, L; Nairz, A

    2013-01-01

    Rucio is the successor of the current Don Quijote 2 (DQ2) system for the distributed data management (DDM) system of the ATLAS experiment. The reasons for replacing DQ2 are manifold, but besides high maintenance costs and architectural limitations, scalability concerns are on top of the list. Current expectations are that the amount of data will be three to four times as it is today by the end of 2014. Further is the availability of more powerful computing resources pushing additional pressure on the DDM system as it increases the demands on data provisioning. Although DQ2 is capable of handling the current workload, it is already at its limits. To ensure that Rucio will be up to the expected workload, a way to emulate it is needed. To do so, first the current workload, observed in DQ2, must be understood in order to scale it up to future expectations. The paper discusses how selected core concepts are applied to the workload of the experiment and how knowledge about the current workload is derived from vario...

  13. DDM Workload Emulation

    CERN Document Server

    Vigne, R; The ATLAS collaboration; Garonne, V; Stewart, G; Barisits, M; Beermann, T; Serfon, C; Goossens, L; Nairz, A

    2014-01-01

    Rucio is the successor of the current Don Quijote 2 (DQ2) system for the distributed data management (DDM) system of the ATLAS experiment. The reasons for replacing DQ2 are manifold, but besides high maintenance costs and architectural limitations, scalability concerns are on top of the list. Current expectations are that the amount of data will be three to four times as it is today by the end of 2014. Further is the availability of more powerful computing resources pushing additional pressure on the DDM system as it increases the demands on data provisioning. Although DQ2 is capable of handling the current workload, it is already at its limits. To ensure that Rucio will be up to the expected workload, a way to emulate it is needed. To do so, first the current workload, observed in DQ2, must be understood in order to scale it up to future expectations. The paper discusses how selected core concepts are applied to the workload of the experiment and how knowledge about the current workload is derived from vario...

  14. Photovoltaic sources modeling and emulation

    CERN Document Server

    Piazza, Maria Carmela Di

    2012-01-01

    This book offers an extensive introduction to the modeling of photovoltaic generators and their emulation by means of power electronic converters will aid in understanding and improving design and setup of new PV plants.

  15. Fire Emulator/Detector Evaluator

    Data.gov (United States)

    Federal Laboratory Consortium — Description:The fire emulator/detector evaluator (FE/DE) is a computer-controlled flow tunnel used to re-create the environments surrounding detectors in the early...

  16. Quantum Emulation of Gravitational Waves.

    Science.gov (United States)

    Fernandez-Corbaton, Ivan; Cirio, Mauro; Büse, Alexander; Lamata, Lucas; Solano, Enrique; Molina-Terriza, Gabriel

    2015-07-14

    Gravitational waves, as predicted by Einstein's general relativity theory, appear as ripples in the fabric of spacetime traveling at the speed of light. We prove that the propagation of small amplitude gravitational waves in a curved spacetime is equivalent to the propagation of a subspace of electromagnetic states. We use this result to propose the use of entangled photons to emulate the evolution of gravitational waves in curved spacetimes by means of experimental electromagnetic setups featuring metamaterials.

  17. Development of Ethernet emulation driver for reflective memory

    International Nuclear Information System (INIS)

    Seo, Seong-Heon

    2010-01-01

    Reflective memory (RFM) is adopted as a real time network in the KSTAR plasma control system (PCS). Since the data uploaded from any computer are automatically shared among all the computers on the RFM network, the design of a distributed control system based on RFM is easily implemented through the management of memory mapping. The data providers and consumers are logically well seperated so that, if memory mapping information is given, a new control unit can be added without any modification to the existing system except connecting a new RFM module through an optical cable. The KSTAR PCS is also connected with the Ethernet in addition to the RFM because the RFM does not support the Transmission Control Protocol/Internet Protocol (TCP/IP) and many network services of the operating system such as the Network File System (NFS) and the Secure Shell (SSH) are based on the TCP/IP. Therefore we developed an Ethernet emulation driver for the RFM to eliminate the need for a separate Ethernet network. The driver was tested on the Linux kernel 2.6.31. The algorithm of the emulation driver is explained and the experimental setup is presented.

  18. Evaluation of IP Portfolios

    DEFF Research Database (Denmark)

    Søberg, Peder Veng

    2009-01-01

    As a result of an inquiry concerning how to evaluate IP (intellectual property) portfolios in order to enable the best possible use of IP resources within organizations, an IP evaluation approach primarily applicable for patents and utility models is developed. The developed approach is useful...... of the organization owning the IP....

  19. PVM and IP multicast

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Hall, K.A.

    1996-12-01

    This report describes a 1994 demonstration implementation of PVM that uses IP multicast. PVM`s one-to-many unicast implementation of its pvm{_}mcast() function is replaced with reliable IP multicast. Performance of PVM using IP multicast over local and wide-area networks is measured and compared with the original unicast implementation. Current limitations of IP multicast are noted.

  20. VoIP Security

    OpenAIRE

    Fontanini, Piero

    2008-01-01

    VOIP or Voice Over Internet Protocol is a common term for phone service over IP based networks. There are much information about VoIP and some of how VoIP can be secured. There is however no standard for VoIP and no general solution for VoIP Security. The security in VoIP systems today are often non existing or in best case weak and often based on proprietary solutions. This master thesis investigates threats to VoIP system and describes existing alternatives for securing Vo...

  1. Environment Emulation For Wsn Testbed

    Directory of Open Access Journals (Sweden)

    Radosław Kapłoniak

    2012-01-01

    Full Text Available The development of applications for wireless sensor networks is a challenging task. For this reason, several testbed platforms have been created. They simplify the manageability of nodes by offering easy ways of programming and debugging sensor nodes. These platforms, sometimes composed of dozens of sensors, provide a convenient way for carrying out research on medium access control and data exchange between nodes. In this article, we propose the extension of the WSN testbed, which could be used for evaluating and testing the functionality of sensor networks applications by emulating a real-world environment.

  2. Mobile IP: Security & application

    NARCIS (Netherlands)

    Tuquerres, G.; Salvador, M.R.; Sprenkels, Ron

    1999-01-01

    As required in the TGS Mobile IP Advanced Module, this paper presents a survey of common security threats which mobile IP networks are exposed to as well as some proposed solutions to deal with such threats.

  3. Ensuring Software IP Cleanliness

    Directory of Open Access Journals (Sweden)

    Mahshad Koohgoli

    2007-12-01

    Full Text Available At many points in the life of a software enterprise, determination of intellectual property (IP cleanliness becomes critical. The value of an enterprise that develops and sells software may depend on how clean the software is from the IP perspective. This article examines various methods of ensuring software IP cleanliness and discusses some of the benefits and shortcomings of current solutions.

  4. Ensuring Software IP Cleanliness

    OpenAIRE

    Mahshad Koohgoli; Richard Mayer

    2007-01-01

    At many points in the life of a software enterprise, determination of intellectual property (IP) cleanliness becomes critical. The value of an enterprise that develops and sells software may depend on how clean the software is from the IP perspective. This article examines various methods of ensuring software IP cleanliness and discusses some of the benefits and shortcomings of current solutions.

  5. Small-signal Loudspeaker Impedance Emulator

    DEFF Research Database (Denmark)

    Knott, Arnold; Iversen, Niels Elkjær

    2014-01-01

    Specifying the performance of audio ampliers is typically done by playing sine waves into a pure ohmic load. However real loudspeaker impedances are not purely ohmic but characterised by the mechanical resonance between the mass of the diaphragm and the compliance of its' suspension which vary from...... driver to driver. Therefore a loudspeaker emulator capable of adjusting its' impedance to a given driver is in need for measurement purposes. This paper proposes a loudspeaker emulator circuit for small signals. Simulations and experimental results are compared and show that it is possible to emulate...... the loudspeaker impedance with an electric circuit and that its' resonance frequency can be changed by tuning two resistors....

  6. DEP: A Depression Emulation Program*

    Science.gov (United States)

    Webster, Charles; Glass, Richard M; Banks, Gordon

    1988-01-01

    Cognitive deficits can be studied by “lesioning” computer simulations of normal cognitive processes. DEP (Depression Emulation Program) implements key aspects of a computational theory of “normal” adaptive reactive depression. A theory of “normal” depression is a step toward a theory of “pathological” depression. Transient depressed mood caused by an environmental event may be an example of fallure-triggered reprogramming of the self-schema. We normally generate responses to our environment in a fast and effortless “compiled” mode. After experiencing a stable, internal, and global failure, we debug our self-schema in a slow and effortful “interpreted” mode. During debugging, we experience a cognitive loop, increased objectivity, decreased motivation, and fluctuating self-generalizations. DEP exhibits analogous behavior and suggests vulnerability in an emotional operating system that normally, and periodically, adapts to a changing environment. Computer simulation of cognitive deficit may become a valuable research tool in psychiatry and neurology.

  7. Wireless Network Emulation System (WiNE)

    National Research Council Canada - National Science Library

    Holland, Gavin

    2005-01-01

    .... Our approach to this problem is to develop a tool that emulates a field-test environment in the lab, so technologies under consideration can migrate from coarse simulation models to actual code...

  8. Loudspeaker impedance emulator for multi resonant systems

    DEFF Research Database (Denmark)

    Iversen, Niels Elkjær; Knott, Arnold

    2015-01-01

    Specifying the performance of audio amplifiers is typically done by playing sine waves into a pure ohmic load. However real loudspeaker impedances are not purely ohmic but characterised by its electrical, mechanical and acoustical properties. Therefore a loudspeaker emulator capable of adjusting...... its impedance to that of a given loudspeaker is desired for measurement purposes. An adjustable RLC based emulator is implemented with switch controlled capacitors, air gap controlled inductors and potentiometers. Calculations and experimental results are compared and show that it is possible...... to emulate the loudspeaker impedance infinite baffle-, closed box- and the multi resonant vented box-loudspeaker by tuning the component values in the proposed circuit. Future work is outlined and encourage that the proposed impedance emulator is used as part of a control circuit in a switch-mode based...

  9. Multichannel Digital Emulator of Radiation Detection Systems

    International Nuclear Information System (INIS)

    Abba, A.; Caponio, F.; Geraci, A.

    2013-06-01

    A digital system for emulating in real time signals from generic setups for radiation detection is presented. The instrument is not a pulse generator of recorded shapes but a synthesizer of random pulses compliant to programmable statistics for energy and occurrence time. Completely programmable procedures for emulation of noise, disturbances and reference level variation can be implemented. The instrument has been realized and fully tested. (authors)

  10. Termite: Emulation Testbed for Encounter Networks

    Directory of Open Access Journals (Sweden)

    Rodrigo Bruno

    2015-08-01

    Full Text Available Cutting-edge mobile devices like smartphones and tablets are equipped with various infrastructureless wireless interfaces, such as WiFi Direct and Bluetooth. Such technologies allow for novel mobile applications that take advantage of casual encounters between co-located users. However, the need to mimic the behavior of real-world encounter networks makes testing and debugging of such applications hard tasks. We present Termite, an emulation testbed for encounter networks. Our system allows developers to run their applications on a virtual encounter network emulated by software. Developers can model arbitrary encounter networks and specify user interactions on the emulated virtual devices. To facilitate testing and debugging, developers can place breakpoints, inspect the runtime state of virtual nodes, and run experiments in a stepwise fashion. Termite defines its own Petri Net variant to model the dynamically changing topology and synthesize user interactions with virtual devices. The system is designed to efficiently multiplex an underlying emulation hosting infrastructure across multiple developers, and to support heterogeneous mobile platforms. Our current system implementation supports virtual Android devices communicating over WiFi Direct networks and runs on top of a local cloud infrastructure. We evaluated our system using emulator network traces, and found that Termite is expressive and performs well.

  11. Voice over IP Security

    CERN Document Server

    Keromytis, Angelos D

    2011-01-01

    Voice over IP (VoIP) and Internet Multimedia Subsystem technologies (IMS) are rapidly being adopted by consumers, enterprises, governments and militaries. These technologies offer higher flexibility and more features than traditional telephony (PSTN) infrastructures, as well as the potential for lower cost through equipment consolidation and, for the consumer market, new business models. However, VoIP systems also represent a higher complexity in terms of architecture, protocols and implementation, with a corresponding increase in the potential for misuse. In this book, the authors examine the

  12. Agency IP Data

    Data.gov (United States)

    National Aeronautics and Space Administration — Public data set for NASA Agency Intellectual Property (IP). The distribution contains both Patent information as well as General Release of Open Source Software.

  13. Statistical Emulator for Expensive Classification Simulators

    Science.gov (United States)

    Ross, Jerret; Samareh, Jamshid A.

    2016-01-01

    Expensive simulators prevent any kind of meaningful analysis to be performed on the phenomena they model. To get around this problem the concept of using a statistical emulator as a surrogate representation of the simulator was introduced in the 1980's. Presently, simulators have become more and more complex and as a result running a single example on these simulators is very expensive and can take days to weeks or even months. Many new techniques have been introduced, termed criteria, which sequentially select the next best (most informative to the emulator) point that should be run on the simulator. These criteria methods allow for the creation of an emulator with only a small number of simulator runs. We follow and extend this framework to expensive classification simulators.

  14. IP Infrastructure Geolocation

    Science.gov (United States)

    2015-03-01

    by non-commercial enti- ties. HostiP is a community-driven geolocation service. It provides an Application Pro- gramming Interface ( API ) for...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS IP INFRASTRUCTURE GEOLOCATION Thesis Advisor: Second Reader: by Guan Yan Cai March...FUNDING NUMBERS IP INFRASTRUCfURE GEOLOCATION N66001-2250-59231 6. AUTHOR(S) Guan Yan Cai 7. PERFORMING ORGANIZATION NAME(S) AND AOORESS(ES) 9

  15. Thermoelectric Generator Emulator for MPPT Testing

    DEFF Research Database (Denmark)

    Man, Elena Anamaria; Sera, Dezso; Máthé, Lászlo

    2015-01-01

    This paper presents a novel approach to use a DC power supply as a thermoelectric generator (TEG) emulator to perform static and dynamic maximum power point tracking (MPPT). First, the electrical characterization of a calcium-manganese-oxide module is performed on a TEG test rig. Afterwards...

  16. A Mobile Augmented Reality Emulator for Android

    Directory of Open Access Journals (Sweden)

    Donald Munro

    2017-07-01

    Full Text Available Augmented Reality (AR provides a fusion of the real and virtual worlds by superimposing virtual objects on real world scenery. The implementation of AR on mobile devices is known as Mobile Augmented Reality (MAR. MAR is in its infancy and MAR development software is in the process of maturing. Dating back to the origin of Computer Science as an independent field, software development tools have been an integral part of the process of software creation. MAR, being a relatively new technology, is still lacking such related software development tools. With the rapid progression of mobile devices, the development of MAR applications fusing advanced Computer Vision techniques with mobile device sensors have become increasingly feasible. However, testing and debugging of MAR applications present a new challenge in that they require the developer be at the location that is being augmented at some point during the development process. In this research study, a MAR recorder application was developed as well as emulation class libraries for Android devices that allows the recording and off-site playback of video, location and motion sensor data. The research objective was to provide a software emulator which provides debugging, testing and prototyping capabilities for a MAR application including the ability to emulate the combination of computer vision with locational and motion sensors using previously recorded data. The emulator was evaluated using different mobile technologies. The results indicate that this research could assist developers of MAR applications to implement applications more rapidly, without being at the location.

  17. Modeling for Ship Power System Emulation

    Science.gov (United States)

    2009-05-08

    used repeatedly for load- identification in shipboard environments (3). The NILM may be able to improve the HSR performance by identifying...electric plant. One of the major reasons for the hardware emulator is to test the NILM in a ring distribution lineup to evaluate if power to particular

  18. Cellular automata machines as physics emulators

    International Nuclear Information System (INIS)

    Toffoli, T.

    1988-01-01

    Can one design a computer optimized to be a physics emulator rather than a software interpreter? Cellular automata are discrete dynamical systems whose behavior is completely specified in terms of a local relation, much as is the case for a large class of continuous dynamical systems defined by partial differential equations. 31 refs, 3 figs

  19. The design of a network emulation and simulation laboratory

    CSIR Research Space (South Africa)

    Von Solms, S

    2015-07-01

    Full Text Available The development of the Network Emulation and Simulation Laboratory is motivated by the drive to contribute to the enhancement of the security and resilience of South Africa's critical information infrastructure. The goal of the Network Emulation...

  20. Mobile IP and protocol authentication extension

    OpenAIRE

    Nguyen, Phuc V.

    2011-01-01

    Mobile IP is an open standard, defined by the Internet Engineering Task Force (IETF) RFC 3220. By using Mobile IP, you can keep the same IP address, stay connected, and maintain ongoing applications while roaming between IP networks. Mobile IP is scalable for the Internet because it is based on IP - any media that can support IP can support Mobile IP.

  1. Digital signage sobre IP

    OpenAIRE

    Casademont Filella, Albert

    2012-01-01

    Projecte que versa sobre el disseny i la implementació d'un sistema de Digital Signage (Cartelleria Digital) sobre IP, creant un gestor que permeti controlar de forma remota tot un conjunt de petits dispositius connectats a pantalles que emeten continguts multimèdia com vídeos, imatges, feeds rss...

  2. Ade-Ojo, IP

    African Journals Online (AJOL)

    Ade-Ojo, IP. Vol 40, No 2 (2013) - Articles Myasthenia gravis following chicken pox infection in a Nigerian primary school girl. Abstract PDF. ISSN: 0302-4660. AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors · FAQ's · More about AJOL · AJOL's Partners · Terms and Conditions ...

  3. Emulation tool of dynamic systems via internet

    Directory of Open Access Journals (Sweden)

    Daniel Ruiz Olaya

    2015-11-01

    Full Text Available The experimentation laboratories for the studies of control system courses can become expensive, either in its acquisition, operation or maintenance. An alternative resource have been the remote laboratories. However, not always is possible to get complex systems. A solution to this matter are the remote emulation laboratories. In this paper describes the development of a Web application for the emulation of dynamic systems using a free-distribution software tool of rapid control prototyping based on Linux/RTAI. This application is focused especially for the experimentation with dynamic systems that are not available easily in a laboratory where the model have been configured by the user. The design of the front-end and the back-end are presented. The latency times of the real-time operating system and the ability of the system to reproduce similar signals to a real system from an emulated model were verified. An example, to test the functionality of the application the model of an evaporator was used. One of the advantages of the application is the work methodology which is based on the development of blocks in Scicos. This allows the user to reuse those parameters and the code that was implemented to build a block on the Scicos toolbox with the Linux/RTAI/ScicosLab environment. Moreover, only a web-browser and the Java Virtual Machine are required.

  4. Real-Time Emulation of Heterogeneous Wireless Networks with End-to-Edge Quality of Service Guarantees: The AROMA Testbed

    Directory of Open Access Journals (Sweden)

    Anna Umbert

    2010-01-01

    Full Text Available This work presents and describes the real-time testbed for all-IP Beyond 3G (B3G heterogeneous wireless networks that has been developed in the framework of the European IST AROMA project. The main objective of the AROMA testbed is to provide a highly accurate and realistic framework where the performance of algorithms, policies, protocols, services, and applications for a complete heterogeneous wireless network can be fully assessed and evaluated before bringing them to a real system. The complexity of the interaction between all-IP B3G systems and user applications, while dealing with the Quality of Service (QoS concept, motivates the development of this kind of emulation platform where different solutions can be tested in realistic conditions that could not be achieved by means of simple offline simulations. This work provides an in-depth description of the AROMA testbed, emphasizing many interesting implementation details and lessons learned during the development of the tool that may result helpful to other researchers and system engineers in the development of similar emulation platforms. Several case studies are also presented in order to illustrate the full potential and capabilities of the presented emulation platform.

  5. Model of a photovoltaic panel emulator in MATLAB-Simulink

    OpenAIRE

    CAN, Hayrettin

    2014-01-01

    Being able to behave electrically similar to photovoltaic (PV) panels, PV emulator systems make it possible to perform different PV system tests under various operation conditions. In this paper, a model of a PV panel emulator is presented using the Power System Blockset under MATLAB-Simulink. The simulation of the emulator system is developed for testing a controller prior to a real-time implementation. The model can handle the dependence of all of the parameters in the model with ...

  6. Bayesian emulation for optimization in multi-step portfolio decisions

    OpenAIRE

    Irie, Kaoru; West, Mike

    2016-01-01

    We discuss the Bayesian emulation approach to computational solution of multi-step portfolio studies in financial time series. "Bayesian emulation for decisions" involves mapping the technical structure of a decision analysis problem to that of Bayesian inference in a purely synthetic "emulating" statistical model. This provides access to standard posterior analytic, simulation and optimization methods that yield indirect solutions of the decision problem. We develop this in time series portf...

  7. LTE modem power consumption, SAR and RF signal strength emulation

    DEFF Research Database (Denmark)

    Musiige, Deogratius; Vincent, Laulagnet; Anton, François

    2012-01-01

    This paper presents a new methodology for emulating the LTE modem power consumption, emitted SAR and RF signal strength when transmitting an LTE signal. The inputs of the methodology are: modem logical/protocol commands, time advance, near-field specifier, and antenna characteristics. The power...... emulation model(s) are computed by a two layer 451 neural network based on physical power measurements. SAR is emulated by polynomial interpolation models based on FDTD simulations. The accuracies of the mathematical function approximations for the emulation models of power and SAR are 5.19% and 3...

  8. Burning Rate Emulator Experiments for Spacecraft Fire Safety

    Data.gov (United States)

    National Aeronautics and Space Administration — Experimental Investigation of Emulated Burning Rate at Various Gravity Levels Support for the initial development stages of a novel experimental apparatus, the...

  9. APLIKASI SERVER VIRTUAL IP UNTUK MIKROKONTROLER

    OpenAIRE

    Ashari, Ahmad

    2008-01-01

    Selama ini mikrokontroler yang terhubung ke satu komputer hanya dapat diakses melalui satu IP saja, padahal kebanyakan sistem operasi sekarang dapat memperjanjikan lebih dari satu IP untuk setiap komputer dalam bentuk virtual IP. Penelitian ini mengkaji pemanfaatan virtual IP dari IP aliasing pada sistem operasi Linux sebagai Server Virtual IP untuk mikrokontroler. Prinsip dasar Server Virtual IP adalah pembuatan Virtual Host pada masing-masing IP untuk memproses paket-paket data dan menerjem...

  10. Foundations of hardware IP protection

    CERN Document Server

    Torres, Lionel

    2017-01-01

    This book provides a comprehensive and up-to-date guide to the design of security-hardened, hardware intellectual property (IP). Readers will learn how IP can be threatened, as well as protected, by using means such as hardware obfuscation/camouflaging, watermarking, fingerprinting (PUF), functional locking, remote activation, hidden transmission of data, hardware Trojan detection, protection against hardware Trojan, use of secure element, ultra-lightweight cryptography, and digital rights management. This book serves as a single-source reference to design space exploration of hardware security and IP protection. · Provides readers with a comprehensive overview of hardware intellectual property (IP) security, describing threat models and presenting means of protection, from integrated circuit layout to digital rights management of IP; · Enables readers to transpose techniques fundamental to digital rights management (DRM) to the realm of hardware IP security; · Introduce designers to the concept of salutar...

  11. The Use and Abuses of Emulation as a Pedagogical Practice

    Science.gov (United States)

    Jonas, Mark E.; Chambers, Drew W.

    2017-01-01

    From the late eighteenth through the end of the nineteenth century, educational philosophers and practitioners debated the benefits and shortcomings of the use of emulation in schools. During this period, "emulation" referred to a pedagogy that leveraged comparisons between students as a tool to motivate them to higher achievement. Many…

  12. On the network-based emulation of human visual search

    NARCIS (Netherlands)

    Gerrissen, J.F.

    1991-01-01

    We describe the design of a computer emulator of human visual search. The emulator mechanism is eventually meant to support ergonomic assessment of the effect of display structure and protocol on search performance. As regards target identification and localization, it mimics a number of

  13. Neural Network Emulation of Reionization Simulations

    Science.gov (United States)

    Schmit, Claude J.; Pritchard, Jonathan R.

    2018-05-01

    Next generation radio experiments such as LOFAR, HERA and SKA are expected to probe the Epoch of Reionization and claim a first direct detection of the cosmic 21cm signal within the next decade. One of the major challenges for these experiments will be dealing with enormous incoming data volumes. Machine learning is key to increasing our data analysis efficiency. We consider the use of an artificial neural network to emulate 21cmFAST simulations and use it in a Bayesian parameter inference study. We then compare the network predictions to a direct evaluation of the EoR simulations and analyse the dependence of the results on the training set size. We find that the use of a training set of size 100 samples can recover the error contours of a full scale MCMC analysis which evaluates the model at each step.

  14. Emulating Wired Backhaul with Wireless Network Coding

    DEFF Research Database (Denmark)

    Thomsen, Henning; De Carvalho, Elisabeth; Popovski, Petar

    2014-01-01

    In this paper we address the need for wireless network densification. We propose a solution wherein the wired backhaul employed in heterogeneous cellular networks is replaced with wireless links, while maintaining the rate requirements of the uplink and downlink traffic of each user. The first...... of the two-way protocol. The transmit power is set high enough to enable successive decoding at the small cell base station where the downlink data to the user is first decoded and its contribution removed from the received signal followed by the uplink data from the user. The decoding of the second layer......, the uplink traffic to the user, remains identical to the one performed in a wired system. In the broadcast phase, the decoding of the downlink traffic can also be guaranteed to remain identical. Hence, our solution claims an emulation of a wired backhaul with wireless network coding with same performance. We...

  15. High Dynamic Performance Nonlinear Source Emulator

    DEFF Research Database (Denmark)

    Nguyen-Duy, Khiem; Knott, Arnold; Andersen, Michael A. E.

    2016-01-01

    As research and development of renewable and clean energy based systems is advancing rapidly, the nonlinear source emulator (NSE) is becoming very essential for testing of maximum power point trackers or downstream converters. Renewable and clean energy sources play important roles in both...... terrestrial and nonterrestrial applications. However, most existing NSEs have only been concerned with simulating energy sources in terrestrial applications, which may not be fast enough for testing of nonterrestrial applications. In this paper, a high-bandwidth NSE is developed that is able to simulate...... change in the input source but also to a load step between nominal and open circuit. Moreover, all of these operation modes have a very fast settling time of only 10 μs, which is hundreds of times faster than that of existing works. This attribute allows for higher speed and a more efficient maximum...

  16. Identification of a major IP5 kinase in Cryptococcus neoformans confirms that PP-IP5/IP7, not IP6, is essential for virulence

    OpenAIRE

    Li, Cecilia; Lev, Sophie; Saiardi, Adolfo; Desmarini, Desmarini; Sorrell, Tania C.; Djordjevic, Julianne T.

    2016-01-01

    Fungal inositol polyphosphate (IP) kinases catalyse phosphorylation of IP3 to inositol pyrophosphate, PP-IP5/IP7, which is essential for virulence of Cryptococcus neoformans. Cryptococcal Kcs1 converts IP6 to PP-IP5/IP7, but the kinase converting IP5 to IP6 is unknown. Deletion of a putative IP5 kinase-encoding gene (IPK1) alone (ipk1?), and in combination with KCS1 (ipk1?kcs1?), profoundly reduced virulence in mice. However, deletion of KCS1 and IPK1 had a greater impact on virulence attenua...

  17. Beyond iPS!

    Directory of Open Access Journals (Sweden)

    Editorial

    2012-01-01

    Full Text Available It’s undoubtedly a jubilant moment for scientists and clinicians working in the stem cell arena as Prof. Gurdon and Prof. Shinya Yamanaka have been chosen for the Nobel Prize in Physiology & Medicine this year. The mystery of cell biology is something unfathomable and probably the work of this duo as well as the other scientists, who have put their hands on in- vitro de-differentiation have opened our eyes to a new window or a new paradigm in cell biology. The iPS invention has brought a lot of hope in terms of potential direct benefits to treat several diseases, which have no definite options at the moment. But, we envisage that several spin-offs could come out of this invention and one very significant spin-off finding recently witnessed is the finding by Prof. Masaharu Seno and his team of researchers at the Okayama University, Japan (Chen L, et al. 2012, PLoS ONE 7(4:e33544.doi:10.1371/journal.pone.0033544. According to Prof. Seno, mouse iPS cells (miPS when cultured in the conditioned medium derived from cancer cell lines, differentiate into cancer stem cells (CSCs. While differentiating into CSCs, they do retain the potential to develop endothelial progenitor cells. Several questions arise here: 1.Are these miPS derived CSCs really pluripotent, even if the terminal differentiation destined to specific phenotypes? 2.Shouldn’t the Cancer Stem Cells be termed as cancer progenitor cells, as till date they are considered to be producing only cancer cells but not pluripotent to yield other types of normal tissues? The spin-offs could be infinite as the process of differentiation and de-differentiation happening due to trillions of signals and pathways, most still remaining not-so-well understood. A special mention should be made to Prof. Shinya Yamanaka as he has several sterling qualities to be a role-model for budding scientists. Apart from his passion for science, which made him shift his career from orthopedics to a cell biologist, his

  18. Gevaar VoIP voor telecomsector overdreven

    NARCIS (Netherlands)

    Deventer, M.O. van; Wegberg, M. van

    2004-01-01

    Het is een hype Voice-over-IP (VoIP) voor te stellen als een ontwrichtende technologie die de telecomindustrie ingrijpend zal veranderen. Maar hoe ontwrichtend is VoIP eigenlijk? Oskar van Deventer en Marc van Wegberg analyseren drie vormen van VoIP en laten zien dat alleen ‘VoIP-chat’ potentieel

  19. Memristor emulator causes dissimilarity on a coupled memristive systems

    Science.gov (United States)

    Sabarathinam, S.; Prasad, Awadhesh

    2018-04-01

    The memristor is known as abasic fourth passive solid state circuit element. Itgaining increasing attention to create the next generation electronic devices commonly used as fundamental chaotic circuit although often arbitrary (typically piecewise linear or cubic) fluxcharge characteristics. In thispresent work, the causes of the memristor emulator studied in a coupled memristive chaoticoscillator for the first time. We confirm that the emulator that allows synchronization between theoscillators and cause the dissimilarity between the systems when increasing the couplingstrength, and co-efficient of the memristor emulator. The detailed statistical analysis was performed to confirm such phenomenon.

  20. Emulation of dynamic simulators with application to hydrology

    Energy Technology Data Exchange (ETDEWEB)

    Machac, David, E-mail: david.machac@eawag.ch [Eawag, Swiss Federal Institute of Aquatic Science and Technology, Department of Systems Analysis, Integrated Assessment and Modelling, 8600 Dübendorf (Switzerland); ETH Zurich, Department of Environmental Systems Science, 8092 Zurich (Switzerland); Reichert, Peter [Eawag, Swiss Federal Institute of Aquatic Science and Technology, Department of Systems Analysis, Integrated Assessment and Modelling, 8600 Dübendorf (Switzerland); ETH Zurich, Department of Environmental Systems Science, 8092 Zurich (Switzerland); Albert, Carlo [Eawag, Swiss Federal Institute of Aquatic Science and Technology, Department of Systems Analysis, Integrated Assessment and Modelling, 8600 Dübendorf (Switzerland)

    2016-05-15

    Many simulation-intensive tasks in the applied sciences, such as sensitivity analysis, parameter inference or real time control, are hampered by slow simulators. Emulators provide the opportunity of speeding up simulations at the cost of introducing some inaccuracy. An emulator is a fast approximation to a simulator that interpolates between design input–output pairs of the simulator. Increasing the number of design data sets is a computationally demanding way of improving the accuracy of emulation. We investigate the complementary approach of increasing emulation accuracy by including knowledge about the mechanisms of the simulator into the formulation of the emulator. To approximately reproduce the output of dynamic simulators, we consider emulators that are based on a system of linear, ordinary or partial stochastic differential equations with a noise term formulated as a Gaussian process of the parameters to be emulated. This stochastic model is then conditioned to the design data so that it mimics the behavior of the nonlinear simulator as a function of the parameters. The drift terms of the linear model are designed to provide a simplified description of the simulator as a function of its key parameters so that the required corrections by the conditioned Gaussian process noise are as small as possible. The goal of this paper is to compare the gain in accuracy of these emulators by enlarging the design data set and by varying the degree of simplification of the linear model. We apply this framework to a simulator for the shallow water equations in a channel and compare emulation accuracy for emulators based on different spatial discretization levels of the channel and for a standard non-mechanistic emulator. Our results indicate that we have a large gain in accuracy already when using the simplest mechanistic description by a single linear reservoir to formulate the drift term of the linear model. Adding some more reservoirs does not lead to a significant

  1. Design of BLDCM emulator for transmission control units

    Science.gov (United States)

    Liu, Chang; He, Yongyi; Zhang, Bodong

    2018-04-01

    According to the testing requirements of the transmission control unit, a brushless DC motor emulating system is designed based on motor simulation and power hardware-in-the-loop. The discrete motor model is established and a real-time numerical method is designed to solve the motor states. The motor emulator directly interacts with power stage of the transmission control unit using a power-efficient circuit topology and is compatible with sensor-less control. Experiments on a laboratory prototype help to verify that the system can emulate the real motor currents and voltages whenever the motor is starting up or suddenly loaded.

  2. GW170817 falsifies dark matter emulators

    Science.gov (United States)

    Boran, S.; Desai, S.; Kahya, E. O.; Woodard, R. P.

    2018-02-01

    On August 17, 2017 the LIGO interferometers detected the gravitational wave (GW) signal (GW170817) from the coalescence of binary neutron stars. This signal was also simultaneously seen throughout the electromagnetic (EM) spectrum from radio waves to gamma rays. We point out that this simultaneous detection of GW and EM signals rules out a class of modified gravity theories, termed "dark matter emulators," which dispense with the need for dark matter by making ordinary matter couple to a different metric from that of GW. We discuss other kinds of modified gravity theories which dispense with the need for dark matter and are still viable. This simultaneous observation also provides the first observational test of Einstein's weak equivalence principle (WEP) between gravitons and photons. We estimate the Shapiro time delay due to the gravitational potential of the total dark matter distribution along the line of sight (complementary to the calculation by Abbott et al. [Astrophys. J. Lett. 848, L13 (2017)], 10.3847/2041-8213/aa920c) to be about 400 days. Using this estimate for the Shapiro delay and from the time difference of 1.7 seconds between the GW signal and gamma rays, we can constrain violations of the WEP using the parametrized post-Newtonian parameter γ , and it is given by |γGW-γEM|<9.8 ×10-8.

  3. Implementation of Fast Emulator-based Code Calibration

    Energy Technology Data Exchange (ETDEWEB)

    Bowman, Nathaniel [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Risk & Reliability Analysis; Denman, Matthew R [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Risk & Reliability Analysis

    2016-08-01

    Calibration is the process of using experimental data to gain more precise knowledge of simulator inputs. This process commonly involves the use of Markov-chain Monte Carlo, which requires running a simulator thousands of times. If we can create a faster program, called an emulator, that mimics the outputs of the simulator for an input range of interest, then we can speed up the process enough to make it feasible for expensive simulators. To this end, we implement a Gaussian-process emulator capable of reproducing the behavior of various long-running simulators to within acceptable tolerance. This fast emulator can be used in place of a simulator to run Markov-chain Monte Carlo in order to calibrate simulation parameters to experimental data. As a demonstration, this emulator is used to calibrate the inputs of an actual simulator against two sodium-fire experiments.

  4. SONEP: A Software-Defined Optical Network Emulation Platform

    DEFF Research Database (Denmark)

    Azodolmolky, Siamak; Petersen, Martin Nordal; Fagertun, Anna Manolova

    2014-01-01

    Network emulation has been one of the tools of choice for conducting experiments on commodity hardware. In the absence of an easy to use optical network test-bed, researchers can significantly benefit from the availability of a flexible/programmable optical network emulation platform. Exploiting...... the lightweight system virtualization, which is recently supported in modern operating systems, in this work we present the architecture of a Software-Defined Network (SDN) emulation platform for transport optical networks and investigate its usage in a use-case scenario. To the best of our knowledge......, this is for the first time that an SDN-based emulation platform is proposed for modeling and performance evaluation of optical networks. Coupled with recent trend of extension of SDN towards transport (optical) networks, the presented tool can facilitate the evaluation of innovative idea before actual implementations...

  5. RF power consumption emulation optimized with interval valued homotopies

    DEFF Research Database (Denmark)

    Musiige, Deogratius; Anton, François; Yatskevich, Vital

    2011-01-01

    This paper presents a methodology towards the emulation of the electrical power consumption of the RF device during the cellular phone/handset transmission mode using the LTE technology. The emulation methodology takes the physical environmental variables and the logical interface between...... the baseband and the RF system as inputs to compute the emulated power dissipation of the RF device. The emulated power, in between the measured points corresponding to the discrete values of the logical interface parameters is computed as a polynomial interpolation using polynomial basis functions....... The evaluation of polynomial and spline curve fitting models showed a respective divergence (test error) of 8% and 0.02% from the physically measured power consumption. The precisions of the instruments used for the physical measurements have been modeled as intervals. We have been able to model the power...

  6. Hardware IP security and trust

    CERN Document Server

    Bhunia, Swarup; Tehranipoor, Mark

    2017-01-01

    This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle. Readers will gain a comprehensive understanding of the security vulnerabilities of different types of IPs. This book would enable readers to overcome these vulnerabilities through an efficient combination of proactive countermeasures and design-for-security solutions, as well as a wide variety of IP security and trust assessment and validation techniques. This book serves as a single-source of reference for system designers and practitioners for designing secure, reliable and trustworthy SoCs.

  7. Emulating Industrial Control System Field Devices Using Gumstix Technology

    Science.gov (United States)

    2012-06-01

    Security mechanisms (e.g., intrusion detection systems, antivirus and honeypots) are employed in traditional Information Technology (IT) systems to detect...can be used to determine the vendor of the device if the fingerprinting is done on a local segment. 2.8 Emulation Emulation is software or...Each of the honeypots in the network can be different systems ranging from Windows workstations to IIS web servers to Cisco routers. Honeynets rely

  8. Multiprocessor Priority Ceiling Emulation for Safety-Critical Java

    DEFF Research Database (Denmark)

    Strøm, Torur Biskopstø; Schoeberl, Martin

    2015-01-01

    Priority ceiling emulation has preferable properties on uniprocessor systems, such as avoiding priority inversion and being deadlock free. This has made it a popular locking protocol. According to the safety-critical Java specication, priority ceiling emulation is a requirement for implementations....... However, implementing the protocol for multiprocessor systemsis more complex so implementations might perform worse than non-preemptive implementations. In this paper we compare two multiprocessor lock implementations with hardware support for the Java optimized processor: non-preemptive locking...

  9. Evaluating Emulation-based Models of Distributed Computing Systems

    Energy Technology Data Exchange (ETDEWEB)

    Jones, Stephen T. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Cyber Initiatives; Gabert, Kasimir G. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Cyber Initiatives; Tarman, Thomas D. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Emulytics Initiatives

    2017-08-01

    Emulation-based models of distributed computing systems are collections of virtual ma- chines, virtual networks, and other emulation components configured to stand in for oper- ational systems when performing experimental science, training, analysis of design alterna- tives, test and evaluation, or idea generation. As with any tool, we should carefully evaluate whether our uses of emulation-based models are appropriate and justified. Otherwise, we run the risk of using a model incorrectly and creating meaningless results. The variety of uses of emulation-based models each have their own goals and deserve thoughtful evaluation. In this paper, we enumerate some of these uses and describe approaches that one can take to build an evidence-based case that a use of an emulation-based model is credible. Predictive uses of emulation-based models, where we expect a model to tell us something true about the real world, set the bar especially high and the principal evaluation method, called validation , is comensurately rigorous. We spend the majority of our time describing and demonstrating the validation of a simple predictive model using a well-established methodology inherited from decades of development in the compuational science and engineering community.

  10. Efficient and robust gradient enhanced Kriging emulators.

    Energy Technology Data Exchange (ETDEWEB)

    Dalbey, Keith R.

    2013-08-01

    %E2%80%9CNaive%E2%80%9D or straight-forward Kriging implementations can often perform poorly in practice. The relevant features of the robustly accurate and efficient Kriging and Gradient Enhanced Kriging (GEK) implementations in the DAKOTA software package are detailed herein. The principal contribution is a novel, effective, and efficient approach to handle ill-conditioning of GEK's %E2%80%9Ccorrelation%E2%80%9D matrix, RN%CC%83, based on a pivoted Cholesky factorization of Kriging's (not GEK's) correlation matrix, R, which is a small sub-matrix within GEK's RN%CC%83 matrix. The approach discards sample points/equations that contribute the least %E2%80%9Cnew%E2%80%9D information to RN%CC%83. Since these points contain the least new information, they are the ones which when discarded are both the easiest to predict and provide maximum improvement of RN%CC%83's conditioning. Prior to this work, handling ill-conditioned correlation matrices was a major, perhaps the principal, unsolved challenge necessary for robust and efficient GEK emulators. Numerical results demonstrate that GEK predictions can be significantly more accurate when GEK is allowed to discard points by the presented method. Numerical results also indicate that GEK can be used to break the curse of dimensionality by exploiting inexpensive derivatives (such as those provided by automatic differentiation or adjoint techniques), smoothness in the response being modeled, and adaptive sampling. Development of a suitable adaptive sampling algorithm was beyond the scope of this work; instead adaptive sampling was approximated by omitting the cost of samples discarded by the presented pivoted Cholesky approach.

  11. SSCI 125 emulation of Point Lepreau G.S

    International Nuclear Information System (INIS)

    MacLean, M.; Hogg, J.; Newman, H.; Thompson, H.

    1997-01-01

    A C language program has been developed at the Point Lepreau Nuclear Generating Station which emulates the actions of an SSCI 125 computer's instruction set and also emulates the actions of those input and output devices which belong to the plant control computer of the nuclear power plant's full scope training simulator. This enables the same DCC software to run on both the $20 million dollar training simulator and an equivalent desktop simulator whose hardware cost is now $16,000 or less. It facilitates making additional copies of the $20 million dollar training simulator for less than 0.1% of the cost per copy. When this emulation program is run on a 266 MHz DEC single CPU Alpha computer, it simulates the running of the training simulator plant control DCC (digital control computer) at approximately the rate of real time: either faster or slightly slower depending on the compiler options employed and depending on the choice of the modeled machine cycle speed of the SSCI. Using the standard machine cycle speed of 660 nanoseconds, using the emulator fully optimized and using plant process modelling without optimization the speed is 90% as fast as real time - this is the normal use situation for simulator modelers who were the originally intended users of the emulator. If the modeled SSCI machine cycle speed is slowed down to 792 nanoseconds (making use of space capacity on the real SSCI to reduce the workload of emulation), and all objects are compiled as optimized, then it takes only about 20 minutes of clock time to simulate over 30 minutes of modelling time. This mode of simulation may be useful for somebody who is not doing emulator or modeling code development. This could include preparing lesson plans for the training simulator, developing or evaluating plant operating procedures or trying out revised DCC software. (DM)

  12. Offloading IP Flows onto Lambda-Connections

    NARCIS (Netherlands)

    Fioreze, Tiago; Oude Wolbers, Mattijs; van de Meent, R.; Pras, Aiko

    2007-01-01

    Optical networks are capable of switching IP traffic via lambda connections. In this way, big IP flows that overload the regular IP routing level may be moved to the optical level, where they get better Quality of Service (QoS). At the same time, the IP routing level is off-loaded and can serve

  13. Security risks in IP telephony

    OpenAIRE

    Řezáč, Filip; Vozňák, Miroslav

    2010-01-01

    This paper deals with VoIP communication security and various techniques of VoIP attacks. We divided these threats in several categories according to their specific behaviour and their impact on the affected system. We also tried to find effective methods to prevent or mitigate these attacks. We focused our work on Spam over Internet Telephony (SPIT) as a real threat for the future. We have developed both a tool generating SPIT attacks and AntiSPIT tool defending communication systems against...

  14. Mobility management in mobile IP

    Science.gov (United States)

    Medidi, Sirisha; Golshani, Forouzan

    2002-07-01

    There is an emerging interest in integrating mobile wireless communication with the Internet based on the Ipv6 technology. Many issues introduced by the mobility of users arise when such an integration is attempted. This paper addresses the problem of mobility management, i.e., that of tracking the current IP addresses of mobile terminals and sustaining active IP connections as mobiles move. The paper presents some architectural and mobility management options for integrating wireless access to the Internet. We then present performance results for Mobile IPv4, route optimization and Mobile IPv6.

  15. Security Risks in IP Telephony

    Directory of Open Access Journals (Sweden)

    Filip Rezac

    2010-01-01

    Full Text Available This paper deals with VoIP communication security and various techniques of VoIP attacks. We divided these threats in several categories according to their specific behaviour and their impact on the affected system. We also tried to find effective methods to prevent or mitigate these attacks. We focused our work on Spam over Internet Telephony (SPIT as a real threat for the future. We have developed both a tool generating SPIT attacks and AntiSPIT tool defending communication systems against SPIT attacks. AntiSPIT represents an effective protection based on statistical blacklist and works without participation of the called party which is a significant advantage.

  16. FED firmware interface testing with pixel phase 1 emulator

    CERN Document Server

    Kilpatrick, Matthew

    2017-01-01

    A hardware emulation of the CMS pixel detector phase 1 upgrade front-end electronics has been developed to test and validate the architecture of the back-end electronics (FED) firmware. The emulation is implemented on a Virtex 6 FPGA on the CERN GLIB uTCA platform, utilizing an 8-way SFP FPGA Mezzanine Card to drive compatible optical transmitters to the back-end electronics at 400 bps. The firmware emulates the complex functions of the phase 1 pixel readout chips (PSI46digv2 and PROC600) and token bit manager ASICs and allows for possible abnormalities that can occur in the output data stream. The emulation implements both fixed data patterns that are used as test vectors and realistic simulated data to drive the readout of the FED at the expected data and trigger rates. Testing software was developed to control the emulator and verify correct transmission of data and exception handling in the FED. An installation has been integrated into the pixel DAQ test system at CMS to be used for fast validation of F...

  17. FED firmware interface testing with pixel phase 1 emulator

    CERN Document Server

    Kilpatrick, Matthew

    2018-01-01

    A hardware emulation of the CMS pixel detector phase 1 upgrade front-end electronics has been developed to test and validate the architecture of the back-end electronics (FED) firmware. The emulation is implemented on a Virtex 6 FPGA on the CERN GLIB uTCA platform, utilizing an 8-way SFP FPGA Mezzanine Card to drive compatible optical transmitters to the back-end electronics at 400 bps. The firmware emulates the complex functions of the phase 1 pixel readout chips (PSI46digv2 and PROC600) and token bit manager ASICs and allows for possible abnormalities that can occur in the output data stream. The emulation implements both fixed data patterns that are used as test vectors and realistic simulated data to drive the readout of the FED at the expected data and trigger rates. Testing software was developed to control the emulator and verify correct transmission of data and exception handling in the FED. An installation has been integrated into the pixel DAQ test system at CMS to be used for fast validation of F...

  18. INTELLIGENT DESIGN: ON THE EMULATION OF COSMOLOGICAL SIMULATIONS

    International Nuclear Information System (INIS)

    Schneider, Michael D.; Holm, Oskar; Knox, Lloyd

    2011-01-01

    Simulation design is the choice of locations in parameter space at which simulations are to be run and is the first step in building an emulator capable of quickly providing estimates of simulation results for arbitrary locations in the parameter space. We introduce an alteration to the 'OALHS' design used by Heitmann et al. that reduces the number of simulation runs required to achieve a fixed accuracy in our case study by a factor of two. We also compare interpolation procedures for emulators and find that interpolation via Gaussian process models and via the much-easier-to-implement polynomial interpolation have comparable accuracy. A very simple emulation-building procedure consisting of a design sampled from the parameter prior distribution, combined with interpolation via polynomials also performs well. Although our primary motivation is efficient emulators of nonlinear cosmological N-body simulations, in an appendix we describe an emulator for the cosmic microwave background temperature power spectrum publicly available as a computer code.

  19. Advanced Machine Learning Emulators of Radiative Transfer Models

    Science.gov (United States)

    Camps-Valls, G.; Verrelst, J.; Martino, L.; Vicent, J.

    2017-12-01

    Physically-based model inversion methodologies are based on physical laws and established cause-effect relationships. A plethora of remote sensing applications rely on the physical inversion of a Radiative Transfer Model (RTM), which lead to physically meaningful bio-geo-physical parameter estimates. The process is however computationally expensive, needs expert knowledge for both the selection of the RTM, its parametrization and the the look-up table generation, as well as its inversion. Mimicking complex codes with statistical nonlinear machine learning algorithms has become the natural alternative very recently. Emulators are statistical constructs able to approximate the RTM, although at a fraction of the computational cost, providing an estimation of uncertainty, and estimations of the gradient or finite integral forms. We review the field and recent advances of emulation of RTMs with machine learning models. We posit Gaussian processes (GPs) as the proper framework to tackle the problem. Furthermore, we introduce an automatic methodology to construct emulators for costly RTMs. The Automatic Gaussian Process Emulator (AGAPE) methodology combines the interpolation capabilities of GPs with the accurate design of an acquisition function that favours sampling in low density regions and flatness of the interpolation function. We illustrate the good capabilities of our emulators in toy examples, leaf and canopy levels PROSPECT and PROSAIL RTMs, and for the construction of an optimal look-up-table for atmospheric correction based on MODTRAN5.

  20. COSMIC EMULATION: FAST PREDICTIONS FOR THE GALAXY POWER SPECTRUM

    Energy Technology Data Exchange (ETDEWEB)

    Kwan, Juliana; Heitmann, Katrin; Habib, Salman; Frontiere, Nicholas; Pope, Adrian [High Energy Physics Division, Argonne National Laboratory, Lemont, IL 60439 (United States); Padmanabhan, Nikhil [Department of Physics, Yale University, 260 Whitney Ave., New Haven, CT 06520 (United States); Lawrence, Earl [Statistical Sciences, Los Alamos National Laboratory, Los Alamos, NM 87545 (United States); Finkel, Hal [Argonne Leadership Computing Facility, Argonne National Laboratory, Lemont, IL 60439 (United States)

    2015-09-01

    The halo occupation distribution (HOD) approach has proven to be an effective method for modeling galaxy clustering and bias. In this approach, galaxies of a given type are probabilistically assigned to individual halos in N-body simulations. In this paper, we present a fast emulator for predicting the fully nonlinear galaxy–galaxy auto and galaxy–dark matter cross power spectrum and correlation function over a range of freely specifiable HOD modeling parameters. The emulator is constructed using results from 100 HOD models run on a large ΛCDM N-body simulation, with Gaussian Process interpolation applied to a PCA-based representation of the galaxy power spectrum. The total error is currently ∼1% in the auto correlations and ∼2% in the cross correlations from z = 1 to z = 0, over the considered parameter range. We use the emulator to investigate the accuracy of various analytic prescriptions for the galaxy power spectrum, parametric dependencies in the HOD model, and the behavior of galaxy bias as a function of HOD parameters. Additionally, we obtain fully nonlinear predictions for tangential shear correlations induced by galaxy–galaxy lensing from our galaxy–dark matter cross power spectrum emulator. All emulation products are publicly available at http://www.hep.anl.gov/cosmology/CosmicEmu/emu.html.

  1. Inexplicit Learning: Transferring Knowledge through Visual and Emulative practices

    Directory of Open Access Journals (Sweden)

    Koumudi Patil

    2017-12-01

    Full Text Available This study attempts to understand how expert knowledge is transmitted in the absence or lack of explicit and formal means of knowledge acquisition, with particular interest in the evolved relationship of a master-apprentice, observable in pockets of traditional communities of practice. An ethnographic study based on content analysis of the transcriptions of members of a craft community from Varanasi, India has been used to strengthen the undermined pedagogical role of observation and emulation in the transfer of inexplicit knowledge. It is argued that in-situ observation and emulation foster situations for facilitating co-production of knowledge, further implying co-authorship. Gaining community membership in craft communities is not merely a matter of gaining a professional degree; instead, it is a slow process of enculturation.Keywords: Observation, Emulation, Inexplicit learning, Master-apprentice. Communities of Practice

  2. Fast emulation of track reconstruction in the CMS simulation

    CERN Document Server

    Komm, Matthias

    2017-01-01

    Simulated samples of various physics processes are a key ingredient within analyses to unlock the physics behind LHC collision data. Samples with more and more statistics are required to keep up with the increasing amounts of recorded data. During sample generation, significant computing time is spent on the reconstruction of charged particle tracks from energy deposits which additionally scales with the pileup conditions. In CMS, the FastSimulation package is developed for providing a fast alternative to the standard simulation and reconstruction workflow. It employs various techniques to emulate track reconstruction effects in particle collision events. Several analysis groups in CMS are utilizing the package, in particular those requiring many samples to scan the parameter space of physics models (e.g. SUSY) or for the purpose of estimating systematic uncertainties. The strategies for and recent developments in this emulation are presented, including a novel, flexible implementation of tracking emulation w...

  3. Development of the CELSS Emulator at NASA JSC

    Science.gov (United States)

    Cullingford, Hatice S.

    1989-01-01

    The Controlled Ecological Life Support System (CELSS) Emulator is under development at the NASA Johnson Space Center (JSC) with the purpose to investigate computer simulations of integrated CELSS operations involving humans, plants, and process machinery. This paper describes Version 1.0 of the CELSS Emulator that was initiated in 1988 on the JSC Multi Purpose Applications Console Test Bed as the simulation framework. The run module of the simulation system now contains a CELSS model called BLSS. The CELSS Emulator makes it possible to generate model data sets, store libraries of results for further analysis, and also display plots of model variables as a function of time. The progress of the project is presented with sample test runs and simulation display pages.

  4. Encrypted IP video communication system

    Science.gov (United States)

    Bogdan, Apetrechioaie; Luminiţa, Mateescu

    2010-11-01

    Digital video transmission is a permanent subject of development, research and improvement. This field of research has an exponentially growing market in civil, surveillance, security and military aplications. A lot of solutions: FPGA, ASIC, DSP have been used for this purpose. The paper presents the implementation of an encrypted, IP based, video communication system having a competitive performance/cost ratio .

  5. Introduction to IP address management

    CERN Document Server

    Rooney, Tim

    2010-01-01

    "The book begins with a basic overview of IP networking, followed by chapters describing each of the three core IPAM technologies: IPv4 and IPv6 addressing, DHCP, and DNS. The next three chapters describe IPAM management techniques and practice, followed by chapters on IPv4-IPv6 co-existence, security and the IPAM business case"--

  6. Continuously Connected With Mobile IP

    Science.gov (United States)

    2002-01-01

    Cisco Systems developed Cisco Mobile Networks, making IP devices mobile. With this innovation, a Cisco router and its connected IP devices can roam across network boundaries and connection types. Because a mobile user is able to keep the same IP address while roaming, a live IP connection can be maintained without interruption. Glenn Research Center jointly tested the technology with Cisco, and is working to use it on low-earth-orbiting research craft. With Cisco's Mobile Networks functionality now available in Cisco IOS Software release 12.2(4)T, the commercial advantages and benefits are numerous. The technology can be applied to public safety, military/homeland security, emergency management services, railroad and shipping systems, and the automotive industry. It will allow ambulances, police, firemen, and the U.S. Coast Guard to stay connected to their networks while on the move. In the wireless battlefield, the technology will provide rapid infrastructure deployment for U.S. national defense. Airline, train, and cruise passengers utilizing Cisco Mobile Networks can fly all around the world with a continuous Internet connection. Cisco IOS(R) Software is a registered trademark of Cisco Systems.

  7. DCS emulator development for the ACR-1000 simulator

    International Nuclear Information System (INIS)

    Nakashima, Y.; Trueman, R.; Ishii, K.

    2010-01-01

    Nuclear Power Plant (NPP) simulators are the main means for operator training and as such are a crucial part of the NPP operation life-cycle. Hitachi, Ltd., Information and Control Systems Company (henceforth 'Hitachi') is the preferred DCS and DCS emulator developer and supplier for the ACR-1000 NPP control system. Hitachi's concept for the DCS (distributed control system) portion of the ACR-1000 simulator is 'total emulation of the DCS' by software. This paper will review the current status of the technical development and the major project milestones. (author)

  8. A Voltage Mode Memristor Bridge Synaptic Circuit with Memristor Emulators

    Directory of Open Access Journals (Sweden)

    Leon Chua

    2012-03-01

    Full Text Available A memristor bridge neural circuit which is able to perform signed synaptic weighting was proposed in our previous study, where the synaptic operation was verified via software simulation of the mathematical model of the HP memristor. This study is an extension of the previous work advancing toward the circuit implementation where the architecture of the memristor bridge synapse is built with memristor emulator circuits. In addition, a simple neural network which performs both synaptic weighting and summation is built by combining memristor emulators-based synapses and differential amplifier circuits. The feasibility of the memristor bridge neural circuit is verified via SPICE simulations.

