WorldWideScience

Sample records for experimental approach exploitation

  1. Exploitation as the Unequal Exchange of Labour : An Axiomatic Approach

    OpenAIRE

    Yoshihara, Naoki; Veneziani, Roberto

    2009-01-01

    In subsistence economies with general convex technology and rational optimising agents, a new, axiomatic approach is developed, which allows an explicit analysis of the core positive and normative intuitions behind the concept of exploitation. Three main new axioms, called Labour Exploitation in Subsistence Economies , Relational Exploitation , and Feasibility of Non-Exploitation , are presented and it is proved that they uniquely characterise a definition of exploitation conceptually related...

  2. Sensor Exposure, Exploitation, and Experimentation Environment (SE4)

    Science.gov (United States)

    Buell, D.; Duff, F.; Goding, J.; Bankston, M.; McLaughlin, T.; Six, S.; Taylor, S.; Wootton, S.

    2011-09-01

    As the resident space object population increases from new launches and events such as the COSMOS/IRIDIUM collision, the maintenance of high-level Space Situational Awareness (SSA) has become increasingly difficult. To maintain situational awareness of the changing environment, new systems and methods must be developed. The Sensor Exposure, Exploitation and Experimentation Environment (SE4) provides a platform to illustrate “The Art of the Possible” that shows the potential benefit of enriched sensor data collections and real-time data sharing. Through modeling and simulation, and a net-centric architecture, SE4 shows the added value of sharing data in real-time and exposing new types of sensor data. The objective of SE4 is to develop an experimentation and innovation environment for sensor data exposure, composable sensor capabilities, reuse, and exploitation that accelerates the delivery of needed Command and Control, Intelligence, Surveillance, and Reconnaissance capabilities to the warfighter. Through modeling, simulation and rapid prototyping, the art of the possible for a fully-connected, net-centric space Command and Control (C2) and sensor enterprise can be demonstrated. This paper provides results that demonstrate the potential for faster cataloging of breakup events and additional event monitoring that are possible with data available today in the Space Surveillance Network (SSN). Demonstrating the art of the possible for the enterprise will guide net-centric requirements definition and facilitate discussions with stakeholder organizations on the Concept of Operations (CONOPS), policy, and Tactics, Techniques, and Procedures (TTP) evolution necessary to take full advantage of net-centric operations. SE4 aligns with direction from Secretary Gates and the Chairman Joint Chief of Staff that emphasizes the need to get the most out of our existing systems. Continuing to utilize SE4 will enable the enterprise by demonstrating the benefits of applying

  3. Exploitation of Labour and Exploitation of Commodities: a “New Interpretation”

    OpenAIRE

    Veneziani, Roberto; Yoshihara, Naoki

    2011-01-01

    In the standard Okishio-Morishima approach, the existence of profits is proved to be equivalent to the exploitation of labour. Yet, it can also be proved that the existence of profits is equivalent to the ‘exploitation’ of any good. Labour and commodity exploitation are just different numerical representations of the productiveness of the economy. This paper presents an alternative approach to exploitation theory which is related to the New Interpretation (Duménil 1980; Foley 1982). In this a...

  4. Target Localization with a Single Antenna via Directional Multipath Exploitation

    Directory of Open Access Journals (Sweden)

    Ali H. Muqaibel

    2015-01-01

    Full Text Available Target localization in urban sensing can benefit from angle dependency of the pulse shape at a radar receiver antenna. We propose a localization approach that utilizes the embedded directivity in ultra-wideband (UWB antennas to estimate target positions. A single radar unit sensing operation of indoor targets surrounded by interior walls is considered, where interior wall multipaths are exploited to provide target cross-range. This exploitation assumes resolvability of the multipath components, which is made possible by the virtue of using UWB radar signals. The proposed approach is most attractive when only few multipaths are detectable due to propagation obstructions or owing to low signal-to-noise ratios. Both simulated and experimental data are used to demonstrate the effectiveness of the proposed approach.

  5. New approach to exploit optimally the PV array output energy by maximizing the discharge rate of a directly-coupled photovoltaic water pumping system (DC/PVPS)

    International Nuclear Information System (INIS)

    Boutelhig, Azzedine; Hadj Arab, Amar; Hanini, Salah

    2016-01-01

    Highlights: • Mismatches on a designed d-c PV pumping system have been highlighted. • A new approach predicting the maximal discharge has been developed. • The approach has been discussed versus its linearity coefficient. • The approach effectiveness has been investigated and approved. • Theoretical and experimental obtained values have been compared and approved. - Abstract: A directly-coupled photovoltaic water pumping system (DC/PVPS) is generally designed by considering the worst month conditions on lowest daylight-hours, the maximum monthly daily required water volume and tank to store the excess water. In case of absence of hydraulic storage (water tank) or it is not enough dimensioned, the extra amount of pumped water is lost or is not reasonably used, when the system is operated on full daylight-hour. Beside that the extra amount of energy, which might be produced by the PV generator, is not exploited, when the system is operated only during a specified period-time needed to satisfy the demand. Beyond the accurate design that satisfying the end-user, a new approach has been developed as target to exploit maximally the PV array energy production, by maximizing the discharge rate of the system. The methodology consists of approaching maximally the demanded energy to the supplied energy on full operating day. Based on the demand/supply energy condition, the approach has been developed, upon the PV array and the pump performance models. The issued approach predicts the maximum delivery capacity of the system on monthly daily water volumes versus the monthly daily averages of solar irradiation, previously recorded. Its efficacy has been investigated and discussed according to the estimated and experimental values of its linearity coefficient, following the characterization tests of a designed system, carried out at our pumping test facility in Ghardaia (Algeria). The new theoretically and experimentally obtained flow-rates fit well, except

  6. Learning Metasploit exploitation and development

    CERN Document Server

    Balapure, Aditya

    2013-01-01

    A practical, hands-on tutorial with step-by-step instructions. The book will follow a smooth and easy-to-follow tutorial approach, covering the essentials and then showing the readers how to write more sophisticated exploits.This book targets exploit developers, vulnerability analysts and researchers, network administrators, and ethical hackers looking to gain advanced knowledge in exploitation development and identifying vulnerabilities. The primary goal is to take readers wishing to get into more advanced exploitation discovery and reaching the next level.Prior experience exploiting basic st

  7. Ultrasonic imaging of material flaws exploiting multipath information

    Science.gov (United States)

    Shen, Xizhong; Zhang, Yimin D.; Demirli, Ramazan; Amin, Moeness G.

    2011-05-01

    In this paper, we consider ultrasonic imaging for the visualization of flaws in a material. Ultrasonic imaging is a powerful nondestructive testing (NDT) tool which assesses material conditions via the detection, localization, and classification of flaws inside a structure. Multipath exploitations provide extended virtual array apertures and, in turn, enhance imaging capability beyond the limitation of traditional multisensor approaches. We utilize reflections of ultrasonic signals which occur when encountering different media and interior discontinuities. The waveforms observed at the physical as well as virtual sensors yield additional measurements corresponding to different aspect angles. Exploitation of multipath information addresses unique issues observed in ultrasonic imaging. (1) Utilization of physical and virtual sensors significantly extends the array aperture for image enhancement. (2) Multipath signals extend the angle of view of the narrow beamwidth of the ultrasound transducers, allowing improved visibility and array design flexibility. (3) Ultrasonic signals experience difficulty in penetrating a flaw, thus the aspect angle of the observation is limited unless access to other sides is available. The significant extension of the aperture makes it possible to yield flaw observation from multiple aspect angles. We show that data fusion of physical and virtual sensor data significantly improves the detection and localization performance. The effectiveness of the proposed multipath exploitation approach is demonstrated through experimental studies.

  8. A multicriteria approach to identify investment opportunities for the exploitation of the clean development mechanism

    International Nuclear Information System (INIS)

    Diakoulaki, D.; Georgiou, P.; Tourkolias, C.; Georgopoulou, E.; Lalas, D.; Mirasgedis, S.; Sarafidis, Y.

    2007-01-01

    The aim of the present paper is to investigate the prospects for the exploitation of the Kyoto Protocol's Clean Development Mechanism (CDM) in Greece. The paper is addressing 3 questions: in which country, what kind of investment, with which economic and environmental return? The proposed approach is based on a multicriteria analysis for identifying priority countries and interesting investment opportunities in each priority country. These opportunities are then evaluated through a conventional financial analysis in order to assess their economic and environmental attractiveness. To this purpose, the IRR of a typical project in each investment category is calculated by taking into account country-specific parameters, such as baseline emission factors, load factors, costs, energy prices etc. The results reveal substantial differences in the economic and environmental return of different types of projects in different host-countries and show that for the full exploitation of the CDM a multifaceted approach to decision-making is necessary

  9. CamOptimus: a tool for exploiting complex adaptive evolution to optimize experiments and processes in biotechnology.

    Science.gov (United States)

    Cankorur-Cetinkaya, Ayca; Dias, Joao M L; Kludas, Jana; Slater, Nigel K H; Rousu, Juho; Oliver, Stephen G; Dikicioglu, Duygu

    2017-06-01

    Multiple interacting factors affect the performance of engineered biological systems in synthetic biology projects. The complexity of these biological systems means that experimental design should often be treated as a multiparametric optimization problem. However, the available methodologies are either impractical, due to a combinatorial explosion in the number of experiments to be performed, or are inaccessible to most experimentalists due to the lack of publicly available, user-friendly software. Although evolutionary algorithms may be employed as alternative approaches to optimize experimental design, the lack of simple-to-use software again restricts their use to specialist practitioners. In addition, the lack of subsidiary approaches to further investigate critical factors and their interactions prevents the full analysis and exploitation of the biotechnological system. We have addressed these problems and, here, provide a simple-to-use and freely available graphical user interface to empower a broad range of experimental biologists to employ complex evolutionary algorithms to optimize their experimental designs. Our approach exploits a Genetic Algorithm to discover the subspace containing the optimal combination of parameters, and Symbolic Regression to construct a model to evaluate the sensitivity of the experiment to each parameter under investigation. We demonstrate the utility of this method using an example in which the culture conditions for the microbial production of a bioactive human protein are optimized. CamOptimus is available through: (https://doi.org/10.17863/CAM.10257).

  10. Experimental approaches and applications

    CERN Document Server

    Crasemann, Bernd

    1975-01-01

    Atomic Inner-Shell Processes, Volume II: Experimental Approaches and Applications focuses on the physics of atomic inner shells, with emphasis on experimental aspects including the use of radioactive atoms for studies of atomic transition probabilities. Surveys of modern techniques of electron and photon spectrometry are also presented, and selected practical applications of inner-shell processes are outlined. Comprised of six chapters, this volume begins with an overview of the general principles underlying the experimental techniques that make use of radioactive isotopes for inner-sh

  11. Up-Rating - An Alternative Approach to Meeting Future Power Demands - Exploitation of Design Margins

    Energy Technology Data Exchange (ETDEWEB)

    Bruce, Barnaby; Schwarz, Thomas [AREVA NP GmbH, Freyeslebenstr. 1, 91058 Erlangen (Germany)

    2008-07-01

    Up-rating is a world-wide implemented approach that takes advantage of increased calculation and analytic abilities developed since commissioning and applies them to old plants. In doing so, what would possibly be considered today as over-engineered design margins are exploited and plant performance is improved, without necessarily involving extensive modifications or replacement of hardware. It is therefore a short-term alternative, compared to new plants, with little change in environmental ramifications for power production capacity gained. Up-rating is also more accepted by the wider community and licensing authorities, thus complimenting the building of new plants. The 10% thermal up-rating of the nuclear power plant at Almaraz, Spain, requires a comprehensive reanalysis of all power components. This paper focuses on those measures required to ensure the performance of the steam generators at increased load as an example of design margin exploitation in such crucial components. (authors)

  12. Exploiting opportunities at all cost? Entrepreneurial intent and externalities

    NARCIS (Netherlands)

    Urbig, D.; Weitzel, G.U.; Rosenkranz, S.; van Witteloostuijn, A.

    2011-01-01

    they exploit welfare-enhancing opportunities as it is assumed in several normative models? Do we need to prevent potential entrepreneurs from being destructive or are there intrinsic limits to harm others? We experimentally investigate how people with different entrepreneurial intent exploit risky

  13. Exploration of Exploitation Approaches of European Projects on ICT and Foreign Language Learning: the CEFcult project case

    NARCIS (Netherlands)

    Rusman, Ellen; Rajagopal, Kamakshi; Stoyanov, Slavi; Van Maele, Jan

    2011-01-01

    Rusman, E., Rajagopal, K., Stoyanov, S., & Van Maele, J. (2011, 20-21 October). Exploration of Exploitation Approaches of European Projects on ICT and Foreign Language Learning: the CEFcult project case. Paper presented at the 4th International Conference ICT for Language Learning, Florence, Italy.

  14. Molecular approach of uranyl/mineral surfaces: experimental approach

    International Nuclear Information System (INIS)

    Drot, R.

    2009-01-01

    The author reports an experimental approach in which different spectroscopic approaches are coupled (laser spectroscopy, X-ray absorption spectroscopy, vibrational spectroscopy) to investigate the mechanisms controlling actinide sorption processes by different substrates, in order to assess radioactive waste storage site safety. Different substrates have been considered: monocrystalline or powdered TiO 2 , montmorillonite, and gibbsite

  15. Parallel exploitation of a spatial-spectral classification approach for hyperspectral images on RVC-CAL

    Science.gov (United States)

    Lazcano, R.; Madroñal, D.; Fabelo, H.; Ortega, S.; Salvador, R.; Callicó, G. M.; Juárez, E.; Sanz, C.

    2017-10-01

    Hyperspectral Imaging (HI) assembles high resolution spectral information from hundreds of narrow bands across the electromagnetic spectrum, thus generating 3D data cubes in which each pixel gathers the spectral information of the reflectance of every spatial pixel. As a result, each image is composed of large volumes of data, which turns its processing into a challenge, as performance requirements have been continuously tightened. For instance, new HI applications demand real-time responses. Hence, parallel processing becomes a necessity to achieve this requirement, so the intrinsic parallelism of the algorithms must be exploited. In this paper, a spatial-spectral classification approach has been implemented using a dataflow language known as RVCCAL. This language represents a system as a set of functional units, and its main advantage is that it simplifies the parallelization process by mapping the different blocks over different processing units. The spatial-spectral classification approach aims at refining the classification results previously obtained by using a K-Nearest Neighbors (KNN) filtering process, in which both the pixel spectral value and the spatial coordinates are considered. To do so, KNN needs two inputs: a one-band representation of the hyperspectral image and the classification results provided by a pixel-wise classifier. Thus, spatial-spectral classification algorithm is divided into three different stages: a Principal Component Analysis (PCA) algorithm for computing the one-band representation of the image, a Support Vector Machine (SVM) classifier, and the KNN-based filtering algorithm. The parallelization of these algorithms shows promising results in terms of computational time, as the mapping of them over different cores presents a speedup of 2.69x when using 3 cores. Consequently, experimental results demonstrate that real-time processing of hyperspectral images is achievable.

  16. Exploration of Exploitation Approaches of European Projects on ICT and Foreign Language Learning: the CEFcult project case

    OpenAIRE

    Rusman, Ellen; Rajagopal, Kamakshi; Stoyanov, Slavi; Van Maele, Jan

    2011-01-01

    Rusman, E., Rajagopal, K., Stoyanov, S., & Van Maele, J. (2011, 20-21 October). Exploration of Exploitation Approaches of European Projects on ICT and Foreign Language Learning: the CEFcult project case. Paper presented at the 4th International Conference ICT for Language Learning, Florence, Italy. Available at: http://www.pixel-online.net/ICT4LL2011/conferenceproceedings.php

  17. Experimental design research approaches, perspectives, applications

    CERN Document Server

    Stanković, Tino; Štorga, Mario

    2016-01-01

    This book presents a new, multidisciplinary perspective on and paradigm for integrative experimental design research. It addresses various perspectives on methods, analysis and overall research approach, and how they can be synthesized to advance understanding of design. It explores the foundations of experimental approaches and their utility in this domain, and brings together analytical approaches to promote an integrated understanding. The book also investigates where these approaches lead to and how they link design research more fully with other disciplines (e.g. psychology, cognition, sociology, computer science, management). Above all, the book emphasizes the integrative nature of design research in terms of the methods, theories, and units of study—from the individual to the organizational level. Although this approach offers many advantages, it has inherently led to a situation in current research practice where methods are diverging and integration between individual, team and organizational under...

  18. Experimental design a chemometric approach

    CERN Document Server

    Deming, SN

    1987-01-01

    Now available in a paperback edition is a book which has been described as ``...an exceptionally lucid, easy-to-read presentation... would be an excellent addition to the collection of every analytical chemist. I recommend it with great enthusiasm.'' (Analytical Chemistry). Unlike most current textbooks, it approaches experimental design from the point of view of the experimenter, rather than that of the statistician. As the reviewer in `Analytical Chemistry' went on to say: ``Deming and Morgan should be given high praise for bringing the principles of experimental design to the level of the p

  19. Main principles of developing exploitation models of semiconductor devices

    Science.gov (United States)

    Gradoboev, A. V.; Simonova, A. V.

    2018-05-01

    The paper represents primary tasks, solutions of which allow to develop the exploitation modes of semiconductor devices taking into account complex and combined influence of ionizing irradiation and operation factors. The structure of the exploitation model of the semiconductor device is presented, which is based on radiation and reliability models. Furthermore, it was shown that the exploitation model should take into account complex and combine influence of various ionizing irradiation types and operation factors. The algorithm of developing the exploitation model of the semiconductor devices is proposed. The possibility of creating the radiation model of Schottky barrier diode, Schottky field-effect transistor and Gunn diode is shown based on the available experimental data. The basic exploitation model of IR-LEDs based upon double AlGaAs heterostructures is represented. The practical application of the exploitation models will allow to output the electronic products with guaranteed operational properties.

  20. Legal Approaches to Combating the Exploitation of Third-Country National Seasonal Workers

    NARCIS (Netherlands)

    Rijken, Conny

    2015-01-01

    The Directive on Seasonal workers is aimed at combating exploitative practices vis-a-vis seasonal workers from outside the EU. After a thorough analysis of the conditions under which practices can be qualified as exploitative, this article assesses the extent to which the directive is equipped to

  1. Final Report, “Exploiting Global View for Resilience”

    Energy Technology Data Exchange (ETDEWEB)

    Chien, Andrew [Univ. of Chicago, IL (United States)

    2017-03-29

    Final technical report for the "Exploiting Global View for Resilience" project. The GVR project aims to create a new approach to portable, resilient applications. The GVR approach builds on a global view data model,, adding versioning (multi-version), user control of timing and rate (multi-stream), and flexible cross layer error signalling and recovery. With a versioned array as a portable abstraction, GVR enables application programmers to exploit deep scientific and application code insights to manage resilience (and its overhead) in a flexible, portable fashion.

  2. Synergistic Integration of Experimental and Simulation Approaches for the de Novo Design of Silk-Based Materials.

    Science.gov (United States)

    Huang, Wenwen; Ebrahimi, Davoud; Dinjaski, Nina; Tarakanova, Anna; Buehler, Markus J; Wong, Joyce Y; Kaplan, David L

    2017-04-18

    Tailored biomaterials with tunable functional properties are crucial for a variety of task-specific applications ranging from healthcare to sustainable, novel bio-nanodevices. To generate polymeric materials with predictive functional outcomes, exploiting designs from nature while morphing them toward non-natural systems offers an important strategy. Silks are Nature's building blocks and are produced by arthropods for a variety of uses that are essential for their survival. Due to the genetic control of encoded protein sequence, mechanical properties, biocompatibility, and biodegradability, silk proteins have been selected as prototype models to emulate for the tunable designs of biomaterial systems. The bottom up strategy of material design opens important opportunities to create predictive functional outcomes, following the exquisite polymeric templates inspired by silks. Recombinant DNA technology provides a systematic approach to recapitulate, vary, and evaluate the core structure peptide motifs in silks and then biosynthesize silk-based polymers by design. Post-biosynthesis processing allows for another dimension of material design by controlled or assisted assembly. Multiscale modeling, from the theoretical prospective, provides strategies to explore interactions at different length scales, leading to selective material properties. Synergy among experimental and modeling approaches can provide new and more rapid insights into the most appropriate structure-function relationships to pursue while also furthering our understanding in terms of the range of silk-based systems that can be generated. This approach utilizes nature as a blueprint for initial polymer designs with useful functions (e.g., silk fibers) but also employs modeling-guided experiments to expand the initial polymer designs into new domains of functional materials that do not exist in nature. The overall path to these new functional outcomes is greatly accelerated via the integration of

  3. Exploiting Quantum Resonance to Solve Combinatorial Problems

    Science.gov (United States)

    Zak, Michail; Fijany, Amir

    2006-01-01

    Quantum resonance would be exploited in a proposed quantum-computing approach to the solution of combinatorial optimization problems. In quantum computing in general, one takes advantage of the fact that an algorithm cannot be decoupled from the physical effects available to implement it. Prior approaches to quantum computing have involved exploitation of only a subset of known quantum physical effects, notably including parallelism and entanglement, but not including resonance. In the proposed approach, one would utilize the combinatorial properties of tensor-product decomposability of unitary evolution of many-particle quantum systems for physically simulating solutions to NP-complete problems (a class of problems that are intractable with respect to classical methods of computation). In this approach, reinforcement and selection of a desired solution would be executed by means of quantum resonance. Classes of NP-complete problems that are important in practice and could be solved by the proposed approach include planning, scheduling, search, and optimal design.

  4. The Theory of Exploitation as the Unequal Exchange of Labour

    OpenAIRE

    Veneziani, Roberto; Yoshihara, Naoki

    2016-01-01

    This paper analyses the normative and positive foundations of the theory of exploitation as the unequal exchange of labour (UEL). The key intuitions behind all of the main approaches to UEL exploitation are explicitly analysed as a series of formal claims in a general economic environment. It is then argued that these intuitions can be captured by one fundamental axiom - called Labour Exploitation - which defines the basic domain of all UEL exploitation forms and identifies the formal and the...

  5. The theory of exploitation as the unequal exchange of labour

    OpenAIRE

    Veneziani, Roberto; Yoshihara, Naoki

    2017-01-01

    This paper analyses the normative and positive foundations of the theory of exploitation as the unequal exchange of labour (UEL). The key intuitions behind all of the main approaches to UEL exploitation are explicitly analysed as a series of formal claims in a general economic environment. It is then argued that these intuitions can be captured by one fundamental axiom - called Labour Exploitation - which defines the basic domain of all UEL exploitation forms and identifies the formal and the...

  6. Exploiting impedance shaping approaches to overcome force overshoots in delicate interaction tasks

    Directory of Open Access Journals (Sweden)

    Loris Roveda

    2016-09-01

    Full Text Available The aim of the presented article is to overcome the force overshoot issue in impedance based force tracking applications. Nowadays, light-weight manipulators are involved in high-accurate force control applications (such as polishing tasks, where the force overshoot issue is critical (i.e. damaging the component causing a production waste, exploiting the impedance control. Two main force tracking impedance control approaches are described in literature: (a set-point deformation and (b variable stiffness approaches. However, no contributions are directly related to the force overshoot issue. The presented article extends both such methodologies to analytically achieve the force overshoots avoidance in interaction tasks based on the on-line estimation of the interacting environment stiffness (available through an EKF. Both the proposed control algorithms allow to achieve a linear closed-loop dynamics for the coupled robot-environment system. Therefore, control gains can be analytically on-line calculated to achieve an over-damped closed-loop dynamics of the controlled coupled system. Control strategies have been validated in experiments, involving a KUKA LWR 4+. A probing task has been performed, representative of many industrial tasks (e.g. assembly tasks, in which a main force task direction is defined.

  7. Metagenomic approaches to exploit the biotechnological potential of the microbial consortia of marine sponges.

    Science.gov (United States)

    Kennedy, Jonathan; Marchesi, Julian R; Dobson, Alan D W

    2007-05-01

    Natural products isolated from sponges are an important source of new biologically active compounds. However, the development of these compounds into drugs has been held back by the difficulties in achieving a sustainable supply of these often-complex molecules for pre-clinical and clinical development. Increasing evidence implicates microbial symbionts as the source of many of these biologically active compounds, but the vast majority of the sponge microbial community remain uncultured. Metagenomics offers a biotechnological solution to this supply problem. Metagenomes of sponge microbial communities have been shown to contain genes and gene clusters typical for the biosynthesis of biologically active natural products. Heterologous expression approaches have also led to the isolation of secondary metabolism gene clusters from uncultured microbial symbionts of marine invertebrates and from soil metagenomic libraries. Combining a metagenomic approach with heterologous expression holds much promise for the sustainable exploitation of the chemical diversity present in the sponge microbial community.

  8. Consensual exploitation : the moral wrong in exploitation and legal restrictions on consensual exploitative transactions

    OpenAIRE

    van der Neut, Wendy

    2014-01-01

    This thesis is about so-­‐called consensual exploitative transactions: transactions to which all parties agree voluntarily, and which are beneficial for all parties, but which are still widely considered exploitative, and for that reason legally restricted in many countries. The thesis asks two main questions: 1. What is wrong with consensual exploitation? 2.What implications does the answer to this question have for the legal restriction of consensual transactions ...

  9. Network exploitation using WAMI tracks

    Science.gov (United States)

    Rimey, Ray; Record, Jim; Keefe, Dan; Kennedy, Levi; Cramer, Chris

    2011-06-01

    Creating and exploiting network models from wide area motion imagery (WAMI) is an important task for intelligence analysis. Tracks of entities observed moving in the WAMI sensor data are extracted, then large numbers of tracks are studied over long time intervals to determine specific locations that are visited (e.g., buildings in an urban environment), what locations are related to other locations, and the function of each location. This paper describes several parts of the network detection/exploitation problem, and summarizes a solution technique for each: (a) Detecting nodes; (b) Detecting links between known nodes; (c) Node attributes to characterize a node; (d) Link attributes to characterize each link; (e) Link structure inferred from node attributes and vice versa; and (f) Decomposing a detected network into smaller networks. Experimental results are presented for each solution technique, and those are used to discuss issues for each problem part and its solution technique.

  10. Geographically distributed Batch System as a Service: the INDIGO-DataCloud approach exploiting HTCondor

    Science.gov (United States)

    Aiftimiei, D. C.; Antonacci, M.; Bagnasco, S.; Boccali, T.; Bucchi, R.; Caballer, M.; Costantini, A.; Donvito, G.; Gaido, L.; Italiano, A.; Michelotto, D.; Panella, M.; Salomoni, D.; Vallero, S.

    2017-10-01

    One of the challenges a scientific computing center has to face is to keep delivering well consolidated computational frameworks (i.e. the batch computing farm), while conforming to modern computing paradigms. The aim is to ease system administration at all levels (from hardware to applications) and to provide a smooth end-user experience. Within the INDIGO- DataCloud project, we adopt two different approaches to implement a PaaS-level, on-demand Batch Farm Service based on HTCondor and Mesos. In the first approach, described in this paper, the various HTCondor daemons are packaged inside pre-configured Docker images and deployed as Long Running Services through Marathon, profiting from its health checks and failover capabilities. In the second approach, we are going to implement an ad-hoc HTCondor framework for Mesos. Container-to-container communication and isolation have been addressed exploring a solution based on overlay networks (based on the Calico Project). Finally, we have studied the possibility to deploy an HTCondor cluster that spans over different sites, exploiting the Condor Connection Broker component, that allows communication across a private network boundary or firewall as in case of multi-site deployments. In this paper, we are going to describe and motivate our implementation choices and to show the results of the first tests performed.

  11. The Ethics of Exploitation

    Directory of Open Access Journals (Sweden)

    Paul McLaughlin

    2008-11-01

    Full Text Available Philosophical inquiry into exploitation has two major deficiencies to date: it assumes that exploitation is wrong by definition; and it pays too much attention to the Marxian account of exploitation. Two senses of exploitation should be distinguished: the ‘moral’ or pejorative sense and the ‘non-moral’ or ‘non-prejudicial’ sense. By demonstrating the conceptual inadequacy of exploitation as defined in the first sense, and by defining exploitation adequately in the latter sense, we seek to demonstrate the moral complexity of exploitation. We contend, moreover, that moral evaluation of exploitation is only possible once we abandon a strictly Marxian framework and attempt, in the long run, to develop an integral ethic along Godwinian lines.

  12. Competing Discourses about Youth Sexual Exploitation in Canadian News Media.

    Science.gov (United States)

    Saewyc, Elizabeth M; Miller, Bonnie B; Rivers, Robert; Matthews, Jennifer; Hilario, Carla; Hirakata, Pam

    2013-10-01

    Media holds the power to create, maintain, or break down stigmatizing attitudes, which affect policies, funding, and services. To understand how Canadian news media depicts the commercial sexual exploitation of children and youth, we examined 835 Canadian newspaper articles from 1989-2008 using a mixed methods critical discourse analysis approach, comparing representations to existing research about sexually exploited youth. Despite research evidence that equal rates of boys and girls experience exploitation, Canadian news media depicted exploited youth predominantly as heterosexual girls, and described them alternately as victims or workers in a trade, often both in the same story. News media mentioned exploiters far less often than victims, and portrayed them almost exclusively as male, most often called 'customers' or 'consumers,' and occasionally 'predators'; in contrast, research has documented the majority of sexually exploited boys report female exploiters. Few news stories over the past two decades portrayed the diversity of victims, perpetrators, and venues of exploitation reported in research. The focus on victims but not exploiters helps perpetuate stereotypes of sexual exploitation as business or a 'victimless crime,' maintains the status quo, and blurs responsibility for protecting youth under the UN Convention on the Rights of the Child. Health care providers and researchers can be advocates for accuracy in media coverage about sexual exploitation; news reporters and editors should focus on exploiters more than victims, draw on existing research evidence to avoid perpetuating stereotypes, and use accurate terms, such as commercial sexual exploitation, rather than terms related to business or trade.

  13. Activity-based exploitation of Full Motion Video (FMV)

    Science.gov (United States)

    Kant, Shashi

    2012-06-01

    Video has been a game-changer in how US forces are able to find, track and defeat its adversaries. With millions of minutes of video being generated from an increasing number of sensor platforms, the DOD has stated that the rapid increase in video is overwhelming their analysts. The manpower required to view and garner useable information from the flood of video is unaffordable, especially in light of current fiscal restraints. "Search" within full-motion video has traditionally relied on human tagging of content, and video metadata, to provision filtering and locate segments of interest, in the context of analyst query. Our approach utilizes a novel machine-vision based approach to index FMV, using object recognition & tracking, events and activities detection. This approach enables FMV exploitation in real-time, as well as a forensic look-back within archives. This approach can help get the most information out of video sensor collection, help focus the attention of overburdened analysts form connections in activity over time and conserve national fiscal resources in exploiting FMV.

  14. Experimental Volcanology: 2010 and 2020

    Science.gov (United States)

    Dingwell, D. B.

    2010-12-01

    The advent of an experimental approach to volcanology has its roots in decades-old laboratory based approaches to characterising the properties of magmas and analog materials, together with the attempts at simulating volcanic processes in the lab. A little over ten years ago many new thrusts of experimental advance led to a new dawn for experimental science applied to volcanic eruptions. Along with that, new expectations, new goals and new strategies emerged about ten years ago. Ten years later, in 2010, many fruits have been born of this labour, and new frontiers are being unfolded as we meet here. Here are some of the youngest captivating themes being explored in experimental programs today: 1) interfacing volcanic monitoring systems to experimentally generated eruptions. 2) elucidating the physicochemical behavior of experimentally generated volcanic ash as an agent in the earth system. 3) blending experimental rock deformation and magmatology studies to understand the strength and stability of volcanic materials and volcanic structures 4) exploiting the kinematics of experimentally-generated versus natural volcanic products to understand flow style and strain history. The past ten years of experimental developments in volcanology have prepared us for great advances in the future, most of which were not perceived as likely avenues of investigation as little as ten years ago! The situation is likely to repeat itself in 2020.

  15. Security option file - Exploitation (DOS-Expl)

    International Nuclear Information System (INIS)

    2016-01-01

    This document aims at presenting functions performed by Cigeo during its exploitation phase, its main technical and security options which are envisaged with respect to different types of internal or external risks, and a first assessment of its impact on mankind and on the environment during its exploitation in normal operation as well as in incidental or accidental situations. A first volume addresses security principles, approach and management in relationship with the legal and regulatory framework. The second volume presents input data related to waste parcels and used for the installation sizing and operation, the main site characteristics, the main technical options regarding structures and equipment, and the main options regarding exploitation (parcel management, organisational and human aspects, and effluent management). The third volume describes how parcel are processed from their arrival to their setting in storage compartment, an inventory of internal and external risks, and a first assessment of consequences of scenarios on mankind and on the environment. The fourth volume presents options and operations which are envisaged regarding Cigeo closure, and inventory of associated risks

  16. Simulated population responses of common carp to commercial exploitation

    Energy Technology Data Exchange (ETDEWEB)

    Weber, Michael J.; Hennen, Matthew J.; Brown, Michael L.

    2011-12-01

    Common carp Cyprinus carpio is a widespread invasive species that can become highly abundant and impose deleterious ecosystem effects. Thus, aquatic resource managers are interested in controlling common carp populations. Control of invasive common carp populations is difficult, due in part to the inherent uncertainty of how populations respond to exploitation. To understand how common carp populations respond to exploitation, we evaluated common carp population dynamics (recruitment, growth, and mortality) in three natural lakes in eastern South Dakota. Common carp exhibited similar population dynamics across these three systems that were characterized by consistent recruitment (ages 3 to 15 years present), fast growth (K = 0.37 to 0.59), and low mortality (A = 1 to 7%). We then modeled the effects of commercial exploitation on size structure, abundance, and egg production to determine its utility as a management tool to control populations. All three populations responded similarly to exploitation simulations with a 575-mm length restriction, representing commercial gear selectivity. Simulated common carp size structure modestly declined (9 to 37%) in all simulations. Abundance of common carp declined dramatically (28 to 56%) at low levels of exploitation (0 to 20%) but exploitation >40% had little additive effect and populations were only reduced by 49 to 79% despite high exploitation (>90%). Maximum lifetime egg production was reduced from 77 to 89% at a moderate level of exploitation (40%), indicating the potential for recruitment overfishing. Exploitation further reduced common carp size structure, abundance, and egg production when simulations were not size selective. Our results provide insights to how common carp populations may respond to exploitation. Although commercial exploitation may be able to partially control populations, an integrated removal approach that removes all sizes of common carp has a greater chance of controlling population abundance

  17. [Cognitive experimental approach to anxiety disorders].

    Science.gov (United States)

    Azaïs, F

    1995-01-01

    Cognitive psychology is proposing a functional model to explain the mental organisation leading to emotional disorders. Among these disorders, anxiety spectrum represents a domain in which this model seems to be interesting for an efficient and comprehensive approach of the pathology. Number of behavioral or cognitive psychotherapeutic methods are relating to these cognitive references, but the theorical concepts of cognitive "shemata" or cognitive "processes" evoked to describe mental functioning in anxiety need an experimental approach for a better rational understanding. Cognitive function as perception, attention or memory can be explored in this domaine in an efficient way, allowing a more precise study of each stage of information processing. The cognitive model proposed in the psychopathology of anxiety suggests that anxious subjects are characterized by biases in processing of emotionally valenced information. This hypothesis suggests functional interference in information processing in these subjects, leading to an anxious response to the most of different stimuli. Experimental approach permit to explore this hypothesis, using many tasks for testing different cognitive dysfunction evoked in the anxious cognitive organisation. Impairments revealed in anxiety disorders seem to result from specific biases in threat-related information processing, involving several stages of cognitive processes. Semantic interference, attentional bias, implicit memory bias and priming effect are the most often disorders observed in anxious pathology, like simple phobia, generalised anxiety, panic disorder or post-traumatic stress disorder. These results suggest a top-down organisation of information processing in anxious subjects, who tend to detect, perceive and label many situations as threatening experience. The processes of reasoning and elaboration are consequently impaired in their adaptative function to threat, leading to the anxious response observed in clinical

  18. An Equity Centered Management Approach to Exploiting Sport Employee Productivity

    OpenAIRE

    Schneider, Robert C.

    2017-01-01

    A primary goal ofsport organizations is to exploit employees’ abilities to their fullestcapacities. Sport managers who successfully maximize employee productivity willgreatly increase the chances of achieving the organization’s goals andobjectives. The full potential of sport employees’ abilities can be realizedthrough the application of the equity component grounded in Adam’s EquityTheory (Adams, 1963). Centered on the premise that the relationship betweensport manager and employer must be o...

  19. Sustainable exploitation and management of aquatic resources

    DEFF Research Database (Denmark)

    Neuenfeldt, Stefan; Köster, Fritz

    2014-01-01

    DTU Aqua conducts research, provides advice,educates at university level and contributes toinnovation in sustainable exploitation andmanagement of aquatic resources. The vision of DTUAqua is to enable ecologically and economicallysustainable exploitation of aquatic resourcesapplying an integrated...... management. Marineecosystems aims at understanding the mechanisms that govern the interaction between individuals,species and populations in an ecosystem enabling us to determine the stability and flexibility of theecosystem.Marine living resources looks at the sustainable utilization of fish and shellfish...... stocks.Ecosystem effects expands from the ecosystem approach to fisheries management to an integratedapproach where other human activities are taken into consideration. Fisheries management developsmethods, models and tools for predicting and evaluating the effects of management measures andregulations...

  20. Experimental Validation of a Dynamic Model for Lightweight Robots

    Directory of Open Access Journals (Sweden)

    Alessandro Gasparetto

    2013-03-01

    Full Text Available Nowadays, one of the main topics in robotics research is dynamic performance improvement by means of a lightening of the overall system structure. The effective motion and control of these lightweight robotic systems occurs with the use of suitable motion planning and control process. In order to do so, model-based approaches can be adopted by exploiting accurate dynamic models that take into account the inertial and elastic terms that are usually neglected in a heavy rigid link configuration. In this paper, an effective method for modelling spatial lightweight industrial robots based on an Equivalent Rigid Link System approach is considered from an experimental validation perspective. A dynamic simulator implementing the formulation is used and an experimental test-bench is set-up. Experimental tests are carried out with a benchmark L-shape mechanism.

  1. Stability of nanofluids: Molecular dynamic approach and experimental study

    International Nuclear Information System (INIS)

    Farzaneh, H.; Behzadmehr, A.; Yaghoubi, M.; Samimi, A.; Sarvari, S.M.H.

    2016-01-01

    Highlights: • Nanofluid stability is investigated and discussed. • A molecular dynamic approach, considering different forces on the nanoparticles, is adopted. • Stability diagrams are presented for different thermo-fluid conditions. • An experimental investigation is carried out to confirm the theoretical approach. - Abstract: Nanofluids as volumetric absorbent in solar energy conversion devices or as working fluid in different heat exchangers have been proposed by various researchers. However, dispersion stability of nanofluids is an important issue that must be well addressed before any industrial applications. Conditions such as severe temperature gradient, high temperature of heat transfer fluid, nanoparticle mean diameters and types of nanoparticles and base fluid are among the most effective parameters on the stability of nanofluid. A molecular dynamic approach, considering kinetic energy of nanoparticles and DLVO potential energy between nanoparticles, is adopted to study the nanofluid stability for different nanofluids at different working conditions. Different forces such as Brownian, thermophoresis, drag and DLVO are considered to introduce the stability diagrams. The latter presents the conditions for which a nanofluid can be stable. In addition an experimental investigation is carried out to find a stable nanofluid and to show the validity of the theoretical approach. There is a good agreement between the experimental and theoretical results that confirms the validity of our theoretical approach.

  2. Hacking the art of exploitation

    CERN Document Server

    Erickson, Jon

    2003-01-01

    A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking," Hacking: The Art of Exploitation is for both technical and non-technical people who are interested in computer security. It shows how hackers exploit programs and write exploits, instead of just how to run other people's exploits. Unlike many so-called hacking books, this book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.

  3. Features for Exploiting Black-Box Optimization Problem Structure

    DEFF Research Database (Denmark)

    Tierney, Kevin; Malitsky, Yuri; Abell, Tinus

    2013-01-01

    landscape of BBO problems and show how an algorithm portfolio approach can exploit these general, problem indepen- dent features and outperform the utilization of any single minimization search strategy. We test our methodology on data from the GECCO Workshop on BBO Benchmarking 2012, which contains 21...

  4. Fully Exploiting The Potential Of The Periodic Table Through Pattern Recognition.

    Science.gov (United States)

    Schultz, Emeric

    2005-01-01

    An approach to learning chemical facts that starts with the periodic table and depends primarily on recognizing and completing patterns and following a few simple rules is described. This approach exploits the exceptions that arise and uses them as opportunities for further concept development.

  5. Exploitation and disadvantage

    NARCIS (Netherlands)

    Ferguson, B.

    2016-01-01

    According to some accounts of exploitation, most notably Ruth Sample's (2003) degradation-based account and Robert Goodin's (1987) vulnerability-based account, exploitation occurs when an advantaged party fails to constrain their advantage in light of another's disadvantage, regardless of the cause

  6. Assisting children born of sexual exploitation and abuse

    Directory of Open Access Journals (Sweden)

    Lauren Rumble

    2007-01-01

    Full Text Available The UN Secretary-General has issued a strategy tosupport victims of sexual exploitation and abuse by UNstaff. It includes a controversial proposal to introduceDNA sampling for all UN staff. Unless this suggestionis adopted, an important opportunity to implementa truly survivor-centred approach may be lost.

  7. Managing Cybersecurity Research and Experimental Development: The REVO Approach

    OpenAIRE

    Dan Craigen; Drew Vandeth; D’Arcy Walsh

    2013-01-01

    We present a systematic approach for managing a research and experimental development cybersecurity program that must be responsive to continuously evolving cybersecurity, and other, operational concerns. The approach will be of interest to research-program managers, academe, corporate leads, government leads, chief information officers, chief technology officers, and social and technology policy analysts. The approach is compatible with international standards and procedures published by the...

  8. Do Ethnic Enclaves Impede Immigrants’ Integration? Evidence from a Quasi-Experimental Social-Interaction Approach

    OpenAIRE

    Danzer, A. M.; Yaman, F.

    2013-01-01

    It is widely debated whether immigrants who live among co-ethnics are less willing to integrate into the host society. Exploiting the quasi-experimental guest worker placement across German regions during the 1960/70s as well as information on immigrants’ inter-ethnic contact networks and social activities, we are able to identify the causal effect of ethnic concentration on social integration. The exogenous placement of immigrants "switches off" observable and unobservable differences in t...

  9. Natural gas hydrates. Experimental techniques and their applications

    Energy Technology Data Exchange (ETDEWEB)

    Ye, Yuguang; Liu, Changling (eds.) [Qingdao Institute of Marine Geology (China). Gas Hydrate Laboratory

    2013-07-01

    Focuses on gas hydrate experiment in laboratory. Intends to provide practical significant parameters for gas hydrate exploration and exploitation in the oceanic and permafrost environments. Consists of different themes that present up-to-date information on hydrate experiments. ''Natural Gas Hydrates: Experimental Techniques and Their Applications'' attempts to broadly integrate the most recent knowledge in the fields of hydrate experimental techniques in the laboratory. The book examines various experimental techniques in order to provide useful parameters for gas hydrate exploration and exploitation. It provides experimental techniques for gas hydrates, including the detection techniques, the thermo-physical properties, permeability and mechanical properties, geochemical abnormalities, stability and dissociation kinetics, exploitation conditions, as well as modern measurement technologies etc.

  10. Exploiting Thread Parallelism for Ocean Modeling on Cray XC Supercomputers

    Energy Technology Data Exchange (ETDEWEB)

    Sarje, Abhinav [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Jacobsen, Douglas W. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Williams, Samuel W. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Ringler, Todd [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Oliker, Leonid [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2016-05-01

    The incorporation of increasing core counts in modern processors used to build state-of-the-art supercomputers is driving application development towards exploitation of thread parallelism, in addition to distributed memory parallelism, with the goal of delivering efficient high-performance codes. In this work we describe the exploitation of threading and our experiences with it with respect to a real-world ocean modeling application code, MPAS-Ocean. We present detailed performance analysis and comparisons of various approaches and configurations for threading on the Cray XC series supercomputers.

  11. Experimental approaches for studying non-equilibrium atmospheric plasma jets

    Energy Technology Data Exchange (ETDEWEB)

    Shashurin, A., E-mail: ashashur@purdue.edu [School of Aeronautics & Astronautics, Purdue University, West Lafayette, Indiana 47907 (United States); Keidar, M. [Department of Mechanical and Aerospace Engineering, The George Washington University, Washington, District of Columbia 20052 (United States)

    2015-12-15

    This work reviews recent research efforts undertaken in the area non-equilibrium atmospheric plasma jets with special focus on experimental approaches. Physics of small non-equilibrium atmospheric plasma jets operating in kHz frequency range at powers around few Watts will be analyzed, including mechanism of breakdown, process of ionization front propagation, electrical coupling of the ionization front with the discharge electrodes, distributions of excited and ionized species, discharge current spreading, transient dynamics of various plasma parameters, etc. Experimental diagnostic approaches utilized in the field will be considered, including Rayleigh microwave scattering, Thomson laser scattering, electrostatic streamer scatterers, optical emission spectroscopy, fast photographing, etc.

  12. Anthropology of sexual exploitation

    Directory of Open Access Journals (Sweden)

    Lalić Velibor

    2009-01-01

    Full Text Available In this paper, the authors observe sexual exploitation from an anthropological perspective. They analyze the rational, ethical, emotional and mythological dimensions of human sexuality. Consequently, after setting the phenomenon in a social and historical context, sexual exploitation is closely observed in the contemporary age. Based on thoughts of relevant thinkers, they make the conclusion that the elimination of sexual exploitation is not an utterly legal issue, but political and economical issues as well. Namely, legal norms are not sufficient to overcome sexual exploitation, but, political and economical relationships in contemporary societies, which will be based on sincere equal opportunities must be established.

  13. Toward a Cooperative Experimental System Development Approach

    DEFF Research Database (Denmark)

    Grønbæk, Kaj; Kyng, Morten; Mogensen, Preben Holst

    1997-01-01

    This chapter represents a step towards the establishment of a new system development approach, called Cooperative Experimental System Development (CESD). CESD seeks to overcome a number of limitations in existing approaches: specification oriented methods usually assume that system design can...... be based solely on observation and detached reflection; prototyping methods often have a narrow focus on the technical construction of various kinds of prototypes; Participatory Design techniques—including the Scandinavian Cooperative Design (CD) approaches—seldom go beyond the early analysis....../design activities of development projects. In contrast, the CESD approach is characterized by its focus on: active user involvement throughout the entire development process; prototyping experiments closely coupled to work-situations and use-scenarios; transforming results from early cooperative analysis...

  14. A three-dimensional microstructuring technique exploiting the positive photoresist property

    International Nuclear Information System (INIS)

    Hirai, Yoshikazu; Sugano, Koji; Tsuchiya, Toshiyuki; Tabata, Osamu

    2010-01-01

    The present paper describes a three-dimensional (3D) thick-photoresist microstructuring technique that exploits the effect of exposure wavelength on dissolution rate distributions in a thick-film diazonaphthoquinone (DNQ) photoresist. In fabricating 3D microstructure with specific applications, it is important to control the spatial dissolution rate distribution in the photoresist layer, since the lithographic performance for 3D microstructuring is largely determined by the details of the dissolution property. To achieve this goal, the effect of exposure wavelength on dissolution rate distributions was applied for 3D microstructuring. The parametric experimental results demonstrated (1) the advantages of the fabrication technique for 3D microstructuring and (2) the necessity of a dedicated simulation approach based on the measured thick-photoresist property for further verification. Thus, a simple and practical photolithography simulation model that makes use of the Fresnel diffraction theory and an empirically characterized DNQ photoresist property was adopted. Simulations revealed good quantitative agreement between the photoresist development profiles of the standard photolithography and the moving-mask UV lithography process. The simulation and experimental results conclude that the g-line (λ = 436 nm) process can reduce the dimensional limitation or complexity of the photolithography process for the 3D microstructuring which leads to nanoscale microstructuring.

  15. Building, Sharing and Exploiting Spatio-Temporal Aggregates in Vehicular Networks

    Directory of Open Access Journals (Sweden)

    Dorsaf Zekri

    2014-01-01

    Full Text Available This article focuses on data aggregation in vehicular ad hoc networks (VANETs. In such networks, data produced by sensors or crowdsourcers are exchanged between vehicles in order to warn or inform drivers when an event occurs (e.g., an accident, a traffic congestion, a parking space released, a vehicle with non-functioning brake lights, etc.. In the following, we propose to generate spatio-temporal aggregates containing these data in order to keep a summary of past events. We therefore use Flajolet-Martin sketches. Our goal is then to exploit these aggregates to better assist the drivers. These aggregates may indeed produce additional knowledge that may be useful when no event has been recently transmitted by surrounding vehicles or when some knowledge about the global demand may improve the decision that need to be taken at the vehicle level. To prove the effectiveness of our approach, an extensive experimental evaluation has been performed considering vehicles looking for an available parking space, that proves the interest of our proposal. The experimentations indeed show that the use of our aggregation structure significantly reduces the time needed to actually find a parking space. It also increases the percentage of vehicles finding such a resource in a bounded time in congested situations.

  16. Cultural Work as a Site of Struggle: Freelancers and Exploitation

    Directory of Open Access Journals (Sweden)

    Nicole S. Cohen

    2012-05-01

    Full Text Available This paper argues that Marxist political economy is a useful framework for understanding contemporary conditions of cultural work. Drawing on Karl Marx’s foundational concepts, labour process theory, and a case study of freelance writers, I argue that the debate over autonomy and control in cultural work ignores exploitation in labour-capital relationships, which is a crucial process shaping cultural work. To demonstrate the benefits of this approach, I discuss two methods media firms use to extract surplus value from freelance writers: exploitation of unpaid labour time and exploitation of intellectual property through aggressive copyright regimes. I argue that a Marxist perspective can uncover the dynamics that are transforming cultural industries and workers’ experiences. From this perspective, cultural work is understood as a site of struggle.

  17. The exploitation argument against commercial surrogacy.

    Science.gov (United States)

    Wilkinson, Stephen

    2003-04-01

    This paper discusses the exploitation argument against commercial surrogacy: the claim that commercial surrogacy is morally objectionable because it is exploitative. The following questions are addressed. First, what exactly does the exploitation argument amount to? Second, is commercial surrogacy in fact exploitative? Third, if it were exploitative, would this provide a sufficient reason to prohibit (or otherwise legislatively discourage) it? The focus throughout is on the exploitation of paid surrogates, although it is noted that other parties (e.g. 'commissioning parents') may also be the victims of exploitation. It is argued that there are good reasons for believing that commercial surrogacy is often exploitative. However, even if we accept this, the exploitation argument for prohibiting (or otherwise legislatively discouraging) commercial surrogacy remains quite weak. One reason for this is that prohibition may well 'backfire' and lead to potential surrogates having to do other things that are more exploitative and/or more harmful than paid surrogacy. It is concluded therefore that those who oppose exploitation should (rather than attempting to stop particular practices like commercial surrogacy) concentrate on: (a) improving the conditions under which paid surrogates 'work'; and (b) changing the background conditions (in particular, the unequal distribution of power and wealth) which generate exploitative relationships.