  9. Standardization efforts in IP telephony

    Science.gov (United States)

    Sengodan, Senthil; Bansal, Raj

    1999-11-01

    The recent interest in IP telephony has led to a tremendous increase of standardization activities in the area. The three main standards bodies in the area of IP telephony are the International Telecommunication Union's (ITU-T) Study Group (SG) 16, the Internet Engineering Task Force (IETF) and the European Telecommunication Standards Institute's (ETSI) TIPHON project. In addition, forums such as the International Multimedia Teleconferencing Consortium (IMTC), the Intelligent Network Forum (INF), the International Softswitch Consortium (ISC), the Electronic Computer Telephony Forum (ECTF), and the MIT's Internet Telephony Consortium (ITC) are looking into various other aspects that aim at the growth of this industry. This paper describes the main tasks (completed and in progress) undertaken by these organizations. In describing such work, an overview of the underlying technology is also provided.

  10. Internetworking with TCP/IP

    CERN Document Server

    Comer, Douglas E

    2014-01-01

    An internationally best-selling, conceptual introduction to the TCP/IP protocols and Internetworking, this book interweaves a clear discussion of fundamentals and scientific principles with details and examples drawn from the latest technologies. Leading author Douglas Comer covers layering and packet formats for all the Internet protocols, includingTCP, IPv4, IPv6, DHCP, and DNS. In addition, the text explains new trends in Internet systems, including packet classification, Software Defined Networking (SDN), and mesh protocols used in The Internet of Things. The text is appropriate for individuals interested in learning more about TCP/IP protocols, Internet architecture, and current networking technologies, as well as engineers who build network systems. It is suitable for junior to graduate-level courses in Computer Networks, Data Networks, Network Protocols, and Internetworking.

  11. VoIP over WLAN

    OpenAIRE

    Nikkari, Joni

    2007-01-01

    Tässä opinnäytetyössä tutkitaan VoIP over WLAN -tekniikan mahdollisuuksia nykyaikaisessa käyttöympäristössä, sekä yritysmaailman että kotikäyttäjän näkökulmasta. Toimiakseen VoWLAN tarvitsee kaksi eri tekniikkaa: langattoman lähiverkon sekä WLAN-puhelimen, joka perustuu VoIP-tekniikkaan.; WLAN:ssa tietoliikenne kulkee normaalin kaapeloinnin sijasta radiotaajuuksia käyttämällä. Standardina toimii IEEE 802.11, joka määrittelee WLAN-verkkojen toiminnan. Standardia on kehitetty jatkuvasti, ja si...

  12. ATM LAN Emulation: Getting from Here to There.

    Science.gov (United States)

    Learn, Larry L., Ed.

    1995-01-01

    Discusses current LAN (local area network) configuration and explains ATM (asynchronous transfer mode) as the future telecommunications transport. Highlights include LAN emulation, which enables the interconnection of legacy LANs and the new ATM environment; virtual LANs; broadcast servers; and standards. (LRW)

  13. Panel Flutter Emulation Using a Few Concentrated Forces

    Science.gov (United States)

    Dhital, Kailash; Han, Jae-Hung

    2018-04-01

    The objective of this paper is to study the feasibility of panel flutter emulation using a few concentrated forces. The concentrated forces are considered to be equivalent to aerodynamic forces. The equivalence is carried out using surface spline method and principle of virtual work. The structural modeling of the plate is based on the classical plate theory and the aerodynamic modeling is based on the piston theory. The present approach differs from the linear panel flutter analysis in scheming the modal aerodynamics forces with unchanged structural properties. The solutions for the flutter problem are obtained numerically using the standard eigenvalue procedure. A few concentrated forces were considered with an optimization effort to decide their optimal locations. The optimization process is based on minimizing the error between the flutter bounds from emulated and linear flutter analysis method. The emulated flutter results for the square plate of four different boundary conditions using six concentrated forces are obtained with minimal error to the reference value. The results demonstrated the workability and viability of using concentrated forces in emulating real panel flutter. In addition, the paper includes the parametric studies of linear panel flutter whose proper literatures are not available.

  14. On Emulation-Based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Abbasi, Ali; Wetzel, Jos; Bokslag, Wouter; Zambon, Emmanuele; Etalle, Sandro

    2014-01-01

    Emulation-based network intrusion detection systems have been devised to detect the presence of shellcode in network traffic by trying to execute (portions of) the network packet payloads in an in- strumented environment and checking the execution traces for signs of shellcode activity.

  15. On emulation-based network intrusion detection systems

    NARCIS (Netherlands)

    Abbasi, A.; Wetzels, J.; Bokslag, W.; Zambon, E.; Etalle, S.; Stavrou, A.; Bos, H.; Portokalidis, G.

    2014-01-01

    Emulation-based network intrusion detection systems have been devised to detect the presence of shellcode in network traffic by trying to execute (portions of) the network packet payloads in an instrumented environment and checking the execution traces for signs of shellcode activity.

  16. Internal monitoring of GBTx emulator using IPbus for CBM experiment

    Science.gov (United States)

    Mandal, Swagata; Zabolotny, Wojciech; Sau, Suman; Chkrabarti, Amlan; Saini, Jogender; Chattopadhyay, Subhasis; Pal, Sushanta Kumar

    2015-09-01

    The Compressed Baryonic Matter (CBM) experiment is a part of the Facility for Antiproton and Ion Research (FAIR) in Darmstadt at GSI. In CBM experiment a precisely time synchronized fault tolerant self-triggered electronics is required for Data Acquisition (DAQ) system in CBM experiments which can support high data rate (up to several TB/s). As a part of the implementation of the DAQ system of Muon Chamber (MUCH) which is one of the important detectors in CBM experiment, a FPGA based Gigabit Transceiver (GBTx) emulator is implemented. Readout chain for MUCH consists of XYTER chips (Front end electronics) which will be directly connected to detector, GBTx emulator, Data Processing Board (DPB) and First level event selector board (FLIB) with backend software interface. GBTx emulator will be connected with the XYTER emulator through LVDS (Low Voltage Differential Signalling) line in the front end and in the back end it is connected with DPB through 4.8 Gbps optical link. IPBus over Ethernet is used for internal monitoring of the registers within the GBTx. In IPbus implementation User Datagram Protocol (UDP) stack is used in transport layer of OSI model so that GBTx can be controlled remotely. A Python script is used at computer side to drive IPbus controller.

  17. Hierarchical adaptive experimental design for Gaussian process emulators

    International Nuclear Information System (INIS)

    Busby, Daniel

    2009-01-01

    Large computer simulators have usually complex and nonlinear input output functions. This complicated input output relation can be analyzed by global sensitivity analysis; however, this usually requires massive Monte Carlo simulations. To effectively reduce the number of simulations, statistical techniques such as Gaussian process emulators can be adopted. The accuracy and reliability of these emulators strongly depend on the experimental design where suitable evaluation points are selected. In this paper a new sequential design strategy called hierarchical adaptive design is proposed to obtain an accurate emulator using the least possible number of simulations. The hierarchical design proposed in this paper is tested on various standard analytic functions and on a challenging reservoir forecasting application. Comparisons with standard one-stage designs such as maximin latin hypercube designs show that the hierarchical adaptive design produces a more accurate emulator with the same number of computer experiments. Moreover a stopping criterion is proposed that enables to perform the number of simulations necessary to obtain required approximation accuracy.

  18. OSI and TCP/IP

    Science.gov (United States)

    Randolph, Lynwood P.

    1994-01-01

    The Open Systems Interconnection Transmission Control Protocol/Internet Protocol (OSI TCP/IP) and the Government Open Systems Interconnection Profile (GOSIP) are compared and described in terms of Federal internetworking. The organization and functions of the Federal Internetworking Requirements Panel (FIRP) are discussed and the panel's conclusions and recommendations with respect to the standards and implementation of the National Information Infrastructure (NII) are presented.

  19. Single-step emulation of nonlinear fiber-optic link with gaussian mixture model

    DEFF Research Database (Denmark)

    Borkowski, Robert; Doberstein, Andy; Haisch, Hansjörg

    2015-01-01

    We use a fast and low-complexity statistical signal processing method to emulate nonlinear noise in fiber links. The proposed emulation technique stands in good agreement with the numerical NLSE simulation for 32 Gbaud DP-16QAM nonlinear transmission.......We use a fast and low-complexity statistical signal processing method to emulate nonlinear noise in fiber links. The proposed emulation technique stands in good agreement with the numerical NLSE simulation for 32 Gbaud DP-16QAM nonlinear transmission....

  20. Presence in the IP multimedia subsystem

    NARCIS (Netherlands)

    Lin, L.; Liotta, A.

    2007-01-01

    With an ever increasing penetration of Internet Protocol (IP) technologies, the wireless industry is evolving the mobile core network towards all-IP network. The IP Multimedia Subsystem (IMS) is a standardised Next Generation Network (NGN) architectural framework defined by the 3rd Generation

  1. Mobile-ip Aeronautical Network Simulation Study

    Science.gov (United States)

    Ivancic, William D.; Tran, Diepchi T.

    2001-01-01

    NASA is interested in applying mobile Internet protocol (mobile-ip) technologies to its space and aeronautics programs. In particular, mobile-ip will play a major role in the Advanced Aeronautic Transportation Technology (AATT), the Weather Information Communication (WINCOMM), and the Small Aircraft Transportation System (SATS) aeronautics programs. This report presents the results of a simulation study of mobile-ip for an aeronautical network. The study was performed to determine the performance of the transmission control protocol (TCP) in a mobile-ip environment and to gain an understanding of how long delays, handoffs, and noisy channels affect mobile-ip performance.

  2. Challenges Regarding IP Core Functional Reliability

    Science.gov (United States)

    Berg, Melanie D.; LaBel, Kenneth A.

    2017-01-01

    For many years, intellectual property (IP) cores have been incorporated into field programmable gate array (FPGA) and application specific integrated circuit (ASIC) design flows. However, the usage of large complex IP cores were limited within products that required a high level of reliability. This is no longer the case. IP core insertion has become mainstream including their use in highly reliable products. Due to limited visibility and control, challenges exist when using IP cores and subsequently compromise product reliability. We discuss challenges and suggest potential solutions to critical application IP insertion.

  3. Voice over IP in Wireless Heterogeneous Networks

    DEFF Research Database (Denmark)

    Fathi, Hanane; Chakraborty, Shyam; Prasad, Ramjee

    with the deployment of wireless heterogeneous systems, both speech and data traffic are carrried over wireless links by the same IP-based packet-switched infrastructure. However, this combination faces some challenges due to the inherent properties of the wireless network. The requirements for good quality VoIP...... communications are difficult to achieve in a time-varying environment due to channel errors and traffic congestion and across different systems. The provision of VoIP in wireless heterogeneous networks requires a set of time-efficient control mechanisms to support a VoIP session with acceptable quality....... The focus of Voice over IP in Wierless Heterogeneous Networks is on mechanisms that affect the VoIP user satisfaction  while not explicitly involved in the media session. This relates to the extra delays introduced by the security and the signaling protocols used to set up an authorized VoIP session...

  4. TCP/IP Network Administration

    CERN Document Server

    Hunt, Craig

    2002-01-01

    This complete guide to setting up and running a TCP/IP network is essential for network administrators, and invaluable for users of home systems that access the Internet. The book starts with the fundamentals -- what protocols do and how they work, how addresses and routing are used to move data through the network, how to set up your network connection -- and then covers, in detail, everything you need to know to exchange information via the Internet. Included are discussions on advanced routing protocols (RIPv2, OSPF, and BGP) and the gated software package that implements them, a tutorial

  5. Hardware emulation of Memristor based Ternary Content Addressable Memory

    KAUST Repository

    Bahloul, Mohamed A.

    2017-12-13

    MTCAM (Memristor Ternary Content Addressable Memory) is a special purpose storage medium in which data could be retrieved based on the stored content. Using Memristors as the main storage element provides the potential of achieving higher density and more efficient solutions than conventional methods. A key missing item in the validation of such approaches is the wide spread availability of hardware emulation platforms that can provide reliable and repeatable performance statistics. In this paper, we present a hardware MTCAM emulation based on 2-Transistors-2Memristors (2T2M) bit-cell. It builds on a bipolar memristor model with storing and fetching capabilities based on the actual current-voltage behaviour. The proposed design offers a flexible verification environment with quick design revisions, high execution speeds and powerful debugging techniques. The proposed design is modeled using VHDL and prototyped on Xilinx Virtex® FPGA.

  6. Emulating weak localization using a solid-state quantum circuit.

    Science.gov (United States)

    Chen, Yu; Roushan, P; Sank, D; Neill, C; Lucero, Erik; Mariantoni, Matteo; Barends, R; Chiaro, B; Kelly, J; Megrant, A; Mutus, J Y; O'Malley, P J J; Vainsencher, A; Wenner, J; White, T C; Yin, Yi; Cleland, A N; Martinis, John M

    2014-10-14

    Quantum interference is one of the most fundamental physical effects found in nature. Recent advances in quantum computing now employ interference as a fundamental resource for computation and control. Quantum interference also lies at the heart of sophisticated condensed matter phenomena such as Anderson localization, phenomena that are difficult to reproduce in numerical simulations. Here, employing a multiple-element superconducting quantum circuit, with which we manipulate a single microwave photon, we demonstrate that we can emulate the basic effects of weak localization. By engineering the control sequence, we are able to reproduce the well-known negative magnetoresistance of weak localization as well as its temperature dependence. Furthermore, we can use our circuit to continuously tune the level of disorder, a parameter that is not readily accessible in mesoscopic systems. Demonstrating a high level of control, our experiment shows the potential for employing superconducting quantum circuits as emulators for complex quantum phenomena.

  7. Hardware emulation of Memristor based Ternary Content Addressable Memory

    KAUST Repository

    Bahloul, Mohamed A.; Naous, Rawan; Masmoudi, M.

    2017-01-01

    MTCAM (Memristor Ternary Content Addressable Memory) is a special purpose storage medium in which data could be retrieved based on the stored content. Using Memristors as the main storage element provides the potential of achieving higher density and more efficient solutions than conventional methods. A key missing item in the validation of such approaches is the wide spread availability of hardware emulation platforms that can provide reliable and repeatable performance statistics. In this paper, we present a hardware MTCAM emulation based on 2-Transistors-2Memristors (2T2M) bit-cell. It builds on a bipolar memristor model with storing and fetching capabilities based on the actual current-voltage behaviour. The proposed design offers a flexible verification environment with quick design revisions, high execution speeds and powerful debugging techniques. The proposed design is modeled using VHDL and prototyped on Xilinx Virtex® FPGA.

  8. UPEML, Computer Independent Emulator of CDC Update Utility

    International Nuclear Information System (INIS)

    2002-01-01

    1 - Description of program or function: UPEML is a machine-portable CDC UPDATE emulation program. It is capable of emulating a significant subset of the standard CDC UPDATE functions, including program library creation and subsequent modification. 2 - Method of solution: UPEML was originally written to facilitate the use of CDC-based scientific packages on alternate computers. In addition to supporting computers such as the VAX/VMS, IBM, and CRAY/COS, Version 3.0 now supports UNIX workstations and the CRAY/UNICOS operating system. Several program bugs have been corrected in Version 3.0. Version 3.0 has several new features including 1) improved error checking, 2) the ability to use *ADDFILE and READ from nested files, 3) creation of compile file on creation, 4) allows identifiers to begin with numbers, and 5) ability to control warning messages and program termination on error conditions. 3 - Restrictions on the complexity of the problem: None noted

  9. Development of the CELSS emulator at NASA. Johnson Space Center

    Science.gov (United States)

    Cullingford, Hatice S.

    1990-01-01

    The Closed Ecological Life Support System (CELSS) Emulator is under development. It will be used to investigate computer simulations of integrated CELSS operations involving humans, plants, and process machinery. Described here is Version 1.0 of the CELSS Emulator that was initiated in 1988 on the Johnson Space Center (JSC) Multi Purpose Applications Console Test Bed as the simulation framework. The run model of the simulation system now contains a CELSS model called BLSS. The CELSS simulator empowers us to generate model data sets, store libraries of results for further analysis, and also display plots of model variables as a function of time. The progress of the project is presented with sample test runs and simulation display pages.

  10. ATM QoS Experiments Using TCP Applications: Performance of TCP/IP Over ATM in a Variety of Errored Links

    Science.gov (United States)

    Frantz, Brian D.; Ivancic, William D.

    2001-01-01

    Asynchronous Transfer Mode (ATM) Quality of Service (QoS) experiments using the Transmission Control Protocol/Internet Protocol (TCP/IP) were performed for various link delays. The link delay was set to emulate a Wide Area Network (WAN) and a Satellite Link. The purpose of these experiments was to evaluate the ATM QoS requirements for applications that utilize advance TCP/IP protocols implemented with large windows and Selective ACKnowledgements (SACK). The effects of cell error, cell loss, and random bit errors on throughput were reported. The detailed test plan and test results are presented herein.

  11. The Spacelab IPS Star Simulator

    Science.gov (United States)

    Wessling, Francis C., III

    The cost of doing business in space is very high. If errors occur while in orbit the costs grow and desired scientific data may be corrupted or even lost. The Spacelab Instrument Pointing System (IPS) Star Simulator is a unique test bed that allows star trackers to interface with simulated stars in a laboratory before going into orbit. This hardware-in-the loop testing of equipment on earth increases the probability of success while in space. The IPS Star Simulator provides three fields of view 2.55 x 2.55 degrees each for input into star trackers. The fields of view are produced on three separate monitors. Each monitor has 4096 x 4096 addressable points and can display 50 stars (pixels) maximum at a given time. The pixel refresh rate is 1000 Hz. The spectral output is approximately 550 nm. The available relative visual magnitude range is 2 to 8 visual magnitudes. The star size is less than 100 arc seconds. The minimum star movement is less than 5 arc seconds and the relative position accuracy is approximately 40 arc seconds. The purpose of this paper is to describe the LPS Star Simulator design and to provide an operational scenario so others may gain from the approach and possible use of the system.

  12. Yielding physically-interpretable emulators - A Sparse PCA approach

    Science.gov (United States)

    Galelli, S.; Alsahaf, A.; Giuliani, M.; Castelletti, A.

    2015-12-01

    Projection-based techniques, such as Principal Orthogonal Decomposition (POD), are a common approach to surrogate high-fidelity process-based models by lower order dynamic emulators. With POD, the dimensionality reduction is achieved by using observations, or 'snapshots' - generated with the high-fidelity model -, to project the entire set of input and state variables of this model onto a smaller set of basis functions that account for most of the variability in the data. While reduction efficiency and variance control of POD techniques are usually very high, the resulting emulators are structurally highly complex and can hardly be given a physically meaningful interpretation as each basis is a projection of the entire set of inputs and states. In this work, we propose a novel approach based on Sparse Principal Component Analysis (SPCA) that combines the several assets of POD methods with the potential for ex-post interpretation of the emulator structure. SPCA reduces the number of non-zero coefficients in the basis functions by identifying a sparse matrix of coefficients. While the resulting set of basis functions may retain less variance of the snapshots, the presence of a few non-zero coefficients assists in the interpretation of the underlying physical processes. The SPCA approach is tested on the reduction of a 1D hydro-ecological model (DYRESM-CAEDYM) used to describe the main ecological and hydrodynamic processes in Tono Dam, Japan. An experimental comparison against a standard POD approach shows that SPCA achieves the same accuracy in emulating a given output variable - for the same level of dimensionality reduction - while yielding better insights of the main process dynamics.

  13. An overview of Linux container based network emulation

    CSIR Research Space (South Africa)

    Peach, Schalk

    2016-07-01

    Full Text Available , a remote procedure call (RPC) application programming interface (API), a Python library and various user interface (UI) enhancements. Additional goals of the CORE project are to allow wireless network experiments through the Extendable Mobile Ad... backend functionality, the design of the backend and the choice of virtualisation technologies. An additional comparison that is included is the capability of a CBE to distribute an emulation across multiple host machines. In Table 1, a preliminary model...

  14. Implementasi Sistem IP PBX menggunakan Briker

    Directory of Open Access Journals (Sweden)

    DWI ARYANTA

    2017-06-01

    Full Text Available Abstrak VoIP (Voice over Internet Protocol adalah komunikasi suara jarak jauh yang digunakan melalui jaringan IP. Pada penelitian ini dirancang sistem IP PBX dengan menggunakan teknologi berbasis VoIP. IP PBX adalah perangkat switching komunikasi telepon dan data berbasis teknologi Internet Protocol (IP yang mengendalikan ekstension telepon analog maupun ekstension IP Phone. Software VirtualBox digunakan dengan tujuan agar lebih memudahkan dalam sistem pengoperasian Linux yang dimana program untuk membuat IP PBX adalah menggunakan Briker yang bekerja pada Operating System Linux 2.6. Setelah proses penginstalan Briker pada Virtualbox dilakukan implementasi jaringan IP PBX. Setelah mengimplementasikan jaringan IP PBX sesuai dengan topologi, kemudian melakukan pengujian success call rate dan analisis Quality of Service (QoS. Pengukuran QoS menggunakan parameter jitter, delay, dan packet loss yang dihasilkan dalam sistem IP PBX ini. Nilai jitter sesama user Briker (baik pada smartphone maupun komputer mempunyai rata-rata berada pada nilai 16,77 ms. Sedangkan nilai packetloss yang didapat pada saat terdapat pada saat user 1 sebagai pemanggil telepon adalah 0%. Sedangkan persentase packet loss pada saat user 1 sebagai penerima telepon adalah 0,01%. Nilai delay pada saat berkomunikasi antar user berada pada 11,75 ms. Secara keseluruhan nilai yang didapatkan melalui penelitian ini, dimana hasil pengujian parameter-parameter QOS sesuai dengan standar yang telah direkomendasikan oleh ITU dan didapatkan nilai QoS dengan hasil “baik”. Kata Kunci : Briker, VoIP, QoS, IP PBX, Smartphone. Abstract VoIP (Voice over Internet Protocol is a long-distance voice communications over IP networks are used. In this study, IP PBX systems designed using VoIP -based technologies. IP PBX is a telephone switching device and data communication technology-based Internet Protocol (IP which controls the analog phone extensions and IP Phone extensions. VirtualBox software is

  15. The Mira-Titan Universe. II. Matter Power Spectrum Emulation

    Energy Technology Data Exchange (ETDEWEB)

    Lawrence, Earl; Heitmann, Katrin; Kwan, Juliana; Upadhye, Amol; Bingham, Derek; Habib, Salman; Higdon, David; Pope, Adrian; Finkel, Hal; Frontiere, Nicholas

    2017-09-20

    We introduce a new cosmic emulator for the matter power spectrum covering eight cosmological parameters. Targeted at optical surveys, the emulator provides accurate predictions out to a wavenumber k similar to 5 Mpc(-1) and redshift z <= 2. In addition to covering the standard set of Lambda CDM parameters, massive neutrinos and a dynamical dark energy of state are included. The emulator is built on a sample set of 36 cosmological models, carefully chosen to provide accurate predictions over the wide and large parameter space. For each model, we have performed a high-resolution simulation, augmented with 16 medium-resolution simulations and TimeRG perturbation theory results to provide accurate coverage over a wide k-range; the data set generated as part of this project is more than 1.2Pbytes. With the current set of simulated models, we achieve an accuracy of approximately 4%. Because the sampling approach used here has established convergence and error-control properties, follow-up results with more than a hundred cosmological models will soon achieve similar to 1% accuracy. We compare our approach with other prediction schemes that are based on halo model ideas and remapping approaches.

  16. Applying a gaming approach to IP strategy.

    Science.gov (United States)

    Gasnier, Arnaud; Vandamme, Luc

    2010-02-01

    Adopting an appropriate IP strategy is an important but complex area, particularly in the pharmaceutical and biotechnology sectors, in which aspects such as regulatory submissions, high competitive activity, and public health and safety information requirements limit the amount of information that can be protected effectively through secrecy. As a result, and considering the existing time limits for patent protection, decisions on how to approach IP in these sectors must be made with knowledge of the options and consequences of IP positioning. Because of the specialized nature of IP, it is necessary to impart knowledge regarding the options and impact of IP to decision-makers, whether at the level of inventors, marketers or strategic business managers. This feature review provides some insight on IP strategy, with a focus on the use of a new 'gaming' approach for transferring the skills and understanding needed to make informed IP-related decisions; the game Patentopolis is discussed as an example of such an approach. Patentopolis involves interactive activities with IP-related business decisions, including the exploitation and enforcement of IP rights, and can be used to gain knowledge on the impact of adopting different IP strategies.

  17. Vaccines and IP Rights: A Multifaceted Relationship.

    Science.gov (United States)

    Durell, Karen

    2016-01-01

    Just as there are many forms of vaccines and components to vaccines-particular compositions, delivery systems, components, and distribution networks-there are a variety of intellectual property (IP) protections applicable for vaccines. IP rights such as patent, copyright, trademarks, plant breeders' rights, and trade secrets may all be applicable to vaccines. Thus, discussion of IP rights and vaccines should not begin and end with the application of one IP right to a vaccine. The discussion should engage considerations of multiple IP rights applicable to a vaccine and how these can be utilized in an integrated manner in a strategy aimed at supporting the development and distribution of the vaccine. Such an approach to IP rights to vaccines allows for the integrated rights to be considered in light of the justifications for protecting vaccines with IP rights, as well as the issues relating to specific IP rights for vaccines, such as compulsory license regimes, available humanitarian purpose IP credits, etc. To view vaccines as the subject of multiple IP protections involves a refocusing, but the outcome can provide significant benefits for vaccine development and distribution.

  18. Performance of VoIP on HSDPA

    DEFF Research Database (Denmark)

    Wang, Bang; Pedersen, Klaus I.; Kolding, Troels E.

    2005-01-01

    This paper provides packet scheduler design and performance simulations for running VoIP services over high-speed downlink packet access (HSDPA) in WCDMA. The main challenge of supporting VoIP service on HSDPA is the tight delay requirement combined with the small VoIP packet size. A packet...... scheduler design incorporating VoIP packet aggregation and user multiplexing is proposed and the VoIP capacity is studied for a macro-cellular environment. Results are obtained for different delay budgets and packet scheduling settings, using either blind round robin or a slightly modified version...... of proportional fair scheduling. For proportional fair scheduling with code-multiplexing of 4-users, the downlink VoIP cell capacity on HSDPA is found to be in the range 72-104 users depending on whether the delay budget for the Node-B scheduling and user reception equals 80 ms or 150 ms, respectively....

  19. Analysis of Handoff Mechanisms in Mobile IP

    Science.gov (United States)

    Jayaraj, Maria Nadine Simonel; Issac, Biju; Haldar, Manas Kumar

    2011-06-01

    One of the most important challenges in mobile Internet Protocol (IP) is to provide service for a mobile node to maintain its connectivity to network when it moves from one domain to another. IP is responsible for routing packets across network. The first major version of IP is the Internet Protocol version 4 (IPv4). It is one of the dominant protocols relevant to wireless network. Later a newer version of IP called the IPv6 was proposed. Mobile IPv6 is mainly introduced for the purpose of mobility. Mobility management enables network to locate roaming nodes in order to deliver packets and maintain connections with them when moving into new domains. Handoff occurs when a mobile node moves from one network to another. It is a key factor of mobility because a mobile node can trigger several handoffs during a session. This paper briefly explains on mobile IP and its handoff issues, along with the drawbacks of mobile IP.

  20. IP Security für Linux

    OpenAIRE

    Parthey, Mirko

    2001-01-01

    Die Nutzung des Internet für sicherheitskritische Anwendungen erfordert kryptographische Schutzmechanismen. IP Security (IPsec) definiert dafür geeignete Protokolle. Diese Arbeit gibt einen Überblick über IPsec. Eine IPsec-Implementierung für Linux (FreeS/WAN) wird auf Erweiterbarkeit und Praxistauglichkeit untersucht. Using the Internet in security-critical areas requires cryptographic protection, for which IP Security (IPsec) defines suitable protocols. This paper gives an overview of IP...

  1. Universal Space IP Transparent Proxy, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Communications applications are strategically moving toward Internet Protocol-based architectures and technologies. Despite IP's huge potential, (e.g. cost...

  2. QoS Parameters Evaluation in a VPN-MPLS Diffserv Network under a Complete Free Software Emulation Environment

    Directory of Open Access Journals (Sweden)

    Miroslava Aracely Zapata Rodríguez

    2017-12-01

    Full Text Available The use of Virtual Private Network – Multi Protocol Label Switching (VPN-MPLS networks has become very common inside enterprises thanks to their multiple advantages; such as, the private communication across a public network infrastructure between geographically diverse sites. This leads to a need for an efficient network in terms of Quality of Service (QoS to guarantee reliability and security of information. However, the implementation of a VPN-MPLS network is neither easy nor cheap for small and medium companies; hence, in most cases, it is required the use of emulators that are not free either. In this paper, we analyze a VPN-MPLS network in terms of QoS metrics: delay, jitter and packet loss. This evaluation was performed in a virtual environment using only free software tools under two test scenarios, with and without Differentiated Services (DiffServ. The results showed that a VPN-MPLS DiffServ network reduces the delay by approximately 96.78% in VoIP, 39.21% in Data and 66.83% in Streaming; furthermore, the jitter was reduced by approximately 27.88% in VoIP and 41.09% in Data.

  3. Comparing genome-wide chromatin profiles using ChIP-chip or ChIP-seq

    NARCIS (Netherlands)

    Johannes, F.; Wardenaar, R.; Colome-Tatche, M.; Mousson, F.; de Graaf, P.; Mokry, M.; Guryev, V.; Timmers, H.T.; Cuppen, E.; Jansen, R.

    2010-01-01

    MOTIVATION: ChIP-chip and ChIP-seq technologies provide genome-wide measurements of various types of chromatin marks at an unprecedented resolution. With ChIP samples collected from different tissue types and/or individuals, we can now begin to characterize stochastic or systematic changes in

  4. Comparing genome-wide chromatin profiles using ChIP-chip or ChIP-seq

    NARCIS (Netherlands)

    Johannes, Frank; Wardenaar, Rene; Colomé Tatché, Maria; Mousson, Florence; de Graaf, Petra; Mokry, Michal; Guryev, Victor; Timmers, H. Th. Marc; Cuppen, Edwin; Jansen, Ritsert C.; Bateman, Alex

    2010-01-01

    Motivation: ChIP-chip and ChIP-seq technologies provide genomewide measurements of various types of chromatin marks at an unprecedented resolution. With ChIP samples collected from different tissue types and/ or individuals, we can now begin to characterize stochastic or systematic changes in

  5. Localitzador Gràfic de Direccions IP 'IpLocInspector'

    OpenAIRE

    Ordóñez Chapado, Miguel

    2006-01-01

    En aquest treball s'ha desenvolupat una aplicació capaç de localitzar adreces IP. En este trabajo se ha desarrollado una aplicación capaz de localizar direcciones IP. In this work an application was developed capable of locating IP addresses.

  6. Mobile IP: state of the art report

    NARCIS (Netherlands)

    Karagiannis, Georgios; Heijenk, Geert

    Due to roaming, a mobile device may change its network attachment each time it moves to a new link. This might cause a disruption for the Internet data packets that have to reach the mobile node. Mobile IP is a protocol, developed by the Mobile IP Internet Engineering Task Force (IETF) working

  7. 75 FR 13235 - IP-Enabled Services

    Science.gov (United States)

    2010-03-19

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 63 [WC Docket No. 04-36; FCC 09-40] IP-Enabled Services AGENCY: Federal Communications Commission ACTION: Final rule; announcement of effective date... Internet Protocol (VoIP) service the discontinuance obligations that apply to domestic non-dominant...

  8. Emulation of Narrowband Powerline Data Transmission Channels and Evaluation of PLC Systems

    OpenAIRE

    Liu, Wenqing

    2013-01-01

    This work proposes advanced emulation of the physical layer behavior of NB-PLC channels and the application of a channel emulator for the evaluation of NB-PLC systems. In addition, test procedures and reference channels are proposed to improve efficiency and accuracy in the system evaluation and classification. This work shows that the channel emulator-based solution opens new ways toward flexible, reliable and technology-independent performance assessment of PLC modems.

  9. Evaluating the Limits of Network Topology Inference Via Virtualized Network Emulation

    Science.gov (United States)

    2015-06-01

    virtualized environment. First, we automatically build topological ground truth according to various network generation models and create emulated Cisco ...to various network generation models and create emulated Cisco router networks by leveraging and modifying existing emulation software. We then au... markets , to verifying compliance with policy, as in recent “network neutrality” rules established in the United States. The Internet is a network of

  10. Scalable and reusable emulator for evaluating the performance of SS7 networks

    Science.gov (United States)

    Lazar, Aurel A.; Tseng, Kent H.; Lim, Koon Seng; Choe, Winston

    1994-04-01

    A scalable and reusable emulator was designed and implemented for studying the behavior of SS7 networks. The emulator design was largely based on public domain software. It was developed on top of an environment supported by PVM, the Parallel Virtual Machine, and managed by OSIMIS-the OSI Management Information Service platform. The emulator runs on top of a commercially available ATM LAN interconnecting engineering workstations. As a case study for evaluating the emulator, the behavior of the Singapore National SS7 Network under fault and unbalanced loading conditions was investigated.

  11. Securing VoIP keeping your VoIP network safe

    CERN Document Server

    (Bud) Bates, Regis J Jr

    2015-01-01

    Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent

  12. Space Network IP Services (SNIS): An Architecture for Supporting Low Earth Orbiting IP Satellite Missions

    Science.gov (United States)

    Israel, David J.

    2005-01-01

    The NASA Space Network (SN) supports a variety of missions using the Tracking and Data Relay Satellite System (TDRSS), which includes ground stations in White Sands, New Mexico and Guam. A Space Network IP Services (SNIS) architecture is being developed to support future users with requirements for end-to-end Internet Protocol (IP) communications. This architecture will support all IP protocols, including Mobile IP, over TDRSS Single Access, Multiple Access, and Demand Access Radio Frequency (RF) links. This paper will describe this architecture and how it can enable Low Earth Orbiting IP satellite missions.

  13. DESIGN AND IMPLEMENTATION OF POTENTIOMETER-BASED NONLINEAR TRANSDUCER EMULATOR

    Directory of Open Access Journals (Sweden)

    Sheroz Khan

    2011-05-01

    Full Text Available This work attempts to design and implement in hardware a transducer with a nonlinear response using potentiometer. Potentiometer is regarded as a linear transducer, while a the response of a nonlinear transducer can be treated as a concatenation of linear segments made out of the response curve of an actual nonlinear transducer at the points of inflections being exhibited by the nonlinear curve. Each straight line segment is characterized by its slope and a constant, called the y-intercept, which is ultimately realized by a corresponding electronic circuit. The complete circuit diagram is made of three stages: (i the input stage for range selection, (ii a digital logic to make appropriate selection, (iii a conditioning circuit for realizing a given straight-line segment identified by its relevant slope and reference voltage. The simulation of the circuit is carried using MULTISIM, and the designed circuit is afterward tested to verify that variations of the input voltage give us an output voltage very close to the response pattern envisaged in the analytical stage of the design. The utility of this work lies in its applications in emulating purpose built transducers that could be used to nicely emulate a transducer in a real world system that is to be controlled by a programmable digital system.

  14. Simulated, Emulated, and Physical Investigative Analysis (SEPIA) of networked systems.

    Energy Technology Data Exchange (ETDEWEB)

    Burton, David P.; Van Leeuwen, Brian P.; McDonald, Michael James; Onunkwo, Uzoma A.; Tarman, Thomas David; Urias, Vincent E.

    2009-09-01

    This report describes recent progress made in developing and utilizing hybrid Simulated, Emulated, and Physical Investigative Analysis (SEPIA) environments. Many organizations require advanced tools to analyze their information system's security, reliability, and resilience against cyber attack. Today's security analysis utilize real systems such as computers, network routers and other network equipment, computer emulations (e.g., virtual machines) and simulation models separately to analyze interplay between threats and safeguards. In contrast, this work developed new methods to combine these three approaches to provide integrated hybrid SEPIA environments. Our SEPIA environments enable an analyst to rapidly configure hybrid environments to pass network traffic and perform, from the outside, like real networks. This provides higher fidelity representations of key network nodes while still leveraging the scalability and cost advantages of simulation tools. The result is to rapidly produce large yet relatively low-cost multi-fidelity SEPIA networks of computers and routers that let analysts quickly investigate threats and test protection approaches.

  15. Emulation Platform for Cyber Analysis of Wireless Communication Network Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Van Leeuwen, Brian P. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Eldridge, John M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Wireless networking and mobile communications is increasing around the world and in all sectors of our lives. With increasing use, the density and complexity of the systems increase with more base stations and advanced protocols to enable higher data throughputs. The security of data transported over wireless networks must also evolve with the advances in technologies enabling more capable wireless networks. However, means for analysis of the effectiveness of security approaches and implementations used on wireless networks are lacking. More specifically a capability to analyze the lower-layer protocols (i.e., Link and Physical layers) is a major challenge. An analysis approach that incorporates protocol implementations without the need for RF emissions is necessary. In this research paper several emulation tools and custom extensions that enable an analysis platform to perform cyber security analysis of lower layer wireless networks is presented. A use case of a published exploit in the 802.11 (i.e., WiFi) protocol family is provided to demonstrate the effectiveness of the described emulation platform.

  16. Emulating conventional operator interfaces on window-based workstations

    International Nuclear Information System (INIS)

    Carr, G.P.

    1990-01-01

    This paper explores an approach to support the LAMPF and PSR control systems on VAX/VMS workstations using DECwindows and VI Corporation Data Views as the operator interface. The PSR control system was recently turned over to MP division and the two control-system staffs were merged into one group. One of the goals of this new group is to develop a common workstation-based operator console and interface which can be used in a single control room controlling both the linac and proton storage ring. The new console operator interface will need a high-level graphics toolkit for its implementation. During the conversion to the new consoles it will also probably be necessary to write a package to emulate the current operator interfaces at the software level. This paper describes a project to evaluate the appropriateness of VI Corporation's Data Views graphics package for use in the LAMPF control-system environment by using it to write an emulation of the LAMPF touch-panel interface to a large LAMPF control-system application program. A secondary objective of this project was to explore any productivity increases that might be realized by using an object-oriented graphics package and graphics editor. (orig.)

  17. IP Address Management Principles and Practice

    CERN Document Server

    Rooney, Timothy

    2010-01-01

    This book will be the first covering the subject of IP address management (IPAM). The practice of IPAM includes the application of network management disciplines to IP address space and associated network services, namely DHCP (Dynamic Host Configuration Protocol) and DNS (Domain Name System). The consequence of inaccurately configuring DHCP is that end users may not be able to obtain IP addresses to access the network. Without proper DNS configuration, usability of the network will greatly suffer as the name-to-address lookup process may fail. Imagine having to navigate to a website or send a

  18. Intellectual Property and Strategic Agreements (IP/SA) | FNLCR

    Science.gov (United States)

    What does IP/SA handle? IP/SA handles all invention issues including patents and copyrights. All employee inventionreports are filed through the IP/SA office for all activities under the OTS contract.Additionally,&nbs

  19. LTE HetNet Mobility Performance Through Emulation with Commercial Smartphones

    DEFF Research Database (Denmark)

    Jensen, Anders Riis; Pedersen, Klaus I.; Lauridsen, Mads

    2014-01-01

    In this paper we introduce a laboratory emulation setup for evaluation of Long Term Evolution (LTE) mobility performance in a co-channel heterogeneous network (HetNet). The setup consists of two eNodeB emulators, signal faders and release 9 LTE User Equipment (UE). It is shown how the LTE HetNet ...

  20. The Ghost Condition: Imitation Versus Emulation in Young Children's Observational Learning.

    Science.gov (United States)

    Thompson, Doreen E.; Russell, James

    2004-01-01

    Although observational learning by children may occur through imitating a modeler's actions, it can also occur through learning about an object's dynamic affordances- a process that M. Tomasello (1996) calls "emulation." The relative contributions of imitation and emulation within observational learning were examined in a study with 14- to…

  1. Emotions Targeting Moral Exemplarity: Making Sense of the Logical Geography of Admiration, Emulation and Elevation

    Science.gov (United States)

    Kristjánsson, Kristján

    2017-01-01

    Despite renewed interest in moral role-modelling and its emotional underpinnings, further conceptual work is needed on the logical geography of the emotions purportedly driving it, in particular, admiration, emulation and elevation. In this article, I explore admiration (as understood by Linda Zagzebski), emulation (as understood by Aristotle) and…

  2. China's Indigenous IP Policies -- Here to Stay?

    OpenAIRE

    Prud'homme, Dan

    2013-01-01

    In 2010 and 2011, foreign businesses and governments welcomed measures believed to dramatically reform a highly controversial branch of China’s indigenous innovation policy which provided government procurement preferences to applicants who can meet restrictive indigenous intellectual property (IP) rights requirements. However, this article describes specific examples of (what can be labeled) China’s “indigenous IP policy” that are still very much in force, in particular several programs link...

  3. HPC Access Using KVM over IP

    Science.gov (United States)

    2007-06-08

    Lightwave VDE /200 KVM-over-Fiber (Keyboard, Video and Mouse) devices installed throughout the TARDEC campus. Implementation of this system required...development effort through the pursuit of an Army-funded Phase-II Small Business Innovative Research (SBIR) effort with IP Video Systems (formerly known as...visualization capabilities of a DoD High- Performance Computing facility, many advanced features are necessary. TARDEC-HPC’s SBIR with IP Video Systems

  4. Heterogeneous IP Ecosystem enabling Reuse (HIER)

    Science.gov (United States)

    2017-03-22

    HIER project, DARPA also established additional concepts in the formation of the Common Heterogeneous Integration and IP Reuse Strategies (CHIPS...would need a major change to  business model to offer  Hard  or Soft IP – So CHIPS program can be a better fit to these firms • DoD‐Contractor IP pricing

  5. Emulating facial biomechanics using multivariate partial least squares surrogate models.

    Science.gov (United States)

    Wu, Tim; Martens, Harald; Hunter, Peter; Mithraratne, Kumar

    2014-11-01

    A detailed biomechanical model of the human face driven by a network of muscles is a useful tool in relating the muscle activities to facial deformations. However, lengthy computational times often hinder its applications in practical settings. The objective of this study is to replace precise but computationally demanding biomechanical model by a much faster multivariate meta-model (surrogate model), such that a significant speedup (to real-time interactive speed) can be achieved. Using a multilevel fractional factorial design, the parameter space of the biomechanical system was probed from a set of sample points chosen to satisfy maximal rank optimality and volume filling. The input-output relationship at these sampled points was then statistically emulated using linear and nonlinear, cross-validated, partial least squares regression models. It was demonstrated that these surrogate models can mimic facial biomechanics efficiently and reliably in real-time. Copyright © 2014 John Wiley & Sons, Ltd.

  6. A novel mechanism for emulating insect wing kinematics

    International Nuclear Information System (INIS)

    Seshadri, Pranay; Benedict, Moble; Chopra, Inderjit

    2012-01-01

    A novel dual-differential four-bar flapping mechanism that can accurately emulate insect wing kinematics in all three degrees of freedom (translation, rotation and stroke plane deviation) is developed. The mechanism is specifically designed to be simple and scalable such that it can be utilized on an insect-based flapping wing micro air vehicle. Kinematic formulations for the wing stroke position, pitch angle and coning angle for this model are derived from first principles and compared with a 3D simulation. A benchtop flapping mechanism based on this model was designed and built, which was also equipped with a balance for force measurements. 3D motion capture tests were conducted on this setup to demonstrate the capability of generating complex figure-of-eight flapping motions along with dynamic pitching. The dual-differential four-bar mechanism was implemented on a light-weight vehicle that demonstrated tethered hover. (paper)

  7. Programming a Detector Emulator on NI's FlexRIO Platform

    Science.gov (United States)

    Gervais, Michelle; Crawford, Christopher; Sprow, Aaron; Nab Collaboration

    2017-09-01

    Recently digital detector emulators have been on the rise as a means to test data acquisition systems and analysis toolkits from a well understood data set. National Instruments' PXIe-7962R FPGA module and Active Technologies AT-1212 DAC module provide a customizable platform for analog output. Using a graphical programming language, we have developed a system capable of producing two time-correlated channels of analog output which sample unique amplitude spectra to mimic nuclear physics experiments. This system will be used to model the Nab experiment, in which a prompt beta decay electron is followed by a slow proton according to a defined time distribution. We will present the results of our work and discuss further development potential. DOE under Contract DE-SC0008107.

  8. Reduced time delay for gravitational waves with dark matter emulators

    International Nuclear Information System (INIS)

    Desai, S.; Kahya, E. O.; Woodard, R. P.

    2008-01-01

    We discuss the implications for gravitational wave detectors of a class of modified gravity theories which dispense with the need for dark matter. These models, which are known as dark matter emulators, have the property that weak gravitational waves couple to the metric that would follow from general relativity without dark matter whereas ordinary particles couple to a combination of the metric and other fields which reproduces the result of general relativity with dark matter. We show that there is an appreciable difference in the Shapiro delays of gravitational waves and photons or neutrinos from the same source, with the gravitational waves always arriving first. We compute the expected time lags for GRB 070201, for SN 1987a and for Sco-X1. We estimate the probable error by taking account of the uncertainty in position, and by using three different dark matter profiles

  9. Emulation of recharge and evapotranspiration processes in shallow groundwater systems

    Science.gov (United States)

    Doble, Rebecca C.; Pickett, Trevor; Crosbie, Russell S.; Morgan, Leanne K.; Turnadge, Chris; Davies, Phil J.

    2017-12-01

    In shallow groundwater systems, recharge and evapotranspiration are highly sensitive to changes in the depth to water table. To effectively model these fluxes, complex functions that include soil and vegetation properties are often required. Model emulation (surrogate modelling or meta-modelling) can provide a means of incorporating detailed conceptualisation of recharge and evapotranspiration processes, while maintaining the numerical tractability and computational performance required for regional scale groundwater models and uncertainty analysis. A method for emulating recharge and evapotranspiration processes in groundwater flow models was developed, and applied to the South East region of South Australia and western Victoria, which is characterised by shallow groundwater, wetlands and coastal lakes. The soil-vegetation-atmosphere transfer (SVAT) model WAVES was used to generate relationships between net recharge (diffuse recharge minus evapotranspiration from groundwater) and depth to water table for different combinations of climate, soil and land cover types. These relationships, which mimicked previously described soil, vegetation and groundwater behaviour, were combined into a net recharge lookup table. The segmented evapotranspiration package in MODFLOW was adapted to select values of net recharge from the lookup table depending on groundwater depth, and the climate, soil and land use characteristics of each cell. The model was found to be numerically robust in steady state testing, had no major increase in run time, and would be more efficient than tightly-coupled modelling approaches. It made reasonable predictions of net recharge and groundwater head compared with remotely sensed estimates of net recharge and a standard MODFLOW comparison model. In particular, the method was better able to predict net recharge and groundwater head in areas with steep hydraulic gradients.

  10. Implementation of a MIX Emulator: A Case Study of the Scala Programming Language Facilities

    Directory of Open Access Journals (Sweden)

    Batdalov Ruslan

    2017-12-01

    Full Text Available Implementation of an emulator of MIX, a mythical computer invented by Donald Knuth, is used as a case study of the features of the Scala programming language. The developed emulator provides rich opportunities for program debugging, such as tracking intermediate steps of program execution, an opportunity to run a program in the binary or the decimal mode of MIX, verification of correct synchronisation of input/output operations. Such Scala features as cross-compilation, family polymorphism and support for immutable data structures have proved to be useful for implementation of the emulator. The authors of the paper also propose some improvements to these features: flexible definition of family-polymorphic types, integration of family polymorphism with generics, establishing full equivalence between mutating operations on mutable data types and copy-and-modify operations on immutable data types. The emulator is free and open source software available at www.mix-emulator.org.

  11. An FPGA-Based Quantum Computing Emulation Framework Based on Serial-Parallel Architecture

    Directory of Open Access Journals (Sweden)

    Y. H. Lee

    2016-01-01

    Full Text Available Hardware emulation of quantum systems can mimic more efficiently the parallel behaviour of quantum computations, thus allowing higher processing speed-up than software simulations. In this paper, an efficient hardware emulation method that employs a serial-parallel hardware architecture targeted for field programmable gate array (FPGA is proposed. Quantum Fourier transform and Grover’s search are chosen as case studies in this work since they are the core of many useful quantum algorithms. Experimental work shows that, with the proposed emulation architecture, a linear reduction in resource utilization is attained against the pipeline implementations proposed in prior works. The proposed work contributes to the formulation of a proof-of-concept baseline FPGA emulation framework with optimization on datapath designs that can be extended to emulate practical large-scale quantum circuits.

  12. Emulation-Based Virtual Laboratories: A Low-Cost Alternative to Physical Experiments in Control Engineering Education

    Science.gov (United States)

    Goodwin, G. C.; Medioli, A. M.; Sher, W.; Vlacic, L. B.; Welsh, J. S.

    2011-01-01

    This paper argues the case for emulation-based virtual laboratories in control engineering education. It demonstrates that such emulation experiments can give students an industrially relevant educational experience at relatively low cost. The paper also describes a particular emulation-based system that has been developed with the aim of giving…

  13. EmuStack: An OpenStack-Based DTN Network Emulation Platform (Extended Version

    Directory of Open Access Journals (Sweden)

    Haifeng Li

    2016-01-01

    Full Text Available With the advancement of computing and network virtualization technology, the networking research community shows great interest in network emulation. Compared with network simulation, network emulation can provide more relevant and comprehensive details. In this paper, EmuStack, a large-scale real-time emulation platform for Delay Tolerant Network (DTN, is proposed. EmuStack aims at empowering network emulation to become as simple as network simulation. Based on OpenStack, distributed synchronous emulation modules are developed to enable EmuStack to implement synchronous and dynamic, precise, and real-time network emulation. Meanwhile, the lightweight approach of using Docker container technology and network namespaces allows EmuStack to support a (up to hundreds of nodes large-scale topology with only several physical nodes. In addition, EmuStack integrates the Linux Traffic Control (TC tools with OpenStack for managing and emulating the virtual link characteristics which include variable bandwidth, delay, loss, jitter, reordering, and duplication. Finally, experiences with our initial implementation suggest the ability to run and debug experimental network protocol in real time. EmuStack environment would bring qualitative change in network research works.

  14. Real-time emulation of neural images in the outer retinal circuit.

    Science.gov (United States)

    Hasegawa, Jun; Yagi, Tetsuya

    2008-12-01

    We describe a novel real-time system that emulates the architecture and functionality of the vertebrate retina. This system reconstructs the neural images formed by the retinal neurons in real time by using a combination of analog and digital systems consisting of a neuromorphic silicon retina chip, a field-programmable gate array, and a digital computer. While the silicon retina carries out the spatial filtering of input images instantaneously, using the embedded resistive networks that emulate the receptive field structure of the outer retinal neurons, the digital computer carries out the temporal filtering of the spatially filtered images to emulate the dynamical properties of the outer retinal circuits. The emulations of the neural image, including 128 x 128 bipolar cells, are carried out at a frame rate of 62.5 Hz. The emulation of the response to the Hermann grid and a spot of light and an annulus of lights has demonstrated that the system responds as expected by previous physiological and psychophysical observations. Furthermore, the emulated dynamics of neural images in response to natural scenes revealed the complex nature of retinal neuron activity. We have concluded that the system reflects the spatiotemporal responses of bipolar cells in the vertebrate retina. The proposed emulation system is expected to aid in understanding the visual computation in the retina and the brain.

  15. Demonstration of Emulator-Based Bayesian Calibration of Safety Analysis Codes: Theory and Formulation

    Directory of Open Access Journals (Sweden)

    Joseph P. Yurko

    2015-01-01

    Full Text Available System codes for simulation of safety performance of nuclear plants may contain parameters whose values are not known very accurately. New information from tests or operating experience is incorporated into safety codes by a process known as calibration, which reduces uncertainty in the output of the code and thereby improves its support for decision-making. The work reported here implements several improvements on classic calibration techniques afforded by modern analysis techniques. The key innovation has come from development of code surrogate model (or code emulator construction and prediction algorithms. Use of a fast emulator makes the calibration processes used here with Markov Chain Monte Carlo (MCMC sampling feasible. This work uses Gaussian Process (GP based emulators, which have been used previously to emulate computer codes in the nuclear field. The present work describes the formulation of an emulator that incorporates GPs into a factor analysis-type or pattern recognition-type model. This “function factorization” Gaussian Process (FFGP model allows overcoming limitations present in standard GP emulators, thereby improving both accuracy and speed of the emulator-based calibration process. Calibration of a friction-factor example using a Method of Manufactured Solution is performed to illustrate key properties of the FFGP based process.

  16. ejIP: A TCP/IP Stack for Embedded Java

    DEFF Research Database (Denmark)

    Schoeberl, Martin

    2011-01-01

    present the design and implementation of a network stack written entirely in Java. This implementation serves as an example how to implement system functions in a safe language and gives evidence that Java can be used for operating system related functionality. The described TCP/IP stack ejIP has already...

  17. Outbreak of Ips nitidus and Ips shangrila in northeastern margin of the Tibetan Plateau

    Czech Academy of Sciences Publication Activity Database

    Jakuš, R.; Kalinová, Blanka; Hoskovec, Michal; Knížek, M.; Schlyter, F.; Sun, J.-H.; Zhang, Q. H.

    2011-01-01

    Roč. 89, - (2011), s. 111-117 ISSN 1436-1566 R&D Projects: GA MŠk ME 860 Institutional research plan: CEZ:AV0Z40550506 Keywords : Ips shangrila * Ips nitidus * pheromone s * GCxGC-TOFMS Subject RIV: CC - Organic Chemistry

  18. Design and building of home made 8051 micro controller emulator

    International Nuclear Information System (INIS)

    Hussein, A. E.

    2009-09-01

    This research targeted design and build of a simple lab made emulator for the 8051 micro controller to assist student and researcher in their projects. This will be achieved by thorough understanding of the software and the hardware of the development tool which will enhance the user knowledge rather than considering them as black boxes and unaware of their capabilities and their limitations. Regarding the hardware this work preferred to use the same central processing unit the developer wanted to build with little modification. While the software is a program loaded in the micro controller itself responsible (making use of flash micro controllers) for communication with the host computer terminal, and monitoring the user program which is loaded in external memory by the program. Any terminal program on the host computer can be used to carry out communication with monitor program provided that a carriage return should be pressed after monitor power up to let the monitor adjust its baud rate accordingly. This feature makes the monitor program so simple and familiar to the user. For simplicity the software is enhanced with flash programming and erasing subroutine which can allow the user to store his program there if he put a flash ROM in his hardware and he can make it as start up program which will run automatically after start up. Also many programs can be loaded in the flash as long as its capacity is capable. Definitely this requires configuring flash start and end in the source before compiling it. This flash feature allows the development hardware to be as final board and hence a debugable one as long as monitor program resides inside the micro controller. Considering the debugging stage as the most crucial step in the development cycle, this work tried to find some suitable and simple solutions that can enhance knowledge. As a result some commands on the user program like uploading, displaying, jumping, selecting among others, running, editing, clearing and

  19. A survey of IP over ATM architectures

    Energy Technology Data Exchange (ETDEWEB)

    Chen, H.; Tsang, R.; Brandt, J.; Hutchins, J.

    1997-07-01

    Over the past decade, the Internet has burgeoned into a worldwide information highway consisting of approximately 5 million hosts on over 45,000 interconnected networks. This unprecedented growth, together with the introduction of multimedia workstations, has spurred the development of innovative applications that require high speed, low latency, and real-time transport. Today`s Internet can neither scale in its bandwidth nor guarantee the Quality of Services (QoS) necessary to meet these performance requirements. Many network researchers propose to use the Asynchronous Transfer Mode (ATM) technology as the underlying infrastructure for the next generation of workgroup, campus, and enterprise IP networks. Since ATM is significantly different from today`s legacy network technologies, efficient implementation of IP over ATM is especially challenging. This tutorial paper covers several existing proposals that integrate IP over ATM.

  20. Automatic Generation of Machine Emulators: Efficient Synthesis of Robust Virtual Machines for Legacy Software Migration

    DEFF Research Database (Denmark)

    Franz, Michael; Gal, Andreas; Probst, Christian

    2006-01-01

    As older mainframe architectures become obsolete, the corresponding le- gacy software is increasingly executed via platform emulators running on top of more modern commodity hardware. These emulators are virtual machines that often include a combination of interpreters and just-in-time compilers....... Implementing interpreters and compilers for each combination of emulated and target platform independently of each other is a redundant and error-prone task. We describe an alternative approach that automatically synthesizes specialized virtual-machine interpreters and just-in-time compilers, which...... then execute on top of an existing software portability platform such as Java. The result is a considerably reduced implementation effort....

  1. Hardware Locks with Priority Ceiling Emulation for a Java Chip-Multiprocessor

    DEFF Research Database (Denmark)

    Strøm, Torur Biskopstø; Schoeberl, Martin

    2015-01-01

    According to the safety-critical Java specification, priority ceiling emulation is a requirement for implementations, as it has preferable properties, such as avoiding priority inversion and being deadlock free on uni-core systems. In this paper we explore our hardware supported implementation...... of priority ceiling emulation on the multicore Java optimized processor, and compare it to the existing hardware locks on the Java optimized processor. We find that the additional overhead for priority ceiling emulation on a multicore processor is several times higher than simpler, non-premptive locks, mainly...

  2. Experimental verification of on-chip CMOS fractional-order capacitor emulators

    KAUST Repository

    Tsirimokou, G.; Psychalinos, C.; Salama, Khaled N.; Elwakil, A.S.

    2016-01-01

    The experimental results from a fabricated integrated circuit of fractional-order capacitor emulators are reported. The chip contains emulators of capacitors of orders 0.3, 0.4, 0.5, 0.6 and 0.7 with nano-Farad pseudo-capacitances that can be adjusted through a bias current. Two off-chip capacitors are used to set the bandwidth of each emulator independently. The chip was designed in Austria microsystems (AMS) 0.35μ CMOS. © 2016 The Institution of Engineering and Technology.

  3. Experimental verification of on-chip CMOS fractional-order capacitor emulators

    KAUST Repository

    Tsirimokou, G.

    2016-06-13

    The experimental results from a fabricated integrated circuit of fractional-order capacitor emulators are reported. The chip contains emulators of capacitors of orders 0.3, 0.4, 0.5, 0.6 and 0.7 with nano-Farad pseudo-capacitances that can be adjusted through a bias current. Two off-chip capacitors are used to set the bandwidth of each emulator independently. The chip was designed in Austria microsystems (AMS) 0.35μ CMOS. © 2016 The Institution of Engineering and Technology.

  4. Secure IP mobility management for VANET

    CERN Document Server

    Taha, Sanaa

    2013-01-01

    This brief presents the challenges and solutions for VANETs' security and privacy problems occurring in mobility management protocols including Mobile IPv6 (MIPv6), Proxy MIPv6 (PMIPv6), and Network Mobility (NEMO). The authors give an overview of the concept of the vehicular IP-address configurations as the prerequisite step to achieve mobility management for VANETs, and review the current security and privacy schemes applied in the three mobility management protocols. Throughout the brief, the authors propose new schemes and protocols to increase the security of IP addresses within VANETs in

  5. MICROSOFT DYNAMICS CRM IN CISCO IP TELEFONIJA

    OpenAIRE

    Knez, Margareta

    2011-01-01

    Microsoft Dynamics CRM je le ena od mnogih rešitev CRM, ki se iz dneva v dan bolj izpopolnjuje in postaja prijaznejša za uporabnike. Na trgu je še mnogo drugih konkurenčnih rešitev programskega orodja CRM. Tako je tudi Ciscova IP-telefonija le ena od mnogih ponudnikov te tehnologije. IP-telefonija bo počasi spodrinila navadno telefonsko linijo, saj je veliko cenejša in ponuja še mnogo dodatnih funkcionalnosti. Le lepa beseda in dobra komunikacija sta potrebni, da stranko zadovoljimo in...

  6. Extending Tactical Fleet Communications Through VoIP

    Science.gov (United States)

    2014-09-01

    corporate world , the military is leveraging VoIP communication solutions as well. Shore commands like Tactical Training Group Pacific use VoIP for...VoIP fuzzing (e.g., Asteroid , PROTOS, Sip-Proxy)  VoIP signaling manipulation (e.g., IAXAuthJack, IAXHangup, SIP-Kill)  VoIP media...as well, but instead of just matching the information to rules, it compares synchronization information between the protocols to determine if the

  7. A Robotic Fish to Emulate the Fast-Start

    Science.gov (United States)

    Currier, Todd; Ma, Ganzhong; Modarres-Sadeghi, Yahya

    2017-11-01

    An experimental study is conducted on a robotic fish designed to emulate the fast-start response. The fish body is constructed of 3D printed ribs and a light spring steel spine. The body is actuated using a series of pressured pistons. A total of four pistons are supplied with pressure through lightweight high pressure service lines. The source of pressure is carbon dioxide with a 700 psi peak operating pressure resulting in a body response that can cycle a c-start maneuver in milliseconds. The motion of the fish is precisely controlled through the use of solenoids with a control signal produced by a programmable microprocessor. The fish is constrained in all translational degrees of freedom but allowed to rotate about a vertical axis. The influence of the point of rotation is studied with different mounting points along the length of the head of the fish. The forces are measured in two perpendicular in-plane directions. A high speed camera is used to capture the response of the fish and the corresponding flow around it. Comparison is made with the kinematics observed in live fish.

  8. Hardware-in-the-Loop emulator for a hydrokinetic turbine

    Science.gov (United States)

    Rat, C. L.; Prostean, O.; Filip, I.

    2018-01-01

    Hydroelectric power has proven to be an efficient and reliable form of renewable energy, but its impact on the environment has long been a source of concern. Hydrokinetic turbines are an emerging class of renewable energy technology designed for deployment in small rivers and streams with minimal environmental impact on the local ecosystem. Hydrokinetic technology represents a truly clean source of energy, having the potential to become a highly efficient method of harvesting renewable energy. However, in order to achieve this goal, extensive research is necessary. This paper presents a Hardware-in-the-Loop emulator for a run-of-the-river type hydrokinetic turbine. The HIL system uses an ABB ACS800 drive to control an induction machine as a significant means of replicating the behavior of the real turbine. The induction machine is coupled to a permanent magnet synchronous generator and the corresponding load. The ACS800 drive is controlled through the software system, which comprises of the hydrokinetic turbine real-time simulation through mathematical modeling in the LabVIEW programming environment running on a NI CompactRIO (cRIO) platform. The advantages of this method are that it can provide a means for testing many control configurations without requiring the presence of the real turbine. This paper contains the basic principles of a hydrokinetic turbine, particularly the run-of-the-river configurations along with the experimental results obtained from the HIL system.

  9. Synchronous Parallel System for Emulation and Discrete Event Simulation

    Science.gov (United States)

    Steinman, Jeffrey S. (Inventor)

    2001-01-01

    A synchronous parallel system for emulation and discrete event simulation having parallel nodes responds to received messages at each node by generating event objects having individual time stamps, stores only the changes to the state variables of the simulation object attributable to the event object and produces corresponding messages. The system refrains from transmitting the messages and changing the state variables while it determines whether the changes are superseded, and then stores the unchanged state variables in the event object for later restoral to the simulation object if called for. This determination preferably includes sensing the time stamp of each new event object and determining which new event object has the earliest time stamp as the local event horizon, determining the earliest local event horizon of the nodes as the global event horizon, and ignoring events whose time stamps are less than the global event horizon. Host processing between the system and external terminals enables such a terminal to query, monitor, command or participate with a simulation object during the simulation process.

  10. A methodology to emulate and evaluate a productive virtual workstation

    Science.gov (United States)

    Krubsack, David; Haberman, David

    1992-01-01

    The Advanced Display and Computer Augmented Control (ADCACS) Program at ACT is sponsored by NASA Ames to investigate the broad field of technologies which must be combined to design a 'virtual' workstation for the Space Station Freedom. This program is progressing in several areas and resulted in the definition of requirements for a workstation. A unique combination of technologies at the ACT Laboratory have been networked to effectively create an experimental environment. This experimental environment allows the integration of nonconventional input devices with a high power graphics engine within the framework of an expert system shell which coordinates the heterogeneous inputs with the 'virtual' presentation. The flexibility of the workstation is evolved as experiments are designed and conducted to evaluate the condition descriptions and rule sets of the expert system shell and its effectiveness in driving the graphics engine. Workstation productivity has been defined by the achievable performance in the emulator of the calibrated 'sensitivity' of input devices, the graphics presentation, the possible optical enhancements to achieve a wide field of view color image and the flexibility of conditional descriptions in the expert system shell in adapting to prototype problems.

  11. Mining data from hemodynamic simulations via Bayesian emulation

    Directory of Open Access Journals (Sweden)

    Nair Prasanth B

    2007-12-01

    Full Text Available Abstract Background: Arterial geometry variability is inevitable both within and across individuals. To ensure realistic prediction of cardiovascular flows, there is a need for efficient numerical methods that can systematically account for geometric uncertainty. Methods and results: A statistical framework based on Bayesian Gaussian process modeling was proposed for mining data generated from computer simulations. The proposed approach was applied to analyze the influence of geometric parameters on hemodynamics in the human carotid artery bifurcation. A parametric model in conjunction with a design of computer experiments strategy was used for generating a set of observational data that contains the maximum wall shear stress values for a range of probable arterial geometries. The dataset was mined via a Bayesian Gaussian process emulator to estimate: (a the influence of key parameters on the output via sensitivity analysis, (b uncertainty in output as a function of uncertainty in input, and (c which settings of the input parameters result in maximum and minimum values of the output. Finally, potential diagnostic indicators were proposed that can be used to aid the assessment of stroke risk for a given patient's geometry.

  12. MPPT algorithm test on a photovoltaic emulating system constructed by a DC power supply and an indoor solar panel

    International Nuclear Information System (INIS)

    Zhou, Z.; Holland, P.M.; Igic, P.

    2014-01-01

    Highlights: • A novel PV emulator is constructed by using conventional solar panels with a DC power supply. • The proposed PV emulator is cost-effectiveness, relatively easy implementation. • The proposed PV emulator avoids the bandwidth problem associated with electronics PV emulators. • Indoor testing of MPPT algorithms and power converters avoids the dependency on solar irradiation. • The PV emulating system has been used for testing a P and O MPPT algorithm and a boost dc converter. - Abstract: In this paper a novel photovoltaic (PV) emulating scheme for testing maximum power point tracking (MPPT) algorithms and PV inverters has been proposed. It is constructed by the parallel connection of conventional solar panels with a DC power supply operating in current source mode. The advantages of the proposed scheme are cost-effectiveness, relatively easy implementation and indoor testing of MPPT algorithms and power converters avoiding weather and time of day dependency on solar irradiation levels. Furthermore, the proposed PV emulator avoids the bandwidth problem associated with the dc converter based PV emulating systems. Detailed circuit connection, parameters, electrical characteristics and mathematical model of the PV emulator are presented and discussed. Proposed PV emulating system has been used to test a boost DC/DC converter controlled by Perturb and Observe (P and O) MPPT algorithm. Test results confirmed the effectiveness of the proposed PV emulation system and all achieved results correspond well to the original designed values

  13. Integration of a network aware traffic generation device into a computer network emulation platform

    CSIR Research Space (South Africa)

    Von Solms, S

    2014-07-01

    Full Text Available Flexible, open source network emulation tools can provide network researchers with significant benefits regarding network behaviour and performance. The evaluation of these networks can benefit greatly from the integration of realistic, network...

  14. Statistical emulation of a tsunami model for sensitivity analysis and uncertainty quantification

    Directory of Open Access Journals (Sweden)

    A. Sarri

    2012-06-01

    Full Text Available Due to the catastrophic consequences of tsunamis, early warnings need to be issued quickly in order to mitigate the hazard. Additionally, there is a need to represent the uncertainty in the predictions of tsunami characteristics corresponding to the uncertain trigger features (e.g. either position, shape and speed of a landslide, or sea floor deformation associated with an earthquake. Unfortunately, computer models are expensive to run. This leads to significant delays in predictions and makes the uncertainty quantification impractical. Statistical emulators run almost instantaneously and may represent well the outputs of the computer model. In this paper, we use the outer product emulator to build a fast statistical surrogate of a landslide-generated tsunami computer model. This Bayesian framework enables us to build the emulator by combining prior knowledge of the computer model properties with a few carefully chosen model evaluations. The good performance of the emulator is validated using the leave-one-out method.

  15. W-NINE: A Two-Stage Emulation Platform for Mobile and Wireless Systems

    Directory of Open Access Journals (Sweden)

    Emmanuel Conchon

    2010-01-01

    Full Text Available More and more applications and protocols are now running on wireless networks. Testing the implementation of such applications and protocols is a real challenge as the position of the mobile terminals and environmental effects strongly affect the overall performance. Network emulation is often perceived as a good trade-off between experiments on operational wireless networks and discrete-event simulations on Opnet or ns-2. However, ensuring repeatability and realism in network emulation while taking into account mobility in a wireless environment is very difficult. This paper proposes a network emulation platform, called W-NINE, based on off-line computations preceding online pattern-based traffic shaping. The underlying concepts of repeatability, dynamicity, accuracy, and realism are defined in the emulation context. Two different simple case studies illustrate the validity of our approach with respect to these concepts.

  16. VoIP Accessibility: A Usability Study of Voice over Internet Protocol (VoIP) Systems and A Survey of VoIP Users with Vision Loss

    Science.gov (United States)

    Packer, Jaclyn; Reuschel, William

    2018-01-01

    Introduction: Accessibility of Voice over Internet Protocol (VoIP) systems was tested with a hands-on usability study and an online survey of VoIP users who are visually impaired. The survey examined the importance of common VoIP features, and both methods assessed difficulty in using those features. Methods: The usability test included four paid…

  17. Presence in the IP Multimedia Subsystem

    Directory of Open Access Journals (Sweden)

    Ling Lin

    2007-01-01

    Full Text Available With an ever increasing penetration of Internet Protocol (IP technologies, the wireless industry is evolving the mobile core network towards all-IP network. The IP Multimedia Subsystem (IMS is a standardised Next Generation Network (NGN architectural framework defined by the 3rd Generation Partnership Project (3GPP to bridge the gap between circuit-switched and packet-switched networks and consolidate both sides into on single all-IP network for all services. In this paper, we provide an insight into the limitation of the presence service, one of the fundamental building blocks of the IMS. Our prototype-based study is unique of its kind and helps identifying the factors which limit the scalability of the current version of the presence service (3GPP TS 23.141 version 7.2.0 Release 7 [1], which will in turn dramatically limit the performance of advanced IMS services. We argue that the client-server paradigm behind the current IMS architecture does not suite the requirements of the IMS system, which defies the very purpose of its introduction. We finally elaborate on possible avenues for addressing this problem.

  18. IP validation in remote microelectronics testing

    Science.gov (United States)

    Osseiran, Adam; Eshraghian, Kamran; Lachowicz, Stefan; Zhao, Xiaoli; Jeffery, Roger; Robins, Michael

    2004-03-01

    This paper presents the test and validation of FPGA based IP using the concept of remote testing. It demonstrates how a virtual tester environment based on a powerful, networked Integrated Circuit testing facility, aimed to complement the emerging Australian microelectronics based research and development, can be employed to perform the tasks beyond the standard IC test. IC testing in production consists in verifying the tested products and eliminating defective parts. Defects could have a number of different causes, including process defects, process migration and IP design and implementation errors. One of the challenges in semiconductor testing is that while current fault models are used to represent likely faults (stuck-at, delay, etc.) in a global context, they do not account for all possible defects. Research in this field keeps growing but the high cost of ATE is preventing a large community from accessing test and verification equipment to validate innovative IP designs. For these reasons a world class networked IC teletest facility has been established in Australia under the support of the Commonwealth government. The facility is based on a state-of-the-art semiconductor tester operating as a virtual centre spanning Australia and accessible internationally. Through a novel approach the teletest network provides virtual access to the tester on which the DUT has previously been placed. The tester software is then accessible as if the designer is sitting next to the tester. This paper presents the approach used to test and validate FPGA based IPs using this remote test approach.

  19. Experimental evaluation of the IP multimedia subsystem

    NARCIS (Netherlands)

    Oredope, A.; Liotta, A.; Yang, K.; Tyrode-Goilo, D.H.; Magedanz, T.; Mauro Madeira, E.R.M.; Dini, P.

    2005-01-01

    The IP Multimedia Subsystem (IMS) is the latest framework for a seamless conversion of the ordinary Internet with mobile cellular systems. As such it has the backing of all major companies since it aims to offer a unified solution to integrated mobile services, including mechanisms for security,

  20. EQuIP-ped for Success

    Science.gov (United States)

    Ewing, Molly

    2015-01-01

    The Educators Evaluating the Quality of Instructional Products (EQuIP) Rubric for science is a new tool for science educators that provides criteria by which to examine the alignment and overall quality of lessons and units with respect to the "Next Generation Science Standards" ("NGSS"). The rubric criteria are divided into…

  1. IP-I0 BASED IMMUNOLOGICAL MONITORING

    DEFF Research Database (Denmark)

    2008-01-01

    The present invention relates to an immunological method and, more particularly, a method for measuring cell-mediated immune reactivity (CMI) in mammals based on the production of IP-10.The invention further discloses an assay and a kit for measuring CMI to an antigen using whole blood or other...

  2. Spojení s dynamickou IP adresou

    Czech Academy of Sciences Publication Activity Database

    Papík, Martin; Hodboď, J.

    2013-01-01

    Roč. 47, č. 2 (2013), s. 60-61 ISSN 1211-0906 R&D Projects: GA ČR GA13-02149S Institutional support: RVO:67985556 Keywords : dynamical IP adress * dynamic DNS * web services Subject RIV: JC - Computer Hardware ; Software

  3. Wireless IP and building the mobile Internet

    National Research Council Canada - National Science Library

    Dixit, Sudhir; Prasad, Ramjee

    2003-01-01

    ..., as well as the shortage of technical material in a single place in the field of wireless IP and closely related technologies that form the critical success factors. Therefore, we decided to invite the experts who are truly active in the field: the equipment manufacturers, mobile operators, and those working in research laboratories and unive...

  4. Operational Space Weather Products at IPS

    Science.gov (United States)

    Neudegg, D.; Steward, G.; Marshall, R.; Terkildsen, M.; Kennewell, J.; Patterson, G.; Panwar, R.

    2008-12-01

    IPS Radio and Space Services operates an extensive network (IPSNET) of monitoring stations and observatories within the Australasian and Antarctic regions to gather information on the space environment. This includes ionosondes, magnetometers, GPS-ISM, oblique HF sounding, riometers, and solar radio and optical telescopes. IPS exchanges this information with similar organisations world-wide. The Regional Warning Centre (RWC) is the Australian Space Forecast Centre (ASFC) and it utilizes this data to provide products and services to support customer operations. A wide range of customers use IPS services including; defence force and emergency services using HF radio communications and surveillance systems, organisations involved in geophysical exploration and pipeline cathodic protection, GPS users in aviation. Subscriptions to the alerts, warnings, forecasts and reports regarding the solar, geophysical and ionospheric conditions are distributed by email and Special Message Service (SMS). IPS also develops and markets widely used PC software prediction tools for HF radio skywave and surface wave (ASAPS/GWPS) and provides consultancy services for system planning.

  5. Searching CLEF-IP by Strategy

    NARCIS (Netherlands)

    W. Alink (Wouter); R. Cornacchia (Roberto); A.P. de Vries (Arjen)

    2010-01-01

    htmlabstractTasks performed by intellectual property specialists are often ad hoc, and continuously require new approaches to search a collection of documents. We therefore investigate the benets of a visual `search strategy builder' to allow IP search experts to express their approach to

  6. Teaching Network Security with IP Darkspace Data

    Science.gov (United States)

    Zseby, Tanja; Iglesias Vázquez, Félix; King, Alistair; Claffy, K. C.

    2016-01-01

    This paper presents a network security laboratory project for teaching network traffic anomaly detection methods to electrical engineering students. The project design follows a research-oriented teaching principle, enabling students to make their own discoveries in real network traffic, using data captured from a large IP darkspace monitor…

  7. Enhancing the Classification Accuracy of IP Geolocation

    Science.gov (United States)

    2013-10-01

    accurately identify the geographic location of Internet devices has signficant implications for online- advertisers, application developers , network...Real Media, Comedy Central, Netflix and Spotify) and target advertising (e.g., Google). More re- cently, IP geolocation techniques have been deployed...distance to delay function and how they triangulate the position of the target. Statistical Geolocation [14] develops a joint probability density

  8. PERBANDINGAN KINERJA IP SEC DAN SSL

    Directory of Open Access Journals (Sweden)

    Dessyanto Boedi P

    2015-04-01

    Full Text Available Ipsec (IP Security and SSL (Secure Socket Layer is the most widely used techniques to secure data communications over the Internet. Both of these techniques has advantages and disadvantages of each. The purpose of this study is to present an analysis of the two techniques above in terms of security and performance.

  9. Novel Modified Elman Neural Network Control for PMSG System Based on Wind Turbine Emulator

    OpenAIRE

    Lin, Chih-Hong

    2013-01-01

    The novel modified Elman neural network (NN) controlled permanent magnet synchronous generator (PMSG) system, which is directly driven by a permanent magnet synchronous motor (PMSM) based on wind turbine emulator, is proposed to control output of rectifier (AC/DC power converter) and inverter (DC/AC power converter) in this study. First, a closed loop PMSM drive control based on wind turbine emulator is designed to generate power for the PMSG system according to different wind speeds. Then, t...

  10. Co-Emulation of Scan-Chain Based Designs Utilizing SCE-MI Infrastructure

    OpenAIRE

    Tomas, Bill Jason; Jiang, Yingtao; Yang, Mei

    2014-01-01

    As the complexity of the scan algorithm is dependent on the number of design registers, large SoC scan designs can no longer be verified in RTL simulation unless partitioned into smaller sub - blocks. This paper proposes a meth odology to decrease scan - chain verification time utilizing SCE - MI, a widely used communication protocol for emulation, and an FPGA - based emulation platform. A high - level (SystemC) testbench and FPGA synthesizable har...

  11. Design and implementation of HMI and SCADA applied to a didactic emulation of a packing process

    Directory of Open Access Journals (Sweden)

    Manuel Alejandro Bohórquez-Dallos

    2013-07-01

    The supervision and control of the signals are performed with the CANopen protocol. The developed system allows the user to interact directly with the emulation of the process, triggering elements of it in the computer remotely and locally using the touch screen. The SCADA and HMI are embedded in a CoDeSys® function that the user can use as a learning tool for automating the process emulation.

  12. Using VoIP to compete.

    Science.gov (United States)

    Werbach, Kevin

    2005-09-01

    Internet telephony, or VoIP, is rapidly replacing the conventional kind. This year, for the first time, U.S. companies bought more new Internet-phone connections than standard lines. The major driver behind this change is cost. But VoIP isn't just a new technology for making old-fashioned calls cheaper, says consultant Kevin Werbach. It is fundamentally changing how companies use voice communications. What makes VoIP so powerful is that it turns voice into digital data packets that can be stored, copied, combined with other data, and distributed to virtually any device that connects to the Internet. And it makes it simple to provide all the functionality of a corporate phone-call features, directories, security-to anyone anywhere there's broadband access. That fosters new kinds of businesses such as virtual call centers, where widely dispersed agents work at all hours from their homes. The most successful early adopters, says Werbach, will focus more on achieving business objectives than on saving money. They will also consider how to push VoIP capabilities out to the extended organization, making use of everyone as a resource. Deployment may be incremental, but companies should be thinking about where VoIP could take them. Executives should ask what they could do if, on demand, they could bring all their employees, customers, suppliers, and partners together in a virtual room, with shared access to every modern communications and computing channel. They should take a fresh look at their business processes to find points at which richer and more customizable communications could eliminate bottlenecks and enhance quality. The important dividing line won't be between those who deploy Vol P and those who don't, or even between early adopters and laggards. It will be between those who see Vol P as just a new way to do the same old things and those who use itto rethink their entire businesses.

  13. North-Karelian forest owners' attitude to nature-emulating forestry work methods

    International Nuclear Information System (INIS)

    Jouhiaho, A.

    1999-01-01

    The TTS-Institute conducted a mail-questionnaire study of forest owners' opinions in the Province of North Karelia (Pohjois-Karjala) concerning work methods as applied in silviculture and logging. In addition, the study looked into the matter of the forest owners' willingness to pay for the implementation of nature-emulating silviculture and logging. The response percentage was 57 % with 344 forest owners responding to the questionnaire. The majority of the forest owners understood nature-emulating silviculture and logging as worthwhile objectives and as actions aimed at economically advantageous outcomes. Nature-emulating work methods involve the use of method emulating the natural development dynamics of forest ecosystems and causing minimum disturbance to the ecosystem. The term 'nature-emulating' was also seen to include forest treatment with awareness of landscape management viewpoints. Less than half of the forest owners were willing to pay for the implementation of nature-emulating silviculture and logging. Of those willing to pay, half were prepared to pay an extra 6 - 10 % for sivicultural and 1 - 5 % for logging on top of the costs. (orig.)

  14. ESSE: Engineering Super Simulation Emulation for Virtual Reality Systems Environment

    International Nuclear Information System (INIS)

    Suh, Kune Y.; Yeon, Choul W.

    2008-01-01

    The trademark 4 + D Technology TM based Engineering Super Simulation Emulation (ESSE) is introduced. ESSE resorting to three-dimensional (3D) Virtual Reality (VR) technology pledges to provide with an interactive real-time motion, sound and tactile and other forms of feedback in the man machine systems environment. In particular, the 3D Virtual Engineering Neo cybernetic Unit Soft Power (VENUS) adds a physics engine to the VR platform so as to materialize a physical atmosphere. A close cooperation system and prompt information share are crucial, thereby increasing the necessity of centralized information system and electronic cooperation system. VENUS is further deemed to contribute towards public acceptance of nuclear power in general, and safety in particular. For instance, visualization of nuclear systems can familiarize the public in answering their questions and alleviating misunderstandings on nuclear power plants answering their questions and alleviating misunderstandings on nuclear power plants (NPPs) in general, and performance, security and safety in particular. An in-house flagship project Systemic Three-dimensional Engine Platform Prototype Engineering (STEPPE) endeavors to develop the Systemic Three-dimensional Engine Platform (STEP) for a variety of VR applications. STEP is home to a level system providing the whole visible scene of virtual engineering of man machine system environment. The system is linked with video monitoring that provides a 3D Computer Graphics (CG) visualization of major events. The database linked system provides easy access to relevant blueprints. The character system enables the operators easy access to visualization of major events. The database linked system provides easy access to relevant blueprints. The character system enables the operators to access the virtual systems by using their virtual characters. Virtually Engineered NPP Informative systems by using their virtual characters. Virtually Engineered NPP Informative

  15. Emulation of neutron irradiation effects with protons: validation of principle

    International Nuclear Information System (INIS)

    Was, G.S.; Busby, J.T.; Allen, T.; Kenik, E.A.; Jensson, A.; Bruemmer, S.M.; Gan, J.; Edwards, A.D.; Scott, P.M.; Andreson, P.L.

    2002-01-01

    This paper presents the results of the irradiation, characterization and irradiation assisted stress corrosion cracking (IASCC) behavior of proton- and neutron-irradiated samples of 304SS and 316SS from the same heats. The objective of the study was to determine whether proton irradiation does indeed emulate the full range of effects of in-reactor neutron irradiation: radiation-induced segregation (RIS), irradiated microstructure, radiation hardening and IASCC susceptibility. The work focused on commercial heats of 304 stainless steel (heat B) and 316 stainless steel (heat P). Irradiation with protons was conducted at 360 deg. C to doses between 0.3 and 5.0 dpa to approximate those by neutron irradiation at 275 deg. C over the same dose range. Characterization consisted of grain boundary microchemistry, dislocation loop microstructure, hardness as well as stress corrosion cracking (SCC) susceptibility of both un-irradiated and irradiated samples in oxygenated and de-oxygenated water environments at 288 deg. C. Overall, microchemistry, microstructure, hardening and SCC behavior of proton- and neutron-irradiated samples were in excellent agreement. RIS analysis showed that in both heats and for both irradiating particles, the pre-existing grain boundary Cr enrichment transformed into a 'W' shaped profile at 1.0 dpa and then into a 'V' shaped profile between 3.0 and 5.0 dpa. Grain boundary segregation of Cr, Ni, Si, and Mo all followed the same trends and agreed well in magnitude. The microstructure of both proton- and neutron-irradiated samples was dominated by small, faulted dislocation loops. Loop size distributions were nearly identical in both heats over a range of doses. Saturated loop size following neutron irradiation was about 30% larger than that following proton irradiation. Loop density increased with dose through 5.0 dpa for both particle irradiations and was a factor of 3 greater in neutron-irradiated samples vs. proton-irradiated samples. Grain boundary

  16. Measuring the impostor phenomenon: a comparison of Clance's IP Scale and Harvey's I-P Scale.

    Science.gov (United States)

    Holmes, S W; Kertay, L; Adamson, L B; Holland, C L; Clance, P R

    1993-02-01

    Many of the discrepancies reported to date in empirical investigations of the impostor phenomenon (IP) may be due in part to (a) the use of different methods for identifying individuals suffering from this syndrome (impostors), (b) the common use of a median split procedure to classify subjects and (c) the fact that subjects in many studies were drawn from impostor-prone samples. In this study, we compared the scores of independently identified impostors and nonimpostors on two instruments designed to measure the IP: Harvey's I-P Scale and Clance's IP Scale. The results suggest that Clance's scale may be the more sensitive and reliable instrument. Cutoff score suggestions for both instruments are offered.

  17. Opportunities for IP  in Communications Beyond 3G

    DEFF Research Database (Denmark)

    Nielsen, Thomas Toftegaard; Jacobsen, Rune H.

    2005-01-01

    Future communication will be based on TCP/IP as common network and transport layers to provide global connectivity to users and applications. IP is used to provide ubiquitous access across different access networks and exploits the benefits of a common connectivity layer while reducing the cost...... of operation and maintenance of the network. This paper discusses the opportunities for IP in the evolution towards a future broadband, all-IP mobile communication network. In particular, we argue for three opportunities for the future: Interworking access technologies over IP, IP layer transparency...

  18. Adjusting the IP $\\beta$ Functions in RHIC

    CERN Document Server

    Wittmer, W; Pilat, F; Ptitsyn, V; Van Zeijts, J

    2004-01-01

    The beta functions at the IP can be adjusted without perturbation of other optics functions via several approaches. In this paper we describe a scheme based on a vector knob, which assigns fixed values to the different tuning quadrupoles and scales them by a common multiplier. The values for the knob vector were calculated for a lattice without any errors using MADX. Previous studies for the LHC [1] have shown that this approach can meet the design goals. A specific feature of the RHIC lattice is the nested power supply system. To cope with the resulting problems a detailed response matrix analysis has been carried out and different sets of knobs were calculated and compared. The knobs were tested at RHIC during the 2004 run and preliminary results are discussed. Simultaneously a new approach to measure the beam sizes of both colliding beams at the IP, based on the tunability provided by the knobs, was developed and tested.

  19. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  20. IP Telephony Applicability in Cloud Computing

    Directory of Open Access Journals (Sweden)

    Francisco Palacios

    2018-02-01

    Full Text Available This paper carries out a research related to the applicability of VoIP over Cloud Computing to guarantee service stability and elasticity of the organizations. In this paper, Elastix is used as an open source software that allows the management and control of a Private Branch Exchange (PBX; and for developing, it is used the services given Amazon Web Services due to their leadership and experience in cloud computing providing security, scalability, backup service and feasibility for the users.

  1. Reliability of IP Tunnels in Military Networks

    Directory of Open Access Journals (Sweden)

    Pólkowski Marcin

    2016-10-01

    Full Text Available The military networks, contrary to commercial ones, require standards which provide the highest level of security and reliability. The process to assuring redundancy of the main connections through applying various protocols and transmission media causes problem with time needed to re-establish virtual tunnels between different locations in case of damaged link. This article compares reliability of different IP (Internet Protocol tunnels, which were implemented on military network devices.

  2. QERx- A Faster than Real-Time Emulator for Space Processors

    Science.gov (United States)

    Carvalho, B.; Pidgeon, A.; Robinson, P.

    2012-08-01

    Developing software for space systems is challenging. Especially because, in order to be sure it can cope with the harshness of the environment and the imperative requirements and constrains imposed by the platform were it will run, it needs to be tested exhaustively. Software Validation Facilities (SVF) are known to the industry and developers, and provide the means to run the On-Board Software (OBSW) in a realistic environment, allowing the development team to debug and test the software.But the challenge is to be able to keep up with the performance of the new processors (LEON2 and LEON3), which need to be emulated within the SVF. Such processor emulators are also used in Operational Simulators, used to support mission preparation and train mission operators. These simulators mimic the satellite and its behaviour, as realistically as possible. For test/operational efficiency reasons and because they will need to interact with external systems, both these uses cases require the processor emulators to provide real-time, or faster, performance.It is known to the industry that the performance of previously available emulators is not enough to cope with the performance of the new processors available in the market. SciSys approached this problem with dynamic translation technology trying to keep costs down by avoiding a hardware solution and keeping the integration flexibility of full software emulation.SciSys presented “QERx: A High Performance Emulator for Software Validation and Simulations” [1], in a previous DASIA event. Since then that idea has evolved and QERx has been successfully validated. SciSys is now presenting QERx as a product that can be tailored to fit different emulation needs. This paper will present QERx latest developments and current status.

  3. How to Party Like it’s 1999: Emulation for Everyone

    Directory of Open Access Journals (Sweden)

    Dianne Dietrich

    2016-04-01

    Full Text Available Emulated access of complex media has long been discussed, but there are very few instances in which complex, interactive, born-digital emulations are available to researchers. New York Public Library has made 1980-90's era video games from 5.25" floppy disks in the Timothy Leary Papers accessible via a DosBox emulator. These games appear in various stages of development and display the work of at least four of Leary's collaborators on the games. 56 disk images from the Leary Papers are currently emulated in the reading room. New York University has made late 1990s-mid 2000's era Photoshop files from the Jeremy Blake Papers accessible to researchers. The Blake Papers include over 300 pieces of media. Cornell University Library was awarded a grant from the NEH to analyze approximately 100 born-digital artworks created for CD-ROM from the Rose Goldsen Archive of New Media Art to develop preservation workflows, access strategies, and metadata frameworks. Rhizome has undertaken a number of emulation projects as a major part of its preservation strategy for born-digital artworks. In cooperation with the University of Freiburg in Germany, Rhizome recently restored several digital artworks for public access using a cloud-based emulation framework. This framework (bwFLA has been designed to facilitate the reenactments of software on a large scale, for internal use or public access. This paper will guide readers through how to implement emulation. Each of the institutions weigh in on oddities and idiosyncrasies they encountered throughout the process — from accession to access.

  4. Boosting flood warning schemes with fast emulator of detailed hydrodynamic models

    Science.gov (United States)

    Bellos, V.; Carbajal, J. P.; Leitao, J. P.

    2017-12-01

    Floods are among the most destructive catastrophic events and their frequency has incremented over the last decades. To reduce flood impact and risks, flood warning schemes are installed in flood prone areas. Frequently, these schemes are based on numerical models which quickly provide predictions of water levels and other relevant observables. However, the high complexity of flood wave propagation in the real world and the need of accurate predictions in urban environments or in floodplains hinders the use of detailed simulators. This sets the difficulty, we need fast predictions that meet the accuracy requirements. Most physics based detailed simulators although accurate, will not fulfill the speed demand. Even if High Performance Computing techniques are used (the magnitude of required simulation time is minutes/hours). As a consequence, most flood warning schemes are based in coarse ad-hoc approximations that cannot take advantage a detailed hydrodynamic simulation. In this work, we present a methodology for developing a flood warning scheme using an Gaussian Processes based emulator of a detailed hydrodynamic model. The methodology consists of two main stages: 1) offline stage to build the emulator; 2) online stage using the emulator to predict and generate warnings. The offline stage consists of the following steps: a) definition of the critical sites of the area under study, and the specification of the observables to predict at those sites, e.g. water depth, flow velocity, etc.; b) generation of a detailed simulation dataset to train the emulator; c) calibration of the required parameters (if measurements are available). The online stage is carried on using the emulator to predict the relevant observables quickly, and the detailed simulator is used in parallel to verify key predictions of the emulator. The speed gain given by the emulator allows also to quantify uncertainty in predictions using ensemble methods. The above methodology is applied in real

  5. Aspects of the epidemiology of intestinal parasitosis (IP) in children ...

    African Journals Online (AJOL)

    Aspects of the epidemiology of intestinal parasitosis (IP) in children: ... Conclusion: The low level of knowledge, practices and perceptions of mothers concerning IP is a major cause for ... EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT

  6. Intellectual Property and Strategic Agreements (IP/SA) | FNLCR Staging

    Science.gov (United States)

    IP/SA handles all invention issues including patents and copyrights. All employee inventionreports are filed through the IP/SA office for all activities under the OTS contract.Additionally,request for assignment ofcopyri

  7. A fast neutron detector with IP by track measurement

    International Nuclear Information System (INIS)

    Miao Zhengqiang; Yang Jun; Zhang Qiang; Zhao Xiangfeng; Wang Daohua

    2004-01-01

    Imaging Plate(IP) is very sensitive to electric particles, especially to heavy ions. As we know, the recoiling protons are produced while fast neutrons scattered in light material containing hydrogen. When the recoiling proton enters in the sensitive layer of IP, a track will be recorded by IP. In this paper, a fast neutron detector based on IP and (n, p) reaction is described in detail, the detector's efficiency is studied also. (authors)

  8. IP- -: A Reduced Internet Protocol for Optical Packet Networking

    Science.gov (United States)

    Ohta, Masataka; Fujikawa, Kenji

    IP- - is proposed as an Internet Protocol suitable for optical packet networking. As optical routers require much faster control than electric ones and lack of optical buffers other than those by fiber delay lines requires fixed time control, Internet Protocols must be at least as simple as IPv4 and much simpler than IPv6. IP- - also addresses issues of IP address space exhaustion and IP routing table explosion.

  9. Covert Channels in SIP for VoIP Signalling

    Science.gov (United States)

    Mazurczyk, Wojciech; Szczypiorski, Krzysztof

    In this paper, we evaluate available steganographic techniques for SIP (Session Initiation Protocol) that can be used for creating covert channels during signaling phase of VoIP (Voice over IP) call. Apart from characterizing existing steganographic methods we provide new insights by introducing new techniques. We also estimate amount of data that can be transferred in signalling messages for typical IP telephony call.

  10. Dynamic Mobile IP routers in ad hoc networks

    NARCIS (Netherlands)

    Kock, B.A.; Schmidt, J.R.

    2005-01-01

    This paper describes a concept combining mobile IP and ad hoc routing to create a robust mobile network. In this network all nodes are mobile and globally and locally reachable under the same IP address. Essential for implementing this network are the dynamic mobile IP routers. They act as gateways

  11. Impact of genome assembly status on ChIP-Seq and ChIP-PET data mapping

    Directory of Open Access Journals (Sweden)

    Sachs Laurent

    2009-12-01

    Full Text Available Abstract Background ChIP-Seq and ChIP-PET can potentially be used with any genome for genome wide profiling of protein-DNA interaction sites. Unfortunately, it is probable that most genome assemblies will never reach the quality of the human genome assembly. Therefore, it remains to be determined whether ChIP-Seq and ChIP-PET are practicable with genome sequences other than a few (e.g. human and mouse. Findings Here, we used in silico simulations to assess the impact of completeness or fragmentation of genome assemblies on ChIP-Seq and ChIP-PET data mapping. Conclusions Most currently published genome assemblies are suitable for mapping the short sequence tags produced by ChIP-Seq or ChIP-PET.

  12. Multislice computed tomography: angiographic emulation versus standard assessment for detection of coronary stenoses

    Energy Technology Data Exchange (ETDEWEB)

    Schnapauff, Dirk; Hamm, Bernd; Dewey, Marc [Humboldt-Universitaet zu Berlin, Department of Radiology, Charite - Universitaetsmedizin Berlin, Chariteplatz 1, P.O. Box 10098, Berlin (Germany); Duebel, Hans-Peter; Baumann, Gert [Charite - Universitaetsmedizin Berlin, Department of Cardiology, Berlin (Germany); Scholze, Juergen [Charite - Universitaetsmedizin Berlin, Charite Outpatient Centre, Berlin (Germany)

    2007-07-15

    The present study investigated angiographic emulation of multislice computed tomography (MSCT) (catheter-like visualization) as an alternative approach of analyzing and visualizing findings in comparison with standard assessment. Thirty patients (120 coronary arteries) were randomly selected from 90 prospectively investigated patients with suspected coronary artery disease who underwent MSCT (16-slice scanner, 0.5 mm collimation, 400 ms rotation time) prior to conventional coronary angiography for comparison of both approaches. Sensitivity and specificity of angiographic emulation [81% (26/32) and 93% (82/88)] were not significantly different from those of standard assessment [88% (28/32) and 99% (87/88)], while the per-case analysis time was significantly shorter for angiographic emulation than for standard assessment (3.4 {+-} 1.5 vs 7.0 {+-} 2.5 min, P < 0.001). Both interventional and referring cardiologists preferred angiographic emulation over standard curved multiplanar reformations of MSCT coronary angiography for illustration, mainly because of improved overall lucidity and depiction of sidebranches (P < 0.001). In conclusion, angiographic emulation of MSCT reduces analysis time, yields a diagnostic accuracy comparable to that of standard assessment, and is preferred by cardiologists for visualization of results. (orig.)

  13. Software emulator of nuclear pulse generation with different pulse shapes and pile-up

    Energy Technology Data Exchange (ETDEWEB)

    Pechousek, Jiri, E-mail: jiri.pechousek@upol.cz [Department of Experimental Physics, Faculty of Science, Palacky University, 17. listopadu 1192/12, 771 46 Olomouc (Czech Republic); Konecny, Daniel [Department of Optics, Faculty of Science, Palacky University, 17. listopadu 1192/12, 77 146 Olomouc (Czech Republic); Novak, Petr; Kouril, Lukas; Kohout, Pavel [Department of Experimental Physics, Faculty of Science, Palacky University, 17. listopadu 1192/12, 771 46 Olomouc (Czech Republic); Celiktas, Cuneyt [Department of Physics, Faculty of Science, Ege University, Bornova, Izmir (Turkey); Vujtek, Milan [Department of Experimental Physics, Faculty of Science, Palacky University, 17. listopadu 1192/12, 771 46 Olomouc (Czech Republic)

    2016-08-21

    The optimal detection of output signals from nuclear counting devices represents one of the key physical factors that govern accuracy and experimental reproducibility. In this context, the fine calibration of the detector under diverse experimental scenarios, although time costly, is necessary. However this process can be rendered easier with the use of systems that work in lieu of emulators. In this report we describe an innovative programmable pulse generator device capable to emulate the scintillation detector signals, in a way to mimic the detector performances under a variety of experimental conditions. The emulator generates a defined number of pulses, with a given shape and amplitude in the form of a sampled detector signal. The emulator output is then used off-line by a spectrometric system in order to set up its optimal performance. Three types of pulse shapes are produced by our device, with the possibility to add noise and pulse pile-up effects into the signal. The efficiency of the pulse detection, pile-up rejection and/or correction, together with the dead-time of the system, are therein analyzed through the use of some specific algorithms for pulse processing, and the results obtained validate the beneficial use of emulators for the accurate calibration process of spectrometric systems.

  14. Statistical emulation of landslide-induced tsunamis at the Rockall Bank, NE Atlantic.

    Science.gov (United States)

    Salmanidou, D M; Guillas, S; Georgiopoulou, A; Dias, F

    2017-04-01

    Statistical methods constitute a useful approach to understand and quantify the uncertainty that governs complex tsunami mechanisms. Numerical experiments may often have a high computational cost. This forms a limiting factor for performing uncertainty and sensitivity analyses, where numerous simulations are required. Statistical emulators, as surrogates of these simulators, can provide predictions of the physical process in a much faster and computationally inexpensive way. They can form a prominent solution to explore thousands of scenarios that would be otherwise numerically expensive and difficult to achieve. In this work, we build a statistical emulator of the deterministic codes used to simulate submarine sliding and tsunami generation at the Rockall Bank, NE Atlantic Ocean, in two stages. First we calibrate, against observations of the landslide deposits, the parameters used in the landslide simulations. This calibration is performed under a Bayesian framework using Gaussian Process (GP) emulators to approximate the landslide model, and the discrepancy function between model and observations. Distributions of the calibrated input parameters are obtained as a result of the calibration. In a second step, a GP emulator is built to mimic the coupled landslide-tsunami numerical process. The emulator propagates the uncertainties in the distributions of the calibrated input parameters inferred from the first step to the outputs. As a result, a quantification of the uncertainty of the maximum free surface elevation at specified locations is obtained.

  15. Implementasi Protokol Keamanan TLS pada Aplikasi Layanan Komunikasi Suara Melalui Jaringan TCP/IP (VoIP)

    OpenAIRE

    Hariady, Ricky

    2011-01-01

    Saat ini layanan komunikasi suara melalui jaringan TCP/IP atau yang lebih dikenal dengan VoIP (Voice over IP) telah semakin banyak digunakan, namun teknologi VoIP yang ada saat ini masih rentan terhadap penyadapan ataupun pencurian data. Sementara protokol kriptografi TLS (Transport Layer Security) telah teruji dan banyak digunakan untuk mengamankan komunikasi melalui internet seperti pada layanan email dan web. Dengan mengimplementasikan protokol TLS pada sebuah aplikasi Vo...

  16. Impact of artefact removal on ChIP quality metrics in ChIP-seq and ChIP-exo data.

    Directory of Open Access Journals (Sweden)

    Thomas Samuel Carroll

    2014-04-01

    Full Text Available With the advent of ChIP-seq multiplexing technologies and the subsequent increase in ChIP-seq throughput, the development of working standards for the quality assessment of ChIP-seq studies has received significant attention. The ENCODE consortium’s large scale analysis of transcription factor binding and epigenetic marks as well as concordant work on ChIP-seq by other laboratories has established a new generation of ChIP-seq quality control measures. The use of these metrics alongside common processing steps has however not been evaluated. In this study, we investigate the effects of blacklisting and removal of duplicated reads on established metrics of ChIP-seq quality and show that the interpretation of these metrics is highly dependent on the ChIP-seq preprocessing steps applied. Further to this we perform the first investigation of the use of these metrics for ChIP-exo data and make recommendations for the adaptation of the NSC statistic to allow for the assessment of ChIP-exo efficiency.

  17. Capturing value from Intellectual Property (IP) in a global environment

    DEFF Research Database (Denmark)

    Alcácer, Juan; Beukel, Karin; Cassiman, Bruno

    2017-01-01

    Globalization should provide firms with an opportunity to leverage their know-how and reputation across countries to create value. However, it remains challenging for them to actually capture that value using traditional Intellectual Property (IP) tools. In this paper, we document the strong growth...... in patents, trademarks, and industrial designs used by firms to protect their IP globally. We then show that IP protection remains fragmented; the quality of IP applications might be questionable; and developing a comprehensive IP footprint worldwide is very costly. Growing numbers of applications...

  18. Development of a Photovoltaic Array Emulator System in Real Time Considering Climatic Conditions Variations

    Directory of Open Access Journals (Sweden)

    Camilo E. Ardila-Franco

    2013-11-01

    Full Text Available This paper presents the development of an emulator that has the ability to replicate, in real time, the behavior of photovoltaic panels (PV arrays considering different conditions of irradiation and temperature for each one. The emulator consists of a data acquisition card, a programmable source and a computer. It is based on the bypass diode model that provides a better approximation to real operating conditions. The solution is computed by a simplified equation that uses the Lambert W function, which reduces the computation time. After that, it generates a solution table of values of current as a function of voltage on terminals, temperature and irradiation. Real-time emulation is performed by means of a search algorithm in the solutions table of the closest value to the voltage imposed on the terminals.

  19. High-emulation mask recognition with high-resolution hyperspectral video capture system

    Science.gov (United States)

    Feng, Jiao; Fang, Xiaojing; Li, Shoufeng; Wang, Yongjin

    2014-11-01

    We present a method for distinguishing human face from high-emulation mask, which is increasingly used by criminals for activities such as stealing card numbers and passwords on ATM. Traditional facial recognition technique is difficult to detect such camouflaged criminals. In this paper, we use the high-resolution hyperspectral video capture system to detect high-emulation mask. A RGB camera is used for traditional facial recognition. A prism and a gray scale camera are used to capture spectral information of the observed face. Experiments show that mask made of silica gel has different spectral reflectance compared with the human skin. As multispectral image offers additional spectral information about physical characteristics, high-emulation mask can be easily recognized.

  20. Modeling, Analysis and Control of Different DC-DC Converter Topologies for Photo Voltaic Emulator

    Directory of Open Access Journals (Sweden)

    Mohammad Tauquir Iqbal

    2016-05-01

    Full Text Available This paper presents the modeling, analysis and control of different DC-DC converter topologies to emulate the photovoltaic (PV system. A PV emulator is basically a DC-DC converter having same electrical characteristics that of solar PV panel.  The emulator helps to achieve real characteristics of PV system in a better way in an environment where using actual PV systems can produce inconsistent results due to variation in weather conditions. The paper describes different types of DC-DC converters like buck, Resonant and Quasi Resonant Converter. The complete system is modelled in MATLAB® Simulink SimPowerSystem software package. The Simulation results obtained from the MATLAB® Simulink SimPowerSystem software package for different topologies under steady and dynamic conditions are analyzed and presented. An evaluation table is also presented at the end of the paper, presenting the effectiveness of each topology.

  1. Validation of FORTRAN emulators for the G2 varian control programs

    International Nuclear Information System (INIS)

    Delorme, G.

    1996-01-01

    The extensive use of the Gentilly full scope simulator for training and verification of plant procedures, forced the development of a reliable desktop simulator for software maintenance purposes. For that we needed emulators for the control programs which run on the DCC Varian computers in the full scope simulator. This paper presents the validation results for the Reactor Regulating System (RRS) program. This emulator was programmed in a modular fashion providing ease of maintenance and of transportation to another environment. The results obtained with specific tests or with integrated testing involving complex control rule interactions, compared favorably with the ones obtained using the actual plant control programs running on the full scope simulator, which constitutes an irrefutable validation procedure. This RRS package along with the other emulators being validated In this manner could be used in safety codes with confidence. (author)

  2. Performance Guaranteed Inertia Emulation forDiesel-Wind System Feed Microgrid via ModelReference Control

    Energy Technology Data Exchange (ETDEWEB)

    Melin, Alexander M. [ORNL; Zhang, Yichen [University of Tennessee, Knoxville (UTK), Department of Electrical Engineering and Computer Science; Djouadi, Seddik [University of Tennessee, Knoxville (UTK), Department of Electrical Engineering and Computer Science; Olama, Mohammed M. [ORNL

    2017-04-01

    In this paper, a model reference control based inertia emulation strategy is proposed. Desired inertia can be precisely emulated through this control strategy so that guaranteed performance is ensured. A typical frequency response model with parametrical inertia is set to be the reference model. A measurement at a specific location delivers the information of disturbance acting on the diesel-wind system to the referencemodel. The objective is for the speed of the diesel-wind system to track the reference model. Since active power variation is dominantly governed by mechanical dynamics and modes, only mechanical dynamics and states, i.e., a swing-engine-governor system plus a reduced-order wind turbine generator, are involved in the feedback control design. The controller is implemented in a three-phase diesel-wind system feed microgrid. The results show exact synthetic inertia is emulated, leading to guaranteed performance and safety bounds.

  3. Copy of Using Emulation and Simulation to Understand the Large-Scale Behavior of the Internet.

    Energy Technology Data Exchange (ETDEWEB)

    Adalsteinsson, Helgi; Armstrong, Robert C.; Chiang, Ken; Gentile, Ann C.; Lloyd, Levi; Minnich, Ronald G.; Vanderveen, Keith; Van Randwyk, Jamie A; Rudish, Don W.

    2008-10-01

    We report on the work done in the late-start LDRDUsing Emulation and Simulation toUnderstand the Large-Scale Behavior of the Internet. We describe the creation of a researchplatform that emulates many thousands of machines to be used for the study of large-scale inter-net behavior. We describe a proof-of-concept simple attack we performed in this environment.We describe the successful capture of a Storm bot and, from the study of the bot and furtherliterature search, establish large-scale aspects we seek to understand via emulation of Storm onour research platform in possible follow-on work. Finally, we discuss possible future work.3

  4. Qualification of Type IP-2, Type IP-3 and Type A packages for radioactive liquid shipments

    International Nuclear Information System (INIS)

    Marcu, L.; Sullivan, G.; Lo, K.K.

    2006-01-01

    Commercial products such as pails, drums or bulk containers can be used for radioactive materials transportation if they can be shown to meet the regulatory requirements. Ontario Power Generation (OPG) has successfully tested and qualified several off-the-shelf containers as Type IP-2, Type IP-3 and Type A packages for liquids in accordance with the International and Canadian Regulations. This paper describes the testing and qualification of these commercial products, and discusses the problems encountered and lessons learned during this process. (author)

  5. Applied Multiprotocol Routing in IP Telephony

    Directory of Open Access Journals (Sweden)

    Miroslav Voznak

    2010-01-01

    Full Text Available The aim of the project was to create a multi-protocol system using SIP, H.323 and MGCP standards, which would ensure routing to various types of VoIP networks. The priority was to provide multi-protocol support to SIP and H.323 signalling and the support of the routing using the ENUM standard which has recently passed from the trial phase into full operation in the Czech Republic. The document describes the system's architecture and the components used. It also briefly describes ENUM.

  6. Dynamic emulation modelling for the optimal operation of water systems: an overview

    Science.gov (United States)

    Castelletti, A.; Galelli, S.; Giuliani, M.

    2014-12-01

    Despite sustained increase in computing power over recent decades, computational limitations remain a major barrier to the effective and systematic use of large-scale, process-based simulation models in rational environmental decision-making. Whereas complex models may provide clear advantages when the goal of the modelling exercise is to enhance our understanding of the natural processes, they introduce problems of model identifiability caused by over-parameterization and suffer from high computational burden when used in management and planning problems. As a result, increasing attention is now being devoted to emulation modelling (or model reduction) as a way of overcoming these limitations. An emulation model, or emulator, is a low-order approximation of the process-based model that can be substituted for it in order to solve high resource-demanding problems. In this talk, an overview of emulation modelling within the context of the optimal operation of water systems will be provided. Particular emphasis will be given to Dynamic Emulation Modelling (DEMo), a special type of model complexity reduction in which the dynamic nature of the original process-based model is preserved, with consequent advantages in a wide range of problems, particularly feedback control problems. This will be contrasted with traditional non-dynamic emulators (e.g. response surface and surrogate models) that have been studied extensively in recent years and are mainly used for planning purposes. A number of real world numerical experiences will be used to support the discussion ranging from multi-outlet water quality control in water reservoir through erosion/sedimentation rebalancing in the operation of run-off-river power plants to salinity control in lake and reservoirs.

  7. Continuous-variable quantum authentication of physical unclonable keys: Security against an emulation attack

    Science.gov (United States)

    Nikolopoulos, Georgios M.

    2018-01-01

    We consider a recently proposed entity authentication protocol in which a physical unclonable key is interrogated by random coherent states of light, and the quadratures of the scattered light are analyzed by means of a coarse-grained homodyne detection. We derive a sufficient condition for the protocol to be secure against an emulation attack in which an adversary knows the challenge-response properties of the key and moreover, he can access the challenges during the verification. The security analysis relies on Holevo's bound and Fano's inequality, and suggests that the protocol is secure against the emulation attack for a broad range of physical parameters that are within reach of today's technology.

  8. Emulation of simulations of atmospheric dispersion at Fukushima for Sobol' sensitivity analysis

    Science.gov (United States)

    Girard, Sylvain; Korsakissok, Irène; Mallet, Vivien

    2015-04-01

    Polyphemus/Polair3D, from which derives IRSN's operational model ldX, was used to simulate the atmospheric dispersion at the Japan scale of radionuclides after the Fukushima disaster. A previous study with the screening method of Morris had shown that - The sensitivities depend a lot on the considered output; - Only a few of the inputs are non-influential on all considered outputs; - Most influential inputs have either non-linear effects or are interacting. These preliminary results called for a more detailed sensitivity analysis, especially regarding the characterization of interactions. The method of Sobol' allows for a precise evaluation of interactions but requires large simulation samples. Gaussian process emulators for each considered outputs were built in order to relieve this computational burden. Globally aggregated outputs proved to be easy to emulate with high accuracy, and associated Sobol' indices are in broad agreement with previous results obtained with the Morris method. More localized outputs, such as temporal averages of gamma dose rates at measurement stations, resulted in lesser emulator performances: tests simulations could not satisfactorily be reproduced by some emulators. These outputs are of special interest because they can be compared to available observations, for instance for calibration purpose. A thorough inspection of prediction residuals hinted that the model response to wind perturbations often behaved in very distinct regimes relatively to some thresholds. Complementing the initial sample with wind perturbations set to the extreme values allowed for sensible improvement of some of the emulators while other remained too unreliable to be used in a sensitivity analysis. Adaptive sampling or regime-wise emulation could be tried to circumvent this issue. Sobol' indices for local outputs revealed interesting patterns, mostly dominated by the winds, with very high interactions. The emulators will be useful for subsequent studies. Indeed

  9. A Smart Home Development Tool combining Simulation, Emulation and Real-World IoT

    DEFF Research Database (Denmark)

    Lynggaard, Per

    Intelligent smart homes will offer context-aware, personalized and adaptive services to users. These services range from simple remote control to fully automated / autonomous actions based on user context and adaptive behaviour. However, in science it is difficult to study smart homes...... and their embedded smart objects, because laboratory environments are costly and time consuming to create. This paper proposes a simulator with built-in emulator capabilities. It integrates smart home simulation and emulation capabilities into one device. In this way, smart home implementation models exist either...