  18. Exploiting neurovascular coupling: a Bayesian sequential Monte Carlo approach applied to simulated EEG fNIRS data

    Science.gov (United States)

    Croce, Pierpaolo; Zappasodi, Filippo; Merla, Arcangelo; Chiarelli, Antonio Maria

    2017-08-01

    Objective. Electrical and hemodynamic brain activity are linked through the neurovascular coupling process and they can be simultaneously measured through integration of electroencephalography (EEG) and functional near-infrared spectroscopy (fNIRS). Thanks to the lack of electro-optical interference, the two procedures can be easily combined and, whereas EEG provides electrophysiological information, fNIRS can provide measurements of two hemodynamic variables, such as oxygenated and deoxygenated hemoglobin. A Bayesian sequential Monte Carlo approach (particle filter, PF) was applied to simulated recordings of electrical and neurovascular mediated hemodynamic activity, and the advantages of a unified framework were shown. Approach. Multiple neural activities and hemodynamic responses were simulated in the primary motor cortex of a subject brain. EEG and fNIRS recordings were obtained by means of forward models of volume conduction and light propagation through the head. A state space model of combined EEG and fNIRS data was built and its dynamic evolution was estimated through a Bayesian sequential Monte Carlo approach (PF). Main results. We showed the feasibility of the procedure and the improvements in both electrical and hemodynamic brain activity reconstruction when using the PF on combined EEG and fNIRS measurements. Significance. The investigated procedure allows one to combine the information provided by the two methodologies, and, by taking advantage of a physical model of the coupling between electrical and hemodynamic response, to obtain a better estimate of brain activity evolution. Despite the high computational demand, application of such an approach to in vivo recordings could fully exploit the advantages of this combined brain imaging technology.

  19. Exploitability Assessment with TEASER

    Science.gov (United States)

    2017-05-01

    for architectural neutral taint analysis on top of LLVM and QEMU. POC Proof of Concept : Demonstration of an exploit on a program . vii RCE Remote Code...bug with a Proof of Concept (POC), or input to a program demonstrating the ability to use a bug to exploit the application, to demonstrate the...often leads to either computationally difficult constraint solving problems or taint explosion. Given the computational difficulty of exploit

  20. An ethnomethodological approach to examine exploitation in the context of capacity, trust and experience of commercial surrogacy in India

    Science.gov (United States)

    2013-01-01

    The socio-ethical concerns regarding exploitation in commercial surrogacy are premised on asymmetric vulnerability and the commercialization of women’s reproductive capacity to suit individualistic motives. In examining the exploitation argument, this article reviews the social contract theory that describes an individual as an ‘economic man’ with moral and/or political motivations to satisfy individual desires. This study considers the critique by feminists, who argue that patriarchal and medical control prevails in the surrogacy contracts. It also explores the exploitative dynamics amongst actors in the light of Baier’s conceptualization of trust and human relationship, within which both justice and exploitation thrive, and Foucault’s concept of bio-power. Drawing on these concepts, this paper aims to investigate the manifestations of exploitation in commercial surrogacy in the context of trust, power and experiences of actors, using a case study of one clinic in India. The actors’ experiences are evaluated at different stages of the surrogacy process: recruitment, medical procedures, living in the surrogate home, bonding with the child and amongst actors, financial dealings, relinquishment and post-relinquishment. This study applies ethnomethodology to identify phenomena as perceived by the actors in a situation, giving importance to their interpretations of the rules that make collective activity possible. The methods include semi-structured interviews, discussions, participant observation and explanation of the phenomena from the actors’ perspectives. Between August 2009 and April 2010, 13 surrogate mothers (SMs), 4 intended parents (IPs) and 2 medical practitioners (MPs) from one clinic in Western India were interviewed. This study reveals that asymmetries of capacity amongst the MPs, SMs, IPs and surrogate agents (SAs) lead to a network of trust and designation of powers through rules, bringing out the relevance of Baier’s conceptualization

  1. An ethnomethodological approach to examine exploitation in the context of capacity, trust and experience of commercial surrogacy in India.

    Science.gov (United States)

    Saravanan, Sheela

    2013-08-20

    The socio-ethical concerns regarding exploitation in commercial surrogacy are premised on asymmetric vulnerability and the commercialization of women's reproductive capacity to suit individualistic motives. In examining the exploitation argument, this article reviews the social contract theory that describes an individual as an 'economic man' with moral and/or political motivations to satisfy individual desires. This study considers the critique by feminists, who argue that patriarchal and medical control prevails in the surrogacy contracts. It also explores the exploitative dynamics amongst actors in the light of Baier's conceptualization of trust and human relationship, within which both justice and exploitation thrive, and Foucault's concept of bio-power. Drawing on these concepts, this paper aims to investigate the manifestations of exploitation in commercial surrogacy in the context of trust, power and experiences of actors, using a case study of one clinic in India. The actors' experiences are evaluated at different stages of the surrogacy process: recruitment, medical procedures, living in the surrogate home, bonding with the child and amongst actors, financial dealings, relinquishment and post-relinquishment.This study applies ethnomethodology to identify phenomena as perceived by the actors in a situation, giving importance to their interpretations of the rules that make collective activity possible. The methods include semi-structured interviews, discussions, participant observation and explanation of the phenomena from the actors' perspectives. Between August 2009 and April 2010, 13 surrogate mothers (SMs), 4 intended parents (IPs) and 2 medical practitioners (MPs) from one clinic in Western India were interviewed.This study reveals that asymmetries of capacity amongst the MPs, SMs, IPs and surrogate agents (SAs) lead to a network of trust and designation of powers through rules, bringing out the relevance of Baier's conceptualization of asymmetric

  2. The experimental and shell model approach to 100Sn

    International Nuclear Information System (INIS)

    Grawe, H.; Maier, K.H.; Fitzgerald, J.B.; Heese, J.; Spohr, K.; Schubart, R.; Gorska, M.; Rejmund, M.

    1995-01-01

    The present status of experimental approach to 100 Sn and its shell model structure is given. New developments in experimental techniques, such as low background isomer spectroscopy and charged particle detection in 4π are surveyed. Based on recent experimental data shell model calculations are used to predict the structure of the single- and two-nucleon neighbours of 100 Sn. The results are compared to the systematic of Coulomb energies and spin-orbit splitting and discussed with respect to future experiments. (author). 51 refs, 11 figs, 1 tab

  3. Two questions about surrogacy and exploitation.

    Science.gov (United States)

    Wertheimer, Alan

    1992-01-01

    In this article I will consider two related questions about surrogacy and exploitation: (1) Is surrogacy exploitative? (2) If surrogacy is exploitative, what is the moral force of this exploitation? Briefly stated, I shall argue that whether surrogacy is exploitative depends on whether exploitation must be harmful to the exploited party or whether (as I think) there can be mutually advantageous exploitation. It also depends on some facts about surrogacy about which we have little reliable evidence and on our philosophical view on what counts as a harm to the surrogate. Our answer to the second question will turn in part on the account of exploitation we invoke in answering the first question and in part on the way in which we resolve some other questions about the justification of state interference. I shall suggest, however, that if surrogacy is a form of voluntary and mutually advantageous exploitation, then there is a strong presumption that surrogacy contracts should be permitted and even enforceable, although that presumption may be overridden on other grounds.

  4. Risk assessment by dynamic representation of vulnerability, exploitation, and impact

    Science.gov (United States)

    Cam, Hasan

    2015-05-01

    Assessing and quantifying cyber risk accurately in real-time is essential to providing security and mission assurance in any system and network. This paper presents a modeling and dynamic analysis approach to assessing cyber risk of a network in real-time by representing dynamically its vulnerabilities, exploitations, and impact using integrated Bayesian network and Markov models. Given the set of vulnerabilities detected by a vulnerability scanner in a network, this paper addresses how its risk can be assessed by estimating in real-time the exploit likelihood and impact of vulnerability exploitation on the network, based on real-time observations and measurements over the network. The dynamic representation of the network in terms of its vulnerabilities, sensor measurements, and observations is constructed dynamically using the integrated Bayesian network and Markov models. The transition rates of outgoing and incoming links of states in hidden Markov models are used in determining exploit likelihood and impact of attacks, whereas emission rates help quantify the attack states of vulnerabilities. Simulation results show the quantification and evolving risk scores over time for individual and aggregated vulnerabilities of a network.

  5. Exploit Kit traffic analysis

    OpenAIRE

    Καπίρης, Σταμάτης; Kapiris, Stamatis

    2017-01-01

    Exploit kits have become one of the most widespread and destructive threat that Internet users face on a daily basis. Since the first actor, which has been categorized as exploit kit, namely MPack, appeared in 2006, we have seen a new era on exploit kit variants compromising popular websites, infecting hosts and delivering destructive malware, following an exponentially evolvement to date. With the growing threat landscape, large enterprises to domestic networks, have starte...

  6. Managing Cybersecurity Research and Experimental Development: The REVO Approach

    Directory of Open Access Journals (Sweden)

    Dan Craigen

    2013-07-01

    Full Text Available We present a systematic approach for managing a research and experimental development cybersecurity program that must be responsive to continuously evolving cybersecurity, and other, operational concerns. The approach will be of interest to research-program managers, academe, corporate leads, government leads, chief information officers, chief technology officers, and social and technology policy analysts. The approach is compatible with international standards and procedures published by the Organisation for Economic Co-operation and Development (OECD and the Treasury Board of Canada Secretariat (TBS. The key benefits of the approach are the following: i the breadth of the overall (cybersecurity space is described; ii depth statements about specific (cybersecurity challenges are articulated and mapped to the breadth of the problem; iii specific (cybersecurity initiatives that have been resourced through funding or personnel are tracked and linked to specific challenges; and iv progress is assessed through key performance indicators. Although we present examples from cybersecurity, the method may be transferred to other domains. We have found the approach to be rigorous yet adaptive to change; it challenges an organization to be explicit about the nature of its research and experimental development in a manner that fosters alignment with evolving business priorities, knowledge transfer, and partner engagement.

  7. A new measure of interpersonal exploitativeness

    Directory of Open Access Journals (Sweden)

    Amy B. Brunell

    2013-05-01

    Full Text Available Measures of exploitativeness evidence problems with validity and reliability. The present set of studies assessed a new measure (the Interpersonal Exploitativeness Scale that defines exploitativeness in terms of reciprocity. In Studies 1 and 2, 33 items were administered to participants. Exploratory and Confirmatory Factor Analysis demonstrated that a single factor consisting of six items adequately assess interpersonal exploitativeness. Study 3 results revealed that the Interpersonal Exploitativeness Scale was positively associated with normal narcissism, pathological narcissism, psychological entitlement, and negative reciprocity and negatively correlated with positive reciprocity. In Study 4, participants competed in a commons dilemma. Those who scored higher on the Interpersonal Exploitativeness Scale were more likely to harvest a greater share of resources over time, even while controlling for other relevant variables, such as entitlement. Together, these studies show the Interpersonal Exploitativeness Scale to be a valid and reliable measure of interpersonal exploitativeness. The authors discuss the implications of these studies.

  8. EXPLOITATION OF GRANITE BOULDER

    Directory of Open Access Journals (Sweden)

    Ivan Cotman

    1994-12-01

    Full Text Available The processes of forming, petrography, features, properties and exploitation of granite boulders are described. The directional drilling and black powder blasting is the succesful method in exploitation of granite boulders (boulder technology (the paper is published in Croatian.

  9. Exploiting Wireless Received Signal Strength Indicators to Detect Evil-Twin Attacks in Smart Homes

    Directory of Open Access Journals (Sweden)

    Zhanyong Tang

    2017-01-01

    Full Text Available Evil-Twin is becoming a common attack in smart home environments where an attacker can set up a fake AP to compromise the security of the connected devices. To identify the fake APs, The current approaches of detecting Evil-Twin attacks all rely on information such as SSIDs, the MAC address of the genuine AP, or network traffic patterns. However, such information can be faked by the attacker, often leading to low detection rates and weak protection. This paper presents a novel Evil-Twin attack detection method based on the received signal strength indicator (RSSI. Our approach considers the RSSI as a fingerprint of APs and uses the fingerprint of the genuine AP to identify fake ones. We provide two schemes to detect a fake AP in two different scenarios where the genuine AP can be located at either a single or multiple locations in the property, by exploiting the multipath effect of the Wi-Fi signal. As a departure from prior work, our approach does not rely on any professional measurement devices. Experimental results show that our approach can successfully detect 90% of the fake APs, at the cost of a one-off, modest connection delay.

  10. Experimental demonstration of deterministic one-way quantum computing on a NMR quantum computer

    OpenAIRE

    Ju, Chenyong; Zhu, Jing; Peng, Xinhua; Chong, Bo; Zhou, Xianyi; Du, Jiangfeng

    2008-01-01

    One-way quantum computing is an important and novel approach to quantum computation. By exploiting the existing particle-particle interactions, we report the first experimental realization of the complete process of deterministic one-way quantum Deutsch-Josza algorithm in NMR, including graph state preparation, single-qubit measurements and feed-forward corrections. The findings in our experiment may shed light on the future scalable one-way quantum computation.

  11. Exploiting similarity in turbulent shear flows for turbulence modeling

    Science.gov (United States)

    Robinson, David F.; Harris, Julius E.; Hassan, H. A.

    1992-12-01

    It is well known that current k-epsilon models cannot predict the flow over a flat plate and its wake. In an effort to address this issue and other issues associated with turbulence closure, a new approach for turbulence modeling is proposed which exploits similarities in the flow field. Thus, if we consider the flow over a flat plate and its wake, then in addition to taking advantage of the log-law region, we can exploit the fact that the flow becomes self-similar in the far wake. This latter behavior makes it possible to cast the governing equations as a set of total differential equations. Solutions of this set and comparison with measured shear stress and velocity profiles yields the desired set of model constants. Such a set is, in general, different from other sets of model constants. The rational for such an approach is that if we can correctly model the flow over a flat plate and its far wake, then we can have a better chance of predicting the behavior in between. It is to be noted that the approach does not appeal, in any way, to the decay of homogeneous turbulence. This is because the asymptotic behavior of the flow under consideration is not representative of the decay of homogeneous turbulence.

  12. Exploiting similarity in turbulent shear flows for turbulence modeling

    Science.gov (United States)

    Robinson, David F.; Harris, Julius E.; Hassan, H. A.

    1992-01-01

    It is well known that current k-epsilon models cannot predict the flow over a flat plate and its wake. In an effort to address this issue and other issues associated with turbulence closure, a new approach for turbulence modeling is proposed which exploits similarities in the flow field. Thus, if we consider the flow over a flat plate and its wake, then in addition to taking advantage of the log-law region, we can exploit the fact that the flow becomes self-similar in the far wake. This latter behavior makes it possible to cast the governing equations as a set of total differential equations. Solutions of this set and comparison with measured shear stress and velocity profiles yields the desired set of model constants. Such a set is, in general, different from other sets of model constants. The rational for such an approach is that if we can correctly model the flow over a flat plate and its far wake, then we can have a better chance of predicting the behavior in between. It is to be noted that the approach does not appeal, in any way, to the decay of homogeneous turbulence. This is because the asymptotic behavior of the flow under consideration is not representative of the decay of homogeneous turbulence.

  13. Exploiting VM/XA

    International Nuclear Information System (INIS)

    Boeheim, C.

    1990-03-01

    The Stanford Linear Accelerator Center has recently completed a conversion to IBM's VM/XA SP Release 2 operating system. The primary physics application had been constrained by the previous 16 megabyte memory limit. Work is underway to enable this application to exploit the new features of VM/XA. This paper presents a brief tutorial on how to convert an application to exploit VM/XA and discusses some of the SLAC experiences in doing so. 13 figs

  14. The economics of exploiting gas hydrates

    International Nuclear Information System (INIS)

    Döpke, Lena-Katharina; Requate, Till

    2014-01-01

    We investigate the optimal exploitation of methane hydrates, a recent discovery of methane resources under the sea floor, mainly located along the continental margins. Combustion of methane (releasing CO2) and leakage through blow-outs (releasing CH4) contribute to the accumulation of greenhouse gases. A second externality arises since removing solid gas hydrates from the sea bottom destabilizes continental margins and thus increases the risk of marine earthquakes. We show that in such a model three regimes can occur: i) resource exploitation will be stopped in finite time, and some of the resource will stay in situ, ii) the resource will be used up completely in finite time, and iii) the resource will be exhausted in infinite time. We also show how to internalize the externalities by policy instruments. - Highlights: • We set up a model of optimal has hydrate exploitation • We incorporate to types of damages: contribution to global warming and geo-hazards • We characterize optimal exploitation paths and study decentralization with an exploitation tax. • Three regimes can occur: • i) exploitation in finite time and some of the stock remaining in situ, • ii) exploitation in finite time and the resource will be exhausted, • iii) exploitation and exhaustion in infinite time

  15. A planning of exploitation to electric systems approach considering environmental criteria Description of a multicriteria optimization paradigm

    International Nuclear Information System (INIS)

    Schweickardt, Gustavo Alejandro; Gimenez Alvarez, Juan Manuel

    2012-01-01

    This work presents a context and a Model to approach the Planning of Exploitation of Electric Systems problem, in the medium term, considering environmental criteria. A decision making process from a Multicriteria Paradigm is introduced. In the past, environmental criteria just were considered or they were ignored. Due to the growing consciousness about environmental impacts of productive processes, a new orientation to the problem is required: a bigger integral quality of the planning process, instead of searching an optimal solution, based in a minimum investment cost. The Application Model considers the Total Cost of Energy Production and the Environmental Impact produced by emissions of CO 2 , SO 2 y NO x from Thermal Units, and is based in a Fuzzy Sets decision-making to represent the uncertainties in the system decision variables and satisfaction degree of solutions. The results obtained from the Traditional and Multicriteria Model, are finally presented.

  16. Exploitation in International Paid Surrogacy Arrangements

    OpenAIRE

    Wilkinson, Stephen

    2015-01-01

    Abstract Many critics have suggested that international paid surrogacy is exploitative. Taking such concerns as its starting point, this article asks: (1) how defensible is the claim that international paid surrogacy is exploitative and what could be done to make it less exploitative? (2) In the light of the answer to (1), how strong is the case for prohibiting it? Exploitation could in principle be dealt with by improving surrogates' pay and conditions. However, doing so may exacerbate probl...

  17. Experimentation on accuracy of non functional requirement prioritization approaches for different complexity projects

    OpenAIRE

    Raj Kumar Chopra; Varun Gupta; Durg Singh Chauhan

    2016-01-01

    Non functional requirements must be selected for implementation together with functional requirements to enhance the success of software projects. Three approaches exist for performing the prioritization of non functional requirements using the suitable prioritization technique. This paper performs experimentation on three different complexity versions of the industrial software project using cost-value prioritization technique employing three approaches. Experimentation is conducted to analy...

  18. Profits and Exploitation: A Reappraisal

    OpenAIRE

    Yoshihara, Naoki; Veneziani, Roberto

    2011-01-01

    This paper provides a mathematical analysis of the Marxian theory of the exploitation of labour in general equilibrium models. The two main definitions of Marxian exploitation in the literature, proposed by Morishima (1974) and Roemer (1982), respectively, are analysed in the context of general convex economies. It is shown that, contrary to the received view, in general these definitions do not preserve the so-called Fundamental Marxian Theorem (FMT), which states that the exploitation of la...

  19. Fishing elevates variability in the abundance of exploited species.

    Science.gov (United States)

    Hsieh, Chih-Hao; Reiss, Christian S; Hunter, John R; Beddington, John R; May, Robert M; Sugihara, George

    2006-10-19

    The separation of the effects of environmental variability from the impacts of fishing has been elusive, but is essential for sound fisheries management. We distinguish environmental effects from fishing effects by comparing the temporal variability of exploited versus unexploited fish stocks living in the same environments. Using the unique suite of 50-year-long larval fish surveys from the California Cooperative Oceanic Fisheries Investigations we analyse fishing as a treatment effect in a long-term ecological experiment. Here we present evidence from the marine environment that exploited species exhibit higher temporal variability in abundance than unexploited species. This remains true after accounting for life-history effects, abundance, ecological traits and phylogeny. The increased variability of exploited populations is probably caused by fishery-induced truncation of the age structure, which reduces the capacity of populations to buffer environmental events. Therefore, to avoid collapse, fisheries must be managed not only to sustain the total viable biomass but also to prevent the significant truncation of age structure. The double jeopardy of fishing to potentially deplete stock sizes and, more immediately, to amplify the peaks and valleys of population variability, calls for a precautionary management approach.

  20. Experimentation on accuracy of non functional requirement prioritization approaches for different complexity projects

    Directory of Open Access Journals (Sweden)

    Raj Kumar Chopra

    2016-09-01

    Full Text Available Non functional requirements must be selected for implementation together with functional requirements to enhance the success of software projects. Three approaches exist for performing the prioritization of non functional requirements using the suitable prioritization technique. This paper performs experimentation on three different complexity versions of the industrial software project using cost-value prioritization technique employing three approaches. Experimentation is conducted to analyze the accuracy of individual approaches and the variation of accuracy with the complexity of the software project. The results indicate that selecting non functional requirements separately, but in accordance with functionality has higher accuracy amongst the other two approaches. Further, likewise other approaches, it witnesses the decrease in accuracy with increase in software complexity but the decrease is minimal.

  1. Redefining Exploitation

    DEFF Research Database (Denmark)

    Agarwala, Rina

    2016-01-01

    This article examines how self-employed workers are organizing in the garments and waste collection industries in India. Although the question of who is profiting from self-employed workers’ labor is complex, the cases outlined in this paper highlight telling instances of how some self......-employed workers are organizing as workers. They are fighting labor exploitation by redefining the concept to include additional exploitation axes (from the state and middle class) and forms (including sexual). In doing so, they are redefining potential solutions, including identities and material benefits, to fit...... their unique needs. By expanding the category of “workers” beyond those defined by a narrow focus on a standard employer-employee relationship, these movements are also fighting exclusion from earlier labor protections by increasing the number of entitled beneficiaries. These struggles provide an important...

  2. Personal Reflections on Observational and Experimental Research Approaches to Childhood Psychopathology

    Science.gov (United States)

    Rapoport, Judith L.

    2009-01-01

    The past 50 years have seen dramatic changes in childhood psychopathology research. The goal of this overview is to contrast observational and experimental research approaches; both have grown more complex such that the boundary between these approaches may be blurred. Both are essential. Landmark observational studies with long-term follow-up…

  3. Potentially exploitable supercritical geothermal resources in the ductile crust

    Science.gov (United States)

    Watanabe, Noriaki; Numakura, Tatsuya; Sakaguchi, Kiyotoshi; Saishu, Hanae; Okamoto, Atsushi; Ingebritsen, Steven E.; Tsuchiya, Noriyoshi

    2017-01-01

    The hypothesis that the brittle–ductile transition (BDT) drastically reduces permeability implies that potentially exploitable geothermal resources (permeability >10−16 m2) consisting of supercritical water could occur only in rocks with unusually high transition temperatures such as basalt. However, tensile fracturing is possible even in ductile rocks, and some permeability–depth relations proposed for the continental crust show no drastic permeability reduction at the BDT. Here we present experimental results suggesting that the BDT is not the first-order control on rock permeability, and that potentially exploitable resources may occur in rocks with much lower BDT temperatures, such as the granitic rocks that comprise the bulk of the continental crust. We find that permeability behaviour for fractured granite samples at 350–500 °C under effective confining stress is characterized by a transition from a weakly stress-dependent and reversible behaviour to a strongly stress-dependent and irreversible behaviour at a specific, temperature-dependent effective confining stress level. This transition is induced by onset of plastic normal deformation of the fracture surface (elastic–plastic transition) and, importantly, causes no ‘jump’ in the permeability. Empirical equations for this permeability behaviour suggest that potentially exploitable resources exceeding 450 °C may form at depths of 2–6 km even in the nominally ductile crust.

  4. The neural correlates of consciousness: new experimental approaches needed?

    Science.gov (United States)

    Hohwy, Jakob

    2009-06-01

    It appears that consciousness science is progressing soundly, in particular in its search for the neural correlates of consciousness. There are two main approaches to this search, one is content-based (focusing on the contrast between conscious perception of, e.g., faces vs. houses), the other is state-based (focusing on overall conscious states, e.g., the contrast between dreamless sleep vs. the awake state). Methodological and conceptual considerations of a number of concrete studies show that both approaches are problematic: the content-based approach seems to set aside crucial aspects of consciousness; and the state-based approach seems over-inclusive in a way that is hard to rectify without losing sight of the crucial conscious-unconscious contrast. Consequently, the search for the neural correlates of consciousness is in need of new experimental paradigms.

  5. Quasi-Experimental Designs for Causal Inference

    Science.gov (United States)

    Kim, Yongnam; Steiner, Peter

    2016-01-01

    When randomized experiments are infeasible, quasi-experimental designs can be exploited to evaluate causal treatment effects. The strongest quasi-experimental designs for causal inference are regression discontinuity designs, instrumental variable designs, matching and propensity score designs, and comparative interrupted time series designs. This…

  6. Experimental damage analysis of steels after exploitation loading

    Directory of Open Access Journals (Sweden)

    B. Augustyniak

    2010-06-01

    Full Text Available Development of creep damage at elevated temperatures and structural degradation due to plastic deformation at room temperature were assessed using destructive and non-destructive methods in steels commonly applied in power plants (40HNMA, 13HMF and P91. As destructive methods the standard tension tests were carried out after every kind of prestraining. Subsequently, an evolution of the selected tension parameters was taken into account for damage identification. In order to assess a damage development during the creep and plastic deformation the tests for the steels were interrupted for a range of the selected strain magnitudes. The ultrasonic and magnetic techniques were used as the non-destructive methods for damage evaluation. The experimental programme also contained microscopic observations.

  7. Exploration, Exploitation, and Organizational Coordination Mechanisms

    Directory of Open Access Journals (Sweden)

    Silvio Popadiuk

    2016-03-01

    Full Text Available This paper presents an empirical relationship among exploration, exploitation, and organizational coordination mechanisms, classified as the centralization of decision-making, formalization, and connectedness. In order to analyze the findings of this survey, we used two techniques: Principal Component Analysis (PCA and Partial Least Squares Path Modeling (PLS-PM. Our analysis was supported by 249 answers from managers of companies located in Brazil (convenience sampling. Contrary to expectations, centralization and exploitation were negatively associated. Our data supports the research hypothesis that formalization is positively associated with exploitation. Although the relationship between formalization and exploration were significant, the result is contrary to the research hypothesis that we made. The relationships among connectedness and exploitation, and connectedness and exploration were both positive and significant. This relationship means that the more connectedness increases, the higher the likelihood of exploitation and exploration.

  8. Exploring, exploiting and evolving diversity of aquatic ecosystem models

    DEFF Research Database (Denmark)

    Janssen, Annette B G; Arhonditsis, George B.; Beusen, Arthur

    2015-01-01

    Here, we present a community perspective on how to explore, exploit and evolve the diversity in aquatic ecosystem models. These models play an important role in understanding the functioning of aquatic ecosystems, filling in observation gaps and developing effective strategies for water quality...... management. In this spirit, numerous models have been developed since the 1970s. We set off to explore model diversity by making an inventory among 42 aquatic ecosystem modellers, by categorizing the resulting set of models and by analysing them for diversity. We then focus on how to exploit model diversity...... available through open-source policies, to standardize documentation and technical implementation of models, and to compare models through ensemble modelling and interdisciplinary approaches. We end with our perspective on how the field of aquatic ecosystem modelling might develop in the next 5–10 years...

  9. Experimental approaches to heavy ion fusion

    International Nuclear Information System (INIS)

    Obayashi, H.; Fujii-e, Y.; Yamaki, T.

    1986-01-01

    As a feasibility study on heavy-ion-beam induced inertial fusion (HIF) approach, a conceptual plant design called HIBLIC-I has been worked out since 1982. The characteristic features of this design are summarized. To experimentally confirm them and prove them at least in principle, considerations are made on possible experimental programs to give substantial information on these critical phenomena. In HIBLIC-I, an accelerator complex is adopted as driver system to provide 6 beams of 208 Pb +1 ions at 15 GeV, which will be simultaneously focussed on a single shell, three layered target. The target is designed to give an energy gain of 100, so that the total beam energy of 4 MJ with 160 TW power may release 400 MJ fusion energy. A reactor chamber is cylindrical with double-walled structure made of HT-9. There are three layers of liquid Li flow inside the reactor. The innermost layer forms a Li curtain which is effective to recover the residual cavity pressure. A thick upward flow serves as coolant and tritium breeder. Tritium will be recovered by yttrium gettering system. A driver system is operated at the repetition rate of 10 Hz and supplies beams for 10 reactor chambers. Then the plant yield of fusion power becomes 4000 MWt, corresponding a net electric output of 1.5 GW. Experimental programs related to HIBLIC-I is described and discussed, including those for heavy-ion-beam experiments and proposals for lithium curtain by electron beam to clarify the key phenomena in HIBLIC-I cavity. (Nogami, K.)

  10. Human collective intelligence under dual exploration-exploitation dilemmas.

    Directory of Open Access Journals (Sweden)

    Wataru Toyokawa

    Full Text Available The exploration-exploitation dilemma is a recurrent adaptive problem for humans as well as non-human animals. Given a fixed time/energy budget, every individual faces a fundamental trade-off between exploring for better resources and exploiting known resources to optimize overall performance under uncertainty. Colonies of eusocial insects are known to solve this dilemma successfully via evolved coordination mechanisms that function at the collective level. For humans and other non-eusocial species, however, this dilemma operates within individuals as well as between individuals, because group members may be motivated to take excessive advantage of others' exploratory findings through social learning. Thus, even though social learning can reduce collective exploration costs, the emergence of disproportionate "information scroungers" may severely undermine its potential benefits. We investigated experimentally whether social learning opportunities might improve the performance of human participants working on a "multi-armed bandit" problem in groups, where they could learn about each other's past choice behaviors. Results showed that, even though information scroungers emerged frequently in groups, social learning opportunities reduced total group exploration time while increasing harvesting from better options, and consequentially improved collective performance. Surprisingly, enriching social information by allowing participants to observe others' evaluations of chosen options (e.g., Amazon's 5-star rating system in addition to choice-frequency information had a detrimental impact on performance compared to the simpler situation with only the choice-frequency information. These results indicate that humans groups can handle the fundamental "dual exploration-exploitation dilemmas" successfully, and that social learning about simple choice-frequencies can help produce collective intelligence.

  11. Synthetic biology approaches: Towards sustainable exploitation of marine bioactive molecules.

    Science.gov (United States)

    Seghal Kiran, G; Ramasamy, Pasiyappazham; Sekar, Sivasankari; Ramu, Meenatchi; Hassan, Saqib; Ninawe, A S; Selvin, Joseph

    2018-06-01

    The discovery of genes responsible for the production of bioactive metabolites via metabolic pathways combined with the advances in synthetic biology tools, has allowed the establishment of numerous microbial cell factories, for instance the yeast cell factories, for the manufacture of highly useful metabolites from renewable biomass. Genome mining and metagenomics are two platforms provide base-line data for reconstruction of genomes and metabolomes which is based in the development of synthetic/semi-synthetic genomes for marine natural products discovery. Engineered biofilms are being innovated on synthetic biology platform using genetic circuits and cell signalling systems as represillators controlling biofilm formation. Recombineering is a process of homologous recombination mediated genetic engineering, includes insertion, deletion or modification of any sequence specifically. Although this discipline considered new to the scientific domain, this field has now developed as promising endeavor on the accomplishment of sustainable exploitation of marine natural products. Copyright © 2018 Elsevier B.V. All rights reserved.

  12. Construct exploit constraint in crash analysis by bypassing canary

    Science.gov (United States)

    Huang, Ning; Huang, Shuguang; Huang, Hui; Chang, Chao

    2017-08-01

    Selective symbolic execution is a common program testing technology. Developed on the basis of it, some crash analysis systems are often used to test the fragility of the program by constructing exploit constraints, such as CRAX. From the study of crash analysis based on symbolic execution, this paper find that this technology cannot bypass the canary stack protection mechanisms. This paper makes the improvement uses the API hook in Linux. Experimental results show that the use of API hook can effectively solve the problem that crash analysis cannot bypass the canary protection.

  13. Hydrodynamic cavitation: from theory towards a new experimental approach

    Science.gov (United States)

    Lucia, Umberto; Gervino, Gianpiero

    2009-09-01

    Hydrodynamic cavitation is analysed by a global thermodynamics principle following an approach based on the maximum irreversible entropy variation that has already given promising results for open systems and has been successfully applied in specific engineering problems. In this paper we present a new phenomenological method to evaluate the conditions inducing cavitation. We think this method could be useful in the design of turbo-machineries and related technologies: it represents both an original physical approach to cavitation and an economical saving in planning because the theoretical analysis could allow engineers to reduce the experimental tests and the costs of the design process.

  14. Experimental plant for sludge composting. Plant experimental de compostaje de lodos

    Energy Technology Data Exchange (ETDEWEB)

    Cadenas, A.; Caellas, N.; Amengual, A.; Calafact, J.

    1993-01-01

    Results and expertise collected during the first year of exploitation of a compost experimental plant located in Mallorca (Spain): The plant is treating sludge from the biological treatment plant of water at the town of Felanitx and the compost produced is used in agriculture. (Author)

  15. Progress in structure recovery from low dose exposures: Mixed molecular adsorption, exploitation of symmetry and reconstruction from the minimum signal level

    Energy Technology Data Exchange (ETDEWEB)

    Kramberger, C., E-mail: Christian.Kramberger-Kaplan@univie.ac.at; Meyer, J.C., E-mail: Jannik.Meyer@univie.ac.at

    2016-11-15

    We investigate the recovery of structures from large-area, low dose exposures that distribute the dose over many identical copies of an object. The reconstruction is done via a maximum likelihood approach that does neither require to identify nor align the individual particles. We also simulate small molecular adsorbates on graphene and demonstrate the retrieval of images with atomic resolution from large area and extremely low dose raw data. Doses as low as 5 e{sup −}/Å{sup 2} are sufficient if all symmetries (translations, rotations and mirrors) of the supporting membrane are exploited to retrieve the structure of individual adsorbed molecules. We compare different optimization schemes, consider mixed molecules and adsorption sites, and requirements on the amount of data. We further demonstrate that the maximum likelihood approach is only count limited by requiring at least three independent counts per entity. Finally, we demonstrate that the approach works with real experimental data and in the presence of aberrations.

  16. Exploiting Software Tool Towards Easier Use And Higher Efficiency

    Science.gov (United States)

    Lin, G. H.; Su, J. T.; Deng, Y. Y.

    2006-08-01

    In developing countries, using data based on instrument made by themselves in maximum extent is very important. It is not only related to maximizing science returns upon prophase investment -- deep accumulations in every aspects but also science output. Based on the idea, we are exploiting a software (called THDP: Tool of Huairou Data Processing). It is used for processing a series of issues, which is met necessary in processing data. This paper discusses its designed purpose, functions, method and specialities. The primary vehicle for general data interpretation is through various techniques of data visualization, techniques of interactive. In the software, we employed Object Oriented approach. It is appropriate to the vehicle. it is imperative that the approach provide not only function, but do so in as convenient a fashion as possible. As result of the software exploiting, it is not only easier to learn data processing for beginner and more convenienter to need further improvement for senior but also increase greatly efficiency in every phrases include analyse, parameter adjusting, result display. Under frame of virtual observatory, for developing countries, we should study more and newer related technologies, which can advance ability and efficiency in science research, like the software we are developing

  17. Residual coal exploitation and its impact on sustainable development of the coal industry in China

    International Nuclear Information System (INIS)

    Zhang, Yujiang; Feng, Guorui; Zhang, Min; Ren, Hongrui; Bai, Jinwen; Guo, Yuxia; Jiang, Haina; Kang, Lixun

    2016-01-01

    Although China owns large coal reserves, it now faces the problem of depletion of its coal resources in advance. The coal-based energy mix in China will not change in the short term, and a means of delaying the coal resources depletion is therefore urgently required. The residual coal was exploited first with a lower recovery percentage and was evaluated as commercially valuable damaged coal. This approach is in comparison to past evaluations when the residual coal was allocated as exploitation losses. Coal recovery rates, the calculation method of residual coal reserves and statistics of its mines in China were given. On this basis, a discussion concerning the impacts on the delay of China's coal depletion, development of coal exploitation and sustainable developments, as well as technologies and relevant policies, were presented. It is considered that the exploitation of residual coal can effectively delay China's coal depletion, inhibit the construction of new mines, redress the imbalance between supply and demand of coal in eastern China, improve the mining area environment and guarantee social stability. The Chinese government supports the exploitation technologies of residual coal. Hence, exploiting residual coal is of considerable importance in sustainable development of the coal industry in China. - Highlights: •Pay attention to residual coal under changing energy-mix environment in China. •Estimate residual coal reserves and investigate its exploitation mines. •Discuss impacts of residual coal exploitation on delay of coal depletion in China. •Discuss impacts on coal mining industry and residual coal exploitation technology. •Give corresponding policy prescriptions.

  18. Exploiting Synergies in European Wind and Hydrogen Sectors: A Cost-benefit Assessment

    OpenAIRE

    SHAW SUZANNE; PETEVES ESTATHIOS

    2007-01-01

    This article outlines an assessment of the perspectives for exploiting synergies between European wind and hydrogen energy sectors, where wind energy conversion to hydrogen is used as a common strategy for reducing network management costs in high wind energy penetration situations, and for production of renewable hydrogen. The attractiveness of this approach, referred to here as a ¿¿wind-hydrogen strategy¿¿, is analysed using a costbenefit approach to evaluate the final impact...

  19. JPEG2000-coded image error concealment exploiting convex sets projections.

    Science.gov (United States)

    Atzori, Luigi; Ginesu, Giaime; Raccis, Alessio

    2005-04-01

    Transmission errors in JPEG2000 can be grouped into three main classes, depending on the affected area: LL, high frequencies at the lower decomposition levels, and high frequencies at the higher decomposition levels. The first type of errors are the most annoying but can be concealed exploiting the signal spatial correlation like in a number of techniques proposed in the past; the second are less annoying but more difficult to address; the latter are often imperceptible. In this paper, we address the problem of concealing the second class or errors when high bit-planes are damaged by proposing a new approach based on the theory of projections onto convex sets. Accordingly, the error effects are masked by iteratively applying two procedures: low-pass (LP) filtering in the spatial domain and restoration of the uncorrupted wavelet coefficients in the transform domain. It has been observed that a uniform LP filtering brought to some undesired side effects that negatively compensated the advantages. This problem has been overcome by applying an adaptive solution, which exploits an edge map to choose the optimal filter mask size. Simulation results demonstrated the efficiency of the proposed approach.

  20. An ethnomethodological approach to examine exploitation in the context of capacity, trust and experience of commercial surrogacy in India

    OpenAIRE

    Saravanan, Sheela

    2013-01-01

    The socio-ethical concerns regarding exploitation in commercial surrogacy are premised on asymmetric vulnerability and the commercialization of women’s reproductive capacity to suit individualistic motives. In examining the exploitation argument, this article reviews the social contract theory that describes an individual as an ‘economic man’ with moral and/or political motivations to satisfy individual desires. This study considers the critique by feminists, who argue that ...

  1. Organ sales: exploitative at any price?

    Science.gov (United States)

    Lawlor, Rob

    2014-05-01

    In many cases, claims that a transaction is exploitative will focus on the details of the transaction, such as the price paid or conditions. For example, in a claim that a worker is exploited, the grounds for the claim are usually that the pay is not sufficient or the working conditions too dangerous. In some cases, however, the claim that a transaction is exploitative is not seen to rely on these finer details. Many, for example, claim that organ sales would be exploitative, in a way that doesn't seem to depend on the details. This article considers, but ultimately rejects, a number of arguments which could be used to defend this sort of claim. © 2012 John Wiley & Sons Ltd.

  2. Personalized translational epilepsy research - Novel approaches and future perspectives: Part II: Experimental and translational approaches.

    Science.gov (United States)

    Bauer, Sebastian; van Alphen, Natascha; Becker, Albert; Chiocchetti, Andreas; Deichmann, Ralf; Deller, Thomas; Freiman, Thomas; Freitag, Christine M; Gehrig, Johannes; Hermsen, Anke M; Jedlicka, Peter; Kell, Christian; Klein, Karl Martin; Knake, Susanne; Kullmann, Dimitri M; Liebner, Stefan; Norwood, Braxton A; Omigie, Diana; Plate, Karlheinz; Reif, Andreas; Reif, Philipp S; Reiss, Yvonne; Roeper, Jochen; Ronellenfitsch, Michael W; Schorge, Stephanie; Schratt, Gerhard; Schwarzacher, Stephan W; Steinbach, Joachim P; Strzelczyk, Adam; Triesch, Jochen; Wagner, Marlies; Walker, Matthew C; von Wegner, Frederic; Rosenow, Felix

    2017-11-01

    Despite the availability of more than 15 new "antiepileptic drugs", the proportion of patients with pharmacoresistant epilepsy has remained constant at about 20-30%. Furthermore, no disease-modifying treatments shown to prevent the development of epilepsy following an initial precipitating brain injury or to reverse established epilepsy have been identified to date. This is likely in part due to the polyetiologic nature of epilepsy, which in turn requires personalized medicine approaches. Recent advances in imaging, pathology, genetics, and epigenetics have led to new pathophysiological concepts and the identification of monogenic causes of epilepsy. In the context of these advances, the First International Symposium on Personalized Translational Epilepsy Research (1st ISymPTER) was held in Frankfurt on September 8, 2016, to discuss novel approaches and future perspectives for personalized translational research. These included new developments and ideas in a range of experimental and clinical areas such as deep phenotyping, quantitative brain imaging, EEG/MEG-based analysis of network dysfunction, tissue-based translational studies, innate immunity mechanisms, microRNA as treatment targets, functional characterization of genetic variants in human cell models and rodent organotypic slice cultures, personalized treatment approaches for monogenic epilepsies, blood-brain barrier dysfunction, therapeutic focal tissue modification, computational modeling for target and biomarker identification, and cost analysis in (monogenic) disease and its treatment. This report on the meeting proceedings is aimed at stimulating much needed investments of time and resources in personalized translational epilepsy research. This Part II includes the experimental and translational approaches and a discussion of the future perspectives, while the diagnostic methods, EEG network analysis, biomarkers, and personalized treatment approaches were addressed in Part I [1]. Copyright © 2017

  3. TwitterSensing: An Event-Based Approach for Wireless Sensor Networks Optimization Exploiting Social Media in Smart City Applications.

    Science.gov (United States)

    Costa, Daniel G; Duran-Faundez, Cristian; Andrade, Daniel C; Rocha-Junior, João B; Peixoto, João Paulo Just

    2018-04-03

    Modern cities are subject to periodic or unexpected critical events, which may bring economic losses or even put people in danger. When some monitoring systems based on wireless sensor networks are deployed, sensing and transmission configurations of sensor nodes may be adjusted exploiting the relevance of the considered events, but efficient detection and classification of events of interest may be hard to achieve. In Smart City environments, several people spontaneously post information in social media about some event that is being observed and such information may be mined and processed for detection and classification of critical events. This article proposes an integrated approach to detect and classify events of interest posted in social media, notably in Twitter , and the assignment of sensing priorities to source nodes. By doing so, wireless sensor networks deployed in Smart City scenarios can be optimized for higher efficiency when monitoring areas under the influence of the detected events.

  4. TwitterSensing: An Event-Based Approach for Wireless Sensor Networks Optimization Exploiting Social Media in Smart City Applications

    Directory of Open Access Journals (Sweden)

    Daniel G. Costa

    2018-04-01

    Full Text Available Modern cities are subject to periodic or unexpected critical events, which may bring economic losses or even put people in danger. When some monitoring systems based on wireless sensor networks are deployed, sensing and transmission configurations of sensor nodes may be adjusted exploiting the relevance of the considered events, but efficient detection and classification of events of interest may be hard to achieve. In Smart City environments, several people spontaneously post information in social media about some event that is being observed and such information may be mined and processed for detection and classification of critical events. This article proposes an integrated approach to detect and classify events of interest posted in social media, notably in Twitter, and the assignment of sensing priorities to source nodes. By doing so, wireless sensor networks deployed in Smart City scenarios can be optimized for higher efficiency when monitoring areas under the influence of the detected events.

  5. Gaming the gamer? – The ethics of exploiting psychological research in video games

    NARCIS (Netherlands)

    Soraker, Johnny

    2016-01-01

    Purpose The purpose of this paper is to investigate the ethical implications of video game companies employing psychologists and using psychological research in game design. Design/methodology/approach The author first argues that exploiting psychology in video games may be more ethically

  6. Herbivory eliminates fitness costs of mutualism exploiters.

    Science.gov (United States)

    Simonsen, Anna K; Stinchcombe, John R

    2014-04-01

    A common empirical observation in mutualistic interactions is the persistence of variation in partner quality and, in particular, the persistence of exploitative phenotypes. For mutualisms between hosts and symbionts, most mutualism theory assumes that exploiters always impose fitness costs on their host. We exposed legume hosts to mutualistic (nitrogen-fixing) and exploitative (non-nitrogen-fixing) symbiotic rhizobia in field conditions, and manipulated the presence or absence of insect herbivory to determine if the costly fitness effects of exploitative rhizobia are context-dependent. Exploitative rhizobia predictably reduced host fitness when herbivores were excluded. However, insects caused greater damage on hosts associating with mutualistic rhizobia, as a consequence of feeding preferences related to leaf nitrogen content, resulting in the elimination of fitness costs imposed on hosts by exploitative rhizobia. Our experiment shows that herbivory is potentially an important factor in influencing the evolutionary dynamic between legumes and rhizobia. Partner choice and host sanctioning are theoretically predicted to stabilize mutualisms by reducing the frequency of exploitative symbionts. We argue that herbivore pressure may actually weaken selection on choice and sanction mechanisms, thus providing one explanation of why host-based discrimination mechanisms may not be completely effective in eliminating nonbeneficial partners. © 2014 The Authors. New Phytologist © 2014 New Phytologist Trust.

  7. Commutative and Non-commutative Parallelogram Geometry: an Experimental Approach

    OpenAIRE

    Bertram, Wolfgang

    2013-01-01

    By "parallelogram geometry" we mean the elementary, "commutative", geometry corresponding to vector addition, and by "trapezoid geometry" a certain "non-commutative deformation" of the former. This text presents an elementary approach via exercises using dynamical software (such as geogebra), hopefully accessible to a wide mathematical audience, from undergraduate students and high school teachers to researchers, proceeding in three steps: (1) experimental geometry, (2) algebra (linear algebr...

  8. Empirical Analysis of Exploiting Review Helpfulness for Extractive Summarization of Online Reviews

    Science.gov (United States)

    Xiong, Wenting; Litman, Diane

    2014-01-01

    We propose a novel unsupervised extractive approach for summarizing online reviews by exploiting review helpfulness ratings. In addition to using the helpfulness ratings for review-level filtering, we suggest using them as the supervision of a topic model for sentence-level content scoring. The proposed method is metadata-driven, requiring no…

  9. Dissemination and Exploitation Strategy

    DEFF Research Database (Denmark)

    Badger, Merete; Monaco, Lucio; Fransson, Torsten

    of Technology in Sweden, Politecnico di Torino in Italy, and Eindhoven University of Technology in the Netherlands. The project is partially funded by the European Commission under the 7th Framework Programme (project no. RI-283746). This report describes the final dissemination and exploitation strategy...... for project Virtual Campus Hub. A preliminary dissemination and exploitation plan was setup early in the project as described in the deliverable D6.1 Dissemination strategy paper - preliminary version. The plan has been revised on a monthly basis during the project’s lifecycle in connection with the virtual...

  10. Exploitative and Deceptive Resource Acquisition Strategies

    Directory of Open Access Journals (Sweden)

    Joshua J. Reynolds

    2015-07-01

    Full Text Available Life history strategy (LHS and life history contingencies (LHCs should theoretically influence the use of exploitative and deceptive resource acquisition strategies. However, little research has been done in this area. The purpose of the present work was to create measures of exploitative strategies and test the predictions of life history theory. Pilot studies developed and validated a behavioral measure of cheating called the Dot Game. The role of individual LHS and LHCs (manipulated via validated story primes on cheating was investigated in Study 1. Studies 2a through 2c were conducted to develop and validate a self-report measure called the Exploitative and Deceptive Resource Acquisition Strategy Scale (EDRASS. Finally, Study 3 investigated life history and EDRASS. Results indicated that while LHS influences exploitative strategies, life history contingences had little effect. Implications of these findings are discussed.

  11. Geometric saliency to characterize radar exploitation performance

    Science.gov (United States)

    Nolan, Adam; Keserich, Brad; Lingg, Andrew; Goley, Steve

    2014-06-01

    Based on the fundamental scattering mechanisms of facetized computer-aided design (CAD) models, we are able to define expected contributions (EC) to the radar signature. The net result of this analysis is the prediction of the salient aspects and contributing vehicle morphology based on the aspect. Although this approach does not provide the fidelity of an asymptotic electromagnetic (EM) simulation, it does provide very fast estimates of the unique scattering that can be consumed by a signature exploitation algorithm. The speed of this approach is particularly relevant when considering the high dimensionality of target configuration variability due to articulating parts which are computationally burdensome to predict. The key scattering phenomena considered in this work are the specular response from a single bounce interaction with surfaces and dihedral response formed between the ground plane and vehicle. Results of this analysis are demonstrated for a set of civilian target models.

  12. Exploiting selective excitation of strongly coupled modes to reduce DMGD in multi-mode transmission systems

    NARCIS (Netherlands)

    van Weerdenburg, J.J.A.; Antonio-Lopez, J.E.; Alvarado-Zacarias, J.; Molin, D.; Bigot-Astruc, M.; van Uden, R.; de Waardt, H.; Koonen, A.M.J.; Amezcua-Correa, R.; Sillard, P.; Okonkwo, C.M.

    2016-01-01

    By exploiting strong coupling in higher-order modes, we experimentally demonstrate reduced differential mode group delay by a factor of 3. Comparing LP02+LP21 with respect to LP01+LP11 3-mode transmission, a 27% reduction in equalizer length is shown after 53.4km MMF transmission.