  10. Parallel factor ChIP provides essential internal control for quantitative differential ChIP-seq.

    Science.gov (United States)

    Guertin, Michael J; Cullen, Amy E; Markowetz, Florian; Holding, Andrew N

    2018-04-17

    A key challenge in quantitative ChIP combined with high-throughput sequencing (ChIP-seq) is the normalization of data in the presence of genome-wide changes in occupancy. Analysis-based normalization methods were developed for transcriptomic data and these are dependent on the underlying assumption that total transcription does not change between conditions. For genome-wide changes in transcription factor (TF) binding, these assumptions do not hold true. The challenges in normalization are confounded by experimental variability during sample preparation, processing and recovery. We present a novel normalization strategy utilizing an internal standard of unchanged peaks for reference. Our method can be readily applied to monitor genome-wide changes by ChIP-seq that are otherwise lost or misrepresented through analytical normalization. We compare our approach to normalization by total read depth and two alternative methods that utilize external experimental controls to study TF binding. We successfully resolve the key challenges in quantitative ChIP-seq analysis and demonstrate its application by monitoring the loss of Estrogen Receptor-alpha (ER) binding upon fulvestrant treatment, ER binding in response to estrodiol, ER mediated change in H4K12 acetylation and profiling ER binding in patient-derived xenographs. This is supported by an adaptable pipeline to normalize and quantify differential TF binding genome-wide and generate metrics for differential binding at individual sites.

  11. In vitro synthesis and purification of PhIP-deoxyguanosine and PhIP-DNA oligomer covalent complexes

    Energy Technology Data Exchange (ETDEWEB)

    Freeman, J.

    1994-12-01

    2-Amino-1-methyl-6-phenylimidazo[4,5-b]pyridine (PhIP) is a heterocyclic amine compound formed when meats are cooked at high temperatures. PhIP damages DNA by forming covalent complexes with DNA carcinogen. In an effort to understand how the binding of PhIP to DNA may cause cancer, it is important to characterize the structures of PhIP-damaged DNA molecules. Our HPLC data support fluorescence and {sup 32}P Post-labeling studies which indicate the formation of several species of 2{prime}deoxyguanosine-(dG) or oligodeoxynucleotide-PhIP adducts. The reaction of PhIP with dG resulted in a reddish precipitate that was likely the major adduct, N-(deoxyguanosin-8-yl)-PhIP (dG-C8-PhIP) adduct, with a more polar adduct fraction remaining in the supernatant. Reversed-phase HPLC analysis of the adducts in the supernatant revealed the existence of species of much shorter retention times than the dG-C8-PhIP adduct, confirming that these species are more polar than dG-C8-PhIP. At least four adducts were formed in the reaction of PhIP with DNA oligomer. HPLC analysis of the PhIP-DNA oligomer supernatant after butanol extractions revealed four unresolved peaks which spectra had maximum wavelengths between 340 and 360 nm. Though adduct peaks were not completely resolved, there was {approximately}3 minutes interval between the DNA oligomer peak and the adduct peaks. Furthermore, fluorescence emission data of the DNA oligomer-PhIP adduct solution show heterogeneous binding. The more polar PhIP adducts were fraction-collected and their structures will be solved by nuclear magnetic resonance or x-ray crystallography.

  12. Chromatin immunoprecipitation (ChIP) of plant transcription factors followed by sequencing (ChIP-SEQ) or hybridization to whole genome arrays (ChIP-CHIP)

    NARCIS (Netherlands)

    Kaufmann, K.; Muiño, J.M.; Østerås, M.; Farinelli, L.; Krajewski, P.; Angenent, G.C.

    2010-01-01

    Chromatin immunoprecipitation (ChIP) is a powerful technique to study interactions between transcription factors (TFs) and DNA in vivo. For genome-wide de novo discovery of TF-binding sites, the DNA that is obtained in ChIP experiments needs to be processed for sequence identification. The sequences

  13. Research of future network with multi-layer IP address

    Science.gov (United States)

    Li, Guoling; Long, Zhaohua; Wei, Ziqiang

    2018-04-01

    The shortage of IP addresses and the scalability of routing systems [1] are challenges for the Internet. The idea of dividing existing IP addresses between identities and locations is one of the important research directions. This paper proposed a new decimal network architecture based on IPv9 [11], and decimal network IP address from E.164 principle of traditional telecommunication network, the IP address level, which helps to achieve separation and identification and location of IP address, IP address form a multilayer network structure, routing scalability problem in remission at the same time, to solve the problem of IPv4 address depletion. On the basis of IPv9, a new decimal network architecture is proposed, and the IP address of the decimal network draws on the E.164 principle of the traditional telecommunication network, and the IP addresses are hierarchically divided, which helps to realize the identification and location separation of IP addresses, the formation of multi-layer IP address network structure, while easing the scalability of the routing system to find a way out of IPv4 address exhausted. In addition to modifying DNS [10] simply and adding the function of digital domain, a DDNS [12] is formed. At the same time, a gateway device is added, that is, IPV9 gateway. The original backbone network and user network are unchanged.

  14. Effectiveness of a fading emulator in evaluating the performance of MIMO systems by comparison with a propagation test

    DEFF Research Database (Denmark)

    Yamamoto, Atsushi; Sakata, T.; Hayashi, T.

    2010-01-01

    This paper presents a MIMO spatial fading emulator, used to represent a street microcell environment. The fading emulator can reproduce a multipath radio propagation environment with either a uniform or non-uniform angular power spectrum (APS) in the horizontal plane. In this paper, we used...

  15. A physics informed emulator for laser-driven radiating shock simulations

    KAUST Repository

    McClarren, Ryan G.; Ryu, D.; Paul Drake, R.; Grosskopf, Michael; Bingham, Derek; Chou, Chuan-Chih; Fryxell, Bruce; van der Holst, Bart; Paul Holloway, James; Kuranz, Carolyn C.; Mallick, Bani; Rutter, Erica; Torralva, Ben R.

    2011-01-01

    This work discusses the uncertainty quantification aspect of quantification of margin and uncertainty (QMU) in the context of two linked computer codes. Specifically, we present a physics based reduction technique to deal with functional data from the first code and then develop an emulator for this reduced data. Our particular application deals with conditions created by laser deposition in a radiating shock experiment modeled using the Lagrangian, radiation-hydrodynamics code Hyades. Our goal is to construct an emulator and perform a sensitivity analysis of the functional output from Hyades to be used as an initial condition for a three-dimensional code that will compute the evolution of the radiating shock at later times. Initial attempts at purely statistical data reduction techniques, were not successful at reducing the number of parameters required to describe the Hyades output. We decided on an alternate approach using physical arguments to decide what features/locations of the output were relevant (e.g., the location of the shock front or the location of the maximum pressure) and then used a piecewise linear fit between these locations. This reduced the number of outputs needed from the emulator to 40, down from the O(1000) points in the Hyades output. Then, using Bayesian MARS and Gaussian process regression, we were able to build emulators for Hyades and study sensitivities to input parameters. © 2011 Elsevier Ltd. All rights reserved.

  16. Study on FPGA-Based Emulator for the Diagnosis of Gradual Degradation in Reciprocating Pump

    Energy Technology Data Exchange (ETDEWEB)

    Lim, Sang Sun; Kim, Wooshik [Sejong Univ., Seoul (Korea, Republic of); Kim, Tae Yun; Chai, Jang Bom [Ajou Univ., Suwon (Korea, Republic of)

    2017-01-15

    The purpose of this study is to develop a method for diagnosing the degree of gradual degradation of a reciprocating pump caused by continuous use as a water supply pump in a nuclear power plant. Normally, the progress of such degradation is too slow to be noticed. Hence, it is difficult to determine the degree of degradation using the existing diagnostic methods. In this paper, we propose a new method by which the normal state and the degraded state of the pump can be differentiated, so that the degree of degradation can be identified. First, an emulator was developed using FPGA by providing the parameters of the pump under normal state, so that the emulator generates the information of the pump in the healthy state. Then, by comparing this information with the parameters received from various output sensors of the emulator during the current state, it is possible to identify and measure the degree of gradual degradation. This paper presents some of the results obtained during the development process, and results that show how the emulator operates, by comparing the data collected from an actual pump.

  17. Eudaemon : Involuntary and on-demand emulation against zero-day exploits

    NARCIS (Netherlands)

    Portokalidis, Georgios; Bos, Herbert

    2008-01-01

    Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and prevention. Eudaemon is able to attach to any running process, and redirect execution to a user-space emulator that will

  18. Multi-level emulation of complex climate model responses to boundary forcing data

    Science.gov (United States)

    Tran, Giang T.; Oliver, Kevin I. C.; Holden, Philip B.; Edwards, Neil R.; Sóbester, András; Challenor, Peter

    2018-04-01

    Climate model components involve both high-dimensional input and output fields. It is desirable to efficiently generate spatio-temporal outputs of these models for applications in integrated assessment modelling or to assess the statistical relationship between such sets of inputs and outputs, for example, uncertainty analysis. However, the need for efficiency often compromises the fidelity of output through the use of low complexity models. Here, we develop a technique which combines statistical emulation with a dimensionality reduction technique to emulate a wide range of outputs from an atmospheric general circulation model, PLASIM, as functions of the boundary forcing prescribed by the ocean component of a lower complexity climate model, GENIE-1. Although accurate and detailed spatial information on atmospheric variables such as precipitation and wind speed is well beyond the capability of GENIE-1's energy-moisture balance model of the atmosphere, this study demonstrates that the output of this model is useful in predicting PLASIM's spatio-temporal fields through multi-level emulation. Meaningful information from the fast model, GENIE-1 was extracted by utilising the correlation between variables of the same type in the two models and between variables of different types in PLASIM. We present here the construction and validation of several PLASIM variable emulators and discuss their potential use in developing a hybrid model with statistical components.

  19. Feasibility and reliability of using an exoskeleton to emulate muscle contractures during walking.

    Science.gov (United States)

    Attias, M; Bonnefoy-Mazure, A; De Coulon, G; Cheze, L; Armand, S

    2016-10-01

    Contracture is a permanent shortening of the muscle-tendon-ligament complex that limits joint mobility. Contracture is involved in many diseases (cerebral palsy, stroke, etc.) and can impair walking and other activities of daily living. The purpose of this study was to quantify the reliability of an exoskeleton designed to emulate lower limb muscle contractures unilaterally and bilaterally during walking. An exoskeleton was built according to the following design criteria: adjustable to different morphologies; respect of the principal lines of muscular actions; placement of reflective markers on anatomical landmarks; and the ability to replicate the contractures of eight muscles of the lower limb unilaterally and bilaterally (psoas, rectus femoris, hamstring, hip adductors, gastrocnemius, soleus, tibialis posterior, and peroneus). Sixteen combinations of contractures were emulated on the unilateral and bilateral muscles of nine healthy participants. Two sessions of gait analysis were performed at weekly intervals to assess the reliability of the emulated contractures. Discrete variables were extracted from the kinematics to analyse the reliability. The exoskeleton did not affect normal walking when contractures were not emulated. Kinematic reliability varied from poor to excellent depending on the targeted muscle. Reliability was good for the bilateral and unilateral gastrocnemius, soleus, and tibialis posterior as well as the bilateral hamstring and unilateral hip adductors. The exoskeleton can be used to replicate contracture on healthy participants. The exoskeleton will allow us to differentiate primary and compensatory effects of muscle contractures on gait kinematics. Copyright © 2016 Elsevier B.V. All rights reserved.

  20. Performance emulation and parameter estimation for nonlinear fibre-optic links

    DEFF Research Database (Denmark)

    Piels, Molly; Porto da Silva, Edson; Zibar, Darko

    2016-01-01

    Fibre-optic communication systems, especially when operating in the nonlinear regime, generally do not perform exactly as theory would predict. A number of methods for data-based evaluation of nonlinear fibre-optic link parameters, both for accurate performance emulation and optimization...

  1. Emulation, imitation, over-imitation and the scope of culture for child and chimpanzee.

    Science.gov (United States)

    Whiten, Andrew; McGuigan, Nicola; Marshall-Pescini, Sarah; Hopper, Lydia M

    2009-08-27

    We describe our recent studies of imitation and cultural transmission in chimpanzees and children, which question late twentieth-century characterizations of children as imitators, but chimpanzees as emulators. As emulation entails learning only about the results of others' actions, it has been thought to curtail any capacity to sustain cultures. Recent chimpanzee diffusion experiments have by contrast documented a significant capacity for copying local behavioural traditions. Additionally, in recent 'ghost' experiments with no model visible, chimpanzees failed to replicate the object movements on which emulation is supposed to focus. We conclude that chimpanzees rely more on imitation and have greater cultural capacities than previously acknowledged. However, we also find that they selectively apply a range of social learning processes that include emulation. Recent studies demonstrating surprisingly unselective 'over-imitation' in children suggest that children's propensity to imitate has been underestimated too. We discuss the implications of these developments for the nature of social learning and culture in the two species. Finally, our new experiments directly address cumulative cultural learning. Initial results demonstrate a relative conservatism and conformity in chimpanzees' learning, contrasting with cumulative cultural learning in young children. This difference may contribute much to the contrast in these species' capacities for cultural evolution.

  2. A generic inertia emulation controller for multi-terminal VSC-HVDC systems

    DEFF Research Database (Denmark)

    Zhu, Jiebei; Guerrero, Josep M.; Booth, Campbell

    2013-01-01

    A generic Inertia Emulation Controller (INEC) for Multi-Terminal Voltage-source-converter based HVDC (VSC-MTDC) is proposed in this paper. The proposed INEC can be incorporated in any grid-side-voltage-source-converter (GVSC) station, allowing the MTDC terminal to contribute an inertial response...

  3. Application of associative emulator neural network for power control of nuclear reactor

    International Nuclear Information System (INIS)

    Datta, A.K.; Bandyopadhyay, Somnath

    1993-01-01

    This paper addresses the question of how to perform on-line training of emulator neural network for power control in a nuclear reactor. The computation and convergence problem can be reduced by judicious choice of bidirectional associative recall. (author). 10 refs., 2 figs

  4. A physics informed emulator for laser-driven radiating shock simulations

    KAUST Repository

    McClarren, Ryan G.

    2011-09-01

    This work discusses the uncertainty quantification aspect of quantification of margin and uncertainty (QMU) in the context of two linked computer codes. Specifically, we present a physics based reduction technique to deal with functional data from the first code and then develop an emulator for this reduced data. Our particular application deals with conditions created by laser deposition in a radiating shock experiment modeled using the Lagrangian, radiation-hydrodynamics code Hyades. Our goal is to construct an emulator and perform a sensitivity analysis of the functional output from Hyades to be used as an initial condition for a three-dimensional code that will compute the evolution of the radiating shock at later times. Initial attempts at purely statistical data reduction techniques, were not successful at reducing the number of parameters required to describe the Hyades output. We decided on an alternate approach using physical arguments to decide what features/locations of the output were relevant (e.g., the location of the shock front or the location of the maximum pressure) and then used a piecewise linear fit between these locations. This reduced the number of outputs needed from the emulator to 40, down from the O(1000) points in the Hyades output. Then, using Bayesian MARS and Gaussian process regression, we were able to build emulators for Hyades and study sensitivities to input parameters. © 2011 Elsevier Ltd. All rights reserved.

  5. User authentication based on the NFC host-card-emulation technology

    Science.gov (United States)

    Kološ, Jan; Kotyrba, Martin

    2017-11-01

    This paper deals with implementation of algorithms for data exchange between mobile devices supporting NFC HCE (Host-Card-Emulation) and a contactless NFC reader communicating in a read/write mode. This solution provides multiplatform architecture for data exchange between devices with a focus on safe and simple user authentication.

  6. Integration of drinking water treatment plant process models and emulated process automation software

    NARCIS (Netherlands)

    Worm, G.I.M.

    2012-01-01

    The objective of this research is to limit the risks of fully automated operation of drinking water treatment plants and to improve their operation by using an integrated system of process models and emulated process automation software. This thesis contains the design of such an integrated system.

  7. Real Time Emulation of Dynamic Tariff for Congestion Management in Distribution Networks

    DEFF Research Database (Denmark)

    Rasmussen, Theis Bo; Wu, Qiuwei; Huang, Shaojun

    2016-01-01

    This paper presents the real time evaluation of the dynamic tariff (DT) method for alleviating congestion in a distribution networks with high penetration of distributed energy resources (DERs). The DT method is implemented in a real time digital testing platform that emulates a real distribution...

  8. Experimental demonstration of an improved EPON architecture using OFDMA for bandwidth scalable LAN emulation

    DEFF Research Database (Denmark)

    Deng, Lei; Zhao, Ying; Yu, Xianbin

    2011-01-01

    We propose and demonstrate an improved Ethernet passive optical network (EPON) architecture supporting bandwidth-scalable physical layer local area network (LAN) emulation. Due to the use of orthogonal frequency division multiple access (OFDMA) technology for the LAN traffic transmission, there i...

  9. IPS Empress: a standard of excellence.

    Science.gov (United States)

    Hornbrook, D S; Roberts, M

    1998-01-01

    For 10 years, clinicians have been able to provide patients with a proven aesthetic and functional restoration that exhibits wear-compatibility, durability, and marginal integrity. This leucite-reinforced, pressed ceramic (IPS Empress, Ivoclar Williams, Amherst, NY) presents to patients and dentists the option of a metal-free alternative which retains the functional advantages of a porcelain-fused-to-metal restoration. This article illustrates the importance of sound laboratory communication in the utilization of this restorative material, focusing upon three aspects: midline and incisal edge inclination, elimination of open gingival embrasures, and incisal edge translucency. Techniques are also presented in order to efficiently communicate details of each case presented to the laboratory.

  10. Telemetry and Communication IP Video Player

    Science.gov (United States)

    OFarrell, Zachary L.

    2011-01-01

    Aegis Video Player is the name of the video over IP system for the Telemetry and Communications group of the Launch Services Program. Aegis' purpose is to display video streamed over a network connection to be viewed during launches. To accomplish this task, a VLC ActiveX plug-in was used in C# to provide the basic capabilities of video streaming. The program was then customized to be used during launches. The VLC plug-in can be configured programmatically to display a single stream, but for this project multiple streams needed to be accessed. To accomplish this, an easy to use, informative menu system was added to the program to enable users to quickly switch between videos. Other features were added to make the player more useful, such as watching multiple videos and watching a video in full screen.

  11. Machinability of IPS Empress 2 framework ceramic.

    Science.gov (United States)

    Schmidt, C; Weigl, P

    2000-01-01

    Using ceramic materials for an automatic production of ceramic dentures by CAD/CAM is a challenge, because many technological, medical, and optical demands must be considered. The IPS Empress 2 framework ceramic meets most of them. This study shows the possibilities for machining this ceramic with economical parameters. The long life-time requirement for ceramic dentures requires a ductile machined surface to avoid the well-known subsurface damages of brittle materials caused by machining. Slow and rapid damage propagation begins at break outs and cracks, and limits life-time significantly. Therefore, ductile machined surfaces are an important demand for machine dental ceramics. The machining tests were performed with various parameters such as tool grain size and feed speed. Denture ceramics were machined by jig grinding on a 5-axis CNC milling machine (Maho HGF 500) with a high-speed spindle up to 120,000 rpm. The results of the wear test indicate low tool wear. With one tool, you can machine eight occlusal surfaces including roughing and finishing. One occlusal surface takes about 60 min machining time. Recommended parameters for roughing are middle diamond grain size (D107), cutting speed v(c) = 4.7 m/s, feed speed v(ft) = 1000 mm/min, depth of cut a(e) = 0.06 mm, width of contact a(p) = 0.8 mm, and for finishing ultra fine diamond grain size (D46), cutting speed v(c) = 4.7 m/s, feed speed v(ft) = 100 mm/min, depth of cut a(e) = 0.02 mm, width of contact a(p) = 0.8 mm. The results of the machining tests give a reference for using IPS Empress(R) 2 framework ceramic in CAD/CAM systems. Copyright 2000 John Wiley & Sons, Inc.

  12. A calibration and data assimilation method using the Bayesian MARS emulator

    International Nuclear Information System (INIS)

    Stripling, H.F.; McClarren, R.G.; Kuranz, C.C.; Grosskopf, M.J.; Rutter, E.; Torralva, B.R.

    2013-01-01

    Highlights: ► We outline a transparent, flexible method for the calibration of uncertain inputs to computer models. ► We account for model, data, emulator, and measurement uncertainties. ► The method produces improved predictive results, which are validated using leave one-out experiments. ► Our implementation leverages the Bayesian MARS emulator, but any emulator may be substituted. -- Abstract: We present a method for calibrating the uncertain inputs to a computer model using available experimental data. The goal of the procedure is to estimate the posterior distribution of the uncertain inputs such that when samples from the posterior are used as inputs to future model runs, the model is more likely to replicate (or predict) the experimental response. The calibration is performed by sampling the space of the uncertain inputs, using the computer model (or, more likely, an emulator for the computer model) to assign weights to the samples, and applying the weights to produce the posterior distributions and generate predictions of new experiments with confidence bounds. The method is similar to Metropolis–Hastings calibration methods with independently sampled updates, except that we generate samples beforehand and replace the candidate acceptance routine with a weighting scheme. We apply our method to the calibration of a Hyades 2D model of laser energy deposition in beryllium. We employ a Bayesian Multivariate Adaptive Regression Splines (BMARS) emulator as a surrogate for Hyades 2D. We treat a range of uncertainties in our application, including uncertainties in the experimental inputs, experimental measurement error, and systematic experimental timing errors. The resulting posterior distributions agree with our existing intuition, and we validate the results by performing a series of leave-one-out predictions. We find that the calibrated predictions are considerably more accurate and less uncertain than blind sampling of the forward model alone.

  13. Evidence for emulation in chimpanzees in social settings using the floating peanut task.

    Directory of Open Access Journals (Sweden)

    Claudio Tennie

    Full Text Available BACKGROUND: It is still unclear which observational learning mechanisms underlie the transmission of difficult problem-solving skills in chimpanzees. In particular, two different mechanisms have been proposed: imitation and emulation. Previous studies have largely failed to control for social factors when these mechanisms were targeted. METHODS: In an attempt to resolve the existing discrepancies, we adopted the 'floating peanut task', in which subjects need to spit water into a tube until it is sufficiently full for floating peanuts to be grasped. In a previous study only a few chimpanzees were able to invent the necessary solution (and they either did so in their first trials or never. Here we compared success levels in baseline tests with two experimental conditions that followed: 1 A full model condition to test whether social demonstrations would be effective, and 2 A social emulation control condition, in which a human experimenter poured water from a bottle into the tube, to test whether results information alone (present in both experimental conditions would also induce successes. Crucially, we controlled for social factors in both experimental conditions. Both types of demonstrations significantly increased successful spitting, with no differences between demonstration types. We also found that younger subjects were more likely to succeed than older ones. Our analysis showed that mere order effects could not explain our results. CONCLUSION: The full demonstration condition (which potentially offers additional information to observers, in the form of actions, induced no more successes than the emulation condition. Hence, emulation learning could explain the success in both conditions. This finding has broad implications for the interpretation of chimpanzee traditions, for which emulation learning may perhaps suffice.

  14. An Emulator Toolbox to Approximate Radiative Transfer Models with Statistical Learning

    Directory of Open Access Journals (Sweden)

    Juan Pablo Rivera

    2015-07-01

    Full Text Available Physically-based radiative transfer models (RTMs help in understanding the processes occurring on the Earth’s surface and their interactions with vegetation and atmosphere. When it comes to studying vegetation properties, RTMs allows us to study light interception by plant canopies and are used in the retrieval of biophysical variables through model inversion. However, advanced RTMs can take a long computational time, which makes them unfeasible in many real applications. To overcome this problem, it has been proposed to substitute RTMs through so-called emulators. Emulators are statistical models that approximate the functioning of RTMs. Emulators are advantageous in real practice because of the computational efficiency and excellent accuracy and flexibility for extrapolation. We hereby present an “Emulator toolbox” that enables analysing multi-output machine learning regression algorithms (MO-MLRAs on their ability to approximate an RTM. The toolbox is included in the free-access ARTMO’s MATLAB suite for parameter retrieval and model inversion and currently contains both linear and non-linear MO-MLRAs, namely partial least squares regression (PLSR, kernel ridge regression (KRR and neural networks (NN. These MO-MLRAs have been evaluated on their precision and speed to approximate the soil vegetation atmosphere transfer model SCOPE (Soil Canopy Observation, Photochemistry and Energy balance. SCOPE generates, amongst others, sun-induced chlorophyll fluorescence as the output signal. KRR and NN were evaluated as capable of reconstructing fluorescence spectra with great precision. Relative errors fell below 0.5% when trained with 500 or more samples using cross-validation and principal component analysis to alleviate the underdetermination problem. Moreover, NN reconstructed fluorescence spectra about 50-times faster and KRR about 800-times faster than SCOPE. The Emulator toolbox is foreseen to open new opportunities in the use of advanced

  15. Mobile location services over the next generation IP core network

    DEFF Research Database (Denmark)

    Thongthammachart, Saowanee; Olesen, Henning

    2003-01-01

    network is changing from circuit-switched to packet-switched technology and evolving to an IP core network based on IPv6. The IP core network will allow all IP devices to be connected seamlessly. Due to the movement detection mechanism of Mobile IPv6, mobile terminals will periodically update....... The concept of mobile location services over the next generation IP networks is described. We also discuss the effectiveness of the short-range wireless network regarding a mobile user's position inside buildings and hotspot areas....

  16. How to Use FASTLANEs to Protect IP Networks

    National Research Council Canada - National Science Library

    Robson, Christopher L

    2006-01-01

    .... By using appropriate configuration and taking full advantage of new IP technologies and successful network encryption FASTLANE devices, interconnecting individual agency networks into a common...

  17. Voice over IP in the Local Exchange: A Case Study

    OpenAIRE

    Weiss, Martin B. H.; Kim, Hak-Ju

    2001-01-01

    There have been a small number of cost studies of Voice over IP (VoIP) in the academic literature. Generally, they have been for abstract networks, have not been focused on the public switched telephone network, or they have not included the operating costs. This paper presents the operating cost portion of our ongoing research project comparing circuit-switched and IP network costs for an existing local exchange carrier. We have found that (1) The operating cost differential between IP and c...

  18. Secure Protocol and IP Core for Configuration of Networking Hardware IPs in the Smart Grid

    Directory of Open Access Journals (Sweden)

    Marcelo Urbina

    2018-02-01

    Full Text Available Nowadays, the incorporation and constant evolution of communication networks in the electricity sector have given rise to the so-called Smart Grid, which is why it is necessary to have devices that are capable of managing new communication protocols, guaranteeing the strict requirements of processing required by the electricity sector. In this context, intelligent electronic devices (IEDs with network architectures are currently available to meet the communication, real-time processing and interoperability requirements of the Smart Grid. The new generation IEDs include an Field Programmable Gate Array (FPGA, to support specialized networking switching architectures for the electric sector, as the IEEE 1588-aware High-availability Seamless Redundancy/Parallel Redundancy Protocol (HSR/PRP. Another advantage to using an FPGA is the ability to update or reconfigure the design to support new requirements that are being raised to the standards (IEC 61850. The update of the architecture implemented in the FPGA can be done remotely, but it is necessary to establish a cyber security mechanism since the communication link generates vulnerability in the case the attacker gains physical access to the network. The research presented in this paper proposes a secure protocol and Intellectual Property (IP core for configuring and monitoring the networking IPs implemented in a Field Programmable Gate Array (FPGA. The FPGA based implementation proposed overcomes this issue using a light Layer-2 protocol fully implemented on hardware and protected by strong cryptographic algorithms (AES-GCM, defined in the IEC 61850-90-5 standard. The proposed secure protocol and IP core are applicable in any field where remote configuration over Ethernet is required for IP cores in FPGAs. In this paper, the proposal is validated in communications hardware for Smart Grids.

  19. Telefonía IP (ToIP): principios fundamentales, arquitectura y aspecto regulatorio en el Ecuador

    OpenAIRE

    Narváez García, William Fernando; Ugalde Peña, Pablo Esteban

    2006-01-01

    En este documento, hemos tratado de explicar el funcionamiento de la telefonía IP dentro de poco, comenzamos hablando con una introducción al tema al comentar sobre la actual tendencia a la conocida como patrón ALL-IP. Luego hemos visto conveniente hacer un comentario acerca de la evolución de las telecomunicaciones desde sus primeros pasos con Guillermo Marconi hasta nuestros días con la ToIP. De modo que existe un concepto claro de lo que la ToIP significa, en primer lugar se explica ...

  20. Protection against cancer by dietary IP6 and inositol.

    Science.gov (United States)

    Vucenik, Ivana; Shamsuddin, AbulKalam M

    2006-01-01

    Inositol hexaphosphate (IP(6)) is a naturally occurring polyphosphorylated carbohydrate, abundantly present in many plant sources and in certain high-fiber diets, such as cereals and legumes. In addition to being found in plants, IP(6) is contained in almost all mammalian cells, although in much smaller amounts, where it is important in regulating vital cellular functions such as signal transduction, cell proliferation, and differentiation. For a long time IP(6) has been recognized as a natural antioxidant. Recently IP(6) has received much attention for its role in cancer prevention and control of experimental tumor growth, progression, and metastasis. In addition, IP(6) possesses other significant benefits for human health, such as the ability to enhance immune system, prevent pathological calcification and kidney stone formation, lower elevated serum cholesterol, and reduce pathological platelet activity. In this review we show the efficacy and discuss some of the molecular mechanisms that govern the action of this dietary agent. Exogenously administered IP(6) is rapidly taken up into cells and dephosphorylated to lower inositol phosphates, which further affect signal transduction pathways resulting in cell cycle arrest. A striking anticancer action of IP(6) was demonstrated in different experimental models. In addition to reducing cell proliferation, IP(6) also induces differentiation of malignant cells. Enhanced immunity and antioxidant properties also contribute to tumor cell destruction. Preliminary studies in humans show that IP(6) and inositol, the precursor molecule of IP(6), appear to enhance the anticancer effect of conventional chemotherapy, control cancer metastases, and improve quality of life. Because it is abundantly present in regular diet, efficiently absorbed from the gastrointestinal tract, and safe, IP(6) + inositol holds great promise in our strategies for cancer prevention and therapy. There is clearly enough evidence to justify the

  1. PENGEMBANGAN PERANGKAT PEMBELAJARAN IPS DENGAN PENDEKATAN INQUIRY

    Directory of Open Access Journals (Sweden)

    Lisna Handayani

    2015-08-01

    Full Text Available Tujuan  penelitian adalah menghasilkan perangkat pembelajaran IPS dengan Pendekatan Inquiry. Penelitian pengembangan ini menggunakan langkah-langkah Borg and Gall yang terdiri dari tiga tahapan utama yaitu pendahuluan, pengembangan dan validasi. Data yang diperoleh adalah hasil belajar, aktivitas diskusi dan respon peserta didik. Data dianalisis menggunakan analisis deskriptif dan uji t. Penggunaan pendekatan inquiry sebagai salah satau strategi pembelajaran IPS dapat dilakukan dengan mempersiapkan terlebih dahulu perangkat pembelajarannya. Hasil pengembangan divalidasi oleh pakar, diujicobakan pada kelas terbatas dan selanjutnya dilakukan ujicoba pada kelas eksperimen yang dibandingkan hasilnya dengan kelas kontrol. Perangkat pembelajaran tergolong efektif untuk meningkatkan hasil belajar peserta didik di kelas VII SMP Negeri 2 Jepara, terbukti dari adanya peningkatan yang nyata terbukti dari hasil uji paired sampel t-test dengan nilai signifikansi 0,000 <0,05, dan terjadi peningkatan yang tinggi (gain > 0,7, serta hasil belajar yang dicapai berbeda secara signifikan dengan kelompok kontrol. Di samping hasil belajar, pembelajaran yang dilakukan juga berdampak pada proses belajar yang membawa tingginya aktivitas peserta didik dalam memberikan gagasan, kerjasama, inisiatif, keaktifan dan kedisiplinan. The purpose of this research is creating Social Lesson Material with Inquiry Approach.This developing of the research is used of  the steps of Borg and Gall. They are Introducing, developing and evaluating. Learning materials are developed and validity by expert. Datas are gooten by study result, discussion activity and students, respone. Analizing datas are used descriptive analize and t- try out. The use of inquiry approach as one of learning strategy on Social Lesson Material can be done by preparing those. The result of  developing are being validity by expert,  try out on limited group and experiment group ad compare with control group

  2. In Silico Pooling of ChIP-seq Control Experiments

    Science.gov (United States)

    Sun, Guannan; Srinivasan, Rajini; Lopez-Anido, Camila; Hung, Holly A.; Svaren, John; Keleş, Sündüz

    2014-01-01

    As next generation sequencing technologies are becoming more economical, large-scale ChIP-seq studies are enabling the investigation of the roles of transcription factor binding and epigenome on phenotypic variation. Studying such variation requires individual level ChIP-seq experiments. Standard designs for ChIP-seq experiments employ a paired control per ChIP-seq sample. Genomic coverage for control experiments is often sacrificed to increase the resources for ChIP samples. However, the quality of ChIP-enriched regions identifiable from a ChIP-seq experiment depends on the quality and the coverage of the control experiments. Insufficient coverage leads to loss of power in detecting enrichment. We investigate the effect of in silico pooling of control samples within multiple biological replicates, multiple treatment conditions, and multiple cell lines and tissues across multiple datasets with varying levels of genomic coverage. Our computational studies suggest guidelines for performing in silico pooling of control experiments. Using vast amounts of ENCODE data, we show that pairwise correlations between control samples originating from multiple biological replicates, treatments, and cell lines/tissues can be grouped into two classes representing whether or not in silico pooling leads to power gain in detecting enrichment between the ChIP and the control samples. Our findings have important implications for multiplexing samples. PMID:25380244

  3. An Attacker-Defender Model for IP-Based Networks

    National Research Council Canada - National Science Library

    Barkley, Timothy R

    2008-01-01

    .... Because IP flows are defined essentially in terms of origin-destination (O-D) pairs, we represent IP traffic engineering as a multi-commodity flow problem in which each O-D pair is treated as a separate commodity...

  4. IP-10 release assays in the diagnosis of tuberculosis infection

    DEFF Research Database (Denmark)

    Ruhwald, Morten; Aabye, Martine G; Ravn, Pernille

    2012-01-01

    The current state-of-the-art tests for infection with Mycobacterium tuberculosis - the IFN-γ release assays - rely on accurate measurement of the cytokine IFN-γ. Many other potential biomarkers are expressed in concert with IFN-γ, and IP-10 in particular has shown promising results. IP-10...

  5. VoIP under the EU regulatory framework : preventing foreclosure?

    NARCIS (Netherlands)

    Sadowski, B.M.; Straathof, B.

    2005-01-01

    In June 2004, the European Commission (EC) issued an "Information and Consultation Document" (European Commission 2004) that discussed how the Regulatory Framework of the European Union (EU) should be adapted to accommodate Voice over IP (VoIP) and invited relevant parties to comment on the

  6. Collaboration in Science and Innovation: IP Considerations

    International Nuclear Information System (INIS)

    Belenkaya, N.

    2016-01-01

    Full text: In today’s highly competitive market, organizations gain competitive advantage by collaborating on innovations. However, in general, before a successful partnership can start, organizations will have to negotiate ownership and access to the intellectual property produced as a result of the joint effort. While some collaborative projects are not created to pursue commercial gains, outputs of collaboration may have commercial application. Experience shows that the framework for the collaboration should be determined through an agreement that describes the project and the future ownership, management and exploitation of the intellectual property. The attractiveness of a collaborative project is increased if such framework can be negotiated timely. It is important that the partners agree on the allocation of ownership, transfer, and access to intellectual property before the project starts. This is done to reduce uncertainties and to protect the rights of the partners. Partners should agree not only on the owners of the future intellectual property but also on the ways for subsequent commercial exploitation of the results of the collaboration. A timely negotiated and successfully finalized framework for IP ownership and management plays a key role in protecting partner investments and ensuring the successful exploitation of the results of the collaboration. (author

  7. Novel Modified Elman Neural Network Control for PMSG System Based on Wind Turbine Emulator

    Directory of Open Access Journals (Sweden)

    Chih-Hong Lin

    2013-01-01

    Full Text Available The novel modified Elman neural network (NN controlled permanent magnet synchronous generator (PMSG system, which is directly driven by a permanent magnet synchronous motor (PMSM based on wind turbine emulator, is proposed to control output of rectifier (AC/DC power converter and inverter (DC/AC power converter in this study. First, a closed loop PMSM drive control based on wind turbine emulator is designed to generate power for the PMSG system according to different wind speeds. Then, the rotor speed of the PMSG, the voltage, and current of the power converter are detected simultaneously to yield better power output of the converter. Because the PMSG system is the nonlinear and time-varying system, two sets online trained modified Elman NN controllers are developed for the tracking controllers of DC bus power and AC power to improve output performance of rectifier and inverter. Finally, experimental results are verified to show the effectiveness of the proposed control scheme.

  8. Wireless Visual Sensor Network Robots- Based for the Emulation of Collective Behavior

    Directory of Open Access Journals (Sweden)

    Fredy Hernán Martinez Sarmiento

    2012-03-01

    Full Text Available We consider the problem of bacterial quorum sensing emulate on small mobile robots. Robots that reflect the behavior of bacteria are designed as mobile wireless camera nodes. They are able to structure a dynamic wireless sensor network. Emulated behavior corresponds to a simplification of bacterial quorum sensing, where the action of a network node is conditioned by the population density of robots(nodes in a given area. The population density reading is done visually using a camera. The robot makes an estimate of the population density of the images, and acts according to this information. The operation of the camera is done with a custom firmware, reducing the complexity of the node without loss of performance. It was noted the route planning and the collective behavior of robots without the use of any other external or local communication. Neither was it necessary to develop a model system, precise state estimation or state feedback.

  9. Statistical Emulation of Climate Model Projections Based on Precomputed GCM Runs*

    KAUST Repository

    Castruccio, Stefano

    2014-03-01

    The authors describe a new approach for emulating the output of a fully coupled climate model under arbitrary forcing scenarios that is based on a small set of precomputed runs from the model. Temperature and precipitation are expressed as simple functions of the past trajectory of atmospheric CO2 concentrations, and a statistical model is fit using a limited set of training runs. The approach is demonstrated to be a useful and computationally efficient alternative to pattern scaling and captures the nonlinear evolution of spatial patterns of climate anomalies inherent in transient climates. The approach does as well as pattern scaling in all circumstances and substantially better in many; it is not computationally demanding; and, once the statistical model is fit, it produces emulated climate output effectively instantaneously. It may therefore find wide application in climate impacts assessments and other policy analyses requiring rapid climate projections.

  10. RENEW: a real-time and effective network emulator of windows for IPv6

    Science.gov (United States)

    Zhao, Bing; Jin, Zhigang; Shu, Yantai; Li, Yu; Cen, Dan

    2007-09-01

    Although IPv4 is still working, IPv6 is considered as the backbone and characteristic of the NGI. With the development of Internet, new protocols and network equipments are required to develop. It is necessary to test the new protocols and network equipments extensively before deployment. This paper proposes the design and implementation of RENEW, a useable and accurate network emulator which supports both IPv4 and IPv6 protocols. Besides, it also works on Windows platform. In our IPv6 testbed, we use RENEW to emulate various network characteristics and conditions including bandwidth, delay packet loss and jitter. Compared with the expected values, results are acceptable. Through implementation and experimentation study, we have shown that RENEW does provide the real-time control and change on the parameters of IPv6 network conditions effectively and expediently on Windows. It also gives enough accuracy and more satisfactory convenience to the development and test work for the new protocols.

  11. A learning-based autonomous driver: emulate human driver's intelligence in low-speed car following

    Science.gov (United States)

    Wei, Junqing; Dolan, John M.; Litkouhi, Bakhtiar

    2010-04-01

    In this paper, an offline learning mechanism based on the genetic algorithm is proposed for autonomous vehicles to emulate human driver behaviors. The autonomous driving ability is implemented based on a Prediction- and Cost function-Based algorithm (PCB). PCB is designed to emulate a human driver's decision process, which is modeled as traffic scenario prediction and evaluation. This paper focuses on using a learning algorithm to optimize PCB with very limited training data, so that PCB can have the ability to predict and evaluate traffic scenarios similarly to human drivers. 80 seconds of human driving data was collected in low-speed (car-following scenarios. In the low-speed car-following tests, PCB was able to perform more human-like carfollowing after learning. A more general 120 kilometer-long simulation showed that PCB performs robustly even in scenarios that are not part of the training set.

  12. Emulation and design of terahertz reflection-mode confocal scanning microscopy based on virtual pinhole

    Science.gov (United States)

    Yang, Yong-fa; Li, Qi

    2014-12-01

    In the practical application of terahertz reflection-mode confocal scanning microscopy, the size of detector pinhole is an important factor that determines the performance of spatial resolution characteristic of the microscopic system. However, the use of physical pinhole brings some inconvenience to the experiment and the adjustment error has a great influence on the experiment result. Through reasonably selecting the parameter of matrix detector virtual pinhole (VPH), it can efficiently approximate the physical pinhole. By using this approach, the difficulty of experimental calibration is reduced significantly. In this article, an imaging scheme of terahertz reflection-mode confocal scanning microscopy that is based on the matrix detector VPH is put forward. The influence of detector pinhole size on the axial resolution of confocal scanning microscopy is emulated and analyzed. Then, the parameter of VPH is emulated when the best axial imaging performance is reached.

  13. 77 FR 33227 - Assessment Questionnaire-IP Sector Specific Agency Risk Self Assessment Tool (IP-SSARSAT)

    Science.gov (United States)

    2012-06-05

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0069] Assessment Questionnaire--IP Sector... comments concerning new Information Collection Request--Assessment Questionnaire--IP Sector Specific Agency... http://www.regulations.gov , including any personal information provided. OMB is particularly...

  14. Inositol hexakisphosphate (IP6) generated by IP5K mediates cullin-COP9 signalosome interactions and CRL function.

    Science.gov (United States)

    Scherer, Paul C; Ding, Yan; Liu, Zhiqing; Xu, Jing; Mao, Haibin; Barrow, James C; Wei, Ning; Zheng, Ning; Snyder, Solomon H; Rao, Feng

    2016-03-29

    The family of cullin-RING E3 Ligases (CRLs) and the constitutive photomorphogenesis 9 (COP9) signalosome (CSN) form dynamic complexes that mediate ubiquitylation of 20% of the proteome, yet regulation of their assembly/disassembly remains poorly understood. Inositol polyphosphates are highly conserved signaling molecules implicated in diverse cellular processes. We now report that inositol hexakisphosphate (IP6) is a major physiologic determinant of the CRL-CSN interface, which includes a hitherto unidentified electrostatic interaction between the N-terminal acidic tail of CSN subunit 2 (CSN2) and a conserved basic canyon on cullins. IP6, with an EC50 of 20 nM, acts as an intermolecular "glue," increasing cullin-CSN2 binding affinity by 30-fold, thereby promoting assembly of the inactive CRL-CSN complexes. The IP6 synthase, Ins(1,3,4,5,6)P5 2-kinase (IPPK/IP5K) binds to cullins. Depleting IP5K increases the percentage of neddylated, active Cul1 and Cul4A, and decreases levels of the Cul1/4A substrates p27 and p21. Besides dysregulating CRL-mediated cell proliferation and UV-induced apoptosis, IP5K depletion potentiates by 28-fold the cytotoxic effect of the neddylation inhibitor MLN4924. Thus, IP5K and IP6 are evolutionarily conserved components of the CRL-CSN system and are potential targets for cancer therapy in conjunction with MLN4924.

  15. Emulation of MS DOS Operational System on the Autonomous Crate-Controller with I8086 microprocessor

    International Nuclear Information System (INIS)

    Hons, Z.; Cizek, P.; Streit, V.

    1988-01-01

    KM-DOS operating system for CAMAC autonomous crate-controller based on Intel 8086/8087 microprocessor connected with Pravec-16 IBM PC is described. The KM-DOS system fully emulates the MS DOS environment on the CAMAC controller. Thus ASSEMBLER, FORTRAN, C and PASCAL programs compiled and linked on IBM PC and compatible can be run on the CAMAC controller and parall work of both computers is enabled

  16. Development of adaptive core emulator for PMS-XRBP of CE type plant

    International Nuclear Information System (INIS)

    Song, Jae Seung; Zee, Sung Quun; Lee, Chung Chan; Lee, Ki Bog; Rhy, Hyo Sang; Chang, Jong Hwa; Lee, Young Ouk; Baek, Seung Min; Seo, Ho Joon.

    1996-12-01

    The purpose of this report is to develop ONED-based adaptive core emulator (ACE) for Korean Standard Nuclear Power Plant. This report is first year report and includes 1) augmentation of ONED94 I/O system 2) non-equilibrium xenon initialization for core transient simulation 3) ONED94 verification via plant measurements 4) automatic data link system from PMS and personal computer. (author). 4 tabs., 4 figs., 8 refs

  17. A physics informed emulator for laser-driven radiating shock simulations

    International Nuclear Information System (INIS)

    McClarren, Ryan G.; Ryu, D.; Paul Drake, R.; Grosskopf, Michael; Bingham, Derek; Chou, Chuan-Chih; Fryxell, Bruce; Holst, Bart van der; Paul Holloway, James; Kuranz, Carolyn C.; Mallick, Bani; Rutter, Erica; Torralva, Ben R.

    2011-01-01

    This work discusses the uncertainty quantification aspect of quantification of margin and uncertainty (QMU) in the context of two linked computer codes. Specifically, we present a physics based reduction technique to deal with functional data from the first code and then develop an emulator for this reduced data. Our particular application deals with conditions created by laser deposition in a radiating shock experiment modeled using the Lagrangian, radiation-hydrodynamics code Hyades. Our goal is to construct an emulator and perform a sensitivity analysis of the functional output from Hyades to be used as an initial condition for a three-dimensional code that will compute the evolution of the radiating shock at later times. Initial attempts at purely statistical data reduction techniques, were not successful at reducing the number of parameters required to describe the Hyades output. We decided on an alternate approach using physical arguments to decide what features/locations of the output were relevant (e.g., the location of the shock front or the location of the maximum pressure) and then used a piecewise linear fit between these locations. This reduced the number of outputs needed from the emulator to 40, down from the O(1000) points in the Hyades output. Then, using Bayesian MARS and Gaussian process regression, we were able to build emulators for Hyades and study sensitivities to input parameters. - Highlights: → Uncertainty quantification for two linked computer codes is investigated. → We perform physics-based dimension reduction on the code output. → This reduces the uncertain degrees of freedom from hundreds to tens.

  18. Development of adaptive core emulator for PMS-XRBP of CE type plant

    Energy Technology Data Exchange (ETDEWEB)

    Song, Jae Seung; Zee, Sung Quun; Lee, Chung Chan; Lee, Ki Bog; Rhy, Hyo Sang; Chang, Jong Hwa; Lee, Young Ouk; Baek, Seung Min; Seo, Ho Joon

    1996-12-01

    The purpose of this report is to develop ONED-based adaptive core emulator (ACE) for Korean Standard Nuclear Power Plant. This report is first year report and includes (1) augmentation of ONED94 I/O system (2) non-equilibrium xenon initialization for core transient simulation (3) ONED94 verification via plant measurements (4) automatic data link system from PMS and personal computer. (author). 4 tabs., 4 figs., 8 refs.

  19. Emulation of a complex global aerosol model to quantify sensitivity to uncertain parameters

    Directory of Open Access Journals (Sweden)

    L. A. Lee

    2011-12-01

    Full Text Available Sensitivity analysis of atmospheric models is necessary to identify the processes that lead to uncertainty in model predictions, to help understand model diversity through comparison of driving processes, and to prioritise research. Assessing the effect of parameter uncertainty in complex models is challenging and often limited by CPU constraints. Here we present a cost-effective application of variance-based sensitivity analysis to quantify the sensitivity of a 3-D global aerosol model to uncertain parameters. A Gaussian process emulator is used to estimate the model output across multi-dimensional parameter space, using information from a small number of model runs at points chosen using a Latin hypercube space-filling design. Gaussian process emulation is a Bayesian approach that uses information from the model runs along with some prior assumptions about the model behaviour to predict model output everywhere in the uncertainty space. We use the Gaussian process emulator to calculate the percentage of expected output variance explained by uncertainty in global aerosol model parameters and their interactions. To demonstrate the technique, we show examples of cloud condensation nuclei (CCN sensitivity to 8 model parameters in polluted and remote marine environments as a function of altitude. In the polluted environment 95 % of the variance of CCN concentration is described by uncertainty in the 8 parameters (excluding their interaction effects and is dominated by the uncertainty in the sulphur emissions, which explains 80 % of the variance. However, in the remote region parameter interaction effects become important, accounting for up to 40 % of the total variance. Some parameters are shown to have a negligible individual effect but a substantial interaction effect. Such sensitivities would not be detected in the commonly used single parameter perturbation experiments, which would therefore underpredict total uncertainty. Gaussian process

  20. Real-Time Emulation of Nonstationary Channels in Safety-Relevant Vehicular Scenarios

    Directory of Open Access Journals (Sweden)

    Golsa Ghiaasi

    2018-01-01

    Full Text Available This paper proposes and discusses the architecture for a real-time vehicular channel emulator capable of reproducing the input/output behavior of nonstationary time-variant radio propagation channels in safety-relevant vehicular scenarios. The vehicular channel emulator architecture aims at a hardware implementation which requires minimal hardware complexity for emulating channels with the varying delay-Doppler characteristics of safety-relevant vehicular scenarios. The varying delay-Doppler characteristics require real-time updates to the multipath propagation model for each local stationarity region. The vehicular channel emulator is used for benchmarking the packet error performance of commercial off-the-shelf (COTS vehicular IEEE 802.11p modems and a fully software-defined radio-based IEEE 802.11p modem stack. The packet error ratio (PER estimated from temporal averaging over a single virtual drive and the packet error probability (PEP estimated from ensemble averaging over repeated virtual drives are evaluated and compared for the same vehicular scenario. The proposed architecture is realized as a virtual instrument on National Instruments™ LabVIEW. The National Instrument universal software radio peripheral with reconfigurable input-output (USRP-Rio 2953R is used as the software-defined radio platform for implementation; however, the results and considerations reported are of general purpose and can be applied to other platforms. Finally, we discuss the PER performance of the modem for two categories of vehicular channel models: a vehicular nonstationary channel model derived for urban single lane street crossing scenario of the DRIVEWAY’09 measurement campaign and the stationary ETSI models.

  1. Resilient Coordination of Networked Multiagent Systems Based on Distributed State Emulators

    OpenAIRE

    Yucelen, Tansel; De La Torre, Gerardo

    2014-01-01

    This note studies resilient coordination of networked multiagent systems in the presence of misbehaving agents, i.e., agents that are subject to adversaries modeled as exogenous disturbances. Apart from the existing relevant literature that make specific assumptions on the graph topology and/or the fraction of misbehaving agents, we present an adaptive control architecture based on distributed state emulators and show that the nominal networked multiagent system behavior can be retrieved even...

  2. Assessing the Usability of Gaze-Adapted Interface against Conventional Eye-based Input Emulation

    OpenAIRE

    Kumar, Chandan; Menges, Raphael; Staab, Steffen

    2017-01-01

    In recent years, eye tracking systems have greatly improved, beginning to play a promising role as an input medium. Eye trackers can be used for application control either by simply emulating the mouse and keyboard devices in the traditional graphical user interface, or by customized interfaces for eye gaze events. In this work, we evaluate these two approaches to assess their impact in usability. We present a gaze-adapted Twitter application interface with direct interaction of eye gaze inpu...

  3. Asynchronous transfer mode and Local Area Network emulation standards, protocols, and security implications

    OpenAIRE

    Kirwin, John P.

    1999-01-01

    A complex networking technology called Asynchronous Transfer Mode (ATM) and a networking protocol called Local Area Network Emulation (LANE) are being integrated into many naval networks without any security-driven naval configuration guidelines. No single publication is available that describes security issues of data delivery and signaling relating to the transition of Ethernet to LANE and ATM. The thesis' focus is to provide: (1) an overview and security analysis of standardized protocols ...

  4. The coyote universe extended: Precision emulation of the matter power spectrum

    International Nuclear Information System (INIS)

    Heitmann, Katrin; Kwan, Juliana; Habib, Salman; Lawrence, Earl; Higdon, David

    2014-01-01

    Modern sky surveys are returning precision measurements of cosmological statistics such as weak lensing shear correlations, the distribution of galaxies, and cluster abundance. To fully exploit these observations, theorists must provide predictions that are at least as accurate as the measurements, as well as robust estimates of systematic errors that are inherent to the modeling process. In the nonlinear regime of structure formation, this challenge can only be overcome by developing a large-scale, multi-physics simulation capability covering a range of cosmological models and astrophysical processes. As a first step to achieving this goal, we have recently developed a prediction scheme for the matter power spectrum (a so-called emulator), accurate at the 1% level out to k ∼ 1 Mpc –1 and z = 1 for wCDM cosmologies based on a set of high-accuracy N-body simulations. It is highly desirable to increase the range in both redshift and wavenumber and to extend the reach in cosmological parameter space. To make progress in this direction, while minimizing computational cost, we present a strategy that maximally reuses the original simulations. We demonstrate improvement over the original spatial dynamic range by an order of magnitude, reaching k ∼ 10 h Mpc –1 , a four-fold increase in redshift coverage, to z = 4, and now include the Hubble parameter as a new independent variable. To further the range in k and z, a new set of nested simulations run at modest cost is added to the original set. The extension in h is performed by including perturbation theory results within a multi-scale procedure for building the emulator. This economical methodology still gives excellent error control, ∼5% near the edges of the domain of applicability of the emulator. A public domain code for the new emulator is released as part of the work presented in this paper.

  5. IP3 levels and their modulation FY fusicoccin measured by a novel [3H] IP3 binding assay

    International Nuclear Information System (INIS)

    Aducci, P.; Marra, M.

    1990-01-01

    A recently developed sensitive assay based on the binding reaction of IP3 to bovine adrenal preparations has been utilized for determining the level of endogenous inositol-1,4,5 trisphosphate (IP3) in maize roots and coleoptiles. The amount of IP3 found in these tissues ranges from 0.1 to 1.0 nmol g-1 fresh weight. Reproducible results were obtained with extracts of tissues from a same harvest, while they showed a 2-3 fold variation when different batches of plantlets were compared. The fungal phytotoxin fusicoccin (FC) known to affect several physiological processes in higher plants, increases the level of IP3 in coleoptiles. This observation suggests that IP3 might be involved in the transduction of the FC encoded signal from its receptors at the plasmalemma level to the cell machinery

  6. Bayesian Sensitivity Analysis of a Cardiac Cell Model Using a Gaussian Process Emulator

    Science.gov (United States)

    Chang, Eugene T Y; Strong, Mark; Clayton, Richard H

    2015-01-01

    Models of electrical activity in cardiac cells have become important research tools as they can provide a quantitative description of detailed and integrative physiology. However, cardiac cell models have many parameters, and how uncertainties in these parameters affect the model output is difficult to assess without undertaking large numbers of model runs. In this study we show that a surrogate statistical model of a cardiac cell model (the Luo-Rudy 1991 model) can be built using Gaussian process (GP) emulators. Using this approach we examined how eight outputs describing the action potential shape and action potential duration restitution depend on six inputs, which we selected to be the maximum conductances in the Luo-Rudy 1991 model. We found that the GP emulators could be fitted to a small number of model runs, and behaved as would be expected based on the underlying physiology that the model represents. We have shown that an emulator approach is a powerful tool for uncertainty and sensitivity analysis in cardiac cell models. PMID:26114610

  7. FPGA-Based Real Time, Multichannel Emulated-Digital Retina Model Implementation

    Directory of Open Access Journals (Sweden)

    Zsolt Vörösházi

    2009-01-01

    Full Text Available The function of the low-level image processing that takes place in the biological retina is to compress only the relevant visual information to a manageable size. The behavior of the layers and different channels of the neuromorphic retina has been successfully modeled by cellular neural/nonlinear networks (CNNs. In this paper, we present an extended, application-specific emulated-digital CNN-universal machine (UM architecture to compute the complex dynamic of this mammalian retina in video real time. The proposed emulated-digital implementation of multichannel retina model is compared to the previously developed models from three key aspects, which are processing speed, number of physical cells, and accuracy. Our primary aim was to build up a simple, real-time test environment with camera input and display output in order to mimic the behavior of retina model implementation on emulated digital CNN by using low-cost, moderate-sized field-programmable gate array (FPGA architectures.

  8. Emulation of reionization simulations for Bayesian inference of astrophysics parameters using neural networks

    Science.gov (United States)

    Schmit, C. J.; Pritchard, J. R.