  13. Trajectories and cycles of sexual exploitation and trafficking for sexual exploitation of women in the Peruvian Amazon

    OpenAIRE

    Mujica, Jaris

    2015-01-01

    The commercial sexual exploitation is a constant activity in the Peruvian Amazon. Around the river port of Pucallpa in ucayali region, the practice appears systematically: teenage attend taverns around the port, and those dedicated to the work of cooking camps logging, are victims of constant exploitation and many also of trafficking. this article aims to reconstruct the path of life and reproductive cycle of the forms of exploitation in a sample of 20 women, and focuses on: (i) evidence of s...

  14. What Shapes the Intention to Study Abroad? An Experimental Approach

    Science.gov (United States)

    Petzold, Knut; Moog, Petra

    2018-01-01

    In contrast to previous studies, this investigation aims to get deeper insights into the causes of the intention to study abroad by using an experimental approach. Although international experience is often considered as important, many students at German universities do not even consider abroad. Referring to the Theory of Rational Choice (RCT)…

  15. Helix Nebula and CERN: A Symbiotic approach to exploiting commercial clouds

    CERN Document Server

    Barreiro Megino, Fernando Harald; Kucharczyk, Katarzyna; Medrano Llamas, Ramón; van der Ster, Daniel

    2014-01-01

    The recent paradigm shift toward cloud computing in IT, and general interest in "Big Data" in particular, have demonstrated that the computing requirements of HEP are no longer globally unique. Indeed, the CERN IT department and LHC experiments have already made significant R&D investments in delivering and exploiting cloud computing resources. While a number of technical evaluations of interesting commercial offerings from global IT enterprises have been performed by various physics labs, further technical, security, sociological, and legal issues need to be address before their large-scale adoption by the research community can be envisaged. Helix Nebula - the Science Cloud is an initiative that explores these questions by joining the forces of three European research institutes (CERN, ESA and EMBL) with leading European commercial IT enterprises. The goals of Helix Nebula are to establish a cloud platform federating multiple commercial cloud providers, along with new business models, which can sustain ...

  16. Helix Nebula and CERN: A Symbiotic approach to exploiting commercial clouds

    CERN Multimedia

    Barreiro Megino, Fernando Harald; Kucharczyk, Katarzyna; Medrano Llamas, Ramón; van der Ster, Daniel

    2013-01-01

    The recent paradigm shift toward cloud computing in IT, and general interest in "Big Data" in particular, have demonstrated that the computing requirements of HEP are no longer globally unique. Indeed, the CERN IT department and LHC experiments have already made significant R&D; investments in delivering and exploiting cloud computing resources. While a number of technical evaluations of interesting commercial offerings from global IT enterprises have been performed by various physics labs, further technical, security, sociological, and legal issues need to be address before their large-scale adoption by the research community can be envisaged. Helix Nebula - the Science Cloud is an initiative that explores these questions by joining the forces of three European research institutes (CERN, ESA and EMBL) with leading European commercial IT enterprises. The goals of Helix Nebula are to establish a cloud platform federating multiple commercial cloud providers, along with new business models, which can sustain...

  17. The microeconomics of sexual exploitation of girls and young women in the Peruvian Amazon.

    Science.gov (United States)

    Mujica, Jaris

    2013-01-01

    This paper examines the sexual exploitation of girls and young women as an increasing phenomenon within the extractive industries of wood, oil, minerals and gas in Peruvian Amazonia. The analysis focuses on the city of Pucallpa and the northern part of the Ucayali River and aims to identify the social and economic dynamics underpinning the commercial sexual exploitation of female children and teenagers around the main river port. The study describes the local operating mechanisms of bars and restaurants in the port, the demand for and perceptions of the sexual exploitation of children and teenagers, and the economic logic that it entails. Using a discourse analytic approach, it is argued that this is a business whose profitability is tied to the trade in alcoholic beverages and foods and which responds to a set of family connections and networks.

  18. Graphene toxicity as a double-edged sword of risks and exploitable opportunities: a critical analysis of the most recent trends and developments

    Science.gov (United States)

    Volkov, Yuri; McIntyre, Jennifer; Prina-Mello, Adriele

    2017-06-01

    Increased production volumes and a broadening application spectrum of graphene have raised concerns about its potential adverse effects on human health. Numerous reports demonstrate that graphene irrespective of its particular form exerts its effects on a widest range of living organisms, including prokaryotic bacteria and viruses, plants, micro- and macro-invertebrates, mammalian and human cells and whole animals in vivo. However, the available experimental data is frequently a matter of significant divergence and even controversy. Therefore, we provide here a critical analysis of the most recent (2015-2016) reports accumulated in the graphene-related materials biocompatibility and toxicology field in order to elucidate the cutting edge achievements, emerging trends and future opportunities in the area. Experimental findings from the diverse in vitro and in vivo model systems are analysed in the context of the most likely graphene exposure scenarios, such as respiratory inhalation, ingestion route, parenteral administration and topical exposure through the skin. Key factors influencing the toxicity of graphene and its complex derivatives as well as potential risk mitigation approaches exploiting graphene physicochemical properties, surface modifications and possible degradation pathways are also discussed along with its emerging applications for healthcare, diagnostics and innovative therapeutic approaches.

  19. Recent developments in automated determinations of trace level concentrations of elements and on-line fractionations schemes exploiting the micro-sequential injection - lab-on-valve approach

    DEFF Research Database (Denmark)

    Hansen, Elo Harald; Miró, Manuel; Long, Xiangbao

    2006-01-01

    The determination of trace level concentrations of elements, such as metal species, in complex matrices by atomic absorption or emission spectrometric methods often require appropriate pretreatments comprising separation of the analyte from interfering constituents and analyte preconcentration...... are presented as based on the exploitation of micro-sequential injection (μSI-LOV) using hydrophobic as well as hydrophilic bead materials. The examples given comprise the presentation of a universal approach for SPE-assays, front-end speciation of Cr(III) and Cr(VI) in a fully automated and enclosed set...

  20. Making and exploiting fullerenes, graphene, and carbon nanotubes

    International Nuclear Information System (INIS)

    Marcaccio, Massimo; Paolucci, Francesco

    2014-01-01

    This volume contains nine chapters which are presenting critical reviews of the present and future trends in modern chemistry research. The chapter ''Solubilization of Fullerenes, Carbon Nanotubes and Graphene'' by Alain Penicaud describes the various ingenious approaches to solve the solubility issue and describes in particular how graphite, and modern nanocarbons, can be made soluble by reductive dissolution. A large part of the present volume concerns the merging of nanocarbons with nanotechnology and their impact on technical development in many areas. Fullerenes, carbon nanotubes, nanodiamond and graphene find, for instance, various applications in the development of solar cells, including dye sensitized solar cells. The chapter ''Incorporation of Balls, Tubes and Bowls in Nanotechnology'' by James Mack describes the recent development of the area of fullerene fragments, and corannulene in particular, and their direct applications to organic light emitting diode (OLED) technology, while, in the chapter ''Exploiting Nanocarbons in Dye-Sensitized Solar Cells'' by Ladislav Kavan, the exploitation of nanocarbons in the development of novel dye sensitized solar cells with improved efficiency, durability and costs is thoroughly reviewed. The functionalization of CNSs has the invaluable advantage of combining their unique properties with those of other classes of materials. Supramolecular chemistry represents an elegant alternative approach for the construction of functional systems by means of noncovalent bonding interactions. In the chapter ''Supramolecular Chemistry of Carbon Nanotubes'' by Gildas Gavrel et al., the incredibly varied world of supramolecular, non-covalent functionalization of carbon nanotubes and their applications is examined and reviewed, and the synthetic strategies devised for fabricating mechanically-linked molecular architectures are described in the chapter ''Fullerene-Stoppered Bistable Rotaxanes'' by Aurelio Mateo-Alonso, which presents an

  1. Making and exploiting fullerenes, graphene, and carbon nanotubes

    Energy Technology Data Exchange (ETDEWEB)

    Marcaccio, Massimo; Paolucci, Francesco (eds.) [Bologna Univ. (Italy). Dept. of Chemistry G. Ciamician

    2014-11-01

    This volume contains nine chapters which are presenting critical reviews of the present and future trends in modern chemistry research. The chapter ''Solubilization of Fullerenes, Carbon Nanotubes and Graphene'' by Alain Penicaud describes the various ingenious approaches to solve the solubility issue and describes in particular how graphite, and modern nanocarbons, can be made soluble by reductive dissolution. A large part of the present volume concerns the merging of nanocarbons with nanotechnology and their impact on technical development in many areas. Fullerenes, carbon nanotubes, nanodiamond and graphene find, for instance, various applications in the development of solar cells, including dye sensitized solar cells. The chapter ''Incorporation of Balls, Tubes and Bowls in Nanotechnology'' by James Mack describes the recent development of the area of fullerene fragments, and corannulene in particular, and their direct applications to organic light emitting diode (OLED) technology, while, in the chapter ''Exploiting Nanocarbons in Dye-Sensitized Solar Cells'' by Ladislav Kavan, the exploitation of nanocarbons in the development of novel dye sensitized solar cells with improved efficiency, durability and costs is thoroughly reviewed. The functionalization of CNSs has the invaluable advantage of combining their unique properties with those of other classes of materials. Supramolecular chemistry represents an elegant alternative approach for the construction of functional systems by means of noncovalent bonding interactions. In the chapter ''Supramolecular Chemistry of Carbon Nanotubes'' by Gildas Gavrel et al., the incredibly varied world of supramolecular, non-covalent functionalization of carbon nanotubes and their applications is examined and reviewed, and the synthetic strategies devised for fabricating mechanically-linked molecular architectures are described in the chapter &apos

  2. Exploitation in International Paid Surrogacy Arrangements.

    Science.gov (United States)

    Wilkinson, Stephen

    2016-05-01

    Many critics have suggested that international paid surrogacy is exploitative. Taking such concerns as its starting point, this article asks: (1) how defensible is the claim that international paid surrogacy is exploitative and what could be done to make it less exploitative? (2) In the light of the answer to (1), how strong is the case for prohibiting it? Exploitation could in principle be dealt with by improving surrogates' pay and conditions. However, doing so may exacerbate problems with consent. Foremost amongst these is the argument that surrogates from economically disadvantaged countries cannot validly consent because their background circumstances are coercive. Several versions of this argument are examined and I conclude that at least one has some merit. The article's overall conclusion is that while ethically there is something to be concerned about, paid surrogacy is in no worse a position than many other exploitative commercial transactions which take place against a backdrop of global inequality and constrained options, such as poorly-paid and dangerous construction work. Hence, there is little reason to single surrogacy out for special condemnation. On a policy level, the case for prohibiting international commercial surrogacy is weak, despite legitimate concerns about consent and background poverty.

  3. Exploitation in International Paid Surrogacy Arrangements

    Science.gov (United States)

    Wilkinson, Stephen

    2015-01-01

    Abstract Many critics have suggested that international paid surrogacy is exploitative. Taking such concerns as its starting point, this article asks: (1) how defensible is the claim that international paid surrogacy is exploitative and what could be done to make it less exploitative? (2) In the light of the answer to (1), how strong is the case for prohibiting it? Exploitation could in principle be dealt with by improving surrogates' pay and conditions. However, doing so may exacerbate problems with consent. Foremost amongst these is the argument that surrogates from economically disadvantaged countries cannot validly consent because their background circumstances are coercive. Several versions of this argument are examined and I conclude that at least one has some merit. The article's overall conclusion is that while ethically there is something to be concerned about, paid surrogacy is in no worse a position than many other exploitative commercial transactions which take place against a backdrop of global inequality and constrained options, such as poorly‐paid and dangerous construction work. Hence, there is little reason to single surrogacy out for special condemnation. On a policy level, the case for prohibiting international commercial surrogacy is weak, despite legitimate concerns about consent and background poverty. PMID:27471338

  4. Experimental demonstration of subcarrier multiplexed quantum key distribution system.

    Science.gov (United States)

    Mora, José; Ruiz-Alba, Antonio; Amaya, Waldimar; Martínez, Alfonso; García-Muñoz, Víctor; Calvo, David; Capmany, José

    2012-06-01

    We provide, to our knowledge, the first experimental demonstration of the feasibility of sending several parallel keys by exploiting the technique of subcarrier multiplexing (SCM) widely employed in microwave photonics. This approach brings several advantages such as high spectral efficiency compatible with the actual secure key rates, the sharing of the optical fainted pulse by all the quantum multiplexed channels reducing the system complexity, and the possibility of upgrading with wavelength division multiplexing in a two-tier scheme, to increase the number of parallel keys. Two independent quantum SCM channels featuring a sifted key rate of 10 Kb/s/channel over a link with quantum bit error rate <2% is reported.

  5. Flavins contained in yeast extract are exploited for anodic electron transfer by Lactococcus lactis.

    Science.gov (United States)

    Masuda, Masaki; Freguia, Stefano; Wang, Yung-Fu; Tsujimura, Seiya; Kano, Kenji

    2010-06-01

    Cyclic voltammograms of yeast extract-containing medium exhibit a clear redox peak around -0.4V vs. Ag|AgCl. Fermentative bacterium Lactococcus lactis was hereby shown to exploit this redox compound for extracellular electron transfer towards a graphite anode using glucose as an electron donor. High performance liquid chromatography revealed that this may be a flavin-type compound. The ability of L. lactis to exploit exogenous flavins for anodic glucose oxidation was confirmed by tests where flavin-type compounds were supplied to the bacterium in well defined media. Based on its mid-point potential, riboflavin can be regarded as a near-optimal mediator for microbially catalyzed anodic electron transfer. Riboflavin derivative flavin mononucleotide (FMN) was also exploited by L. lactis as a redox shuttle, unlike flavin adenine dinucleotide (FAD), possibly due to the absence of a specific transporter for the latter. The use of yeast extract in microbial fuel cell media is herein discouraged based on the related unwanted artificial addition of redox mediators which may distort experimental results. Copyright 2009 Elsevier B.V. All rights reserved.

  6. Exploitation and exploration dynamics in recessionary times

    OpenAIRE

    Walrave, B.

    2012-01-01

    Firm performance largely depends on the ability to adapt to, and exploit, changes in the business environment. That is, firms should maintain ecological fitness by reconfiguring their resource base to cope with emerging threats and explore new opportunities, while at the same time exploiting existing resources. As such, firms possessing the ability to simultaneously perform exploitative and explorative initiatives are more resilient. In this respect, the performance implications of balancing ...

  7. Large size space construction for space exploitation

    Science.gov (United States)

    Kondyurin, Alexey

    2016-07-01

    Space exploitation is impossible without large space structures. We need to make sufficient large volume of pressurized protecting frames for crew, passengers, space processing equipment, & etc. We have to be unlimited in space. Now the size and mass of space constructions are limited by possibility of a launch vehicle. It limits our future in exploitation of space by humans and in development of space industry. Large-size space construction can be made with using of the curing technology of the fibers-filled composites and a reactionable matrix applied directly in free space. For curing the fabric impregnated with a liquid matrix (prepreg) is prepared in terrestrial conditions and shipped in a container to orbit. In due time the prepreg is unfolded by inflating. After polymerization reaction, the durable construction can be fitted out with air, apparatus and life support systems. Our experimental studies of the curing processes in the simulated free space environment showed that the curing of composite in free space is possible. The large-size space construction can be developed. A project of space station, Moon base, Mars base, mining station, interplanet space ship, telecommunication station, space observatory, space factory, antenna dish, radiation shield, solar sail is proposed and overviewed. The study was supported by Humboldt Foundation, ESA (contract 17083/03/NL/SFe), NASA program of the stratospheric balloons and RFBR grants (05-08-18277, 12-08-00970 and 14-08-96011).

  8. For your first born child: an ethical defense of the exploitation argument against commercial surrogacy.

    Science.gov (United States)

    Osberg, Brendan

    2006-01-01

    In this essay I explore two arguments against commercial surrogacy, based on commodification and exploitation respectively. I adopt a consequentialist framework and argue that commodification arguments must be grounded in a resultant harm to either child or surrogate, and that a priori arguments which condemn the practice for puritanical reasons cannot form a basis for public law. Furthermore there is no overwhelming evidence of harm caused to either party involved in commercial surrogacy, and hence Canadian law (which forbids the practice) must (and can) be justified on exploitative grounds. Objections raised by Wilkinson based on an 'isolated case' approach are addressed when one takes into account the political implications of public policy. I argue that is precisely these implications that justify laws forbidding commercial surrogacy on the grounds of preventing systematic exploitation.

  9. Experimental Evaluation of Multi-Round Matrix Multiplication on MapReduce

    DEFF Research Database (Denmark)

    Ceccarello, Matteo; Silvestri, Francesco

    2015-01-01

    required by reduce functions. Then, we present an extensive study of this library on an in-house cluster and on Amazon Web Services aiming at showing its performance and at comparing monolithic and multi-round approaches. The experiments show that, even without a low level optimization, it is possible...... not be the best approach in cloud systems. Indeed, multi-round algorithms may exploit some features of cloud platforms by suitably setting the round number according to the execution context. In this paper we carry out an experimental study of multi-round MapReduce algorithms aiming at investigating...... the performance of the multi-round approach. We use matrix multiplication as a case study. We first propose a scalable Hadoop library, named M3, for matrix multiplication in the dense and sparse cases which allows to tradeoff round number with the amount of data shuffled in each round and the amount of memory...

  10. Exploitation of BEPU Approach for the Licensing Process

    International Nuclear Information System (INIS)

    D'Auria, F.; Petruzzi, A.; Muellner, A.N.; Mazzantini, O.

    2011-01-01

    Within the licensing process of the Atucha II PHWR (Pressurized Heavy Water Reactor) the BEPU (Best Estimate Plus Uncertainty) approach has been selected for issuing of the Chapter 15 on FSAR (Final Safety Analysis Report). The key steps of the entire process are basically two: a) the selection of PIE (Postulated Initiating Events) and, b) the analysis by best estimate models supported by uncertainty evaluation. The key elements of the approach are: 1) availability of qualified computational tools including suitable uncertainty method; 2) demonstration of quality; 3) acceptability and endorsement by the licensing authority. The effort of issuing Chapter 15 is terminated at the time of issuing of the present paper and the safety margins available for the operation of the concerned NPP (Nuclear Power Plant) have been quantified. (authors)

  11. Poverty-Exploitation-Alienation.

    Science.gov (United States)

    Bronfenbrenner, Martin

    1980-01-01

    Illustrates how knowledge derived from the discipline of economics can be used to help shed light on social problems such as poverty, exploitation, and alienation, and can help decision makers form policy to minimize these and similar problems. (DB)

  12. Experimental design techniques in statistical practice a practical software-based approach

    CERN Document Server

    Gardiner, W P

    1998-01-01

    Provides an introduction to the diverse subject area of experimental design, with many practical and applicable exercises to help the reader understand, present and analyse the data. The pragmatic approach offers technical training for use of designs and teaches statistical and non-statistical skills in design and analysis of project studies throughout science and industry. Provides an introduction to the diverse subject area of experimental design and includes practical and applicable exercises to help understand, present and analyse the data Offers technical training for use of designs and teaches statistical and non-statistical skills in design and analysis of project studies throughout science and industry Discusses one-factor designs and blocking designs, factorial experimental designs, Taguchi methods and response surface methods, among other topics.

  13. Experimental semiotics: a new approach for studying communication as a form of joint action.

    Science.gov (United States)

    Galantucci, Bruno

    2009-04-01

    In the last few years, researchers have begun to investigate the emergence of novel forms of human communication in the laboratory. I survey this growing line of research, which may be called experimental semiotics, from three distinct angles. First, I situate the new approach in its theoretical and historical context. Second, I review a sample of studies that exemplify experimental semiotics. Third, I present an empirical study that illustrates how the new approach can help us understand the socio-cognitive underpinnings of human communication. The main conclusion of the paper will be that, by reproducing micro samples of historical processes in the laboratory, experimental semiotics offers new powerful tools for investigating human communication as a form of joint action. Copyright © 2009 Cognitive Science Society, Inc.

  14. Empirical evidence of bias in the design of experimental stroke studies - A metaepidemiologic approach

    NARCIS (Netherlands)

    Crossley, Nicolas A.; Sena, Emily; Goehler, Jos; Horn, Jannekke; van der Worp, Bart; Bath, Philip M. W.; Macleod, Malcolm; Dirnagl, Ulrich

    2008-01-01

    Background and Purpose - At least part of the failure in the transition from experimental to clinical studies in stroke has been attributed to the imprecision introduced by problems in the design of experimental stroke studies. Using a metaepidemiologic approach, we addressed the effect of

  15. Exploiting Multiple Detections for Person Re-Identification

    Directory of Open Access Journals (Sweden)

    Amran Bhuiyan

    2018-01-01

    Full Text Available Re-identification systems aim at recognizing the same individuals in multiple cameras, and one of the most relevant problems is that the appearance of same individual varies across cameras due to illumination and viewpoint changes. This paper proposes the use of cumulative weighted brightness transfer functions (CWBTFs to model these appearance variations. Different from recently proposed methods which only consider pairs of images to learn a brightness transfer function, we exploit such a multiple-frame-based learning approach that leverages consecutive detections of each individual to transfer the appearance. We first present a CWBTF framework for the task of transforming appearance from one camera to another. We then present a re-identification framework where we segment the pedestrian images into meaningful parts and extract features from such parts, as well as from the whole body. Jointly, both of these frameworks contribute to model the appearance variations more robustly. We tested our approach on standard multi-camera surveillance datasets, showing consistent and significant improvements over existing methods on three different datasets without any other additional cost. Our approach is general and can be applied to any appearance-based method.

  16. Root Exploit Detection and Features Optimization: Mobile Device and Blockchain Based Medical Data Management.

    Science.gov (United States)

    Firdaus, Ahmad; Anuar, Nor Badrul; Razak, Mohd Faizal Ab; Hashem, Ibrahim Abaker Targio; Bachok, Syafiq; Sangaiah, Arun Kumar

    2018-05-04

    The increasing demand for Android mobile devices and blockchain has motivated malware creators to develop mobile malware to compromise the blockchain. Although the blockchain is secure, attackers have managed to gain access into the blockchain as legal users, thereby comprising important and crucial information. Examples of mobile malware include root exploit, botnets, and Trojans and root exploit is one of the most dangerous malware. It compromises the operating system kernel in order to gain root privileges which are then used by attackers to bypass the security mechanisms, to gain complete control of the operating system, to install other possible types of malware to the devices, and finally, to steal victims' private keys linked to the blockchain. For the purpose of maximizing the security of the blockchain-based medical data management (BMDM), it is crucial to investigate the novel features and approaches contained in root exploit malware. This study proposes to use the bio-inspired method of practical swarm optimization (PSO) which automatically select the exclusive features that contain the novel android debug bridge (ADB). This study also adopts boosting (adaboost, realadaboost, logitboost, and multiboost) to enhance the machine learning prediction that detects unknown root exploit, and scrutinized three categories of features including (1) system command, (2) directory path and (3) code-based. The evaluation gathered from this study suggests a marked accuracy value of 93% with Logitboost in the simulation. Logitboost also helped to predicted all the root exploit samples in our developed system, the root exploit detection system (RODS).

  17. Exploitation of the Virtual Worlds in Tourism and Tourism Education

    Directory of Open Access Journals (Sweden)

    Zejda Pavel

    2016-12-01

    Full Text Available Academics perceive a great potential of virtual worlds in various areas, including tourism and education. Efforts adapting the virtual worlds in practice are, however, still marginal. There is no clear definition of the virtual world. Therefore the author of this article attempts to provide one. The paper also focuses on the barriers of a wider exploitation of the virtual worlds and discusses the principles that might help to increase their potential in tourism area. One of the principles – gamification – favours a wider adaptation of the virtual worlds in tourism. Applying gamification principles provides visitors with some unique experiences while serving as a powerful marketing tool for institutions. The benefits of implementing tourism education activities based on cooperative principles set in an immersive environment of the virtual worlds are depicted afterwards. Finally, this paper includes successful case studies, which show advantages and drawbacks of some approaches in exploiting the virtual worlds in tourism and tourism education.

  18. Experimental Validation of a Differential Variational Inequality-Based Approach for Handling Friction and Contact in Vehicle

    Science.gov (United States)

    2015-11-20

    terrain modeled using the discrete element method (DEM). Experimental Validation of a Differential Variational Inequality -Based Approach for Handling...COVERED 00-00-2015 to 00-00-2015 4. TITLE AND SUBTITLE Experimental Validation of a Differential Variational Inequality -Based Approach for...sinkage, and single wheel tests. 1.1. Modeling Frictional Contact Via Differential Variational Inequalities Consider a three dimensional (3D) system of

  19. Radiation environmental impact assessment of copper exploitation

    International Nuclear Information System (INIS)

    Fan Guang; Wen Zhijian

    2010-01-01

    The radiation environmental impact of mineral exploitation on the surrounding environment has become a public concern. This paper presents the radiation environmental impact assessment of copper exploitation. Based on the project description and detailed investigations of surrounding environment, systematic radiation environmental impacts have been identified. The environmental impacts are assessed during both construction and operation phase. The environmental protection measures have also been proposed. The related conclusion and measures can play an active role in copper exploitation and environmental protection. (authors)

  20. The strv 1 microsatellite semes: Exploiting the geosynchronous transfer orbit

    Science.gov (United States)

    Blott, R. J.; Wells, N. S.; Eves, J.

    Following 3 successful years in orbit, the UK Defence Evaluation and Research Agency's two Space Technology Research Vehicle microsatellites (STRV) 1 a&b will be followed by a second mission. STRV 1 c&d are now in construction for a planned launch in 1999. The new mission, which includes 22 experimental payloads and developmental spacecraft bus technologies from European, US and Canadian military, civil and commercial sponsors, exploits the Geosynchronous Transfer Orbit (GTO) to offer an affordable, working space research tool for both government and industry. The STRV 1 programme objective is to promote the enhancement of military and civil space communications, remote sensing and navigation capabilities at reduced cost and risk. Additional aims are to help industry to achieve commercial benefit from investment in emerging technologies and to develop the synergy between government, commercial and civilian space applications. The paper explains how STRV 1 exploits the variable altitude and high radiation environment of GTO to investigate the performance of emerging technologies and techniques. This includes the accelerated life testing of components and materials, such as infra-red detectors, advanced microprocessors and solar cell technologies, and the prototyping of new techniques to improve communications and spacecraft autonomy. Experiments include implementing a secure version of the Consultative Committee for Space Data Systems (CCSDS) packet telecommand and telemetry standards, further development of the Internet-based Space Communication Protocol Standards (SCPS) and evaluating the exploitation of the Global Positioning System (GPS) in geosynchronous orbit. The new mission also builds on and extends the comprehensive environmental monitoring achieved by STRV 1 a&b.

  1. Exploiting heterogeneous publicly available data sources for drug safety surveillance: computational framework and case studies.

    Science.gov (United States)

    Koutkias, Vassilis G; Lillo-Le Louët, Agnès; Jaulent, Marie-Christine

    2017-02-01

    Driven by the need of pharmacovigilance centres and companies to routinely collect and review all available data about adverse drug reactions (ADRs) and adverse events of interest, we introduce and validate a computational framework exploiting dominant as well as emerging publicly available data sources for drug safety surveillance. Our approach relies on appropriate query formulation for data acquisition and subsequent filtering, transformation and joint visualization of the obtained data. We acquired data from the FDA Adverse Event Reporting System (FAERS), PubMed and Twitter. In order to assess the validity and the robustness of the approach, we elaborated on two important case studies, namely, clozapine-induced cardiomyopathy/myocarditis versus haloperidol-induced cardiomyopathy/myocarditis, and apixaban-induced cerebral hemorrhage. The analysis of the obtained data provided interesting insights (identification of potential patient and health-care professional experiences regarding ADRs in Twitter, information/arguments against an ADR existence across all sources), while illustrating the benefits (complementing data from multiple sources to strengthen/confirm evidence) and the underlying challenges (selecting search terms, data presentation) of exploiting heterogeneous information sources, thereby advocating the need for the proposed framework. This work contributes in establishing a continuous learning system for drug safety surveillance by exploiting heterogeneous publicly available data sources via appropriate support tools.

  2. A bi-population based scheme for an explicit exploration/exploitation trade-off in dynamic environments

    Science.gov (United States)

    Ben-Romdhane, Hajer; Krichen, Saoussen; Alba, Enrique

    2017-05-01

    Optimisation in changing environments is a challenging research topic since many real-world problems are inherently dynamic. Inspired by the natural evolution process, evolutionary algorithms (EAs) are among the most successful and promising approaches that have addressed dynamic optimisation problems. However, managing the exploration/exploitation trade-off in EAs is still a prevalent issue, and this is due to the difficulties associated with the control and measurement of such a behaviour. The proposal of this paper is to achieve a balance between exploration and exploitation in an explicit manner. The idea is to use two equally sized populations: the first one performs exploration while the second one is responsible for exploitation. These tasks are alternated from one generation to the next one in a regular pattern, so as to obtain a balanced search engine. Besides, we reinforce the ability of our algorithm to quickly adapt after cnhanges by means of a memory of past solutions. Such a combination aims to restrain the premature convergence, to broaden the search area, and to speed up the optimisation. We show through computational experiments, and based on a series of dynamic problems and many performance measures, that our approach improves the performance of EAs and outperforms competing algorithms.

  3. Exploiting Microwave Imaging Methods for Real-Time Monitoring of Thermal Ablation

    Directory of Open Access Journals (Sweden)

    Rosa Scapaticci

    2017-01-01

    Full Text Available Microwave thermal ablation is a cancer treatment that exploits local heating caused by a microwave electromagnetic field to induce coagulative necrosis of tumor cells. Recently, such a technique has significantly progressed in the clinical practice. However, its effectiveness would dramatically improve if paired with a noninvasive system for the real-time monitoring of the evolving dimension and shape of the thermally ablated area. In this respect, microwave imaging can be a potential candidate to monitor the overall treatment evolution in a noninvasive way, as it takes direct advantage from the dependence of the electromagnetic properties of biological tissues from temperature. This paper explores such a possibility by presenting a proof of concept validation based on accurate simulated imaging experiments, run with respect to a scenario that mimics an ex vivo experimental setup. In particular, two model-based inversion algorithms are exploited to tackle the imaging task. These methods provide independent results in real-time and their integration improves the quality of the overall tracking of the variations occurring in the target and surrounding regions.

  4. An innovative approach for planning and execution of pre-experimental runs for Design of Experiments

    Directory of Open Access Journals (Sweden)

    Muhammad Arsalan Farooq

    2016-09-01

    Full Text Available This paper addresses the study of the pre-experimental planning phase of the Design of Experiments (DoE in order to improve the final product quality. The pre-experimental planning phase includes a clear identification of the problem statement, selection of control factors and their respective levels and ranges. To improve production quality based on the DoE a new approach for the pre-experimental planning phase, called Non-Conformity Matrix (NCM, is presented. This article also addresses the key steps of the pre-experimental runs considering a consumer goods manufacturing process. Results of the application for an industrial case show that this methodology can support a clear definition of the problem and also a correct identification of the factor ranges in particular situations. The proposed new approach allows modeling the entire manufacturing system holistically and correctly defining the factor ranges and respective levels for a more effective application of DoE. This new approach can be a useful resource for both research and industrial practitioners who are dedicated to large DoE projects with unknown factor interactions, when the operational levels and ranges are not completely defined.

  5. Managing the Innovators for Exploration and Exploitation

    Directory of Open Access Journals (Sweden)

    C. Annique UN

    2007-09-01

    Full Text Available I analyze how to manage employees to achieve a balance between exploration and exploitation in large established firms. Previous studies suggest that, although firms need to undertake both exploration and exploitation simultaneously, this is difficult either because of the scarcity of resources or because of the incompatibility of these two processes. Proposed solutions have been ambidexterity, punctuated equilibrium or specialization. I suggest another method: managing employees. Specifically, I argue that using the so-called “innovative” system of human resource management practices, consisting of team-based incentive system, team-based job design, and job rotation, enables the firm to undertake exploration and exploitation simultaneously because it provides the psychological safety for people to explore new knowledge to make novel products and develops employees to have the perspective-taking capability that enables the integration of knowledge cross-functionally for efficiency. Using the so-called “traditional” system of human resource management practices, consisting of individual-based incentive system, individual-based job design, and no job rotation, has limited impact on either exploration or exploitation because it does not create the psychological safety for people to explore new knowledge and does not develop the perspective-taking capability needed for exploitation. Moreover, mixing practices from both systems is better than only using the traditional system in achieving exploration or exploitation, but less effective than only using the innovative system as the mix of practices can create inconsistent expectations on employees.

  6. Teaching psychomotor skills to beginning nursing students using a web-enhanced approach: a quasi-experimental study.

    Science.gov (United States)

    Salyers, Vincent L

    2007-01-01

    To begin to address the problem of psychomotor skills deficiencies observed in many new graduate nurses, a skills laboratory course was developed using a web-enhanced approach. In this quasi-experimental study, the control group attended weekly lectures, observed skill demonstrations by faculty, practiced skills, and were evaluated on skill performance. The experimental group learned course content using a web-enhanced approach. This allowed students to learn course material outside of class at times convenient for them, thus they had more time during class to perfect psychomotor skills. The experimental group performed better on the final cognitive examination. Students in the traditional sections were more satisfied with the course, however. It was concluded that a web-enhanced approach for teaching psychomotor skills can provide a valid alternative to traditional skills laboratory formats.

  7. Transnational gestational surrogacy: does it have to be exploitative?

    Science.gov (United States)

    Kirby, Jeffrey

    2014-01-01

    This article explores the controversial practice of transnational gestational surrogacy and poses a provocative question: Does it have to be exploitative? Various existing models of exploitation are considered and a novel exploitation-evaluation heuristic is introduced to assist in the analysis of the potentially exploitative dimensions/elements of complex health-related practices. On the basis of application of the heuristic, I conclude that transnational gestational surrogacy, as currently practiced in low-income country settings (such as rural, western India), is exploitative of surrogate women. Arising out of consideration of the heuristic's exploitation conditions, a set of public education and enabled choice, enhanced protections, and empowerment reforms to transnational gestational surrogacy practice is proposed that, if incorporated into a national regulatory framework and actualized within a low income country, could possibly render such practice nonexploitative.

  8. Design principles of a conditional futile cycle exploited for regulation.

    Science.gov (United States)

    Tolla, Dean A; Kiley, Patricia J; Lomnitz, Jason G; Savageau, Michael A

    2015-07-01

    In this report, we characterize the design principles of futile cycling in providing rapid adaptation by regulatory proteins that act as environmental sensors. In contrast to the energetically wasteful futile cycles that are avoided in metabolic pathways, here we describe a conditional futile cycle exploited for a regulatory benefit. The FNR (fumarate and nitrate reduction) cycle in Escherichia coli operates under two regimes - a strictly futile cycle in the presence of O2 and as a pathway under anoxic conditions. The computational results presented here use FNR as a model system and provide evidence that cycling of this transcription factor and its labile sensory cofactor between active and inactive states affords rapid signaling and adaptation. We modify a previously developed mechanistic model to examine a family of FNR models each with different cycling speeds but mathematically constrained to be otherwise equivalent, and we identify a trade-off between energy expenditure and response time that can be tuned by evolution to optimize cycling rate of the FNR system for a particular ecological context. Simulations mimicking experiments with proposed double mutant strains offer suggestions for experimentally testing our predictions and identifying potential fitness effects. Our approach provides a computational framework for analyzing other conditional futile cycles, which when placed in their larger biological context may be found to confer advantages to the organism.

  9. Optimizing Search and Ranking in Folksonomy Systems by Exploiting Context Information

    Science.gov (United States)

    Abel, Fabian; Henze, Nicola; Krause, Daniel

    Tagging systems enable users to annotate resources with freely chosen keywords. The evolving bunch of tag assignments is called folksonomy and there exist already some approaches that exploit folksonomies to improve resource retrieval. In this paper, we analyze and compare graph-based ranking algorithms: FolkRank and SocialPageRank. We enhance these algorithms by exploiting the context of tags, and evaluate the results on the GroupMe! dataset. In GroupMe!, users can organize and maintain arbitrary Web resources in self-defined groups. When users annotate resources in GroupMe!, this can be interpreted in context of a certain group. The grouping activity itself is easy for users to perform. However, it delivers valuable semantic information about resources and their context. We present GRank that uses the context information to improve and optimize the detection of relevant search results, and compare different strategies for ranking result lists in folksonomy systems.

  10. Exploiting synergies in European wind and hydrogen sectors: A cost-benefit assessment

    International Nuclear Information System (INIS)

    Shaw, Suzanne; Peteves, Estathios

    2008-01-01

    This article outlines an assessment of the perspectives for exploiting synergies between European wind and hydrogen energy sectors, where wind energy conversion to hydrogen is used as a common strategy for reducing network management costs in high wind energy penetration situations, and for production of renewable hydrogen. The attractiveness of this approach, referred to here as a 'wind-hydrogen strategy', is analysed using a cost-benefit approach to evaluate the final impact at the level of the end-consumer when this strategy is implemented. The analysis is conducted for four scenarios, based on different levels of: wind energy penetration in the electricity network area, hydrogen energy price, and environmental taxation on fuels. The effect of technological learning on the outcome is also analysed for the period up to 2050. The results of the analysis indicate that the relative value of the wind energy in the electricity market compared to the hydrogen market is a deciding factor in the attractiveness of the strategy; here the wind energy penetration in the network is a key consideration. Finally, in order to exploit learning effects from linking European wind and hydrogen sectors, action would need to be taken in the short term. (author)

  11. Experimental investigation of a four-qubit linear-optical quantum logic circuit.

    Science.gov (United States)

    Stárek, R; Mičuda, M; Miková, M; Straka, I; Dušek, M; Ježek, M; Fiurášek, J

    2016-09-20

    We experimentally demonstrate and characterize a four-qubit linear-optical quantum logic circuit. Our robust and versatile scheme exploits encoding of two qubits into polarization and path degrees of single photons and involves two crossed inherently stable interferometers. This approach allows us to design a complex quantum logic circuit that combines a genuine four-qubit C(3)Z gate and several two-qubit and single-qubit gates. The C(3)Z gate introduces a sign flip if and only if all four qubits are in the computational state |1〉. We verify high-fidelity performance of this central four-qubit gate using Hofmann bounds on quantum gate fidelity and Monte Carlo fidelity sampling. We also experimentally demonstrate that the quantum logic circuit can generate genuine multipartite entanglement and we certify the entanglement with the use of suitably tailored entanglement witnesses.

  12. Decision Making under Ecological Regime Shift: An Experimental Economic Approach

    OpenAIRE

    Kawata, Yukichika

    2011-01-01

    Environmental economics postulates the assumption of homo economicus and presumes that externality occurs as a result of the rational economic activities of economic agents. This paper examines this assumption using an experimental economic approach in the context of regime shift, which has been receiving increasing attention. We observe that when externality does not exist, economic agents (subjects of experimemt) act economically rationally, but when externality exists, economic agents avoi...

  13. Study of Photovoltaic Energy Storage by Supercapacitors through Both Experimental and Modelling Approaches

    Directory of Open Access Journals (Sweden)

    Pierre-Olivier Logerais

    2013-01-01

    Full Text Available The storage of photovoltaic energy by supercapacitors is studied by using two approaches. An overview on the integration of supercapacitors in solar energy conversion systems is previously provided. First, a realized experimental setup of charge/discharge of supercapacitors fed by a photovoltaic array has been operated with fine data acquisition. The second approach consists in simulating photovoltaic energy storage by supercapacitors with a faithful and accessible model composed of solar irradiance evaluation, equivalent electrical circuit for photovoltaic conversion, and a multibranch circuit for supercapacitor. Both the experimental and calculated results are confronted, and an error of 1% on the stored energy is found with a correction largely within ±10% of the transmission line capacitance according to temperature.

  14. SEXUAL EXPLOITATION AND ABUSE BY UN PEACEKEEPERS ...

    African Journals Online (AJOL)

    Allaiac

    sexual exploitation of children by peacekeepers is particularly insidious. ... sexual exploitation and abuse should involve an understanding of the social .... The charges of sexual misconduct, and the consequent media exposure, have ..... awareness programmes such as video tapes, lectures and training manuals, designed.

  15. FSH: fast spaced seed hashing exploiting adjacent hashes.

    Science.gov (United States)

    Girotto, Samuele; Comin, Matteo; Pizzi, Cinzia

    2018-01-01

    Patterns with wildcards in specified positions, namely spaced seeds , are increasingly used instead of k -mers in many bioinformatics applications that require indexing, querying and rapid similarity search, as they can provide better sensitivity. Many of these applications require to compute the hashing of each position in the input sequences with respect to the given spaced seed, or to multiple spaced seeds. While the hashing of k -mers can be rapidly computed by exploiting the large overlap between consecutive k -mers, spaced seeds hashing is usually computed from scratch for each position in the input sequence, thus resulting in slower processing. The method proposed in this paper, fast spaced-seed hashing (FSH), exploits the similarity of the hash values of spaced seeds computed at adjacent positions in the input sequence. In our experiments we compute the hash for each positions of metagenomics reads from several datasets, with respect to different spaced seeds. We also propose a generalized version of the algorithm for the simultaneous computation of multiple spaced seeds hashing. In the experiments, our algorithm can compute the hashing values of spaced seeds with a speedup, with respect to the traditional approach, between 1.6[Formula: see text] to 5.3[Formula: see text], depending on the structure of the spaced seed. Spaced seed hashing is a routine task for several bioinformatics application. FSH allows to perform this task efficiently and raise the question of whether other hashing can be exploited to further improve the speed up. This has the potential of major impact in the field, making spaced seed applications not only accurate, but also faster and more efficient. The software FSH is freely available for academic use at: https://bitbucket.org/samu661/fsh/overview.

  16. Experimental approaches for evaluating the invasion risk of biofuel crops

    International Nuclear Information System (INIS)

    Luke Flory, S; Sollenberger, Lynn E; Lorentz, Kimberly A; Gordon, Doria R

    2012-01-01

    There is growing concern that non-native plants cultivated for bioenergy production might escape and result in harmful invasions in natural areas. Literature-derived assessment tools used to evaluate invasion risk are beneficial for screening, but cannot be used to assess novel cultivars or genotypes. Experimental approaches are needed to help quantify invasion risk but protocols for such tools are lacking. We review current methods for evaluating invasion risk and make recommendations for incremental tests from small-scale experiments to widespread, controlled introductions. First, local experiments should be performed to identify conditions that are favorable for germination, survival, and growth of candidate biofuel crops. Subsequently, experimental introductions in semi-natural areas can be used to assess factors important for establishment and performance such as disturbance, founder population size, and timing of introduction across variable habitats. Finally, to fully characterize invasion risk, experimental introductions should be conducted across the expected geographic range of cultivation over multiple years. Any field-based testing should be accompanied by safeguards and monitoring for early detection of spread. Despite the costs of conducting experimental tests of invasion risk, empirical screening will greatly improve our ability to determine if the benefits of a proposed biofuel species outweigh the projected risks of invasions. (letter)

  17. Stiffness Control of Variable Serial Elastic Actuators: Energy Efficiency through Exploitation of Natural Dynamics

    Directory of Open Access Journals (Sweden)

    Philipp Beckerle

    2017-09-01

    Full Text Available Variable elastic actuators are very promising for applications in physical human–robot interaction. Besides enabling human safety, such actuators can support energy efficiency, especially if the natural behavior of the system is exploited. In this paper, the power and energy consumption of variable stiffness actuators with serial elasticity is investigated analytically and experimentally. Besides the fundamental mechanics, the influence of friction and electrical losses is discussed. A simple but effective stiffness control method is used to exploit the corresponding knowledge of natural dynamics by tuning the system to antiresonance operation. Despite nonlinear friction effects and additional electrical dynamics, the consideration of the ideal mechanical dynamics is completely sufficient for stiffness control. Simulations and experiments show that this yields a distinct reduction in power and energy consumption, which underlines the suitability of the control strategy.

  18. Vanadium supersaturated silicon system: a theoretical and experimental approach

    Science.gov (United States)

    Garcia-Hemme, Eric; García, Gregorio; Palacios, Pablo; Montero, Daniel; García-Hernansanz, Rodrigo; Gonzalez-Diaz, Germán; Wahnon, Perla

    2017-12-01

    The effect of high dose vanadium ion implantation and pulsed laser annealing on the crystal structure and sub-bandgap optical absorption features of V-supersaturated silicon samples has been studied through the combination of experimental and theoretical approaches. Interest in V-supersaturated Si focusses on its potential as a material having a new band within the Si bandgap. Rutherford backscattering spectrometry measurements and formation energies computed through quantum calculations provide evidence that V atoms are mainly located at interstitial positions. The response of sub-bandgap spectral photoconductance is extended far into the infrared region of the spectrum. Theoretical simulations (based on density functional theory and many-body perturbation in GW approximation) bring to light that, in addition to V atoms at interstitial positions, Si defects should also be taken into account in explaining the experimental profile of the spectral photoconductance. The combination of experimental and theoretical methods provides evidence that the improved spectral photoconductance up to 6.2 µm (0.2 eV) is due to new sub-bandgap transitions, for which the new band due to V atoms within the Si bandgap plays an essential role. This enables the use of V-supersaturated silicon in the third generation of photovoltaic devices.

  19. Experimental approach to explosive nucleosynthesis

    International Nuclear Information System (INIS)

    Kubono, S.

    1991-07-01

    Recent development of experimental studies on explosive nucleosynthesis, especially the rapid proton process and the primordial nucleosynthesis were discussed with a stress on unstable nuclei. New development in the experimental methods for the nuclear astrophysics is also discussed which use unstable nuclear beams. (author)

  20. Exploitation and exploration dynamics in recessionary times

    NARCIS (Netherlands)

    Walrave, B.

    2012-01-01

    Firm performance largely depends on the ability to adapt to, and exploit, changes in the business environment. That is, firms should maintain ecological fitness by reconfiguring their resource base to cope with emerging threats and explore new opportunities, while at the same time exploiting

  1. Viability of exploiting L-shell fluorescence for X-ray polarimetry

    Energy Technology Data Exchange (ETDEWEB)

    Weisskopf, M C; Elsner, R F; Ramsey, B D [National Aeronautics and Space Administration, Huntsville, AL (USA). Space Sciences Lab.; Sutherland, P G [McMaster Univ., Hamilton, Ontario (Canada). Dept. of Physics

    1985-05-15

    It has been suggested that one may build an X-ray polarimeter by exploiting the polarization dependence of the angular distribution of L-shell fluorescence photons. In this paper we examine, theoretically, the sensitivity of this approach to polarimetry. We apply our calculations to several detection schemes using imaging proportional counters that would have direct application in X-ray astronomy. We find, however, that the sensitivity of this method for measuring X-ray polarization is too low to be of use for other than laboratory applications.

  2. Exploiting the Dynamics of Soft Materials for Machine Learning.

    Science.gov (United States)

    Nakajima, Kohei; Hauser, Helmut; Li, Tao; Pfeifer, Rolf

    2018-06-01

    Soft materials are increasingly utilized for various purposes in many engineering applications. These materials have been shown to perform a number of functions that were previously difficult to implement using rigid materials. Here, we argue that the diverse dynamics generated by actuating soft materials can be effectively used for machine learning purposes. This is demonstrated using a soft silicone arm through a technique of multiplexing, which enables the rich transient dynamics of the soft materials to be fully exploited as a computational resource. The computational performance of the soft silicone arm is examined through two standard benchmark tasks. Results show that the soft arm compares well to or even outperforms conventional machine learning techniques under multiple conditions. We then demonstrate that this system can be used for the sensory time series prediction problem for the soft arm itself, which suggests its immediate applicability to a real-world machine learning problem. Our approach, on the one hand, represents a radical departure from traditional computational methods, whereas on the other hand, it fits nicely into a more general perspective of computation by way of exploiting the properties of physical materials in the real world.

  3. Self-report measure of financial exploitation of older adults.

    Science.gov (United States)

    Conrad, Kendon J; Iris, Madelyn; Ridings, John W; Langley, Kate; Wilber, Kathleen H

    2010-12-01

    this study was designed to improve the measurement of financial exploitation (FE) by testing psychometric properties of the older adult financial exploitation measure (OAFEM), a client self-report instrument. rasch item response theory and traditional validation approaches were used. Questionnaires were administered by 22 adult protective services investigators from 7 agencies in Illinois to 227 substantiated abuse clients. Analyses included tests for dimensionality, model fit, and additional construct validation. Results from the OAFEM were also compared with the substantiation decision of abuse and with investigators' assessments of FE using a staff report version. Hypotheses were generated to test hypothesized relationships. the OAFEM, including the original 79-, 54-, and 30-item measures, met stringent Rasch analysis fit and unidimensionality criteria and had high internal consistency and item reliability. The validation results were supportive, while leading to reconsideration of aspects of the hypothesized theoretical hierarchy. Thresholds were suggested to demonstrate levels of severity. the measure is now available to aid in the assessment of FE of older adults by both clinicians and researchers. Theoretical refinements developed using the empirically generated item hierarchy may help to improve assessment and intervention.

  4. A FEM-Experimental Approach for the Development of a Conceptual Linear Actuator Based on Tendril’s Free Coiling

    Directory of Open Access Journals (Sweden)

    Luca Cortese

    2017-01-01

    Full Text Available Within the vastness of the plant species, certain living systems show tendril structures whose motion is of particular interest for biomimetic engineers. Tendrils sense and coil around suitable grips, and by shortening in length, they erect the remaining plant body. To achieve contraction, tendrils rotate along their main axis and shift from a linear to a double-spring geometry. This phenomenon is denoted as the free-coiling phase. In this work, with the aim of understanding the fundamentals of the mechanics behind the free coiling, a reverse-engineering approach based on the finite element method was firstly applied. The model consisted of an elongated cylinder with suitable material properties, boundary, and loading conditions, in order to reproduce the kinematics of the tendril. The simulation succeeded in mimicking coiling faithfully and was therefore used to validate a tentative linear actuator model based on the plant’s working principle. More in detail, exploiting shape memory alloy materials to obtain large reversible deformations, the main tendril features were implemented into a nickel-titanium spring-based testing model. The results of the experimental tests confirmed the feasibility of the idea in terms of both functioning principles and actual performance. It can be concluded that the final set-up can be used as a base for a prototype design of a new kind of a linear actuator.

  5. Experimental approach to Chernobyl hot particles

    International Nuclear Information System (INIS)

    Tcherkezian, V.; Shkinev, V.; Khitrov, L.; Kolesov, G.

    1994-01-01

    An experimental approach to the investigation of Chernobyl hot particles and some results are presented in this study. Hot particles (HP) were picked out from soil samples collected during the 1986-1990 radiogeochemical expeditions in the contaminated zone (within 30 km of the Nuclear Power Plant). A number of hot particles were studied to estimate their contribution to the total activity, investigate their surface morphology and determine the size distribution. Hot particles contribution to the total activity in the 30 km zone was found to be not less than 65%. Investigation of HP element composition (by neutron activation analysis and EPMA) and radionuclide composition (direct alpha- and gamma-spectrometry, including determination of Pu and Am in Hp) revealed certain peculiarities of HP, collected in the vicinity of the damaged Nuclear Power Plant. Some particles were shown to contain uranium and fission products in proportion to one another, correlating with those in the partially burnt fuel, which proves their 'fuel' origin. Another part of the HP samples has revealed element fractionation as well as the presence of some terrestrial components. (Author)

  6. Breaking Through the Glass Ceiling: Recent Experimental Approaches to Probe the Properties of Supercooled Liquids near the Glass Transition.

    Science.gov (United States)

    Smith, R Scott; Kay, Bruce D

    2012-03-15

    Experimental measurements of the properties of supercooled liquids at temperatures near their glass transition temperatures, Tg, are requisite for understanding the behavior of glasses and amorphous solids. Unfortunately, many supercooled molecular liquids rapidly crystallize at temperatures far above their Tg, making such measurements difficult to nearly impossible. In this Perspective, we discuss some recent alternative approaches to obtain experimental data in the temperature regime near Tg. These new approaches may yield the additional experimental data necessary to test current theoretical models of the dynamical slowdown that occurs in supercooled liquids approaching the glass transition.

  7. Packaging of Sin Goods - Commitment or Exploitation?

    DEFF Research Database (Denmark)

    Nafziger, Julia

    to such self-control problems, and possibly exploit them, by offering different package sizes. In a competitive market, either one or three (small, medium and large) packages are offered. In contrast to common intuition, the large, and not the small package is a commitment device. The latter serves to exploit...

  8. Intensively exploited Mediterranean aquifers: resilience to seawater intrusion and proximity to critical thresholds

    Science.gov (United States)

    Mazi, K.; Koussis, A. D.; Destouni, G.

    2014-05-01

    We investigate seawater intrusion in three prominent Mediterranean aquifers that are subject to intensive exploitation and modified hydrologic regimes by human activities: the Nile Delta, Israel Coastal and Cyprus Akrotiri aquifers. Using a generalized analytical sharp interface model, we review the salinization history and current status of these aquifers, and quantify their resilience/vulnerability to current and future seawater intrusion forcings. We identify two different critical limits of seawater intrusion under groundwater exploitation and/or climatic stress: a limit of well intrusion, at which intruded seawater reaches key locations of groundwater pumping, and a tipping point of complete seawater intrusion up to the prevailing groundwater divide of a coastal aquifer. Either limit can be reached, and ultimately crossed, under intensive aquifer exploitation and/or climate-driven change. We show that seawater intrusion vulnerability for different aquifer cases can be directly compared in terms of normalized intrusion performance curves. The site-specific assessments show that (a) the intruding seawater currently seriously threatens the Nile Delta aquifer, (b) in the Israel Coastal aquifer the sharp interface toe approaches the well location and (c) the Cyprus Akrotiri aquifer is currently somewhat less threatened by increased seawater intrusion.

  9. Indirect evolution of social fitness inequalities and facultative social exploitation.

    Science.gov (United States)

    Nair, Ramith R; Fiegna, Francesca; Velicer, Gregory J

    2018-03-28

    Microbial genotypes with similarly high proficiency at a cooperative behaviour in genetically pure groups often exhibit fitness inequalities caused by social interaction in mixed groups. Winning competitors in this scenario have been referred to as 'cheaters' in some studies. Such interaction-specific fitness inequalities, as well as social exploitation (in which interaction between genotypes increases absolute fitness), might evolve due to selection for competitiveness at the focal behaviour or might arise non-adaptively due to pleiotropy, hitchhiking or genetic drift. The bacterium Myxococcus xanthus sporulates during cooperative development of multicellular fruiting bodies. Using M. xanthus lineages that underwent experimental evolution in allopatry without selection on sporulation, we demonstrate that interaction-specific fitness inequalities and facultative social exploitation during development readily evolved indirectly among descendant lineages. Fitness inequalities between evolved genotypes were not caused by divergence in developmental speed, as faster-developing strains were not over-represented among competition winners. In competitions between ancestors and several evolved strains, all evolved genotypes produced more spores than the ancestors, including losers of evolved-versus-evolved competitions, indicating that adaptation in non-developmental contexts pleiotropically increased competitiveness for spore production. Overall, our results suggest that fitness inequalities caused by social interaction during cooperative processes may often evolve non-adaptively in natural populations. © 2018 The Authors.

  10. Animal experimentation

    OpenAIRE

    Laz, Alak; Cholakova, Tanya Stefanova; Vrablova, Sofia; Arshad, Naverawaheed

    2016-01-01

    Animal experimentation is a crucial part of medical science. One of the ways to define it is any scientific experiment conducted for research purposes that cause any kind of pain or suffering to animals. Over the years, the new discovered drugs or treatments are first applied on animals to test their positive outcomes to be later used by humans. There is a debate about violating ethical considerations by exploiting animals for human benefits. However, different ethical theories have been made...

  11. Exploiting CRISPR/Cas: Interference Mechanisms and Applications

    Directory of Open Access Journals (Sweden)

    André Plagens

    2013-07-01

    Full Text Available The discovery of biological concepts can often provide a framework for the development of novel molecular tools, which can help us to further understand and manipulate life. One recent example is the elucidation of the prokaryotic adaptive immune system, clustered regularly interspaced short palindromic repeats (CRISPR/CRISPR-associated (Cas that protects bacteria and archaea against viruses or conjugative plasmids. The immunity is based on small RNA molecules that are incorporated into versatile multi-domain proteins or protein complexes and specifically target viral nucleic acids via base complementarity. CRISPR/Cas interference machines are utilized to develop novel genome editing tools for different organisms. Here, we will review the latest progress in the elucidation and application of prokaryotic CRISPR/Cas systems and discuss possible future approaches to exploit the potential of these interference machineries.

  12. Exploiting CRISPR/Cas: Interference Mechanisms and Applications

    Science.gov (United States)

    Richter, Hagen; Randau, Lennart; Plagens, André

    2013-01-01

    The discovery of biological concepts can often provide a framework for the development of novel molecular tools, which can help us to further understand and manipulate life. One recent example is the elucidation of the prokaryotic adaptive immune system, clustered regularly interspaced short palindromic repeats (CRISPR)/CRISPR-associated (Cas) that protects bacteria and archaea against viruses or conjugative plasmids. The immunity is based on small RNA molecules that are incorporated into versatile multi-domain proteins or protein complexes and specifically target viral nucleic acids via base complementarity. CRISPR/Cas interference machines are utilized to develop novel genome editing tools for different organisms. Here, we will review the latest progress in the elucidation and application of prokaryotic CRISPR/Cas systems and discuss possible future approaches to exploit the potential of these interference machineries. PMID:23857052

  13. A Theory of Exploitative Child Labor

    OpenAIRE

    Carol Ann Rogers; Kenneth A. Swinnerton

    2003-01-01

    Child labor laws should aim to protect children who work, instead of trying to remove children from work. In this paper, we identify an instance when the risk of exploitation lowers the expected bene…t of child labor to the child,and therefore suppresses child labor force participation. Targeted legal intervention that lowers or removes the risk of exploitation raises child participation in the labor market, child welfare, and overall societal welfare. Targeting on child labor more broadly ma...

  14. Rationalising predictors of child sexual exploitation and sex-trading.

    Science.gov (United States)

    Klatt, Thimna; Cavner, Della; Egan, Vincent

    2014-02-01

    Although there is evidence for specific risk factors leading to child sexual exploitation and prostitution, these influences overlap and have rarely been examined concurrently. The present study examined case files for 175 young persons who attended a voluntary organization in Leicester, United Kingdom, which supports people who are sexually exploited or at risk of sexual exploitation. Based on the case files, the presence or absence of known risk factors for becoming a sex worker was coded. Data were analyzed using t-test, logistic regression, and smallest space analysis. Users of the voluntary organization's services who had been sexually exploited exhibited a significantly greater number of risk factors than service users who had not been victims of sexual exploitation. The logistic regression produced a significant model fit. However, of the 14 potential predictors--many of which were associated with each other--only four variables significantly predicted actual sexual exploitation: running away, poverty, drug and/or alcohol use, and having friends or family members in prostitution. Surprisingly, running away was found to significantly decrease the odds of becoming involved in sexual exploitation. Smallest space analysis of the data revealed 5 clusters of risk factors. Two of the clusters, which reflected a desperation and need construct and immature or out-of-control lifestyles, were significantly associated with sexual exploitation. Our research suggests that some risk factors (e.g. physical and emotional abuse, early delinquency, and homelessness) for becoming involved in sexual exploitation are common but are part of the problematic milieu of the individuals affected and not directly associated with sex trading itself. Our results also indicate that it is important to engage with the families and associates of young persons at risk of becoming (or remaining) a sex worker if one wants to reduce the numbers of persons who engage in this activity. Copyright

  15. Shale gas exploitation: Status, problems and prospect

    Directory of Open Access Journals (Sweden)

    Shiqian Wang

    2018-02-01

    Full Text Available Over the past five years, great progress has been made in shale gas exploitation, which has become the most driving force for global gas output growth. Hydrocarbon extraction from shale helps drive the USA on the road to energy independence. Besides, shale oil & gas production has been kept in a sustained growth by continuous improvement in drilling efficiency and well productivity in the case of tumbling oil prices and rig counts. Shale gas reserves and production have been in a rapid growth in China owing to the Lower Paleozoic Wufeng and Longmaxi shale gas exploitation in the Sichuan Basin, which has become an important sector for the future increment of gas reserves and output in China. However, substantial progress has been made neither in non-marine shale gas exploitation as previously expected nor in the broad complicated tectonic areas in South China for which a considerable investment was made. Analysis of the basic situation and issues in domestic shale gas development shows that shale gas exploitation prospects are constrained by many problems in terms of resources endowment, horizontal well fracturing technology, etc. especially in non-marine shale deposits and complicated tectonic areas in South China where hot shales are widely distributed but geological structures are found severely deformed and over matured. Discussion on the prospects shows that the sustained and steady growth in shale gas reserves and production capacity in the coming years lies in the discovery and supersession of new shale plays in addition to Wufeng and Longmaxi shale plays, and that a technological breakthrough in ultra-high-pressure and ultra-deep (over 3500 m buried in the Sichuan Basin marine shale gas exploitation is the key and hope. Keywords: Shale gas, Exploitation, Marine facies, Hot shale, Resource endowment, Sichuan Basin, South China, Complicated tectonic area, Gas play

  16. Liquid-phase microextraction approaches combined with atomic detection: A critical review

    International Nuclear Information System (INIS)

    Pena-Pereira, Francisco; Lavilla, Isela; Bendicho, Carlos

    2010-01-01

    Liquid-phase microextraction (LPME) displays unique characteristics such as excellent preconcentration capability, simplicity, low cost, sample cleanup and integration of steps. Even though LPME approaches have the potential to be combined with almost every analytical technique, their use in combination with atomic detection techniques has not been exploited until recently. A comprehensive review dealing with the applications of liquid-phase microextraction combined with atomic detection techniques is presented. Theoretical features, possible strategies for these combinations as well as the effect of key experimental parameters influencing method development are addressed. Finally, a critical comparison of the different LPME approaches in terms of enrichment factors achieved, extraction efficiency, precision, selectivity and simplicity of operation is provided.

  17. Mobile clouds exploiting distributed resources in wireless, mobile and social networks

    CERN Document Server

    Fitzek, Frank H P

    2013-01-01

    Includes a preface written by Professor Leonard Kleinrock, Distinguished Professor of Computer Science, UCLA, USA This book discusses and explores the concept of mobile cloud, creating an inspiring research space for exploiting opportunistic resource sharing, and covering from theoretical research approaches to the development of commercially profitable ideas. A mobile cloud is a cooperative arrangement of dynamically connected communication nodes sharing opportunistic resources. In this book, authors provide a comprehensive and motivating overview of this rapidly emerging technology. The b

  18. The possibilities of exploitation of Serbian thermomineral waters

    International Nuclear Information System (INIS)

    Jovanovic, L.

    2002-01-01

    Global ecological problem of petrol resources deficit caused an intensive search of alternative energy sources. Deficit of conventional energy fluids in Yugoslavia requires serious efforts to create a program of alternative energy sources exploitation. Geothermal energy represents an important energetic source for the countries with poor energy resources. Geothermal energy can become the basis for economic development. At present these geothermal resources are not being exploited in Yugoslavia. The possibilities of effective exploitation of thermal and thermomineral water resources in Yugoslavia are presented in this paper

  19. Thermal Property Engineering: Exploiting the Properties of Ceramic Nanocomposites

    Science.gov (United States)

    2018-03-01

    ARL-TR-8308 ● MAR 2018 US Army Research Laboratory Thermal Property Engineering : Exploiting the Properties of Ceramic...return it to the originator. ARL-TR-8308 ● MAR 2018 US Army Research Laboratory Thermal Property Engineering : Exploiting the...2015 – Dec 31 2017 4. TITLE AND SUBTITLE Thermal Property Engineering : Exploiting the Properties of Ceramic Nanocomposites 5a. CONTRACT NUMBER 5b

  20. Rethinking exploitation: a process-centered account.

    Science.gov (United States)

    Jansen, Lynn A; Wall, Steven

    2013-12-01

    Exploitation has become an important topic in recent discussions of biomedical and research ethics. This is due in no small measure to the influence of Alan Wertheimer's path-breaking work on the subject. This paper presents some objections to Wertheimer's account of the concept. The objections attempt to show that his account places too much emphasis on outcome-based considerations and too little on process-based considerations. Building on these objections, the paper develops an alternative process-centered account of the concept. This alternative account of exploitation takes as its point of departure the broadly Kantian notion that it is wrong to use another as an instrument for the advancement of one's own ends. It sharpens this slippery notion and adds a number of refinements to it. The paper concludes by arguing that process-centered accounts of exploitation better illuminate the ethical challenges posed by research on human subjects than outcome-centered accounts.

  1. Towards Integrated Powertrain Control: exploiting synergy between a diesel hybrid and aftertreatment system in a distribution truck

    NARCIS (Netherlands)

    Foster, D.L.; Cloudt, R.P.M.; Willems, F.P.T.

    2008-01-01

    With the increasing demands on driveability, fuel efficiency and emissions, it becomes essential to optimize the overall performance of future powertrains. Therefore, a system approach is required. In this study, the Integrated Powertrain Control concept is presented, which exploits the synergy

  2. Towards Integrated Powertrain Control : exploiting synergy between a diesel hybrid and aftertreatment system in a distribution truck

    NARCIS (Netherlands)

    Foster, D.; Cloudt, R.P.M.; Willems, F.P.T.

    2008-01-01

    With the increasing demands on driveability, fuel efficiency and emissions, it becomes essential to optimize the overall performance of future powertrains. Therefore, a system approach is required. In this study, the Integrated Powertrain Control concept is presented, which exploits the synergy

  3. Treatment of secondary burn wound progression in contact burns-a systematic review of experimental approaches.

    Science.gov (United States)

    Schmauss, Daniel; Rezaeian, Farid; Finck, Tom; Machens, Hans-Guenther; Wettstein, Reto; Harder, Yves

    2015-01-01

    After a burn injury, superficial partial-thickness burn wounds may progress to deep partial-thickness or full-thickness burn wounds, if kept untreated. This phenomenon is called secondary burn wound progression or conversion. Burn wound depth is an important determinant of patient morbidity and mortality. Therefore, reduction or even the prevention of secondary burn wound progression is one goal of the acute care of burned patients. The objective of this study was to review preclinical approaches evaluating therapies to reduce burn wound progression. A systematic review of experimental approaches in animals that aim at reducing or preventing secondary burn wound progression was performed in accordance with the Preferred Reporting Items for Systematic Reviews and Meta Analysis (PRISMA) guidelines. The selected references consist of all the peer-reviewed studies performed in vivo in animals and review articles published in English, German, Italian, Spanish, or French language relevant to the topic of secondary burn wound progression. We searched MEDLINE, Cochrane Library, and Google Scholar including all the articles published from the beginning of notations to the present. The search was conducted between May 3, 2012 and December 26, 2013. We included 29 experimental studies in this review, investigating agents that maintain or increase local perfusion conditions, as well as agents that exhibit an anti-coagulatory, an anti-inflammatory, or an anti-apoptotic property. Warm water, simvastatin, EPO, or cerium nitrate may represent particularly promising approaches for the translation into clinical use in the near future. This review demonstrates promising experimental approaches that might reduce secondary burn wound progression. Nevertheless, a translation into clinical application needs to confirm the results compiled in experimental animal studies.

  4. Química geral experimental: uma nova abordagem didática Experimental general chemistry: a new teaching approach

    Directory of Open Access Journals (Sweden)

    Geraldo Eduardo da Luz Júnior

    2004-02-01

    Full Text Available This essay describes a new didactic approach, in according with the national curriculum guidelines for chemistry undergraduate courses in Brazil, employed during the one-semester course "Experimental General Chemistry" for chemistry undergraduate students at the Federal University of Piauí. The new approach has positively helped student's training by improving their reading skills and their understanding of scientific reports, by developing the use of electronic tools to search and to recover the required knowledge for their learning activities, and by improving their skills of understanding published texts and dealing with digital sources. At the same time the students are strongly stimulated to enter the research program for undergraduate students available at the University.

  5. Comparing Conventional Bank Credit Vis A Vis Shariah Bank Musharakah: Experimental Economic Approach

    Directory of Open Access Journals (Sweden)

    Muhamad Abduh

    2008-01-01

    Full Text Available Central Bank of Indonesia with dual banking system – i.e Shariah and Conventional Bank – keep on developing system that considered as an answer to generate the national economic growth. One of the banking activities that emphasized by the Central Bank of Indonesia is fund distribution through either conventional bank credit or shariah bank fi nancing. Having the Experimental Economic Approach based on Induced Value Theory and employing ANOVA, this paper found that shariah bank musharakah fi nancing system would come up with higher profi t opportunity compare to conventional credit system. One main reason is that musharakah fi nancing in shariah bank applies profi t and lost sharing (PLS scheme so that will not be a burden to the customer when he fi nd low profi t.Keywords: Credit Loan, Musharakah Financing, Induced Value Theory, Experimental Economic Approach, Analysis of Variance (ANOVA.

  6. Fishery Development and Exploitation in South East Australia

    Directory of Open Access Journals (Sweden)

    Camilla Novaglio

    2018-04-01

    Full Text Available Understanding the full extent of past ecological changes in human-influenced marine systems is needed to inform present management policies, but is often hampered by the scarcity of information about exploitation practices and population status over the entire history of fishing. The history of commercial fishing in South East Australia is relatively recent and thus easier to document. Our aim is to reconstruct such history and to use this information to understand general patterns and consequences of fishing exploitation. Intense exploitation of marine resources arrived in South East Australia with European colonization in the early 1800s, and unregulated sealing, whaling and oyster dredging resulted in the first documented significant impact on local marine populations. Exploitation extended to demersal resources in 1915 when the trawl fishery developed. Between the early 1800s and the 1980s, some of the exploited stocks collapsed, but fishing moved further offshore and in deeper waters as technology improved and new resources became available or were discovered. This phase of fisheries expansion masked the unsustainable nature of some fishing industries, such as trawling and whaling, and postponed the need for management regulations. From the 1990s onward, an increasing awareness of the depleted nature of some fisheries led to the establishment of management strategies aiming at a more sustainable exploitation of target stocks and, from the mid-2000s onwards, management strategies were revised and improved to better address the effect of fishing on multiple components of marine ecosystems. This led to the recovery of some depleted populations and to increased habitat protection. The relatively short history of fishing exploitation and the small scale of the fishing industry in South East Australia played a significant role in limiting the magnitude of fishing impacts on local populations and helped to achieve recoveries when fisheries

  7. Financial decision-making abilities and financial exploitation in older African Americans: Preliminary validity evidence for the Lichtenberg Financial Decision Rating Scale (LFDRS).

    Science.gov (United States)

    Lichtenberg, Peter A; Ficker, Lisa J; Rahman-Filipiak, Annalise

    2016-01-01

    This study examines preliminary evidence for the Lichtenberg Financial Decision Rating Scale (LFDRS), a new person-centered approach to assessing capacity to make financial decisions, and its relationship to self-reported cases of financial exploitation in 69 older African Americans. More than one third of individuals reporting financial exploitation also had questionable decisional abilities. Overall, decisional ability score and current decision total were significantly associated with cognitive screening test and financial ability scores, demonstrating good criterion validity. Study findings suggest that impaired decisional abilities may render older adults more vulnerable to financial exploitation, and that the LFDRS is a valid tool.

  8. From Exploitation to Industry: Definitions, Risks, and Consequences of Domestic Sexual Exploitation and Sex Work Among Women and Girls.

    Science.gov (United States)

    Gerassi, Lara

    In the last 15 years, terms such as prostitution, sex trafficking, sexual exploitation, modern-day slavery, and sex work have elicited much confusion and debate as to their definitions. Consequently several challenges have emerged for both law enforcement in the prosecution of criminals and practitioners in service provision. This article reviews the state of the literature with regard to domestic, sexual exploitation among women and girls in the United States and seeks to (1) provide definitions and describe the complexity of all terms relating to domestic sexual exploitation of women and girls in the United States, (2) explore available national prevalence data according to the definitions provided, and (3) review the evidence of mental health, social, and structural risk factors at the micro-, mezzo-, and macrolevels.

  9. Managing the exploitation life of the mining machinery for an unlimited duration of time

    Directory of Open Access Journals (Sweden)

    Vujić Slobodan

    2011-01-01

    Full Text Available The problem of determining the optimum exploitation life of machinery, namely, the optimum time for machinery and equipment replacement, represents a complex and highly responsible engineering task. Taking into consideration the situation prevailing at coal pit mines in Serbia, the tasks of this rank are very complex and difficult. To make a decision on the replacement of capital equipment and machinery, such as bucket wheel excavators within the mentioned systems, implies a management task of utmost responsibility. It requires high professional and analytical knowledge as well as reliable arguments, based on a multidisciplinary professional approach. In this paper, the authors present their views on the problem of establishing the optimum exploitation life of bucket wheel excavators, offering an algorithm, based on dynamic programming, as a solution.

  10. The ESA Geohazard Exploitation Platform

    Science.gov (United States)

    Bally, Philippe; Laur, Henri; Mathieu, Pierre-Philippe; Pinto, Salvatore

    2015-04-01

    Earthquakes represent one of the world's most significant hazards in terms both of loss of life and damages. In the first decade of the 21st century, earthquakes accounted for 60 percent of fatalities from natural disasters, according to the United Nations International Strategy for Disaster Reduction (UNISDR). To support mitigation activities designed to assess and reduce risks and improve response in emergency situations, satellite EO can be used to provide a broad range of geo-information services. This includes for instance crustal block boundary mapping to better characterize active faults, strain rate mapping to assess how rapidly faults are deforming, soil vulnerability mapping to help estimate how the soil is behaving in reaction to seismic phenomena, geo-information to assess the extent and intensity of the earthquake impact on man-made structures and formulate assumptions on the evolution of the seismic sequence, i.e. where local aftershocks or future main shocks (on nearby faults) are most likely to occur. In May 2012, the European Space Agency and the GEO Secretariat convened the International Forum on Satellite EO for Geohazards now known as the Santorini Conference. The event was the continuation of a series of international workshops such as those organized by the Geohazards Theme of the Integrated Global Observing Strategy Partnership. In Santorini the seismic community has set out a vision of the EO contribution to an operational global seismic risk program, which lead to the Geohazard Supersites and Natural Laboratories (GSNL) initiative. The initial contribution of ESA to suuport the GSNL was the first Supersites Exploitation Platform (SSEP) system in the framework of Grid Processing On Demand (GPOD), now followed by the Geohazard Exploitation Platform (GEP). In this presentation, we will describe the contribution of the GEP for exploiting satellite EO for geohazard risk assessment. It is supporting the GEO Supersites and has been further

  11. Increasing the power of accelerated molecular dynamics methods and plans to exploit the coming exascale

    Science.gov (United States)

    Voter, Arthur

    Many important materials processes take place on time scales that far exceed the roughly one microsecond accessible to molecular dynamics simulation. Typically, this long-time evolution is characterized by a succession of thermally activated infrequent events involving defects in the material. In the accelerated molecular dynamics (AMD) methodology, known characteristics of infrequent-event systems are exploited to make reactive events take place more frequently, in a dynamically correct way. For certain processes, this approach has been remarkably successful, offering a view of complex dynamical evolution on time scales of microseconds, milliseconds, and sometimes beyond. We have recently made advances in all three of the basic AMD methods (hyperdynamics, parallel replica dynamics, and temperature accelerated dynamics (TAD)), exploiting both algorithmic advances and novel parallelization approaches. I will describe these advances, present some examples of our latest results, and discuss what should be possible when exascale computing arrives in roughly five years. Funded by the U.S. Department of Energy, Office of Basic Energy Sciences, Materials Sciences and Engineering Division, and by the Los Alamos Laboratory Directed Research and Development program.

  12. Olive pomace based lightweight concrete, an experimental approach and contribution

    Directory of Open Access Journals (Sweden)

    Lynda Amel Chaabane

    2018-01-01

    Full Text Available Due to conventional aggregates resources depletion, material recycling has become an economic and ecologic alternative. In this paper, locally available natural residues such as olive pomace were investigated, when partially incorporated in the concrete formulation, since the mechanical characteristics of lightweight aggregate concrete strongly depend on its properties and proportions. Lightweight aggregates are more deformable than the cement matrix because of their high porosity, and their influence on the concrete strength remains complex. The purpose of this paper is to investigate the aggregates properties on lightweight concrete mechanical behaviour through an experimental approach. In addition, the different substitution sequences and the W/C ratio on lightweight concrete behaviour were evaluated, in order to determine the W/C ratio influence on the improvement of the lightweight concrete mechanical properties while knowing that the mixing water quantity gives the cement paste manoeuvrability and mechanical strength effects. The last part of this paper, therefore, was to provide statistical survey for estimating strength and weight reduction through the different natural aggregate substitutions to improve the lightweight concrete properties. The results achieved in a significant olive-pomace lower adhesion with the matrix after the cement setting, making the lightweight concrete mechanical strength weak. However, this work can open several perspectives: Results modeling and correlation with an experimental approach, the evolution and determination of lightweight concrete characteristics when exposed to high temperatures and thermohydric properties.

  13. Oil exploitation and the environmental Kuznets curve

    International Nuclear Information System (INIS)

    Esmaeili, Abdoulkarim; Abdollahzadeh, Negar

    2009-01-01

    This study refers to a panel estimation of an environmental Kuznets curve (EKC) for oil to determine the factors most affecting oil exploitation in 38 oil-producing countries during 1990-2000. Control variables such as oil reserves, oil price, population, political rights, and the Gini index were used to determine its contribution to the main EKC model. The empirical results fully support the existence of an EKC for oil exploitation. Furthermore, the result indicates that the proved oil reserves has a significant and positive role in oil production, but oil price and population do not significantly affect crude oil production. Also, increased freedoms and a better income distribution will reduce the rate of oil exploitation. Thus, policies aiming at enhancing democratic society and better income distribution would be more compatible with sustainability. (author)

  14. Oil exploitation and the environmental Kuznets curve

    Energy Technology Data Exchange (ETDEWEB)

    Esmaeili, Abdoulkarim; Abdollahzadeh, Negar [Department of Agricultural Economics, College of Agriculture, Shiraz University, Shiraz, Fars (Iran)

    2009-01-15

    This study refers to a panel estimation of an environmental Kuznets curve (EKC) for oil to determine the factors most affecting oil exploitation in 38 oil-producing countries during 1990-2000. Control variables such as oil reserves, oil price, population, political rights, and the Gini index were used to determine its contribution to the main EKC model. The empirical results fully support the existence of an EKC for oil exploitation. Furthermore, the result indicates that the proved oil reserves has a significant and positive role in oil production, but oil price and population do not significantly affect crude oil production. Also, increased freedoms and a better income distribution will reduce the rate of oil exploitation. Thus, policies aiming at enhancing democratic society and better income distribution would be more compatible with sustainability. (author)

  15. Human-Assisted Machine Information Exploitation: a crowdsourced investigation of information-based problem solving

    Science.gov (United States)

    Kase, Sue E.; Vanni, Michelle; Caylor, Justine; Hoye, Jeff

    2017-05-01

    The Human-Assisted Machine Information Exploitation (HAMIE) investigation utilizes large-scale online data collection for developing models of information-based problem solving (IBPS) behavior in a simulated time-critical operational environment. These types of environments are characteristic of intelligence workflow processes conducted during human-geo-political unrest situations when the ability to make the best decision at the right time ensures strategic overmatch. The project takes a systems approach to Human Information Interaction (HII) by harnessing the expertise of crowds to model the interaction of the information consumer and the information required to solve a problem at different levels of system restrictiveness and decisional guidance. The design variables derived from Decision Support Systems (DSS) research represent the experimental conditions in this online single-player against-the-clock game where the player, acting in the role of an intelligence analyst, is tasked with a Commander's Critical Information Requirement (CCIR) in an information overload scenario. The player performs a sequence of three information processing tasks (annotation, relation identification, and link diagram formation) with the assistance of `HAMIE the robot' who offers varying levels of information understanding dependent on question complexity. We provide preliminary results from a pilot study conducted with Amazon Mechanical Turk (AMT) participants on the Volunteer Science scientific research platform.

  16. Experimental approach towards shell structure at 100Sn and 78Ni

    International Nuclear Information System (INIS)

    Grawe, H.; Gorska, M.; Fahlander, C.

    2000-07-01

    The status of experimental approach to 100 Sn and 78 Ni is reviewed. Revised single particle energies for neutrons are deduced for the N=Z=50 shell closure and evidence for low lying I π =2 + and 3 - states is presented. Moderate E2 polarisation charges of 0.1 e and 0.6 e are found to reproduce the experimental data when core excitation of 100 Sn is properly accounted for in the shell model. For the neutron rich Ni region no conclusive evidence for a N=40 subshell is found, whereas firm evidence for the persistence of the N=50 shell at 78 Ni is inferred from the existence of seniority isomers. The disappearance of this isomerism in the mid νg 9/2 shell is discussed. (orig.)

  17. Experimental approaches for the development of gamma spectroscopy well logging system

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Jehyun; Hwang, Seho; Kim, Jongman [Korea Institute of Geoscience and Mineral Resources (124 Gwahang-no, Yuseong-gu, Daejeon, Korea) (Korea, Republic of); Won, Byeongho [Heesong Geotek Co., Ltd (146-8 Sangdaewon-dong, Jungwon-gu, Seongnam-si, Gyeonggi-do, Korea) (Korea, Republic of)

    2015-03-10

    This article discusses experimental approaches for the development of gamma spectroscopy well logging system. Considering the size of borehole sonde, we customize 2 x 2 inches inorganic scintillators and the system including high voltage, preamplifier, amplifier and multichannel analyzer (MCA). The calibration chart is made by test using standard radioactive sources so that the measured count rates are expressed by energy spectrum. Optimum high-voltage supplies and the measurement parameters of each detector are set up by experimental investigation. Also, the responses of scintillation detectors have been examined by analysis according to the distance between source and detector. Because gamma spectroscopy well logging needs broad spectrum, high sensitivity and resolution, the energy resolution and sensitivity as a function of gamma ray energy are investigated by analyzing the gamma ray activities of the radioactive sources.

  18. Child trafficking and commercial sexual exploitation: a review of promising prevention policies and programs.

    Science.gov (United States)

    Rafferty, Yvonne

    2013-10-01

    Child trafficking, including commercial sexual exploitation (CSE), is one of the fastest growing and most lucrative criminal activities in the world. The global enslavement of children affects countless numbers of victims who are trafficked within their home countries or transported away from their homes and treated as commodities to be bought, sold, and resold for labor or sexual exploitation. All over the world, girls are particularly likely to be trafficked into the sex trade: Girls and women constitute 98% of those who are trafficked for CSE. Health and safety standards in exploitative settings are generally extremely low, and the degree of experienced violence has been linked with adverse physical, psychological, and social-emotional development. The human-rights-based approach to child trafficking provides a comprehensive conceptual framework whereby victim-focused and law enforcement responses can be developed, implemented, and evaluated. This article highlights promising policies and programs designed to prevent child trafficking and CSE by combating demand for sex with children, reducing supply, and strengthening communities. The literature reviewed includes academic publications as well as international and governmental and nongovernmental reports. Implications for social policy and future research are presented. © 2013 American Orthopsychiatric Association.

  19. Exploiting Novel Radiation-Induced Electromagnetic Material Changes for Remote Detection and Monitoring: Final Progress Report

    Science.gov (United States)

    2016-04-01

    Exploiting Novel Radiation -Induced Electromagnetic Material Changes for Remote Detection and Monitoring: Final Progress Report Distribution...assess the effects of ionizing radiation on at least three classes of electromagnetic materials. The proposed approach for radiation detection was...that was desired to be monitored remotely. Microwave or low millimeter wave electromagnetic radiation would be used to interrogate the device

  20. From Exploitation to Industry: Definitions, Risks, and Consequences of Domestic Sexual Exploitation and Sex Work Among Women and Girls

    Science.gov (United States)

    Gerassi, Lara

    2015-01-01

    In the last 15 years, terms such as prostitution, sex trafficking, sexual exploitation, modern-day slavery, and sex work have elicited much confusion and debate as to their definitions. Consequently several challenges have emerged for both law enforcement in the prosecution of criminals and practitioners in service provision. This article reviews the state of the literature with regard to domestic, sexual exploitation among women and girls in the United States and seeks to (1) provide definitions and describe the complexity of all terms relating to domestic sexual exploitation of women and girls in the United States, (2) explore available national prevalence data according to the definitions provided, and (3) review the evidence of mental health, social, and structural risk factors at the micro-, mezzo-, and macrolevels. PMID:26726289

  1. Improving Anomaly Detection for Text-Based Protocols by Exploiting Message Structures

    Directory of Open Access Journals (Sweden)

    Christian M. Mueller

    2010-12-01

    Full Text Available Service platforms using text-based protocols need to be protected against attacks. Machine-learning algorithms with pattern matching can be used to detect even previously unknown attacks. In this paper, we present an extension to known Support Vector Machine (SVM based anomaly detection algorithms for the Session Initiation Protocol (SIP. Our contribution is to extend the amount of different features used for classification (feature space by exploiting the structure of SIP messages, which reduces the false positive rate. Additionally, we show how combining our approach with attribute reduction significantly improves throughput.

  2. Conservational Exploitation as a Sustainable Development Strategy for a Small Township: The Example of Waipu District in Taichung, Taiwan

    Directory of Open Access Journals (Sweden)

    Li-Wei Liu

    Full Text Available ABSTRACT: The contemporary form of urban-rural interfaces is moving toward a more hybridized identity, since nowadays ambiguous places prevail. In particular, contemporary rural settlements are increasingly exhibiting urban characteristics in terms of their built environments. Many traditional agricultural landscapes in the world have thus been altered due to rapid urbanization, such that in order to maintain environmental diversity, the conservation of agricultural landscapes and their functions has become an important issue. Waipu District is located in the northwest of Taichung, a peri-urban area of Taichung City. This means that Waipu is rural in appearance at present but may undergo rapid urbanization in the near future. In order to protect quality local characteristics from land exploitation and move towards sustainable development, this paper depicts a strategy of conservational exploitation which is adopted to direct the future development of Waipu so as to maintain its characteristics and environmental sustainability. This paper also briefly documents the process of an experimental practice through which graduate students with landscape architecture, recreation, and urban planning backgrounds have taken part in an experimental project with professional social services in order to develop master plans for Waipu. By means of field surveys, interviews with local people, and discussions with local officials, a landscape master plan, a tourism plan, and a spatial plan developed by the students have been provided to the Waipu District Office. These plans are intended to help Waipu to develop its unique characteristics, improve local landscapes, and promote local economic development. In order to conserve rural landscapes, cultural landscaping and cultural tourism have been identified as development concepts for future development. Conservational exploitation which focuses on maintaining cultural landscapes and promoting cultural tourism can

  3. Early Sexual Exploitation as an Influence in Prostitution.

    Science.gov (United States)

    Silbert, Mimi H.; Pines, Ayala M.

    1983-01-01

    Surveyed 200 female street prostitutes to determine whether they were sexually exploited during childhood. Results showed 60 percent of the subjects were sexually exploited. The few girls who discussed their abuse with others were met with shame and most often inaction. Only 10 percent were abused by strangers. (JAC)

  4. Exploring Interacting Quantum Many-Body Systems by Experimentally Creating Continuous Matrix Product States in Superconducting Circuits

    Directory of Open Access Journals (Sweden)

    C. Eichler

    2015-12-01

    Full Text Available Improving the understanding of strongly correlated quantum many-body systems such as gases of interacting atoms or electrons is one of the most important challenges in modern condensed matter physics, materials research, and chemistry. Enormous progress has been made in the past decades in developing both classical and quantum approaches to calculate, simulate, and experimentally probe the properties of such systems. In this work, we use a combination of classical and quantum methods to experimentally explore the properties of an interacting quantum gas by creating experimental realizations of continuous matrix product states—a class of states that has proven extremely powerful as a variational ansatz for numerical simulations. By systematically preparing and probing these states using a circuit quantum electrodynamics system, we experimentally determine a good approximation to the ground-state wave function of the Lieb-Liniger Hamiltonian, which describes an interacting Bose gas in one dimension. Since the simulated Hamiltonian is encoded in the measurement observable rather than the controlled quantum system, this approach has the potential to apply to a variety of models including those involving multicomponent interacting fields. Our findings also hint at the possibility of experimentally exploring general properties of matrix product states and entanglement theory. The scheme presented here is applicable to a broad range of systems exploiting strong and tunable light-matter interactions.

  5. Dissemination and Exploitation: Project Goals beyond Science

    Science.gov (United States)

    Hamann, Kristin; Reitz, Anja

    2017-04-01

    Dissemination and Exploitation are essential parts of public funded projects. In Horizon 2020 a plan for the exploitation and dissemination of results (PEDR) is a requirement. The plan should contain a clear vision on the objectives of the project in relation to actions for dissemination and potential exploitation of the project results. The actions follow the basic idea to spread the knowledge and results gathered within the project and face the challenge of how to bring the results into potentially relevant policy circle and how they impact the market. The plan follows the purpose to assess the impact of the project and to address various target groups who are interested in the project results. Simply put, dissemination concentrates on the transfer of knowledge and exploitation on the commercialization of the project. Beyond the question of the measurability of project`s impact, strategies within science marketing can serve purposes beyond internal and external communication. Accordingly, project managers are facing the challenge to implement a dissemination and exploitation strategy that ideally supports the identification of all partners with the project and matches the current discourse of the project`s content within the society, politics and economy. A consolidated plan might unite all projects partners under a central idea and supports the identification with the project beyond the individual research questions. Which applications, strategies and methods can be used to bring forward a PEDR that accompanies a project successfully and allows a comprehensive assessment of the project afterwards? Which hurdles might project managers experience in the dissemination process and which tasks should be fulfilled by the project manager?

  6. Enhanced aeroelastic energy harvesting by exploiting combined nonlinearities: theory and experiment

    International Nuclear Information System (INIS)

    Sousa, V C; De M Anicézio, M; De Marqui Jr, C; Erturk, A

    2011-01-01

    Converting aeroelastic vibrations into electricity for low power generation has received growing attention over the past few years. In addition to potential applications for aerospace structures, the goal is to develop alternative and scalable configurations for wind energy harvesting to use in wireless electronic systems. This paper presents modeling and experiments of aeroelastic energy harvesting using piezoelectric transduction with a focus on exploiting combined nonlinearities. An airfoil with plunge and pitch degrees of freedom (DOF) is investigated. Piezoelectric coupling is introduced to the plunge DOF while nonlinearities are introduced through the pitch DOF. A state-space model is presented and employed for the simulations of the piezoaeroelastic generator. A two-state approximation to Theodorsen aerodynamics is used in order to determine the unsteady aerodynamic loads. Three case studies are presented. First the interaction between piezoelectric power generation and linear aeroelastic behavior of a typical section is investigated for a set of resistive loads. Model predictions are compared to experimental data obtained from the wind tunnel tests at the flutter boundary. In the second case study, free play nonlinearity is added to the pitch DOF and it is shown that nonlinear limit-cycle oscillations can be obtained not only above but also below the linear flutter speed. The experimental results are successfully predicted by the model simulations. Finally, the combination of cubic hardening stiffness and free play nonlinearities is considered in the pitch DOF. The nonlinear piezoaeroelastic response is investigated for different values of the nonlinear-to-linear stiffness ratio. The free play nonlinearity reduces the cut-in speed while the hardening stiffness helps in obtaining persistent oscillations of acceptable amplitude over a wider range of airflow speeds. Such nonlinearities can be introduced to aeroelastic energy harvesters (exploiting

  7. When death approaches: reverting or exploiting emergent inequity in a complex land-use table-board game

    Directory of Open Access Journals (Sweden)

    Luís García-Barrios

    2015-06-01

    Full Text Available The lives of poor landowners in tropical mountains depend upon their collective capacity to create and coordinate social preferences derived from their interacting communalistic, hierarchical, and reciprocal exchanges. External actors currently contend for these territories under market rules that are modifying such preferences. We present the design, experimental implementation, and analysis of results of a four-player, land-use board game with stark resource and livelihood limits and coordination/cooperation challenges, as played (separately by 116 farmers and 108 academics, mainly in the tropical mountains of Chiapas, Mexico. In game session one, we trained and framed players in moral economy, a human core feeling and communalistic norm of solidarity and mutual obligation, which translates into "all players must survive." In session two, we explored to what extent moral economy resisted as a social preference under a hypothetical external monetary incentive scheme unfavorable to it. Using an approach that combines spot game analysis and experimental work, we studied the social preferences that emerged during session two among advantaged and disadvantaged players to deal with inequity in land appropriation and use when imminent "death" approaches. We make comparisons between farmers and academics. Players evolved moral economy, competitive domination, i.e., let competition decide, and coalition, i.e., advantaged players ask the dying to surrender land and die prematurely in exchange for a share of the dismal profits. Farmers basically stuck to the first two preferences in similar proportions whereas academics clearly shifted to coalition, a last-resort choice, which allowed disadvantaged players some final leverage and advantaged players use of liberated resources to improve efficiency. Coalition as strategic cooperation among the unequal is part of the culture in which academics are being educated as sustainability professionals and toward

  8. [Ecotourism exploitation model in Bita Lake Natural Reserve of Yunnan].

    Science.gov (United States)

    Yang, G; Wang, Y; Zhong, L

    2000-12-01

    Bita lake provincial natural reserve is located in Shangri-La region of North-western Yunnan, and was set as a demonstrating area for ecotourism exploitation in 1998. After a year's exploitation construction and half a year's operation as a branch of the 99' Kunming International Horticulture Exposition to accept tourists, it was proved that the ecotourism demonstrating area attained four integrated functions of ecotourism, i.e., tourism, protection, poverty clearing and environment education. Five exploitation and management models including function zoned exploitation model, featured tourism communication model signs system designing model, local Tibetan family reception model and environmental monitoring model, were also successful, which were demonstrated and spreaded to the whole province. Bita lake provincial natural reserve could be a good sample for the ecotourism exploitation natural reserves of the whole country.

  9. Graphene-based absorber exploiting guided mode resonances in one-dimensional gratings.

    Science.gov (United States)

    Grande, M; Vincenti, M A; Stomeo, T; Bianco, G V; de Ceglia, D; Aközbek, N; Petruzzelli, V; Bruno, G; De Vittorio, M; Scalora, M; D'Orazio, A

    2014-12-15

    A one-dimensional dielectric grating, based on a simple geometry, is proposed and investigated to enhance light absorption in a monolayer graphene exploiting guided mode resonances. Numerical findings reveal that the optimized configuration is able to absorb up to 60% of the impinging light at normal incidence for both TE and TM polarizations resulting in a theoretical enhancement factor of about 26 with respect to the monolayer graphene absorption (≈2.3%). Experimental results confirm this behavior showing CVD graphene absorbance peaks up to about 40% over narrow bands of a few nanometers. The simple and flexible design points to a way to realize innovative, scalable and easy-to-fabricate graphene-based optical absorbers.

  10. Exploitation program of ''Adamow'' quarry up to 2015

    International Nuclear Information System (INIS)

    Hadlaw, A.

    1994-01-01

    The brown coal deposits exploited by the quarry ''Adamow'' located in Central Poland are shortly described and the prognosis of their exploitation up to 2015 is given. The basis data on the perspective deposits in the quarry's area are also presented. All deposits are shown on the map. 3 ills, 2 tabs

  11. zero day exploits and national readiness for cyber-warfare

    African Journals Online (AJOL)

    HOD

    A zero day vulnerability is an unknown exploit that divulges security flaws in software before such a flaw is publicly ... Keywords: exploits, zero day, vulnerability, cyberspace, cyber-warfare. 1. ..... industries and companies across the globe. The.

  12. Energy requirements during sponge cake baking: Experimental and simulated approach

    International Nuclear Information System (INIS)

    Ureta, M. Micaela; Goñi, Sandro M.; Salvadori, Viviana O.; Olivera, Daniela F.

    2017-01-01

    Highlights: • Sponge cake energy consumption during baking was studied. • High oven temperature and forced convection mode favours oven energy savings. • Forced convection produced higher weight loss thus a higher product energy demand. • Product energy demand was satisfactorily estimated by the baking model applied. • The greatest energy efficiency corresponded to the forced convection mode. - Abstract: Baking is a high energy demanding process, which requires special attention in order to know and improve its efficiency. In this work, energy consumption associated to sponge cake baking is investigated. A wide range of operative conditions (two ovens, three convection modes, three oven temperatures) were compared. Experimental oven energy consumption was estimated taking into account the heating resistances power and a usage factor. Product energy demand was estimated from both experimental and modeling approaches considering sensible and latent heat. Oven energy consumption results showed that high oven temperature and forced convection mode favours energy savings. Regarding product energy demand, forced convection produced faster and higher weight loss inducing a higher energy demand. Besides, this parameter was satisfactorily estimated by the baking model applied, with an average error between experimental and simulated values in a range of 8.0–10.1%. Finally, the energy efficiency results indicated that it increased linearly with the effective oven temperature and that the greatest efficiency corresponded to the forced convection mode.

  13. Simultaneously Exploiting Two Formulations: an Exact Benders Decomposition Approach

    DEFF Research Database (Denmark)

    Lusby, Richard Martin; Gamst, Mette; Spoorendonk, Simon

    When modelling a given problem using linear programming techniques several possibilities often exist, and each results in a different mathematical formulation of the problem. Usually, advantages and disadvantages can be identified in any single formulation. In this paper we consider mixed integer...... to the standard branch-and-price approach from the literature, the method shows promising performance and appears to be an attractive alternative....

  14. Exploiting natural killer group 2D receptors for CAR T-cell therapy.

    Science.gov (United States)

    Demoulin, Benjamin; Cook, W James; Murad, Joana; Graber, David J; Sentman, Marie-Louise; Lonez, Caroline; Gilham, David E; Sentman, Charles L; Agaugue, Sophie

    2017-08-01

    Chimeric antigen receptors (CARs) are genetically engineered proteins that combine an extracellular antigen-specific recognition domain with one or several intracellular T-cell signaling domains. When expressed in T cells, these CARs specifically trigger T-cell activation upon antigen recognition. While the clinical proof of principle of CAR T-cell therapy has been established in hematological cancers, CAR T cells are only at the early stages of being explored to tackle solid cancers. This special report discusses the concept of exploiting natural killer cell receptors as an approach that could broaden the specificity of CAR T cells and potentially enhance the efficacy of this therapy against solid tumors. New data demonstrating feasibility of this approach in humans and supporting the ongoing clinical trial are also presented.

  15. On the viability of exploiting L-shell fluorescence for X-ray polarimetry

    Energy Technology Data Exchange (ETDEWEB)

    Weisskopf, M C; Elsner, R F; Ramsey, B D; Sutherland, P G

    1985-05-15

    It has been suggested that one may build an X-ray polarimeter by exploiting the polarization dependence of the angular distribution of L-shell fluorescence photons. In this paper we examine, theoretically, the sensitivity of this approach to polarimetry. We apply our calculations to several detection schemes using imaging proportional counters that would have direct application in X-ray astronomy. We find, however, that the sensitivity of this method for measuring X-ray polarization is too low to be of use for other than laboratory applications. (orig.).

  16. From Exploitation to Industry: Definitions, Risks, and Consequences of Domestic Sexual Exploitation and Sex Work Among Women and Girls

    OpenAIRE

    Gerassi, Lara

    2015-01-01

    In the last 15 years, terms such as prostitution, sex trafficking, sexual exploitation, modern-day slavery, and sex work have elicited much confusion and debate as to their definitions. Consequently several challenges have emerged for both law enforcement in the prosecution of criminals and practitioners in service provision. This article reviews the state of the literature with regard to domestic, sexual exploitation among women and girls in the United States and seeks to (1) provide definit...

  17. Experimental Approach to Teaching Fluids

    Science.gov (United States)

    Stern, Catalina

    2015-11-01

    For the last 15 years we have promoted experimental work even in the theoretical courses. Fluids appear in the Physics curriculum of the National University of Mexico in two courses: Collective Phenomena in their sophomore year and Continuum Mechanics in their senior year. In both, students are asked for a final project. Surprisingly, at least 85% choose an experimental subject even though this means working extra hours every week. Some of the experiments were shown in this congress two years ago. This time we present some new results and the methodology we use in the classroom. I acknowledge support from the Physics Department, Facultad de Ciencias, UNAM.