    2018-03-01

    Next generation radio experiments such as LOFAR, HERA, and SKA are expected to probe the Epoch of Reionization (EoR) and claim a first direct detection of the cosmic 21cm signal within the next decade. Data volumes will be enormous and can thus potentially revolutionize our understanding of the early Universe and galaxy formation. However, numerical modelling of the EoR can be prohibitively expensive for Bayesian parameter inference and how to optimally extract information from incoming data is currently unclear. Emulation techniques for fast model evaluations have recently been proposed as a way to bypass costly simulations. We consider the use of artificial neural networks as a blind emulation technique. We study the impact of training duration and training set size on the quality of the network prediction and the resulting best-fitting values of a parameter search. A direct comparison is drawn between our emulation technique and an equivalent analysis using 21CMMC. We find good predictive capabilities of our network using training sets of as low as 100 model evaluations, which is within the capabilities of fully numerical radiative transfer codes.

  9. Microwave emulations and tight-binding calculations of transport in polyacetylene

    International Nuclear Information System (INIS)

    Stegmann, Thomas; Franco-Villafañe, John A.; Ortiz, Yenni P.; Kuhl, Ulrich; Mortessagne, Fabrice; Seligman, Thomas H.

    2017-01-01

    A novel approach to investigate the electron transport of cis- and trans-polyacetylene chains in the single-electron approximation is presented by using microwave emulation measurements and tight-binding calculations. In the emulation we take into account the different electronic couplings due to the double bonds leading to coupled dimer chains. The relative coupling constants are adjusted by DFT calculations. For sufficiently long chains a transport band gap is observed if the double bonds are present, whereas for identical couplings no band gap opens. The band gap can be observed also in relatively short chains, if additional edge atoms are absent, which cause strong resonance peaks within the band gap. The experimental results are in agreement with our tight-binding calculations using the nonequilibrium Green's function method. The tight-binding calculations show that it is crucial to include third nearest neighbor couplings to obtain the gap in the cis-polyacetylene. - Highlights: • Electronic transport in individual polyacetylene chains is studied. • Microwave emulation experiments and tight-binding calculations agree well. • In long chains a band-gap opens due the dimerization of the chain. • In short chains edge atoms cause strong resonance peaks in the center of the band-gap.

  10. An orbital emulator for pursuit-evasion game theoretic sensor management

    Science.gov (United States)

    Shen, Dan; Wang, Tao; Wang, Gang; Jia, Bin; Wang, Zhonghai; Chen, Genshe; Blasch, Erik; Pham, Khanh

    2017-05-01

    This paper develops and evaluates an orbital emulator (OE) for space situational awareness (SSA). The OE can produce 3D satellite movements using capabilities generated from omni-wheeled robot and robotic arm motion methods. The 3D motion of a satellite is partitioned into the movements in the equatorial plane and the up-down motions in the vertical plane. The 3D actions are emulated by omni-wheeled robot models while the up-down motions are performed by a stepped-motor-controlled-ball along a rod (robotic arm), which is attached to the robot. For multiple satellites, a fast map-merging algorithm is integrated into the robot operating system (ROS) and simultaneous localization and mapping (SLAM) routines to locate the multiple robots in the scene. The OE is used to demonstrate a pursuit-evasion (PE) game theoretic sensor management algorithm, which models conflicts between a space-based-visible (SBV) satellite (as pursuer) and a geosynchronous (GEO) satellite (as evader). The cost function of the PE game is based on the informational entropy of the SBV-tracking-GEO scenario. GEO can maneuver using a continuous and low thruster. The hard-in-loop space emulator visually illustrates the SSA problem solution based PE game.

  11. Microwave emulations and tight-binding calculations of transport in polyacetylene

    Energy Technology Data Exchange (ETDEWEB)

    Stegmann, Thomas, E-mail: stegmann@icf.unam.mx [Instituto de Ciencias Físicas, Universidad Nacional Autónoma de México, Avenida Universidad s/n, 62210 Cuernavaca (Mexico); Franco-Villafañe, John A., E-mail: jofravil@fis.unam.mx [Instituto de Física, Benemérita Universidad Autónoma de Puebla, Apartado Postal J-48, 72570 Puebla (Mexico); Instituto de Ciencias Físicas, Universidad Nacional Autónoma de México, Avenida Universidad s/n, 62210 Cuernavaca (Mexico); Ortiz, Yenni P. [Instituto de Ciencias Físicas, Universidad Nacional Autónoma de México, Avenida Universidad s/n, 62210 Cuernavaca (Mexico); Kuhl, Ulrich [Université de Nice – Sophia Antipolis, Laboratoire de la Physique de la Matière Condensée, CNRS, Parc Valrose, 06108 Nice (France); Mortessagne, Fabrice, E-mail: fabrice.mortessagne@unice.fr [Université de Nice – Sophia Antipolis, Laboratoire de la Physique de la Matière Condensée, CNRS, Parc Valrose, 06108 Nice (France); Seligman, Thomas H. [Instituto de Ciencias Físicas, Universidad Nacional Autónoma de México, Avenida Universidad s/n, 62210 Cuernavaca (Mexico); Centro Internacional de Ciencias, 62210 Cuernavaca (Mexico)

    2017-01-05

    A novel approach to investigate the electron transport of cis- and trans-polyacetylene chains in the single-electron approximation is presented by using microwave emulation measurements and tight-binding calculations. In the emulation we take into account the different electronic couplings due to the double bonds leading to coupled dimer chains. The relative coupling constants are adjusted by DFT calculations. For sufficiently long chains a transport band gap is observed if the double bonds are present, whereas for identical couplings no band gap opens. The band gap can be observed also in relatively short chains, if additional edge atoms are absent, which cause strong resonance peaks within the band gap. The experimental results are in agreement with our tight-binding calculations using the nonequilibrium Green's function method. The tight-binding calculations show that it is crucial to include third nearest neighbor couplings to obtain the gap in the cis-polyacetylene. - Highlights: • Electronic transport in individual polyacetylene chains is studied. • Microwave emulation experiments and tight-binding calculations agree well. • In long chains a band-gap opens due the dimerization of the chain. • In short chains edge atoms cause strong resonance peaks in the center of the band-gap.

  12. Rapid testing and identification of actuator using dSPACE real-time emulator

    Science.gov (United States)

    Xie, Daocheng; Wang, Zhongwei; Zeng, Qinghua

    2011-10-01

    To solve the problem of model identification of actuator in control system design of aerocraft, testing system based on dSPACE emulator is established, sending testing signal and receiving feedback voltage are realized using dSPACE interactive cards, communication between signal generating equipment and feedback voltage acquisition equipment is synchronized. This paper introduces the hardware architecture and key technologies of the simulation system. Constructing, downloading and calculating of the testing model is finished using dSPACE emulator, D/A transfer of testing signal is realized using DS2103 card, DS2002 card transfer the feedback voltage to digital value. Filtering module is added to the signal acquisition, for reduction of noise interference in the A/D channel. Precision of time and voltage is improved by setting acquisition period 1ms. The data gathered is recorded and displayed with Controldesk tools. The response of four actuators under different frequency are tested, frequency-domain analysis is done using least square method, the model of actuator is identified, simulation data fits well with real response of the actuator. The testing system created with dSPACE emulator satisfies the rapid testing and identification of actuator.

  13. Performance tests of a power-electronics converter for multi-megawatt wind turbines using a grid emulator

    International Nuclear Information System (INIS)

    Averous, Nurhan Rizqy; Berthold, Anica; Monti, Antonello; De Doncker, Rik W.; Schneider, Alexander; Schwimmbeck, Franz

    2016-01-01

    A vast increase of wind turbines (WT) contribution in the modern electrical grids have led to the development of grid connection requirements. In contrast to the conventional test method, testing power-electronics converters for WT using a grid emulator at Center for Wind Power Drives (CWD) RWTH Aachen University offers more flexibility for conducting test scenarios. Further analysis on the performance of the device under test (DUT) is however required when testing with grid emulator since the characteristic of the grid emulator might influence the performance of the DUT. This paper focuses on the performance analysis of the DUT when tested using grid emulator. Beside the issue regarding the current harmonics, the performance during Fault Ride-Through (FRT) is discussed in detail. A power hardware in the loop setup is an attractive solution to conduct a comprehensive study on the interaction between the power-electronics converters and the electrical grids. (paper)

  14. Performance tests of a power-electronics converter for multi-megawatt wind turbines using a grid emulator

    Science.gov (United States)

    Rizqy Averous, Nurhan; Berthold, Anica; Schneider, Alexander; Schwimmbeck, Franz; Monti, Antonello; De Doncker, Rik W.

    2016-09-01

    A vast increase of wind turbines (WT) contribution in the modern electrical grids have led to the development of grid connection requirements. In contrast to the conventional test method, testing power-electronics converters for WT using a grid emulator at Center for Wind Power Drives (CWD) RWTH Aachen University offers more flexibility for conducting test scenarios. Further analysis on the performance of the device under test (DUT) is however required when testing with grid emulator since the characteristic of the grid emulator might influence the performance of the DUT. This paper focuses on the performance analysis of the DUT when tested using grid emulator. Beside the issue regarding the current harmonics, the performance during Fault Ride-Through (FRT) is discussed in detail. A power hardware in the loop setup is an attractive solution to conduct a comprehensive study on the interaction between the power-electronics converters and the electrical grids.

  15. An IP-10 (CXCL10)-Derived Peptide Inhibits Angiogenesis

    Science.gov (United States)

    Yates-Binder, Cecelia C.; Rodgers, Margaret; Jaynes, Jesse; Wells, Alan; Bodnar, Richard J.; Turner, Timothy

    2012-01-01

    Angiogenesis plays a critical role in processes such as organ development, wound healing, and tumor growth. It requires well-orchestrated integration of soluble and matrix factors and timely recognition of such signals to regulate this process. Previous work has shown that newly forming vessels express the chemokine receptor CXC receptor 3 (CXCR3) and, activation by its ligand IP-10 (CXCL10), both inhibits development of new vasculature and causes regression of newly formed vessels. To identify and develop new therapeutic agents to limit or reverse pathological angiogenesis, we identified a 21 amino acid fragment of IP-10, spanning the α-helical domain residues 77–98, that mimic the actions of the whole IP-10 molecule on endothelial cells. Treatment of the endothelial cells with the 22 amino acid fragment referred to as IP-10p significantly inhibited VEGF-induced endothelial motility and tube formation in vitro, properties critical for angiogenesis. Using a Matrigel plug assay in vivo, we demonstrate that IP-10p both prevented vessel formation and induced involution of nascent vessels. CXCR3 neutralizing antibody was able to block the inhibitory effects of the IP-10p, demonstrating specificity of the peptide. Inhibition of endothelial function by IP-10p was similar to that described for IP-10, secondary to CXCR3-mediated increase in cAMP production, activation of PKA inhibiting cell migration, and inhibition of VEGF-mediated m-calpain activation. IP-10p provides a novel therapeutic agent that inhibits endothelial cell function thus, allowing for the modulation of angiogenesis. PMID:22815829

  16. Protecting LHC IP1/IP5 Components Against Radiation Resulting from Colliding Beam Interactions

    CERN Document Server

    Mokhov, N V; Kerby, J S; Strait, J B

    2003-01-01

    Beam-induced energy deposition in the LHC high luminosity interaction region (IR) components due to both pp collisions and beam loss in the IR vicinity is a significant challenge for the design of the high luminosity insertions. It was shown in our previous studies that a set of absorbers would reduce both the peak power density and total heat load to tolerable levels. In this paper the results of further optimization and comprehensive MARS calculations are summarized for the LHC lattice, version 6.4, for the updated IP1 and IP5 layouts and a baseline pp-collision source term. Power density, power dissipation, particle fluxes and spectra, accumulated dose and residual dose rates are studied in the components of the inner triplets including their TAS absorbers, the TAN neutral beam absorbers, separation dipoles, and quadrupoles of the outer triplets and possible collimators there. Results are given for the nominal luminosity of 1034 cm-2 s-1. The current design is proved to provide the best safety margin under...

  17. A Novel Smart Meter Controlling System with Dynamic IP Addresses

    DEFF Research Database (Denmark)

    Manembu, Pinrolinvic; Welang, Brammy; Kalua Lapu, Aditya

    2017-01-01

    Smart meters are the electronic devices for measuring energy consumption in real time. Usually, static public IP addresses are allocated to realize the point-to-point (P2P) communication and remote controlling for smart metering systems. This, however, restricts the wide deployment of smart meters......, due to the deficiency of public IP resources. This paper proposes a novel subscription-based communication architecture for the support of dynamic IP addresses and group controlling of smart meters. The paper evaluates the proposed architecture by comparing the traditional P2P architecture...

  18. Understanding Innovative Potential (IP) in an ICT Context

    DEFF Research Database (Denmark)

    Rai, Sudhanshu

    a dynamic perspective in its conception, operation and instantiation. I conclude this paper with insights on what I call the dynamic IP threshold arguing that being dynamic cannot be seen as a point in time but a threshold existing over time. I then discuss some implications. I suggest that firms need...... to consider IP as a long term investment not only in human capital but in the way the human capital is allowed to engage with new ideas. I suggest IP can be build using institutional logics that enable openness and collegiality....

  19. On the Cryptographic Features of a VoIP Service

    Directory of Open Access Journals (Sweden)

    Dimitrios Alvanos

    2018-01-01

    Full Text Available Security issues of typical Voice over Internet Protocol (VoIP applications are studied in this paper; in particular, the open source Linphone application is being used as a case study. An experimental analysis indicates that protecting signalling data with the TLS protocol, which unfortunately is not always the default option, is needed to alleviate several security concerns. Moreover, towards improving security, it is shown that a VoIP application may operate over a virtual private network without significantly degrading the overall performance. The conclusions of this study provide useful insights to the usage of any VoIP application.

  20. Application of Mobile-ip to Space and Aeronautical Networks

    Science.gov (United States)

    Leung, Kent; Shell, Dan; Ivancic, William D.; Stewart, David H.; Bell, Terry L.; Kachmar, Brian A.

    2001-01-01

    The National Aeronautics and Space Administration (NASA) is interested in applying mobile Internet protocol (mobile-ip) technologies to its space and aeronautics programs. In particular, mobile-ip will play a major role in the Advanced Aeronautic Transportation Technology (AAT-F), the Weather Information Communication (WINCOMM), and the Small Aircraft Transportation System (SATS) aeronautics programs. This paper describes mobile-ip and mobile routers--in particular, the features, capabilities, and initial performance of the mobile router are presented. The application of mobile-router technology to NASA's space and aeronautics programs is also discussed.

  1. Performance Evaluation, Emulation, and Control of Cross-Flow Hydrokinetic Turbines

    Science.gov (United States)

    Cavagnaro, Robert J.

    power, and electrical power output of a complete power take-off (PTO) system are utilized to determine the rotor hydrodynamic efficiency (maximum of 17%) and total system efficiency (maximum of 9%). A lab-based dynamometry method yields individual component and total PTO efficiencies, shown to have high variability and strong influence on total system efficiency. Dynamic efficiencies of PTO components can effect the overall efficiency of a turbine system, a result from field characterization. Thus, the ability to evaluate such components and their potential effects on turbine performance prior to field deployment is desirable. Before attempting control experiments with actual turbines, hardware-in-the-loop testing on controllable motor-generator sets or electromechanical emulation machines (EEMs) are explored to better understand power take-off response. The emulator control dynamic equations are presented, methods for scaling turbine parameters are developed and evaluated, and experimental results are presented from three EEMs programmed to emulate the same cross-flow turbine. Although hardware platforms and control implementations varied, results show that each EEM is successful in emulating the turbine model at different power levels, thus demonstrating the general feasibility of the approach. However, performance of motor control under torque command, current command, or speed command differed; torque methods required accurate characterization of the motors while speed methods utilized encoder feedback and more accurately tracked turbine dynamics. In a demonstration of an EEM for evaluating a hydrokinetic turbine implementation, a controller is used to track the maximum power-point of the turbine in response to turbulence. Utilizing realistic inflow conditions and control laws, the emulator dynamic speed response is shown to agree well at low frequencies with simulation but to deviate at high frequencies. The efficacy of an electromechanical emulator as an accurate

  2. Emulation of long-term changes in global climate: application to the late Pliocene and future

    Directory of Open Access Journals (Sweden)

    N. S. Lord

    2017-11-01

    Full Text Available Multi-millennial transient simulations of climate changes have a range of important applications, such as for investigating key geologic events and transitions for which high-resolution palaeoenvironmental proxy data are available, or for projecting the long-term impacts of future climate evolution on the performance of geological repositories for the disposal of radioactive wastes. However, due to the high computational requirements of current fully coupled general circulation models (GCMs, long-term simulations can generally only be performed with less complex models and/or at lower spatial resolution. In this study, we present novel long-term continuous projections of climate evolution based on the output from GCMs, via the use of a statistical emulator. The emulator is calibrated using ensembles of GCM simulations, which have varying orbital configurations and atmospheric CO2 concentrations and enables a variety of investigations of long-term climate change to be conducted, which would not be possible with other modelling techniques on the same temporal and spatial scales. To illustrate the potential applications, we apply the emulator to the late Pliocene (by modelling surface air temperature – SAT, comparing its results with palaeo-proxy data for a number of global sites, and to the next 200 kyr (thousand years (by modelling SAT and precipitation. A range of CO2 scenarios are prescribed for each period. During the late Pliocene, we find that emulated SAT varies on an approximately precessional timescale, with evidence of increased obliquity response at times. A comparison of atmospheric CO2 concentration for this period, estimated using the proxy sea surface temperature (SST data from different sites and emulator results, finds that relatively similar CO2 concentrations are estimated based on sites at lower latitudes, whereas higher-latitude sites show larger discrepancies. In our second illustrative application, spanning the next

  3. A comparison of the microstructure and properties of the IPS Empress 2 and the IPS Empress glass-ceramics.

    Science.gov (United States)

    Höland, W; Schweiger, M; Frank, M; Rheinberger, V

    2000-01-01

    The aim of this report is to analyze the microstructures of glass-ceramics of the IPS Empress 2 and IPS Empress systems by scanning electron microscopy. The main properties of the glass-ceramics were determined and compared to each other. The flexural strength of the pressed glass-ceramic (core material) was improved by a factor of more than three for IPS Empress 2 (lithium disilicate glass-ceramic) in comparison with IPS Empress (leucite glass-ceramic). For the fracture toughness, the K(IC) value was measured as 3.3 +/- 0.3 MPa. m(0.5) for IPS Empress 2 and 1.3 +/- 0.1 MPa. m(0.5) for IPS Empress. Abrasion behavior, chemical durability, and optical properties such as translucency of all glass-ceramics fulfill the dental standards. The authors concluded that IPS Empress 2 can be used to fabricate 3-unit bridges up to the second premolar. Copyright 2000 John Wiley & Sons, Inc.

  4. PEMBELAJARAN IPS DALAM REALITA DI ERA KTSP: STUDI EKSPLORASI PELAKSANAAN PEMBELAJARAN IPS PADA JENJANG SMP DI KABUPATEN PATI

    Directory of Open Access Journals (Sweden)

    Edi Sutrisna

    2011-10-01

    Full Text Available Application of KTSP as a curriculum based on competency requires the implementation of strategies and methods that can deliver a number of learners achieving a particular competence. IPS as a subject who has a noble purpose, namely to prepare students to be good citizens, should be taught to students through appropriate strategies and methods by utilizing various media sources and learning. Most social studies teachers still promote the use of expository strategies in presenting lessons of Social Science education and the use of resources and learning media are minimal. Environment, as a laboratory of IPS is not utilized properly.The study shows that most teachers still tend to use expository teaching strategies, use of resources and learning media that are less varied, and integrated approaches to teaching social studies can not be realized by the teachers due to various constraints.   Keywords: learning, IPS, junior school, KTSP   Penerapan KTSP sebagai kurikulum berbasis kompetensi membutuhkan penerapan strategi dan metode yang dapat memberikan sejumlah peserta didik mencapai kompetensi tertentu. IPS sebagai subjek yang memiliki tujuan mulia, yaitu untuk mempersiapkan siswa untuk menjadi warga negara yang baik, harus diajarkan kepada siswa melalui strategi yang tepat dan metode dengan memanfaatkan berbagai sumber media dan pembelajaran. Kebanyakan guru IPS masih menggunakan strategi ekspositori dalam menyajikan meteri pelajaran IPS dengan menggunakan sumber daya dan media pembelajaran yang minimal. Lingkungan sekitar, sebagai laboratorium IPS tidak digunakan menunjukkan pembelajaran yang baik. Kebanyakan guru masih cenderung untuk menggunakan strategi pengajaran ekspositori, penggunaan sumber daya dan media pembelajaran yang kurang bervariasi, dan pendekatan terpadu untuk mengajar IPS, sehingga tidak dapat direalisasikan oleh para guru karena berbagai kendala.   Kata kunci: pembelajaran, IPS, SMP, KTSP  

  5. CATCHprofiles: Clustering and Alignment Tool for ChIP Profiles

    DEFF Research Database (Denmark)

    G. G. Nielsen, Fiona; Galschiøt Markus, Kasper; Møllegaard Friborg, Rune

    2012-01-01

    IP-profiling data and detect potentially meaningful patterns, the areas of enrichment must be aligned and clustered, which is an algorithmically and computationally challenging task. We have developed CATCHprofiles, a novel tool for exhaustive pattern detection in ChIP profiling data. CATCHprofiles is built upon...... a computationally efficient implementation for the exhaustive alignment and hierarchical clustering of ChIP profiling data. The tool features a graphical interface for examination and browsing of the clustering results. CATCHprofiles requires no prior knowledge about functional sites, detects known binding patterns...... it an invaluable tool for explorative research based on ChIP profiling data. CATCHprofiles and the CATCH algorithm run on all platforms and is available for free through the CATCH website: http://catch.cmbi.ru.nl/. User support is available by subscribing to the mailing list catch-users@bioinformatics.org....

  6. Engineering of radioimmunoassay (RIA) IP10.1

    International Nuclear Information System (INIS)

    Hari Nurcahyadi

    2010-01-01

    Engineering of Radioimmunoassay (RIA) IP10.1 is an innovative by PRPN - BATAN in 2010. Innovations made to the device IP10.1 RIA is the sample changer system, sample changer system on the device RIA IP10.1 applied 2 linear axis system (X, Z) with AC servo motor. In the RIA IP10.1 also use 5 pieces of the detector, so the enumeration process 50 (Fifty) sample is expected to be faster. Like its predecessor, The whole enumeration, data collection procedures and mechanisms operating within this system is entirely controlled by a PC via an electronic module. Electronics module consists of a high voltage module, amplifier and signal processor module, the module enumerators, low-voltage module, the module driver motor controller and a USB interface. The data acquisition and communication system using a USB port with the computer. (author)

  7. IP and resistivity survey at the INEL cold test pit

    International Nuclear Information System (INIS)

    Frangos, W.

    1997-01-01

    Induced polarization (IP) is a technique for detection of diffuse occurrences of metallic material. The Idaho National Laboratory (INEL) Cold Test Pit (CTP) has been carefully constructed to simulate stored hazardous waste occurrences. IP and resistivity surveys of the CTP show a very strong IP response and a modest resistivity response associated with the simulated waste. Several false positive resistivity anomalies are noted. 2-D inversion of the data accurately determine the lateral limits of the waste zone. The depth of burial indicated is deeper than reported by the construction engineers. Limited depth extent is recognized, in distinction to results from other, resistivity-based, methods, but it also appears too deep. IP holds promise as a method for locating buried waste

  8. The psisub(IPS)-LAS relation for extragalactic radio sources

    International Nuclear Information System (INIS)

    Banhatti, D.G.

    1984-01-01

    Metre-wavelength interplanetary scintillation (IPS) observations give the overall angular sizes psi of scintillating compact structures in radio sources. From 326.5-MHz IPS data for a sample of faint (Ooty) radio sources, log psi versus log (largest angular size) is seen, on average, to have a slope 0.2, significantly less than one. A similar trend is seen from 81.5-MHz IPS data for a sample of strong, powerful (3CR) double sources, although the slope is 0.4 and the mean psi about four times larger. The difference in slopes is due mainly to the large spread in the redshifts of the 3CR sources compared to the expected narrow range for the Ooty sources, while the difference in mean psi values is due to the different methods of determining psi for the two samples, the different frequencies used for the IPS observations and the different mean LAS values. (author)

  9. Quantitative analysis of macro-ARG using IP system

    International Nuclear Information System (INIS)

    Nakajima, Eiichi; Kawai, Kenji; Furuta, Yoshitake

    1997-01-01

    Recent progress in imaging plate (IP) system allow us to analyze autoradiographic images quantitatively. In the 'whole-body autoradiography', a method clarify the distribution of radioisotope or labeled compounds in the tissues and organs in a freeze-dried whole-body section of small animals such as rats and mice, the sections are pressed against a IP for exposure and the IP is scanned by Bio-Imaging Analyzer (Fuji Photo Film Co., Ltd) and a digital autoradiographic image is given. Quantitative data concerning the activity in different tissues can be obtained using an isotope scale as a reference source. Fading effect, application of IP system for distribution of receptor binding ARG, analysis of radio-spots on TLC and radioactive concentration in liquid such as blood are also discussed. (author)

  10. Mathematical Representation of VoIP Connection Delay

    Directory of Open Access Journals (Sweden)

    M. Halas

    2007-09-01

    Full Text Available The main topic of this article is to define mathematical formulation of VoIP connection delay model. It handles about all partial delay components, the mechanism of their generation, facilities and their mathematical formulation. Thereafter based on mathematical formulation of all partial delay components, the final mathematical model of whole VoIP call delay is created. In conclusion of this article the results of the designed mathematical model are compared with the experimentally gained results.

  11. IP3 stimulates CA++ efflux from fusogenic carrot protoplasts

    International Nuclear Information System (INIS)

    Rincon, M.; Boss, W.F.

    1986-01-01

    Polyphosphoinositide breakdown plays an important role in signal transduction in animal cells (Berridge and Irvine, 1984, Nature, 312:315). Upon stimulation, phospholipase C hydrolyzes phosphatidylinositol 4,5-bisphosphate to inositol 1,4,5-trisphosphate (IP 3 ) and diacylglycerol both of which act as cellular second messengers. IP 3 mobilizes Ca ++ from internal stores, hence the cytosolic free Ca ++ concentration increases and those physiological activities regulated by Ca ++ are stimulated. To test if plant cells also responded to IP 3 , Ca ++ efflux studies were done with fusogenic carrot protoplasts released in EGTA. The protoplasts were preloaded with 45 Ca ++ placed in a Ca ++ -free medium, and efflux determined as 45 Ca ++ loss from the protoplasts. IP 3 (10-20μM) caused enhanced 45 Ca ++ efflux and the response was sustained for at least 15 min. In plants, as in animals, the observed IP 3 -enhanced 45 Ca ++ efflux suggested that IP 3 released Ca ++ from internal stores, and the increased free cytosolic Ca ++ activated Ca ++ pumping mechanisms which restored the Ca ++ concentration in the cytosol to the normal level

  12. Enabling new e-health business models by converging IP-based and non-IP-based home networks

    OpenAIRE

    Hartog, F.T.H. den; Tijmes, M.R.; Cramer, E.R.; Noorbergen, A.

    2013-01-01

    Current efforts in extending the Internet are focused on achieving full support of services and user-centric content from sectors such as energy management, education, and e-health. Until recently, these sectors typically developed their own communication infrastructure and systems, leading to point solutions, often built on non-IP technologies. We describe a demonstrator that shows how a non-IP supporting Continua-certified health device, such as a weighing scale, can be unlocked for use by ...

  13. Subtype-selective regulation of IP(3) receptors by thimerosal via cysteine residues within the IP(3)-binding core and suppressor domain.

    Science.gov (United States)

    Khan, Samir A; Rossi, Ana M; Riley, Andrew M; Potter, Barry V L; Taylor, Colin W

    2013-04-15

    IP(3)R (IP(3) [inositol 1,4,5-trisphosphate] receptors) and ryanodine receptors are the most widely expressed intracellular Ca(2+) channels and both are regulated by thiol reagents. In DT40 cells stably expressing single subtypes of mammalian IP(3)R, low concentrations of thimerosal (also known as thiomersal), which oxidizes thiols to form a thiomercurylethyl complex, increased the sensitivity of IP(3)-evoked Ca(2+) release via IP(3)R1 and IP(3)R2, but inhibited IP(3)R3. Activation of IP(3)R is initiated by IP(3) binding to the IBC (IP(3)-binding core; residues 224-604) and proceeds via re-arrangement of an interface between the IBC and SD (suppressor domain; residues 1-223). Thimerosal (100 μM) stimulated IP(3) binding to the isolated NT (N-terminal; residues 1-604) of IP(3)R1 and IP(3)R2, but not to that of IP(3)R3. Binding of a competitive antagonist (heparin) or partial agonist (dimeric-IP(3)) to NT1 was unaffected by thiomersal, suggesting that the effect of thimerosal is specifically related to IP(3)R activation. IP(3) binding to NT1 in which all cysteine residues were replaced by alanine was insensitive to thimerosal, so too were NT1 in which cysteine residues were replaced in either the SD or IBC. This demonstrates that thimerosal interacts directly with cysteine in both the SD and IBC. Chimaeric proteins in which the SD of the IP(3)R was replaced by the structurally related A domain of a ryanodine receptor were functional, but thimerosal inhibited both IP(3) binding to the chimaeric NT and IP(3)-evoked Ca(2+) release from the chimaeric IP(3)R. This is the first systematic analysis of the effects of a thiol reagent on each IP(3)R subtype. We conclude that thimerosal selectively sensitizes IP(3)R1 and IP(3)R2 to IP(3) by modifying cysteine residues within both the SD and IBC and thereby stabilizing an active conformation of the receptor.

  14. Subtype-selective regulation of IP3 receptors by thimerosal via cysteine residues within the IP3-binding core and suppressor domain

    Science.gov (United States)

    Khan, Samir A.; Rossi, Ana M.; Riley, Andrew M.; Potter, Barry V. L.; Taylor, Colin W.

    2013-01-01

    IP3R (IP3 [inositol 1,4,5-trisphosphate] receptors) and ryanodine receptors are the most widely expressed intracellular Ca2+ channels and both are regulated by thiol reagents. In DT40 cells stably expressing single subtypes of mammalian IP3R, low concentrations of thimerosal (also known as thiomersal), which oxidizes thiols to form a thiomercurylethyl complex, increased the sensitivity of IP3-evoked Ca2+ release via IP3R1 and IP3R2, but inhibited IP3R3. Activation of IP3R is initiated by IP3 binding to the IBC (IP3-binding core; residues 224–604) and proceeds via re-arrangement of an interface between the IBC and SD (suppressor domain; residues 1–223). Thimerosal (100 μM) stimulated IP3 binding to the isolated NT (N-terminal; residues 1–604) of IP3R1 and IP3R2, but not to that of IP3R3. Binding of a competitive antagonist (heparin) or partial agonist (dimeric-IP3) to NT1 was unaffected by thiomersal, suggesting that the effect of thimerosal is specifically related to IP3R activation. IP3 binding to NT1 in which all cysteine residues were replaced by alanine was insensitive to thimerosal, so too were NT1 in which cysteine residues were replaced in either the SD or IBC. This demonstrates that thimerosal interacts directly with cysteine in both the SD and IBC. Chimaeric proteins in which the SD of the IP3R was replaced by the structurally related A domain of a ryanodine receptor were functional, but thimerosal inhibited both IP3 binding to the chimaeric NT and IP3-evoked Ca2+ release from the chimaeric IP3R. This is the first systematic analysis of the effects of a thiol reagent on each IP3R subtype. We conclude that thimerosal selectively sensitizes IP3R1 and IP3R2 to IP3 by modifying cysteine residues within both the SD and IBC and thereby stabilizing an active conformation of the receptor. PMID:23282150

  15. Combining super-ensembles and statistical emulation to improve a regional climate and vegetation model

    Science.gov (United States)

    Hawkins, L. R.; Rupp, D. E.; Li, S.; Sarah, S.; McNeall, D. J.; Mote, P.; Betts, R. A.; Wallom, D.

    2017-12-01

    Changing regional patterns of surface temperature, precipitation, and humidity may cause ecosystem-scale changes in vegetation, altering the distribution of trees, shrubs, and grasses. A changing vegetation distribution, in turn, alters the albedo, latent heat flux, and carbon exchanged with the atmosphere with resulting feedbacks onto the regional climate. However, a wide range of earth-system processes that affect the carbon, energy, and hydrologic cycles occur at sub grid scales in climate models and must be parameterized. The appropriate parameter values in such parameterizations are often poorly constrained, leading to uncertainty in predictions of how the ecosystem will respond to changes in forcing. To better understand the sensitivity of regional climate to parameter selection and to improve regional climate and vegetation simulations, we used a large perturbed physics ensemble and a suite of statistical emulators. We dynamically downscaled a super-ensemble (multiple parameter sets and multiple initial conditions) of global climate simulations using a 25-km resolution regional climate model HadRM3p with the land-surface scheme MOSES2 and dynamic vegetation module TRIFFID. We simultaneously perturbed land surface parameters relating to the exchange of carbon, water, and energy between the land surface and atmosphere in a large super-ensemble of regional climate simulations over the western US. Statistical emulation was used as a computationally cost-effective tool to explore uncertainties in interactions. Regions of parameter space that did not satisfy observational constraints were eliminated and an ensemble of parameter sets that reduce regional biases and span a range of plausible interactions among earth system processes were selected. This study demonstrated that by combining super-ensemble simulations with statistical emulation, simulations of regional climate could be improved while simultaneously accounting for a range of plausible land

  16. Uncertainty-based simulation-optimization using Gaussian process emulation: Application to coastal groundwater management

    Science.gov (United States)

    Rajabi, Mohammad Mahdi; Ketabchi, Hamed

    2017-12-01

    Combined simulation-optimization (S/O) schemes have long been recognized as a valuable tool in coastal groundwater management (CGM). However, previous applications have mostly relied on deterministic seawater intrusion (SWI) simulations. This is a questionable simplification, knowing that SWI models are inevitably prone to epistemic and aleatory uncertainty, and hence a management strategy obtained through S/O without consideration of uncertainty may result in significantly different real-world outcomes than expected. However, two key issues have hindered the use of uncertainty-based S/O schemes in CGM, which are addressed in this paper. The first issue is how to solve the computational challenges resulting from the need to perform massive numbers of simulations. The second issue is how the management problem is formulated in presence of uncertainty. We propose the use of Gaussian process (GP) emulation as a valuable tool in solving the computational challenges of uncertainty-based S/O in CGM. We apply GP emulation to the case study of Kish Island (located in the Persian Gulf) using an uncertainty-based S/O algorithm which relies on continuous ant colony optimization and Monte Carlo simulation. In doing so, we show that GP emulation can provide an acceptable level of accuracy, with no bias and low statistical dispersion, while tremendously reducing the computational time. Moreover, five new formulations for uncertainty-based S/O are presented based on concepts such as energy distances, prediction intervals and probabilities of SWI occurrence. We analyze the proposed formulations with respect to their resulting optimized solutions, the sensitivity of the solutions to the intended reliability levels, and the variations resulting from repeated optimization runs.

  17. Causal knowledge and imitation/emulation switching in chimpanzees (Pan troglodytes) and children (Homo sapiens).

    Science.gov (United States)

    Horner, Victoria; Whiten, Andrew

    2005-07-01

    This study explored whether the tendency of chimpanzees and children to use emulation or imitation to solve a tool-using task was a response to the availability of causal information. Young wild-born chimpanzees from an African sanctuary and 3- to 4-year-old children observed a human demonstrator use a tool to retrieve a reward from a puzzle-box. The demonstration involved both causally relevant and irrelevant actions, and the box was presented in each of two conditions: opaque and clear. In the opaque condition, causal information about the effect of the tool inside the box was not available, and hence it was impossible to differentiate between the relevant and irrelevant parts of the demonstration. However, in the clear condition causal information was available, and subjects could potentially determine which actions were necessary. When chimpanzees were presented with the opaque box, they reproduced both the relevant and irrelevant actions, thus imitating the overall structure of the task. When the box was presented in the clear condition they instead ignored the irrelevant actions in favour of a more efficient, emulative technique. These results suggest that emulation is the favoured strategy of chimpanzees when sufficient causal information is available. However, if such information is not available, chimpanzees are prone to employ a more comprehensive copy of an observed action. In contrast to the chimpanzees, children employed imitation to solve the task in both conditions, at the expense of efficiency. We suggest that the difference in performance of chimpanzees and children may be due to a greater susceptibility of children to cultural conventions, perhaps combined with a differential focus on the results, actions and goals of the demonstrator.

  18. Evaluating the accuracy of climate change pattern emulation for low warming targets

    Science.gov (United States)

    Tebaldi, Claudia; Knutti, Reto

    2018-05-01

    Global climate policy is increasingly debating the value of very low warming targets, yet not many experiments conducted with global climate models in their fully coupled versions are currently available to help inform studies of the corresponding impacts. This raises the question whether a map of warming or precipitation change in a world 1.5 °C warmer than preindustrial can be emulated from existing simulations that reach higher warming targets, or whether entirely new simulations are required. Here we show that also for this type of low warming in strong mitigation scenarios, climate change signals are quite linear as a function of global temperature. Therefore, emulation techniques amounting to linear rescaling on the basis of global temperature change ratios (like simple pattern scaling) provide a viable way forward. The errors introduced are small relative to the spread in the forced response to a given scenario that we can assess from a multi-model ensemble. They are also small relative to the noise introduced into the estimates of the forced response by internal variability within a single model, which we can assess from either control simulations or initial condition ensembles. Challenges arise when scaling inadvertently reduces the inter-model spread or suppresses the internal variability, both important sources of uncertainty for impact assessment, or when the scenarios have very different characteristics in the composition of the forcings. Taking advantage of an available suite of coupled model simulations under low-warming and intermediate scenarios, we evaluate the accuracy of these emulation techniques and show that they are unlikely to represent a substantial contribution to the total uncertainty.

  19. The use of perturbed physics ensembles and emulation in palaeoclimate reconstruction (Invited)

    Science.gov (United States)

    Edwards, T. L.; Rougier, J.; Collins, M.

    2010-12-01

    Climate is a coherent process, with correlations and dependencies across space, time, and climate variables. However, reconstructions of palaeoclimate traditionally consider individual pieces of information independently, rather than making use of this covariance structure. Such reconstructions are at risk of being unphysical or at least implausible. Climate simulators such as General Circulation Models (GCMs), on the other hand, contain climate system theory in the form of dynamical equations describing physical processes, but are imperfect and computationally expensive. These two datasets - pointwise palaeoclimate reconstructions and climate simulator evaluations - contain complementary information, and a statistical synthesis can produce a palaeoclimate reconstruction that combines them while not ignoring their limitations. We use an ensemble of simulators with perturbed parameterisations, to capture the uncertainty about the simulator variant, and our method also accounts for structural uncertainty. The resulting reconstruction contains a full expression of climate uncertainty, not just pointwise but also jointly over locations. Such joint information is crucial in determining spatially extensive features such as isotherms, or the location of the tree-line. A second outcome of the statistical analysis is a refined distribution for the simulator parameters. In this way, information from palaeoclimate observations can be used directly in quantifying uncertainty in future climate projections. The main challenge is the expense of running a large scale climate simulator: each evaluation of an atmosphere-ocean GCM takes several months of computing time. The solution is to interpret the ensemble of evaluations within an 'emulator', which is a statistical model of the simulator. This technique has been used fruitfully in the statistical field of Computer Models for two decades, and has recently been applied in estimating uncertainty in future climate predictions in the

  20. FPGAs Emulate Microprocessors-A Successful Case for HFC NPP Digital I and C Upgrade

    International Nuclear Information System (INIS)

    Hsu, Allen; Crow, Ivan; Reese, Carl; Kim, Jong; Yang, Steve

    2014-01-01

    Field Programmable Gate Arrays (FPGAs), as programmable logic devices (PLDs) have gained a great deal of interests for implementing safety I and C applications in nuclear power plants (NPPs) largely owing to the FPGAs'potential advantage over the currently more common microprocessor-based digital I and C applications. First of all, FPGAs have adequate capabilities for most digital I and C applications in NPPs. Secondly, FPGAs provide products with longer lifetime, improve testability, and reduce the drift which occurs in analog-based systems, from hardware perspective. Thirdly, FPGAs, from software perspective, can be made simpler, less reliant on complex software such as operating systems, which should make FPGAs easier to qualify for nuclear safety applications. Fourthly, FPGAs are less vulnerable to cyber attacks when FPGAs implement the I and C systems that do not contain high-level, general purpose software that may be easily subjected to malicious modifications. Finally, FPGAs can bring cost reduction in an I and C digital upgrade because FPGAs can provide simpler licensing process than microprocessor-based digital I and C, and FPGAs can be implemented more efficiently. This paper will present one successful case for YGN Unit I and C upgrade using FPGA-based components to replace the obsolete Intel 8085 Microprocessor-based controllers. In this case, FPGAs emulated the process of the existing microprocessors and interpreted the execution of CPU processing. More than 160 of the FPGA-based SBC-01 controllers replacing the Intel 8085 Microprocessor-based Printed Circuit Boards have been installed and running successfully for safety I and C applications over the last five years. In this upgrade, the new FPGA-based controller board SBC-01 emulated the functions of Intel 8085 microprocessor correctly. It is a successful and cost-effective upgrade.vIn this paper, lifecycle design and implementation process and rigorous V and V activities that were used in the

  1. FPGAs Emulate Microprocessors-A Successful Case for HFC NPP Digital I and C Upgrade

    Energy Technology Data Exchange (ETDEWEB)

    Hsu, Allen; Crow, Ivan; Reese, Carl; Kim, Jong; Yang, Steve [Doosan HF Controls Corp, Carrollton (United States)

    2014-08-15

    Field Programmable Gate Arrays (FPGAs), as programmable logic devices (PLDs) have gained a great deal of interests for implementing safety I and C applications in nuclear power plants (NPPs) largely owing to the FPGAs'potential advantage over the currently more common microprocessor-based digital I and C applications. First of all, FPGAs have adequate capabilities for most digital I and C applications in NPPs. Secondly, FPGAs provide products with longer lifetime, improve testability, and reduce the drift which occurs in analog-based systems, from hardware perspective. Thirdly, FPGAs, from software perspective, can be made simpler, less reliant on complex software such as operating systems, which should make FPGAs easier to qualify for nuclear safety applications. Fourthly, FPGAs are less vulnerable to cyber attacks when FPGAs implement the I and C systems that do not contain high-level, general purpose software that may be easily subjected to malicious modifications. Finally, FPGAs can bring cost reduction in an I and C digital upgrade because FPGAs can provide simpler licensing process than microprocessor-based digital I and C, and FPGAs can be implemented more efficiently. This paper will present one successful case for YGN Unit I and C upgrade using FPGA-based components to replace the obsolete Intel 8085 Microprocessor-based controllers. In this case, FPGAs emulated the process of the existing microprocessors and interpreted the execution of CPU processing. More than 160 of the FPGA-based SBC-01 controllers replacing the Intel 8085 Microprocessor-based Printed Circuit Boards have been installed and running successfully for safety I and C applications over the last five years. In this upgrade, the new FPGA-based controller board SBC-01 emulated the functions of Intel 8085 microprocessor correctly. It is a successful and cost-effective upgrade.vIn this paper, lifecycle design and implementation process and rigorous V and V activities that were used in the

  2. A state space approach to the emulator-based GPC design

    DEFF Research Database (Denmark)

    Jensen, Morten Rostgaard; Lauritsen, Morten Bach; Poulsen, Niels Kjølstad

    1996-01-01

    in models and designs based on the delta-operator. The GPC controller is interesting since it is a controller that successfully has been applied to many industrial process during the last decade. The present paper discusses an emulator-based GPC, a controller design intended for fast sampled adaptive......For sampled dynamical systems the delta-operator is an appealing alternative to the conventional shift operator since at rapid sampling rates it shows better numerical properties and a closer rapprochement to the continuous-time description. Thus, the structural information is easy to interpret...... control systems where the conventional q-based techniques fail due to poor word-length characteristics....

  3. Towards Emulation-as-a-Service: Cloud Services for Versatile Digital Object Access

    Directory of Open Access Journals (Sweden)

    Dirk von Suchodoletz

    2013-06-01

    Full Text Available The changing world of IT services opens the chance to more tightly integrate digital long-term preservation into systems, both for commercial and end users. The emergence of cloud offerings re-centralizes services, and end users interact with them remotely through standardized (web-client applications on their various devices. This offers the chance to use partially the same concepts and methods to access obsolete computer environments and allows for more sustainable business processes. In order to provide a large variety of user-friendly remote emulation services, especially in combination with authentic performance and user experience, a distributed system model and architecture is required, suitable to run as a cloud service, allowing for the specialization both of memory institutions and third party service providers.The shift of the usually non-trivial task of the emulation of obsolete software environments from the end user to specialized providers can help to simplify digital preservation and access strategies. Besides offering their users better access to their holdings, libraries and archives may gain new business opportunities to offer services to a third party, such as businesses requiring authentic reproduction of digital objects and processes for legal reasons. This paper discusses cloud concepts as the next logical step for accessing original digital material. Emulation-as-a-Service (EaaS fills the gap between the successful demonstration of emulation strategies as a long term access strategy and it’s perceived availability and usability. EaaS can build upon the ground of research and prototypical implementations of previous projects, and reuse well established remote access technology.In this article we develop requirements and a system model, suitable for a distributed environment. We will discuss the building blocks of the core services as well as requirements regarding access management. Finally, we will try to present a

  4. Security of IP Telephony in Ecuador: Online Analysis

    Directory of Open Access Journals (Sweden)

    José Estrada

    2016-06-01

    Full Text Available Telephony is a global service and thus telephone networks have been a coveted target for criminals. Now that voice can be transported over IP and that multiple services are integrated in a convergent model through Internet, there are more incentives to attack and more attackers. Moreover, the development of open source telephone applications has encouraged the massive use of IP telephony, but not an increased awareness about embedded security risks. Due to the current and intensive adoption of IP telephony systems in Ecuador, we conducted an exploration based on public information to obtain statistics about telephone systems connected to Internet in Ecuador. Additionally, using a deliberately vulnerable IP telephony system, we collected more data to do a preliminary analysis of threats to such systems. We found that hundreds of telephone systems were publicly available on the Internet and using outdated versions of Asterisk-based applications. We also found thousands of malicious interactions on the IP telephony system we deployed on the Internet.

  5. Modeling ChIP sequencing in silico with applications.

    Directory of Open Access Journals (Sweden)

    Zhengdong D Zhang

    2008-08-01

    Full Text Available ChIP sequencing (ChIP-seq is a new method for genomewide mapping of protein binding sites on DNA. It has generated much excitement in functional genomics. To score data and determine adequate sequencing depth, both the genomic background and the binding sites must be properly modeled. To develop a computational foundation to tackle these issues, we first performed a study to characterize the observed statistical nature of this new type of high-throughput data. By linking sequence tags into clusters, we show that there are two components to the distribution of tag counts observed in a number of recent experiments: an initial power-law distribution and a subsequent long right tail. Then we develop in silico ChIP-seq, a computational method to simulate the experimental outcome by placing tags onto the genome according to particular assumed distributions for the actual binding sites and for the background genomic sequence. In contrast to current assumptions, our results show that both the background and the binding sites need to have a markedly nonuniform distribution in order to correctly model the observed ChIP-seq data, with, for instance, the background tag counts modeled by a gamma distribution. On the basis of these results, we extend an existing scoring approach by using a more realistic genomic-background model. This enables us to identify transcription-factor binding sites in ChIP-seq data in a statistically rigorous fashion.

  6. An ethernet/IP security review with intrusion detection applications

    International Nuclear Information System (INIS)

    Laughter, S. A.; Williams, R. D.

    2006-01-01

    Supervisory Control and Data Acquisition (SCADA) and automation networks, used throughout utility and manufacturing applications, have their own specific set of operational and security requirements when compared to corporate networks. The modern climate of heightened national security and awareness of terrorist threats has made the security of these systems of prime concern. There is a need to understand the vulnerabilities of these systems and how to monitor and protect them. Ethernet/IP is a member of a family of protocols based on the Control and Information Protocol (CIP). Ethernet/IP allows automation systems to be utilized on and integrated with traditional TCP/IP networks, facilitating integration of these networks with corporate systems and even the Internet. A review of the CIP protocol and the additions Ethernet/IP makes to it has been done to reveal the kind of attacks made possible through the protocol. A set of rules for the SNORT Intrusion Detection software is developed based on the results of the security review. These can be used to monitor, and possibly actively protect, a SCADA or automation network that utilizes Ethernet/IP in its infrastructure. (authors)

  7. The introspective may achieve more: Enhancing existing Geoscientific models with native-language emulated structural reflection

    Science.gov (United States)

    Ji, Xinye; Shen, Chaopeng

    2018-01-01

    Geoscientific models manage myriad and increasingly complex data structures as trans-disciplinary models are integrated. They often incur significant redundancy with cross-cutting tasks. Reflection, the ability of a program to inspect and modify its structure and behavior at runtime, is known as a powerful tool to improve code reusability, abstraction, and separation of concerns. Reflection is rarely adopted in high-performance Geoscientific models, especially with Fortran, where it was previously deemed implausible. Practical constraints of language and legacy often limit us to feather-weight, native-language solutions. We demonstrate the usefulness of a structural-reflection-emulating, dynamically-linked metaObjects, gd. We show real-world examples including data structure self-assembly, effortless input/output (IO) and upgrade to parallel I/O, recursive actions and batch operations. We share gd and a derived module that reproduces MATLAB-like structure in Fortran and C++. We suggest that both a gd representation and a Fortran-native representation are maintained to access the data, each for separate purposes. Embracing emulated reflection allows generically-written codes that are highly re-usable across projects.

  8. Technical study on semi-object emulation of structural statics problem

    International Nuclear Information System (INIS)

    Mo Jun; Shi Pingan; Liu Xingfu; Liu Zhiyong; Fu Chunyu

    2002-01-01

    Structural strength analysis depends mainly on finite element method and experiments. For complex structural system, a rather large error can be caused by some uncertain factors, such as load distributions, boundary conditions and constitutive relations in numerical analysis. At the same time, owing to the limitation of measuring and testing techniques, the strength and stiffness of key components can not be estimated by using the limited test data. To simulate stresses accurately under complex static environment, improve man-machine interactive system, and make the best use of fore- and post-processing function in graphic data processing, the authors combine numerical analysis with experimental technique and have developed the semi-object emulation technique to analyze the nonlinear problem of structure statics. The modern optical measuring techniques and image processing techniques are firstly used for the method to acquire displacement data of the vessel surface, and the data are used for the boundary condition to determine the geometrical size of disfigurement in the wall of vessel and the stress level. The experimental verification of a given test model show that these adverse problem can be solved by using semi-object emulation technology

  9. Neurokernel: An Open Source Platform for Emulating the Fruit Fly Brain.

    Directory of Open Access Journals (Sweden)

    Lev E Givon

    Full Text Available We have developed an open software platform called Neurokernel for collaborative development of comprehensive models of the brain of the fruit fly Drosophila melanogaster and their execution and testing on multiple Graphics Processing Units (GPUs. Neurokernel provides a programming model that capitalizes upon the structural organization of the fly brain into a fixed number of functional modules to distinguish between these modules' local information processing capabilities and the connectivity patterns that link them. By defining mandatory communication interfaces that specify how data is transmitted between models of each of these modules regardless of their internal design, Neurokernel explicitly enables multiple researchers to collaboratively model the fruit fly's entire brain by integration of their independently developed models of its constituent processing units. We demonstrate the power of Neurokernel's model integration by combining independently developed models of the retina and lamina neuropils in the fly's visual system and by demonstrating their neuroinformation processing capability. We also illustrate Neurokernel's ability to take advantage of direct GPU-to-GPU data transfers with benchmarks that demonstrate scaling of Neurokernel's communication performance both over the number of interface ports exposed by an emulation's constituent modules and the total number of modules comprised by an emulation.

  10. Developing a real-time emulation of multiresolutional control architectures for complex, discrete-event systems

    Energy Technology Data Exchange (ETDEWEB)

    Davis, W.J.; Macro, J.G.; Brook, A.L. [Univ. of Illinois, Urbana, IL (United States)] [and others

    1996-12-31

    This paper first discusses an object-oriented, control architecture and then applies the architecture to produce a real-time software emulator for the Rapid Acquisition of Manufactured Parts (RAMP) flexible manufacturing system (FMS). In specifying the control architecture, the coordinated object is first defined as the primary modeling element. These coordinated objects are then integrated into a Recursive, Object-Oriented Coordination Hierarchy. A new simulation methodology, the Hierarchical Object-Oriented Programmable Logic Simulator, is then employed to model the interactions among the coordinated objects. The final step in implementing the emulator is to distribute the models of the coordinated objects over a network of computers and to synchronize their operation to a real-time clock. The paper then introduces the Hierarchical Subsystem Controller as an intelligent controller for the coordinated object. The proposed approach to intelligent control is then compared to the concept of multiresolutional semiosis that has been developed by Dr. Alex Meystel. Finally, the plans for implementing an intelligent controller for the RAMP FMS are discussed.

  11. Muscle emulation with DC motor and neural networks for biped robots.

    Science.gov (United States)

    Serhan, Hayssam; Nasr, Chaiban G; Henaff, Patrick

    2010-08-01

    This paper shows how to use a DC motor and its PID controller, to behave analogously to a muscle. A model of the muscle that has been learned by a NNARX (Neural Network Auto Regressive eXogenous) structure is used. The PID parameters are tuned by an MLP Network with a special indirect online learning algorithm. The calculation of the learning algorithm is performed based on a mathematical equation of the DC motor or with a Neural Network identification of the motor. For each of the two algorithms, the output of the muscle model is used as a reference for the DC motor control loop. The results show that we succeeded in forcing the physical system to behave in the same way as the muscle model with acceptable margin of error. An implementation in the knees of a simulated biped robot is realized. Simulation compares articular trajectories with and without the muscle emulator and shows that with muscle emulator, articular trajectories become closer to the human being ones and that total power consumption is reduced.

  12. Calibration of uncertain inputs to computer models using experimentally measured quantities and the BMARS emulator

    International Nuclear Information System (INIS)

    Stripling, H.F.; McClarren, R.G.; Kuranz, C.C.; Grosskopf, M.J.; Rutter, E.; Torralva, B.R.

    2011-01-01

    We present a method for calibrating the uncertain inputs to a computer model using available experimental data. The goal of the procedure is to produce posterior distributions of the uncertain inputs such that when samples from the posteriors are used as inputs to future model runs, the model is more likely to replicate (or predict) the experimental response. The calibration is performed by sampling the space of the uncertain inputs, using the computer model (or, more likely, an emulator for the computer model) to assign weights to the samples, and applying the weights to produce the posterior distributions and generate predictions of new experiments within confidence bounds. The method is similar to the Markov chain Monte Carlo (MCMC) calibration methods with independent sampling with the exception that we generate samples beforehand and replace the candidate acceptance routine with a weighting scheme. We apply our method to the calibration of a Hyades 2D model of laser energy deposition in beryllium. We employ a Bayesian Multivariate Adaptive Regression Splines (BMARS) emulator as a surrogate for Hyades 2D. We treat a range of uncertainties in our system, including uncertainties in the experimental inputs, experimental measurement error, and systematic experimental timing errors. The results of the calibration are posterior distributions that both agree with intuition and improve the accuracy and decrease the uncertainty in experimental predictions. (author)

  13. Space Link Extension (SLE) Emulation for High-Throughput Network Communication

    Science.gov (United States)

    Murawski, Robert W.; Tchorowski, Nicole; Golden, Bert

    2014-01-01

    As the data rate requirements for space communications increases, significant stress is placed not only on the wireless satellite communication links, but also on the ground networks which forward data from end-users to remote ground stations. These wide area network (WAN) connections add delay and jitter to the end-to-end satellite communication link, effects which can have significant impacts on the wireless communication link. It is imperative that any ground communication protocol can react to these effects such that the ground network does not become a bottleneck in the communication path to the satellite. In this paper, we present our SCENIC Emulation Lab testbed which was developed to test the CCSDS SLE protocol implementations proposed for use on future NASA communication networks. Our results show that in the presence of realistic levels of network delay, high-throughput SLE communication links can experience significant data rate throttling. Based on our observations, we present some insight into why this data throttling happens, and trace the probable issue back to non-optimal blocking communication which is sup-ported by the CCSDS SLE API recommended practices. These issues were presented as well to the SLE implementation developers which, based on our reports, developed a new release for SLE which we show fixes the SLE blocking issue and greatly improves the protocol throughput. In this paper, we also discuss future developments for our end-to-end emulation lab and how these improvements can be used to develop and test future space communication technologies.

  14. Manufacture and characterization of breast tissue phantoms for emulating benign lesions

    Science.gov (United States)

    Villamarín, J. A.; Rojas, M. A.; Potosi, O. M.; Narváez-Semanate, J. L.; Gaviria, C.