  18. Multi-objective experimental design for (13)C-based metabolic flux analysis.

    Science.gov (United States)

    Bouvin, Jeroen; Cajot, Simon; D'Huys, Pieter-Jan; Ampofo-Asiama, Jerry; Anné, Jozef; Van Impe, Jan; Geeraerd, Annemie; Bernaerts, Kristel

    2015-10-01

    (13)C-based metabolic flux analysis is an excellent technique to resolve fluxes in the central carbon metabolism but costs can be significant when using specialized tracers. This work presents a framework for cost-effective design of (13)C-tracer experiments, illustrated on two different networks. Linear and non-linear optimal input mixtures are computed for networks for Streptomyces lividans and a carcinoma cell line. If only glucose tracers are considered as labeled substrate for a carcinoma cell line or S. lividans, the best parameter estimation accuracy is obtained by mixtures containing high amounts of 1,2-(13)C2 glucose combined with uniformly labeled glucose. Experimental designs are evaluated based on a linear (D-criterion) and non-linear approach (S-criterion). Both approaches generate almost the same input mixture, however, the linear approach is favored due to its low computational effort. The high amount of 1,2-(13)C2 glucose in the optimal designs coincides with a high experimental cost, which is further enhanced when labeling is introduced in glutamine and aspartate tracers. Multi-objective optimization gives the possibility to assess experimental quality and cost at the same time and can reveal excellent compromise experiments. For example, the combination of 100% 1,2-(13)C2 glucose with 100% position one labeled glutamine and the combination of 100% 1,2-(13)C2 glucose with 100% uniformly labeled glutamine perform equally well for the carcinoma cell line, but the first mixture offers a decrease in cost of $ 120 per ml-scale cell culture experiment. We demonstrated the validity of a multi-objective linear approach to perform optimal experimental designs for the non-linear problem of (13)C-metabolic flux analysis. Tools and a workflow are provided to perform multi-objective design. The effortless calculation of the D-criterion can be exploited to perform high-throughput screening of possible (13)C-tracers, while the illustrated benefit of multi

  19. Differences in the metabolic rates of exploited and unexploited fish populations: a signature of recreational fisheries induced evolution?

    Directory of Open Access Journals (Sweden)

    Jan-Michael Hessenauer

    Full Text Available Non-random mortality associated with commercial and recreational fisheries have the potential to cause evolutionary changes in fish populations. Inland recreational fisheries offer unique opportunities for the study of fisheries induced evolution due to the ability to replicate study systems, limited gene flow among populations, and the existence of unexploited reference populations. Experimental research has demonstrated that angling vulnerability is heritable in Largemouth Bass Micropterus salmoides, and is correlated with elevated resting metabolic rates (RMR and higher fitness. However, whether such differences are present in wild populations is unclear. This study sought to quantify differences in RMR among replicated exploited and unexploited populations of Largemouth Bass. We collected age-0 Largemouth Bass from two Connecticut drinking water reservoirs unexploited by anglers for almost a century, and two exploited lakes, then transported and reared them in the same pond. Field RMR of individuals from each population was quantified using intermittent-flow respirometry. Individuals from unexploited reservoirs had a significantly higher mean RMR (6% than individuals from exploited populations. These findings are consistent with expectations derived from artificial selection by angling on Largemouth Bass, suggesting that recreational angling may act as an evolutionary force influencing the metabolic rates of fishes in the wild. Reduced RMR as a result of fisheries induced evolution may have ecosystem level effects on energy demand, and be common in exploited recreational populations globally.

  20. Teotihuacan, tepeapulco, and obsidian exploitation.

    Science.gov (United States)

    Charlton, T H

    1978-06-16

    Current cultural ecological models of the development of civilization in central Mexico emphasize the role of subsistence production techniques and organization. The recent use of established and productive archeological surface survey techniques along natural corridors of communication between favorable niches for cultural development within the Central Mexican symbiotic region resulted in the location of sites that indicate an early development of a decentralized resource exploitation, manufacturing, and exchange network. The association of the development of this system with Teotihuacán indicates the importance such nonsubsistence production and exchange had in the evolution of this first central Mexican civilization. The later expansion of Teotihuacán into more distant areas of Mesoamerica was based on this resource exploitation model. Later civilizations centered at Tula and Tenochtitlán also used such a model in their expansion.

  1. A hybrid computational-experimental approach for automated crystal structure solution

    Science.gov (United States)

    Meredig, Bryce; Wolverton, C.

    2013-02-01

    Crystal structure solution from diffraction experiments is one of the most fundamental tasks in materials science, chemistry, physics and geology. Unfortunately, numerous factors render this process labour intensive and error prone. Experimental conditions, such as high pressure or structural metastability, often complicate characterization. Furthermore, many materials of great modern interest, such as batteries and hydrogen storage media, contain light elements such as Li and H that only weakly scatter X-rays. Finally, structural refinements generally require significant human input and intuition, as they rely on good initial guesses for the target structure. To address these many challenges, we demonstrate a new hybrid approach, first-principles-assisted structure solution (FPASS), which combines experimental diffraction data, statistical symmetry information and first-principles-based algorithmic optimization to automatically solve crystal structures. We demonstrate the broad utility of FPASS to clarify four important crystal structure debates: the hydrogen storage candidates MgNH and NH3BH3; Li2O2, relevant to Li-air batteries; and high-pressure silane, SiH4.

  2. Radiation-hardened optically reconfigurable gate array exploiting holographic memory characteristics

    Science.gov (United States)

    Seto, Daisaku; Watanabe, Minoru

    2015-09-01

    In this paper, we present a proposal for a radiation-hardened optically reconfigurable gate array (ORGA). The ORGA is a type of field programmable gate array (FPGA). The ORGA configuration can be executed by the exploitation of holographic memory characteristics even if 20% of the configuration data are damaged. Moreover, the optoelectronic technology enables the high-speed reconfiguration of the programmable gate array. Such a high-speed reconfiguration can increase the radiation tolerance of its programmable gate array to 9.3 × 104 times higher than that of current FPGAs. Through experimentation, this study clarified the configuration dependability using the impulse-noise emulation and high-speed configuration capabilities of the ORGA with corrupt configuration contexts. Moreover, the radiation tolerance of the programmable gate array was confirmed theoretically through probabilistic calculation.

  3. Applications of a formal approach to decipher discrete genetic networks.

    Science.gov (United States)

    Corblin, Fabien; Fanchon, Eric; Trilling, Laurent

    2010-07-20

    A growing demand for tools to assist the building and analysis of biological networks exists in systems biology. We argue that the use of a formal approach is relevant and applicable to address questions raised by biologists about such networks. The behaviour of these systems being complex, it is essential to exploit efficiently every bit of experimental information. In our approach, both the evolution rules and the partial knowledge about the structure and the behaviour of the network are formalized using a common constraint-based language. In this article our formal and declarative approach is applied to three biological applications. The software environment that we developed allows to specifically address each application through a new class of biologically relevant queries. We show that we can describe easily and in a formal manner the partial knowledge about a genetic network. Moreover we show that this environment, based on a constraint algorithmic approach, offers a wide variety of functionalities, going beyond simple simulations, such as proof of consistency, model revision, prediction of properties, search for minimal models relatively to specified criteria. The formal approach proposed here deeply changes the way to proceed in the exploration of genetic and biochemical networks, first by avoiding the usual trial-and-error procedure, and second by placing the emphasis on sets of solutions, rather than a single solution arbitrarily chosen among many others. Last, the constraint approach promotes an integration of model and experimental data in a single framework.

  4. Aspects économiques de l'exploitation des resources halieutiques ...

    African Journals Online (AJOL)

    Aspects économiques de l'exploitation des resources halieutiques des petits barrages du Nord de la Côte d' lvoire : Economic aspects of the exploitation of halieutic resources of petits barrages inland waters in the north of Côte d'lvoire.

  5. JET ITER-like wall—overview and experimental programme

    International Nuclear Information System (INIS)

    Matthews, G F; Beurskens, M; Loving, A; Kear, M; Mayoral, M-L; Prior, P; Riccardo, V; Watkins, M L; Brezinsek, S; Groth, M; Joffrin, E; Villedieu, E; Neu, R; Rimini, F; Sips, G; Rubel, M; De Vries, P

    2011-01-01

    This paper reports the successful installation of the JET ITER-like wall and the realization of its technical objectives. It also presents an overview of the planned experimental programme which has been optimized to exploit the new wall and other JET enhancements in 2011/12.

  6. A Statistical Approach for Selecting Buildings for Experimental Measurement of HVAC Needs

    Directory of Open Access Journals (Sweden)

    Malinowski Paweł

    2017-03-01

    Full Text Available This article presents a statistical methodology for selecting representative buildings for experimentally evaluating the performance of HVAC systems, especially in terms of energy consumption. The proposed approach is based on the k-means method. The algorithm for this method is conceptually simple, allowing it to be easily implemented. The method can be applied to large quantities of data with unknown distributions. The method was tested using numerical experiments to determine the hourly, daily, and yearly heat values and the domestic hot water demands of residential buildings in Poland. Due to its simplicity, the proposed approach is very promising for use in engineering applications and is applicable to testing the performance of many HVAC systems.

  7. Information source exploitation/exploration and NPD decision-making

    DEFF Research Database (Denmark)

    Jespersen, Kristina Risom

    different Scandinavian companies. Data was analyzed using hierarchical regression models across decision criteria dimensions and NPD stages as well as analyzing the combination of selected information sources. Rather than forwarding one optimal search behavior for the entire NPD process, we find optimal...... information search behavior at either end of the exploitation/exploration continuum. Additionally, we find that overexploitation and overexploration is caused by managerial bias. This creates managerial misbehavior at gate decision-points of the NPD process.......The purpose of this study is to examine how the exploration/exploitation continuum is applied by decision-makers in new product gate decision-making. Specifically, we analyze at gate decision-points how the evaluation of a new product project is affected by the information source exploitation...

  8. Data Curation for the Exploitation of Large Earth Observation Products Databases - The MEA system

    Science.gov (United States)

    Mantovani, Simone; Natali, Stefano; Barboni, Damiano; Cavicchi, Mario; Della Vecchia, Andrea

    2014-05-01

    National Space Agencies under the umbrella of the European Space Agency are performing a strong activity to handle and provide solutions to Big Data and related knowledge (metadata, software tools and services) management and exploitation. The continuously increasing amount of long-term and of historic data in EO facilities in the form of online datasets and archives, the incoming satellite observation platforms that will generate an impressive amount of new data and the new EU approach on the data distribution policy make necessary to address technologies for the long-term management of these data sets, including their consolidation, preservation, distribution, continuation and curation across multiple missions. The management of long EO data time series of continuing or historic missions - with more than 20 years of data available already today - requires technical solutions and technologies which differ considerably from the ones exploited by existing systems. Several tools, both open source and commercial, are already providing technologies to handle data and metadata preparation, access and visualization via OGC standard interfaces. This study aims at describing the Multi-sensor Evolution Analysis (MEA) system and the Data Curation concept as approached and implemented within the ASIM and EarthServer projects, funded by the European Space Agency and the European Commission, respectively.

  9. Shale Gas Exploration and Exploitation Induced Risks - SHEER

    Science.gov (United States)

    Capuano, Paolo; Orlecka-Sikora, Beata; Lasocki, Stanislaw; Cesca, Simone; Gunning, Andrew; jaroslawsky, Janusz; Garcia-Aristizabal, Alexander; Westwood, Rachel; Gasparini, Paolo

    2017-04-01

    Shale gas operations may affect the quality of air, water and landscapes; furthermore, it can induce seismic activity, with the possible impacts on the surrounding infrastructure. The SHEER project aims at setting up a probabilistic methodology to assess and mitigate the short and the long term environmental risks connected to the exploration and exploitation of shale gas. In particular we are investigating risks associated with groundwater contamination, air pollution and induced seismicity. A shale gas test site located in Poland (Wysin) has been monitored before, during and after the fracking operations with the aim of assessing environmental risks connected with groundwater contamination, air pollution and earthquakes induced by fracking and injection of waste water. The severity of each of these hazards depends strongly on the unexpected enhanced permeability pattern, which may develop as an unwanted by-product of the fracking processes and may become pathway for gas and fluid migration towards underground water reservoirs or the surface. The project is devoted to monitor and understand how far this enhanced permeability pattern develops both in space and time. The considered hazards may be at least partially inter-related as they all depend on this enhanced permeability pattern. Therefore they are being approached from a multi-hazard, multi parameter perspective. We expect to develop methodologies and procedures to track and model fracture evolution around shale gas exploitation sites and a robust statistically based, multi-parameter methodology to assess environmental impacts and risks across the operational lifecycle of shale gas. The developed methodologies are going to be applied and tested on a comprehensive database consisting of seismicity, changes of the quality of ground-waters and air, ground deformations, and operational data collected from the ongoing monitoring episode (Wysin) and past episodes: Lubocino (Poland), Preese Hall (UK), Oklahoma (USA

  10. SSC-EKE: Semi-Supervised Classification with Extensive Knowledge Exploitation.

    Science.gov (United States)

    Qian, Pengjiang; Xi, Chen; Xu, Min; Jiang, Yizhang; Su, Kuan-Hao; Wang, Shitong; Muzic, Raymond F

    2018-01-01

    We introduce a new, semi-supervised classification method that extensively exploits knowledge. The method has three steps. First, the manifold regularization mechanism, adapted from the Laplacian support vector machine (LapSVM), is adopted to mine the manifold structure embedded in all training data, especially in numerous label-unknown data. Meanwhile, by converting the labels into pairwise constraints, the pairwise constraint regularization formula (PCRF) is designed to compensate for the few but valuable labelled data. Second, by further combining the PCRF with the manifold regularization, the precise manifold and pairwise constraint jointly regularized formula (MPCJRF) is achieved. Third, by incorporating the MPCJRF into the framework of the conventional SVM, our approach, referred to as semi-supervised classification with extensive knowledge exploitation (SSC-EKE), is developed. The significance of our research is fourfold: 1) The MPCJRF is an underlying adjustment, with respect to the pairwise constraints, to the graph Laplacian enlisted for approximating the potential data manifold. This type of adjustment plays the correction role, as an unbiased estimation of the data manifold is difficult to obtain, whereas the pairwise constraints, converted from the given labels, have an overall high confidence level. 2) By transforming the values of the two terms in the MPCJRF such that they have the same range, with a trade-off factor varying within the invariant interval [0, 1), the appropriate impact of the pairwise constraints to the graph Laplacian can be self-adaptively determined. 3) The implication regarding extensive knowledge exploitation is embodied in SSC-EKE. That is, the labelled examples are used not only to control the empirical risk but also to constitute the MPCJRF. Moreover, all data, both labelled and unlabelled, are recruited for the model smoothness and manifold regularization. 4) The complete framework of SSC-EKE organically incorporates multiple

  11. A New Two-Step Approach for Hands-On Teaching of Gene Technology: Effects on Students' Activities During Experimentation in an Outreach Gene Technology Lab

    Science.gov (United States)

    Scharfenberg, Franz-Josef; Bogner, Franz X.

    2011-08-01

    Emphasis on improving higher level biology education continues. A new two-step approach to the experimental phases within an outreach gene technology lab, derived from cognitive load theory, is presented. We compared our approach using a quasi-experimental design with the conventional one-step mode. The difference consisted of additional focused discussions combined with students writing down their ideas (step one) prior to starting any experimental procedure (step two). We monitored students' activities during the experimental phases by continuously videotaping 20 work groups within each approach ( N = 131). Subsequent classification of students' activities yielded 10 categories (with well-fitting intra- and inter-observer scores with respect to reliability). Based on the students' individual time budgets, we evaluated students' roles during experimentation from their prevalent activities (by independently using two cluster analysis methods). Independently of the approach, two common clusters emerged, which we labeled as `all-rounders' and as `passive students', and two clusters specific to each approach: `observers' as well as `high-experimenters' were identified only within the one-step approach whereas under the two-step conditions `managers' and `scribes' were identified. Potential changes in group-leadership style during experimentation are discussed, and conclusions for optimizing science teaching are drawn.

  12. Television production, Funding Models and Exploitation of Content

    Directory of Open Access Journals (Sweden)

    Gillian Doyle

    2016-07-01

    Full Text Available The rise of digital platforms has transformative implications for strategies of financing media production and for exploitation of the economic value in creative content. In the television industry, changes in technologies for distribution and the emergence of SVOD services such as Netflix are gradually shifting audiences and financial power away from broadcasters while at the same time creating unprecedented opportunities for programme-makers.  Drawing on findings from recent RCUK-funded research, this article examines how these shifts are affecting production financing and the economics of supplying television content.  In particular, it focuses on how changes in the dynamics of rights markets and in strategic approaches towards the financing of television production might mean for markets, industries and for policies intended to support the economic sustainability of independent television content production businesses.

  13. Exploiting of the Compression Methods for Reconstruction of the Antenna Far-Field Using Only Amplitude Near-Field Measurements

    Directory of Open Access Journals (Sweden)

    J. Puskely

    2010-06-01

    Full Text Available The novel approach exploits the principle of the conventional two-plane amplitude measurements for the reconstruction of the unknown electric field distribution on the antenna aperture. The method combines a global optimization with a compression method. The global optimization method (GO is used to minimize the functional, and the compression method is used to reduce the number of unknown variables. The algorithm employs the Real Coded Genetic Algorithm (RCGA as the global optimization approach. The Discrete Cosine Transform (DCT and the Discrete Wavelet Transform (DWT are applied to reduce the number of unknown variables. Pros and cons of methods are investigated and reported for the solution of the problem. In order to make the algorithm faster, exploitation of amplitudes from a single scanning plane is also discussed. First, the algorithm is used to obtain an initial estimate. Subsequently, the common Fourier iterative algorithm is used to reach global minima with sufficient accuracy. The method is examined measuring the dish antenna.

  14. RF cavity design exploiting a new derivative-free trust region optimization approach

    Directory of Open Access Journals (Sweden)

    Abdel-Karim S.O. Hassan

    2015-11-01

    Full Text Available In this article, a novel derivative-free (DF surrogate-based trust region optimization approach is proposed. In the proposed approach, quadratic surrogate models are constructed and successively updated. The generated surrogate model is then optimized instead of the underlined objective function over trust regions. Truncated conjugate gradients are employed to find the optimal point within each trust region. The approach constructs the initial quadratic surrogate model using few data points of order O(n, where n is the number of design variables. The proposed approach adopts weighted least squares fitting for updating the surrogate model instead of interpolation which is commonly used in DF optimization. This makes the approach more suitable for stochastic optimization and for functions subject to numerical error. The weights are assigned to give more emphasis to points close to the current center point. The accuracy and efficiency of the proposed approach are demonstrated by applying it to a set of classical bench-mark test problems. It is also employed to find the optimal design of RF cavity linear accelerator with a comparison analysis with a recent optimization technique.

  15. Exploitation and Utilization of Oilfield Geothermal Resources in China

    Directory of Open Access Journals (Sweden)

    Shejiao Wang

    2016-09-01

    Full Text Available Geothermal energy is a clean, green renewable resource, which can be utilized for power generation, heating, cooling, and could effectively replace oil, gas, and coal. In recent years, oil companies have put more efforts into exploiting and utilizing geothermal energy with advanced technologies for heat-tracing oil gathering and transportation, central heating, etc., which has not only reduced resource waste, but also improved large-scale and industrial resource utilization levels, and has achieved remarkable economic and social benefits. Based on the analysis of oilfield geothermal energy development status, resource potential, and exploitation and utilization modes, the advantages and disadvantages of harnessing oilfield geothermal resource have been discussed. Oilfield geothermal energy exploitation and utilization have advantages in resources, technical personnel, technology, and a large number of abandoned wells that could be reconstructed and utilized. Due to the high heat demand in oilfields, geothermal energy exploitation and utilization can effectively replace oil, gas, coal, and other fossil fuels, and has bright prospects. The key factors limiting oilfield geothermal energy exploitation and utilization are also pointed out in this paper, including immature technologies, lack of overall planning, lack of standards in resource assessment, and economic assessment, lack of incentive policies, etc.

  16. Exploiting Dual-Output Programmable Blocks to Balance Secure Dual-Rail Logics

    Directory of Open Access Journals (Sweden)

    Laurent Sauvage

    2010-01-01

    for such purposes. However, assessing the security level which can be achieved with them is an important issue, as it is directly related to the suitability to use commercial FPGA instead of proprietary custom FPGA for this kind of protection. In this article, we experimentally gave evidence that differential placement and routing of an FPGA implementation can be done with a granularity fine enough to improve the security gain. However, so far, this gain turned out to be lower for FPGAs than for ASICs. The solutions demonstrated in this article exploit the dual-output of modern FPGAs to achieve a better balance of dual-rail interconnections. However, we expect that an in-depth analysis of routing resources power consumption could still help reduce the interconnect differential leakage.

  17. Helix Nebula and CERN: A Symbiotic approach to exploiting commercial clouds

    Science.gov (United States)

    Barreiro Megino, Fernando H.; Jones, Robert; Kucharczyk, Katarzyna; Medrano Llamas, Ramón; van der Ster, Daniel

    2014-06-01

    The recent paradigm shift toward cloud computing in IT, and general interest in "Big Data" in particular, have demonstrated that the computing requirements of HEP are no longer globally unique. Indeed, the CERN IT department and LHC experiments have already made significant R&D investments in delivering and exploiting cloud computing resources. While a number of technical evaluations of interesting commercial offerings from global IT enterprises have been performed by various physics labs, further technical, security, sociological, and legal issues need to be address before their large-scale adoption by the research community can be envisaged. Helix Nebula - the Science Cloud is an initiative that explores these questions by joining the forces of three European research institutes (CERN, ESA and EMBL) with leading European commercial IT enterprises. The goals of Helix Nebula are to establish a cloud platform federating multiple commercial cloud providers, along with new business models, which can sustain the cloud marketplace for years to come. This contribution will summarize the participation of CERN in Helix Nebula. We will explain CERN's flagship use-case and the model used to integrate several cloud providers with an LHC experiment's workload management system. During the first proof of concept, this project contributed over 40.000 CPU-days of Monte Carlo production throughput to the ATLAS experiment with marginal manpower required. CERN's experience, together with that of ESA and EMBL, is providing a great insight into the cloud computing industry and highlighted several challenges that are being tackled in order to ease the export of the scientific workloads to the cloud environments.

  18. Nanostructured Basaltfiberconcrete Exploitational Characteristics

    Science.gov (United States)

    Saraykina, K. A.; Shamanov, V. A.

    2017-11-01

    The article demonstrates that the mass use of basalt fiber concrete (BFC) is constrained by insufficient study of their durability and serviceability in a variety of environments. This research is aimed at the study of the basalt fiber corrosion processes in the cement stone of BFC, the control of the new products structure formation in order to protect the reinforcing fiber from alkaline destruction and thereby improve the exploitational characteristics of the composite. The research result revealed that the modification of basaltfiber concrete by the dispersion of MWNTs contributes to the directional formation of new products in the cement matrix. The HAM additive in basaltfiberconcrete provides for the binding of portlandite to low-basic calcium hydroaluminosilicates, thus reducing the aggressive effect of the cement environment on the reinforcing fibers properties. The complex modification of BFC with nanostructured additives provides for an increase in its durability and exploitational properties (strength, frost resistance and water resistance) due to basalt fiber protection from alkali corrosion on account of the compacting of the contact zone “basalt fiber - cement stone” and designing of the new products structure and morphology of cement matrix over the fiber surface.

  19. Electrochemical production and use of free chlorine for pollutant removal: an experimental design approach.

    Science.gov (United States)

    Antonelli, Raissa; de Araújo, Karla Santos; Pires, Ricardo Francisco; Fornazari, Ana Luiza de Toledo; Granato, Ana Claudia; Malpass, Geoffroy Roger Pointer

    2017-10-28

    The present paper presents the study of (1) the optimization of electrochemical-free chlorine production using an experimental design approach, and (2) the application of the optimum conditions obtained for the application in photo-assisted electrochemical degradation of simulated textile effluent. In the experimental design the influence of inter-electrode gap, pH, NaCl concentration and current was considered. It was observed that the four variables studied are significant for the process, with NaCl concentration and current being the most significant variables for free chlorine production. The maximum free chlorine production was obtained at a current of 2.33 A and NaCl concentrations in 0.96 mol dm -3 . The application of the optimized conditions with simultaneous UV irradiation resulted in up to 83.1% Total Organic Carbon removal and 100% of colour removal over 180 min of electrolysis. The results indicate that a systematic (statistical) approach to the electrochemical treatment of pollutants can save time and reagents.

  20. On species preservation and Non-Cooperative Exploiters

    DEFF Research Database (Denmark)

    Kronbak, Lone Grønbæk; Lindroos, Marko

    cases where several non-cooperative exploiters are involved in mixed fisheries. This paper is targeting biodiversity preservation by setting up a two species model with the aim of ensuring both species survive harvesting of exploiters adapting a non-cooperative behaviour. The model starts out as a multi......-species model without biological dependency and is then modified to include also biological dependency. We contribute to the literature by analytically finding the limits on the number of players preserving both species including the conditions to be satisfied. For visual purposes we simulate a two species...

  1. Balancing exploration and exploitation in transferring research into practice: a comparison of five knowledge translation entity archetypes.

    Science.gov (United States)

    Oborn, Eivor; Barrett, Michael; Prince, Karl; Racko, Girts

    2013-09-05

    Translating knowledge from research into clinical practice has emerged as a practice of increasing importance. This has led to the creation of new organizational entities designed to bridge knowledge between research and practice. Within the UK, the Collaborations for Leadership in Applied Health Research and Care (CLAHRC) have been introduced to ensure that emphasis is placed in ensuring research is more effectively translated and implemented in clinical practice. Knowledge translation (KT) can be accomplished in various ways and is affected by the structures, activities, and coordination practices of organizations. We draw on concepts in the innovation literature--namely exploration, exploitation, and ambidexterity--to examine these structures and activities as well as the ensuing tensions between research and implementation. Using a qualitative research approach, the study was based on 106 semi-structured, in-depth interviews with the directors, theme leads and managers, key professionals involved in research and implementation in nine CLAHRCs. Data was also collected from intensive focus group workshops. In this article we develop five archetypes for organizing KT. The results show how the various CLAHRC entities work through partnerships to create explorative research and deliver exploitative implementation. The different archetypes highlight a range of structures that can achieve ambidextrous balance as they organize activity and coordinate practice on a continuum of exploration and exploitation. This work suggests that KT entities aim to reach their goals through a balance between exploration and exploitation in the support of generating new research and ensuring knowledge implementation. We highlight different organizational archetypes that support various ways to maintain ambidexterity, where both exploration and exploitation are supported in an attempt to narrow the knowledge gaps. The KT entity archetypes offer insights on strategies in structuring

  2. A Novel Approach to Model Earth Fissure Caused by Extensive Aquifer Exploitation and its Application to the Wuxi Case, China

    Science.gov (United States)

    Ye, Shujun; Franceschini, Andrea; Zhang, Yan; Janna, Carlo; Gong, Xulong; Yu, Jun; Teatini, Pietro

    2018-03-01

    Initially observed in the semiarid basins of southwestern USA, earth fissures due to aquifer over-exploitation are presently threatening a large number of subsiding basins in various countries worldwide. Different mechanics have been proposed to explain this process, such as differential compaction, horizontal movements, and fault reactivation. Numerical modeling and prediction of this major geohazard caused by overuse of groundwater resources are challenging because of two main requirements: shifting from the classical continuous to discontinuous geomechanics and incorporating two-dimensional features (the earth fissures) into large three-dimensional (3-D) modeling domain (the subsiding basin). In this work, we proposed a novel modeling approach to simulate earth fissure generation and propagation in 3-D complex geological settings. A nested two-scale approach associated with an original nonlinear elastoplastic finite element/interface element simulator allows modeling the mechanics of earth discontinuities, in terms of both sliding and opening. The model is applied on a case study in Wuxi, China, where groundwater pumping between 1985 and 2004 has caused land subsidence larger than 2 m. The model outcomes highlight that the presence of a shallow (˜80 m deep) bedrock ridge crossing the Yangtze River delta is the key factor triggering the earth fissure development in this area. Bending of the alluvial deposits around the ridge tip and shear stress due to the uneven piezometric change and asymmetrical shape of the bedrock have caused the earth fissure to onset at the land surface and propagate downward to a maximum depth of about 20-30 m. Maximum sliding and opening are computed in the range of 10-40 cm, in agreement with the order of magnitude estimated in the field.

  3. Trolling may intensify exploitation in crappie fisheries

    Science.gov (United States)

    Meals, K. O.; Dunn, A. W.; Miranda, Leandro E.

    2012-01-01

    In some parts of the USA, anglers targeting crappies Pomoxis spp. are transitioning from mostly stationary angling with a single pole around submerged structures to using multiple poles while drifting with the wind or under power. This shift in fishing methods could result in a change in catch efficiency, possibly increasing exploitation rates to levels that would be of concern to managers. We studied the catch statistics of anglers fishing while trolling with multiple poles (trollers) and those fishing with single poles (polers) in Mississippi reservoirs. Specifically, we tested whether (1) various catch statistics differed between trollers and polers, (2) catch rates of trollers were related to the number of poles fished, and (3) trollers could raise exploitation rates to potentially unsustainable levels. Results showed that participation in the crappie fisheries was about equally split between polers and trollers. In spring, 90% of crappie anglers were polers; in summer, 85% of crappie anglers were trollers. The size of harvested crappies was similar for the two angler groups, but the catch per hour was almost three times higher for trollers than for polers. Catch rates by trollers were directly correlated to the number of poles fished, although the relationship flattened as the number of poles increased. The average harvest rate for one troller fishing with three poles was similar to the harvest rate obtained by one poler. Simulations predicted that at the existing mix of about 50% polers and 50% trollers and with no restrictions on the number of poles used by trollers, exploitation of crappies is about 1.3 times higher than that in a polers-only fishery; under a scenario in which 100% of crappie anglers were trollers, exploitation was forecasted to increase to about 1.7 times the polers-only rate. The efficiency of trolling for crappies should be of concern to fishery managers because crappie fisheries are mostly consumptive and may increase exploitation

  4. Models of Social Exploitation with Special Emphasis on Slovenc Traffic Economics

    Directory of Open Access Journals (Sweden)

    Iztok Ostan

    2005-01-01

    Full Text Available In order to decipher the organisational behaviour operatingin the transport sector of the economy it is necessary to discoverthe prevalent patterns of social exploitation at work. PreliminaJyresults of a study of experienced irregular traffic studentsshow that, according to them there is no significant differencein Slovenia between exploitation in traffic and other sectors.Thus, general models of exploitation could be used to explainthe behaviour in the traffic sector. Empirical research amongSlovene students showed that according to their statements inthe 90s the managerial and capitalistic types of exploitation prevailedin Slovenia over non-exploitative types of economic behaviour.It also showed that statements of students do not differmuch from those of the general public regarding this question,nor from the statements of irregular students with extensivework experience. It was also found that there were no substantialdifferences between the statements of Italian and Slovenestudents regarding the type of exploitation operative in theircountries. Students of traffic are basically of the same opinionregarding this topic as students in general, though slightly morecritical, especially towards business managers and politicians.

  5. Statistical sampling approaches for soil monitoring

    NARCIS (Netherlands)

    Brus, D.J.

    2014-01-01

    This paper describes three statistical sampling approaches for regional soil monitoring, a design-based, a model-based and a hybrid approach. In the model-based approach a space-time model is exploited to predict global statistical parameters of interest such as the space-time mean. In the hybrid

  6. Subjective evaluation of two stereoscopic imaging systems exploiting visual attention to improve 3D quality of experience

    Science.gov (United States)

    Hanhart, Philippe; Ebrahimi, Touradj

    2014-03-01

    Crosstalk and vergence-accommodation rivalry negatively impact the quality of experience (QoE) provided by stereoscopic displays. However, exploiting visual attention and adapting the 3D rendering process on the fly can reduce these drawbacks. In this paper, we propose and evaluate two different approaches that exploit visual attention to improve 3D QoE on stereoscopic displays: an offline system, which uses a saliency map to predict gaze position, and an online system, which uses a remote eye tracking system to measure real time gaze positions. The gaze points were used in conjunction with the disparity map to extract the disparity of the object-of-interest. Horizontal image translation was performed to bring the fixated object on the screen plane. The user preference between standard 3D mode and the two proposed systems was evaluated through a subjective evaluation. Results show that exploiting visual attention significantly improves image quality and visual comfort, with a slight advantage for real time gaze determination. Depth quality is also improved, but the difference is not significant.

  7. The chert workshop of Tozal de la Mesa (Alins del Monte, Huesca, Spain and its exploitation in historical times

    Directory of Open Access Journals (Sweden)

    Marta Sánchez de la Torre

    2016-09-01

    The first approach to contextualize the recovered materials of Tozal de la Mesa workshop area has allowed determining an exploitation of the Garumnian cherts that has lasted until the late nineteenth century according to some recovered products (e.g., pottery and to oral sources.

  8. Meaning, function and methods of the recultivation in mining exploitation

    OpenAIRE

    Dambov, Risto; Ljatifi, Ejup

    2015-01-01

    With the exploitation of mineral resources is performed degradation and deformation of the relief and the general part of surface of the Earth's crust. Depending on the type of open pit mine, this degradation can be expressed to a lesser or greater extent, and sometimes in several square kilometers. The exploitation of mineral resources is with unbreakable link with the environment. Very often it is said that mining is „enemy No. 1“ for environment. With exploitation comes to degradation of h...

  9. Experimental oligopolies modeling: A dynamic approach based on heterogeneous behaviors

    Science.gov (United States)

    Cerboni Baiardi, Lorenzo; Naimzada, Ahmad K.

    2018-05-01

    In the rank of behavioral rules, imitation-based heuristics has received special attention in economics (see [14] and [12]). In particular, imitative behavior is considered in order to understand the evidences arising in experimental oligopolies which reveal that the Cournot-Nash equilibrium does not emerge as unique outcome and show that an important component of the production at the competitive level is observed (see e.g.[1,3,9] or [7,10]). By considering the pioneering groundbreaking approach of [2], we build a dynamical model of linear oligopolies where heterogeneous decision mechanisms of players are made explicit. In particular, we consider two different types of quantity setting players characterized by different decision mechanisms that coexist and operate simultaneously: agents that adaptively adjust their choices towards the direction that increases their profit are embedded with imitator agents. The latter ones use a particular form of proportional imitation rule that considers the awareness about the presence of strategic interactions. It is noteworthy that the Cournot-Nash outcome is a stationary state of our models. Our thesis is that the chaotic dynamics arousing from a dynamical model, where heterogeneous players are considered, are capable to qualitatively reproduce the outcomes of experimental oligopolies.

  10. Humidity adsorption and transfer in hygroscopic materials. Percolation-type approach and experimentation

    International Nuclear Information System (INIS)

    Quenard, Daniel

    1989-01-01

    Water vapor adsorption and transfer in microporous media are studied by using a 3 level hierarchical approach. At the microscopic level (pore size), we describe the basic phenomena (adsorption/desorption, capillary condensation, molecular and Knudsen diffusion, Hagen-Poiseuille flow) that occur during the isotherm water vapor transport in a single cylindrical pore, at the steady state. The transport through a condensed pore is taken into account by its 'vapor equivalent flow' and we underline that capillary condensation may cause vapor flow amplification of several orders of magnitude. We suggest to use an electrical analogy between a cylindrical pore and a Zener diode. Then at the mesoscopic level (material size), we introduce pore networks to provide use with a simplified description of the microstructure. Three types of networks are studied: square, triangular and honeycomb. By using a random distribution of the single cylindrical pores on the 2D networks, we are able to estimate the sorption isotherms and the water vapor permeability which are the two essential characteristics to understand the behaviour of materials towards humidity. To develop this approach we refer to the percolation concept and we use most of its principal results. To estimate the adsorption isotherms we introduce a surface adsorption model and we use the KELVIN-LAPLACE equation. Hysteresis appears naturally thanks to the 'ink-bottle' phenomenon and it is all the more important since the network is ill-connected. The water vapor permeability is calculated thanks to the electrical analogy (cylindrical pore-Zener diode). We emphasize an important amplification of the equivalent permeability when the relative humidity reaches a threshold value. This phenomenon provides use with a possible explanation of numerous experimental results. The respective effects of pore size distribution and temperature, on sorption isotherms and permeability, are presented. We present several

  11. Experimental quantum secret sharing and third-man quantum cryptography.

    Science.gov (United States)

    Chen, Yu-Ao; Zhang, An-Ning; Zhao, Zhi; Zhou, Xiao-Qi; Lu, Chao-Yang; Peng, Cheng-Zhi; Yang, Tao; Pan, Jian-Wei

    2005-11-11

    Quantum secret sharing (QSS) and third-man quantum cryptography (TQC) are essential for advanced quantum communication; however, the low intensity and fragility of the multiphoton entanglement source in previous experiments have made their realization an extreme experimental challenge. Here, we develop and exploit an ultrastable high intensity source of four-photon entanglement to report an experimental realization of QSS and TQC. The technology developed in our experiment will be important for future multiparty quantum communication.

  12. Effect of increased fuel exploitation on the main characteristics of spent WWER 440 fuel

    International Nuclear Information System (INIS)

    Zib, A.

    2001-01-01

    The article deals with the effect of a higher fuel exploitation on the main characteristics (particularly radioactivity and decay heat power) of spent WWER 440 fuel. The main characteristics were calculated by using the Origen code. The study was implemented as a three-stage process. In the first stage, the radioactivity and residual thermal power time evolution values were calculated for the 'typical fuel', i. e. fuel assembly with initial enrichment of 3.6% U-235, 3 years in reactor, and burnup of 30 MWd/kg U. In the second stage, ceteris paribus radioactivity and thermal power analyses of sensitivity to changes in the fuel burnup, initial fuel enrichment, and time in reactor were carried out for the typical fuel assembly. In the third stage, the effect of changes in all three variables was investigated for fuel assemblies possessing parameters that approach those applied at the Dukovany NPP. The effect of a higher fuel exploitation on the interim fuel storage is also mentioned. (author)

  13. Towards Coordination Patterns for Complex Experimentations in Data Mining

    NARCIS (Netherlands)

    F. Arbab (Farhad); C. Diamantini (Claudia); D. Potena (Domenico); E. Storti (Emanuele)

    2010-01-01

    htmlabstractIn order to support the management of experimental activities in a networked scientic community, the exploitation of serviceoriented paradigm and technologies is a hot research topic in E-science. In particular, scientic workows can be modeled by resorting to the notion of process.

  14. Exploiting nonlinearities of micro-machined resonators for filtering applications

    KAUST Repository

    Ilyas, Saad

    2017-06-21

    We demonstrate the exploitation of the nonlinear behavior of two electrically coupled microbeam resonators to realize a band-pass filter. More specifically, we combine their nonlinear hardening and softening responses to realize a near flat pass band filter with sharp roll-off characteristics. The device is composed of two near identical doubly clamped and electrostatically actuated microbeams made of silicon. One of the resonators is buckled via thermal loading to produce a softening frequency response. It is then further tuned to create the desired overlap with the second resonator response of hardening behavior. This overlapping improves the pass band flatness. Also, the sudden jumps due to the softening and hardening behaviors create sharp roll-off characteristics. This approach can be promising for the future generation of filters with superior characteristics.

  15. Exploiting nonlinearities of micro-machined resonators for filtering applications

    KAUST Repository

    Ilyas, Saad; Chappanda, K. N.; Younis, Mohammad I.

    2017-01-01

    We demonstrate the exploitation of the nonlinear behavior of two electrically coupled microbeam resonators to realize a band-pass filter. More specifically, we combine their nonlinear hardening and softening responses to realize a near flat pass band filter with sharp roll-off characteristics. The device is composed of two near identical doubly clamped and electrostatically actuated microbeams made of silicon. One of the resonators is buckled via thermal loading to produce a softening frequency response. It is then further tuned to create the desired overlap with the second resonator response of hardening behavior. This overlapping improves the pass band flatness. Also, the sudden jumps due to the softening and hardening behaviors create sharp roll-off characteristics. This approach can be promising for the future generation of filters with superior characteristics.

  16. Helix Nebula and CERN: A Symbiotic approach to exploiting commercial clouds

    International Nuclear Information System (INIS)

    Megino, Fernando H Barreiro; Jones, Robert; Llamas, Ramón Medrano; Ster, Daniel van der; Kucharczyk, Katarzyna

    2014-01-01

    The recent paradigm shift toward cloud computing in IT, and general interest in 'Big Data' in particular, have demonstrated that the computing requirements of HEP are no longer globally unique. Indeed, the CERN IT department and LHC experiments have already made significant R and D investments in delivering and exploiting cloud computing resources. While a number of technical evaluations of interesting commercial offerings from global IT enterprises have been performed by various physics labs, further technical, security, sociological, and legal issues need to be address before their large-scale adoption by the research community can be envisaged. Helix Nebula – the Science Cloud is an initiative that explores these questions by joining the forces of three European research institutes (CERN, ESA and EMBL) with leading European commercial IT enterprises. The goals of Helix Nebula are to establish a cloud platform federating multiple commercial cloud providers, along with new business models, which can sustain the cloud marketplace for years to come. This contribution will summarize the participation of CERN in Helix Nebula. We will explain CERN's flagship use-case and the model used to integrate several cloud providers with an LHC experiment's workload management system. During the first proof of concept, this project contributed over 40.000 CPU-days of Monte Carlo production throughput to the ATLAS experiment with marginal manpower required. CERN's experience, together with that of ESA and EMBL, is providing a great insight into the cloud computing industry and highlighted several challenges that are being tackled in order to ease the export of the scientific workloads to the cloud environments.

  17. Peat exploitation - Environment. Effects and measures

    International Nuclear Information System (INIS)

    Stenbeck, G.

    1996-01-01

    This report gives a detailed description of the influence of peat exploitation on the land-, water- and atmospheric environments. Proposals for mitigatory measures to minimize damage to the environment are also given

  18. Exploiting communication concurrency on high performance computing systems

    Energy Technology Data Exchange (ETDEWEB)

    Chaimov, Nicholas [Univ. of Oregon, Eugene, OR (United States); Ibrahim, Khaled Z. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Williams, Samuel [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Iancu, Costin [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2015-01-01

    Although logically available, applications may not exploit enough instantaneous communication concurrency to maximize hardware utilization on HPC systems. This is exacerbated in hybrid programming models such as SPMD+OpenMP. We present the design of a "multi-threaded" runtime able to transparently increase the instantaneous network concurrency and to provide near saturation bandwidth, independent of the application configuration and dynamic behavior. The runtime forwards communication requests from application level tasks to multiple communication servers. Our techniques alleviate the need for spatial and temporal application level message concurrency optimizations. Experimental results show improved message throughput and bandwidth by as much as 150% for 4KB bytes messages on InfiniBand and by as much as 120% for 4KB byte messages on Cray Aries. For more complex operations such as all-to-all collectives, we observe as much as 30% speedup. This translates into 23% speedup on 12,288 cores for a NAS FT implemented using FFTW. We also observe as much as 76% speedup on 1,500 cores for an already optimized UPC+OpenMP geometric multigrid application using hybrid parallelism.

  19. Intelligence, mapping, and geospatial exploitation system (IMAGES)

    Science.gov (United States)

    Moellman, Dennis E.; Cain, Joel M.

    1998-08-01

    This paper provides further detail to one facet of the battlespace visualization concept described in last year's paper Battlespace Situation Awareness for Force XXI. It focuses on the National Imagery and Mapping Agency (NIMA) goal to 'provide customers seamless access to tailorable imagery, imagery intelligence, and geospatial information.' This paper describes Intelligence, Mapping, and Geospatial Exploitation System (IMAGES), an exploitation element capable of CONUS baseplant operations or field deployment to provide NIMA geospatial information collaboratively into a reconnaissance, surveillance, and target acquisition (RSTA) environment through the United States Imagery and Geospatial Information System (USIGS). In a baseplant CONUS setting IMAGES could be used to produce foundation data to support mission planning. In the field it could be directly associated with a tactical sensor receiver or ground station (e.g. UAV or UGV) to provide near real-time and mission specific RSTA to support mission execution. This paper provides IMAGES functional level design; describes the technologies, their interactions and interdependencies; and presents a notional operational scenario to illustrate the system flexibility. Using as a system backbone an intelligent software agent technology, called Open Agent ArchitectureTM (OAATM), IMAGES combines multimodal data entry, natural language understanding, and perceptual and evidential reasoning for system management. Configured to be DII COE compliant, it would utilize, to the extent possible, COTS applications software for data management, processing, fusion, exploitation, and reporting. It would also be modular, scaleable, and reconfigurable. This paper describes how the OAATM achieves data synchronization and enables the necessary level of information to be rapidly available to various command echelons for making informed decisions. The reasoning component will provide for the best information to be developed in the timeline

  20. The neural exploitation hypothesis and its implications for an embodied approach to language and cognition: Insights from the study of action verbs processing and motor disorders in Parkinson's disease.

    Science.gov (United States)

    Gallese, Vittorio; Cuccio, Valentina

    2018-03-01

    As it is widely known, Parkinson's disease is clinically characterized by motor disorders such as the loss of voluntary movement control, including resting tremor, postural instability, and bradykinesia (Bocanegra et al., 2015; Helmich, Hallett, Deuschl, Toni, & Bloem, 2012; Liu et al., 2006; Rosin, Topka, & Dichgans, 1997). In the last years, many empirical studies (e.g., Bocanegra et al., 2015; Spadacenta et al., 2012) have also shown that the processing of action verbs is selectively impaired in patients affected by this neurodegenerative disorder. In the light of these findings, it has been suggested that Parkinson disorder can be interpreted within an embodied cognition framework (e.g., Bocanegra et al., 2015). The central tenet of any embodied approach to language and cognition is that high order cognitive functions are grounded in the sensory-motor system. With regard to this point, Gallese (2008) proposed the neural exploitation hypothesis to account for, at the phylogenetic level, how key aspects of human language are underpinned by brain mechanisms originally evolved for sensory-motor integration. Glenberg and Gallese (2012) also applied the neural exploitation hypothesis to the ontogenetic level. On the basis of these premises, they developed a theory of language acquisition according to which, sensory-motor mechanisms provide a neurofunctional architecture for the acquisition of language, while retaining their original functions as well. The neural exploitation hypothesis is here applied to interpret the profile of patients affected by Parkinson's disease. It is suggested that action semantic impairments directly tap onto motor disorders. Finally, a discussion of what theory of language is needed to account for the interactions between language and movement disorders is presented. Copyright © 2018 Elsevier Ltd. All rights reserved.

  1. Rational Exploitation and Utilizing of Groundwater in Jiangsu Coastal Area

    Science.gov (United States)

    Kang, B.; Lin, X.

    2017-12-01

    Jiangsu coastal area is located in the southeast coast of China, where is a new industrial base and an important coastal and Land Resources Development Zone of China. In the areas with strong human exploitation activities, regional groundwater evolution is obviously affected by human activities. In order to solve the environmental geological problems caused by groundwater exploitation fundamentally, we must find out the forming conditions of regional groundwater hydrodynamic field, and the impact of human activities on groundwater hydrodynamic field evolution and hydrogeochemical evolition. Based on these results, scientific management and reasonable exploitation of the regional groundwater resources can be provided for the utilization. Taking the coastal area of Jiangsu as the research area, we investigate and analyze of the regional hydrogeological conditions. The numerical simulation model of groundwater flow was established according to the water power, chemical and isotopic methods, the conditions of water flow and the influence of hydrodynamic field on the water chemical field. We predict the evolution of regional groundwater dynamics under the influence of human activities and climate change and evaluate the influence of groundwater dynamic field evolution on the environmental geological problems caused by groundwater exploitation under various conditions. We get the following conclusions: Three groundwater exploitation optimal schemes were established. The groundwater salinization was taken as the primary control condition. The substitution model was proposed to model groundwater exploitation and water level changes by BP network method.Then genetic algorithm was used to solve the optimization solution. Three groundwater exploitation optimal schemes were submit to local water resource management. The first sheme was used to solve the groundwater salinization problem. The second sheme focused on dual water supply. The third sheme concerned on emergency water

  2. Friend or foe: exploiting sensor failures for transparent object localization and classification

    Science.gov (United States)

    Seib, Viktor; Barthen, Andreas; Marohn, Philipp; Paulus, Dietrich

    2017-02-01

    In this work we address the problem of detecting and recognizing transparent objects using depth images from an RGB-D camera. Using this type of sensor usually prohibits the localization of transparent objects since the structured light pattern of these cameras is not reflected by transparent surfaces. Instead, transparent surfaces often appear as undefined values in the resulting images. However, these erroneous sensor readings form characteristic patterns that we exploit in the presented approach. The sensor data is fed into a deep convolutional neural network that is trained to classify and localize drinking glasses. We evaluate our approach with four different types of transparent objects. To our best knowledge, no datasets offering depth images of transparent objects exist so far. With this work we aim at closing this gap by providing our data to the public.

  3. The price elasticity of demand for heroin: Matched longitudinal and experimental evidence.

    Science.gov (United States)

    Olmstead, Todd A; Alessi, Sheila M; Kline, Brendan; Pacula, Rosalie Liccardo; Petry, Nancy M

    2015-05-01

    This paper reports estimates of the price elasticity of demand for heroin based on a newly constructed dataset. The dataset has two matched components concerning the same sample of regular heroin users: longitudinal information about real-world heroin demand (actual price and actual quantity at daily intervals for each heroin user in the sample) and experimental information about laboratory heroin demand (elicited by presenting the same heroin users with scenarios in a laboratory setting). Two empirical strategies are used to estimate the price elasticity of demand for heroin. The first strategy exploits the idiosyncratic variation in the price experienced by a heroin user over time that occurs in markets for illegal drugs. The second strategy exploits the experimentally induced variation in price experienced by a heroin user across experimental scenarios. Both empirical strategies result in the estimate that the conditional price elasticity of demand for heroin is approximately -0.80. Copyright © 2015 Elsevier B.V. All rights reserved.

  4. The price elasticity of demand for heroin: matched longitudinal and experimental evidence#

    Science.gov (United States)

    Olmstead, Todd A.; Alessi, Sheila M.; Kline, Brendan; Pacula, Rosalie Liccardo; Petry, Nancy M.

    2015-01-01

    This paper reports estimates of the price elasticity of demand for heroin based on a newly constructed dataset. The dataset has two matched components concerning the same sample of regular heroin users: longitudinal information about real-world heroin demand (actual price and actual quantity at daily intervals for each heroin user in the sample) and experimental information about laboratory heroin demand (elicited by presenting the same heroin users with scenarios in a laboratory setting). Two empirical strategies are used to estimate the price elasticity of demand for heroin. The first strategy exploits the idiosyncratic variation in the price experienced by a heroin user over time that occurs in markets for illegal drugs. The second strategy exploits the experimentally-induced variation in price experienced by a heroin user across experimental scenarios. Both empirical strategies result in the estimate that the conditional price elasticity of demand for heroin is approximately −0.80. PMID:25702687

  5. An Approximate Approach to Automatic Kernel Selection.

    Science.gov (United States)

    Ding, Lizhong; Liao, Shizhong

    2016-02-02

    Kernel selection is a fundamental problem of kernel-based learning algorithms. In this paper, we propose an approximate approach to automatic kernel selection for regression from the perspective of kernel matrix approximation. We first introduce multilevel circulant matrices into automatic kernel selection, and develop two approximate kernel selection algorithms by exploiting the computational virtues of multilevel circulant matrices. The complexity of the proposed algorithms is quasi-linear in the number of data points. Then, we prove an approximation error bound to measure the effect of the approximation in kernel matrices by multilevel circulant matrices on the hypothesis and further show that the approximate hypothesis produced with multilevel circulant matrices converges to the accurate hypothesis produced with kernel matrices. Experimental evaluations on benchmark datasets demonstrate the effectiveness of approximate kernel selection.

  6. Elder Financial Exploitation: Implications for Future Policy and Research in Elder Mistreatment

    Directory of Open Access Journals (Sweden)

    Price, Thomas

    2011-07-01

    Full Text Available Recent advances in the understanding of elder mistreatment have demonstrated that financial exploitation tends to be one of the most common forms of mistreatment affecting older populations. Agencies such as the World Bank and World Health Organization show significant concern regarding financial exploitation and its connection to physical and emotional injury to victims. The World Bank uses the term “financial violence” as a means of generally describing the harm caused to an individual as a result of financial exploitation or abuse. The proportion of financial exploitation in relation to other forms of elder mistreatment is defined in our research. We discuss the potential impact of elder financial exploitation on victims as well as explore the implications for future research and policy development focused on financial aspects of elder mistreatment and call for further study in the concept of financial exploitation as a violent act. [West J Emerg Med. 2011;12(3:354-356.

  7. Exploitation of commercial remote sensing images: reality ignored?

    Science.gov (United States)

    Allen, Paul C.

    1999-12-01

    The remote sensing market is on the verge of being awash in commercial high-resolution images. Market estimates are based on the growing numbers of planned commercial remote sensing electro-optical, radar, and hyperspectral satellites and aircraft. EarthWatch, Space Imaging, SPOT, and RDL among others are all working towards launch and service of one to five meter panchromatic or radar-imaging satellites. Additionally, new advances in digital air surveillance and reconnaissance systems, both manned and unmanned, are also expected to expand the geospatial customer base. Regardless of platform, image type, or location, each system promises images with some combination of increased resolution, greater spectral coverage, reduced turn-around time (request-to- delivery), and/or reduced image cost. For the most part, however, market estimates for these new sources focus on the raw digital images (from collection to the ground station) while ignoring the requirements for a processing and exploitation infrastructure comprised of exploitation tools, exploitation training, library systems, and image management systems. From this it would appear the commercial imaging community has failed to learn the hard lessons of national government experience choosing instead to ignore reality and replicate the bias of collection over processing and exploitation. While this trend may be not impact the small quantity users that exist today it will certainly adversely affect the mid- to large-sized users of the future.

  8. Exploitation of cloud computing in management of construction projects in Slovakia

    Directory of Open Access Journals (Sweden)

    Mandičák Tomáš

    2016-12-01

    Full Text Available The issue of cloud computing is a highly topical issue. Cloud computing represents a new model for information technology (IT services based on the exploitation of Web (it represents a cloud and other application platforms, as well as software as a service. In general, the exploitation of cloud computing in construction project management has several advantages, as demonstrated by several research reports. Currently, research quantifying the exploitation of cloud computing in the Slovak construction industry has not yet been carried out. The article discusses the issue of exploitation of cloud computing in construction project management in Slovakia. The main objective of the research is to confirm whether factors such as size of construction enterprise, owner of construction enterprise and participant of construction project have any impact on the exploitation level of cloud computing in construction project management. It includes confirmation of differences in use between different participants of the construction project or between construction enterprises broken down by size and shareholders.

  9. Composing problem solvers for simulation experimentation: a case study on steady state estimation.

    Science.gov (United States)

    Leye, Stefan; Ewald, Roland; Uhrmacher, Adelinde M

    2014-01-01

    Simulation experiments involve various sub-tasks, e.g., parameter optimization, simulation execution, or output data analysis. Many algorithms can be applied to such tasks, but their performance depends on the given problem. Steady state estimation in systems biology is a typical example for this: several estimators have been proposed, each with its own (dis-)advantages. Experimenters, therefore, must choose from the available options, even though they may not be aware of the consequences. To support those users, we propose a general scheme to aggregate such algorithms to so-called synthetic problem solvers, which exploit algorithm differences to improve overall performance. Our approach subsumes various aggregation mechanisms, supports automatic configuration from training data (e.g., via ensemble learning or portfolio selection), and extends the plugin system of the open source modeling and simulation framework James II. We show the benefits of our approach by applying it to steady state estimation for cell-biological models.

  10. An experimental approach to validating a theory of human error in complex systems

    Science.gov (United States)

    Morris, N. M.; Rouse, W. B.

    1985-01-01

    The problem of 'human error' is pervasive in engineering systems in which the human is involved. In contrast to the common engineering approach of dealing with error probabilistically, the present research seeks to alleviate problems associated with error by gaining a greater understanding of causes and contributing factors from a human information processing perspective. The general approach involves identifying conditions which are hypothesized to contribute to errors, and experimentally creating the conditions in order to verify the hypotheses. The conceptual framework which serves as the basis for this research is discussed briefly, followed by a description of upcoming research. Finally, the potential relevance of this research to design, training, and aiding issues is discussed.

  11. Capacity-Approaching Modulation Formats for Optical Transmission Systems: Signal shaping and advanced de/muxing for efficient resource exploitation

    DEFF Research Database (Denmark)

    Estaran Tolosa, Jose Manuel

    Aiming for efficient fiber-optic data transport, this thesis addresses three scenario-specific modulation and/or multiplexing techniques which, leveraging digital signal processing, can further exploit the available resources.The considered environments are: (i) (ultra) long-haul networks, where we...... focus on improving the receiver sensitivity; (ii) metropolitan area networks, where the target is providing spectral and rate adaptability with fine granularity and easy reconfigurability; and (iii) short-haul networks, where facilitating more affordable throughput scaling is pursued. Functioning...

  12. Sexual exploitation and labor during adolescence: A case study

    Directory of Open Access Journals (Sweden)

    Luciana Dutra-Thomé

    2011-09-01

    Full Text Available The present article focused on the perception of sexual exploitation as a job, using a single case study design. The aim of the study was to investigate the case of a 14 year-old girl, involved in commercial sexual exploitation, who considered this situation as her labor activity. A content analysis showed protective and risk factors as categories, especially related to her labor activities. The girl perceived the sexual exploitation activity as a job that provided autonomy, subsistence, and survival. The study revealed that the negative effects of working during adolescence may bring consequences to health and development. Youth work may be defined as a risk factor, especially when the labour conditions are not adequate and protected.

  13. Automated UAV-based video exploitation using service oriented architecture framework

    Science.gov (United States)

    Se, Stephen; Nadeau, Christian; Wood, Scott

    2011-05-01

    Airborne surveillance and reconnaissance are essential for successful military missions. Such capabilities are critical for troop protection, situational awareness, mission planning, damage assessment, and others. Unmanned Aerial Vehicles (UAVs) gather huge amounts of video data but it is extremely labour-intensive for operators to analyze hours and hours of received data. At MDA, we have developed a suite of tools that can process the UAV video data automatically, including mosaicking, change detection and 3D reconstruction, which have been integrated within a standard GIS framework. In addition, the mosaicking and 3D reconstruction tools have also been integrated in a Service Oriented Architecture (SOA) framework. The Visualization and Exploitation Workstation (VIEW) integrates 2D and 3D visualization, processing, and analysis capabilities developed for UAV video exploitation. Visualization capabilities are supported through a thick-client Graphical User Interface (GUI), which allows visualization of 2D imagery, video, and 3D models. The GUI interacts with the VIEW server, which provides video mosaicking and 3D reconstruction exploitation services through the SOA framework. The SOA framework allows multiple users to perform video exploitation by running a GUI client on the operator's computer and invoking the video exploitation functionalities residing on the server. This allows the exploitation services to be upgraded easily and allows the intensive video processing to run on powerful workstations. MDA provides UAV services to the Canadian and Australian forces in Afghanistan with the Heron, a Medium Altitude Long Endurance (MALE) UAV system. On-going flight operations service provides important intelligence, surveillance, and reconnaissance information to commanders and front-line soldiers.

  14. Prospects of geothermal resource exploitation

    International Nuclear Information System (INIS)

    Bourrelier, P.H.; Cornet, F.; Fouillac, C.

    1994-01-01

    The use of geothermal energy to generate electricity has only occurred during the past 50 years by drilling wells in aquifers close to magmas and producing either dry steam or hot water. The world's production of electricity from geothermal energy is over 6000 MWe and is still growing. The direct use of geothermal energy for major urban communities has been developed recently by exploitation of aquifers in sedimentary basins under large towns. Scaling up the extraction of heat implies the exploitation of larger and better located fields requiring an appropriate method of extraction; the objective of present attempts in USA, Japan and Europe is to create heat exchangers by the circulation of water between several deep wells. Two field categories are considered: the extension of classical geothermal fields beyond the aquifer areas, and areas favoured by both a high geothermal gradient, fractures inducing a natural permeability at large scale, and good commercial prospects (such as in the Rhenan Graben). Hot dry rocks concept has gained a large interest. 1 fig., 5 tabs., 11 refs

  15. Compete, coordinate, and cooperate: How to exploit uncertain environments with social interaction.

    Science.gov (United States)

    Schulze, Christin; Newell, Ben R

    2015-10-01

    Countless decisions, from the trivial to the crucial, are made in complex social contexts while facing uncertain consequences. Yet a large portion of decision making research focuses on either the effects of social interaction or the effects of environmental uncertainty by examining strategic games against others or individual games against nature. Drawing a connection between these approaches, the authors extend a standard individual choice paradigm to include social interaction with 1 other person. In this paradigm, 2 competing decision makers repeatedly select among 2 options, each offering a particular probability of a fixed payoff. When both players choose the same, correct option, the payoff is evenly split; when they choose different options, the player choosing the correct option receives the full payoff. The addition of this social dimension gives players an opportunity to fully exploit an uncertain environment via cooperation: By consistently choosing opposite options, two players can exploit the uncertain environment more effectively than a single player could. We present 2 experiments that manipulate environmental (Experiment 1) and social (Experiment 2) aspects of the paradigm. In Experiment 1, the outcome probabilities were either known or unknown to participants; in Experiment 2, participants' attention was drawn to individual or group gains by introducing either within- or between-group competition. Efficient cooperation did not emerge spontaneously in Experiment 1. Instead, most people probability maximized, mirroring the behavior observed in individual choice. By contrast, between--group competition in Experiment 2 facilitated efficient-but not always equitable--exploitation of uncertain environments. This work links the concepts of individual risky choice and strategic decision making under both environmental and social uncertainty. (c) 2015 APA, all rights reserved).

  16. Malware Sandbox Analysis for Secure Observation of Vulnerability Exploitation

    Science.gov (United States)

    Yoshioka, Katsunari; Inoue, Daisuke; Eto, Masashi; Hoshizawa, Yuji; Nogawa, Hiroki; Nakao, Koji

    Exploiting vulnerabilities of remote systems is one of the fundamental behaviors of malware that determines their potential hazards. Understanding what kind of propagation tactics each malware uses is essential in incident response because such information directly links with countermeasures such as writing a signature for IDS. Although recently malware sandbox analysis has been studied intensively, little work is done on securely observing the vulnerability exploitation by malware. In this paper, we propose a novel sandbox analysis method for securely observing malware's vulnerability exploitation in a totally isolated environment. In our sandbox, we prepare two victim hosts. We first execute the sample malware on one of these hosts and then let it attack the other host which is running multiple vulnerable services. As a simple realization of the proposed method, we have implemented a sandbox using Nepenthes, a low-interaction honeypot, as the second victim. Because Nepenthes can emulate a variety of vulnerable services, we can efficiently observe the propagation of sample malware. In the experiments, among 382 samples whose scan capabilities are confirmed, 381 samples successfully started exploiting vulnerabilities of the second victim. This indicates the certain level of feasibility of the proposed method.

  17. An experimental approach to improve the basin type solar still using an integrated natural circulation loop

    International Nuclear Information System (INIS)

    Rahmani, Ahmed; Boutriaa, Abdelouahab; Hadef, Amar

    2015-01-01

    Highlights: • A new experimental approach to improve the conventional solar still performances is proposed. • A passive natural circulation loop is integrated to the conventional solar still. • Natural circulation of humid-air in a closed loop is studied by the present study. • Natural circulation capability in driving air convection in the still was demonstrated. • Air convection created inside the still increase the evaporation heat and mass transfer. - Abstract: In this paper, a new experimental approach is proposed to enhance the performances of the conventional solar still using the natural circulation effect inside the still. The idea consists in generating air flow by a rectangular natural circulation loop appended to the rear side of the still. The proposed still was tested during summer period and the experimental data presented in this paper concerns four typical days. The convective heat transfer coefficient is evaluated and compared with Dunkle’s model. The comparison shows that convective heat transfer is considerably improved by the air convection created inside the still. The natural circulation phenomenon in the still is studied and a good agreement between the experimental data and Vijajan’s laminar correlation is found. Therefore, natural circulation phenomenon is found to have a good effect on the still performances where the still daily productivity is of 3.72 kg/m 2 and the maximum efficiency is of 45.15%

  18. Statistical approach for uncertainty quantification of experimental modal model parameters

    DEFF Research Database (Denmark)

    Luczak, M.; Peeters, B.; Kahsin, M.

    2014-01-01

    Composite materials are widely used in manufacture of aerospace and wind energy structural components. These load carrying structures are subjected to dynamic time-varying loading conditions. Robust structural dynamics identification procedure impose tight constraints on the quality of modal models...... represent different complexity levels ranging from coupon, through sub-component up to fully assembled aerospace and wind energy structural components made of composite materials. The proposed method is demonstrated on two application cases of a small and large wind turbine blade........ This paper aims at a systematic approach for uncertainty quantification of the parameters of the modal models estimated from experimentally obtained data. Statistical analysis of modal parameters is implemented to derive an assessment of the entire modal model uncertainty measure. Investigated structures...

  19. Is Kissamos Bay in NW Crete, Greece worth to be exploited as a marine aggregates deposit? An integrated approach

    Science.gov (United States)

    Anastasatou, Marianthi; Tsoutsia, Antonia; Petrakis, Stelios; Rousakis, Grigoris; Karditsa, Aikaterini; Hasiotis, Thomas; Kapsimalis, Vasilios; Poulos, Serafim; Stamatakis, Michael

    2017-04-01

    This study uses an integrated approach to investigate the offshore area of Kissamos Bay, NW Crete Island, Greece, as a prospective marine aggregate (MA) deposit. Non-fuel marine minerals and especially marine aggregates (sand and gravel) are reviewed from the perspective of resources during the last decades. The possible MA deposit of Kissamos Bay was explored during the implementation of the research project THALES-MARE, considering existing information of previous extraction activities in the wider area. Kissamos Bay is located at the inner continental shelf off NW Crete. The onshore basement rocks are composed of Mesozoic to Eocene limestones, shale and sandstone units, along with Neogene sediments such as marls, sandstones and claystones, which locally host Messinian gypsum layers. Sixteen sea-bottom sediment samples were collected with a Smith-McIntyretype grab along four transects, vertical to the shoreline, at water depths of 11 to 44m. A sub-bottom acoustic profiler survey was conducted in order to quantitatively determine the deposit (dimensions and structure). Mineralogical, geochemical, sedimentological and benthic analyses of the samples were carried out, in order to determine the quality of the reservoir and the environmental impact of a potential exploitation. Mineralogical results indicated that the bulk samples consist predominantly of quartz, while calcite occurs as a second significant phase. Chemical analysis of major and trace elements revealed that the average SiO2 content is around 55% with samples closer to the beach (depths Culture and Sports.

  20. How Less Alienation Creates More Exploitation? Audience Labour on Social Network Sites.

    Directory of Open Access Journals (Sweden)

    Eran Fisher

    2012-05-01

    Full Text Available Abstract: The notion of audience labour has been an important contribution to Marxist political economy of the media. It revised the traditional political economy analysis, which focused on media ownership, by suggesting that media was also a site of production, constituting particular relations of production. Such analysis highlighted the active role of audience in the creation of media value as both commodities and workers, thus pointing to audience exploitation. Recently, in light of paradigmatic transformations in the media environment – particularly the emergence of Web 2.0 and social network sites – there has been a renewed interest in such analysis, and a reexamination of audience exploitation. Focusing on Facebook as a case-study, this article examines audience labour on social network sites along two Marxist themes – exploitation and alienation. It argues for a historical shift in the link between exploitation and alienation of audience labour, concurrent with the shift from mass media to social media. In the mass media, the capacity for exploitation of audience labour was quite limited while the alienation that such work created was high. In contrast, social media allows for the expansion and intensification of exploitation. Simultaneously, audience labour on social media – because it involves communication and sociability – also ameliorates alienation by allowing self-expression, authenticity, and relations with others. Moreover, the article argues that the political economy of social network sites is founded on a dialectical link between exploitation and alienation: in order to be de-alienated, Facebook users must communicate and socialize, thus exacerbating their exploitation. And vice-versa, in order for Facebook to exploit the work of its users, it must contribute to their de-alienation.

  1. Exploiting Laboratory and Heliophysics Plasma Synergies

    Directory of Open Access Journals (Sweden)

    Jill Dahlburg

    2010-05-01

    Full Text Available Recent advances in space-based heliospheric observations, laboratory experimentation, and plasma simulation codes are creating an exciting new cross-disciplinary opportunity for understanding fast energy release and transport mechanisms in heliophysics and laboratory plasma dynamics, which had not been previously accessible. This article provides an overview of some new observational, experimental, and computational assets, and discusses current and near-term activities towards exploitation of synergies involving those assets. This overview does not claim to be comprehensive, but instead covers mainly activities closely associated with the authors’ interests and reearch. Heliospheric observations reviewed include the Sun Earth Connection Coronal and Heliospheric Investigation (SECCHI on the National Aeronautics and Space Administration (NASA Solar Terrestrial Relations Observatory (STEREO mission, the first instrument to provide remote sensing imagery observations with spatial continuity extending from the Sun to the Earth, and the Extreme-ultraviolet Imaging Spectrometer (EIS on the Japanese Hinode spacecraft that is measuring spectroscopically physical parameters of the solar atmosphere towards obtaining plasma temperatures, densities, and mass motions. The Solar Dynamics Observatory (SDO and the upcoming Solar Orbiter with the Heliospheric Imager (SoloHI on-board will also be discussed. Laboratory plasma experiments surveyed include the line-tied magnetic reconnection experiments at University of Wisconsin (relevant to coronal heating magnetic flux tube observations and simulations, and a dynamo facility under construction there; the Space Plasma Simulation Chamber at the Naval Research Laboratory that currently produces plasmas scalable to ionospheric and magnetospheric conditions and in the future also will be suited to study the physics of the solar corona; the Versatile Toroidal Facility at the Massachusetts Institute of Technology that

  2. Boys are not exempt: Sexual exploitation of adolescents in sub-Saharan Africa.

    Science.gov (United States)

    Adjei, Jones K; Saewyc, Elizabeth M

    2017-03-01

    Research on youth sexual exploitation in Africa has largely neglected the experiences of exploited boys. To date, much of the research in sub-Saharan Africa continues to consider boys mainly as exploiters but not as exploited. Using the only publicly available population-based surveys from the National Survey of Adolescents, conducted in four sub-Saharan African countries - Burkina Faso, Ghana, Malawi, and Uganda-we assessed factors associated with transactional sexual behaviour among never-married adolescent boys and girls. We also examined whether boys' reported sexual exploitation was linked to similar risky sexual behaviours as has been noted among girls in sub-Saharan Africa. Results from our analyses indicated that even though adolescent girls have a somewhat higher likelihood of reporting sexual abuse and exploitation, the odds of trading sex were significantly elevated for previously traumatized boys (that is those with a history of sexual and physical abuse) but not for their female counterparts. Just like adolescent girls, transactional sexual behaviour was associated with the risk of having concurrent multiple sexual partners for boys. These findings support the reality of boys' sexual exploitation within the African context, and further highlight the importance of including males in general and boys in particular in population-based studies on sexual health, risk, and protective factors in the sub-Saharan African region. Understanding the factors linked to sexual exploitation for both boys and girls will help in developing policies and programs that could improve the overall sexual and reproductive health outcomes among adolescents and youth in sub-Saharan Africa. Copyright © 2017 Elsevier Ltd. All rights reserved.

  3. Wave Energy Converters : An experimental approach to onshore testing, deployments and offshore monitoring

    OpenAIRE

    Ulvgård, Liselotte

    2017-01-01

    The wave energy converter (WEC) concept developed at Uppsala University consists of a point absorbing buoy, directly connected to a permanent magnet linear generator. Since 2006, over a dozen full scale WECs have been deployed at the Lysekil Research Site, on the west coast of Sweden. Beyond the development of the WEC concept itself, the full scale approach enables, and requires, experimental and multidisciplinary research within several peripheral areas, such as instrumentation, offshore ope...

  4. A Descriptive Study on Sexually Exploited Children in Residential Treatment

    Science.gov (United States)

    Twill, Sarah E.; Green, Denise M.; Traylor, Amy

    2010-01-01

    Sexual exploitation and prostitution of children and adolescents is a multibillion dollar industry in the United States (Estes and Weiner in "Medical, legal & social science aspects of child sexual exploitation: A comprehensive review of pornography, prostitution, and internet crimes, vol I," G.W. Medical Publishing, Inc, St Louis,…

  5. Exploiting tumor shrinkage through temporal optimization of radiotherapy

    International Nuclear Information System (INIS)

    Unkelbach, Jan; Craft, David; Hong, Theodore; Papp, Dávid; Wolfgang, John; Bortfeld, Thomas; Ramakrishnan, Jagdish; Salari, Ehsan

    2014-01-01

    In multi-stage radiotherapy, a patient is treated in several stages separated by weeks or months. This regimen has been motivated mostly by radiobiological considerations, but also provides an approach to reduce normal tissue dose by exploiting tumor shrinkage. The paper considers the optimal design of multi-stage treatments, motivated by the clinical management of large liver tumors for which normal liver dose constraints prohibit the administration of an ablative radiation dose in a single treatment. We introduce a dynamic tumor model that incorporates three factors: radiation induced cell kill, tumor shrinkage, and tumor cell repopulation. The design of multi-stage radiotherapy is formulated as a mathematical optimization problem in which the total dose to the normal tissue is minimized, subject to delivering the prescribed dose to the tumor. Based on the model, we gain insight into the optimal administration of radiation over time, i.e. the optimal treatment gaps and dose levels. We analyze treatments consisting of two stages in detail. The analysis confirms the intuition that the second stage should be delivered just before the tumor size reaches a minimum and repopulation overcompensates shrinking. Furthermore, it was found that, for a large range of model parameters, approximately one-third of the dose should be delivered in the first stage. The projected benefit of multi-stage treatments in terms of normal tissue sparing depends on model assumptions. However, the model predicts large dose reductions by more than a factor of 2 for plausible model parameters. The analysis of the tumor model suggests that substantial reduction in normal tissue dose can be achieved by exploiting tumor shrinkage via an optimal design of multi-stage treatments. This suggests taking a fresh look at multi-stage radiotherapy for selected disease sites where substantial tumor regression translates into reduced target volumes. (paper)

  6. Study of Monte Carlo approach to experimental uncertainty propagation with MSTW 2008 PDFs

    CERN Document Server

    Watt, G.

    2012-01-01

    We investigate the Monte Carlo approach to propagation of experimental uncertainties within the context of the established 'MSTW 2008' global analysis of parton distribution functions (PDFs) of the proton at next-to-leading order in the strong coupling. We show that the Monte Carlo approach using replicas of the original data gives PDF uncertainties in good agreement with the usual Hessian approach using the standard Delta(chi^2) = 1 criterion, then we explore potential parameterisation bias by increasing the number of free parameters, concluding that any parameterisation bias is likely to be small, with the exception of the valence-quark distributions at low momentum fractions x. We motivate the need for a larger tolerance, Delta(chi^2) > 1, by making fits to restricted data sets and idealised consistent or inconsistent pseudodata. Instead of using data replicas, we alternatively produce PDF sets randomly distributed according to the covariance matrix of fit parameters including appropriate tolerance values,...

  7. A semantic web approach applied to integrative bioinformatics experimentation: a biological use case with genomics data.

    NARCIS (Netherlands)

    Post, L.J.G.; Roos, M.; Marshall, M.S.; van Driel, R.; Breit, T.M.

    2007-01-01

    The numerous public data resources make integrative bioinformatics experimentation increasingly important in life sciences research. However, it is severely hampered by the way the data and information are made available. The semantic web approach enhances data exchange and integration by providing

  8. Imouraren mining exploitation : Complementary studies Synthetic report Volum B - Mines

    International Nuclear Information System (INIS)

    1980-01-01

    The object of the current study is to determine the main technical characteristics of the reference project of a mine that can supply the necessary ore quantity at a production of 3000 tonnes uranium per year, along 10 years. The project is one of the possible solutions for exploiting the mine. The current study permits to establish : investment and functioning cost estimation, overall project of the mining exploitation program, necessary strength estimation, average ore grades evaluation and variations of these grades, utilities needs, production vizing program, main exploitation methods and necessary materials. Reference project study of the mine serves as base to the economics studies and studies optimization [fr

  9. Exploitative and hierarchical antagonism in a cooperative bacterium.

    Directory of Open Access Journals (Sweden)

    Francesca Fiegna

    2005-11-01

    Full Text Available Social organisms that cooperate with some members of their own species, such as close relatives, may fail to cooperate with other genotypes of the same species. Such noncooperation may take the form of outright antagonism or social exploitation. Myxococcus xanthus is a highly social prokaryote that cooperatively develops into spore-bearing, multicellular fruiting bodies in response to starvation. Here we have characterized the nature of social interactions among nine developmentally proficient strains of M. xanthus isolated from spatially distant locations. Strains were competed against one another in all possible pairwise combinations during starvation-induced development. In most pairings, at least one competitor exhibited strong antagonism toward its partner and a majority of mixes showed bidirectional antagonism that decreased total spore production, even to the point of driving whole populations to extinction. Differential response to mixing was the primary determinant of competitive superiority rather than the sporulation efficiencies of unmixed populations. In some competitive pairings, the dominant partner sporulated more efficiently in mixed populations than in clonal isolation. This finding represents a novel form of exploitation in bacteria carried out by socially competent genotypes and is the first documentation of social exploitation among natural bacterial isolates. Patterns of antagonistic superiority among these strains form a highly linear dominance hierarchy. At least some competition pairs construct chimeric, rather than segregated, fruiting bodies. The cooperative prokaryote M. xanthus has diverged into a large number of distinct social types that cooperate with clone-mates but exhibit intense antagonism toward distinct social types of the same species. Most lengthy migration events in nature may thus result in strong antagonism between migratory and resident populations, and this antagonism may have large effects on local

  10. A realistic approach to modeling an in-duct desulfurization process based on an experimental pilot plant study

    Energy Technology Data Exchange (ETDEWEB)

    Ortiz, F.J.G.; Ollero, P. [University of Seville, Seville (Spain)

    2008-07-15

    This paper has been written to provide a realistic approach to modeling an in-duct desulfurization process and because of the disagreement between the results predicted by published kinetic models of the reaction between hydrated lime and SO{sub 2} at low temperature and the experimental results obtained in pilot plants where this process takes place. Results were obtained from an experimental program carried out in a 3-MWe pilot plant. Additionally, five kinetic models, from the literature, of the reaction of sulfation of Ca(OH){sub 2} at low temperatures were assessed by simulation and indicate that the desulfurization efficiencies predicted by them are clearly lower than those experimentally obtained in our own pilot plant as well as others. Next, a general model was fitted by minimizing the difference between the calculated and the experimental results from the pilot plant, using Matlab{sup TM}. The parameters were reduced as much as possible, to only two. Finally, after implementing this model in a simulation tool of the in-duct sorbent injection process, it was validated and it was shown to yield a realistic approach useful for both analyzing results and aiding in the design of an in-duct desulfurization process.

  11. Optimization of the representativeness and transposition approach, for the neutronic design of experimental programs in critical mock-up

    International Nuclear Information System (INIS)

    Dos-Santos, N.

    2013-01-01

    The work performed during this thesis focused on uncertainty propagation (nuclear data, technological uncertainties, calculation biases,...) on integral parameters, and the development of a novel approach enabling to reduce this uncertainty a priori directly from the design phase of a new experimental program. This approach is based on a multi-parameter multi-criteria extension of representativeness and transposition theories. The first part of this PhD work covers an optimization study of sensitivity and uncertainty calculation schemes to different modeling scales (cell, assembly and whole core) for LWRs and FBRs. A degraded scheme, based on standard and generalized perturbation theories, has been validated for the calculation of uncertainty propagation to various integral quantities of interest. It demonstrated the good a posteriori representativeness of the EPICURE experiment for the validation of mixed UOX-MOX loadings, as the importance of some nuclear data in the power tilt phenomenon in large LWR cores. The second part of this work was devoted to methods and tools development for the optimized design of experimental programs in ZPRs. Those methods are based on multi-parameters representativeness using simultaneously various quantities of interest. Finally, an original study has been conducted on the rigorous estimation of correlations between experimental programs in the transposition process. The coupling of experimental correlations and multi-parametric representativeness approach enables to efficiently design new programs, able to answer additional qualification requirements on calculation tools. (author) [fr

  12. Modeling a hierarchical structure of factors influencing exploitation policy for water distribution systems using ISM approach

    Science.gov (United States)

    Jasiulewicz-Kaczmarek, Małgorzata; Wyczółkowski, Ryszard; Gładysiak, Violetta

    2017-12-01

    Water distribution systems are one of the basic elements of contemporary technical infrastructure of urban and rural areas. It is a complex engineering system composed of transmission networks and auxiliary equipment (e.g. controllers, checkouts etc.), scattered territorially over a large area. From the water distribution system operation point of view, its basic features are: functional variability, resulting from the need to adjust the system to temporary fluctuations in demand for water and territorial dispersion. The main research questions are: What external factors should be taken into account when developing an effective water distribution policy? Does the size and nature of the water distribution system significantly affect the exploitation policy implemented? These questions have shaped the objectives of research and the method of research implementation.

  13. A mixed integer linear programming model for integrating thermodynamic cycles for waste heat exploitation in process sites

    International Nuclear Information System (INIS)

    Oluleye, Gbemi; Smith, Robin

    2016-01-01

    Highlights: • MILP model developed for integration of waste heat recovery technologies in process sites. • Five thermodynamic cycles considered for exploitation of industrial waste heat. • Temperature and quantity of multiple waste heat sources considered. • Interactions with the site utility system considered. • Industrial case study presented to illustrate application of the proposed methodology. - Abstract: Thermodynamic cycles such as organic Rankine cycles, absorption chillers, absorption heat pumps, absorption heat transformers, and mechanical heat pumps are able to utilize wasted thermal energy in process sites for the generation of electrical power, chilling and heat at a higher temperature. In this work, a novel systematic framework is presented for optimal integration of these technologies in process sites. The framework is also used to assess the best design approach for integrating waste heat recovery technologies in process sites, i.e. stand-alone integration or a systems-oriented integration. The developed framework allows for: (1) selection of one or more waste heat sources (taking into account the temperatures and thermal energy content), (2) selection of one or more technology options and working fluids, (3) selection of end-uses of recovered energy, (4) exploitation of interactions with the existing site utility system and (5) the potential for heat recovery via heat exchange is also explored. The methodology is applied to an industrial case study. Results indicate a systems-oriented design approach reduces waste heat by 24%; fuel consumption by 54% and CO_2 emissions by 53% with a 2 year payback, and stand-alone design approach reduces waste heat by 12%; fuel consumption by 29% and CO_2 emissions by 20.5% with a 4 year payback. Therefore, benefits from waste heat utilization increase when interactions between the existing site utility system and the waste heat recovery technologies are explored simultaneously. The case study also shows

  14. HBC-Evo: predicting human breast cancer by exploiting amino acid sequence-based feature spaces and evolutionary ensemble system.

    Science.gov (United States)

    Majid, Abdul; Ali, Safdar

    2015-01-01

    We developed genetic programming (GP)-based evolutionary ensemble system for the early diagnosis, prognosis and prediction of human breast cancer. This system has effectively exploited the diversity in feature and decision spaces. First, individual learners are trained in different feature spaces using physicochemical properties of protein amino acids. Their predictions are then stacked to develop the best solution during GP evolution process. Finally, results for HBC-Evo system are obtained with optimal threshold, which is computed using particle swarm optimization. Our novel approach has demonstrated promising results compared to state of the art approaches.

  15. Combined computational and experimental approach to improve the assessment of mitral regurgitation by echocardiography.

    Science.gov (United States)

    Sonntag, Simon J; Li, Wei; Becker, Michael; Kaestner, Wiebke; Büsen, Martin R; Marx, Nikolaus; Merhof, Dorit; Steinseifer, Ulrich

    2014-05-01

    Mitral regurgitation (MR) is one of the most frequent valvular heart diseases. To assess MR severity, color Doppler imaging (CDI) is the clinical standard. However, inadequate reliability, poor reproducibility and heavy user-dependence are known limitations. A novel approach combining computational and experimental methods is currently under development aiming to improve the quantification. A flow chamber for a circulatory flow loop was developed. Three different orifices were used to mimic variations of MR. The flow field was recorded simultaneously by a 2D Doppler ultrasound transducer and Particle Image Velocimetry (PIV). Computational Fluid Dynamics (CFD) simulations were conducted using the same geometry and boundary conditions. The resulting computed velocity field was used to simulate synthetic Doppler signals. Comparison between PIV and CFD shows a high level of agreement. The simulated CDI exhibits the same characteristics as the recorded color Doppler images. The feasibility of the proposed combination of experimental and computational methods for the investigation of MR is shown and the numerical methods are successfully validated against the experiments. Furthermore, it is discussed how the approach can be used in the long run as a platform to improve the assessment of MR quantification.

  16. EXPLOITATION OF GLASS SAND ON THE OPEN PIT »VRTLINSKA« (MOSLAVINA, CROATIA

    Directory of Open Access Journals (Sweden)

    Slavko Vujec

    1994-12-01

    Full Text Available The exploitation of glass sand in Slavonia and Moslavina has a long tradition. The open-pit »Vrtlinska« is-accordirtg to its dimensions and production capacity the biggest one in this regions. Exploitation reserves within this open pit amount about 1 000 000 t glass sand of a very good quality, and the production capacity is 200 000 t yearly according to real needs during design and opening the pit, i. e. before the war. This article discusses geological and geomechanical characteristics of the deposit, as well as the exploitation process, which is considerably matching natural characteristics of the deposit. A more detailed description is given of the planned exploitation phase I above groundwater level which is carried out according to discontinuous system. For the exploitation of the depth part under groundwater level in the phase II, the necessity of further examination of hydrogeological characteristics of the deposit is presented, in order to acquire necessary information on groundwater regime and drainage conditions. Such knowledge will influence the choice of the most appropriate solutions in the exploitation of the depth part of the deposit.

  17. [Impacts of hydroelectric cascade exploitation on river ecosystem and landscape: a review].

    Science.gov (United States)

    Yang, Kun; Deng, Xi; Li, Xue-Ling; Wen, Ping

    2011-05-01

    Hydroelectric cascade exploitation, one of the major ways for exploiting water resources and developing hydropower, not only satisfies the needs of various national economic sectors, but also promotes the socio-economic sustainable development of river basin. unavoidable anthropogenic impacts on the entire basin ecosystem. Based on the process of hydroelectric cascade exploitation and the ecological characteristics of river basins, this paper reviewed the major impacts of hydroelectric cascade exploitation on dam-area ecosystems, river reservoirs micro-climate, riparian ecosystems, river aquatic ecosystems, wetlands, and river landscapes. Some prospects for future research were offered, e.g., strengthening the research of chain reactions and cumulative effects of ecological factors affected by hydroelectric cascade exploitation, intensifying the study of positive and negative ecological effects under the dam networks and their joint operations, and improving the research of successional development and stability of basin ecosystems at different temporal and spatial scales.

  18. The exploitation of living resources in the Dutch Wadden Sea : a historical overview

    NARCIS (Netherlands)

    Wolff, W J

    An overview, based on written sources and personal observations, is presented of exploitation of living resources in and around the Dutch Wadden Sea during the past few centuries. It is concluded that before about 1900 exploitation was almost unrestricted. Exploitation of plants has been documented

  19. Numerical simulation of gas hydrate exploitation from subsea reservoirs in the Black Sea

    Science.gov (United States)

    Janicki, Georg; Schlüter, Stefan; Hennig, Torsten; Deerberg, Görge

    2017-04-01

    Natural gas (methane) is the most environmental friendly source of fossil energy. When coal is replace by natural gas in power production the emission of carbon dioxide is reduced by 50 %. The vast amount of methane assumed in gas hydrate deposits can help to overcome a shortage of fossil energy resources in the future. To increase their potential for energy applications new technological approaches are being discussed and developed worldwide. Besides technical challenges that have to be overcome climate and safety issues have to be considered before a commercial exploitation of such unconventional reservoirs. The potential of producing natural gas from subsea gas hydrate deposits by various means (e. g. depressurization and/or carbon dioxide injection) is numerically studied in the frame of the German research project »SUGAR - Submarine Gas Hydrate Reservoirs«. In order to simulate the exploitation of hydrate-bearing sediments in the subsea, an in-house simulation model HyReS which is implemented in the general-purpose software COMSOL Multiphysics is used. This tool turned out to be especially suited for the flexible implementation of non-standard correlations concerning heat transfer, fluid flow, hydrate kinetics, and other relevant model data. Partially based on the simulation results, the development of a technical concept and its evaluation are the subject of ongoing investigations, whereby geological and ecological criteria are to be considered. The results illustrate the processes and effects occurring during the gas production from a subsea gas hydrate deposit by depressurization. The simulation results from a case study for a deposit located in the Black Sea reveal that the production of natural gas by simple depressurization is possible but with quite low rates. It can be shown that the hydrate decomposition and thus the gas production strongly depend on the geophysical properties of the reservoir, the mass and heat transport within the reservoir, and

  20. PROBA-V Mission Exploitation Platform

    Directory of Open Access Journals (Sweden)

    Erwin Goor

    2016-07-01

    Full Text Available As an extension of the PROBA-Vegetation (PROBA-V user segment, the European Space Agency (ESA, de Vlaamse Instelling voor Technologisch Onderzoek (VITO, and partners TRASYS and Spacebel developed an operational Mission Exploitation Platform (MEP to drastically improve the exploitation of the PROBA-V Earth Observation (EO data archive, the archive from the historical SPOT-VEGETATION mission, and derived products by researchers, service providers, and thematic users. The analysis of the time series of data (petabyte range is addressed, as well as the large scale on-demand processing of the complete archive, including near real-time data. The platform consists of a private cloud environment, a Hadoop-based processing environment and a data manager. Several applications are released to the users, e.g., a full resolution viewing service, a time series viewer, pre-defined on-demand processing chains, and virtual machines with powerful tools and access to the data. After an initial release in January 2016 a research platform was deployed gradually, allowing users to design, debug, and test applications on the platform. From the PROBA-V MEP, access to, e.g., Sentinel-2 and Sentinel-3 data will be addressed as well.

  1. Exploitation of Unique Properties of Zeolites in the Development of Gas Sensors

    Directory of Open Access Journals (Sweden)

    Prabir K. Dutta

    2012-04-01

    Full Text Available The unique properties of microporous zeolites, including ion-exchange properties, adsorption, molecular sieving, catalysis, conductivity have been exploited in improving the performance of gas sensors. Zeolites have been employed as physical and chemical filters to improve the sensitivity and selectivity of gas sensors. In addition, direct interaction of gas molecules with the extraframework cations in the nanoconfined space of zeolites has been explored as a basis for developing new impedance-type gas/vapor sensors. In this review, we summarize how these properties of zeolites have been used to develop new sensing paradigms. There is a considerable breadth of transduction processes that have been used for zeolite incorporated sensors, including frequency measurements, optical and the entire gamut of electrochemical measurements. It is clear from the published literature that zeolites provide a route to enhance sensor performance, and it is expected that commercial manifestation of some of the approaches discussed here will take place. The future of zeolite-based sensors will continue to exploit its unique properties and use of other microporous frameworks, including metal organic frameworks. Zeolite composites with electronic materials, including metals will lead to new paradigms in sensing. Use of nano-sized zeolite crystals and zeolite membranes will enhance sensor properties and make possible new routes of miniaturized sensors.

  2. Determination of pKa and the corresponding structures of quinclorac using combined experimental and theoretical approaches

    Science.gov (United States)

    Song, Dean; Sun, Huiqing; Jiang, Xiaohua; Kong, Fanyu; Qiang, Zhimin; Zhang, Aiqian; Liu, Huijuan; Qu, Jiuhui

    2018-01-01

    As an emerging environmental contaminant, the herbicide quinclorac has attracted much attention in recent years. However, a very fundamental issue, the acid dissociation of quinclorac has not yet to be studied in detail. Herein, the pKa value and the corresponding structures of quinclorac were systematically investigated using combined experimental and theoretical approaches. The experimental pKa of quinclorac was determined by the spectrophotometric method to be 2.65 at 25 °C with ionic strength of 0.05 M, and was corrected to be 2.56 at ionic strength of zero. The molecular structures of quinclorac were then located by employing the DFT calculation. The anionic quinclorac was directly located with the carboxylic group perpendicular to the aromatic ring, while neutral quinclorac was found to be the equivalent twin structures. The result was further confirmed by analyzing the UV/Vis and MS-MS2 spectra from both experimental and theoretical viewpoints. By employing the QSPR approach, the theoretical pKa of QCR was determined to be 2.50, which is excellent agreement with the experimental result obtained herein. The protonation of QCR at the carboxylic group instead of the quinoline structure was attributed to the weak electronegative property of nitrogen atom induced by the electron-withdrawing groups. It is anticipated that this work could not only help in gaining a deep insight into the acid dissociation of quinclorac but also offering the key information on its reaction and interaction with others.

  3. A multi-scale experimental and simulation approach for fractured subsurface systems

    Science.gov (United States)

    Viswanathan, H. S.; Carey, J. W.; Frash, L.; Karra, S.; Hyman, J.; Kang, Q.; Rougier, E.; Srinivasan, G.

    2017-12-01

    Fractured systems play an important role in numerous subsurface applications including hydraulic fracturing, carbon sequestration, geothermal energy and underground nuclear test detection. Fractures that range in scale from microns to meters and their structure control the behavior of these systems which provide over 85% of our energy and 50% of US drinking water. Determining the key mechanisms in subsurface fractured systems has been impeded due to the lack of sophisticated experimental methods to measure fracture aperture and connectivity, multiphase permeability, and chemical exchange capacities at the high temperature, pressure, and stresses present in the subsurface. In this study, we developed and use microfluidic and triaxial core flood experiments required to reveal the fundamental dynamics of fracture-fluid interactions. In addition we have developed high fidelity fracture propagation and discrete fracture network flow models to simulate these fractured systems. We also have developed reduced order models of these fracture simulators in order to conduct uncertainty quantification for these systems. We demonstrate an integrated experimental/modeling approach that allows for a comprehensive characterization of fractured systems and develop models that can be used to optimize the reservoir operating conditions over a range of subsurface conditions.

  4. Development of an experimental approach to study coupled soil-plant-atmosphere processes using plant analogs

    Science.gov (United States)

    Trautz, Andrew C.; Illangasekare, Tissa H.; Rodriguez-Iturbe, Ignacio; Heck, Katharina; Helmig, Rainer

    2017-04-01

    The atmosphere, soils, and vegetation near the land-atmosphere interface are in a state of continuous dynamic interaction via a myriad of complex interrelated feedback processes which collectively, remain poorly understood. Studying the fundamental nature and dynamics of such processes in atmospheric, ecological, and/or hydrological contexts in the field setting presents many challenges; current experimental approaches are an important factor given a general lack of control and high measurement uncertainty. In an effort to address these issues and reduce overall complexity, new experimental design considerations (two-dimensional intermediate-scale coupled wind tunnel-synthetic aquifer testing using synthetic plants) for studying soil-plant-atmosphere continuum soil moisture dynamics are introduced and tested in this study. Validation of these experimental considerations, particularly the adoption of synthetic plants, is required prior to their application in future research. A comparison of three experiments with bare soil surfaces or transplanted with a Stargazer lily/limestone block was used to evaluate the feasibility of the proposed approaches. Results demonstrate that coupled wind tunnel-porous media experimentation, used to simulate field conditions, reduces complexity, and enhances control while allowing fine spatial-temporal resolution measurements to be made using state-of-the-art technologies. Synthetic plants further help reduce system complexity (e.g., airflow) while preserving the basic hydrodynamic functions of plants (e.g., water uptake and transpiration). The trends and distributions of key measured atmospheric and subsurface spatial and temporal variables (e.g., soil moisture, relative humidity, temperature, air velocity) were comparable, showing that synthetic plants can be used as simple, idealized, nonbiological analogs for living vegetation in fundamental hydrodynamic studies.

  5. Experimentation with low-energy positron beams

    International Nuclear Information System (INIS)

    Mills, A.P. Jr.

    1983-01-01

    The capability of studying the interactions of positrons with surfaces has recently been exploited by using ultra-high-vacuum techniques. The result has been a new understanding of how positrons interact with surfaces and because of this we are now able to make much stronger fluxes of slow positrons. The higher beam strengths in turn are opening up new possibilities for experimentation on surfaces and solids and for studying the atomic physics of positronium and positron-molecule scattering at low energies. The lectures are intended to review some of the history of this subject and to outline the present state of our knowledge of experimentation with low-energy positron beams. (orig./TW)

  6. Panel discussion on exploitation of geothermal resources in thermal zones

    Energy Technology Data Exchange (ETDEWEB)

    Viramonte, J G; Mange, J; Stefani, G

    1978-03-01

    The topics discussed include the major known geothermal resources, varying ways of exploiting geothermal resources, technical and economic difficulties in the exploitation, the place of geothermal energy in the total energy policy of a given country, advanced exploration techniques, and indications of needed areas of study. The panelists represented most of the South American countries, Mexico, and Italy. (JSR)

  7. Exploiting Non-Markovianity for Quantum Control.

    Science.gov (United States)

    Reich, Daniel M; Katz, Nadav; Koch, Christiane P

    2015-07-22

    Quantum technology, exploiting entanglement and the wave nature of matter, relies on the ability to accurately control quantum systems. Quantum control is often compromised by the interaction of the system with its environment since this causes loss of amplitude and phase. However, when the dynamics of the open quantum system is non-Markovian, amplitude and phase flow not only from the system into the environment but also back. Interaction with the environment is then not necessarily detrimental. We show that the back-flow of amplitude and phase can be exploited to carry out quantum control tasks that could not be realized if the system was isolated. The control is facilitated by a few strongly coupled, sufficiently isolated environmental modes. Our paradigmatic example considers a weakly anharmonic ladder with resonant amplitude control only, restricting realizable operations to SO(N). The coupling to the environment, when harnessed with optimization techniques, allows for full SU(N) controllability.

  8. Local Perspectives on Environmental Insecurity and Its Influence on Illegal Biodiversity Exploitation.

    Directory of Open Access Journals (Sweden)

    Meredith L Gore

    Full Text Available Environmental insecurity is a source and outcome of biodiversity declines and social conflict. One challenge to scaling insecurity reduction policies is that empirical evidence about local attitudes is overwhelmingly missing. We set three objectives: determine how local people rank risk associated with different sources of environmental insecurity; assess perceptions of environmental insecurity, biodiversity exploitation, myths of nature and risk management preferences; and explore relationships between perceptions and biodiversity exploitation. We conducted interviews (N = 88 with residents of Madagascar's Torotorofotsy Protected Area, 2014. Risk perceptions had a moderate effect on perceptions of environmental insecurity. We found no effects of environmental insecurity on biodiversity exploitation. Results offer one if not the first exploration of local perceptions of illegal biodiversity exploitation and environmental security. Local people's perception of risk seriousness associated with illegal biodiversity exploitation such as lemur hunting (low overall may not reflect perceptions of policy-makers (considered to be high. Discord is a key entry point for attention.

  9. An Exploitability Analysis Technique for Binary Vulnerability Based on Automatic Exception Suppression

    Directory of Open Access Journals (Sweden)

    Zhiyuan Jiang

    2018-01-01

    Full Text Available To quickly verify and fix vulnerabilities, it is necessary to judge the exploitability of the massive crash generated by the automated vulnerability mining tool. While the current manual analysis of the crash process is inefficient and time-consuming, the existing automated tools can only handle execute exceptions and some write exceptions but cannot handle common read exceptions. To address this problem, we propose a method of determining the exploitability based on the exception type suppression. This method enables the program to continue to execute until an exploitable exception is triggered. The method performs a symbolic replay of the crash sample, constructing and reusing data gadget, to bypass the complex exception, thereby improving the efficiency and accuracy of vulnerability exploitability analysis. The testing of typical CGC/RHG binary software shows that this method can automatically convert a crash that cannot be judged by existing analysis tools into a different crash type and judge the exploitability successfully.

  10. Comparison of algebraic and analytical approaches to the formulation of the statistical model-based reconstruction problem for X-ray computed tomography.

    Science.gov (United States)

    Cierniak, Robert; Lorent, Anna

    2016-09-01

    The main aim of this paper is to investigate properties of our originally formulated statistical model-based iterative approach applied to the image reconstruction from projections problem which are related to its conditioning, and, in this manner, to prove a superiority of this approach over ones recently used by other authors. The reconstruction algorithm based on this conception uses a maximum likelihood estimation with an objective adjusted to the probability distribution of measured signals obtained from an X-ray computed tomography system with parallel beam geometry. The analysis and experimental results presented here show that our analytical approach outperforms the referential algebraic methodology which is explored widely in the literature and exploited in various commercial implementations. Copyright © 2016 Elsevier Ltd. All rights reserved.

  11. The ALARA project of the EDF nuclear park exploitation

    International Nuclear Information System (INIS)

    Potoczek, J.

    1998-01-01

    To bring the exploitation of the nuclear park of EDF at the level of the best exploiters in the world in matter of collective and individual dosimetry, the ALARA principle coordinates numerous actions: to associate the temporary societies, to define common language, methods and tools for the whole park to organize a level effect in this area, to optimize the maintenance that is expansive in radiation doses, to make the different levels of management responsible on dosimetric stakes, to reduce the singular sources of exposure, to assure the organisation and exploitation of the experience back in this field and adapt consequently the system of information. The results are cheerful and the objectives for 2000 are: less than 1.2 h.Sv by year and by reactor, no intervener whom annual radiation dose is upper than 20 mSv (out of exceptional case). (N.C.)

  12. Reinforced concrete structures loaded by snow avalanches : numerical and experimental approaches.

    Science.gov (United States)

    Ousset, I.; Bertrand, D.; Brun, M.; Limam, A.; Naaim, M.