    2017-11-01

    Phantoms elaboration has turned a very important field of study during the last decades due to its applications in medicine. These objects are capable of emulating or mimicking acoustically biological tissues in which parameters like speed of sound (SOS) and attenuation are successfully attained. However, these materials are expensive depending on their characteristics (USD 460.00 - 6000.00) and is difficult to have precise measurements because of their composition. This paper presents the elaboration and characterization of low cost ( USD $25.00) breast phantoms which emulate histological normality and pathological conditions in order to support algorithm calibration procedures in imaging diagnosis. Quantitative ultrasound (QUS) was applied to estimate SOS and attenuation values for breast tissue (background) and benign lesions (fibroadenoma and cysts). Results showed values of the SOS and attenuation for the background between 1410 - 1450 m/s and 0.40 - 0.55 dB/cm at 1 MHz sampling frequency, respectively. On the other hand, the SOS obtained for the lesions ranges from 1350 to 1700 m/s and attenuation values between 0.50 - 1.80 dB/cm at 1 MHz. Finally, the fabricated phantoms allowed for obtaining ultrasonograms comparable with real ones whose acoustic parameters are in agree with those reported in the literature.

  15. rpe v5: an emulator for reduced floating-point precision in large numerical simulations

    Science.gov (United States)

    Dawson, Andrew; Düben, Peter D.

    2017-06-01

    This paper describes the rpe (reduced-precision emulator) library which has the capability to emulate the use of arbitrary reduced floating-point precision within large numerical models written in Fortran. The rpe software allows model developers to test how reduced floating-point precision affects the result of their simulations without having to make extensive code changes or port the model onto specialized hardware. The software can be used to identify parts of a program that are problematic for numerical precision and to guide changes to the program to allow a stronger reduction in precision.The development of rpe was motivated by the strong demand for more computing power. If numerical precision can be reduced for an application under consideration while still achieving results of acceptable quality, computational cost can be reduced, since a reduction in numerical precision may allow an increase in performance or a reduction in power consumption. For simulations with weather and climate models, savings due to a reduction in precision could be reinvested to allow model simulations at higher spatial resolution or complexity, or to increase the number of ensemble members to improve predictions. rpe was developed with a particular focus on the community of weather and climate modelling, but the software could be used with numerical simulations from other domains.

  16. Development of a Radio Frequency Space Environment Path Emulator for Evaluating Spacecraft Ranging Hardware

    Science.gov (United States)

    Mitchell, Jason W.; Baldwin, Philip J.; Kurichh, Rishi; Naasz, Bo J.; Luquette, Richard J.

    2007-01-01

    The Formation Flying Testbed (FFTB) at the National Aeronautics and Space Administration (NASA) Goddard Space Flight Center (GSFC) provides a hardware-in-the-loop test environment for formation navigation and control. The facility is evolving as a modular, hybrid, dynamic simulation facility for end-to-end guidance, navigation and. control (GN&C) design and analysis of formation flying spacecraft. The core capabilities of the FFTB, as a platform for testing critical hardware and software algorithms in-the-loop, have expanded to include S-band Radio Frequency (RF) modems for inter-spacecraft communication and ranging. To enable realistic simulations that require RF ranging sensors for relative navigation, a mechanism is needed to buffer the RF signals exchanged between spacecraft that accurately emulates the dynamic environment through which the RF signals travel, including the effects of medium, moving platforms, and radiated power. The Path Emulator for RF Signals (PERFS), currently under development at NASA GSFC, provides this capability. The function and performance of a prototype device are presented.

  17. Characterization of a Prototype Radio Frequency Space Environment Path Emulator for Evaluating Spacecraft Ranging Hardware

    Science.gov (United States)

    Mitchell, Jason W.; Baldwin, Philip J.; Kurichh, Rishi; Naasz, Bo J.; Luquette, Richard J.

    2007-01-01

    The Formation Flying Testbed (FFTB) at the National Aeronautics and Space Administration (NASA) Goddard Space Flight Center (GSFC) provides a hardware-in-the-loop test environment for formation navigation and control. The facility is evolving as a modular, hybrid, dynamic simulation facility for end-to-end guidance, navigation and control (GN&C) design and analysis of formation flying spacecraft. The core capabilities of the FFTB, as a platform for testing critical hardware and software algorithms in-the-loop, have expanded to include S-band Radio Frequency (RF) modems for interspacecraft communication and ranging. To enable realistic simulations that require RF ranging sensors for relative navigation, a mechanism is needed to buffer the RF signals exchanged between spacecraft that accurately emulates the dynamic environment through which the RF signals travel, including the effects of the medium, moving platforms, and radiated power. The Path Emulator for Radio Frequency Signals (PERFS), currently under development at NASA GSFC, provides this capability. The function and performance of a prototype device are presented.

  18. DiffServ resource management in IP-based radio access networks

    NARCIS (Netherlands)

    Heijenk, Geert; Karagiannis, Georgios; Rexhepi, Vlora; Westberg, Lars; prof.dr. Prasad, R.; prof.dr. Bach Andersen, J.

    2001-01-01

    The increasing popularity of the Internet, the flexibility of IP, and the wide deployment of IP technologies, as well as the growth of mobile communications have driven the development of IP-based solutions for wireless networking. The introduction of IP-based transport in Radio Access Networks

  19. Long-Term Synaptic Plasticity Emulated in Modified Graphene Oxide Electrolyte Gated IZO-Based Thin-Film Transistors.

    Science.gov (United States)

    Yang, Yi; Wen, Juan; Guo, Liqiang; Wan, Xiang; Du, Peifu; Feng, Ping; Shi, Yi; Wan, Qing

    2016-11-09

    Emulating neural behaviors at the synaptic level is of great significance for building neuromorphic computational systems and realizing artificial intelligence. Here, oxide-based electric double-layer (EDL) thin-film transistors were fabricated using 3-triethoxysilylpropylamine modified graphene oxide (KH550-GO) electrolyte as the gate dielectrics. Resulting from the EDL effect and electrochemical doping between mobile protons and the indium-zinc-oxide channel layer, long-term synaptic plasticity was emulated in our devices. Synaptic functions including long-term memory, synaptic temporal integration, and dynamic filters were successfully reproduced. In particular, spike rate-dependent plasticity (SRDP), one of the basic learning rules of long-term plasticity in the neural network where the synaptic weight changes according to the rate of presynaptic spikes, was emulated in our devices. Our results may facilitate the development of neuromorphic computational systems.

  20. Capturing value from IP in a global environment

    DEFF Research Database (Denmark)

    Alcacer, Juan; Beukel, Karin; Cassiman, Bruno

    Executive Summary The authors argue that challenges to capturing value from know-how and reputation through the use of different IP tools will be an increasingly important matter of strategy for global enterprises. This has important implications for management practice. Global enterprises...... will need to combine different institutional, market and non-market mechanisms. The precise combination of tools will depend on the local and regional institutional and market conditions. Abstract: This paper documents the strong growth in tools used by firms to protect their intellectual property (IP......), develop their know-how, and build and maintain their reputation globally during the last decades. We focus on three tools: patents, trademarks, and industrial designs. We find that, although most IP applications come from a few countries (the United States, European Union, Japan, China, and South Korea...

  1. Implementasi Server VoIP Berbasis SIP Pada LAN Nirkabel

    Directory of Open Access Journals (Sweden)

    Mohammad Shoffa Al Arofat

    2013-03-01

    Full Text Available Voice over Internet Protocol (VoIP merupakan teknologi yang memungkinkan percakapan suara jarak jauh melalui protokol internet. Dalam telekomunikasi, diperlukan teknologi pensinyalan yang berguna untuk membangun, mengawasi, dan melepas hubungan antara dua titik. Salah satu teknologi pensinyalan yang banyak digunakan untuk VoIP adalah Session Initiation Protocol, dengan implementasinya yang berupa perangkat lunak Open SIP Server. Selain pensinyalan, ada beberapa parameter yang perlu diperhatikan dalam implementasi VoIP, yaitu Mean Opinion Score (MOS, network impairment, dan bandwidth. Pengujian dilakukan terhadap enam codec, yaitu G.722, PCMA, PCMU, Speex, GSM, dan BV16. Berdasarkan hasil analisis dapat diambil kesimpulan bahwa codec yang menggunakan bandwidth paling rendah adalah Speex (27,12 kbps; Rata-rata delay yang dihasilkan oleh sipdroid lebih baik daripada jitsi.

  2. Firewall for Dynamic IP Address in Mobile IPv6

    Science.gov (United States)

    Qiu, Ying; Bao, Feng; Zhou, Jianying

    Mobile communication is becoming the mainstream with the rapid growth of mobile devices penetrating our daily life. More and more mobile devices such as mobile phones, personal digital assistants, notebooks etc, are capable of Internet access. Mobile devices frequently change their communication IP addresses in mobile IPv6 network following its current attached domain. This raises a big challenge for building firewall for mobile devices. The conventional firewalls are primarily based on IPv4 networks where the security criteria are specified only to the fixed IP addresses or subnets, which apparently do not apply to mobile IPv6. In this paper we propose three solutions for mobile IPv6 firewall. Our approaches make the firewall adaptive to dynamic IP addresses in mobile IPv6 network. They have different expense and weight corresponding to different degree of universality. The paper focuses the study more from practical aspect.

  3. Which IP Strategies Do Young Highly Innovative Firms Choose

    DEFF Research Database (Denmark)

    Veugelers, Reinhilde; Schneider, Cédric

    2018-01-01

    This paper describes and analyzes the strategies of young highly innovative companies to appropriate the returns from their innovations. Upon controlling for other firm and industry characteristics, we show that firms combining a young age and small scale with a high R&D intensive profile are mor...... likely to use intellectual property (IP), specifically combining formal and informal appropriation mechanisms. They are especially more likely to choose secrecy in combination with formal IP. This holds primarily when they introduce more radical innovations new to the market....

  4. Transition in complex calcium bursting induced by IP3 degradation

    International Nuclear Information System (INIS)

    Zhang Feng; Lu Qishao; Su Jianzhong

    2009-01-01

    Complex intracellular Ca 2+ oscillations are systematically investigated in a mathematical model based on the mechanism of Ca 2+ -induced Ca 2+ release (CICR), taking account of the Ca 2+ -stimulated degradation of inositol 1,4,5-trisphosphate (IP 3 ) by a 3-kinase. Periodic, quasi-periodic and chaotic bursting oscillations exist in a wide range of parameter values and occur alternatively as the parameters change slightly. The transition among them can be observed by the evidence in their interspike interval and the Lyapunov exponent. These results reveal the role of agonist-stimulated of IP 3 degradation as a possible source for complex patterns in Ca 2+ signaling.

  5. A Study on IP Network Recovery through Routing Protocols

    Directory of Open Access Journals (Sweden)

    K. Karthik

    2016-09-01

    Full Text Available Internet has taken major role in our communication infrastructure. Such that requirement of internet availability and reliability has increasing accordingly. The major network failure reasons are failure of node and failure of link among the nodes. This can reduce the performance of major applications in an IP networks. The network recovery should be fast enough so that service interruption of link or node failure. The new path taken by the diverted traffic can be computed either at the time of failures or before failures. These mechanisms are known as Reactive and Proactive protocols respectively. In this paper, we surveyed reactive and proactive protocols mechanisms for IP network recovery.

  6. Application Filters for TCP/IP Industrial Automation Protocols

    Science.gov (United States)

    Batista, Aguinaldo B.; Kobayashi, Tiago H.; Medeiros, João Paulo S.; Brito, Agostinho M.; Motta Pires, Paulo S.

    The use of firewalls is a common approach usually meant to secure Automation Technology (AT) from Information Technology (TI) networks. This work proposes a filtering system for TCP/IP-based automation networks in which only certain kind of industrial traffic is permitted. All network traffic which does not conform with a proper industrial protocol pattern or with specific rules for its actions is supposed to be abnormal and must be blocked. As a case study, we developed a seventh layer firewall application with the ability of blocking spurious traffic, using an IP packet queueing engine and a regular expression library.

  7. The CANopen Controller IP Core: Implementation, Synthesis and Test Results

    Science.gov (United States)

    Caramia, Maurizio; Bolognino, Luca; Montagna, Mario; Tosi, Pietro; Errico, Walter; Bigongiari, Franco; Furano, Gianluca

    2011-08-01

    This paper will describe the implementation and test results of the CANopen Controller IP Core (CCIPC) implemented by Thales Alenia Space and SITAEL Aerospace with the support of ESA in the frame of the EXOMARS Project. The CCIPC is a configurable VHDL implementation of the CANOPEN protocol [1]; it is foreseen to be used as CAN bus slave controller within the EXOMARS Entry Descending and Landing Demonstrato Module (EDM) and Rover Module. The CCIPC features, configuration capability, synthesis and test results will be described and the evidence of the state of maturity of this innovative IP core will be demonstrated.

  8. Solar Type II Radio Bursts and IP Type II Events

    Science.gov (United States)

    Cane, H. V.; Erickson, W. C.

    2005-01-01

    We have examined radio data from the WAVES experiment on the Wind spacecraft in conjunction with ground-based data in order to investigate the relationship between the shocks responsible for metric type II radio bursts and the shocks in front of coronal mass ejections (CMEs). The bow shocks of fast, large CMEs are strong interplanetary (IP) shocks, and the associated radio emissions often consist of single broad bands starting below approx. 4 MHz; such emissions were previously called IP type II events. In contrast, metric type II bursts are usually narrowbanded and display two harmonically related bands. In addition to displaying complete dynamic spectra for a number of events, we also analyze the 135 WAVES 1 - 14 MHz slow-drift time periods in 2001-2003. We find that most of the periods contain multiple phenomena, which we divide into three groups: metric type II extensions, IP type II events, and blobs and bands. About half of the WAVES listings include probable extensions of metric type II radio bursts, but in more than half of these events, there were also other slow-drift features. In the 3 yr study period, there were 31 IP type II events; these were associated with the very fastest CMEs. The most common form of activity in the WAVES events, blobs and bands in the frequency range between 1 and 8 MHz, fall below an envelope consistent with the early signatures of an IP type II event. However, most of this activity lasts only a few tens of minutes, whereas IP type II events last for many hours. In this study we find many examples in the radio data of two shock-like phenomena with different characteristics that occur simultaneously in the metric and decametric/hectometric bands, and no clear example of a metric type II burst that extends continuously down in frequency to become an IP type II event. The simplest interpretation is that metric type II bursts, unlike IP type II events, are not caused by shocks driven in front of CMEs.

  9. Simulation, measurement, and emulation of photovoltaic modules using high frequency and high power density power electronic circuits

    Science.gov (United States)

    Erkaya, Yunus

    The number of solar photovoltaic (PV) installations is growing exponentially, and to improve the energy yield and the efficiency of PV systems, it is necessary to have correct methods for simulation, measurement, and emulation. PV systems can be simulated using PV models for different configurations and technologies of PV modules. Additionally, different environmental conditions of solar irradiance, temperature, and partial shading can be incorporated in the model to accurately simulate PV systems for any given condition. The electrical measurement of PV systems both prior to and after making electrical connections is important for attaining high efficiency and reliability. Measuring PV modules using a current-voltage (I-V) curve tracer allows the installer to know whether the PV modules are 100% operational. The installed modules can be properly matched to maximize performance. Once installed, the whole system needs to be characterized similarly to detect mismatches, partial shading, or installation damage before energizing the system. This will prevent any reliability issues from the onset and ensure the system efficiency will remain high. A capacitive load is implemented in making I-V curve measurements with the goal of minimizing the curve tracer volume and cost. Additionally, the increase of measurement resolution and accuracy is possible via the use of accurate voltage and current measurement methods and accurate PV models to translate the curves to standard testing conditions. A move from mechanical relays to solid-state MOSFETs improved system reliability while significantly reducing device volume and costs. Finally, emulating PV modules is necessary for testing electrical components of a PV system. PV emulation simplifies and standardizes the tests allowing for different irradiance, temperature and partial shading levels to be easily tested. Proper emulation of PV modules requires an accurate and mathematically simple PV model that incorporates all known

  10. Programmable genetic algorithm IP core for sensing and surveillance applications

    Science.gov (United States)

    Katkoori, Srinivas; Fernando, Pradeep; Sankaran, Hariharan; Stoica, Adrian; Keymeulen, Didier; Zebulum, Ricardo

    2009-05-01

    Real-time evolvable systems are possible with a hardware implementation of Genetic Algorithms (GA). We report the design of an IP core that implements a general purpose GA engine which has been successfully synthesized and verified on a Xilinx Virtex II Pro FPGA Device (XC2VP30). The placed and routed IP core has an area utilization of only 13% and clock speed of 50MHz. The GA core can be customized in terms of the population size, number of generations, cross-over and mutation rates, and the random number generator seed. The GA engine can be tailored to a given application by interfacing with the application specific fitness evaluation module as well as the required storage memory (to store the current and new populations). The core is soft in nature i.e., a gate-level netlist is provided which can be readily integrated with the user's system. The GA IP core can be readily used in FPGA based platforms for space and military applications (for e.g., surveillance, target tracking). The main advantages of the IP core are its programmability, small footprint, and low power consumption. Examples of concept systems in sensing and surveillance domains will be presented.

  11. IP lookup with low memory requirement and fast update

    DEFF Research Database (Denmark)

    Berger, Michael Stübert

    2003-01-01

    The paper presents an IP address lookup algorithm with low memory requirement and fast updates. The scheme, which is denoted prefix-tree, uses a combination of a trie and a tree search, which is efficient in memory usage because the tree contains exactly one node for each prefix in the routing...

  12. Construction of a nuclear data server using TCP/IP

    Energy Technology Data Exchange (ETDEWEB)

    Kawano, Toshihiko; Sakai, Osamu [Kyushu Univ., Fukuoka (Japan)

    1997-03-01

    We construct a nuclear data server which provides data in the evaluated nuclear data library through the network by means of TCP/IP. The client is not necessarily a user but a computer program. Two examples with a prototype server program are demonstrated, the first is data transfer from the server to a user, and the second is to a computer program. (author)

  13. IP over optical multicasting for large-scale video delivery

    Science.gov (United States)

    Jin, Yaohui; Hu, Weisheng; Sun, Weiqiang; Guo, Wei

    2007-11-01

    In the IPTV systems, multicasting will play a crucial role in the delivery of high-quality video services, which can significantly improve bandwidth efficiency. However, the scalability and the signal quality of current IPTV can barely compete with the existing broadcast digital TV systems since it is difficult to implement large-scale multicasting with end-to-end guaranteed quality of service (QoS) in packet-switched IP network. China 3TNet project aimed to build a high performance broadband trial network to support large-scale concurrent streaming media and interactive multimedia services. The innovative idea of 3TNet is that an automatic switched optical networks (ASON) with the capability of dynamic point-to-multipoint (P2MP) connections replaces the conventional IP multicasting network in the transport core, while the edge remains an IP multicasting network. In this paper, we will introduce the network architecture and discuss challenges in such IP over Optical multicasting for video delivery.

  14. Lessons Learned from resolving massive IPS database change for SPADES+

    International Nuclear Information System (INIS)

    Kim, Jin-Soo

    2016-01-01

    Safety Parameter Display and Evaluation System+ (SPADES+) was implemented to meet the requirements for Safety Parameter Display System (SPDS) which are related to TMI Action Plan requirements. SPADES+ monitors continuously the critical safety function during normal, abnormal, and emergency operation mode and generates the alarm output to the alarm server when the tolerance related to safety functions are not satisfied. The alarm algorithm for critical safety function is performed in the NSSS Application Software (NAPS) server of the Information Process System (IPS) and the calculation result will be displayed on the flat panel display (FPD) of the IPS. SPADES+ provides the critical variable to the control room operators to aid them in rapidly and reliable determining the safety status of the plant. Many database point ID names (518 points) were changed. POINT_ID is used in the programming source code, the related documents such as SDS and SRS, and Graphic database. To reduce human errors, computer program and office program’s Macro are used. Though the automatic methods are used for changing POINT_IDs, it takes lots of time to resolve for editing the change list except for making computerized solutions. In IPS, there are many more programs than SPADES+ and over 30,000 POINT_IDs are in IPS database. Changing POINT_IDs could be a burden to software engineers. In case of Ovation system database, there is the Alias field to prevent this kind of problem. The Alias is a kind of secondary key in database

  15. IP-Based TV Technologies, Services and Multidisciplinary Applications

    NARCIS (Netherlands)

    O.M. Bonastre; M.J. Montpetit; P.S. Cesar Garcia (Pablo Santiago)

    2013-01-01

    htmlabstractThe move to Internet Protocol (IP)-based content delivery services has challenged the television industry by allowing high-quality television content to be delivered using the Internet, wired and wireless, private and public. The new convergence paradigm is already playing out its

  16. Photometric studies of δ Scuti stars. I. IP Virginis

    Science.gov (United States)

    Joner, Michael D.; Hintz, Eric G.; Collier, Matthew W.

    1998-01-01

    We report 15 new times of maximum light for the δ Scuti star IP Virginis (formerly known as SA 106‐1024). An analysis of all times of maximum light indicates that IP Vir has been decreasing in period at a constant rate of − days day−1. Evidence is also presented that IP Vir is a double‐mode variable with a period ratio of . This period ratio predicts a [Fe/H] value of −0.3. From photometric (uvbyβ) observations, we find a foreground reddening of .008 mag and a metallicity of [Fe/H] = +0.05. It is shown that [Fe/H] = −0.3 is most likely the correct value. Intrinsic ‐ and c1‐values, plotted in a model atmosphere grid, indicate a mean effective temperature, K, and a mean surface gravity, . All of these physical parameters support Landolt's initial conclusion that IP Vir is an ordinary δ Sct star.

  17. Sister broods in the spruce bark beetle, Ips typographus (L.)

    Czech Academy of Sciences Publication Activity Database

    Davídková, Markéta; Doležal, Petr

    2017-01-01

    Roč. 405, DEC 01 (2017), s. 13-21 ISSN 0378-1127 Grant - others:Lesy ČR(CZ) 08/2009-2015 Institutional support: RVO:60077344 Keywords : re-emergence * sister broods * Ips typographus Subject RIV: EH - Ecology, Behaviour OBOR OECD: Zoology Impact factor: 3.064, year: 2016 http://www.sciencedirect.com/science/article/pii/S0378112717309507

  18. Design & Implementation of IP-PBX for Small Business Organization

    OpenAIRE

    Mr. Sandeep R. Sonaskar; Dr. M. M. Khanapurkar

    2012-01-01

    Most of the small business organization uses old Electronics Private Branch Exchange (EPBX) System for the telephony communication. This EPBX is now could be replaced by Internet protocol telephony PBX called IP-PBX which uses Intranet as a backbone as each organization has pre installed local area network. The network architecture for the IPPBX system is easy to design

  19. The mites associated with Ips typographus in Sweden

    Science.gov (United States)

    John C. Moser; Hubertus H. Eidmann; Jan R. Regnander

    1989-01-01

    Twenty-four species of mites were found associated with Ips typographus (Linnaeus) collected from pherommone traps in Sweden, bringing to 38 the total recorded for this scolytid. Because three of the species are parasites, it may be possible to use them in biological control of I. typographus. Couplets from an earlier key to these...

  20. Harmonising and Matching IPR Holders at IP Australia

    OpenAIRE

    T’Mir D. Julius; Gaétan de Rassenfosse

    2014-01-01

    This document describes the methodology developed by the Melbourne Institute to: (i) harmonise holders of intellectual property rights (IPRs) at IP Australia (applications for patent, designs, trademarks and plant breeder’s rights); (ii) match Australian IPRs holders to the Australian business register; (iii) identify the ultimate owners within Australia; and (iv) identify which holders are small and medium size enterprises.

  1. Voice over IP phone calls from your smartphone

    CERN Multimedia

    2014-01-01

    All CERN users do have a Lync account (see here) and can use Instant Messaging, presence and other features. In addition, if your number is activated on Lync IP Phone(1) system then you can make standard phone calls from your computer (Windows/Mac).   Recently, we upgraded the infrastructure to Lync 2013. One of the major features is the possibility to make Voice over IP phone calls from a smartphone using your CERN standard phone number (not mobile!). Install Lync 2013 on iPhone/iPad, Android or Windows Phone, connect to WiFi network and make phone calls as if you were in your office. There will be no roaming charges because you will be using WiFi to connect to CERN phone system(2). Register here to the presentation on Tuesday 29 April at 11 a.m. in the Technical Training Center and see the most exciting features of Lync 2013.   Looking forward to seeing you! The Lync team (1) How to register on Lync IP Phone system: http://information-technology.web.cern.ch/book/lync-ip-phone-serv...

  2. Empirical assessment of VoIP overload detection tests

    NARCIS (Netherlands)

    Żuraniewski, P.; Mandjes, M.; Mellia, M.

    2010-01-01

    The control of communication networks critically relies on procedures capable of detecting unanticipated load changes. In this paper we explore such techniques, in a setting in which each connection consumes roughly the same amount of bandwidth (with VoIP as a leading example). We focus on

  3. Changepoint detection techniques for VoIP traffic

    NARCIS (Netherlands)

    Mandjes, M.; Zuraniewski, P.W.

    2013-01-01

    The control of communication networks critically relies on procedures capable of detecting unanticipated load changes. In this chapter we present an overview of such techniques, in a setting in which each connection consumes roughly the same amount of bandwidth (with VoIP as a leading example). For

  4. Biobjective VoIP Service Management in Cloud Infrastructure

    Directory of Open Access Journals (Sweden)

    Jorge M. Cortés-Mendoza

    2016-01-01

    Full Text Available Voice over Internet Protocol (VoIP allows communication of voice and/or data over the internet in less expensive and reliable manner than traditional ISDN systems. This solution typically allows flexible interconnection between organization and companies on any domains. Cloud VoIP solutions can offer even cheaper and scalable service when virtualized telephone infrastructure is used in the most efficient way. Scheduling and load balancing algorithms are fundamental parts of this approach. Unfortunately, VoIP scheduling techniques do not take into account uncertainty in dynamic and unpredictable cloud environments. In this paper, we formulate the problem of scheduling of VoIP services in distributed cloud environments and propose a new model for biobjective optimization. We consider the special case of the on-line nonclairvoyant dynamic bin-packing problem and discuss solutions for provider cost and quality of service optimization. We propose twenty call allocation strategies and evaluate their performance by comprehensive simulation analysis on real workload considering six months of the MIXvoip company service.

  5. Changepoint Detection Techniques for VoIP Traffic

    NARCIS (Netherlands)

    Mandjes, M.; Żuraniewski, P.; Biersack, E.; Callegari, C.; Matijasevic, M.

    2013-01-01

    The control of communication networks critically relies on procedures capable of detecting unanticipated load changes. In this chapter we present an overview of such techniques, in a setting in which each connection consumes roughly the same amount of bandwidth (with VoIP as a leading example). For

  6. Emulation-based comparative study of centralized and distributed control schemes for optical networks

    Science.gov (United States)

    Xin, Chunsheng; Ye, Yinghua; Dixit, Sudhir; Qiao, Chunming

    2001-07-01

    Recently there are considerable amount of research about the automatic control and provisioning in all optical networks. One of the critical issues is how to provide effective lightpath provisioning to improve network performance, such as blocking probability and decision time. Depending on the network topology, configuration, and administration policy, a distributed or centralized control scheme can be employed to manage the routing and signaling. In a distributed control scheme, each node exchanges information with other nodes, but performs routing and signaling independently from other nodes. On the other hand, in a centralized scheme, each node communicates with a central controller and the controller performs routing and signaling on behalf of all other nodes. Intuitively, the centralized scheme can obtain a lower blocking probability since the controller has the complete resource availability information. We have studied the two schemes through emulations, determined the signaling and processing overheads and quantified the conditions that favor one approach over the other.

  7. History matching of a complex epidemiological model of human immunodeficiency virus transmission by using variance emulation.

    Science.gov (United States)

    Andrianakis, I; Vernon, I; McCreesh, N; McKinley, T J; Oakley, J E; Nsubuga, R N; Goldstein, M; White, R G

    2017-08-01

    Complex stochastic models are commonplace in epidemiology, but their utility depends on their calibration to empirical data. History matching is a (pre)calibration method that has been applied successfully to complex deterministic models. In this work, we adapt history matching to stochastic models, by emulating the variance in the model outputs, and therefore accounting for its dependence on the model's input values. The method proposed is applied to a real complex epidemiological model of human immunodeficiency virus in Uganda with 22 inputs and 18 outputs, and is found to increase the efficiency of history matching, requiring 70% of the time and 43% fewer simulator evaluations compared with a previous variant of the method. The insight gained into the structure of the human immunodeficiency virus model, and the constraints placed on it, are then discussed.

  8. Emulating a crowded intracellular environment in vitro dramatically improves RT-PCR performance

    International Nuclear Information System (INIS)

    Lareu, Ricky R.; Harve, Karthik S.; Raghunath, Michael

    2007-01-01

    The polymerase chain reaction's (PCR) phenomenal success in advancing fields as diverse as Medicine, Agriculture, Conservation, or Paleontology is based on the ability of using isolated prokaryotic thermostable DNA polymerases in vitro to copy DNA irrespective of origin. This process occurs intracellularly and has evolved to function efficiently under crowded conditions, namely in an environment packed with macromolecules. However, current in vitro practice ignores this important biophysical parameter of life. In order to more closely emulate conditions of intracellular biochemistry in vitro we added inert macromolecules into reverse transcription (RT) and PCR. We show dramatic improvements in all parameters of RT-PCR including 8- to 10-fold greater sensitivity, enhanced polymerase processivity, higher specific amplicon yield, greater primer annealing and specificity, and enhanced DNA polymerase thermal stability. The faster and more efficient reaction kinetics was a consequence of the cumulative molecular and thermodynamic effects of the excluded volume effect created by macromolecular crowding

  9. Emulating Spherical Wave Channel Models in Multi-probe Anechoic Chamber Setups

    DEFF Research Database (Denmark)

    Fan, Wei; Carreño, Xavier; Nielsen, Jesper Ødum

    2015-01-01

    to emulate spherical wave channel models in multi-probe anechoic chamber setups. In this paper, a technique based on the field synthesis principle is proposed to approximate spherical waves emitted from arbitrarily located point sources with arbitrary polarizations. Simulation results show that static......Spherical wave channel modeling has attracted huge research attention for massive multiple-input multiple-output (MIMO) and short-distance MIMO systems. Current research work in multi-probe anechoic chamber systems is limited to reproduce radio channels assuming planar wavefronts. There is a need...... spherical waves can be reproduced with a limited number of probes, and the field synthesis accuracy of spherical wave depends on the location of the source point....

  10. MIMO Fading Emulator Development with FPGA and Its Application to Performance Evaluation of Mobile Radio Systems

    Directory of Open Access Journals (Sweden)

    Yoshio Karasawa

    2017-01-01

    Full Text Available We present four new developments for a multiple-input multiple-output (MIMO over-the-air measurement system based on our previous studies. The first two developments relate to the channel model for multipath environment generation. One is a further simplification of the circuit configuration without performance degradation by reducing the number of delay generation units, which dominate the performance limit when implementing the circuit on a field-programmable gate array (FPGA. The other is to realize spatial correlation characteristics among the input ports on the transmission side, whereas the previously proposed channel model did not consider this correlation. The third development involves the details of implementing the MIMO fading emulator on an FPGA as a two-stage scheme. The fourth is the demonstration of application examples of the developed system.

  11. On-line use of the 168/E emulator at the CERN ISR SFM detector

    International Nuclear Information System (INIS)

    Bertuzzi, C.; Drijard, D.; Frehse, H.; Gavillet, P.; Gokieli, R.; Innocenti, P.G.; Messerli, R.; Mornacchi, G.; Norton, A.; Porte, J.P.

    1981-01-01

    The Split Field Magnet Detector at the CERN ISR has been used in recent years to study events with a high transverse momentum charged particle. As a first level computer based trigger a linear estimate of the track momentum by fixed point arithmethic was calculated on-line by a minicomputer. In addition appreciable further rejection was obtained by off-line filtering on the IBM-370/168, using pattern recognition and a fit of the triggering particle in the magnetic field. The availability of the 168/E emulator makes it possible to transfer the proven methods used off-line to real time data reduction. Preliminary results on filter efficiency and speed for an experiment triggering on a high Psub(T) hadron at 10 to 20 0 with respect to the outgoing beam (Exp. R 419) are given. Possible improvements and extensions are discussed. (orig.)

  12. Technical study on semi-object emulation of structural statics problem

    CERN Document Server

    MoJun; LiuXingFu; LiuZhiYong; Shi Pin Gan

    2002-01-01

    Structural strength analysis depends mainly on finite element method and experiments. For complex structural system, a rather large error can be caused by some uncertain factors, such as load distributions, boundary conditions and constitutive relations in numerical analysis. At the same time, owing to the limitation of measuring and testing techniques, the strength and stiffness of key components can not be estimated by using the limited test data. To simulate stresses accurately under complex static environment, improve man-machine interactive system, and make the best use of fore- and post-processing function in graphic data processing, the combine numerical analysis with experimental technique and have developed the semi-object emulation technique to analyze the nonlinear problem of structure statics. The modern optical measuring techniques and image processing techniques are firstly used for the method to acquire displacement data of the vessel surface, and the data are used for the boundary condition to...

  13. Critical Clearing Time and Wind Power in Small Isolated Power Systems Considering Inertia Emulation

    Directory of Open Access Journals (Sweden)

    Elías Jesús Medina-Domínguez

    2015-11-01

    Full Text Available The stability and security of small and isolated power systems can be compromised when large amounts of wind power enter them. Wind power integration depends on such factors as power generation capacity, conventional generation technology or grid topology. Another issue that can be considered is critical clearing time (CCT. In this paper, wind power and CCT are studied in a small isolated power system. Two types of wind turbines are considered: a squirrel cage induction generator (SCIG and a full converter. Moreover, the full converter wind turbine’s inertia emulation capability is considered, and its impact on CCT is discussed. Voltage is taken into account because of its importance in power systems of this kind. The study focuses on the small, isolated Lanzarote-Fuerteventura power system, which is expected to be in operation by 2020.

  14. Application of the dynamically allocated virtual clustering management system to emulated tactical network experimentation

    Science.gov (United States)

    Marcus, Kelvin

    2014-06-01

    The U.S Army Research Laboratory (ARL) has built a "Network Science Research Lab" to support research that aims to improve their ability to analyze, predict, design, and govern complex systems that interweave the social/cognitive, information, and communication network genres. Researchers at ARL and the Network Science Collaborative Technology Alliance (NS-CTA), a collaborative research alliance funded by ARL, conducted experimentation to determine if automated network monitoring tools and task-aware agents deployed within an emulated tactical wireless network could potentially increase the retrieval of relevant data from heterogeneous distributed information nodes. ARL and NS-CTA required the capability to perform this experimentation over clusters of heterogeneous nodes with emulated wireless tactical networks where each node could contain different operating systems, application sets, and physical hardware attributes. Researchers utilized the Dynamically Allocated Virtual Clustering Management System (DAVC) to address each of the infrastructure support requirements necessary in conducting their experimentation. The DAVC is an experimentation infrastructure that provides the means to dynamically create, deploy, and manage virtual clusters of heterogeneous nodes within a cloud computing environment based upon resource utilization such as CPU load, available RAM and hard disk space. The DAVC uses 802.1Q Virtual LANs (VLANs) to prevent experimentation crosstalk and to allow for complex private networks. Clusters created by the DAVC system can be utilized for software development, experimentation, and integration with existing hardware and software. The goal of this paper is to explore how ARL and the NS-CTA leveraged the DAVC to create, deploy and manage multiple experimentation clusters to support their experimentation goals.

  15. Bayesian sensitivity analysis of a 1D vascular model with Gaussian process emulators.

    Science.gov (United States)

    Melis, Alessandro; Clayton, Richard H; Marzo, Alberto

    2017-12-01

    One-dimensional models of the cardiovascular system can capture the physics of pulse waves but involve many parameters. Since these may vary among individuals, patient-specific models are difficult to construct. Sensitivity analysis can be used to rank model parameters by their effect on outputs and to quantify how uncertainty in parameters influences output uncertainty. This type of analysis is often conducted with a Monte Carlo method, where large numbers of model runs are used to assess input-output relations. The aim of this study was to demonstrate the computational efficiency of variance-based sensitivity analysis of 1D vascular models using Gaussian process emulators, compared to a standard Monte Carlo approach. The methodology was tested on four vascular networks of increasing complexity to analyse its scalability. The computational time needed to perform the sensitivity analysis with an emulator was reduced by the 99.96% compared to a Monte Carlo approach. Despite the reduced computational time, sensitivity indices obtained using the two approaches were comparable. The scalability study showed that the number of mechanistic simulations needed to train a Gaussian process for sensitivity analysis was of the order O(d), rather than O(d×103) needed for Monte Carlo analysis (where d is the number of parameters in the model). The efficiency of this approach, combined with capacity to estimate the impact of uncertain parameters on model outputs, will enable development of patient-specific models of the vascular system, and has the potential to produce results with clinical relevance. © 2017 The Authors International Journal for Numerical Methods in Biomedical Engineering Published by John Wiley & Sons Ltd.

  16. Using Machine Learning as a fast emulator of physical processes within the Met Office's Unified Model

    Science.gov (United States)

    Prudden, R.; Arribas, A.; Tomlinson, J.; Robinson, N.

    2017-12-01

    The Unified Model is a numerical model of the atmosphere used at the UK Met Office (and numerous partner organisations including Korean Meteorological Agency, Australian Bureau of Meteorology and US Air Force) for both weather and climate applications.Especifically, dynamical models such as the Unified Model are now a central part of weather forecasting. Starting from basic physical laws, these models make it possible to predict events such as storms before they have even begun to form. The Unified Model can be simply described as having two components: one component solves the navier-stokes equations (usually referred to as the "dynamics"); the other solves relevant sub-grid physical processes (usually referred to as the "physics"). Running weather forecasts requires substantial computing resources - for example, the UK Met Office operates the largest operational High Performance Computer in Europe - and the cost of a typical simulation is spent roughly 50% in the "dynamics" and 50% in the "physics". Therefore there is a high incentive to reduce cost of weather forecasts and Machine Learning is a possible option because, once a machine learning model has been trained, it is often much faster to run than a full simulation. This is the motivation for a technique called model emulation, the idea being to build a fast statistical model which closely approximates a far more expensive simulation. In this paper we discuss the use of Machine Learning as an emulator to replace the "physics" component of the Unified Model. Various approaches and options will be presented and the implications for further model development, operational running of forecasting systems, development of data assimilation schemes, and development of ensemble prediction techniques will be discussed.

  17. Emulation of Physician Tasks in Eye-Tracked Virtual Reality for Remote Diagnosis of Neurodegenerative Disease.

    Science.gov (United States)

    Orlosky, Jason; Itoh, Yuta; Ranchet, Maud; Kiyokawa, Kiyoshi; Morgan, John; Devos, Hannes

    2017-04-01

    For neurodegenerative conditions like Parkinson's disease, early and accurate diagnosis is still a difficult task. Evaluations can be time consuming, patients must often travel to metropolitan areas or different cities to see experts, and misdiagnosis can result in improper treatment. To date, only a handful of assistive or remote methods exist to help physicians evaluate patients with suspected neurological disease in a convenient and consistent way. In this paper, we present a low-cost VR interface designed to support evaluation and diagnosis of neurodegenerative disease and test its use in a clinical setting. Using a commercially available VR display with an infrared camera integrated into the lens, we have constructed a 3D virtual environment designed to emulate common tasks used to evaluate patients, such as fixating on a point, conducting smooth pursuit of an object, or executing saccades. These virtual tasks are designed to elicit eye movements commonly associated with neurodegenerative disease, such as abnormal saccades, square wave jerks, and ocular tremor. Next, we conducted experiments with 9 patients with a diagnosis of Parkinson's disease and 7 healthy controls to test the system's potential to emulate tasks for clinical diagnosis. We then applied eye tracking algorithms and image enhancement to the eye recordings taken during the experiment and conducted a short follow-up study with two physicians for evaluation. Results showed that our VR interface was able to elicit five common types of movements usable for evaluation, physicians were able to confirm three out of four abnormalities, and visualizations were rated as potentially useful for diagnosis.

  18. Aerodynamic consequences of wing morphing during emulated take-off and gliding in birds.

    Science.gov (United States)

    Klaassen van Oorschot, Brett; Mistick, Emily A; Tobalske, Bret W

    2016-10-01

    Birds morph their wings during a single wingbeat, across flight speeds and among flight modes. Such morphing may allow them to maximize aerodynamic performance, but this assumption remains largely untested. We tested the aerodynamic performance of swept and extended wing postures of 13 raptor species in three families (Accipitridae, Falconidae and Strigidae) using a propeller model to emulate mid-downstroke of flapping during take-off and a wind tunnel to emulate gliding. Based on previous research, we hypothesized that (1) during flapping, wing posture would not affect maximum ratios of vertical and horizontal force coefficients (C V :C H ), and that (2) extended wings would have higher maximum C V :C H when gliding. Contrary to each hypothesis, during flapping, extended wings had, on average, 31% higher maximum C V :C H ratios and 23% higher C V than swept wings across all biologically relevant attack angles (α), and, during gliding, maximum C V :C H ratios were similar for the two postures. Swept wings had 11% higher C V than extended wings in gliding flight, suggesting flow conditions around these flexed raptor wings may be different from those in previous studies of swifts (Apodidae). Phylogenetic affiliation was a poor predictor of wing performance, due in part to high intrafamilial variation. Mass was only significantly correlated with extended wing performance during gliding. We conclude that wing shape has a greater effect on force per unit wing area during flapping at low advance ratio, such as take-off, than during gliding. © 2016. Published by The Company of Biologists Ltd.

  19. CtIP Mutations Cause Seckel and Jawad Syndromes.

    Directory of Open Access Journals (Sweden)

    Per Qvist

    2011-10-01

    Full Text Available Seckel syndrome is a recessively inherited dwarfism disorder characterized by microcephaly and a unique head profile. Genetically, it constitutes a heterogeneous condition, with several loci mapped (SCKL1-5 but only three disease genes identified: the ATR, CENPJ, and CEP152 genes that control cellular responses to DNA damage. We previously mapped a Seckel syndrome locus to chromosome 18p11.31-q11.2 (SCKL2. Here, we report two mutations in the CtIP (RBBP8 gene within this locus that result in expression of C-terminally truncated forms of CtIP. We propose that these mutations are the molecular cause of the disease observed in the previously described SCKL2 family and in an additional unrelated family diagnosed with a similar form of congenital microcephaly termed Jawad syndrome. While an exonic frameshift mutation was found in the Jawad family, the SCKL2 family carries a splicing mutation that yields a dominant-negative form of CtIP. Further characterization of cell lines derived from the SCKL2 family revealed defective DNA damage induced formation of single-stranded DNA, a critical co-factor for ATR activation. Accordingly, SCKL2 cells present a lowered apoptopic threshold and hypersensitivity to DNA damage. Notably, over-expression of a comparable truncated CtIP variant in non-Seckel cells recapitulates SCKL2 cellular phenotypes in a dose-dependent manner. This work thus identifies CtIP as a disease gene for Seckel and Jawad syndromes and defines a new type of genetic disease mechanism in which a dominant negative mutation yields a recessively inherited disorder.

  20. Generic inertia emulation controller for multi-terminal voltage-source-converter high voltage direct current systems

    DEFF Research Database (Denmark)

    Zhu, Jiebei; Guerrero, Josep M.; Hung, William

    2014-01-01

    A generic Inertia Emulation Controller (INEC) scheme for Multi-Terminal Voltage-Source-Converter based HVDC (VSC-MTDC) systems is proposed and presented in this paper. The proposed INEC can be incorporated in any Grid-side Voltage-Source-Converter (GVSC) station, allowing the MTDC terminal...

  1. 76 FR 81955 - Assessment Questionnaire-IP Sector Specific Agency Risk Self Assessment Tool (IP-SSARSAT)

    Science.gov (United States)

    2011-12-29

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0069] Assessment Questionnaire--IP Sector... will be posted without alteration at http://www.regulations.gov , including any personal information... managers often volunteer to conduct an automated self risk assessment. The requested questionnaire...

  2. (S)-(+)-Ipsdienol: Interspecific Inhibition of Ips latidens (LeConte) by Ips pini (Say) (Coleoptera: Scolytidae)

    Science.gov (United States)

    Daniel R. Miller; John H. Borden

    1992-01-01

    In south-central British Columbia, the attraction of Ips latidens (LeConte) to its pheromone, ipsenol, was inhibited by (S)-(+)-ipsdienol, a pheromone for I. pini (Say). (R)-(-)-Ipsdienol had no effect on I. latidens. (S)-(+)-lpsdienol probably plays a role in interspecific communication between the two species...

  3. Unjuk Kerja IP PBX Asterisk dan FreeSWITCH pada Topologi Bertingkat di Jaringan Kampus

    Directory of Open Access Journals (Sweden)

    Iwan Setiawan

    2017-08-01

    Full Text Available Internet Protocol-based Private Branch Exchange (IP PBX diperlukan untuk menghubungkan panggilan antar perangkat komunikasi Voice over Internet Protocol (VoIP di sebuah jaringan lokal (LAN. Dengan adanya IP PBX, layanan VoIP dapat disediakan di atas jaringan data/IP yang sudah tergelar. Penelitian ini kami lakukan untuk mengetahui unjuk kerja VoIP pada dua IP PBX yang menggunakan perangkat lunak server Asterisk dan FreeSWITCH. Kami merancang sebuah arsitektur jaringan eksperimen yang diadaptasi dari topologi bertingkat pada jaringan kampus (CAN di lokasi penelitian dengan hierarki perangkat yang terdiri dari core switch, distribution switch, dan access switch. Kedua IP PBX ditempatkan pada hierarki yang berbeda pada topologi jaringan tersebut agar dapat diketahui pengaruhnya terhadap unjuk kerja VoIP. Konsep eksperimen ini diharapkan dapat menjadi salah satu dasar untuk mendesain arsitektur IP PBX secara terpusat dan tersebar pada jaringan kampus. Unjuk kerja VoIP kami ukur dengan parameter-parameter Quality of Service (QoS dan Quality of Experience (QoE. Selain itu, kami juga mengukur konsumsi prosesor dan memori yang dipakai oleh perangkat lunak server VoIP pada saat komunikasi terjadi. Pengukuran dilakukan dengan skenario phone-to-phone pada jaringan eksperimen yang terhubung ke jaringan kampus aktif. Hasil penelitian menunjukkan bahwa penempatan IP PBX di hierarki yang berbeda pada topologi jaringan berpengaruh terhadap unjuk kerja VoIP khususnya pada IP PBX Asterisk. Ketika dibandingkan, unjuk kerja IP PBX FreeSWITCH dalam hal QoS dan QoE sedikit lebih baik daripada Asterisk pada rerata latensi/delay, jitter, Mean Opinion Score (MOS, dan konsumsi memori yaitu 41,012 ms, 0,060 ms, 5, dan 1 % untuk IP PBX 1 serta 41,016 ms, 0,066 ms, 5, dan 0,5 % untuk IP PBX 2

  4. Briefer assessment of social network drinking: A test of the Important People Instrument-5 (IP-5).

    Science.gov (United States)

    Hallgren, Kevin A; Barnett, Nancy P

    2016-12-01

    The Important People instrument (IP; Longabaugh et al., 2010) is one of the most commonly used measures of social network drinking. Although its reliability and validity are well-supported, the length of the instrument may limit its use in many settings. The present study evaluated whether a briefer, 5-person version of the IP (IP-5) adequately reproduces scores from the full IP. College freshmen (N = 1,053) reported their own past-month drinking, alcohol-related consequences, and information about drinking in their close social networks at baseline and 1 year later. From this we derived network members' drinking frequency, percentage of drinkers, and percentage of heavy drinkers, assessed for up to 10 (full IP) or 5 (IP-5) network members. We first modeled the expected concordance between full-IP scores and scores from simulated shorter IP instruments by sampling smaller subsets of network members from full IP data. Then, using quasi-experimental methods, we administered the full IP and IP-5 and compared the 2 instruments' score distributions and concurrent and year-lagged associations with participants' alcohol consumption and consequences. Most of the full-IP variance was reproduced from simulated shorter versions of the IP (ICCs ≥ 0.80). The full IP and IP-5 yielded similar score distributions, concurrent associations with drinking (r = 0.22 to 0.52), and year-lagged associations with drinking. The IP-5 retains most of the information about social network drinking from the full IP. The shorter instrument may be useful in clinical and research settings that require frequent measure administration, yielding greater temporal resolution for monitoring social network drinking. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  5. Congested Link Inference Algorithms in Dynamic Routing IP Network

    Directory of Open Access Journals (Sweden)

    Yu Chen

    2017-01-01

    Full Text Available The performance descending of current congested link inference algorithms is obviously in dynamic routing IP network, such as the most classical algorithm CLINK. To overcome this problem, based on the assumptions of Markov property and time homogeneity, we build a kind of Variable Structure Discrete Dynamic Bayesian (VSDDB network simplified model of dynamic routing IP network. Under the simplified VSDDB model, based on the Bayesian Maximum A Posteriori (BMAP and Rest Bayesian Network Model (RBNM, we proposed an Improved CLINK (ICLINK algorithm. Considering the concurrent phenomenon of multiple link congestion usually happens, we also proposed algorithm CLILRS (Congested Link Inference algorithm based on Lagrangian Relaxation Subgradient to infer the set of congested links. We validated our results by the experiments of analogy, simulation, and actual Internet.

  6. Capturing value from IP in a global environment

    DEFF Research Database (Denmark)

    Alcacer, Juan; Beukel, Karin; Cassiman, Bruno

    section. Global companies will need to organize cross-functional value capture teams focused on appropriating value from their know-how and reputation by combining different institutional, market, and non-market tools, depending on the institutional and business environment in a particular region.......This paper documents the strong growth in tools used by firms to protect their intellectual property (IP), develop their know-how, and build and maintain their reputation globally. We focus on three tools that have become increasingly important in the last several decades: patents, trademarks...... experiencing the most growth. These trends in applications are less evident when we study which applications are actually granted. For example, the shift in IP activity toward middle-income countries and Asia is less pronounced, and the most developed countries still lead globally. Moreover, there seems...

  7. The development of ISO freight containers as IP-2 packagings

    International Nuclear Information System (INIS)

    Janicki, M.C.; Vaughan, R.A.

    1993-01-01

    Design specifications were developed for ISO freight containers to meet the requirements of the transport regulations in the 1985 Edition of IAEA SS6, and to maximize the technical and commercial benefits offered to consignors by this type of container for the transport and handling of bulk LSA/SCO materials. A range of IP-2 ISO freight containers have been designed and built to these specifications and are in use in the UK. This paper discusses the regulatory considerations which had to be reviewed and interpreted in developing freight containers as Industrial Package Type 2 (IP-2) packagings and the development of performance standards to meet the regulatory requirements. Outline details of the packages developed are indicated together with examples of handling equipment developed to facilitate loading and unloading. (J.P.N.)

  8. Pulse to pulse beam trajectory determination at the IP

    International Nuclear Information System (INIS)

    Koska, W.; Wagner, S.

    1988-01-01

    It has long been known that a precise measurement of the SLC beam trajectory through the IP region is vital both from a machine and a detector point of view. One of the primary techniques used to maximize luminosity is the measurement of the deflection angle of one beam produced by the electromagnetic interaction with the other beam. In order to implement this procedure a pair of precision Beam Position Monitors (BPMs) were installed within the Final Triplet of quadrapoles on each side of the IP. Before the IP BPMs could be used to measure beam-beam deflection, a series of measurements were made of the coefficients which relate the setting of an orbit correction magnet to the position of the beam at a particular BPM (R 12 s). The purpose was to expose any problems such as misconnected cables, etc., by comparing the measured R 12 s with theoretical predictions from the model of the Final Focus region. A technique developed that uses position measurements in the long BPMs to determine a three parameter fit to the beam trajectory at the IP. The three parameters in the fit are the beam position, the incoming angle and the deflection angle. The result was very successful and allows the observation of beam-beam deflection even under marginal conditions. The purpose of this memo is to clear up the technical points and to demonstrate that the simplicity of the fit should allow the implementation of this procedure at the micro level, where it could provide trajectory information in real time which would go a long way toward making it useful as a fast feedback tool and in addition allow easy real time access to beam position data by the Mark II

  9. A Learning-Based Approach for IP Geolocation

    Science.gov (United States)

    Eriksson, Brian; Barford, Paul; Sommers, Joel; Nowak, Robert

    The ability to pinpoint the geographic location of IP hosts is compelling for applications such as on-line advertising and network attack diagnosis. While prior methods can accurately identify the location of hosts in some regions of the Internet, they produce erroneous results when the delay or topology measurement on which they are based is limited. The hypothesis of our work is that the accuracy of IP geolocation can be improved through the creation of a flexible analytic framework that accommodates different types of geolocation information. In this paper, we describe a new framework for IP geolocation that reduces to a machine-learning classification problem. Our methodology considers a set of lightweight measurements from a set of known monitors to a target, and then classifies the location of that target based on the most probable geographic region given probability densities learned from a training set. For this study, we employ a Naive Bayes framework that has low computational complexity and enables additional environmental information to be easily added to enhance the classification process. To demonstrate the feasibility and accuracy of our approach, we test IP geolocation on over 16,000 routers given ping measurements from 78 monitors with known geographic placement. Our results show that the simple application of our method improves geolocation accuracy for over 96% of the nodes identified in our data set, with on average accuracy 70 miles closer to the true geographic location versus prior constraint-based geolocation. These results highlight the promise of our method and indicate how future expansion of the classifier can lead to further improvements in geolocation accuracy.

  10. Real-time services in IP network architectures

    Science.gov (United States)

    Gilardi, Antonella

    1996-12-01

    The worldwide internet system seems to be the success key for the provision of real time multimedia services to both residential and business users and someone says that in such a way broadband networks will have a reason to exist. This new class of applications that use multiple media (voice, video and data) impose constraints to the global network nowadays consisting of subnets with various data links. The attention will be focused on the interconnection of IP non ATM and ATM networks. IETF and ATM forum are currently involved in the developing specifications suited to adapt the connectionless IP protocol to the connection oriented ATM protocol. First of all the link between the ATM and the IP service model has to be set in order to match the QoS and traffic requirements defined in the relative environment. A further significant topic is represented by the mapping of IP resource reservation model onto the ATM signalling and in the end it is necessary to define how the routing works when there are QoS parameters associated. This paper, considering only unicast applications, will examine the above issues taking as a starting point the situation where an host launches as call set up request with the relevant QoS and traffic descriptor and at some point a router at the edge of the ATM network has to decide how forwarding and request in order to establish an end to end link with the right capabilities. The aim is to compare the proposals emerging from different standard bodies to point out convergency or incompatibility.

  11. Normalization and experimental design for ChIP-chip data

    Directory of Open Access Journals (Sweden)

    Alekseyenko Artyom A

    2007-06-01

    Full Text Available Abstract Background Chromatin immunoprecipitation on tiling arrays (ChIP-chip has been widely used to investigate the DNA binding sites for a variety of proteins on a genome-wide scale. However, several issues in the processing and analysis of ChIP-chip data have not been resolved fully, including the effect of background (mock control subtraction and normalization within and across arrays. Results The binding profiles of Drosophila male-specific lethal (MSL complex on a tiling array provide a unique opportunity for investigating these topics, as it is known to bind on the X chromosome but not on the autosomes. These large bound and control regions on the same array allow clear evaluation of analytical methods. We introduce a novel normalization scheme specifically designed for ChIP-chip data from dual-channel arrays and demonstrate that this step is critical for correcting systematic dye-bias that may exist in the data. Subtraction of the mock (non-specific antibody or no antibody control data is generally needed to eliminate the bias, but appropriate normalization obviates the need for mock experiments and increases the correlation among replicates. The idea underlying the normalization can be used subsequently to estimate the background noise level in each array for normalization across arrays. We demonstrate the effectiveness of the methods with the MSL complex binding data and other publicly available data. Conclusion Proper normalization is essential for ChIP-chip experiments. The proposed normalization technique can correct systematic errors and compensate for the lack of mock control data, thus reducing the experimental cost and producing more accurate results.

  12. The Incredibly Long-Lived SN 2005ip

    Science.gov (United States)

    Fox, Ori

    2016-10-01

    Type IIn supernovae (SNe IIn) are defined by their relatively narrow spectral line features associated with a dense circumstellar medium (CSM) formed by the progenitor star. The nature of the progenitor and mass loss remains relatively unknown. Shock interaction with the dense CSM can often result in significant UV emission for several years post-explosion, thereby probing the CSM characteristics, progenitor mass loss history and, ultimately, the progenitor itself. The Type IIn SN 2005ip proves to be one of the most interesting and well-studied targets within this subclass. Compared to all other supernovae, SN 2005ip is the most luminous for its age. Now more than 11 years post-explosion, the SN has released >10^51 erg throughout its lifetime as the forward shock continues to collide with a dense CSM. Here we propose HST/STIS-MAMA UV observations of SN 2005ip to investigate the massive CSM. When accounting for the shock travel time, these observations will probe material lost from the progenitor more than 1000 years prior to the explosion. We already have a single HST/STIS spectrum of SN 2005ip from 2014, which was obtained while the shock was still within a higher mass regime. With just 5 orbits, a second spectrum will allow us to directly trace the evolution of the CSM and produce new constraints on the pre-SN mass-loss history. Coinciding with Cycle 24's UV Initiative, this program offers new insight regarding both the progenitor and explosion characteristics of the SN IIn subclass.