    2012-04-01

    Today, due to the extension of occupied areas in mountainous regions, new strategies for risk mitigation have to be developed. In the framework of risk analysis, these latter have to take into account not only the natural hazard description but also the physical vulnerability of the exposed structures. From a civil engineering point of view, the dynamic behavior of column or portico was widely investigated especially in the case of reinforced concrete and steel. However, it is not the case of reinforced concrete walls for which only the in-plan dynamic behavior (shear behavior) has been studied in detail in the field of earthquake engineering. Therefore, the aim of this project is to study the behavior of reinforced concrete civil engineering structures submitted to out-of-plan dynamic loadings coming from snow avalanche interaction. Numerical simulations in 2D or 3D by the finite element method (FEM) are presented. The approach allows solving mechanical problems in dynamic condition involving none linearities (especially none linear materials). Thus, the structure mechanical response can be explored in controlled conditions. First, a reinforced concrete wall with a L-like shape is considered. The structure is supposed to represent a French defense structure dedicated to protect people against snow avalanches. Experimental pushover tests have been performed on a physical model. The experimental tests consisted to apply a uniform distribution of pressure until the total collapse of the wall. A 2D numerical model has been developed to simulate the mechanical response of the structure under quasi-static loading. Numerical simulations have been compared to experimental datas and results gave a better understanding of the failure mode of the wall. Moreover, the influence of several parameters (geometry and the mechanical properties) is also presented. Secondly, punching shear experimental tests have also been carried out. Reinforced concrete slabs simply supported have

  13. DNA barcoding approaches for fishing authentication of exploited grouper species including the endangered and legally protected goliath grouper Epinephelus itajara

    Directory of Open Access Journals (Sweden)

    Rodrigo A. Torres

    2013-09-01

    Full Text Available Fishing strategies are constantly changing to meet the needs for new or alternative food sources. Consequently, management of fishing activities regarding rates of exploitation is essential, as a number of resources have reached situations of overexploitation. The aim of the present study was to use DNA barcoding from the goliath grouper and other exploited epinephelids in order to provide procedures for DNA authentication to be used as evidence for combating putative illegal fishing. The species studied were Epinephelus adscensionis, Mycteroperca bonaci, Mycteroperca interstitialis, Epinephelus itajara, Mycteroperca venenosa, Epinephelus mystacinus, Dermatolepis inermis, Alphestes afer, Cephalopholis fulva, Mycteroperca acutirostris, Rypticus saponaceus, Mycteroperca marginata and Epinephelus morio. Four of these species are the main epinephelids fished in the Atlantic Ocean. Differential patterns of polymerase chain reaction–restriction fragment length polymorphism were obtained from the species and additional single nucleotide polymorphisms were also detected among the four main epinephelids studied. The procedures proved very efficient and we suggest their applicability to the other fish groups as a way to control illegal capture and retail around the world, especially in cases in which filleting and other forms of de-characterization cause a lack of morpho-anatomical key characters.

  14. Cloud Based Earth Observation Data Exploitation Platforms

    Science.gov (United States)

    Romeo, A.; Pinto, S.; Loekken, S.; Marin, A.

    2017-12-01

    In the last few years data produced daily by several private and public Earth Observation (EO) satellites reached the order of tens of Terabytes, representing for scientists and commercial application developers both a big opportunity for their exploitation and a challenge for their management. New IT technologies, such as Big Data and cloud computing, enable the creation of web-accessible data exploitation platforms, which offer to scientists and application developers the means to access and use EO data in a quick and cost effective way. RHEA Group is particularly active in this sector, supporting the European Space Agency (ESA) in the Exploitation Platforms (EP) initiative, developing technology to build multi cloud platforms for the processing and analysis of Earth Observation data, and collaborating with larger European initiatives such as the European Plate Observing System (EPOS) and the European Open Science Cloud (EOSC). An EP is a virtual workspace, providing a user community with access to (i) large volume of data, (ii) algorithm development and integration environment, (iii) processing software and services (e.g. toolboxes, visualization routines), (iv) computing resources, (v) collaboration tools (e.g. forums, wiki, etc.). When an EP is dedicated to a specific Theme, it becomes a Thematic Exploitation Platform (TEP). Currently, ESA has seven TEPs in a pre-operational phase dedicated to geo-hazards monitoring and prevention, costal zones, forestry areas, hydrology, polar regions, urban areas and food security. On the technology development side, solutions like the multi cloud EO data processing platform provides the technology to integrate ICT resources and EO data from different vendors in a single platform. In particular it offers (i) Multi-cloud data discovery, (ii) Multi-cloud data management and access and (iii) Multi-cloud application deployment. This platform has been demonstrated with the EGI Federated Cloud, Innovation Platform Testbed Poland

  15. Accelerated Simplified Swarm Optimization with Exploitation Search Scheme for Data Clustering.

    Directory of Open Access Journals (Sweden)

    Wei-Chang Yeh

    Full Text Available Data clustering is commonly employed in many disciplines. The aim of clustering is to partition a set of data into clusters, in which objects within the same cluster are similar and dissimilar to other objects that belong to different clusters. Over the past decade, the evolutionary algorithm has been commonly used to solve clustering problems. This study presents a novel algorithm based on simplified swarm optimization, an emerging population-based stochastic optimization approach with the advantages of simplicity, efficiency, and flexibility. This approach combines variable vibrating search (VVS and rapid centralized strategy (RCS in dealing with clustering problem. VVS is an exploitation search scheme that can refine the quality of solutions by searching the extreme points nearby the global best position. RCS is developed to accelerate the convergence rate of the algorithm by using the arithmetic average. To empirically evaluate the performance of the proposed algorithm, experiments are examined using 12 benchmark datasets, and corresponding results are compared with recent works. Results of statistical analysis indicate that the proposed algorithm is competitive in terms of the quality of solutions.

  16. Tau-U: A Quantitative Approach for Analysis of Single-Case Experimental Data in Aphasia.

    Science.gov (United States)

    Lee, Jaime B; Cherney, Leora R

    2018-03-01

    Tau-U is a quantitative approach for analyzing single-case experimental design (SCED) data. It combines nonoverlap between phases with intervention phase trend and can correct for a baseline trend (Parker, Vannest, & Davis, 2011). We demonstrate the utility of Tau-U by comparing it with the standardized mean difference approach (Busk & Serlin, 1992) that is widely reported within the aphasia SCED literature. Repeated writing measures from 3 participants with chronic aphasia who received computer-based writing treatment are analyzed visually and quantitatively using both Tau-U and the standardized mean difference approach. Visual analysis alone was insufficient for determining an effect between the intervention and writing improvement. The standardized mean difference yielded effect sizes ranging from 4.18 to 26.72 for trained items and 1.25 to 3.20 for untrained items. Tau-U yielded significant (p data from 2 of 3 participants. Tau-U has the unique advantage of allowing for the correction of an undesirable baseline trend. Although further study is needed, Tau-U shows promise as a quantitative approach to augment visual analysis of SCED data in aphasia.

  17. Sensory exploitation and cultural transmission: the late emergence of iconic representations in human evolution.

    Science.gov (United States)

    Verpooten, Jan; Nelissen, Mark

    2010-09-01

    Iconic representations (i.e., figurative imagery and realistic art) only started to appear consistently some 45,000 years ago, although humans have been anatomically modern since 200,000-160,000 years ago. What explains this? Some authors have suggested a neurocognitive change took place, leading to a creative explosion, although this has been contested. Here, we examine the hypothesis that demographic changes caused cultural "cumulative adaptive evolution" and as such the emergence of modern symbolic behavior. This approach usefully explains the evolution of utilitarian skills and tools, and the creation of symbols to identify groups. However, it does not equally effectively explain the evolution of behaviors that may not be directly adaptive, such as the production of iconic representations like figurines and rock art. In order to shed light on their emergence, we propose to combine the above-mentioned cultural hypothesis with the concept of sensory exploitation. The concept essentially states that behavioral traits (in this case iconic art production) which exploit pre-existing sensory sensitivities will evolve if not hindered by costs (i.e., natural selection). In this view, iconic art traditions are evolved by piggy-backing on cumulative adaptive evolution. Since it is to date uncertain whether art has served any adaptive function in human evolution, parsimony demands paying more attention to the primary and a functional mechanism of sensory exploitation as opposed to mechanisms of models based exclusively on secondary benefits (such as Miller's, for instance, in which art is proposed to evolve as a sexual display of fitness).

  18. The concept of exploitation in international human trafficking law

    OpenAIRE

    von der Pütten, Tuija Kaarina

    2017-01-01

    Human trafficking is commonly known as a criminal practice that takes place in the framework of sex trade: women and children are trafficked within a state, or from one state to another, for the purpose of sexual exploitation. Similarly, the early 20th century international conventions aimed to tackle ‘white slave traffic’, trafficking of women and children for sexual exploitation. However, it is misleading to see trafficking only within this context. People are trafficked so that they can be...

  19. A New Two-Step Approach for Hands-On Teaching of Gene Technology: Effects on Students' Activities during Experimentation in an Outreach Gene Technology Lab

    Science.gov (United States)

    Scharfenberg, Franz-Josef; Bogner, Franz X.

    2011-01-01

    Emphasis on improving higher level biology education continues. A new two-step approach to the experimental phases within an outreach gene technology lab, derived from cognitive load theory, is presented. We compared our approach using a quasi-experimental design with the conventional one-step mode. The difference consisted of additional focused…

  20. Assessing uncertainty and risk in exploited marine populations

    International Nuclear Information System (INIS)

    Fogarty, M.J.; Mayo, R.K.; O'Brien, L.; Serchuk, F.M.; Rosenberg, A.A.

    1996-01-01

    The assessment and management of exploited fish and invertebrate populations is subject to several types of uncertainty. This uncertainty translates into risk to the population in the development and implementation of fishery management advice. Here, we define risk as the probability that exploitation rates will exceed a threshold level where long term sustainability of the stock is threatened. We distinguish among several sources of error or uncertainty due to (a) stochasticity in demographic rates and processes, particularly in survival rates during the early fife stages; (b) measurement error resulting from sampling variation in the determination of population parameters or in model estimation; and (c) the lack of complete information on population and ecosystem dynamics. The first represents a form of aleatory uncertainty while the latter two factors represent forms of epistemic uncertainty. To illustrate these points, we evaluate the recent status of the Georges Bank cod stock in a risk assessment framework. Short term stochastic projections are made accounting for uncertainty in population size and for random variability in the number of young surviving to enter the fishery. We show that recent declines in this cod stock can be attributed to exploitation rates that have substantially exceeded sustainable levels

  1. Commercial sexual exploitation and sex trafficking of adolescents.

    Science.gov (United States)

    Chung, Richard J; English, Abigail

    2015-08-01

    This review describes the current state of commercial sexual exploitation and sex trafficking of adolescents in the United States and globally, the legal and health implications of this severe form of abuse, and the roles that pediatric and adolescent healthcare providers can play in addressing this issue. Although this form of exploitation and abuse is shrouded in secrecy, pediatric and adolescent healthcare providers are well positioned to respond when it arises. However, awareness and understanding of the issue are generally lacking among healthcare professionals, currently limiting their effectiveness in combating this problem. Although the empirical evidence base available to guide clinical care of victims of trafficking remains limited given the secretive nature of the abuse, important contributions to the multidisciplinary literature on this issue have been made in recent years, including the Institute of Medicine's landmark report in the United States. Commercial sexual exploitation and sex trafficking of adolescents represent a human rights tragedy that remains inadequately addressed. As preeminent advocates for the health and well-being of adolescents, pediatric and adolescent healthcare providers can play a crucial role in advancing efforts not only to intervene but also to prevent further victimization of vulnerable youth.

  2. Exploitation of linkage learning in evolutionary algorithms

    CERN Document Server

    Chen, Ying-ping

    2010-01-01

    The exploitation of linkage learning is enhancing the performance of evolutionary algorithms. This monograph examines recent progress in linkage learning, with a series of focused technical chapters that cover developments and trends in the field.

  3. Coaching the exploration and exploitation in active learning for interactive video retrieval.

    Science.gov (United States)

    Wei, Xiao-Yong; Yang, Zhen-Qun

    2013-03-01

    Conventional active learning approaches for interactive video/image retrieval usually assume the query distribution is unknown, as it is difficult to estimate with only a limited number of labeled instances available. Thus, it is easy to put the system in a dilemma whether to explore the feature space in uncertain areas for a better understanding of the query distribution or to harvest in certain areas for more relevant instances. In this paper, we propose a novel approach called coached active learning that makes the query distribution predictable through training and, therefore, avoids the risk of searching on a completely unknown space. The estimated distribution, which provides a more global view of the feature space, can be used to schedule not only the timing but also the step sizes of the exploration and the exploitation in a principled way. The results of the experiments on a large-scale data set from TRECVID 2005-2009 validate the efficiency and effectiveness of our approach, which demonstrates an encouraging performance when facing domain-shift, outperforms eight conventional active learning methods, and shows superiority to six state-of-the-art interactive video retrieval systems.

  4. Hybrid approaches to nanometer-scale patterning: Exploiting tailored intermolecular interactions

    International Nuclear Information System (INIS)

    Mullen, Thomas J.; Srinivasan, Charan; Shuster, Mitchell J.; Horn, Mark W.; Andrews, Anne M.; Weiss, Paul S.

    2008-01-01

    In this perspective, we explore hybrid approaches to nanometer-scale patterning, where the precision of molecular self-assembly is combined with the sophistication and fidelity of lithography. Two areas - improving existing lithographic techniques through self-assembly and fabricating chemically patterned surfaces - will be discussed in terms of their advantages, limitations, applications, and future outlook. The creation of such chemical patterns enables new capabilities, including the assembly of biospecific surfaces to be recognized by, and to capture analytes from, complex mixtures. Finally, we speculate on the potential impact and upcoming challenges of these hybrid strategies.

  5. The role of the noradrenergic system in the exploration-exploitation trade-off: a pharmacological study

    Directory of Open Access Journals (Sweden)

    Marieke Jepma

    2010-08-01

    Full Text Available Animal research and computational modeling have indicated an important role for the neuromodulatory locus coeruleus-norepinephrine (LC-NE system in the control of behavior. According to the adaptive gain theory, the LC-NE system is critical for optimizing behavioral performance by regulating the balance between exploitative and exploratory control states. However, crucial direct empirical tests of this theory in human subjects have been lacking. We used a pharmacological manipulation of the LC-NE system to test predictions of this theory in humans. In a double-blind parallel-groups design (N = 52, participants received 4 mg reboxetine (a selective norepinephrine reuptake inhibitor, 30 mg citalopram (a selective serotonin reuptake inhibitor or placebo. The adaptive gain theory predicted that the increased tonic NE levels induced by reboxetine would promote task disengagement and exploratory behavior. We assessed the effects of reboxetine on performance in two cognitive tasks designed to examine task (disengagement and exploitative versus exploratory behavior: a diminishing-utility task and a gambling task with a non-stationary pay-off structure. In contrast to predictions of the adaptive gain theory, we did not find differences in task (disengagement or exploratory behavior between the three experimental groups, despite demonstrable effects of the two drugs on non-specific central and autonomic nervous system parameters. Our findings suggest that the LC-NE system may not be involved in the regulation of the exploration-exploitation trade-off in humans, at least not within the context of a single task. It remains to be examined whether the LC-NE system is involved in random exploration exceeding the current task context.

  6. Annexe 3. Constitution d'une exploitation à Homs

    OpenAIRE

    2015-01-01

    ‘Abd al-Laṭīf, né en 1925, est jardinier à Horns. Il exploite avec son fils aîné et l'aide de deux de ses petits-fils un jardin de quelques 35 dunum (3,5 hectares) situé dans le zūr al-Ǧdīdeh, secteur central de la zone agricole. Cette grande exploitation, constituée de plusieurs parcelles ayant différents statuts, est en partie le produit d'une histoire familiale dont je voudrais présenter ici brièvement les principaux aspects. Figure 50 – Alliances matrimoniales entre la lignée de ‘Abbās e...

  7. Open pit coal exploitation viability. Margarita mine. Case of study

    International Nuclear Information System (INIS)

    Veloza, Julia; Molina, Jorge; Mejia, Humberto

    2006-01-01

    This paper provides an analysis of financial viability, planning and design for the new coal open pit exploitation for La Margarita mine, with coal-resources estimated on 440.139,7 ton. Dimension, design and economic evaluation were possible by three exploitation methods: (multiple bench, open cast contour, and terraces). Net present values (NVP) were calculated: $c 817,5; $c 518,5 and $c 645,2 respectively for each method (given in million current Colombian pesos $. $c 2380 are equivalent to $us 1) and rate of return (ROR) 78,33%; 34,0% and 38,62% respectively for each method. These indicators served as a parameter to choose the multiple bench method, which should be recalculated because it was necessary to work jointly with two pits and making feasible the project. in addition a general environmental evaluation was done, which is vital for the exploitation. Important impacts on the flower, animals, air, water were found, and measures of control, prevention and mitigation were stated. it is expected that this paper can be useful as a technical-economical support for the development of the open pit exploitation in the margarita mine

  8. Experimental and analytical combined thermal approach for local tribological understanding in metal cutting

    International Nuclear Information System (INIS)

    Artozoul, Julien; Lescalier, Christophe; Dudzinski, Daniel

    2015-01-01

    Metal cutting is a highly complex thermo-mechanical process. The knowledge of temperature in the chip forming zone is essential to understand it. Conventional experimental methods such as thermocouples only provide global information which is incompatible with the high stress and temperature gradients met in the chip forming zone. Field measurements are essential to understand the localized thermo-mechanical problem. An experimental protocol has been developed using advanced infrared imaging in order to measure temperature distribution in both the tool and the chip during an orthogonal or oblique cutting operation. It also provides several information on the chip formation process such as some geometrical characteristics (tool-chip contact length, chip thickness, primary shear angle) and thermo-mechanical information (heat flux dissipated in deformation zone, local interface heat partition ratio). A study is carried out on the effects of cutting conditions i.e. cutting speed, feed and depth of cut on the temperature distribution along the contact zone for an elementary operation. An analytical thermal model has been developed to process experimental data and access more information i.e. local stress or heat flux distribution. - Highlights: • A thermal analytical model is proposed for orthogonal cutting process. • IR thermography is used during cutting tests. • Combined experimental and modeling approaches are applied. • Heat flux and stress distribution at the tool-chip interface are determined. • The decomposition into sticking and sliding zones is defined.

  9. SEXUAL EXPLOITATION AND ABUSE BY UN PEACEKEEPERS ...

    African Journals Online (AJOL)

    Allaiac

    from sexual exploitation and sexual abuse (ST/SGB/2003/13) (UN, Secretary .... In addition, in most situations, UN personnel have enjoyed immunity from local .... 9 Official UN statistics show a higher incidence of allegations reported against.

  10. Augmented reality enabling intelligence exploitation at the edge

    Science.gov (United States)

    Kase, Sue E.; Roy, Heather; Bowman, Elizabeth K.; Patton, Debra

    2015-05-01

    Today's Warfighters need to make quick decisions while interacting in densely populated environments comprised of friendly, hostile, and neutral host nation locals. However, there is a gap in the real-time processing of big data streams for edge intelligence. We introduce a big data processing pipeline called ARTEA that ingests, monitors, and performs a variety of analytics including noise reduction, pattern identification, and trend and event detection in the context of an area of operations (AOR). Results of the analytics are presented to the Soldier via an augmented reality (AR) device Google Glass (Glass). Non-intrusive AR devices such as Glass can visually communicate contextually relevant alerts to the Soldier based on the current mission objectives, time, location, and observed or sensed activities. This real-time processing and AR presentation approach to knowledge discovery flattens the intelligence hierarchy enabling the edge Soldier to act as a vital and active participant in the analysis process. We report preliminary observations testing ARTEA and Glass in a document exploitation and person of interest scenario simulating edge Soldier participation in the intelligence process in disconnected deployment conditions.

  11. New extractive technologies for unconventional hydrocarbon exploitation and potential environmental hazards to the Guarani aquifer

    International Nuclear Information System (INIS)

    Meroni, E.; Pineiro, G.

    2014-01-01

    This investigation presents a scientific approach about the impact of hydraulic fracturing (f racking) in North America. We focus on the impacts to groundwater, to ascertain whether this technology would produce a similar impact if applied to Norte Basin of Uruguay and a possible impact on the Guarani aquifer. The non- conventional methodologies for hydrocarbon exploitation are described and analysed, taking into account in particular, the characteristics and the profitability of the geological formations that might be potential sources in the Norte Basin of Uruguay. By several in-depth interviews to academic, technic and politic personalities we explored the amount and quality of information that Uruguayan people have about the presence of shale oil and gas resources in the country, as well as on the current normative for their eventual exploitation, and on the contracts that the Uruguayan government has already signed with international oil companies pending the studies required by the current pertinent environmental regulation. The risks for the Guarani Aquifer System if applying hydraulic fracture in rocks directly related to those containing the aquifer, is also analysed

  12. BIO-EXPLOITATION STATUS OF BOMBAY DUCK (Harpadon nehereus HAMILTON, 1822 ON TRAWL FISHERY IN TARAKAN WATERS

    Directory of Open Access Journals (Sweden)

    Duto Nugroho

    2015-06-01

    Full Text Available North Kalimantan Province, notably Tarakan City marine waters, is one of the important fishing ground in boundary area among Sulu Sulawesi Marine Ecoregion. It produces approximately 100 mt/annum of Bombay duck (Harpadon nehereus with valued of US$ 750,000. The sustainability of this fishery is a crucially concern given the following: substantial economic contribution, significant dependence of small-scale fishers on this species for their livelihoods. The fishing intensities considerable and growing threats to their habitats. To evaluate the vulnerability of individual species to over exploitation, the spawning potential ratio (SPR approach applied to describe the status of its existing fisheries. This approach provides the ability to determine fishing mortality as reference points to enhance its sustainability. The objective of this study is to understand this fish biomass resilience to harvesting. The calculated SPR based on the value of estimated length of first capture or Lc at 208 mm is equivalent to the SPR of 28%. With a base line of stocks are generally thought to risk recruitment declining when SPR <20%, recent finding indicated that the existing fishery can be generally described as nearly fully exploited. In recognition of this sector’s has an ecological importance and socio-economic significance, the sustainable development of Bombay duck fisheries should be initiated through developing local fishery committee to provide a their local fishery management plan.

  13. CellSs: Scheduling Techniques to Better Exploit Memory Hierarchy

    Directory of Open Access Journals (Sweden)

    Pieter Bellens

    2009-01-01

    Full Text Available Cell Superscalar's (CellSs main goal is to provide a simple, flexible and easy programming approach for the Cell Broadband Engine (Cell/B.E. that automatically exploits the inherent concurrency of the applications at a task level. The CellSs environment is based on a source-to-source compiler that translates annotated C or Fortran code and a runtime library tailored for the Cell/B.E. that takes care of the concurrent execution of the application. The first efforts for task scheduling in CellSs derived from very simple heuristics. This paper presents new scheduling techniques that have been developed for CellSs for the purpose of improving an application's performance. Additionally, the design of a new scheduling algorithm is detailed and the algorithm evaluated. The CellSs scheduler takes an extension of the memory hierarchy for Cell/B.E. into account, with a cache memory shared between the SPEs. All new scheduling practices have been evaluated showing better behavior of our system.

  14. Forming Limits in Sheet Metal Forming for Non-Proportional Loading Conditions - Experimental and Theoretical Approach

    International Nuclear Information System (INIS)

    Ofenheimer, Aldo; Buchmayr, Bruno; Kolleck, Ralf; Merklein, Marion

    2005-01-01

    The influence of strain paths (loading history) on material formability is well known in sheet forming processes. Sophisticated experimental methods are used to determine the entire shape of strain paths of forming limits for aluminum AA6016-T4 alloy. Forming limits for sheet metal in as-received condition as well as for different pre-deformation are presented. A theoretical approach based on Arrieux's intrinsic Forming Limit Stress Curve (FLSC) concept is employed to numerically predict the influence of loading history on forming severity. The detailed experimental strain paths are used in the theoretical study instead of any linear or bilinear simplified loading histories to demonstrate the predictive quality of forming limits in the state of stress

  15. The exploitation of swamp plants for dewatering liquid sewage sludge

    Directory of Open Access Journals (Sweden)

    Jiří Šálek

    2006-01-01

    Full Text Available The operators of little rural wastewater treatment plants have been interested in economic exploitation of sewage sludge in local conditions. The chance is searching simply and natural ways of processing and exploitation stabilized sewage sludge in agriculture. Manure substrate have been obtained by composting waterless sewage sludge including rest plant biomass after closing 6–8 years period of filling liquid sewage sludge to the basin. Main attention was focused on exploitation of swamp plants for dewatering liquid sewage sludge and determination of influence sewage sludge on plants, intensity and course of evapotranspiration and design and setting of drying beds. On the base of determined ability of swamp plants evapotranspiration were edited suggestion solutions of design and operation sludge bed facilities in the conditions of small rural wastewater treatment plant.

  16. Financial Exploitation Is Associated With Structural and Functional Brain Differences in Healthy Older Adults.

    Science.gov (United States)

    Spreng, R Nathan; Cassidy, Benjamin N; Darboh, Bri S; DuPre, Elizabeth; Lockrow, Amber W; Setton, Roni; Turner, Gary R

    2017-10-01

    Age-related brain changes leading to altered socioemotional functioning may increase vulnerability to financial exploitation. If confirmed, this would suggest a novel mechanism leading to heightened financial exploitation risk in older adults. Development of predictive neural markers could facilitate increased vigilance and prevention. In this preliminary study, we sought to identify structural and functional brain differences associated with financial exploitation in older adults. Financially exploited older adults (n = 13, 7 female) and a matched cohort of older adults who had been exposed to, but avoided, a potentially exploitative situation (n = 13, 7 female) were evaluated. Using magnetic resonance imaging, we examined cortical thickness and resting state functional connectivity. Behavioral data were collected using standardized cognitive assessments, self-report measures of mood and social functioning. The exploited group showed cortical thinning in anterior insula and posterior superior temporal cortices, regions associated with processing affective and social information, respectively. Functional connectivity encompassing these regions, within default and salience networks, was reduced, while between network connectivity was increased. Self-reported anger and hostility was higher for the exploited group. We observed financial exploitation associated with brain differences in regions involved in socioemotional functioning. These exploratory and preliminary findings suggest that alterations in brain regions implicated in socioemotional functioning may be a marker of financial exploitation risk. Large-scale, prospective studies are necessary to validate this neural mechanism, and develop predictive markers for use in clinical practice. © The Author 2017. Published by Oxford University Press on behalf of The Gerontological Society of America.

  17. Availability Control for Means of Transport in Decisive Semi-Markov Models of Exploitation Process

    Science.gov (United States)

    Migawa, Klaudiusz

    2012-12-01

    The issues presented in this research paper refer to problems connected with the control process for exploitation implemented in the complex systems of exploitation for technical objects. The article presents the description of the method concerning the control availability for technical objects (means of transport) on the basis of the mathematical model of the exploitation process with the implementation of the decisive processes by semi-Markov. The presented method means focused on the preparing the decisive for the exploitation process for technical objects (semi-Markov model) and after that specifying the best control strategy (optimal strategy) from among possible decisive variants in accordance with the approved criterion (criteria) of the activity evaluation of the system of exploitation for technical objects. In the presented method specifying the optimal strategy for control availability in the technical objects means a choice of a sequence of control decisions made in individual states of modelled exploitation process for which the function being a criterion of evaluation reaches the extreme value. In order to choose the optimal control strategy the implementation of the genetic algorithm was chosen. The opinions were presented on the example of the exploitation process of the means of transport implemented in the real system of the bus municipal transport. The model of the exploitation process for the means of transports was prepared on the basis of the results implemented in the real transport system. The mathematical model of the exploitation process was built taking into consideration the fact that the model of the process constitutes the homogenous semi-Markov process.

  18. Geographical aspects of exploitation of nuclear energy in Europe

    International Nuclear Information System (INIS)

    Kurucova, S.

    2007-05-01

    The topic of exploitation of nuclear energy is becoming increasingly actual in the present time in connection with frequently discussed question of 'renaissance of nuclear energetics'. The work is aimed at research of geographical aspects of exploitation of nuclear energy for military and civil purposes on the territory of Europe. The base of work represents the analysis of theoretical aspects of research of energy, mainly of nuclear energy. The work examines the historical development of exploitation of nuclear energy since its discovery, through development of military nuclear industry in Europe, big attention is paid to spreading of nuclear energetics on the territory of Europe from its beginnings up to the present time. The main part of the work represents the analysis of the present situation of exploitation of nuclear energy for civil purposes in Europe. The attention is paid to so-called nuclear fuel cycle as complex chain of several reciprocally interconnected operations of nuclear fuel treatment. The monitoring of spatial relations among individual countries within their nuclear fuel cycles is emphasised. The analysis of historical development and of the present state of nuclear energetics finished up in the outline of the perspectives of its further development in Europe. The analysis of the tendencies of evolution of world energetic economy mentions on the trend of growth of energy consumption in the world and Europe, as well as on the important position of nuclear energy in the structure of energy sources. Summary in English language is included. (author)

  19. Surface laser marking optimization using an experimental design approach

    Science.gov (United States)

    Brihmat-Hamadi, F.; Amara, E. H.; Lavisse, L.; Jouvard, J. M.; Cicala, E.; Kellou, H.

    2017-04-01

    Laser surface marking is performed on a titanium substrate using a pulsed frequency doubled Nd:YAG laser ( λ= 532 nm, τ pulse=5 ns) to process the substrate surface under normal atmospheric conditions. The aim of the work is to investigate, following experimental and statistical approaches, the correlation between the process parameters and the response variables (output), using a Design of Experiment method (DOE): Taguchi methodology and a response surface methodology (RSM). A design is first created using MINTAB program, and then the laser marking process is performed according to the planned design. The response variables; surface roughness and surface reflectance were measured for each sample, and incorporated into the design matrix. The results are then analyzed and the RSM model is developed and verified for predicting the process output for the given set of process parameters values. The analysis shows that the laser beam scanning speed is the most influential operating factor followed by the laser pumping intensity during marking, while the other factors show complex influences on the objective functions.

  20. Exploiting HRM in support of lean manufacturing

    DEFF Research Database (Denmark)

    Jørgensen, Frances; Matthiesen, Rikke

    The purpose of this paper is to investigate the ways in HRM practices are-and could potentially be-exploited to support lean manufacturing in practice. First, a review of the pertinent literature regarding HRM, SHRM, and lean manufacturing is presented to provide an understanding of the mechanisms...... by which HRM practices could, theoretically, be used to support a lean implementation. Data presented in the paper are derived from 1) a longitudinal case study on lean implementation and 2) from managers currently involved with lean manufacturing in a second company. The relevant literature and the data...... depicting the potential role in supporting HRM/lean integrated practices. The analysis of the model with respect to the theoretical background emphasizes a number of areas in which HRM could be more fully exploited in order to more successfully support lean implementation, for example, by stressing HRM...

  1. Experimental approach for adhesion strength of ATF cladding

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Donghyun; Kim, Hyochan; Yang, Yongsik; In, Wangkee [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of); Kim, Haksung [Hanyang University, Seoul (Korea, Republic of)

    2016-10-15

    The quality of a coating depends on the quality of its adhesion bond strength between the coating and the underlying substrate. Therefore, it is essential to evaluate the adhesion properties of the coating. There are many available test methods for the evaluation of coatings adhesion bond strength. Considering these restrictions of the coated cladding, the scratch test is useful for evaluation of adhesion properties compared to other methods. The purpose of the present study is to analyze the possibility of adhesion bond strength evaluation of ATF coated cladding by scratch testing on coatings cross sections. Experimental approach for adhesion strength of ATF coated cladding was investigated in the present study. The scratch testing was chosen as a testing method. Uncoated zircaloy-4 tube was employed as a reference and plasma spray and arc ion coating were selected as a ATF coated claddings for comparison. As a result, adhesion strengths of specimens affect the measured normal and tangential forces. For the future, the test will be conducted for CrAl coated cladding by laser coating, which is the most promising ATF cladding. Computational analysis with finite element method will also be conducted to analyze a stress distribution in the cladding tube.

  2. SEXUAL EXPLOITATION OF CHILDREN IN THE TOURISM – THE DARK SIDE OF TOURISM

    Directory of Open Access Journals (Sweden)

    Janez Mekinc

    2015-05-01

    Full Text Available The underlying causes of sexual exploitation and prostitution are poverty, inequality between women and men, high population growth and rural - urban migration. Victims are, predominantly, women and children with lower socio-economic status. One particular form of sexual exploitation is child sex tourism. This ruthless exploitation of children can be found throughout the world, predominantly in the third world and developing countries. Children, mainly between the ages of 6 to 14 years, are trapped in a vicious battle between large impoverished families who are dependent on their support, and a society that ruthlessly exploits them. In line with the trend in increasing child exploitation, there is, also, increasing exploitation of children for the purposes of child sex tourism. Based on the analysis of forms, reasons, impacts, consequences and trends of child sex tourism, it has been possible to develop from these findings some necessary measures to prevent this practice from occurring. Analysis of the phenomenon of child sex tourism has highlighted some fundamental conditions for preventing it becoming a social phenomenon. These include the strict implementation of laws against child labour and the political will to enforce them.

  3. The ESA Scientific Exploitation of Operational Missions element

    Science.gov (United States)

    Desnos, Yves-Louis; Regner, Peter; Delwart, Steven; Benveniste, Jerome; Engdahl, Marcus; Zehner, Claus; Mathieu, Pierre-Philippe; Bojkov, Bojan; Gascon, Ferran; Donlon, Craig; Davidson, Malcolm; Goryl, Philippe; Pinnock, Simon

    2015-04-01

    SEOM is a program element within the fourth period (2013-2017) of ESA's Earth Observation Envelope Programme (http://seom.esa.int/). The prime objective is to federate, support and expand the international research community that the ERS,ENVISAT and the Envelope programmes have built up over the last 25 years. It aims to further strengthen the leadership of the European Earth Observation research community by enabling them to extensively exploit future European operational EO missions. SEOM will enable the science community to address new scientific research that are opened by free and open access to data from operational EO missions. Based on community-wide recommendations for actions on key research issues, gathered through a series of international thematic workshops and scientific user consultation meetings, a work plan has been established and is approved every year by ESA Members States. The 2015 SEOM work plan is covering the organisation of three Science users consultation workshops for Sentinel1/3/5P , the launch of new R&D studies for scientific exploitation of the Sentinels, the development of open-source multi-mission scientific toolboxes, the organisation of advanced international training courses, summer schools and educational materials, as well as activities for promoting the scientific use of EO data. The first SEOM projects have been tendered since 2013 including the development of Sentinel toolboxes, advanced INSAR algorithms for Sentinel-1 TOPS data exploitation, Improved Atmospheric Spectroscopic data-base (IAS), as well as grouped studies for Sentinel-1, -2, and -3 land and ocean applications and studies for exploiting the synergy between the Sentinels. The status and first results from these SEOM projects will be presented and an outlook for upcoming SEOM studies will be given.

  4. Regulatory Framework on Exploration and Exploitation of Croatian Part of Adriatic

    International Nuclear Information System (INIS)

    Mudric, M.

    2015-01-01

    As the prelude to the regulation of marine exploration and exploitation activities in the Croatian Adriatic waters, the new Mining Act and Act on exploration and exploitation of hydrocarbons have provided a general legal framework for the natural resources exploration and exploitation. The latter Act also appropriated the establishment of the independent regulatory body, the Hydrocarbon Agency. It is important to mention the Decree on Fees for exploration and production of hydrocarbons, and the Decree on main technical requirements on safety and security of offshore exploration and production of hydrocarbons in the Republic of Croatia, that are of special relevance for the current activities with regard the proposed project of exploration and exploitation of the Croatian waters in search for gas and oil sea-bed deposits. The Hydrocarbon Agency has published the Strategic Study of the Likely Significant Environmental Impact of the Framework Plan and Program of Exploration and Production of Hydrocarbons in the Adriatic, a document receiving a lot of criticism from the legal experts and general public. At the same time, the experts tend to support the general idea of sea-bed exploration and exploitation, with the major antagonism still being present in the general public, with several initiatives introducing the possibility of a public referenda to oppose the sea-bed exploration and exploitation. The Government is currently preparing the Act on the Safety of Offshore Hydrocarbon Exploration and Production Operations, based on the Directive 94/22/EC of the European Parliament and of the Council of 30 May 1994 on the conditions for granting and using authorizations for the prospection, exploration and production of hydrocarbons, the Commission Implementing Regulation (EU) No 1112/2014 of 13 October 2014 determining a common format for sharing of information on major hazard indicators by the operators and owners of offshore oil and gas installations and a common format

  5. Exploitation of Factory Workers: A Study of Union Dicon Salt, Lagos ...

    African Journals Online (AJOL)

    The study examined labour exploitation in Nigeria with particular reference to Union Dicon Salt Plc., Lagos. The review of literature points to the fact that exploitation of the factory workers in the long run leads to strained relationships between management and staff. The situation becomes conflictual to the extent that both ...

  6. Mutations that Cause Human Disease: A Computational/Experimental Approach

    Energy Technology Data Exchange (ETDEWEB)

    Beernink, P; Barsky, D; Pesavento, B

    2006-01-11

    International genome sequencing projects have produced billions of nucleotides (letters) of DNA sequence data, including the complete genome sequences of 74 organisms. These genome sequences have created many new scientific opportunities, including the ability to identify sequence variations among individuals within a species. These genetic differences, which are known as single nucleotide polymorphisms (SNPs), are particularly important in understanding the genetic basis for disease susceptibility. Since the report of the complete human genome sequence, over two million human SNPs have been identified, including a large-scale comparison of an entire chromosome from twenty individuals. Of the protein coding SNPs (cSNPs), approximately half leads to a single amino acid change in the encoded protein (non-synonymous coding SNPs). Most of these changes are functionally silent, while the remainder negatively impact the protein and sometimes cause human disease. To date, over 550 SNPs have been found to cause single locus (monogenic) diseases and many others have been associated with polygenic diseases. SNPs have been linked to specific human diseases, including late-onset Parkinson disease, autism, rheumatoid arthritis and cancer. The ability to predict accurately the effects of these SNPs on protein function would represent a major advance toward understanding these diseases. To date several attempts have been made toward predicting the effects of such mutations. The most successful of these is a computational approach called ''Sorting Intolerant From Tolerant'' (SIFT). This method uses sequence conservation among many similar proteins to predict which residues in a protein are functionally important. However, this method suffers from several limitations. First, a query sequence must have a sufficient number of relatives to infer sequence conservation. Second, this method does not make use of or provide any information on protein structure, which

  7. Economic factors of vulnerability trade and exploitation

    NARCIS (Netherlands)

    Allodi, L.

    2017-01-01

    Cybercrime markets support the development and diffusion of new attack technologies, vulnerability exploits, and malware. Whereas the revenue streams of cyber attackers have been studied multiple times in the literature, no quantitative account currently exists on the economics of attack acquisition

  8. Thermal exploitation of shallow aquifers. Guide for the preparation of preliminary studies of technical feasibility

    International Nuclear Information System (INIS)

    Ausseur, J.Y.; Sauty, J.P.

    1982-08-01

    This report presents the main devices aimed at exploiting surface aquifers. After an introduction to the different systems of thermal exploitation of aquifers (generalities, very low energy geothermal, sensitive heat storage, interest of thermal exploitation of aquifers, indication of possible systems), this report presents the different possible systems and analyses their characteristics and performance. These systems are: direct exploitation of groundwater bodies at their natural temperature by heat sink and with release in surface networks or by geothermal dipole, or exploitation with artificial thermal refill. Thus the report addresses the single sink device with or without storage, heat pumps on dipole in surface groundwater bodies or very low temperature geothermal, the scanning dipole system, and the dipole system with hot sink and cold sink. It discusses the choice and sizing of the exploitation system. An appendix reports a feasibility preliminary study of nine cases of thermal exploitation of surface aquifers by double drills

  9. Spectrally-balanced chromatic approach-lighting system

    Science.gov (United States)

    Chase, W. D.

    1977-01-01

    Approach lighting system employing combinations of red and blue lights reduces problem of color-based optical illusions. System exploits inherent chromatic aberration of eye to create three-dimensional effect, giving pilot visual clues of position.

  10. Sexual slavery without borders: trafficking for commercial sexual exploitation in India

    Science.gov (United States)

    Joffres, Christine; Mills, Edward; Joffres, Michel; Khanna, Tinku; Walia, Harleen; Grund, Darrin

    2008-01-01

    Trafficking in women and children is a gross violation of human rights. However, this does not prevent an estimated 800 000 women and children to be trafficked each year across international borders. Eighty per cent of trafficked persons end in forced sex work. India has been identified as one of the Asian countries where trafficking for commercial sexual exploitation has reached alarming levels. While there is a considerable amount of internal trafficking from one state to another or within states, India has also emerged as a international supplier of trafficked women and children to the Gulf States and South East Asia, as well as a destination country for women and girls trafficked for commercial sexual exploitation from Nepal and Bangladesh. Trafficking for commercial sexual exploitation is a highly profitable and low risk business that preys on particularly vulnerable populations. This paper presents an overview of the trafficking of women and girls for sexual exploitation (CSE) in India; identifies the health impacts of CSE; and suggest strategies to respond to trafficking and related issues. PMID:18817576

  11. Sexual slavery without borders: trafficking for commercial sexual exploitation in India.

    Science.gov (United States)

    Joffres, Christine; Mills, Edward; Joffres, Michel; Khanna, Tinku; Walia, Harleen; Grund, Darrin

    2008-09-25

    Trafficking in women and children is a gross violation of human rights. However, this does not prevent an estimated 800 000 women and children to be trafficked each year across international borders. Eighty per cent of trafficked persons end in forced sex work. India has been identified as one of the Asian countries where trafficking for commercial sexual exploitation has reached alarming levels. While there is a considerable amount of internal trafficking from one state to another or within states, India has also emerged as a international supplier of trafficked women and children to the Gulf States and South East Asia, as well as a destination country for women and girls trafficked for commercial sexual exploitation from Nepal and Bangladesh. Trafficking for commercial sexual exploitation is a highly profitable and low risk business that preys on particularly vulnerable populations. This paper presents an overview of the trafficking of women and girls for sexual exploitation (CSE) in India; identifies the health impacts of CSE; and suggest strategies to respond to trafficking and related issues.

  12. Piloting the older adult financial exploitation measure in adult safeguarding services.

    Science.gov (United States)

    Phelan, A; Fealy, G; Downes, C

    Financial abuse is arguably the most complex form of elder abuse as it may occur remote to the older person and it is impacted by issues such as cultural values, perpetrator intent and family expectations. Financial abuse may not be recognised by either the older person or the perpetrator, thus, its prevention, early identification and amelioration are important. The (Irish) National Centre for the Protection of Older People undertook a study to determine the appropriateness of the Older Adult Financial Exploitation Measure for use by the national safeguarding older person services. Findings from a small pilot study involving 16 safeguarding staff's use of the Older Adult Financial Exploitation Measure with 52 community dwelling older people referred to their service demonstrate a higher suspicion of financial abuse as well as identifying multiple instances of possible financial exploitation in a single individual. Thus, the Older Adult Financial Exploitation Measure is considered appropriate to assist safeguarding personnel's assessment of older people related to a suspicion of financial abuse. Copyright © 2017 Elsevier B.V. All rights reserved.

  13. Algorithms exploiting ultrasonic sensors for subject classification

    Science.gov (United States)

    Desai, Sachi; Quoraishee, Shafik

    2009-09-01

    Proposed here is a series of techniques exploiting micro-Doppler ultrasonic sensors capable of characterizing various detected mammalian targets based on their physiological movements captured a series of robust features. Employed is a combination of unique and conventional digital signal processing techniques arranged in such a manner they become capable of classifying a series of walkers. These processes for feature extraction develops a robust feature space capable of providing discrimination of various movements generated from bipeds and quadrupeds and further subdivided into large or small. These movements can be exploited to provide specific information of a given signature dividing it in a series of subset signatures exploiting wavelets to generate start/stop times. After viewing a series spectrograms of the signature we are able to see distinct differences and utilizing kurtosis, we generate an envelope detector capable of isolating each of the corresponding step cycles generated during a walk. The walk cycle is defined as one complete sequence of walking/running from the foot pushing off the ground and concluding when returning to the ground. This time information segments the events that are readily seen in the spectrogram but obstructed in the temporal domain into individual walk sequences. This walking sequence is then subsequently translated into a three dimensional waterfall plot defining the expected energy value associated with the motion at particular instance of time and frequency. The value is capable of being repeatable for each particular class and employable to discriminate the events. Highly reliable classification is realized exploiting a classifier trained on a candidate sample space derived from the associated gyrations created by motion from actors of interest. The classifier developed herein provides a capability to classify events as an adult humans, children humans, horses, and dogs at potentially high rates based on the tested sample

  14. An Experimental Approach to the Joint Effects of Relations with Partner, Friends and Parents on Happiness

    Science.gov (United States)

    Theuns, P.; Verresen, N.; Mairesse, O.; Goossens, R.; Michiels, L.; Peeters, E.; Wastiau, M.

    2010-01-01

    Personal relations constitute an important life domain and satisfaction therein affects happiness in people. In an experimental approach with a 3x3x3 vignettes study in which 103 first year psychology students participated, the contribution of the quality of relationships with parents, friends, and a partner are studied. It is found that the…

  15. Science and society: different bioethical approaches towards animal experimentation.

    Science.gov (United States)

    Brom, Frans W A

    2002-01-01

    The use of live animals for experiments plays an important role in many forms of research. This gives rise to an ethical dilemma. On the one hand, most of the animals used are sentient beings who may be harmed by the experiments. The research, on the other hand, may be vital for preventing, curing or alleviating human diseases. There is no consensus on how to tackle this dilemma. One extreme is the view taken by adherents of the so-called animal rights view. According to this view, we are never justified in harming animals for human purposes - however vital these purposes may be. The other extreme is the ruthless view, according to which animals are there to be used at our discretion. However, most people have a view situated somewhere between these two extremes. It is accepted that animals may be used for research - contrary to the animal rights view. However, contrary to the ruthless view, that is only accepted under certain conditions. The aim of this presentation is to present different ethical views which may serve as a foundation for specifying the circumstances under which it is acceptable to use animals for research. Three views serving this role are contractarianism, utilitarianism and a deontological approach. According to contractarianism, the key ethical issue is concern for the sentiments of other human beings in society, on whose co-operation those responsible for research depend. Thus it is acceptable to use animals as long as most people can see the point of the experiment and are not offended by the way it is done. According to utilitarianism, the key ethical issue is about the consequences for humans and animals. Thus it is justified to use animals for research if enough good comes out of it in terms of preventing suffering and creating happiness, and if there is no better alternative. In the deontological approach the prima facie duty of beneficence towards human beings has to be weighed against the prima facie duties not to harm animals and to

  16. The possibility of increasing the efficiency of accessible coal deposits by optimizing dimensions of protective pillars or the scope of exploitation

    Science.gov (United States)

    Bańka, Piotr; Badura, Henryk; Wesołowski, Marek

    2017-11-01

    One of the ways to protect objects exposed to the influences of mining exploitation is establishing protective pillars for them. Properly determined pillar provides effective protection of the object for which it was established. Determining correct dimensions of a pillar requires taking into account contradictory requirements. Protection measures against the excessive influences of mining exploitation require designing the largest possible pillars, whereas economic requirements suggest a maximum reduction of the size of resources left in the pillar. This paper presents algorithms and programs developed for determining optimal dimensions of protective pillars for surface objects and shafts. The issue of designing a protective pillar was treated as a nonlinear programming task. The objective function are the resources left in a pillar while nonlinear limitations are the deformation values evoked by the mining exploitation. Resources in the pillar may be weighted e.g. by calorific value or by the inverse of output costs. The possibility of designing pillars of any polygon shape was taken into account. Because of the applied exploitation technologies the rectangular pillar shape should be considered more advantageous than the oval one, though it does not ensure the minimization of resources left in a pillar. In this article there is also presented a different approach to the design of protective pillars, which instead of fixing the pillar boundaries in subsequent seams, the length of longwall panels of the designed mining exploitation is limited in a way that ensures the effective protection of an object while maximizing the extraction ratio of the deposit.

  17. Exploiting indigenous knowledge in the environmental conservation ...

    African Journals Online (AJOL)

    ... of agriculture and reared livestock (especially goats). Over several years, they developed sustainable and effective exploitation mechanisms of the existing biodiversity resources to satisfy their individual needs and those of their societies in general. Journal of Language, Technology and Entrepreneurship in Africa Vol.

  18. Experimental Validation of Various Temperature Modells for Semi-Physical Tyre Model Approaches

    Science.gov (United States)

    Hackl, Andreas; Scherndl, Christoph; Hirschberg, Wolfgang; Lex, Cornelia

    2017-10-01

    With increasing level of complexity and automation in the area of automotive engineering, the simulation of safety relevant Advanced Driver Assistance Systems (ADAS) leads to increasing accuracy demands in the description of tyre contact forces. In recent years, with improvement in tyre simulation, the needs for coping with tyre temperatures and the resulting changes in tyre characteristics are rising significantly. Therefore, experimental validation of three different temperature model approaches is carried out, discussed and compared in the scope of this article. To investigate or rather evaluate the range of application of the presented approaches in combination with respect of further implementation in semi-physical tyre models, the main focus lies on the a physical parameterisation. Aside from good modelling accuracy, focus is held on computational time and complexity of the parameterisation process. To evaluate this process and discuss the results, measurements from a Hoosier racing tyre 6.0 / 18.0 10 LCO C2000 from an industrial flat test bench are used. Finally the simulation results are compared with the measurement data.

  19. Managerial attention to exploitation versus exploration : Toward a dynamic perspective on ambidexterity

    NARCIS (Netherlands)

    Walrave, B.; Romme, A.G.L.; van Oorschot, K.E.; Langerak, F.

    2017-01-01

    Managerial attention to exploitation and exploration has a strong influence on organizational performance. However, there is hardly any knowledge about whether senior managers need to adjust their distribution of attention to exploitation and exploration in response to major changes in demand

  20. Tasks related to increase of RA reactor exploitation and experimental potential, 03. Crane for handling the vertical experimental channels of the RA reactor - design project

    International Nuclear Information System (INIS)

    Pavicevic, M.

    1963-07-01

    Within the work related to improvement of experimental potential of the RA reactor, this document describes the design project of the new crane for handling the vertical experimental channels of the RA reactor, engineering drawings of the crane main elements, mechanical part, design project of the electrical part of the crane and cost estimation

  1. Water Exploitation and Its Outcomes Caused by Capitalism as Reflected on Gore Verbinski's Rango Movie

    OpenAIRE

    SETIAWAN, DANIEL NUGRAHA

    2014-01-01

    Nugraha Setiawan, Daniel. 2014. Water Exploitation and Its Outcome Caused byCapitalism as Reflected on Gore Verbinski's Rango Movie. Study Program ofEnglish, Universitas Brawijaya.Supervisor: Yusri Fajar, Co-supervisor: Melania Shinta Harendika.Keywords: water exploitation, environment, capitalism, Rango movie. Water exploitation threats ecosystem and causes a great damage to environment. One of the causes of the water exploitation is capitalism. The movie entitled Rango reveals some causes a...