  13. Implementation of Cloud Computing into VoIP

    Directory of Open Access Journals (Sweden)

    Floriana GEREA

    2012-08-01

    Full Text Available This article defines Cloud Computing and highlights key concepts, the benefits of using virtualization, its weaknesses and ways of combining it with classical VoIP technologies applied to large scale businesses. The analysis takes into consideration management strategies and resources for better customer orientation and risk management all for sustaining the Service Level Agreement (SLA. An important issue in cloud computing can be security and for this reason there are several security solution presented.

  14. Objective assessment of IP video calls with Asterisk

    OpenAIRE

    Kapičák, Lukáš; Nevlud, Pavel; Mikulec, Martin; Zdrálek, Jaroslav

    2012-01-01

    The paper deals with an objective assessment of IP video calls transmission over GSM and UMTS networks. Video transmission is affected by many factors in mobile network. Among these factors belong packet loss, latency and transmission rate of the mobile network. Network properties were simulated by Simena network simulator. Our team have developed a unique technique for finding defects in video appearing in video calls. This technique is built on modified Asterisk SW PBX with enabled video re...

  15. IP-Based TV Technologies, Services and Multidisciplinary Applications

    OpenAIRE

    Bonastre, O.M.; Montpetit, M.J.; Cesar Garcia, Pablo Santiago

    2013-01-01

    htmlabstractThe move to Internet Protocol (IP)-based content delivery services has challenged the television industry by allowing high-quality television content to be delivered using the Internet, wired and wireless, private and public. The new convergence paradigm is already playing out its disruptive role as television is now associated with both a personal and social experience using an ecosystem of devices. The unidirectional flow of content from an operator to a device has thus morphed ...

  16. Automated allocation and configuration of dual stack IP networks

    OpenAIRE

    Daniels, Wilfried; Vanbrabant, Bart; Hughes, Danny; Joosen, Wouter

    2013-01-01

    The manual configuration and management of a modern network infrastructure is an increasingly complex task. This complexity is caused by factors including heterogeneity, a high degree of change and dependencies between configuration parameters. Due to increasing complexity, manual configuration has become time consuming and error prone. This paper proposes an automatic configuration tool for dual stack IP networks that addresses these issues by using high level abstractions to model the netwo...

  17. Lessons Learned from resolving massive IPS database change for SPADES+

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jin-Soo [KEPCO Engineering and Construction Co., Deajeon (Korea, Republic of)

    2016-10-15

    Safety Parameter Display and Evaluation System+ (SPADES+) was implemented to meet the requirements for Safety Parameter Display System (SPDS) which are related to TMI Action Plan requirements. SPADES+ monitors continuously the critical safety function during normal, abnormal, and emergency operation mode and generates the alarm output to the alarm server when the tolerance related to safety functions are not satisfied. The alarm algorithm for critical safety function is performed in the NSSS Application Software (NAPS) server of the Information Process System (IPS) and the calculation result will be displayed on the flat panel display (FPD) of the IPS. SPADES+ provides the critical variable to the control room operators to aid them in rapidly and reliable determining the safety status of the plant. Many database point ID names (518 points) were changed. POINT{sub I}D is used in the programming source code, the related documents such as SDS and SRS, and Graphic database. To reduce human errors, computer program and office program’s Macro are used. Though the automatic methods are used for changing POINT{sub I}Ds, it takes lots of time to resolve for editing the change list except for making computerized solutions. In IPS, there are many more programs than SPADES+ and over 30,000 POINT{sub I}Ds are in IPS database. Changing POINT{sub I}Ds could be a burden to software engineers. In case of Ovation system database, there is the Alias field to prevent this kind of problem. The Alias is a kind of secondary key in database.

  18. The Verb Always Leaves IP in V2 Clauses

    DEFF Research Database (Denmark)

    Schwartz, Bonnie D.; Vikner, Sten

    2007-01-01

    The verb second (V2) phenomenon, as it is found in the Germanic languages, has been the focus of much attention within recent syntactic research. In most of the literature on V2, it is assumed that the verb in all V2 clauses has moved to a head position outside IP, e.g. Cº. In Schwartz & Vikner...... (1989) we claimed that all V2 clauses were CPs, and we referred to this analysis as the 'traditional' analysis. In this paper we shall call it the 'V2 outside IP' analysis, and by using this term we want to convey that although in what follows we will adhere to the view that the verb moves to Cº, any...... analysis in which the verb moves into an Xº which is the sister of IP may be compatible with what we say here. Various alternatives to this analysis have been explored in the literature, and here we will address two in particular: One alternative is that there is an asymmetry between subject...

  19. Neural network classifier of attacks in IP telephony

    Science.gov (United States)

    Safarik, Jakub; Voznak, Miroslav; Mehic, Miralem; Partila, Pavol; Mikulec, Martin

    2014-05-01

    Various types of monitoring mechanism allow us to detect and monitor behavior of attackers in VoIP networks. Analysis of detected malicious traffic is crucial for further investigation and hardening the network. This analysis is typically based on statistical methods and the article brings a solution based on neural network. The proposed algorithm is used as a classifier of attacks in a distributed monitoring network of independent honeypot probes. Information about attacks on these honeypots is collected on a centralized server and then classified. This classification is based on different mechanisms. One of them is based on the multilayer perceptron neural network. The article describes inner structure of used neural network and also information about implementation of this network. The learning set for this neural network is based on real attack data collected from IP telephony honeypot called Dionaea. We prepare the learning set from real attack data after collecting, cleaning and aggregation of this information. After proper learning is the neural network capable to classify 6 types of most commonly used VoIP attacks. Using neural network classifier brings more accurate attack classification in a distributed system of honeypots. With this approach is possible to detect malicious behavior in a different part of networks, which are logically or geographically divided and use the information from one network to harden security in other networks. Centralized server for distributed set of nodes serves not only as a collector and classifier of attack data, but also as a mechanism for generating a precaution steps against attacks.

  20. Fast rerouting schemes for protected mobile IP over MPLS networks

    Science.gov (United States)

    Wen, Chih-Chao; Chang, Sheng-Yi; Chen, Huan; Chen, Kim-Joan

    2005-10-01

    Fast rerouting is a critical traffic engineering operation in the MPLS networks. To implement the Mobile IP service over the MPLS network, one can collaborate with the fast rerouting operation to enhance the availability and survivability. MPLS can protect critical LSP tunnel between Home Agent (HA) and Foreign Agent (FA) using the fast rerouting scheme. In this paper, we propose a simple but efficient algorithm to address the triangle routing problem for the Mobile IP over the MPLS networks. We consider this routing issue as a link weighting and capacity assignment (LW-CA) problem. The derived solution is used to plan the fast restoration mechanism to protect the link or node failure. In this paper, we first model the LW-CA problem as a mixed integer optimization problem. Our goal is to minimize the call blocking probability on the most congested working truck for the mobile IP connections. Many existing network topologies are used to evaluate the performance of our scheme. Results show that our proposed scheme can obtain the best performance in terms of the smallest blocking probability compared to other schemes.

  1. In-Pile Section(IPS) Inner Assembly Manufacturing Report

    International Nuclear Information System (INIS)

    Lee, Jong Min; Shim, Bong Sik; Lee, Chung Yong

    2009-12-01

    The objective of this report is to present the manufacturing, assembling and testing process of IPS Inner Assembly used in Fuel Test Loop(FTL) pre-operation test. The majority of the manufactured components are test fuels, inner assembly structures and subsidiary tools that is needed during the assembly process. In addition, Mock-up test for the welding and brazing is included at this stage. Lower structure, such as test fuels, fuel carrier legs are assembled and following structures, such as fuel carrier stem in the middle structure, top flange in the top structure are assembled together each other. To Verify the Reactor Coolant Pressure Boundary(RCPB) function in IPS Inner Assembly helium leak test and hydraulic test is performed with its acceptance criteria. According to the ASME III code Authorized Nuclear Inspector(ANI) is required during the hydraulic test. As-built measurement and insulation resistance test are performed to the structures and instrumentations after the test process. All requirements are satisfied and the IPS Inner Assembly was loaded in HANARO IR-1 hole in September 25, 2009

  2. On the implementation of IP protection using biometrics based information hiding and firewall

    Science.gov (United States)

    Basu, Abhishek; Nandy, Kingshuk; Banerjee, Avishek; Giri, Supratick; Sarkar, Souvik; Sarkar, Subir Kumar

    2016-02-01

    System-on-chip-based design style creates a revolution in very large scale integration industry with design efficiency, operating speed and development time. To support this process, reuse and exchange of components are essential in electronic form called intellectual property (IP). This, however, increases the possibility of encroachment of IP of the design. So copyright protection of IP against piracy is the most important concern for IP vendors. The existing solutions for IP protection are still not secure enough with flexibility, cost, etc. This paper proposes an information-hiding-based solution for IP protection by embedding a biometric copyright information and firewall inside an IP in the form of a finite state machine with unique configuration. The scheme first introduces biometric signature-based copyright as ownership proof. Second, firewall interrupts the normal functionality of IP at the end of the user time period. The experimental outcomes of field-programmable-gate-array implementation illustrate the efficiency of the proposed method.

  3. Intelligent Advanced Communications IP Telephony Feasibility for the U.S. Navy (DVD)

    National Research Council Canada - National Science Library

    Binns, Todd D; Naas, Bill

    2007-01-01

    ...: 2 DVD-ROMs; 4 3/4 in.; 2.68 GB. ABSTRACT: The purpose of this research paper is to research technologies and solutions supporting the communications infrastructure necessary to implement an integrated VoIP (IP telephony...

  4. SignalSpider: Probabilistic pattern discovery on multiple normalized ChIP-Seq signal profiles

    KAUST Repository

    Wong, Kachun; Li, Yue; Peng, Chengbin; Zhang, Zhaolei

    2014-01-01

    Motivation: Chromatin immunoprecipitation (ChIP) followed by high-throughput sequencing (ChIP-Seq) measures the genome-wide occupancy of transcription factors in vivo. Different combinations of DNA-binding protein occupancies may result in a gene

  5. 78 FR 14701 - Misuse of Internet Protocol (IP) Captioned Telephone Service; Telecommunications Relay Services...

    Science.gov (United States)

    2013-03-07

    ...] Misuse of Internet Protocol (IP) Captioned Telephone Service; Telecommunications Relay Services and..., the information collection associated with the Commission's Misuse of Internet Protocol (IP) Captioned...- 2235075, or email [email protected] . SUPPLEMENTARY INFORMATION: This document announces that, on...

  6. High speed fault tolerant secure communication for muon chamber using FPGA based GBTx emulator

    Science.gov (United States)

    Sau, Suman; Mandal, Swagata; Saini, Jogender; Chakrabarti, Amlan; Chattopadhyay, Subhasis

    2015-12-01

    The Compressed Baryonic Matter (CBM) experiment is a part of the Facility for Antiproton and Ion Research (FAIR) in Darmstadt at the GSI. The CBM experiment will investigate the highly compressed nuclear matter using nucleus-nucleus collisions. This experiment will examine lieavy-ion collisions in fixed target geometry and will be able to measure hadrons, electrons and muons. CBM requires precise time synchronization, compact hardware, radiation tolerance, self-triggered front-end electronics, efficient data aggregation schemes and capability to handle high data rate (up to several TB/s). As a part of the implementation of read out chain of Muon Cliamber(MUCH) [1] in India, we have tried to implement FPGA based emulator of GBTx in India. GBTx is a radiation tolerant ASIC that can be used to implement multipurpose high speed bidirectional optical links for high-energy physics (HEP) experiments and is developed by CERN. GBTx will be used in highly irradiated area and more prone to be affected by multi bit error. To mitigate this effect instead of single bit error correcting RS code we have used two bit error correcting (15, 7) BCH code. It will increase the redundancy which in turn increases the reliability of the coded data. So the coded data will be less prone to be affected by noise due to radiation. The data will go from detector to PC through multiple nodes through the communication channel. The computing resources are connected to a network which can be accessed by authorized person to prevent unauthorized data access which might happen by compromising the network security. Thus data encryption is essential. In order to make the data communication secure, advanced encryption standard [2] (AES - a symmetric key cryptography) and RSA [3], [4] (asymmetric key cryptography) are used after the channel coding. We have implemented GBTx emulator on two Xilinx Kintex-7 boards (KC705). One will act as transmitter and other will act as receiver and they are connected

  7. High speed fault tolerant secure communication for muon chamber using FPGA based GBTx emulator

    International Nuclear Information System (INIS)

    Sau, Suman; Chakrabarti, Amlan; Saini, Jogender; Chattopadhyay, Subhasis; Mandal, Swagata

    2015-01-01

    The Compressed Baryonic Matter (CBM) experiment is a part of the Facility for Antiproton and Ion Research (FAIR) in Darmstadt at the GSI. The CBM experiment will investigate the highly compressed nuclear matter using nucleus-nucleus collisions. This experiment will examine lieavy-ion collisions in fixed target geometry and will be able to measure hadrons, electrons and muons. CBM requires precise time synchronization, compact hardware, radiation tolerance, self-triggered front-end electronics, efficient data aggregation schemes and capability to handle high data rate (up to several TB/s). As a part of the implementation of read out chain of Muon Cliamber(MUCH) [1] in India, we have tried to implement FPGA based emulator of GBTx in India. GBTx is a radiation tolerant ASIC that can be used to implement multipurpose high speed bidirectional optical links for high-energy physics (HEP) experiments and is developed by CERN. GBTx will be used in highly irradiated area and more prone to be affected by multi bit error. To mitigate this effect instead of single bit error correcting RS code we have used two bit error correcting (15, 7) BCH code. It will increase the redundancy which in turn increases the reliability of the coded data. So the coded data will be less prone to be affected by noise due to radiation. The data will go from detector to PC through multiple nodes through the communication channel. The computing resources are connected to a network which can be accessed by authorized person to prevent unauthorized data access which might happen by compromising the network security. Thus data encryption is essential. In order to make the data communication secure, advanced encryption standard [2] (AES - a symmetric key cryptography) and RSA [3], [4] (asymmetric key cryptography) are used after the channel coding. We have implemented GBTx emulator on two Xilinx Kintex-7 boards (KC705). One will act as transmitter and other will act as receiver and they are connected

  8. Space Link Extension Protocol Emulation for High-Throughput, High-Latency Network Connections

    Science.gov (United States)

    Tchorowski, Nicole; Murawski, Robert

    2014-01-01

    New space missions require higher data rates and new protocols to meet these requirements. These high data rate space communication links push the limitations of not only the space communication links, but of the ground communication networks and protocols which forward user data to remote ground stations (GS) for transmission. The Consultative Committee for Space Data Systems, (CCSDS) Space Link Extension (SLE) standard protocol is one protocol that has been proposed for use by the NASA Space Network (SN) Ground Segment Sustainment (SGSS) program. New protocol implementations must be carefully tested to ensure that they provide the required functionality, especially because of the remote nature of spacecraft. The SLE protocol standard has been tested in the NASA Glenn Research Center's SCENIC Emulation Lab in order to observe its operation under realistic network delay conditions. More specifically, the delay between then NASA Integrated Services Network (NISN) and spacecraft has been emulated. The round trip time (RTT) delay for the continental NISN network has been shown to be up to 120ms; as such the SLE protocol was tested with network delays ranging from 0ms to 200ms. Both a base network condition and an SLE connection were tested with these RTT delays, and the reaction of both network tests to the delay conditions were recorded. Throughput for both of these links was set at 1.2Gbps. The results will show that, in the presence of realistic network delay, the SLE link throughput is significantly reduced while the base network throughput however remained at the 1.2Gbps specification. The decrease in SLE throughput has been attributed to the implementation's use of blocking calls. The decrease in throughput is not acceptable for high data rate links, as the link requires constant data a flow in order for spacecraft and ground radios to stay synchronized, unless significant data is queued a the ground station. In cases where queuing the data is not an option

  9. Direct reduction of N-acetoxy-PhIP by tea polyphenols: a possible mechanism for chemoprevention against PhIP-DNA adduct formation

    International Nuclear Information System (INIS)

    Lin Dongxin; Thompson, Patricia A.; Teitel, Candee; Chen Junshi; Kadlubar, Fred F.

    2003-01-01

    The chemopreventive effect of tea against 2-amino-1-methyl-6-phenylimidazo[4,5-b]pyridine (PhIP)-DNA adduct formation and its mechanism were studied. Rats were exposed to freshly prepared aqueous extracts of green tea (3% (w/v)) as the sole source of drinking water for 10 days prior to administration with a single dose of PhIP (10 mg/kg body weight) by oral gavage. PhIP-DNA adducts in the liver, colon, heart, and lung were measured using the 32 P-postlabelling technique. Rats pre-treated with tea and given PhIP 20 h before sacrifice had significantly reduced levels of PhIP-DNA adducts as compared with controls given PhIP alone. The possible mechanism of protective effect of tea on PhIP-DNA adduct formation was then examined in vitro. It was found that an aqueous extract of green and black tea, mixtures of green and black tea polyphenols, as well as purified polyphenols could strongly inhibit the DNA binding of N-acetoxy-PhIP, a putative ultimate carcinogen of PhIP formed in vivo via metabolic activation. Among these, epigallocatechin gallate was exceptionally potent. HPLC analyses of these incubation mixtures containing N-acetoxy-PhIP and the tea polyphenols each revealed the production of the parent amine, PhIP, indicating the involvement of a redox mechanism. In view of the presence of relatively high levels of tea polyphenols in rat and human plasma after ingestion of tea, this study suggests that direct reduction of the ultimate carcinogen N-acetoxy-PhIP by tea polyphenols is likely to be involved in the mechanism of chemoprotection of tea against this carcinogen

  10. GMI-IPS: Python Processing Software for Aircraft Campaigns

    Science.gov (United States)

    Damon, M. R.; Strode, S. A.; Steenrod, S. D.; Prather, M. J.

    2018-01-01

    NASA's Atmospheric Tomography Mission (ATom) seeks to understand the impact of anthropogenic air pollution on gases in the Earth's atmosphere. Four flight campaigns are being deployed on a seasonal basis to establish a continuous global-scale data set intended to improve the representation of chemically reactive gases in global atmospheric chemistry models. The Global Modeling Initiative (GMI), is creating chemical transport simulations on a global scale for each of the ATom flight campaigns. To meet the computational demands required to translate the GMI simulation data to grids associated with the flights from the ATom campaigns, the GMI ICARTT Processing Software (GMI-IPS) has been developed and is providing key functionality for data processing and analysis in this ongoing effort. The GMI-IPS is written in Python and provides computational kernels for data interpolation and visualization tasks on GMI simulation data. A key feature of the GMI-IPS, is its ability to read ICARTT files, a text-based file format for airborne instrument data, and extract the required flight information that defines regional and temporal grid parameters associated with an ATom flight. Perhaps most importantly, the GMI-IPS creates ICARTT files containing GMI simulated data, which are used in collaboration with ATom instrument teams and other modeling groups. The initial main task of the GMI-IPS is to interpolate GMI model data to the finer temporal resolution (1-10 seconds) of a given flight. The model data includes basic fields such as temperature and pressure, but the main focus of this effort is to provide species concentrations of chemical gases for ATom flights. The software, which uses parallel computation techniques for data intensive tasks, linearly interpolates each of the model fields to the time resolution of the flight. The temporally interpolated data is then saved to disk, and is used to create additional derived quantities. In order to translate the GMI model data to the

  11. Single-tube linear DNA amplification (LinDA) for robust ChIP-seq

    NARCIS (Netherlands)

    Shankaranarayanan, P.; Mendoza-Parra, M.A.; Walia, M.; Wang, L.; Li, N.; Trindade, L.M.; Gronemeyer, H.

    2011-01-01

    Genome-wide profiling of transcription factors based on massive parallel sequencing of immunoprecipitated chromatin (ChIP-seq) requires nanogram amounts of DNA. Here we describe a high-fidelity, single-tube linear DNA amplification method (LinDA) for ChIP-seq and reChIP-seq with picogram DNA amounts

  12. 47 CFR 64.606 - VRS and IP Relay provider and TRS program certification.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false VRS and IP Relay provider and TRS program... Services and Related Customer Premises Equipment for Persons With Disabilities § 64.606 VRS and IP Relay... including notification in the Federal Register. (2) VRS and IP Relay provider. Any entity desiring to...

  13. CHARACTERIZING THE FORMATION HISTORY OF MILKY WAY LIKE STELLAR HALOS WITH MODEL EMULATORS

    International Nuclear Information System (INIS)

    Gómez, Facundo A.; O'Shea, Brian W.; Coleman-Smith, Christopher E.; Tumlinson, Jason; Wolpert, Robert L.

    2012-01-01

    We use the semi-analytic model ChemTreeN, coupled to cosmological N-body simulations, to explore how different galaxy formation histories can affect observational properties of Milky Way like galaxies' stellar halos and their satellite populations. Gaussian processes are used to generate model emulators that allow one to statistically estimate a desired set of model outputs at any location of a p-dimensional input parameter space. This enables one to explore the full input parameter space orders of magnitude faster than could be done otherwise. Using mock observational data sets generated by ChemTreeN itself, we show that it is possible to successfully recover the input parameter vectors used to generate the mock observables if the merger history of the host halo is known. However, our results indicate that for a given observational data set, the determination of 'best-fit' parameters is highly susceptible to the particular merger history of the host. Very different halo merger histories can reproduce the same observational data set, if the 'best-fit' parameters are allowed to vary from history to history. Thus, attempts to characterize the formation history of the Milky Way using these kind of techniques must be performed statistically, analyzing large samples of high-resolution N-body simulations.

  14. The Prospects of Whole Brain Emulation within the next Half- Century

    Science.gov (United States)

    Eth, Daniel; Foust, Juan-Carlos; Whale, Brandon

    2013-12-01

    Whole Brain Emulation (WBE), the theoretical technology of modeling a human brain in its entirety on a computer-thoughts, feelings, memories, and skills intact-is a staple of science fiction. Recently, proponents of WBE have suggested that it will be realized in the next few decades. In this paper, we investigate the plausibility of WBE being developed in the next 50 years (by 2063). We identify four essential requisite technologies: scanning the brain, translating the scan into a model, running the model on a computer, and simulating an environment and body. Additionally, we consider the cultural and social effects of WBE. We find the two most uncertain factors for WBE's future to be the development of advanced miniscule probes that can amass neural data in vivo and the degree to which the culture surrounding WBE becomes cooperative or competitive. We identify four plausible scenarios from these uncertainties and suggest the most likely scenario to be one in which WBE is realized, and the technology is used for moderately cooperative ends

  15. A multichip aVLSI system emulating orientation selectivity of primary visual cortical cells.

    Science.gov (United States)

    Shimonomura, Kazuhiro; Yagi, Tetsuya

    2005-07-01

    In this paper, we designed and fabricated a multichip neuromorphic analog very large scale integrated (aVLSI) system, which emulates the orientation selective response of the simple cell in the primary visual cortex. The system consists of a silicon retina and an orientation chip. An image, which is filtered by a concentric center-surround (CS) antagonistic receptive field of the silicon retina, is transferred to the orientation chip. The image transfer from the silicon retina to the orientation chip is carried out with analog signals. The orientation chip selectively aggregates multiple pixels of the silicon retina, mimicking the feedforward model proposed by Hubel and Wiesel. The chip provides the orientation-selective (OS) outputs which are tuned to 0 degrees, 60 degrees, and 120 degrees. The feed-forward aggregation reduces the fixed pattern noise that is due to the mismatch of the transistors in the orientation chip. The spatial properties of the orientation selective response were examined in terms of the adjustable parameters of the chip, i.e., the number of aggregated pixels and size of the receptive field of the silicon retina. The multichip aVLSI architecture used in the present study can be applied to implement higher order cells such as the complex cell of the primary visual cortex.

  16. Emulating Host-Microbiome Ecosystem of Human Gastrointestinal Tract in Vitro.

    Science.gov (United States)

    Park, Gun-Seok; Park, Min Hee; Shin, Woojung; Zhao, Connie; Sheikh, Sameer; Oh, So Jung; Kim, Hyun Jung

    2017-06-01

    The human gut microbiome performs prodigious physiological functions such as production of microbial metabolites, modulation of nutrient digestion and drug metabolism, control of immune system, and prevention of infection. Paradoxically, gut microbiome can also negatively orchestrate the host responses in diseases or chronic disorders, suggesting that the regulated and balanced host-gut microbiome crosstalk is a salient prerequisite in gastrointestinal physiology. To understand the pathophysiological role of host-microbiome crosstalk, it is critical to recreate in vivo relevant models of the host-gut microbiome ecosystem in human. However, controlling the multi-species microbial communities and their uncontrolled growth has remained a notable technical challenge. Furthermore, conventional two-dimensional (2D) or 3D culture systems do not recapitulate multicellular microarchitectures, mechanical dynamics, and tissue-specific functions. Here, we review recent advances and current pitfalls of in vitro and ex vivo models that display human GI functions. We also discuss how the disruptive technologies such as 3D organoids or a human organ-on-a-chip microphysiological system can contribute to better emulate host-gut microbiome crosstalks in health and disease. Finally, the medical and pharmaceutical significance of the gut microbiome-based personalized interventions is underlined as a future perspective.

  17. Meta-modelling, visualization and emulation of multi-dimensional data for virtual production intelligence

    Science.gov (United States)

    Schulz, Wolfgang; Hermanns, Torsten; Al Khawli, Toufik

    2017-07-01

    Decision making for competitive production in high-wage countries is a daily challenge where rational and irrational methods are used. The design of decision making processes is an intriguing, discipline spanning science. However, there are gaps in understanding the impact of the known mathematical and procedural methods on the usage of rational choice theory. Following Benjamin Franklin's rule for decision making formulated in London 1772, he called "Prudential Algebra" with the meaning of prudential reasons, one of the major ingredients of Meta-Modelling can be identified finally leading to one algebraic value labelling the results (criteria settings) of alternative decisions (parameter settings). This work describes the advances in Meta-Modelling techniques applied to multi-dimensional and multi-criterial optimization by identifying the persistence level of the corresponding Morse-Smale Complex. Implementations for laser cutting and laser drilling are presented, including the generation of fast and frugal Meta-Models with controlled error based on mathematical model reduction Reduced Models are derived to avoid any unnecessary complexity. Both, model reduction and analysis of multi-dimensional parameter space are used to enable interactive communication between Discovery Finders and Invention Makers. Emulators and visualizations of a metamodel are introduced as components of Virtual Production Intelligence making applicable the methods of Scientific Design Thinking and getting the developer as well as the operator more skilled.

  18. Isometric quadriceps strength determines sailing performance and neuromuscular fatigue during an upwind sailing emulation.

    Science.gov (United States)

    Bourgois, Jan G; Callewaert, Margot; Celie, Bert; De Clercq, Dirk; Boone, Jan

    2016-01-01

    This study investigates the physiological responses to upwind sailing on a laser emulation ergometer and analyses the components of the physical profile that determine the physiological responses related to sailing level. Ten male high-level laser sailors performed an upwind sailing test, incremental cycling test and quadriceps strength test. During the upwind sailing test, heart rate (HR), oxygen uptake, ventilation, respiratory exchange ratio, rating of perceived exertion (RPE) and lactate concentration were measured, combined with near-infrared spectroscopy (NIRS) and electromyography (EMG) registration of the M. Vastus lateralis. Repeated measures ANOVA showed for the cardio-respiratory, metabolic and muscles responses (mean power frequency [MPF], root mean square [RMS], deoxy[Hb+Mb]) during the upwind sailing test an initial significant increase followed by a stabilisation, despite a constant increase in RPE. Stepwise regression analysis showed that better sailing level was for 46.5% predicted by lower MPF decrease. Lower MPF decrease was for 57.8% predicted by a higher maximal isometric quadriceps strength. In conclusion, this study indicates that higher sailing level was mainly determined by a lower rate of neuromuscular fatigue during the upwind sailing test (as indicated by MPF decrease). Additionally, the level of neuromuscular fatigue was mainly determined by higher maximal isometric quadriceps strength stressing the importance of resistance training in the planning of training.

  19. Emulation and Sobol' sensitivity analysis of an atmospheric dispersion model applied to the Fukushima nuclear accident

    Science.gov (United States)

    Girard, Sylvain; Mallet, Vivien; Korsakissok, Irène; Mathieu, Anne

    2016-04-01

    Simulations of the atmospheric dispersion of radionuclides involve large uncertainties originating from the limited knowledge of meteorological input data, composition, amount and timing of emissions, and some model parameters. The estimation of these uncertainties is an essential complement to modeling for decision making in case of an accidental release. We have studied the relative influence of a set of uncertain inputs on several outputs from the Eulerian model Polyphemus/Polair3D on the Fukushima case. We chose to use the variance-based sensitivity analysis method of Sobol'. This method requires a large number of model evaluations which was not achievable directly due to the high computational cost of Polyphemus/Polair3D. To circumvent this issue, we built a mathematical approximation of the model using Gaussian process emulation. We observed that aggregated outputs are mainly driven by the amount of emitted radionuclides, while local outputs are mostly sensitive to wind perturbations. The release height is notably influential, but only in the vicinity of the source. Finally, averaging either spatially or temporally tends to cancel out interactions between uncertain inputs.

  20. Approaches for scalable modeling and emulation of cyber systems : LDRD final report.

    Energy Technology Data Exchange (ETDEWEB)

    Mayo, Jackson R.; Minnich, Ronald G.; Armstrong, Robert C.; Rudish, Don W.

    2009-09-01

    The goal of this research was to combine theoretical and computational approaches to better understand the potential emergent behaviors of large-scale cyber systems, such as networks of {approx} 10{sup 6} computers. The scale and sophistication of modern computer software, hardware, and deployed networked systems have significantly exceeded the computational research community's ability to understand, model, and predict current and future behaviors. This predictive understanding, however, is critical to the development of new approaches for proactively designing new systems or enhancing existing systems with robustness to current and future cyber threats, including distributed malware such as botnets. We have developed preliminary theoretical and modeling capabilities that can ultimately answer questions such as: How would we reboot the Internet if it were taken down? Can we change network protocols to make them more secure without disrupting existing Internet connectivity and traffic flow? We have begun to address these issues by developing new capabilities for understanding and modeling Internet systems at scale. Specifically, we have addressed the need for scalable network simulation by carrying out emulations of a network with {approx} 10{sup 6} virtualized operating system instances on a high-performance computing cluster - a 'virtual Internet'. We have also explored mappings between previously studied emergent behaviors of complex systems and their potential cyber counterparts. Our results provide foundational capabilities for further research toward understanding the effects of complexity in cyber systems, to allow anticipating and thwarting hackers.

  1. Global sensitivity analysis using emulators, with an example analysis of large fire plumes based on FDS simulations

    Energy Technology Data Exchange (ETDEWEB)

    Kelsey, Adrian [Health and Safety Laboratory, Harpur Hill, Buxton (United Kingdom)

    2015-12-15

    Uncertainty in model predictions of the behaviour of fires is an important issue in fire safety analysis in nuclear power plants. A global sensitivity analysis can help identify the input parameters or sub-models that have the most significant effect on model predictions. However, to perform a global sensitivity analysis using Monte Carlo sampling might require thousands of simulations to be performed and therefore would not be practical for an analysis based on a complex fire code using computational fluid dynamics (CFD). An alternative approach is to perform a global sensitivity analysis using an emulator. Gaussian process emulators can be built using a limited number of simulations and once built a global sensitivity analysis can be performed on an emulator, rather than using simulations directly. Typically reliable emulators can be built using ten simulations for each parameter under consideration, therefore allowing a global sensitivity analysis to be performed, even for a complex computer code. In this paper we use an example of a large scale pool fire to demonstrate an emulator based approach to global sensitivity analysis. In that work an emulator based global sensitivity analysis was used to identify the key uncertain model inputs affecting the entrainment rates and flame heights in large Liquefied Natural Gas (LNG) fire plumes. The pool fire simulations were performed using the Fire Dynamics Simulator (FDS) software. Five model inputs were varied: the fire diameter, burn rate, radiative fraction, computational grid cell size and choice of turbulence model. The ranges used for these parameters in the analysis were determined from experiment and literature. The Gaussian process emulators used in the analysis were created using 127 FDS simulations. The emulators were checked for reliability, and then used to perform a global sensitivity analysis and uncertainty analysis. Large-scale ignited releases of LNG on water were performed by Sandia National

  2. Piecewise linear emulator of the nonlinear Schroedinger equation and the resulting analytic solutions for Bose-Einstein condensates

    International Nuclear Information System (INIS)

    Theodorakis, Stavros

    2003-01-01

    We emulate the cubic term Ψ 3 in the nonlinear Schroedinger equation by a piecewise linear term, thus reducing the problem to a set of uncoupled linear inhomogeneous differential equations. The resulting analytic expressions constitute an excellent approximation to the exact solutions, as is explicitly shown in the case of the kink, the vortex, and a δ function trap. Such a piecewise linear emulation can be used for any differential equation where the only nonlinearity is a Ψ 3 one. In particular, it can be used for the nonlinear Schroedinger equation in the presence of harmonic traps, giving analytic Bose-Einstein condensate solutions that reproduce very accurately the numerically calculated ones in one, two, and three dimensions

  3. Pseudo-random generator to allow to an electronic pulse simulator the ability to emulate radioisotopes spectra

    International Nuclear Information System (INIS)

    Lucianna F A; Carrillo M A; Mangussi M J

    2012-01-01

    The present work describes the development of a pseudo-random system to provide to a simulator pulse of radiation detectors the ability to emit pulses patterns similar to those recorded when measuring actual radioisotope. The idea is that the system can emulate characteristic spectral distributions of known radioisotopes, as well as creating individual spectra for specific purposes. This design is based on an improvement in terms of software from earlier development that only supplied predefined amplitude pulses at constant intervals (author)

  4. Web-based IP telephony penetration system evaluating level of protection from attacks and threats

    OpenAIRE

    Vozňák, Miroslav; Řezáč, Filip

    2011-01-01

    This article deals with detection of threats in IP telephony, the authors developed a penetration testing system that is able to check up the level of protection from security threats in IP telephony. SIP is being widely used in building VoIP networks. Unlike the traditional telephone networks VoIP networks does not have a closed communication which makes communication medium vulnerable to all kinds of attacks from the in truders. The SIP server is a key component of VoIP infrastr...

  5. IP-10 can be measured in dried plasma spots in patients with chronic hepatitis C infection

    DEFF Research Database (Denmark)

    Ruhwald, Morten; Andersen, Ellen Sloth; Christensen, Peer Brehm

    2012-01-01

    The chemokine IP-10 (CXCL10) is a candidate marker for hepatitis C virus (HCV) fibrosis monitoring. The aim of this proof-of-concept study is to assess if IP-10 measurements from dried plasma spots (DPS) are accurate in HCV-infected patients with either minimal or significant fibrosis. We measured...... IP-10 levels in plasma and DPS of 21 HCV-infected patients with cirrhosis and 19 patients with no/little fibrosis (determined with FibroScan). Cirrhotic patients had significantly higher levels of IP-10 compared to patients with minimal fibrosis. DPS and plasma measurements of IP-10 are comparable...

  6. An adaptive tuned mass damper based on the emulation of positive and negative stiffness with an MR damper

    International Nuclear Information System (INIS)

    Weber, F; Boston, C; Maślanka, M

    2011-01-01

    This paper presents a new adaptive tuned mass damper (TMD) whose stiffness and damping can be tuned in real-time to changing frequencies of a target structure. The adaptive TMD consists of a tuned mass, a tuned passive spring and a magnetorheological (MR) damper. The MR damper is used to emulate controlled friction–viscous damping and controlled stiffness. The controlled positive or negative stiffness emulated by the MR damper works in parallel to the stiffness of the passive TMD spring. The resulting overall TMD stiffness can therefore be varied around the passive spring stiffness using the MR damper. Both the emulated stiffness and friction–viscous damping in the MR damper are controlled such that the resulting overall TMD stiffness and damping are adjusted according to Den Hartog's formulae. Simulations demonstrate that the adaptive TMD with a controlled MR damper provides the same reduction of steady state vibration amplitudes in the target structure as a passive TMD if the target structure vibrates at the nominal frequency. However, if the target structure vibrates at different frequencies, e.g. due to changed service loads, the adaptive TMD with a controlled MR damper outperforms the passive TMD by up to several 100% depending on the frequency change

  7. Modeling and Experimental Test of Grid-Tied Photovoltaic Cell Emulating System in the Stand-alone Mode

    Directory of Open Access Journals (Sweden)

    Vu Minh Phap

    2017-06-01

    Full Text Available In recent decades, generation of electricity from solar arrays has been increased to meet the world's growing energy demand. However, the utilization rate of the power conditioner in the grid-tied solar power system is low because the operation of solar panels is dependent on sunlight. Thus, we studied the method that the small scale wind power generating system in size from a few hundred watts to two or three kilowatts can be connected to the grid-tied power conditioner of the solar power system for residential applications with low power ratings (single phase, size is limited to 10kW by emulating characteristic of the solar panel. In this paper, we introduce the application of the grid-tied PV cell emulating system in the stand-alone mode to improve the utilization rate of the power conditioner. The simulation and experimental test results verify that the PV cell emulating system can operate the power conditioner of the gridtied solar power system.

  8. ChIP-PIT: Enhancing the Analysis of ChIP-Seq Data Using Convex-Relaxed Pair-Wise Interaction Tensor Decomposition.

    Science.gov (United States)

    Zhu, Lin; Guo, Wei-Li; Deng, Su-Ping; Huang, De-Shuang

    2016-01-01

    In recent years, thanks to the efforts of individual scientists and research consortiums, a huge amount of chromatin immunoprecipitation followed by high-throughput sequencing (ChIP-seq) experimental data have been accumulated. Instead of investigating them independently, several recent studies have convincingly demonstrated that a wealth of scientific insights can be gained by integrative analysis of these ChIP-seq data. However, when used for the purpose of integrative analysis, a serious drawback of current ChIP-seq technique is that it is still expensive and time-consuming to generate ChIP-seq datasets of high standard. Most researchers are therefore unable to obtain complete ChIP-seq data for several TFs in a wide variety of cell lines, which considerably limits the understanding of transcriptional regulation pattern. In this paper, we propose a novel method called ChIP-PIT to overcome the aforementioned limitation. In ChIP-PIT, ChIP-seq data corresponding to a diverse collection of cell types, TFs and genes are fused together using the three-mode pair-wise interaction tensor (PIT) model, and the prediction of unperformed ChIP-seq experimental results is formulated as a tensor completion problem. Computationally, we propose efficient first-order method based on extensions of coordinate descent method to learn the optimal solution of ChIP-PIT, which makes it particularly suitable for the analysis of massive scale ChIP-seq data. Experimental evaluation the ENCODE data illustrate the usefulness of the proposed model.

  9. VoIP attacks detection engine based on neural network

    Science.gov (United States)

    Safarik, Jakub; Slachta, Jiri

    2015-05-01

    The security is crucial for any system nowadays, especially communications. One of the most successful protocols in the field of communication over IP networks is Session Initiation Protocol. It is an open-source project used by different kinds of applications, both open-source and proprietary. High penetration and text-based principle made SIP number one target in IP telephony infrastructure, so security of SIP server is essential. To keep up with hackers and to detect potential malicious attacks, security administrator needs to monitor and evaluate SIP traffic in the network. But monitoring and following evaluation could easily overwhelm the security administrator in networks, typically in networks with a number of SIP servers, users and logically or geographically separated networks. The proposed solution lies in automatic attack detection systems. The article covers detection of VoIP attacks through a distributed network of nodes. Then the gathered data analyze aggregation server with artificial neural network. Artificial neural network means multilayer perceptron network trained with a set of collected attacks. Attack data could also be preprocessed and verified with a self-organizing map. The source data is detected by distributed network of detection nodes. Each node contains a honeypot application and traffic monitoring mechanism. Aggregation of data from each node creates an input for neural networks. The automatic classification on a centralized server with low false positive detection reduce the cost of attack detection resources. The detection system uses modular design for easy deployment in final infrastructure. The centralized server collects and process detected traffic. It also maintains all detection nodes.

  10. IP, ethernet and MPLS networks resource and fault management

    CERN Document Server

    Perez, André

    2013-01-01

    This book summarizes the key Quality of Service technologies deployed in telecommunications networks: Ethernet, IP, and MPLS. The QoS of the network is made up of two parts: fault and resource management. Network operation quality is among the functions to be fulfilled in order to offer QoS to the end user. It is characterized by four parameters: packet loss, delay, jitter or the variation of delay over time, and availability. Resource management employs mechanisms that enable the first three parameters to be guaranteed or optimized. Fault management aims to ensure continuity of service.

  11. Maqueta VoIP con media gateway controllers

    OpenAIRE

    Goicoechea Bozal, Ignacio Javier

    2010-01-01

    El presente proyecto fin de carrera tiene como objeto estudiar y comprobar el funcionamiento de un protocolo VoIP basado en una arquitectura softswitch. La tecnología softswitch nace con el fin de facilitar la interconexión entre la red telefónica pública conmutada y redes basadas en paquetes. Por esta razón, las grandes compañías telefónicas son las principales usuarias de este tipo de arquitectura. Se han evaluado 3 posibles protocolos para controlar la maqueta que se desea diseñar: SGC...

  12. The MIM web gateway to IP multicast e-meetings

    Science.gov (United States)

    Parviainen, Roland; Parnes, Peter

    2003-12-01

    As video conferencing and e-meeting systems are used more and more on the Internet and in businesses it becomes increasingly important to be able to participate from any computer at any location. Often this is impossible, since these systems requires often special software that are not available everywhere or impossible to install for administrative reasons. Many locations also lack the necessary network infrastructure such as IP multicast. This paper presents a WWW gateway system that enables users to participate using only a standard web browser. The design and architecture of the system are described and performance tests that show the scalability of the system are also presented.

  13. Implementation of mobile ip smooth handoff in wireless networks

    International Nuclear Information System (INIS)

    Kayastha, M.; Chowdhry, B.S.; Memon, A.R.

    2002-01-01

    This paper describes implementation of mobile IP services in two separate wireless LANs based on IEEE 802.11b standards, located in two distant buildings of a university campus. The purpose of the project was to achieve smooth hand-off when a mobile node moves between the two LANs. During our experimentation we have identified some of the limitation of IEEE 802.11b that affects mobile 1P smooth hand off. We have also proposed an algorithm to solve this problem when the mobility is within a limited number of separate wireless LANs. (author)

  14. A Novel 100 kW Power Hardware-in-the-Loop Emulation Test Bench for Permanent Magnet Synchronous Machines with Nonlinear Magnetics

    OpenAIRE

    Schmitt, Alexander; Richter, Jan; Gommeringer, Mario; Wersal, Thomas; Braun, Michael

    2016-01-01

    This paper presents a high dynamic power hardware-inthe-loop (PHIL) emulation test bench to mimic arbitrary permanent magnet synchronous machines with nonlinear magnetics. The proposed PHIL test bench is composed of a high performance real-time simulation system to calculate the machine behaviour and a seven level modular multiphase multilevel converter to emulate the power flow of the virtual machine. The PHIL test bench is parametrized for an automotive synchronous machine and controlled by...

  15. Accumulation of operational history through emulation test to meet proven technology requirement for newly developed I and C technology

    International Nuclear Information System (INIS)

    Yeong Cheol, Shin; Sung Kon, Kang; Han Seong, Son

    2006-01-01

    As new advanced digital I and C technology with potential benefits of higher functionality and better cost effectiveness is available in the market, NPP (Nuclear Power Plant) operators are inclined to use the new technology for the construction of new plant and the upgrade of existing plants. However, this new technology poses risks to the NPP operators at the same time. These risks are mainly due to the poor reliability of newly developed technology. KHNP's past experiences with the new equipment shows many cases of reliability problems. And their consequences include unintended plant trips, lowered acceptance of the new digital technology by the plant I and C maintenance crew, and increased licensing burden in answering for questions from the nuclear regulatory body. Considering the fact that the risk of these failures in the nuclear plant operation is far greater than those in other industry, nuclear power plant operators want proven technology for I and C systems. This paper presents an approach for the emulation of operational history through which a newly developed technology becomes a proven technology. One of the essential elements of this approach is the feedback scheme of running the new equipment in emulated environment, gathering equipment failure, and correcting the design(and test bed). The emulation of environment includes normal and abnormal events of the new equipment such as reconfiguration of control system due to power failure, plant operation including full spectrum of credible scenarios in an NPP. Emulation of I and C equipment execution mode includes normal operation, initialization and termination, abnormal operation, hardware maintenance and maintenance of algorithm/software. Plant specific simulator is used to create complete profile of plant operational conditions that I and C equipment is to experience in the real plant. Virtual operating crew technology is developed to run the simulator scenarios without involvement of actual operators

  16. Dynamical analysis of Parkinsonian state emulated by hybrid Izhikevich neuron models

    Science.gov (United States)

    Liu, Chen; Wang, Jiang; Yu, Haitao; Deng, Bin; Wei, Xile; Li, Huiyan; Loparo, Kenneth A.; Fietkiewicz, Chris

    2015-11-01

    Computational models play a significant role in exploring novel theories to complement the findings of physiological experiments. Various computational models have been developed to reveal the mechanisms underlying brain functions. Particularly, in the development of therapies to modulate behavioral and pathological abnormalities, computational models provide the basic foundations to exhibit transitions between physiological and pathological conditions. Considering the significant roles of the intrinsic properties of the globus pallidus and the coupling connections between neurons in determining the firing patterns and the dynamical activities of the basal ganglia neuronal network, we propose a hypothesis that pathological behaviors under the Parkinsonian state may originate from combined effects of intrinsic properties of globus pallidus neurons and synaptic conductances in the whole neuronal network. In order to establish a computational efficient network model, hybrid Izhikevich neuron model is used due to its capacity of capturing the dynamical characteristics of the biological neuronal activities. Detailed analysis of the individual Izhikevich neuron model can assist in understanding the roles of model parameters, which then facilitates the establishment of the basal ganglia-thalamic network model, and contributes to a further exploration of the underlying mechanisms of the Parkinsonian state. Simulation results show that the hybrid Izhikevich neuron model is capable of capturing many of the dynamical properties of the basal ganglia-thalamic neuronal network, such as variations of the firing rates and emergence of synchronous oscillations under the Parkinsonian condition, despite the simplicity of the two-dimensional neuronal model. It may suggest that the computational efficient hybrid Izhikevich neuron model can be used to explore basal ganglia normal and abnormal functions. Especially it provides an efficient way of emulating the large-scale neuron network

  17. Feasibility of neuro-morphic computing to emulate error-conflict based decision making.

    Energy Technology Data Exchange (ETDEWEB)

    Branch, Darren W.

    2009-09-01

    A key aspect of decision making is determining when errors or conflicts exist in information and knowing whether to continue or terminate an action. Understanding the error-conflict processing is crucial in order to emulate higher brain functions in hardware and software systems. Specific brain regions, most notably the anterior cingulate cortex (ACC) are known to respond to the presence of conflicts in information by assigning a value to an action. Essentially, this conflict signal triggers strategic adjustments in cognitive control, which serve to prevent further conflict. The most probable mechanism is the ACC reports and discriminates different types of feedback, both positive and negative, that relate to different adaptations. Unique cells called spindle neurons that are primarily found in the ACC (layer Vb) are known to be responsible for cognitive dissonance (disambiguation between alternatives). Thus, the ACC through a specific set of cells likely plays a central role in the ability of humans to make difficult decisions and solve challenging problems in the midst of conflicting information. In addition to dealing with cognitive dissonance, decision making in high consequence scenarios also relies on the integration of multiple sets of information (sensory, reward, emotion, etc.). Thus, a second area of interest for this proposal lies in the corticostriatal networks that serve as an integration region for multiple cognitive inputs. In order to engineer neurological decision making processes in silicon devices, we will determine the key cells, inputs, and outputs of conflict/error detection in the ACC region. The second goal is understand in vitro models of corticostriatal networks and the impact of physical deficits on decision making, specifically in stressful scenarios with conflicting streams of data from multiple inputs. We will elucidate the mechanisms of cognitive data integration in order to implement a future corticostriatal-like network in silicon

  18. Fish the ChIPs: a pipeline for automated genomic annotation of ChIP-Seq data

    Directory of Open Access Journals (Sweden)

    Minucci Saverio

    2011-10-01

    Full Text Available Abstract Background High-throughput sequencing is generating massive amounts of data at a pace that largely exceeds the throughput of data analysis routines. Here we introduce Fish the ChIPs (FC, a computational pipeline aimed at a broad public of users and designed to perform complete ChIP-Seq data analysis of an unlimited number of samples, thus increasing throughput, reproducibility and saving time. Results Starting from short read sequences, FC performs the following steps: 1 quality controls, 2 alignment to a reference genome, 3 peak calling, 4 genomic annotation, 5 generation of raw signal tracks for visualization on the UCSC and IGV genome browsers. FC exploits some of the fastest and most effective tools today available. Installation on a Mac platform requires very basic computational skills while configuration and usage are supported by a user-friendly graphic user interface. Alternatively, FC can be compiled from the source code on any Unix machine and then run with the possibility of customizing each single parameter through a simple configuration text file that can be generated using a dedicated user-friendly web-form. Considering the execution time, FC can be run on a desktop machine, even though the use of a computer cluster is recommended for analyses of large batches of data. FC is perfectly suited to work with data coming from Illumina Solexa Genome Analyzers or ABI SOLiD and its usage can potentially be extended to any sequencing platform. Conclusions Compared to existing tools, FC has two main advantages that make it suitable for a broad range of users. First of all, it can be installed and run by wet biologists on a Mac machine. Besides it can handle an unlimited number of samples, being convenient for large analyses. In this context, computational biologists can increase reproducibility of their ChIP-Seq data analyses while saving time for downstream analyses. Reviewers This article was reviewed by Gavin Huttley, George

  19. Enhanced service zone architecture for multiservices over IP

    Science.gov (United States)

    Michaely, Boaz; Mohan, Seshadri

    2001-07-01

    Recently, the field of IP Telephony has been experienced considerable evolution through the specification of new protocols and introduction of products implementing these protocols. We visualize IP Telephony evolving to soon offer multiservices encompassing not only voice, but also data, video and multimedia. While the progress has focused on refining protocols and architectures, very little attention has been given to business models for offering these services. This paper introduces the concept of a Service Zone, which from a service provider/network operator perspective fits within the operator's administrative domain, but is viewed as an independent zone with its own management and services, requiring minimal integration with the core network services. Besides its own management, the Enhanced Services Zone may also provide provisioning and maintenance features needed to provide the customer services and availability that subscribers expect from a telephony service providers. The platform must provide reliable service over time, be scalable to meet increased capacity demands, and be upgradeable to incorporate advanced services and features as they become available. Signaling flows are illustrated using SIP and H.323.

  20. Classifier fusion for VoIP attacks classification

    Science.gov (United States)

    Safarik, Jakub; Rezac, Filip

    2017-05-01

    SIP is one of the most successful protocols in the field of IP telephony communication. It establishes and manages VoIP calls. As the number of SIP implementation rises, we can expect a higher number of attacks on the communication system in the near future. This work aims at malicious SIP traffic classification. A number of various machine learning algorithms have been developed for attack classification. The paper presents a comparison of current research and the use of classifier fusion method leading to a potential decrease in classification error rate. Use of classifier combination makes a more robust solution without difficulties that may affect single algorithms. Different voting schemes, combination rules, and classifiers are discussed to improve the overall performance. All classifiers have been trained on real malicious traffic. The concept of traffic monitoring depends on the network of honeypot nodes. These honeypots run in several networks spread in different locations. Separation of honeypots allows us to gain an independent and trustworthy attack information.

  1. IP access networks with QoS support

    Science.gov (United States)

    Sargento, Susana; Valadas, Rui J. M. T.; Goncalves, Jorge; Sousa, Henrique

    2001-07-01

    The increasing demand of new services and applications is pushing for drastic changes on the design of access networks targeted mainly for residential and SOHO users. Future access networks will provide full service integration (including multimedia), resource sharing at the packet level and QoS support. It is expected that using IP as the base technology, the ideal plug-and-play scenario, where the management actions of the access network operator are kept to a minimum, will be achieved easily. This paper proposes an architecture for access networks based on layer 2 or layer 3 multiplexers that allows a number of simplifications in the network elements and protocols (e.g. in the routing and addressing functions). We discuss two possible steps in the evolution of access networks towards a more efficient support of IP based services. The first one still provides no QoS support and was designed with the goal of reusing as much as possible current technologies; it is based on tunneling to transport PPP sessions. The second one introduces QoS support through the use of emerging technologies and protocols. We illustrate the different phases of a multimedia Internet access session, when using SIP for session initiation, COPS for the management of QoS policies including the AAA functions and RSVP for resource reservation.

  2. An Early Fire Detection Algorithm Using IP Cameras

    Directory of Open Access Journals (Sweden)

    Hector Perez-Meana

    2012-05-01

    Full Text Available The presence of smoke is the first symptom of fire; therefore to achieve early fire detection, accurate and quick estimation of the presence of smoke is very important. In this paper we propose an algorithm to detect the presence of smoke using video sequences captured by Internet Protocol (IP cameras, in which important features of smoke, such as color, motion and growth properties are employed. For an efficient smoke detection in the IP camera platform, a detection algorithm must operate directly in the Discrete Cosine Transform (DCT domain to reduce computational cost, avoiding a complete decoding process required for algorithms that operate in spatial domain. In the proposed algorithm the DCT Inter-transformation technique is used to increase the detection accuracy without inverse DCT operation. In the proposed scheme, firstly the candidate smoke regions are estimated using motion and color smoke properties; next using morphological operations the noise is reduced. Finally the growth properties of the candidate smoke regions are furthermore analyzed through time using the connected component labeling technique. Evaluation results show that a feasible smoke detection method with false negative and false positive error rates approximately equal to 4% and 2%, respectively, is obtained.

  3. Software-Defined Congestion Control Algorithm for IP Networks

    Directory of Open Access Journals (Sweden)

    Yao Hu

    2017-01-01

    Full Text Available The rapid evolution of computer networks, increase in the number of Internet users, and popularity of multimedia applications have exacerbated the congestion control problem. Congestion control is a key factor in ensuring network stability and robustness. When the underlying network and flow information are unknown, the transmission control protocol (TCP must increase or reduce the size of the congestion window to adjust to the changes of traffic in the Internet Protocol (IP network. However, it is possible that a software-defined approach can relieve the network congestion problem more efficiently. This approach has the characteristic of centralized control and can obtain a global topology for unified network management. In this paper, we propose a software-defined congestion control (SDCC algorithm for an IP network. We consider the difference between TCP and the user datagram protocol (UDP and propose a new method to judge node congestion. We initially apply the congestion control mechanism in the congested nodes and then optimize the link utilization to control network congestion.

  4. Performance Evaluation of IP Based Multimedia Services in UMTS

    Directory of Open Access Journals (Sweden)

    Riri Fitri SARI

    2008-01-01

    Full Text Available This paper presents our work in the performance evaluation of UMTS network based on simulation. Enhanced UMTS Radio Access Network Extensions for NS-2 (EURANE developed by SEACORN has brought us to the higher phase of UMTS simulation in third generation wireless telecommunication system. Wireless 3G is designed to be able to deliver various kind of multimedia package through an IP network for the purpose of easier interconnection with fixed network with various existing multimedia services. Multimedia services with their bandwidth consumption characteristics are able to be sent through a UMTS network with the existence of High Speed Data Packet Access (HSPDA in Release 5. Quality of Service (QoS is a major concern in multimedia services. This paper shows the performance analysis of a number of multimedia services and their QoS using HSDPA in UMTS. The experiments were based on EURANE extension for NS-2. From the simulation conducted, we found that Unacknowledged Mode (UM in Radio Link Control (RLC will perform better for QoS class number 1 (VoIP and 2 (Video Streaming, while Acknowledged Mode (AM mode are more suitable for QoS class number 3 (web server and 4 (FTP.

  5. Enabling IP Header Compression in COTS Routers via Frame Relay on a Simplex Link

    Science.gov (United States)

    Nguyen, Sam P.; Pang, Jackson; Clare, Loren P.; Cheng, Michael K.

    2010-01-01

    NASA is moving toward a networkcentric communications architecture and, in particular, is building toward use of Internet Protocol (IP) in space. The use of IP is motivated by its ubiquitous application in many communications networks and in available commercial off-the-shelf (COTS) technology. The Constellation Program intends to fit two or more voice (over IP) channels on both the forward link to, and the return link from, the Orion Crew Exploration Vehicle (CEV) during all mission phases. Efficient bandwidth utilization of the links is key for voice applications. In Voice over IP (VoIP), the IP packets are limited to small sizes to keep voice latency at a minimum. The common voice codec used in VoIP is G.729. This new algorithm produces voice audio at 8 kbps and in packets of 10-milliseconds duration. Constellation has designed the VoIP communications stack to use the combination of IP/UDP/RTP protocols where IP carries a 20-byte header, UDP (User Datagram Protocol) carries an 8-byte header, and RTP (Real Time Transport Protocol) carries a 12-byte header. The protocol headers total 40 bytes and are equal in length to a 40-byte G.729 payload, doubling the VoIP latency. Since much of the IP/UDP/RTP header information does not change from IP packet to IP packet, IP/UDP/RTP header compression can avoid transmission of much redundant data as well as reduce VoIP latency. The benefits of IP header compression are more pronounced at low data rate links such as the forward and return links during CEV launch. IP/UDP/RTP header compression codecs are well supported by many COTS routers. A common interface to the COTS routers is through frame relay. However, enabling IP header compression over frame relay, according to industry standard (Frame Relay IP Header Compression Agreement FRF.20), requires a duplex link and negotiations between the compressor router and the decompressor router. In Constellation, each forward to and return link from the CEV in space is treated

  6. Design of IP Camera Access Control Protocol by Utilizing Hierarchical Group Key

    Directory of Open Access Journals (Sweden)

    Jungho Kang

    2015-08-01

    Full Text Available Unlike CCTV, security video surveillance devices, which we have generally known about, IP cameras which are connected to a network either with or without wire, provide monitoring services through a built-in web-server. Due to the fact that IP cameras can use a network such as the Internet, multiple IP cameras can be installed at a long distance and each IP camera can utilize the function of a web server individually. Even though IP cameras have this kind of advantage, it has difficulties in access control management and weakness in user certification, too. Particularly, because the market of IP cameras did not begin to be realized a long while ago, systems which are systematized from the perspective of security have not been built up yet. Additionally, it contains severe weaknesses in terms of access authority to the IP camera web server, certification of users, and certification of IP cameras which are newly installed within a network, etc. This research grouped IP cameras hierarchically to manage them systematically, and provided access control and data confidentiality between groups by utilizing group keys. In addition, IP cameras and users are certified by using PKI-based certification, and weak points of security such as confidentiality and integrity, etc., are improved by encrypting passwords. Thus, this research presents specific protocols of the entire process and proved through experiments that this method can be actually applied.

  7. Pengaruh Pembelajaran IPS Berbasis Proyek Terhadap Persepsi Konsumsi Berkarakter Mahasiswa S1 Pendidikan IPS Universitas Negeri Malang

    Directory of Open Access Journals (Sweden)

    Khofifatu Rohmah Adi

    2017-10-01

    Full Text Available This study aims to determine the effect of the project-based learning social studies consumer perceptions of student character. Consumer perception of the character of this research is focused on the consumption of environmentally sound because it was found that the students are less concerned about the environment, especially the cleanliness class. This type of research including quasi experimental, aimed at assessing the effect of an action learning on students' perceptions before and after treatment. Subjects were students of 2015 batch S1 IPS which follows the introductory economics course. The instrument used to measure the consumption of environmentally sound perception using a questionnaire with Likert scale. Based on the homogeneity test the cognitive abilities of students conclusion has a homogeneous character and definitive experimental group and the control is done randomly. This study analyzed SPSS 22.0 for Windows using independent sample T-test. Results of the analysis showed that there were significant differences between the control and experimental class class. Therefore, it can be concluded that the application of project-based learning IPS effect on consumer perceptions of character. In project-based learning allows students trying to construct their own knowledge and actively involved in seeking information so it is expected that students are able to connect theory gained with the existing reality in the environment. Keywords: Project Based Learning, Perception Character consumption   http://dx.doi.org/10.17977/um022v1i12016p065

  8. PENGEMBANGAN PERANGKAT PEMBELAJARAN IPS TERPADU BERBASIS OUTDOOR LEARNING

    Directory of Open Access Journals (Sweden)

    Nugraheni Rachmawati

    2013-03-01

    Full Text Available AbstrakPelaksanaan kegiatan pembelajaran tematik di SD kota Semarang belum optimal. Sebagian besar guru belum menyusun dan menggunakan perangkat pembelaja- ran IPS Terpadu berbasis outdoor learning. Tujuan penelitian ini mengembangkan, mengkaji keefektifan dan kepraktisan perangkat pembelajaran. Penelitian ini meru- pakan penelitian pengembangan yang dimodifikasi dari penelitian Borg and Gall. Subjek penelitian adalah siswa kelas 3 SD N Jatingaleh 01-02 Kota Semarang ta- hun pelajaran 2012/2013. Spesifikasi produk yang dikembangkan adalah perangkat pembelajaran IPS terpadu berbasis outdoor learning berupa silabus, RPP, media CD Interaktif, LKS dan alat evaluasi meliputi test kognitif, lembar observasi aktivi- tas serta angket respons siswa dan guru. Data dianalisis secara deskriptif dan Pretest- Posttest Control Group Design. Hasil penelitian menunjukkan bahwa pengembangan perangkat pembelajaran tergolong valid. Keefektifan perangkat dilihat dari aktivitas dan hasil belajar siswa. Aktivitas siswa tergolong sangat tinggi. Hasil belajar kog- nitif siswa setelah mengikuti pembelajaran IPS Terpadu berbasis Outdoor Learning mengalami peningkatan yang signifikan serta mencapai ketuntasan belajar. Rata- rata hasil belajar kognitif siswa secara signifikan lebih besar daripada kelompok siswa yang mengikuti pembelajaran in door. Saran, hendaknya dapat dikembangkan lagi keefektifanya sehingga dapat lebih menggali kemampuan siswa, tidak hanya dalam segi kognitif dan afektif tetapi juga psikomotor. AbstractImplementation of thematic learning activities in elementary school of Semarang is not opti- mal. Most of the teachers do not prepare and use integrated social science learning tools based on outdoor learning. This research is aimed to develop the tools and to review the effectiveness and practicality of integrated social science learning based on outdoor learning. This is a research and development study modified from the research developed by Borg and

  9. The wavy Mutation Maps to the Inositol 1,4,5-Trisphosphate 3-Kinase 2 (IP3K2) Gene of Drosophila and Interacts with IP3R to Affect Wing Development.

    Science.gov (United States)

    Dean, Derek M; Maroja, Luana S; Cottrill, Sarah; Bomkamp, Brent E; Westervelt, Kathleen A; Deitcher, David L

    2015-11-27

    Inositol 1,4,5-trisphosphate (IP3) regulates a host of biological processes from egg activation to cell death. When IP3-specific receptors (IP3Rs) bind to IP3, they release calcium from the ER into the cytoplasm, triggering a variety of cell type- and developmental stage-specific responses. Alternatively, inositol polyphosphate kinases can phosphorylate IP3; this limits IP3R activation by reducing IP3 levels, and also generates new signaling molecules altogether. These divergent pathways draw from the same IP3 pool yet cause very different cellular responses. Therefore, controlling the relative rates of IP3R activation vs. phosphorylation of IP3 is essential for proper cell functioning. Establishing a model system that sensitively reports the net output of IP3 signaling is crucial for identifying the controlling genes. Here we report that mutant alleles of wavy (wy), a classic locus of the fruit fly Drosophila melanogaster, map to IP3 3-kinase 2 (IP3K2), a member of the inositol polyphosphate kinase gene family. Mutations in wy disrupt wing structure in a highly specific pattern. RNAi experiments using GAL4 and GAL80(ts) indicated that IP3K2 function is required in the wing discs of early pupae for normal wing development. Gradations in the severity of the wy phenotype provide high-resolution readouts of IP3K2 function and of overall IP3 signaling, giving this system strong potential as a model for further study of the IP3 signaling network. In proof of concept, a dominant modifier screen revealed that mutations in IP3R strongly suppress the wy phenotype, suggesting that the wy phenotype results from reduced IP4 levels, and/or excessive IP3R signaling. Copyright © 2016 Dean et al.

  10. The wavy Mutation Maps to the Inositol 1,4,5-Trisphosphate 3-Kinase 2 (IP3K2 Gene of Drosophila and Interacts with IP3R to Affect Wing Development

    Directory of Open Access Journals (Sweden)

    Derek M. Dean

    2016-02-01

    Full Text Available Inositol 1,4,5-trisphosphate (IP3 regulates a host of biological processes from egg activation to cell death. When IP3-specific receptors (IP3Rs bind to IP3, they release calcium from the ER into the cytoplasm, triggering a variety of cell type- and developmental stage-specific responses. Alternatively, inositol polyphosphate kinases can phosphorylate IP3; this limits IP3R activation by reducing IP3 levels, and also generates new signaling molecules altogether. These divergent pathways draw from the same IP3 pool yet cause very different cellular responses. Therefore, controlling the relative rates of IP3R activation vs. phosphorylation of IP3 is essential for proper cell functioning. Establishing a model system that sensitively reports the net output of IP3 signaling is crucial for identifying the controlling genes. Here we report that mutant alleles of wavy (wy, a classic locus of the fruit fly Drosophila melanogaster, map to IP3 3-kinase 2 (IP3K2, a member of the inositol polyphosphate kinase gene family. Mutations in wy disrupt wing structure in a highly specific pattern. RNAi experiments using GAL4 and GAL80ts indicated that IP3K2 function is required in the wing discs of early pupae for normal wing development. Gradations in the severity of the wy phenotype provide high-resolution readouts of IP3K2 function and of overall IP3 signaling, giving this system strong potential as a model for further study of the IP3 signaling network. In proof of concept, a dominant modifier screen revealed that mutations in IP3R strongly suppress the wy phenotype, suggesting that the wy phenotype results from reduced IP4 levels, and/or excessive IP3R signaling.

  11. Numerical study of IP3-induced Ca2+ spiral pattern evolution

    International Nuclear Information System (INIS)

    Tang Jun; Ma Jun; Yi Ming; Jia Ya

    2008-01-01

    The effect of change in concentration of messenger molecule inositol 1,4,5-trisphosphate (IP 3 ) on intracellular Ca 2+ spiral pattern evolution is studied numerically. The results indicate that when the IP 3 concentration decreases from 0.27 μM, a physiologically reasonable value, to different values, the spiral centre drifts to the edge of the medium and disappears for a small enough IP 3 concentration. The instability of spiral pattern can be understood in terms of excitability-change controlled by the IP 3 concentration. On the other hand, when the IP 3 concentration increases from 0.27 μM, a homogeneous area with a high Ca 2+ concentration emerges and competes with the spiral pattern. A high enough IP 3 concentration can lead the homogeneous area to occupy the whole medium. The instability of spiral pattern is ascribed to the change in stability of a stationary state with a high Ca 2+ concentration. (general)

  12. Study of transmitting electric power utility communications in IP network. Transmission of existing electric power utility communications in best effort type IP network under delay constraint; Denryokuyo tsushin kaisen no IP mo eno shuyo kento. Chien jikan seiyakuka ni okeru best effort gata IP mo eno kison denryokuyo tsushin kaisen no shuyo

    Energy Technology Data Exchange (ETDEWEB)

    Miyake, H.

    2000-07-01

    Since IP network does best effort behavior fundamentally, it always generates delay time and delay variation. For this reason, IP network has been unsuitable to transmit real time data such as a voice. However, in recent years, the technologies which transmit real time data in IP network, e.g. VoIP, have spread. If it is possible to transmit the existing electric power utility communications in IP network using these technologies, total network cost can be reduced by the reduction of required bandwidth and the simplification of communication network systems. In this report, it is examined quantitatively whether end-end delay time of the existing electric power utility communications, e.g. on-line, telephone, carrier relay, CDT (cyclic digital transmission equipment), video conference, ITV(industrial television), is within their permission delay time when they are transmitted in the best effort type IP network. (author)

  13. An operator self-training system based upon the emulation of instructor skill

    International Nuclear Information System (INIS)

    Zuenkov, M.; Marsiletti, M.

    1999-01-01

    In the early 90's a project started in Ansaldo for developing the Training Compact Simulation Technology. One of the objectives was to substitute the human instructor with an Expert System based on the Emulation of Instructor Skill (EIS). EIS stems from software architecture and an ad hoc language (ABIS) developed at Institute of Control Sciences (ICS) of Moscow. The expert system relies upon Artificial Intelligence technology and qualitative logic modelling of controlled plant physics. Its task is to explain the physical effects of controlled plant behaviour and control system response and comment on them as well as estimation of operator's actions in standard and nonstandard situations. Insight into process physics is obtained through consulting the expert system into which the qualitative process model is built-in, thus enabling expert explanation of fine physical effects such as: identification of disturbance and control system actions. The main features of EIS are: (a) checking the correct memorisation of the plant procedures, (b) testing his own reactions when facing abnormal and/or unexpected situations, (c) improving his own engineering sensitivity, (d) getting on-line answers to specific questions, such as: what are the reasons of the current status of Plant (Operator control actions, control system actions, disturbances imposed by the Instructor, transient behaviour of parameters); what events are the result of the action performed by the Operator (step by step); what events can result from a given Operator action (prediction); correspondence of the Operator actions to the steps of the performed procedures; in abnormal situations, judgement about operator actions (positive or negative, with respect to the goal of plant stabilisation or disturbances elimination). A demonstrative application was developed for Sampierdarena 40 MW Cogeneration Plant. The plant model running under the simulator was built-up by means of the LEGO code. The LEGO code is a modular

  14. A hydrological emulator for global applications – HE v1.0.0

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Yaling; Hejazi, Mohamad; Li, Hongyi; Zhang, Xuesong; Leng, Guoyong

    2018-01-01

    While global hydrological models (GHMs) are very useful in exploring water resources and interactions between the Earth and human systems, their use often requires numerous model inputs, complex model calibration, and high computation costs. To overcome these challenges, we construct an efficient open-source and ready-to-use hydrological emulator (HE) that can mimic complex GHMs at a range of spatial scales (e.g., basin, region, globe). More specifically, we construct both a lumped and a distributed scheme of the HE based on the monthly abcd model to explore the tradeoff between computational cost and model fidelity. Model predictability and computational efficiency are evaluated in simulating global runoff from 1971 to 2010 with both the lumped and distributed schemes. The results are compared against the runoff product from the widely used Variable Infiltration Capacity (VIC) model. Our evaluation indicates that the lumped and distributed schemes present comparable results regarding annual total quantity, spatial pattern, and temporal variation of the major water fluxes (e.g., total runoff, evapotranspiration) across the global 235 basins (e.g., correlation coefficient r between the annual total runoff from either of these two schemes and the VIC is > 0.96), except for several cold (e.g., Arctic, interior Tibet), dry (e.g., North Africa) and mountainous (e.g., Argentina) regions. Compared against the monthly total runoff product from the VIC (aggregated from daily runoff), the global mean Kling–Gupta efficiencies are 0.75 and 0.79 for the lumped and distributed schemes, respectively, with the distributed scheme better capturing spatial heterogeneity. Notably, the computation efficiency of the lumped scheme is 2 orders of magnitude higher than the distributed one and 7 orders more efficient than the VIC model. A case study of uncertainty analysis for the world's 16 basins with top annual streamflow is conducted using 100 000 model simulations, and it

  15. A hydrological emulator for global applications - HE v1.0.0

    Science.gov (United States)

    Liu, Yaling; Hejazi, Mohamad; Li, Hongyi; Zhang, Xuesong; Leng, Guoyong

    2018-03-01

    While global hydrological models (GHMs) are very useful in exploring water resources and interactions between the Earth and human systems, their use often requires numerous model inputs, complex model calibration, and high computation costs. To overcome these challenges, we construct an efficient open-source and ready-to-use hydrological emulator (HE) that can mimic complex GHMs at a range of spatial scales (e.g., basin, region, globe). More specifically, we construct both a lumped and a distributed scheme of the HE based on the monthly abcd model to explore the tradeoff between computational cost and model fidelity. Model predictability and computational efficiency are evaluated in simulating global runoff from 1971 to 2010 with both the lumped and distributed schemes. The results are compared against the runoff product from the widely used Variable Infiltration Capacity (VIC) model. Our evaluation indicates that the lumped and distributed schemes present comparable results regarding annual total quantity, spatial pattern, and temporal variation of the major water fluxes (e.g., total runoff, evapotranspiration) across the global 235 basins (e.g., correlation coefficient r between the annual total runoff from either of these two schemes and the VIC is > 0.96), except for several cold (e.g., Arctic, interior Tibet), dry (e.g., North Africa) and mountainous (e.g., Argentina) regions. Compared against the monthly total runoff product from the VIC (aggregated from daily runoff), the global mean Kling-Gupta efficiencies are 0.75 and 0.79 for the lumped and distributed schemes, respectively, with the distributed scheme better capturing spatial heterogeneity. Notably, the computation efficiency of the lumped scheme is 2 orders of magnitude higher than the distributed one and 7 orders more efficient than the VIC model. A case study of uncertainty analysis for the world's 16 basins with top annual streamflow is conducted using 100 000 model simulations, and it demonstrates

  16. Optimal design of an IP/MPLS over DWDM network

    Directory of Open Access Journals (Sweden)

    Eduardo Canale

    2014-04-01

    Full Text Available Different approaches for deploying resilient optical networks of low cost constitute a traditional group of NP-Hard problems that have been widely studied. Most of them are based on the construction of low cost networks that fulfill connectivity constraints. However, recent trends to virtualize optical networks over the legacy fiber infrastructure, modified the nature of network design problems and turned inappropriate many of these models and algorithms. In this paper we study a design problem arising from the deployment of an IP/MPLS network over an existing DWDM infrastructure. Besides cost and resiliency, this problem integrates traffic and capacity constraints. We present: an integer programming formulation for the problem, theoretical results, and describe how several metaheuristics were applied in order to find good quality solutions, for a real application case of a telecommunications company.

  17. Research on an IP disaster recovery storage system

    Science.gov (United States)

    Zeng, Dong; Wang, Yusheng; Zhu, Jianfeng

    2008-12-01

    According to both the Fibre Channel (FC) Storage Area Network (SAN) switch and Fabric Application Interface Standard (FAIS) mechanism, an iSCSI storage controller is put forward and based upon it, an internet Small Computer System Interface (iSCSI) SAN construction strategy for disaster recovery (DR) is proposed and some multiple sites replication models and a closed queue performance analysis method are also discussed in this paper. The iSCSI storage controller lies in the fabric level of the networked storage infrastructure, and it can be used to connect to both the hybrid storage applications and storage subsystems, besides, it can provide virtualized storage environment and support logical volume access control, and by cooperating with the remote peerparts, a disaster recovery storage system can be built on the basis of the data replication, block-level snapshot and Internet Protocol (IP) take-over functions.

  18. Characterization, Monitoring, and Sensor Technology Integrated Program (CMST-IP)

    International Nuclear Information System (INIS)

    1994-04-01

    The Characterization, Monitoring, and Sensor Technology Integrated Program seeks to deliver needed technologies, timely and cost-effectively, to the Office of Waste Management (EM-30), the Office of Environmental Restoration (EM-40), and the Office of Facility Transition and Management (EM-60). The scope of characterizations monitoring, and sensor technology needs that are required by those organizations encompass: (1) initial location and characterization of wastes and waste environments - prior to treatment; (2) monitoring of waste retrieval, remediation and treatment processes; (3) characterization of the co-position of final waste treatment forms to evaluate the performance of waste treatments processes; and (4) site closure and compliance monitoring. Wherever possible, the CMST-IP fosters technology transfer and commercialization of technologies that it sponsors

  19. IPS Empress crown system: three-year clinical trial results.

    Science.gov (United States)

    Sorensen, J A; Choi, C; Fanuscu, M I; Mito, W T

    1998-02-01

    The IPS Empress system is a highly esthetic hot pressed glass ceramic material for fabrication of single crowns. Adhesive cementation of the system not only contributes to the esthetics but is necessary for increased strength of the crown. The purpose of this prospective clinical trials was to evaluate the longevity of 75 adhesively cemented Empress full crowns. An additional aim was to assess the adhesive cementation methodology and potential side effects. At the three-year point, one molar crown fractured for a 1.3 percent failure rate. The resin cementation technique that was employed exhibited a low incidence of microleakage with few clinical side effects. There was a 5.6 percent incidence of post-cementation sensitivity, with all symptoms subsiding by eight weeks. None of the crowns in the study required endodontic therapy.

  20. ChIP-seq Identification of Weakly Conserved Heart Enhancers

    Energy Technology Data Exchange (ETDEWEB)

    Blow, Matthew J.; McCulley, David J.; Li, Zirong; Zhang, Tao; Akiyama, Jennifer A.; Holt, Amy; Plajzer-Frick, Ingrid; Shoukry, Malak; Wright, Crystal; Chen, Feng; Afzal, Veena; Bristow, James; Ren, Bing; Black, Brian L.; Rubin, Edward M.; Visel, Axel; Pennacchio, Len A.

    2010-07-01

    Accurate control of tissue-specific gene expression plays a pivotal role in heart development, but few cardiac transcriptional enhancers have thus far been identified. Extreme non-coding sequence conservation successfully predicts enhancers active in many tissues, but fails to identify substantial numbers of heart enhancers. Here we used ChIP-seq with the enhancer-associated protein p300 from mouse embryonic day 11.5 heart tissue to identify over three thousand candidate heart enhancers genome-wide. Compared to other tissues studied at this time-point, most candidate heart enhancers are less deeply conserved in vertebrate evolution. Nevertheless, the testing of 130 candidate regions in a transgenic mouse assay revealed that most of them reproducibly function as enhancers active in the heart, irrespective of their degree of evolutionary constraint. These results provide evidence for a large population of poorly conserved heart enhancers and suggest that the evolutionary constraint of embryonic enhancers can vary depending on tissue type.

  1. Spectroscopy of the red star in IP Peg

    International Nuclear Information System (INIS)

    Martin, J.S.; Jones, D.H.P.; Friend, M.T.; Smith, R.C.

    1989-01-01

    CCD spectroscopy of the cataclysmic variable IP Pegasi during decline from outburst shows narrow chromospheric emission lines from the irradiated face of the red star. The He I (7065 A) emission line is used to produce a partial radial velocity curve, with K He =293.2±3.3 km s -1 . A reanalysis of previous Na I doublet (8190 A) absorption line data produces a considerably larger semi-amplitude, K abs , than previously published. However, this is larger than the true semi-amplitude, K 2 , because irradiation from the disc ionizes the NaI on the inner face of the red star and decreases the strength of the NaI doublet on that face. A computer simulation of the secondary radial velocity curve, including this ionization effect, is used to estimate the true semi-amplitude of the secondary motion. This gives K 2 =298±8 km s -1 . (author)

  2. Comparison of H.323 and SIP for IP telephony signaling

    Science.gov (United States)

    Dalgic, Ismail; Fang, Hanlin

    1999-11-01

    Two standards currently compete for the dominance of IP telephony signaling: the H.323 protocol suite by ITU-T, and the Session Initiation Protocol (SIP) by IETF. Both of these signaling protocols provide mechanisms for call establishment and teardown, call control and supplementary services, and capability exchange. We investigate and compare these two protocols in terms of Functionality, Quality of Service (QoS), Scalability, Flexibility, Interoperability, and Ease of Implementation. For fairness of comparison, we consider similar scenarios for both protocols. In particular, we focus on scenarios that involve a gatekeeper for H.323, and a Proxy/Redirect server for SIP. The reason is that medium-to-large IP Telephony systems are not manageable without a gatekeeper or proxy server. We consider all three versions of H.323. In terms of functionality and services that can be supported, H.323 version 2 and SIP are very similar. However, supplementary services in H.323 are more rigorously defined, and therefore fewer interoperability issues are expected among its implementations. Furthermore, H.323 has taken more steps to ensure compatibility among its different versions, and to interoperate with PSTN. The two protocols are comparable in their QoS support [similar call setup delays, no support for resource reservation or class of service (CoS) setting], but H.323 version 3 will allow signaling of the requested CoS. SIP's primary advantages are (1) flexibility to add new features, and (2) relative ease of implementation and debugging. Finally, we note that H.323 and SIP are improving themselves by learning from each other, and the differences between them are diminishing with each new version.

  3. Linking international trademark databases to inform IP research and policy

    Energy Technology Data Exchange (ETDEWEB)

    Petrie, P.

    2016-07-01

    Researchers and policy makers are concerned with many international issues regarding trademarks, such as trademark squatting, cluttering, and dilution. Trademark application data can provide an evidence base to inform government policy regarding these issues, and can also produce quantitative insights into economic trends and brand dynamics. Currently, national trademark databases can provide insight into economic and brand dynamics at the national level, but gaining such insight at an international level is more difficult due to a lack of internationally linked trademark data. We are in the process of building a harmonised international trademark database (the “Patstat of trademarks”), in which equivalent trademarks have been identified across national offices. We have developed a pilot database that incorporates 6.4 million U.S., 1.3 million Australian, and 0.5 million New Zealand trademark applications, spanning over 100 years. The database will be extended to incorporate trademark data from other participating intellectual property (IP) offices as they join the project. Confirmed partners include the United Kingdom, WIPO, and OHIM. We will continue to expand the scope of the project, and intend to include many more IP offices from around the world. In addition to building the pilot database, we have developed a linking algorithm that identifies equivalent trademarks (TMs) across the three jurisdictions. The algorithm can currently be applied to all applications that contain TM text; i.e. around 96% of all applications. In its current state, the algorithm successfully identifies ~ 97% of equivalent TMs that are known to be linked a priori, as they have shared international registration number through the Madrid protocol. When complete, the internationally linked trademark database will be a valuable resource for researchers and policy-makers in fields such as econometrics, intellectual property rights, and brand policy. (Author)

  4. Reforging the Wedding Ring: Exploring a Semi-Artificial Model of Population for the United Kingdom with Gaussian process emulators

    Directory of Open Access Journals (Sweden)

    Viet Dung Cao

    2013-10-01

    Full Text Available Background: We extend the "Wedding Ring‟ agent-based model of marriage formation to include some empirical information on the natural population change for the United Kingdom together with behavioural explanations that drive the observed nuptiality trends. Objective: We propose a method to explore statistical properties of agent-based demographic models. By coupling rule-based explanations driving the agent-based model with observed data we wish to bring agent-based modelling and demographic analysis closer together. Methods: We present a Semi-Artificial Model of Population, which aims to bridge demographic micro-simulation and agent-based traditions. We then utilise a Gaussian process emulator - a statistical model of the base model - to analyse the impact of selected model parameters on two key model outputs: population size and share of married agents. A sensitivity analysis is attempted, aiming to assess the relative importance of different inputs. Results: The resulting multi-state model of population dynamics has enhanced predictive capacity as compared to the original specification of the Wedding Ring, but there are some trade-offs between the outputs considered. The sensitivity analysis allows identification of the most important parameters in the modelled marriage formation process. Conclusions: The proposed methods allow for generating coherent, multi-level agent-based scenarios aligned with some aspects of empirical demographic reality. Emulators permit a statistical analysis of their properties and help select plausible parameter values. Comments: Given non-linearities in agent-based models such as the Wedding Ring, and the presence of feedback loops, the uncertainty in the model may not be directly computable by using traditional statistical methods. The use of statistical emulators offers a way forward.

  5. Conjunctively optimizing flash flood control and water quality in urban water reservoirs by model predictive control and dynamic emulation

    Science.gov (United States)

    Galelli, Stefano; Goedbloed, Albert; Schmitter, Petra; Castelletti, Andrea

    2014-05-01

    Urban water reservoirs are a viable adaptation option to account for increasing drinking water demand of urbanized areas as they allow storage and re-use of water that is normally lost. In addition, the direct availability of freshwater reduces pumping costs and diversifies the portfolios of drinking water supply. Yet, these benefits have an associated twofold cost. Firstly, the presence of large, impervious areas increases the hydraulic efficiency of urban catchments, with short time of concentration, increased runoff rates, losses of infiltration and baseflow, and higher risk of flash floods. Secondly, the high concentration of nutrients and sediments characterizing urban discharges is likely to cause water quality problems. In this study we propose a new control scheme combining Model Predictive Control (MPC), hydro-meteorological forecasts and dynamic model emulation to design real-time operating policies that conjunctively optimize water quantity and quality targets. The main advantage of this scheme stands in its capability of exploiting real-time hydro-meteorological forecasts, which are crucial in such fast-varying systems. In addition, the reduced computational requests of the MPC scheme allows coupling it with dynamic emulators of water quality processes. The approach is demonstrated on Marina Reservoir, a multi-purpose reservoir located in the heart of Singapore and characterized by a large, highly urbanized catchment with a short (i.e. approximately one hour) time of concentration. Results show that the MPC scheme, coupled with a water quality emulator, provides a good compromise between different operating objectives, namely flood risk reduction, drinking water supply and salinity control. Finally, the scheme is used to assess the effect of source control measures (e.g. green roofs) aimed at restoring the natural hydrological regime of Marina Reservoir catchment.

  6. Performance Analysis of the Mobile IP Protocol (RFC 3344 and Related RFCS)

    Science.gov (United States)

    2006-12-01

    field of 9 identifies the ICMP message as an adverstisement . Code Mobile IP home agents and foreign agents use the value of 16 to prevent any nodes...ANALYSIS OF THE MOBILE IP PROTOCOL (RFC 3344 AND RELATED RFCS) by Chin Chin Ng December 2006 Thesis Co-Advisors: George W. Dinolt J. D...December 2006 3. REPORT TYPE AND DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE Performance Analysis of the Mobile IP Protocol (RFC 3344 and

  7. [Two years clinical observation of a kind of castable ceramic--IPS Empress].

    Science.gov (United States)

    Liu, Y; Li, Y; Nie, Y

    1999-03-01

    We used this material in clinic since 1995. Discussion on the prosthetic effects of the above-mentioned material to spreat it clinically. Through half to two years clinical observations to evaluate the effect of IPS Empress crowns in anterior teeth and inlays in posteriors. and Prosthesis made of this kind of material IPS Empress is one kind of excellent all-ceramic prosthetic material. IPS Empress also could be used in post crowns and the clinical effect was satisfactory.

  8. Evaluation and Investigation of the Delay in VoIP Networks

    Directory of Open Access Journals (Sweden)

    V. Janata

    2011-06-01

    Full Text Available The paper is focused mainly on the delay problems, which considerably influence the final quality of connections in VoIP (Voice over IP networks. The paper provides a detailed exploration of the nature and mechanisms of the delay. The main purpose of the investigation was an attempt to formulate a mathematical model of delay in the VoIP network and its subsequent analysis by laboratory data.

  9. Multi-level emulation of a volcanic ash transport and dispersion model to quantify sensitivity to uncertain parameters

    Science.gov (United States)

    Harvey, Natalie J.; Huntley, Nathan; Dacre, Helen F.; Goldstein, Michael; Thomson, David; Webster, Helen

    2018-01-01

    Following the disruption to European airspace caused by the eruption of Eyjafjallajökull in 2010 there has been a move towards producing quantitative predictions of volcanic ash concentration using volcanic ash transport and dispersion simulators. However, there is no formal framework for determining the uncertainties of these predictions and performing many simulations using these complex models is computationally expensive. In this paper a Bayesian linear emulation approach is applied to the Numerical Atmospheric-dispersion Modelling Environment (NAME) to better understand the influence of source and internal model parameters on the simulator output. Emulation is a statistical method for predicting the output of a computer simulator at new parameter choices without actually running the simulator. A multi-level emulation approach is applied using two configurations of NAME with different numbers of model particles. Information from many evaluations of the computationally faster configuration is combined with results from relatively few evaluations of the slower, more accurate, configuration. This approach is effective when it is not possible to run the accurate simulator many times and when there is also little prior knowledge about the influence of parameters. The approach is applied to the mean ash column loading in 75 geographical regions on 14 May 2010. Through this analysis it has been found that the parameters that contribute the most to the output uncertainty are initial plume rise height, mass eruption rate, free tropospheric turbulence levels and precipitation threshold for wet deposition. This information can be used to inform future model development and observational campaigns and routine monitoring. The analysis presented here suggests the need for further observational and theoretical research into parameterisation of atmospheric turbulence. Furthermore it can also be used to inform the most important parameter perturbations for a small operational

  10. Multi-level emulation of a volcanic ash transport and dispersion model to quantify sensitivity to uncertain parameters

    Directory of Open Access Journals (Sweden)

    N. J. Harvey

    2018-01-01

    Full Text Available Following the disruption to European airspace caused by the eruption of Eyjafjallajökull in 2010 there has been a move towards producing quantitative predictions of volcanic ash concentration using volcanic ash transport and dispersion simulators. However, there is no formal framework for determining the uncertainties of these predictions and performing many simulations using these complex models is computationally expensive. In this paper a Bayesian linear emulation approach is applied to the Numerical Atmospheric-dispersion Modelling Environment (NAME to better understand the influence of source and internal model parameters on the simulator output. Emulation is a statistical method for predicting the output of a computer simulator at new parameter choices without actually running the simulator. A multi-level emulation approach is applied using two configurations of NAME with different numbers of model particles. Information from many evaluations of the computationally faster configuration is combined with results from relatively few evaluations of the slower, more accurate, configuration. This approach is effective when it is not possible to run the accurate simulator many times and when there is also little prior knowledge about the influence of parameters. The approach is applied to the mean ash column loading in 75 geographical regions on 14 May 2010. Through this analysis it has been found that the parameters that contribute the most to the output uncertainty are initial plume rise height, mass eruption rate, free tropospheric turbulence levels and precipitation threshold for wet deposition. This information can be used to inform future model development and observational campaigns and routine monitoring. The analysis presented here suggests the need for further observational and theoretical research into parameterisation of atmospheric turbulence. Furthermore it can also be used to inform the most important parameter perturbations

  11. Emulating galaxy clustering and galaxy-galaxy lensing into the deeply nonlinear regime: methodology, information, and forecasts

    OpenAIRE

    Wibking, Benjamin D.; Salcedo, Andrés N.; Weinberg, David H.; Garrison, Lehman H.; Ferrer, Douglas; Tinker, Jeremy; Eisenstein, Daniel; Metchnik, Marc; Pinto, Philip

    2017-01-01

    The combination of galaxy-galaxy lensing (GGL) with galaxy clustering is one of the most promising routes to determining the amplitude of matter clustering at low redshifts. We show that extending clustering+GGL analyses from the linear regime down to $\\sim 0.5 \\, h^{-1}$ Mpc scales increases their constraining power considerably, even after marginalizing over a flexible model of non-linear galaxy bias. Using a grid of cosmological N-body simulations, we construct a Taylor-expansion emulator ...

  12. Impact of time-domain IP pulse length on measured data and inverted models

    DEFF Research Database (Denmark)

    Olsson, P. I.; Fiandaca, G.; Dahlin, T.

    2015-01-01

    The duration of time domain (TD) induced polarization (IP) current injections has significant impact on the acquired IP data as well as on the inversion models, if the standard evaluation procedure is followed. However, it is still possible to retrieve similar inversion models if the waveform...... of the injected current and the IP response waveform are included in the inversion. The on-time also generally affects the signal-tonoise ratio (SNR) where an increased on-time gives higher SNR for the IP data....

  13. Split degenerate states and stable p+ip phases from holography

    Energy Technology Data Exchange (ETDEWEB)

    Nie, Zhang-Yu; Zeng, Hui [Kunming University of Science and Technology, Kunming (China); Key Laboratory of Theoretical Physics, Institute of Theoretical Physics, Chinese Academy of Sciences, Beijing (China); Pan, Qiyuan [Hunan Normal Univ., Key Lab. of Low Dimensional Quantum Structures and Quantum Control of Ministry of Education, and Synergetic Innovation Center for Quantum Effects and Applications, Dept. of Physics, Changsha (China); Zeng, Hua-Bi [Yangzhou University, College of Physics Science and Technology, Yangzhou, Jiangsu (China); National Central University, Department of Physics, Chungli (China)

    2017-02-15

    In this paper, we investigate the p+ip superfluid phases in the complex vector field holographic p-wave model. We find that in the probe limit, the p+ip phase and the p-wave phase are equally stable, hence the p and ip orders can be mixed with an arbitrary ratio to form more general p+λip phases, which are also equally stable with the p-wave and p+ip phases. As a result, the system possesses a degenerate thermal state in the superfluid region. We further study the case on considering the back-reaction on the metric, and we find that the degenerate ground states will be separated into p-wave and p+ip phases, and the p-wave phase is more stable. Finally, due to the different critical temperature of the zeroth order phase transitions from p-wave and p+ip phases to the normal phase, there is a temperature region where the p+ip phase exists but the p-wave phase does not. In this region we find the stable holographic p+ip phase for the first time. (orig.)

  14. Proposta de metodologia para avaliação de redes de voz sobre IP

    OpenAIRE

    Vandersilvio da Silva

    2006-01-01

    A redução de custo com telefonia através do uso de voz sobre IP tem disparado a busca de soluções que transformem redes IP originalmente dedicadas a transporte de dados em redes para transporte de voz. Esta dissertação tem por objetivo apresentar uma metodologia para sistematizar a avaliação de redes para o tráfego de voz sobre IP de acordo com as possibilidades disponíveis no cenário a ser avaliado. Inicialmente é dada uma visão geral de voz sobre IP, apresentando os protocolos utilizados, o...

  15. Implantación de switching y ToIP sobre una red WAN

    OpenAIRE

    Pique Palacin, Ivan

    2013-01-01

    Este proyecto tiene como objeto el diseño y la implementación de servicios de comunicaciones de LAN (Switching) y Telefonía IP (ToIP), todos ellos integrados sobre una red WAN nacional ya existente y funcionando, gestionada por un ISP. Aquest projecte té com a objecte el disseny i la implementació de serveis de comunicacions de LAN (Switching) i telefonia IP (ToIP), tots ells integrats sobre una xarxa WAN nacional ja existent i funcionant, gestionada per un ISP. Bachelor thesis for the ...

  16. LMIP/AAA: Local Authentication, Authorization and Accounting (AAA) Protocol for Mobile IP

    Science.gov (United States)

    Chenait, Manel

    Mobile IP represents a simple and scalable global mobility solution. However, it inhibits various vulnerabilities to malicious attacks and, therefore, requires the integration of appropriate security services. In this paper, we discuss two authentication schemes suggested for Mobile IP: standard authentication and Mobile IP/AAA authentication. In order to provide Mobile IP roaming services including identity verication, we propose an improvement to Mobile/AAA authentication scheme by applying a local politic key management in each domain, hence we reduce hando latency by avoiding the involvement of AAA infrastructure during mobile node roaming.

  17. ELISA-based assay for IP-10 detection from filter paper samples

    DEFF Research Database (Denmark)

    Drabe, Camilla Heldbjerg; Blauenfeldt, Thomas; Ruhwald, Morten

    2014-01-01

    IP-10 is a small pro-inflammatory chemokine secreted primarily from monocytes and fibroblasts. Alterations in IP-10 levels have been associated with inflammatory conditions including viral and bacterial infections, immune dysfunction, and tumor development. IP-10 is increasingly recognized as a b...... as a biomarker that predicts severity of various diseases and can be used in the immunodiagnostics of Mycobacterium tuberculosis and cytomegalovirus infection. Here, we describe an ELISA-based method to detect IP-10 from dried blood and plasma spot samples....

  18. The Regulatory Challenges and Opportunities of IP Telephony: Perspective on Malaysia

    OpenAIRE

    Md Khaled Shukran

    2011-01-01

    IP telephony is a transmission of voice and data over Packet Switched IP Networks and it has become a key issue in the telecommunication industry worldwide because of its higher efficiency and cheapest call rate. Hence, most of the countries in the world set up their telecommunication platform on IP based network as a fast revenue generating sources. Though Malaysia is on the way forward on IP based platform but the growth is not reached at satisfactory level due to the absence of effective r...

  19. Energy star compliant voice over internet protocol (VoIP) telecommunications network including energy star compliant VoIP devices

    Science.gov (United States)

    Kouchri, Farrokh Mohammadzadeh

    2012-11-06

    A Voice over Internet Protocol (VoIP) communications system, a method of managing a communications network in such a system and a program product therefore. The system/network includes an ENERGY STAR (E-star) aware softswitch and E-star compliant communications devices at system endpoints. The E-star aware softswitch allows E-star compliant communications devices to enter and remain in power saving mode. The E-star aware softswitch spools messages and forwards only selected messages (e.g., calls) to the devices in power saving mode. When the E-star compliant communications devices exit power saving mode, the E-star aware softswitch forwards spooled messages.

  20. Controlling applied to information processing: quality management applied to IP projects and IP services; Informationsverarbeitungs-Controlling: Qualitaetsmanagement fuer IV-Projekte und fuer IV-Service

    Energy Technology Data Exchange (ETDEWEB)

    Becker, B. [Vereinigung Deutscher Elektrizitaetswerke e.V. (VDEW), Frankfurt am Main (Germany); Beckers, F. [Isar-Amperwerke AG, Muenchen (Germany); Dewald, N. [Bayernwerk AG, Muenchen (Germany); Hauffe, P. [Pfalzwerke AG, Ludwigshafen am Rhein (Germany); Hein, F. [EVS AG Stuttgart (Germany); Hoederath, M. [Vereinigte Elektrizitaetswerke Westfalen AG (VEW), Dortmund (Germany); Seyen, R. [Staedtische Werke Nuernberg GmbH (Germany)

    1998-01-12

    The working group on information processing (IP) basics (in German: `IV-Grundlagen`) has prepared this contribution dealing with controlling applied to information processing. This new report, on the one hand, takes into consideration the role of the organizational IP unit as one offering its services to all sections of a company. On the other hand, information processing as an operational infrastructure influencing all business processes becomes increasingly important with respect to the competitiveness of the EVU. Therefore, quality management applied to IP projects and IP services must support this development. (orig./RHM) [Deutsch] Der VDEW Arbeitskreis `IV-Grundlagen` hat einen Beitrag zum Controlling fuer die Informationsverarbeitung erstellt. Hier geht zum einen die Rolle der Organisationseinheit IV als Dienstleister fuer alle Unternehmensbereiche ein. Zum anderen gewinnt die Informationsverarbeitung als betriebliche Infrastruktur fuer alle Geschaeftsprozesse zunehmende Bedeutung fuer die Wettbewerbsfaehigkeit der EVU. Das Qualitaetsmanagement fuer IV-Projekte und fuer IV-Service muss dies unterstuetzen. (orig./RHM)

  1. KChIP2 genotype dependence of transient outward current (Ito) properties in cardiomyocytes isolated from male and female mice.

    Science.gov (United States)

    Waldschmidt, Lara; Junkereit, Vera; Bähring, Robert

    2017-01-01

    The transient outward current (Ito) in cardiomyocytes is largely mediated by Kv4 channels associated with Kv Channel Interacting Protein 2 (KChIP2). A knockout model has documented the critical role of KChIP2 in Ito expression. The present study was conducted to characterize in both sexes the dependence of Ito properties, including current magnitude, inactivation kinetics, recovery from inactivation and voltage dependence of inactivation, on the number of functional KChIP2 alleles. For this purpose we performed whole-cell patch-clamp experiments on isolated left ventricular cardiomyocytes from male and female mice which had different KChIP2 genotypes; i.e., wild-type (KChIP2+/+), heterozygous knockout (KChIP2+/-) or complete knockout of KChIP2 (KChIP2-/-). We found in both sexes a KChIP2 gene dosage effect (i.e., a proportionality between number of alleles and phenotype) on Ito magnitude, however, concerning other Ito properties, KChIP2+/- resembled KChIP2+/+. Only in the total absence of KChIP2 (KChIP2-/-) we observed a slowing of Ito kinetics, a slowing of recovery from inactivation and a negative shift of a portion of the voltage dependence of inactivation. In a minor fraction of KChIP2-/- myocytes Ito was completely lost. The distinct KChIP2 genotype dependences of Ito magnitude and inactivation kinetics, respectively, seen in cardiomyocytes were reproduced with two-electrode voltage-clamp experiments on Xenopus oocytes expressing Kv4.2 and different amounts of KChIP2. Our results corroborate the critical role of KChIP2 in controlling Ito properties. They demonstrate that the Kv4.2/KChIP2 interaction in cardiomyocytes is highly dynamic, with a clear KChIP2 gene dosage effect on Kv4 channel surface expression but not on inactivation gating.

  2. Extraction Of Electronic Evidence From VoIP: Identification & Analysis Of Digital Speech

    Directory of Open Access Journals (Sweden)

    David Irwin

    2012-09-01

    Full Text Available The Voice over Internet Protocol (VoIP is increasing in popularity as a cost effective and efficient means of making telephone calls via the Internet. However, VoIP may also be an attractive method of communication to criminals as their true identity may be hidden and voice and video communications are encrypted as they are deployed across the Internet. This produces in a new set of challenges for forensic analysts compared with traditional wire-tapping of the Public Switched Telephone Network (PSTN infrastructure, which is not applicable to VoIP. Therefore, other methods of recovering electronic evidence from VoIP are required.  This research investigates the analysis and recovery of digitised human, which persists in computer memory after a VoIP call.This paper proposes a proof of concept how remnants of digitised human speech from a VoIP call may be identified within a forensic memory capture based on how the human voice is detected via a microphone and encoded to a digital format using the sound card of your personal computer. This digital format is unencrypted whist processed in Random Access Memory (RAM before it is passed to the VoIP application for encryption and  transmission over the Internet. Similarly, an incoming encrypted VoIP call is decrypted by the VoIP application and passes through RAM unencrypted in order to be played via the speaker output.A series of controlled tests were undertaken whereby RAM captures were analysed for remnants of digital speech after a VoIP audio call with known conversation. The identification and analysis of digital speech from RAM attempts to construct an automatic process for the identification and subsequent reconstruction of the audio content of a VoIP call.

  3. The ChIP-Seq tools and web server: a resource for analyzing ChIP-seq and other types of genomic data.

    Science.gov (United States)

    Ambrosini, Giovanna; Dreos, René; Kumar, Sunil; Bucher, Philipp

    2016-11-18

    ChIP-seq and related high-throughput chromatin profilig assays generate ever increasing volumes of highly valuable biological data. To make sense out of it, biologists need versatile, efficient and user-friendly tools for access, visualization and itegrative analysis of such data. Here we present the ChIP-Seq command line tools and web server, implementing basic algorithms for ChIP-seq data analysis starting with a read alignment file. The tools are optimized for memory-efficiency and speed thus allowing for processing of large data volumes on inexpensive hardware. The web interface provides access to a large database of public data. The ChIP-Seq tools have a modular and interoperable design in that the output from one application can serve as input to another one. Complex and innovative tasks can thus be achieved by running several tools in a cascade. The various ChIP-Seq command line tools and web services either complement or compare favorably to related bioinformatics resources in terms of computational efficiency, ease of access to public data and interoperability with other web-based tools. The ChIP-Seq server is accessible at http://ccg.vital-it.ch/chipseq/ .

  4. A Real Time Electronics Emulator with Realistic Data Generation for Reception Tests of the CMS ECAL Front-End Boards

    CERN Document Server

    Romanteau, T; Collard, Caroline; Debraine, A; Decotigny, D; Dobrzynski, L; Karar, A; Regnault, N

    2005-01-01

    The CMS [1] electromagnetic calorimeter (ECAL) [2] uses 3 132 Front-End boards (FE) performing both trigger and data readout functions. Prior to their integration at CERN, the FE boards have to be validated by dedicated test bench systems. The final one, called "XFEST" (eXtended Front-End System Test) and for which the present developments have been performed, is located at Laboratoire Leprince-Ringuet. In this contribution, a solution is described to efficiently test a large set of complex electronics boards characterized by a large number of input ports and a high throughput data rate. To perform it, an algorithm to simulate the Very Front End signals has been emulated. The project firmwares use VHDL embedded into XILINX Field Programmable Gate Array circuits (FPGA). This contribution describes the solutions developed in order to create a realistic digital input patterns real-time emul ator working at 40 MHz. The implementation of a real time comparison of the FE output streams as well as the test bench wil...

  5. AC Transmission Emulation Control Strategies for the BTB VSC HVDC System in the Metropolitan Area of Seoul

    Directory of Open Access Journals (Sweden)

    Sungyoon Song

    2017-08-01

    Full Text Available In the Korean power system, growing power loads have recently created the problems of voltage instability and fault current in the Seoul Capital Area (SCA. Accordingly, the back-to-back (BTB voltage source converter (VSC high-voltage direct-current (HVDC system is emerging to resolve such problems with grid segmentation. However, non-convergence problems occur in this metropolitan area, due to the large change of power flow in some contingencies. Therefore, this paper proposes two kinds of AC transmission emulation control (ATEC strategies to improve the metropolitan transient stability, and to resolve the non-convergence problem. The proposed ATEC strategies are able to mitigate possible overloading of adjacent AC transmission, and maintain power balance between metropolitan regions. The first ATEC strategy uses a monitoring system that permits the reverse power flow of AC transmission, and thus effectively improves the grid stability based on the power transfer equation. The second ATEC strategy emulates AC transmission with DC link capacitors in a permissible DC-link voltage range according to angle difference, and securely improves the gird stability, without requiring grid operator schedule decisions. This paper compares two kinds of ATEC schemes: it demonstrates the first ATEC strategy with specific fault scenario with PSS/E (Power Transmission System Planning Software, and evaluates the second ATEC strategy with internal controller performance with PSCAD/EMTDC (Power System Electromagnetic Transients Simulation Software.

  6. Host-tree monoterpenes and biosynthesis of aggregation pheromones in the bark beetle ips paraconfusus

    Science.gov (United States)

    In the 1970-80s, vapors of the common conifer tree monoterpenes, myrcene and a-pinene, were shown to serve as precursors of ipsenol, ipsdienol and cis-verbenol, aggregation pheromone components of Ips paraconfusus. A paradigm developed that Ips bark beetles utilize pre-formed monoterpene precursors ...

  7. ß-Phellandrene: Kairomone for Pine Engraver, Ips pini (Say) (Coleoptera: Scolytidae)

    Science.gov (United States)

    Daniel R. Miller; John H. Borden

    1990-01-01

    The responses of Ips pini (Scolytidae) to multiple-funnel traps baited with the pheromone, ipsdienol, and various monoterpenes were determined in stands of lodgepole pine in southern and central British Columbia. Ips pini was attracted to both ipsdienol and ß-phellandrene, demonstrating that ß-phellandrene is a kairomone for this...

  8. Increasing supported VoIP flows in WMNs through link-based aggregation

    CSIR Research Space (South Africa)

    Olwal, T

    2008-10-01

    Full Text Available As Voice over IP (VoIP) becomes a reality, service providers will be able to offer the service to remote and over populated areas that currently are not or are only partially reached by available Public Switched Telephone Network (PSTN...

  9. A comparison of interferon-γ and IP-10 for the diagnosis of tuberculosis

    DEFF Research Database (Denmark)

    Holm, Line Lindebo; Rose, Michala Vaaben; Kimaro, Godfather

    2014-01-01

    OBJECTIVE: Interferon-γ and IP-10 release assays are diagnostic tests for tuberculosis infection. We have compared the accuracy of IP-10 and QuantiFERON-TB Gold In-tube [QFT-IT] in Tanzanian children suspected of having active tuberculosis (TB). METHODS: Hospitalized Tanzanian children...

  10. A simple method to quantitate IP-10 in dried blood and plasma spots

    DEFF Research Database (Denmark)

    Aabye, Martine G; Eugen-Olsen, Jesper; Werlinrud, Anne Marie

    2012-01-01

    Antigen specific release of IP-10 is an established marker for infection with M.tuberculosis. Compared to IFN-γ, IP-10 is released in 100-fold higher concentrations enabling the development of novel assays for detection. Dried blood spots are a convenient sample for high throughput newborn...

  11. Real-time resource availability signaling in IP multimedia subsystem networks

    NARCIS (Netherlands)

    Ozcelebi, T.; Radovanovic, I.; Sengupta, D.

    2008-01-01

    IP Multimedia Subsystem (IMS) allows the use of unlicensed, non-dedicated and nondeterministic access networks for delivering IP multimedia services. Providing end-to-end Quality-of-Service (QoS) for resource demanding real-time services (e.g. real-time multimedia) over such networks is a

  12. High intercontinental migration rates and population admixture in the sapstain fungus Ophiostoma ips

    Science.gov (United States)

    Xudong Zhou; Treena I. Burgess; Z. Wilhelm De Beer; Francois Lieutier; Annie Yart; Kier Klepzig; Angus Carnegie; Julio Mena Portales; Brenda D. Wingfield; Michael J. Wingfield

    2006-01-01

    Ophiostoma ips is a common fungal associate of various conifer-infesting bark beetles in their native ranges and has been introduced into non-native pine plantations in the Southern Hemisphere. In this study, we used 10 microsatellite markers to investigate the population biology of O. ips in native (Cuba, France, Morocco and USA) and non-native (...

  13. VoIP interconnection ; between Internet, Cable, Mobile and Fixed Worlds

    NARCIS (Netherlands)

    Deventer, M.O. van; Keesmaat, I.

    2005-01-01

    Four worlds on their own that hardly interconnect; All use SIP, but differently - Internet world - Mobile world - Cable world - Fixed world - At most, only basic voice service will interoperate between those worlds In recent years, VoIP/multimedia services (VoIP: Voice over Internet Protocol) have

  14. Data exploration, quality control and statistical analysis of ChIP-exo/nexus experiments.

    Science.gov (United States)

    Welch, Rene; Chung, Dongjun; Grass, Jeffrey; Landick, Robert; Keles, Sündüz

    2017-09-06

    ChIP-exo/nexus experiments rely on innovative modifications of the commonly used ChIP-seq protocol for high resolution mapping of transcription factor binding sites. Although many aspects of the ChIP-exo data analysis are similar to those of ChIP-seq, these high throughput experiments pose a number of unique quality control and analysis challenges. We develop a novel statistical quality control pipeline and accompanying R/Bioconductor package, ChIPexoQual, to enable exploration and analysis of ChIP-exo and related experiments. ChIPexoQual evaluates a number of key issues including strand imbalance, library complexity, and signal enrichment of data. Assessment of these features are facilitated through diagnostic plots and summary statistics computed over regions of the genome with varying levels of coverage. We evaluated our QC pipeline with both large collections of public ChIP-exo/nexus data and multiple, new ChIP-exo datasets from Escherichia coli. ChIPexoQual analysis of these datasets resulted in guidelines for using these QC metrics across a wide range of sequencing depths and provided further insights for modelling ChIP-exo data. © The Author(s) 2017. Published by Oxford University Press on behalf of Nucleic Acids Research.

  15. Myricetin stimulates the absorption of the pro-carcinogen PhIP

    NARCIS (Netherlands)

    Schutte, M.E.; Sandt, J.J.M. van de; Alink, G.M.; Groten, J.P.; Rietjens, I.M.C.M.

    2006-01-01

    The effect of the flavonoid myricetin on the transport of the pro-carcinogen 2-amino-1-methyl-6-phenylimidazo[4,5-b]pyridine (PhIP) through differentiated Caco-2 monolayers, a model for the intestinal epithelium, is described. Myricetin causes an increase of the transport of PhIP from the apical to

  16. 77 FR 48549 - Eastman Kodak Company, IPS-Dayton Location, Dayton, OH; Notice of Affirmative Determination...

    Science.gov (United States)

    2012-08-14

    ... DEPARTMENT OF LABOR Employment and Training Administration [TA-W-81,387] Eastman Kodak Company, IPS--Dayton Location, Dayton, OH; Notice of Affirmative Determination Regarding Application for...) applicable to workers and former workers of Eastman Kodak Company, IPS- Dayton Location, Dayton, Ohio...

  17. The battle between standards: TCP/IP vs OSI victory through path dependency or by quality?

    NARCIS (Netherlands)

    Maathuis, Ivo; Smit, Willem A.; Egyedi, T.M.; Krechmer, K.; Jakobs, K.

    2003-01-01

    Between the end of the 1970s and 1994 a fierce competition existed between two possible standards, TCP/IP and OSI, to solve the problem of interoperability of computer networks. Around 1994 it became evident that TCP/IP and not OSI had become the dominant standard. We specifically deal with the

  18. ChIP-exo interrogation of Crp, DNA, and RNAP holoenzyme interactions

    DEFF Research Database (Denmark)

    Latif, Haythem; Federowicz, Stephen; Ebrahim, Ali

    2018-01-01

    Numerous in vitro studies have yielded a refined picture of the structural and molecular associations between Cyclic-AMP receptor protein (Crp), the DNA motif, and RNA polymerase (RNAP) holoenzyme. In this study, high-resolution ChIP-exonuclease (ChIP-exo) was applied to study Crp binding in vivo...

  19. Reducing handover latency in future IP-based wireless networks: Fast Proxy Mobile IPv6

    NARCIS (Netherlands)

    Heijenk, Geert; Bargh, Mortaza S.; Laganier, Julien; Prasad, Anand R.

    2008-01-01

    Current IP-level mobility protocols have difficulties meeting the stringent handover delay requirements of future wireless networks. At the same time they do not give sufficient control to the network to control the handover process. This paper presents an extension to Proxy Mobile IP, which is the

  20. Accounting for immunoprecipitation efficiencies in the statistical analysis of ChIP-seq data

    NARCIS (Netherlands)

    Bao, Yanchun; Vinciotti, Veronica; Wit, Ernst; 't Hoen, Peter A C

    2013-01-01

    Background: ImmunoPrecipitation (IP) efficiencies may vary largely between different antibodies and between repeated experiments with the same antibody. These differences have a large impact on the quality of ChIP-seq data: a more efficient experiment will necessarily lead to a higher signal to