  2. Boldness predicts an individual's position along an exploration-exploitation foraging trade-off.

    Science.gov (United States)

    Patrick, Samantha C; Pinaud, David; Weimerskirch, Henri

    2017-09-01

    Individuals do not have complete information about the environment and therefore they face a trade-off between gathering information (exploration) and gathering resources (exploitation). Studies have shown individual differences in components of this trade-off but how stable these strategies are in a population and the intrinsic drivers of these differences is not well understood. Top marine predators are expected to experience a particularly strong trade-off as many species have large foraging ranges and their prey often have a patchy distribution. This environment leads these species to exhibit pronounced exploration and exploitation phases but differences between individuals are poorly resolved. Personality differences are known to be important in foraging behaviour but also in the trade-off between exploration and exploitation. Here we test whether personality predicts an individual exploration-exploitation strategy using wide ranging wandering albatrosses (Diomedea exulans) as a model system. Using GPS tracking data from 276 wandering albatrosses, we extract foraging parameters indicative of exploration (searching) and exploitation (foraging) and show that foraging effort, time in patch and size of patch are strongly correlated, demonstrating these are indicative of an exploration-exploitation (EE) strategy. Furthermore, we show these are consistent within individuals and appear stable in the population, with no reproductive advantage. The searching and foraging behaviour of bolder birds placed them towards the exploration end of the trade-off, whereas shy birds showed greater exploitation. This result provides a mechanism through which individual foraging strategies may emerge. Age and sex affected components of the trade-off, but not the trade-off itself, suggesting these factors may drive behavioural compensation to maintain resource acquisition and this was supported by the evidence that there were no fitness consequence of any EE trait nor the trade

  3. Correct approach to consideration of experimental resolution in parametric analysis of scaling violation in deep inelastic lepton-nucleon interaction

    International Nuclear Information System (INIS)

    Ammosov, V.V.; Usubov, Z.U.; Zhigunov, V.P.

    1990-01-01

    A problem of parametric analysis of the scaling violation in deep inelastic lepton-nucleon interactions in the framework of quantum chromodynamics (QCD) is considered. For a correct consideration of the experimental resolution we use the χ 2 -method, which is demonstrated by numeric experiments and analysis of the 15-foot bubble chamber neutrino experimental data. The model parameters obtained in this approach differ noticeably from those obtained earlier. (orig.)

  4. Exploiting citation contexts for physics retrieval

    DEFF Research Database (Denmark)

    Dabrowska, Anna; Larsen, Birger

    2015-01-01

    The text surrounding citations within scientific papers may contain terms that usefully describe cited documents and can benefit retrieval. We present a preliminary study that investigates appending ci- tation contexts from citing documents to cited documents in the iSearch test collection. We ex...... in a large collection of physics papers, paving the way for future research that exploits citation contexts for retrieval....

  5. An Innovative Strategy for Accurate Thermal Compensation of Gyro Bias in Inertial Units by Exploiting a Novel Augmented Kalman Filter

    Directory of Open Access Journals (Sweden)

    Rita Fontanella

    2018-05-01

    Full Text Available This paper presents an innovative model for integrating thermal compensation of gyro bias error into an augmented state Kalman filter. The developed model is applied in the Zero Velocity Update filter for inertial units manufactured by exploiting Micro Electro-Mechanical System (MEMS gyros. It is used to remove residual bias at startup. It is a more effective alternative to traditional approach that is realized by cascading bias thermal correction by calibration and traditional Kalman filtering for bias tracking. This function is very useful when adopted gyros are manufactured using MEMS technology. These systems have significant limitations in terms of sensitivity to environmental conditions. They are characterized by a strong correlation of the systematic error with temperature variations. The traditional process is divided into two separated algorithms, i.e., calibration and filtering, and this aspect reduces system accuracy, reliability, and maintainability. This paper proposes an innovative Zero Velocity Update filter that just requires raw uncalibrated gyro data as input. It unifies in a single algorithm the two steps from the traditional approach. Therefore, it saves time and economic resources, simplifying the management of thermal correction process. In the paper, traditional and innovative Zero Velocity Update filters are described in detail, as well as the experimental data set used to test both methods. The performance of the two filters is compared both in nominal conditions and in the typical case of a residual initial alignment bias. In this last condition, the innovative solution shows significant improvements with respect to the traditional approach. This is the typical case of an aircraft or a car in parking conditions under solar input.

  6. An Innovative Strategy for Accurate Thermal Compensation of Gyro Bias in Inertial Units by Exploiting a Novel Augmented Kalman Filter.

    Science.gov (United States)

    Fontanella, Rita; Accardo, Domenico; Moriello, Rosario Schiano Lo; Angrisani, Leopoldo; Simone, Domenico De

    2018-05-07

    This paper presents an innovative model for integrating thermal compensation of gyro bias error into an augmented state Kalman filter. The developed model is applied in the Zero Velocity Update filter for inertial units manufactured by exploiting Micro Electro-Mechanical System (MEMS) gyros. It is used to remove residual bias at startup. It is a more effective alternative to traditional approach that is realized by cascading bias thermal correction by calibration and traditional Kalman filtering for bias tracking. This function is very useful when adopted gyros are manufactured using MEMS technology. These systems have significant limitations in terms of sensitivity to environmental conditions. They are characterized by a strong correlation of the systematic error with temperature variations. The traditional process is divided into two separated algorithms, i.e., calibration and filtering, and this aspect reduces system accuracy, reliability, and maintainability. This paper proposes an innovative Zero Velocity Update filter that just requires raw uncalibrated gyro data as input. It unifies in a single algorithm the two steps from the traditional approach. Therefore, it saves time and economic resources, simplifying the management of thermal correction process. In the paper, traditional and innovative Zero Velocity Update filters are described in detail, as well as the experimental data set used to test both methods. The performance of the two filters is compared both in nominal conditions and in the typical case of a residual initial alignment bias. In this last condition, the innovative solution shows significant improvements with respect to the traditional approach. This is the typical case of an aircraft or a car in parking conditions under solar input.

  7. Normative Beliefs about Aggression as a Mediator of Narcissistic Exploitativeness and Cyberbullying

    Science.gov (United States)

    Ang, Rebecca P.; Tan, Kit-Aun; Mansor, Abu Talib

    2011-01-01

    The current study examined normative beliefs about aggression as a mediator between narcissistic exploitativeness and cyberbullying using two Asian adolescent samples from Singapore and Malaysia. Narcissistic exploitativeness was significantly and positively associated with cyberbullying and normative beliefs about aggression and normative beliefs…

  8. Experimental/Computational Approach to Accommodation Coefficients and its Application to Noble Gases on Aluminum Surface (Preprint)

    Science.gov (United States)

    2009-02-03

    computational approach to accommodation coefficients and its application to noble gases on aluminum surface Nathaniel Selden Uruversity of Southern Cahfornia, Los ...8217 ,. 0.’ a~ .......,..,P. • " ,,-0, "p"’U".. ,Po"D.’ 0.’P.... uro . P." FIG. 5: Experimental and computed radiometri~ force for argon (left), xenon

  9. SEXUAL EXPLOITATION OF CHILDREN IN THE TOURISM – THE DARK SIDE OF TOURISM

    OpenAIRE

    Janez Mekinc; Katarina Music

    2015-01-01

    The underlying causes of sexual exploitation and prostitution are poverty, inequality between women and men, high population growth and rural - urban migration. Victims are, predominantly, women and children with lower socio-economic status. One particular form of sexual exploitation is child sex tourism. This ruthless exploitation of children can be found throughout the world, predominantly in the third world and developing countries. Children, mainly between the ages of 6 to 14 years, are t...

  10. The Fight against the Least Visible Form of Human Trafficking: Trafficking for Child Labour Exploitation

    Directory of Open Access Journals (Sweden)

    Luz María Puente Aba

    2018-03-01

    Full Text Available Child trafficking for the purpose of labour exploitation is a difficult phenomenon to detect. It is also not readily definable considering that this specific form of trafficking is closely linked with the phenomenon of forced child labour, and even with the broader occurrence of child labour. A lack of globally reliable data and the convergence of different concepts related to child trafficking for labour exploitation pose significant challenges when trying to regulate the circumstances concerning child work and the criminalisation of trafficking for labour exploitation. This article offers a clear overview of the available data related to all the phenomena, and aims to clarify all the situations involved, defining child work, child labour, forced child labour and child trafficking for the purposes of labour exploitation. Furthermore, this article discusses the possible loopholes and critical issues that could hinder global approaches to resolving these issues. La trata infantil con fines de explotación laboral es un fenómeno difícil de detectar, y tampoco es sencillo definirlo si se tiene en cuenta que esta forma específica de trata está estrechamente relacionada con el fenómeno del trabajo forzado infantil e, incluso, con el fenómeno más general de trabajo infantil. Todo ello supone un desafío a la hora de regular las circunstancias que definen el trabajo realizado por niños y la criminalización de la trata para la explotación laboral. Este artículo ofrece un repaso de los datos disponibles en esta materia y procura aclarar las situaciones que se pueden plantear, así como definir trabajo realizado por niños, trabajo infantil, trabajo infantil forzado y trata infantil con fines de explotación laboral. Por último, profundiza en las posibles deficiencias y en los aspectos críticos que podrían obstaculizar un acercamiento global a esta problemática. DOWNLOAD THIS PAPER FROM SSRN: http://ssrn.com/abstract=3088010

  11. Horizontal Parallel Pipe Ground Heat Exchanger : Analytical Conception and Experimental Study

    International Nuclear Information System (INIS)

    Naili, Nabiha; Jemli, Ramzi; Farhat, Abdel Hamid; Ben Nasrallah, Sassi

    2009-01-01

    Due to limited amount of natural resources exploited for heating, and in order to reduce the environmental impact, people should strive to use renewable energy resources. Ambient low-grade energy may be upgraded by the ground heat exchanger (GH E), which exploits the ground thermal inertia for buildings heating and cooling. In this study, analytical performance and experiments analysis of a horizontal ground heat exchanger have been performed. The analytical study, relates to the dimensioning of the heat exchanger, shows that the heat exchanger characteristics are very important for the determination of heat extracted from ground. The experimental results were obtained during the period 30 November to 10 December 2007, in the heating season of the greenhouses. Measurements show that the ground temperature under a certain depth remains relatively constant. To exploit effectively the heat capacity of the ground, a horizontal heat exchanger system has to be constructed and tested in the Center of Research and Technology of Energy, in Tunisia

  12. Evaluating Approaches to Teaching and Learning Chinese Vocabulary from the Learning Theories Perspective: An Experimental Case Study

    Directory of Open Access Journals (Sweden)

    Katja SIMONČIČ

    2015-06-01

    Full Text Available With Chinese language gaining more and more popularity among Slovenian students and with the growing numbers of learners of Chinese as a foreign language in Slovenia and elsewhere it is crucial to find an approach that will lead to high quality and long-term knowledge of Chinese and that will motivate learners to continue learning. We can speak of two basic approaches to teaching Chinese vocabulary: the approach that first introduces pronunciation and the approach that simultaneously introduces pronunciation and character. The key question that arises is which of the two approaches leads to high quality and long-term knowledge? To answer the question an experimental case study was carried out at Ljubljana’s Faculty of Arts in the academic year 2011/2012. The case study showed that the approach that simultaneously introduces pronunciation and character and is based on the key principles of constructivist learning theory had beneficial effects on the students in terms of motivation and quality of knowledge of Chinese vocabulary.

  13. Escaping from the exploitation trap by shaping the digital future

    OpenAIRE

    Füzes, Péter; Gódor, Zoltán; Szabó, Zsolt Roland

    2017-01-01

    Even Fortune 500 firms can disappear quickly, because many of them falls into an exploitation trap. Examples show that certain organizations – that manifest ambidextrous features – can avoid the exploitation trap. But, how can they do it? Authors tracked the digital transformation of a Fortune 500 company in order to understand the strategic and organizational challenges and solutions to become resilient and prosperous. A cutting edge example is shown in the paper about how an industry leader...

  14. Experimental approaches to identify cellular G-quadruplex structures and functions.

    Science.gov (United States)

    Di Antonio, Marco; Rodriguez, Raphaël; Balasubramanian, Shankar

    2012-05-01

    Guanine-rich nucleic acids can fold into non-canonical DNA secondary structures called G-quadruplexes. The formation of these structures can interfere with the biology that is crucial to sustain cellular homeostases and metabolism via mechanisms that include transcription, translation, splicing, telomere maintenance and DNA recombination. Thus, due to their implication in several biological processes and possible role promoting genomic instability, G-quadruplex forming sequences have emerged as potential therapeutic targets. There has been a growing interest in the development of synthetic molecules and biomolecules for sensing G-quadruplex structures in cellular DNA. In this review, we summarise and discuss recent methods developed for cellular imaging of G-quadruplexes, and the application of experimental genomic approaches to detect G-quadruplexes throughout genomic DNA. In particular, we will discuss the use of engineered small molecules and natural proteins to enable pull-down, ChIP-Seq, ChIP-chip and fluorescence imaging of G-quadruplex structures in cellular DNA. Copyright © 2012 Elsevier Inc. All rights reserved.

  15. Toward a synthetic economic systems modeling tool for sustainable exploitation of ecosystems.

    Science.gov (United States)

    Richardson, Colin; Courvisanos, Jerry; Crawford, John W

    2011-02-01

    Environmental resources that underpin the basic human needs of water, energy, and food are predicted to become in such short supply by 2050 that global security and the well-being of millions will be under threat. These natural commodities have been allowed to reach crisis levels of supply because of a failure of economic systems to sustain them. This is largely because there have been no means of integrating their exploitation into any economic model that effectively addresses ecological systemic failures in a way that provides an integrated ecological-economic tool that can monitor and evaluate market and policy targets. We review the reasons for this and recent attempts to address the problem while identifying outstanding issues. The key elements of a policy-oriented economic model that integrates ecosystem processes are described and form the basis of a proposed new synthesis approach. The approach is illustrated by an indicative case study that develops a simple model for rainfed and irrigated food production in the Murray-Darling basin of southeastern Australia. © 2011 New York Academy of Sciences.

  16. Computational-experimental approach to drug-target interaction mapping: A case study on kinase inhibitors.

    Directory of Open Access Journals (Sweden)

    Anna Cichonska

    2017-08-01

    Full Text Available Due to relatively high costs and labor required for experimental profiling of the full target space of chemical compounds, various machine learning models have been proposed as cost-effective means to advance this process in terms of predicting the most potent compound-target interactions for subsequent verification. However, most of the model predictions lack direct experimental validation in the laboratory, making their practical benefits for drug discovery or repurposing applications largely unknown. Here, we therefore introduce and carefully test a systematic computational-experimental framework for the prediction and pre-clinical verification of drug-target interactions using a well-established kernel-based regression algorithm as the prediction model. To evaluate its performance, we first predicted unmeasured binding affinities in a large-scale kinase inhibitor profiling study, and then experimentally tested 100 compound-kinase pairs. The relatively high correlation of 0.77 (p < 0.0001 between the predicted and measured bioactivities supports the potential of the model for filling the experimental gaps in existing compound-target interaction maps. Further, we subjected the model to a more challenging task of predicting target interactions for such a new candidate drug compound that lacks prior binding profile information. As a specific case study, we used tivozanib, an investigational VEGF receptor inhibitor with currently unknown off-target profile. Among 7 kinases with high predicted affinity, we experimentally validated 4 new off-targets of tivozanib, namely the Src-family kinases FRK and FYN A, the non-receptor tyrosine kinase ABL1, and the serine/threonine kinase SLK. Our sub-sequent experimental validation protocol effectively avoids any possible information leakage between the training and validation data, and therefore enables rigorous model validation for practical applications. These results demonstrate that the kernel

  17. Unlocking water markets: an experimental approach

    Science.gov (United States)

    Cook, J.; Rabotyagov, S.

    2011-12-01

    Water markets are frequently referred to as a promising approach to alleviate stress on water systems, especially as future hydrologic assessments suggest increasing demand and less reliable supply. Yet, despite decades of advocacy by water resource economists, water markets (leases and sales of water rights between willing buyers and sellers) have largely failed to develop in the western US. Although there are a number of explanations for this failure, we explore one potential reason that has received less attention : farmers as sellers may have preferences for different elements of a water market transaction that are not captured in the relative comparison of their profits from farming and their profits from agreeing to a deal. We test this explanation by recruiting irrigators with senior water rights in the upper Yakima River Basin in Washington state to participate in a series of experimental auctions. In concept, the Yakima Basin is well situated for water market transactions as it has significant water shortages for junior water users ~15% of years and projections show these are likely to increase in the future. Participants were asked a series of questions about the operation of a hypothetical 100-acre timothy hay farm including the type of buyer, how the water bank is managed, the lease type, and the offer price. Results from 7 sessions with irrigators (n=49) and a comparison group of undergraduates (n=38) show that irrigators are more likely to accept split-season than full-season leases (controlling for differences in farm profits) and are more likely to accept a lease from an irrigation district and less likely to accept an offer from a Developer. Most notably, we find farmers were far more likely than students to reject offers from buyers even though it would increase their winnings from the experiment. These results could be used in ongoing water supply policy debates in the Yakima Basin to simulate the amount of water that could be freed by water

  18. Computational and Experimental Approaches to Visual Aesthetics

    Science.gov (United States)

    Brachmann, Anselm; Redies, Christoph

    2017-01-01

    Aesthetics has been the subject of long-standing debates by philosophers and psychologists alike. In psychology, it is generally agreed that aesthetic experience results from an interaction between perception, cognition, and emotion. By experimental means, this triad has been studied in the field of experimental aesthetics, which aims to gain a better understanding of how aesthetic experience relates to fundamental principles of human visual perception and brain processes. Recently, researchers in computer vision have also gained interest in the topic, giving rise to the field of computational aesthetics. With computing hardware and methodology developing at a high pace, the modeling of perceptually relevant aspect of aesthetic stimuli has a huge potential. In this review, we present an overview of recent developments in computational aesthetics and how they relate to experimental studies. In the first part, we cover topics such as the prediction of ratings, style and artist identification as well as computational methods in art history, such as the detection of influences among artists or forgeries. We also describe currently used computational algorithms, such as classifiers and deep neural networks. In the second part, we summarize results from the field of experimental aesthetics and cover several isolated image properties that are believed to have a effect on the aesthetic appeal of visual stimuli. Their relation to each other and to findings from computational aesthetics are discussed. Moreover, we compare the strategies in the two fields of research and suggest that both fields would greatly profit from a joined research effort. We hope to encourage researchers from both disciplines to work more closely together in order to understand visual aesthetics from an integrated point of view. PMID:29184491

  19. Experimental Design Research

    DEFF Research Database (Denmark)

    This book presents a new, multidisciplinary perspective on and paradigm for integrative experimental design research. It addresses various perspectives on methods, analysis and overall research approach, and how they can be synthesized to advance understanding of design. It explores the foundations...... of experimental approaches and their utility in this domain, and brings together analytical approaches to promote an integrated understanding. The book also investigates where these approaches lead to and how they link design research more fully with other disciplines (e.g. psychology, cognition, sociology......, computer science, management). Above all, the book emphasizes the integrative nature of design research in terms of the methods, theories, and units of study—from the individual to the organizational level. Although this approach offers many advantages, it has inherently led to a situation in current...

  20. Impact socio-environnemental de l'exploitation du sable marin sur le ...

    African Journals Online (AJOL)

    En effet, l'exploitation du sable marin dans cette contrée s'est ouverte et évolue du fait de l'urbanisation galopante de la Commune liée à l'érection des ... In addition, the uncontrolled exploitation increased coastal erosion and does little to improve the conditions of economic and social life of the people who indulge ...

  1. Open Experimentation on Phenomena of Chemical Reactions via the Learning Company Approach in Early Secondary Chemistry Education

    Science.gov (United States)

    Beck, Katharina; Witteck, Torsten; Eilks, Ingo

    2010-01-01

    Presented is a case study on the implementation of open and inquiry-type experimentation in early German secondary chemistry education. The teaching strategy discussed follows the learning company approach. Originally adopted from vocational education, the learning company method is used to redirect lab-oriented classroom practice towards a more…

  2. Exploiting Molecular Weight Distribution Shape to Tune Domain Spacing in Block Copolymer Thin Films.

    Science.gov (United States)

    Gentekos, Dillon T; Jia, Junteng; Tirado, Erika S; Barteau, Katherine P; Smilgies, Detlef-M; DiStasio, Robert A; Fors, Brett P

    2018-04-04

    We report a method for tuning the domain spacing ( D sp ) of self-assembled block copolymer thin films of poly(styrene- block-methyl methacrylate) (PS- b-PMMA) over a large range of lamellar periods. By modifying the molecular weight distribution (MWD) shape (including both the breadth and skew) of the PS block via temporal control of polymer chain initiation in anionic polymerization, we observe increases of up to 41% in D sp for polymers with the same overall molecular weight ( M n ≈ 125 kg mol -1 ) without significantly changing the overall morphology or chemical composition of the final material. In conjunction with our experimental efforts, we have utilized concepts from population statistics and least-squares analysis to develop a model for predicting D sp based on the first three moments of the MWDs. This statistical model reproduces experimental D sp values with high fidelity (with mean absolute errors of 1.2 nm or 1.8%) and provides novel physical insight into the individual and collective roles played by the MWD moments in determining this property of interest. This work demonstrates that both MWD breadth and skew have a profound influence over D sp , thereby providing an experimental and conceptual platform for exploiting MWD shape as a simple and modular handle for fine-tuning D sp in block copolymer thin films.

  3. Uncovering Indicators of Commercial Sexual Exploitation.

    Science.gov (United States)

    Bounds, Dawn; Delaney, Kathleen R; Julion, Wrenetha; Breitenstein, Susan

    2017-07-01

    It is estimated that annually 100,000 to 300,000 youth are at risk for sex trafficking; a commercial sex act induced by force, fraud, or coercion, or any such act where the person induced to perform such an act is younger than 18 years of age. Increasingly, such transactions are occurring online via Internet-based sites that serve the commercial sex industry. Commercial sex transactions involving trafficking are illegal; thus, Internet discussions between those involved must be veiled. Even so, transactions around sex trafficking do occur. Within these transactions are innuendos that provide one avenue for detecting potential activity. The purpose of this study is to identify linguistic indicators of potential commercial sexual exploitation within the online comments of men posted on an Internet site. Six hundred sixty-six posts from five Midwest cities and 363 unique members were analyzed via content analysis. Three main indicators were found: the presence of youth or desire for youthfulness, presence of pimps, and awareness of vulnerability. These findings begin a much-needed dialogue on uncovering online risks of commercial sexual exploitation and support the need for further research on Internet indicators of sex trafficking.

  4. Growth, Mortality and Exploitation Rates of Sarotherodon ...

    African Journals Online (AJOL)

    Evans

    ABSTRACT. Sarotherodon melanotheron population of Dominli Lagoon in the Western Region of Ghana was studied for its growth and mortality parameters as well as exploitation rate. The study generally aimed at providing basic information necessary for the assessment and management of the fish stock in the lagoon.

  5. The exploitation of "Exploitation" in the tenofovir prep trial in Cameroon: Lessons learned from media coverage of an HIV prevention trial.

    Science.gov (United States)

    Mack, Natasha; Robinson, Elizabeth T; MacQueen, Kathleen M; Moffett, Jill; Johnson, Laura M

    2010-06-01

    media coverage influences how clinical trials are perceived internationally and in communities where trials occur, affecting recruitment, retention, and political support for research. We conducted a discourse analysis of news coverage from 2004-2005 of a trial in Cameroon on oral PrEP for HIV prevention, to identify messages, communication techniques, and sources of messages that were amplified via media. We identified two parallel discourses: one on ethical concerns about the Cameroon trial, and a second, more general "science exploitation" discourse concerned with the potential for trials with vulnerable participant populations to be conducted unethically, benefiting only wealthy populations. Researchers should overtly address exploitation as an integral, ongoing component of research, particularly where historical or cultural conditions set the stage for controversy to emerge.

  6. Frequency-Dependent Streaming Potential of Porous Media—Part 1: Experimental Approaches and Apparatus Design

    Directory of Open Access Journals (Sweden)

    P. W. J. Glover

    2012-01-01

    Full Text Available Electrokinetic phenomena link fluid flow and electrical flow in porous and fractured media such that a hydraulic flow will generate an electrical current and vice versa. Such a link is likely to be extremely useful, especially in the development of the electroseismic method. However, surprisingly few experimental measurements have been carried out, particularly as a function of frequency because of their difficulty. Here we have considered six different approaches to make laboratory determinations of the frequency-dependent streaming potential coefficient. In each case, we have analyzed the mechanical, electrical, and other technical difficulties involved in each method. We conclude that the electromagnetic drive is currently the only approach that is practicable, while the piezoelectric drive may be useful for low permeability samples and at specified high frequencies. We have used the electro-magnetic drive approach to design, build, and test an apparatus for measuring the streaming potential coefficient of unconsolidated and disaggregated samples such as sands, gravels, and soils with a diameter of 25.4 mm and lengths between 50 mm and 300 mm.

  7. The exploration-exploitation dilemma: a multidisciplinary framework.

    Directory of Open Access Journals (Sweden)

    Oded Berger-Tal

    Full Text Available The trade-off between the need to obtain new knowledge and the need to use that knowledge to improve performance is one of the most basic trade-offs in nature, and optimal performance usually requires some balance between exploratory and exploitative behaviors. Researchers in many disciplines have been searching for the optimal solution to this dilemma. Here we present a novel model in which the exploration strategy itself is dynamic and varies with time in order to optimize a definite goal, such as the acquisition of energy, money, or prestige. Our model produced four very distinct phases: Knowledge establishment, Knowledge accumulation, Knowledge maintenance, and Knowledge exploitation, giving rise to a multidisciplinary framework that applies equally to humans, animals, and organizations. The framework can be used to explain a multitude of phenomena in various disciplines, such as the movement of animals in novel landscapes, the most efficient resource allocation for a start-up company, or the effects of old age on knowledge acquisition in humans.

  8. Exploiting intrinsic fluctuations to identify model parameters.

    Science.gov (United States)

    Zimmer, Christoph; Sahle, Sven; Pahle, Jürgen

    2015-04-01

    Parameterisation of kinetic models plays a central role in computational systems biology. Besides the lack of experimental data of high enough quality, some of the biggest challenges here are identification issues. Model parameters can be structurally non-identifiable because of functional relationships. Noise in measured data is usually considered to be a nuisance for parameter estimation. However, it turns out that intrinsic fluctuations in particle numbers can make parameters identifiable that were previously non-identifiable. The authors present a method to identify model parameters that are structurally non-identifiable in a deterministic framework. The method takes time course recordings of biochemical systems in steady state or transient state as input. Often a functional relationship between parameters presents itself by a one-dimensional manifold in parameter space containing parameter sets of optimal goodness. Although the system's behaviour cannot be distinguished on this manifold in a deterministic framework it might be distinguishable in a stochastic modelling framework. Their method exploits this by using an objective function that includes a measure for fluctuations in particle numbers. They show on three example models, immigration-death, gene expression and Epo-EpoReceptor interaction, that this resolves the non-identifiability even in the case of measurement noise with known amplitude. The method is applied to partially observed recordings of biochemical systems with measurement noise. It is simple to implement and it is usually very fast to compute. This optimisation can be realised in a classical or Bayesian fashion.

  9. Experimental quantum annealing: case study involving the graph isomorphism problem.

    Science.gov (United States)

    Zick, Kenneth M; Shehab, Omar; French, Matthew

    2015-06-08

    Quantum annealing is a proposed combinatorial optimization technique meant to exploit quantum mechanical effects such as tunneling and entanglement. Real-world quantum annealing-based solvers require a combination of annealing and classical pre- and post-processing; at this early stage, little is known about how to partition and optimize the processing. This article presents an experimental case study of quantum annealing and some of the factors involved in real-world solvers, using a 504-qubit D-Wave Two machine and the graph isomorphism problem. To illustrate the role of classical pre-processing, a compact Hamiltonian is presented that enables a reduced Ising model for each problem instance. On random N-vertex graphs, the median number of variables is reduced from N(2) to fewer than N log2 N and solvable graph sizes increase from N = 5 to N = 13. Additionally, error correction via classical post-processing majority voting is evaluated. While the solution times are not competitive with classical approaches to graph isomorphism, the enhanced solver ultimately classified correctly every problem that was mapped to the processor and demonstrated clear advantages over the baseline approach. The results shed some light on the nature of real-world quantum annealing and the associated hybrid classical-quantum solvers.

  10. Exploiting the opportunities of Internet and multi-channel pricing : An exploratory research

    NARCIS (Netherlands)

    Sotgiu, Francesca; Ancarani, Fabio

    2004-01-01

    Smart firms are not worried about the impact of the Internet on pricing, but realise that they have the unique opportunity to exploit new options and improve their marketing performance. Multi-channel pricing is one of the most interesting opportunities firms can exploit in the digital economy.

  11. Complementary approaches to understanding the plant circadian clock

    Directory of Open Access Journals (Sweden)

    Ozgur E. Akman

    2010-02-01

    Full Text Available Circadian clocks are oscillatory genetic networks that help organisms adapt to the 24-hour day/night cycle. The clock of the green alga Ostreococcus tauri is the simplest plant clock discovered so far. Its many advantages as an experimental system facilitate the testing of computational predictions. We present a model of the Ostreococcus clock in the stochastic process algebra Bio-PEPA and exploit its mapping to different analysis techniques, such as ordinary differential equations, stochastic simulation algorithms and model-checking. The small number of molecules reported for this system tests the limits of the continuous approximation underlying differential equations. We investigate the difference between continuous-deterministic and discrete-stochastic approaches. Stochastic simulation and model-checking allow us to formulate new hypotheses on the system behaviour, such as the presence of self-sustained oscillations in single cells under constant light conditions. We investigate how to model the timing of dawn and dusk in the context of model-checking, which we use to compute how the probability distributions of key biochemical species change over time. These show that the relative variation in expression level is smallest at the time of peak expression, making peak time an optimal experimental phase marker. Building on these analyses, we use approaches from evolutionary systems biology to investigate how changes in the rate of mRNA degradation impacts the phase of a key protein likely to affect fitness. We explore how robust this circadian clock is towards such potential mutational changes in its underlying biochemistry. Our work shows that multiple approaches lead to a more complete understanding of the clock.

  12. Chitosan-based nanosystems and their exploited antimicrobial activity.

    Science.gov (United States)

    Perinelli, Diego Romano; Fagioli, Laura; Campana, Raffaella; Lam, Jenny K W; Baffone, Wally; Palmieri, Giovanni Filippo; Casettari, Luca; Bonacucina, Giulia

    2018-05-30

    Chitosan is a biodegradable and biocompatible natural polysaccharide that has a wide range of applications in the field of pharmaceutics, biomedical, chemical, cosmetics, textile and food industry. One of the most interesting characteristics of chitosan is its antibacterial and antifungal activity, and together with its excellent safety profile in human, it has attracted considerable attention in various research disciplines. The antimicrobial activity of chitosan is dependent on a number of factors, including its molecular weight, degree of deacetylation, degree of substitution, physical form, as well as structural properties of the cell wall of the target microorganisms. While the sole use of chitosan may not be sufficient to produce an adequate antimicrobial effect to fulfil different purposes, the incorporation of this biopolymer with other active substances such as drugs, metals and natural compounds in nanosystems is a commonly employed strategy to enhance its antimicrobial potential. In this review, we aim to provide an overview on the different approaches that exploit the antimicrobial activity of chitosan-based nanosystems and their applications, and highlight the latest advances in this field. Copyright © 2018 Elsevier B.V. All rights reserved.

  13. Experimental instruction in photonics for high school students: approaches to managing problems faced

    Science.gov (United States)

    Choong, Zhengyang

    2017-08-01

    Student research projects are increasingly common at the K-12 level. However, students often face difficulties in the course of their school research projects such as setting realistic timelines and expectations, handling problems stemming from a lack of self-confidence, as well as being sufficiently disciplined for sustained communication and experimentation. In this work, we explore manifestations of these problems in the context of a photonics project, characterising the spectrum of the breakdown flash from Silicon Avalanche Photodiodes. We report on the process of planning and building the setup, data collection, analysis and troubleshooting, as well as the technical and human problems at each step. Approaches that were found to be helpful in managing the aforementioned problems are discussed, including an attention to detail during experimental work, as well as communicating in a forthcoming manner. Œe former allowed for clearer planning and the setting of quantifiable proximal goals; the latter helped in motivating discipline, and also helped in the understanding of research as an iterative learning process without a clear definition of success or failure.

  14. Child Exploitation: Some Pieces of the Puzzle.

    Science.gov (United States)

    Rohlader, Dorothy

    The report addresses the status in North Carolina and in the nation of child exploitation. Legislative and judicial backgrounds of child pornography and child prostitution are reviewed, and difficulties in obtaining statistical data are noted. Law enforcement issues in pornography are cited, and suggestions for further legislation regarding child…

  15. A sense of life: computational and experimental investigations with models of biochemical and evolutionary processes.

    Science.gov (United States)

    Mishra, Bud; Daruwala, Raoul-Sam; Zhou, Yi; Ugel, Nadia; Policriti, Alberto; Antoniotti, Marco; Paxia, Salvatore; Rejali, Marc; Rudra, Archisman; Cherepinsky, Vera; Silver, Naomi; Casey, William; Piazza, Carla; Simeoni, Marta; Barbano, Paolo; Spivak, Marina; Feng, Jiawu; Gill, Ofer; Venkatesh, Mysore; Cheng, Fang; Sun, Bing; Ioniata, Iuliana; Anantharaman, Thomas; Hubbard, E Jane Albert; Pnueli, Amir; Harel, David; Chandru, Vijay; Hariharan, Ramesh; Wigler, Michael; Park, Frank; Lin, Shih-Chieh; Lazebnik, Yuri; Winkler, Franz; Cantor, Charles R; Carbone, Alessandra; Gromov, Mikhael

    2003-01-01

    We collaborate in a research program aimed at creating a rigorous framework, experimental infrastructure, and computational environment for understanding, experimenting with, manipulating, and modifying a diverse set of fundamental biological processes at multiple scales and spatio-temporal modes. The novelty of our research is based on an approach that (i) requires coevolution of experimental science and theoretical techniques and (ii) exploits a certain universality in biology guided by a parsimonious model of evolutionary mechanisms operating at the genomic level and manifesting at the proteomic, transcriptomic, phylogenic, and other higher levels. Our current program in "systems biology" endeavors to marry large-scale biological experiments with the tools to ponder and reason about large, complex, and subtle natural systems. To achieve this ambitious goal, ideas and concepts are combined from many different fields: biological experimentation, applied mathematical modeling, computational reasoning schemes, and large-scale numerical and symbolic simulations. From a biological viewpoint, the basic issues are many: (i) understanding common and shared structural motifs among biological processes; (ii) modeling biological noise due to interactions among a small number of key molecules or loss of synchrony; (iii) explaining the robustness of these systems in spite of such noise; and (iv) cataloging multistatic behavior and adaptation exhibited by many biological processes.

  16. Preface of "The Second Symposium on Border Zones Between Experimental and Numerical Application Including Solution Approaches By Extensions of Standard Numerical Methods"

    Science.gov (United States)

    Ortleb, Sigrun; Seidel, Christian

    2017-07-01

    In this second symposium at the limits of experimental and numerical methods, recent research is presented on practically relevant problems. Presentations discuss experimental investigation as well as numerical methods with a strong focus on application. In addition, problems are identified which require a hybrid experimental-numerical approach. Topics include fast explicit diffusion applied to a geothermal energy storage tank, noise in experimental measurements of electrical quantities, thermal fluid structure interaction, tensegrity structures, experimental and numerical methods for Chladni figures, optimized construction of hydroelectric power stations, experimental and numerical limits in the investigation of rain-wind induced vibrations as well as the application of exponential integrators in a domain-based IMEX setting.

  17. Electromagnetic scattering problems -Numerical issues and new experimental approaches of validation

    Energy Technology Data Exchange (ETDEWEB)

    Geise, Robert; Neubauer, Bjoern; Zimmer, Georg [University of Braunschweig, Institute for Electromagnetic Compatibility, Schleinitzstrasse 23, 38106 Braunschweig (Germany)

    2015-03-10

    Electromagnetic scattering problems, thus the question how radiated energy spreads when impinging on an object, are an essential part of wave propagation. Though the Maxwell’s differential equations as starting point, are actually quite simple,the integral formulation of an object’s boundary conditions, respectively the solution for unknown induced currents can only be solved numerically in most cases.As a timely topic of practical importance the scattering of rotating wind turbines is discussed, the numerical description of which is still based on rigorous approximations with yet unspecified accuracy. In this context the issue of validating numerical solutions is addressed, both with reference simulations but in particular with the experimental approach of scaled measurements. For the latter the idea of an incremental validation is proposed allowing a step by step validation of required new mathematical models in scattering theory.

  18. Animal rights and animal experimentation. Implications for physicians.

    Science.gov (United States)

    Gelpi, A. P.

    1991-01-01

    Practicing physicians are just becoming aware of the animal rights movement, which during the 1980s spawned numerous acts of violence against research facilities throughout the United States. The animal rightists are challenging physicians to show moral justification for the human exploitation of nature and the world of subhuman species. They have aroused public interest in animal welfare, sparked protective legislation for experimental animals, and indirectly encouraged the creation of committees to oversee the conduct of animal experimentation and the conditions of animal confinement. This controversy has necessitated a closer look at the questions of animal experimentation and animal rights against the backdrop of human experimentation and human rights. Physicians and specialists in animal care seek to alleviate suffering and anxiety, and, as moderates, they may be able to bring both sides of the animal rights controversy together in a spirit of mutual tolerance and in the common cause of promoting both human and animal welfare. PMID:1949772

  19. Administrative, institutional and legislative issues on agricultural waste exploitation in Turkey

    International Nuclear Information System (INIS)

    Kaya, Durmus; Baban, Ahmet; Dikec, Stephanie; Canka Kilic, Fatma

    2008-01-01

    In this study, the influence of non-technical issues on the exploitation of agricultural waste in Turkey was investigated in accordance with the work program requirements for the project entitled ''Exploitation of Agricultural Waste in Turkey'' under the EU Life Third Countries Program. The study has been organized and presented according to the following four phases: (i) study of existing Turkish legislation and the administrative and institutional framework, (ii) review and analysis of the EU policy and legislation relevant to agricultural waste, including identification of potential market instruments, (iii) identification of barriers to the promotion of agricultural waste exploitation in Turkey, and (iv) Identification of gaps and formulation of recommendations. An ultimate objective of this study is to transfer the European experience and practices relative to the overall framework of managing agricultural waste. (author)

  20. Molecular approach of uranyl/mineral surfaces: theoretical approach

    International Nuclear Information System (INIS)

    Roques, J.

    2009-01-01

    As migration of radio-toxic elements through the geosphere is one of the processes which may affect the safety of a radioactive waste storage site, the author shows that numerical modelling is a support to experimental result exploitation, and allows the development of new interpretation and prediction codes. He shows that molecular modelling can be used to study processes of interaction between an actinide ion (notably a uranyl ion) and a mineral surface (a TiO 2 substrate). He also reports the predictive theoretical study of the interaction between an uranyl ion and a gibbsite substrate

  1. Exploiting broad-area surface emitting lasers to manifest the path-length distributions of finite-potential quantum billiards.

    Science.gov (United States)

    Yu, Y T; Tuan, P H; Chang, K C; Hsieh, Y H; Huang, K F; Chen, Y F

    2016-01-11

    Broad-area vertical-cavity surface-emitting lasers (VCSELs) with different cavity sizes are experimentally exploited to manifest the influence of the finite confinement strength on the path-length distribution of quantum billiards. The subthreshold emission spectra of VCSELs are measured to obtain the path-length distributions by using the Fourier transform. It is verified that the number of the resonant peaks in the path-length distribution decreases with decreasing the confinement strength. Theoretical analyses for finite-potential quantum billiards are numerically performed to confirm that the mesoscopic phenomena of quantum billiards with finite confinement strength can be analogously revealed by using broad-area VCSELs.

  2. Forced response of turbomachinery part span shrouds-linked blading; Reponse forcee des aubages de turbomachines liaisonnes par nageoires

    Energy Technology Data Exchange (ETDEWEB)

    Ravoux, J.

    2003-06-15

    This work treats of the design of blading systems fitted with part span shrouds (snubber) for turbo-machineries. The first chapter makes a status of the existing calculation techniques for blading systems. The second chapter presents the experimental system developed for the study, the different implementations of its exploitation and its potentialities. The third chapter presents the numerical and experimental results linked with a linear approach: this approach allows the validation of the experimental system and the adjustment of numerical models. The fourth chapter sets up and validates the numerical and experimental tools and techniques linked with the exhaustive exploitation of the system. Finally, a synthesis of the main results is presented with their perspectives for future works. (J.S.)

  3. Revealing the physical insight of a length-scale parameter in metamaterials by exploiting the variational formulation

    Science.gov (United States)

    Abali, B. Emek

    2018-04-01

    For micro-architectured materials with a substructure, called metamaterials, we can realize a direct numerical simulation in the microscale by using classical mechanics. This method is accurate, however, computationally costly. Instead, a solution of the same problem in the macroscale is possible by means of the generalized mechanics. In this case, no detailed modeling of the substructure is necessary; however, new parameters emerge. A physical interpretation of these metamaterial parameters is challenging leading to a lack of experimental strategies for their determination. In this work, we exploit the variational formulation based on action principles and obtain a direct relation between a parameter used in the kinetic energy and a metamaterial parameter in the case of a viscoelastic model.

  4. Approaches to safety, environment and regulatory approval for the International Thermonuclear Experimental Reactor

    International Nuclear Information System (INIS)

    Saji, G.; Bartels, H.W.; Chuyanov, V.; Holland, D.; Kashirski, A.V.; Morozov, S.I.; Piet, S.J.; Poucet, A.; Raeder, J.; Rebut, P.H.; Topilski, L.N.

    1995-01-01

    International Thermonuclear Experimental Reactor (ITER) Engineering Design Activities (EDA) in safety and environment are approaching the point where conceptual safety design, topic studies and research will give way to project oriented engineering design activities. The Joint Central Team (JCT) is promoting safety design and analysis necessary for siting and regulatory approval. Scoping studies are underway at the general level, in terms of laying out the safety and environmental design framework for ITER. ITER must follow the nuclear regulations of the host country as the future construction site of ITER. That is, regulatory approval is required before construction of ITER. Thus, during the EDA, some preparations are necessary for the future application for regulatory approval. Notwithstanding the future host country's jurisdictional framework of nuclear regulations, the primary responsibility for safety and reliability of ITER rests with the legally responsible body which will operate ITER. Since scientific utilization of ITER and protection of the large investment depends on safe and reliable operation of ITER, we are highly motivated to achieve maximum levels of operability, maintainability, and safety. ITER will be the first fusion facility in which overall 'nuclear safety' provisions need to be integrated into the facility. For example, it will be the first fusion facility with significant decay heat and structural radiational damage. Since ITER is an experimental facility, it is also important that necessary experiments can be performed within some safety design limits without requiring extensive regulatory procedures. ITER will be designed with such a robust safety envelope compatible with the fusion power and the energy inventories. The basic approach to safety will be realized by 'defense-in-depth'. (orig.)

  5. Optimal Experimental Design of Furan Shock Tube Kinetic Experiments

    KAUST Repository

    Kim, Daesang

    2015-01-07

    A Bayesian optimal experimental design methodology has been developed and applied to refine the rate coefficients of elementary reactions in Furan combustion. Furans are considered as potential renewable fuels. We focus on the Arrhenius rates of Furan + OH ↔ Furyl-2 + H2O and Furan ↔ OH Furyl-3 + H2O, and rely on the OH consumption rate as experimental observable. A polynomial chaos surrogate is first constructed using an adaptive pseudo-spectral projection algorithm. The PC surrogate is then exploited in conjunction with a fast estimation of the expected information gain in order to determine the optimal design in the space of initial temperatures and OH concentrations.

  6. A Framework for Exploiting Internet of Things for Context-Aware Trust-Based Personalized Services

    Directory of Open Access Journals (Sweden)

    Abayomi Otebolaku

    2018-01-01

    Full Text Available In the last years, we have witnessed the introduction of the Internet of Things (IoT as an integral part of the Internet with billions of interconnected and addressable everyday objects. On one hand, these objects generate a massive volume of data that can be exploited to gain useful insights into our day-to-day needs. On the other hand, context-aware recommender systems (CARSs are intelligent systems that assist users to make service consumption choices that satisfy their preferences based on their contextual situations. However, one of the key challenges facing the development and deployment of CARSs is the lack of functionality for providing dynamic and reliable context information required by the recommendation decision process. Thus, data obtained from IoT objects and other sources can be exploited to build CARSs that satisfy users’ preferences, improve quality of experience, and boost recommendation accuracy. This article describes various components of a conceptual IoT-based framework for context-aware personalized recommendations. The framework addresses the weakness whereby CARSs rely on static and limited contexts from user’s mobile phone by providing additional components for reliable and dynamic context information, using IoT context sources. The core of the framework consists of a context classification and reasoning management and a dynamic user profile model, incorporating trust to improve the accuracy of context-aware personalized recommendations. Experimental evaluations show that incorporating context and trust into personalized recommendation process can improve accuracy.

  7. PANTHER. Pattern ANalytics To support High-performance Exploitation and Reasoning.

    Energy Technology Data Exchange (ETDEWEB)

    Czuchlewski, Kristina Rodriguez [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Hart, William E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-09-01

    Sandia has approached the analysis of big datasets with an integrated methodology that uses computer science, image processing, and human factors to exploit critical patterns and relationships in large datasets despite the variety and rapidity of information. The work is part of a three-year LDRD Grand Challenge called PANTHER (Pattern ANalytics To support High-performance Exploitation and Reasoning). To maximize data analysis capability, Sandia pursued scientific advances across three key technical domains: (1) geospatial-temporal feature extraction via image segmentation and classification; (2) geospatial-temporal analysis capabilities tailored to identify and process new signatures more efficiently; and (3) domain- relevant models of human perception and cognition informing the design of analytic systems. Our integrated results include advances in geographical information systems (GIS) in which we discover activity patterns in noisy, spatial-temporal datasets using geospatial-temporal semantic graphs. We employed computational geometry and machine learning to allow us to extract and predict spatial-temporal patterns and outliers from large aircraft and maritime trajectory datasets. We automatically extracted static and ephemeral features from real, noisy synthetic aperture radar imagery for ingestion into a geospatial-temporal semantic graph. We worked with analysts and investigated analytic workflows to (1) determine how experiential knowledge evolves and is deployed in high-demand, high-throughput visual search workflows, and (2) better understand visual search performance and attention. Through PANTHER, Sandia's fundamental rethinking of key aspects of geospatial data analysis permits the extraction of much richer information from large amounts of data. The project results enable analysts to examine mountains of historical and current data that would otherwise go untouched, while also gaining meaningful, measurable, and defensible insights into

  8. Thermodynamic study of 2-aminothiazole and 2-aminobenzothiazole: Experimental and computational approaches

    International Nuclear Information System (INIS)

    Silva, Ana L.R.; Monte, Manuel J.S.; Morais, Victor M.F.; Ribeiro da Silva, Maria D.M.C.

    2014-01-01

    Highlights: • Combustion of 2-aminothiazole and 2-aminobenzothiazole by rotating bomb calorimetry. • Enthalpies of sublimation of 2-aminothiazole and 2-aminobenzothiazole. • Gaseous enthalpies of formation of 2-aminothiazole and 2-aminobenzothiazole. • Gaseous enthalpies of formation calculated from high-level MO calculations. • Gas-phase enthalpies of formation estimated from G3(MP2)//B3LYP approach. - Abstract: This work reports an experimental and computational thermochemical study of two aminothiazole derivatives, namely 2-aminothiazole and 2-aminobenzothiazole. The standard (p° = 0.1 MPa) molar energies of combustion of these compounds were measured by rotating bomb combustion calorimetry. The standard molar enthalpies of sublimation, at T = 298.15 K, were derived from the temperature dependence of the vapor pressures of these compounds, measured by the Knudsen-effusion technique and from high temperature Calvet microcalorimetry. The conjugation of these experimental results enabled the calculation of the standard molar enthalpies of formation in the gaseous state, at T = 298.15 K, for the compounds studied. The corresponding standard Gibbs free energies of formation in crystalline and gaseous phases were also derived, allowing the analysis of their stability, in these phases. We have also estimated the gas-phase enthalpies of formation from high-level molecular orbital calculations at the G3(MP2)//B3LYP level of theory, the estimates revealing very good agreement with the experimental ones. The importance of some stabilizing electronic interactions occurring in the title molecules has been studied and quantitatively evaluated through Natural Bonding Orbital (NBO) of the corresponding wavefunctions and their Nucleus Independent Chemical Shifts (NICS) parameters have been calculated in order to rationalize the effect of electronic delocalization upon stability

  9. A Novel Approach to Detect Network Attacks Using G-HMM-Based Temporal Relations between Internet Protocol Packets

    Directory of Open Access Journals (Sweden)

    Han Kyusuk

    2011-01-01

    Full Text Available This paper introduces novel attack detection approaches on mobile and wireless device security and network which consider temporal relations between internet packets. In this paper we first present a field selection technique using a Genetic Algorithm and generate a Packet-based Mining Association Rule from an original Mining Association Rule for Support Vector Machine in mobile and wireless network environment. Through the preprocessing with PMAR, SVM inputs can account for time variation between packets in mobile and wireless network. Third, we present Gaussian observation Hidden Markov Model to exploit the hidden relationships between packets based on probabilistic estimation. In our G-HMM approach, we also apply G-HMM feature reduction for better initialization. We demonstrate the usefulness of our SVM and G-HMM approaches with GA on MIT Lincoln Lab datasets and a live dataset that we captured on a real mobile and wireless network. Moreover, experimental results are verified by -fold cross-validation test.

  10. On the dynamics of exploited fish populations

    National Research Council Canada - National Science Library

    Beverton, R. J. H; Holt, Sidney J

    1993-01-01

    ...-brooding cichlids, and viviparity in many sharks and toothcarps. Moreover, fish are of considerable importance to the survival of the human species in the form of nutritious, delicious and diverse food. Rational exploitation and management of our global stocks of fishes must rely upon a detailed and precise insight of their biology. The...

  11. An efficient approach to bioconversion kinetic model generation based on automated microscale experimentation integrated with model driven experimental design

    DEFF Research Database (Denmark)

    Chen, B. H.; Micheletti, M.; Baganz, F.

    2009-01-01

    -erythrulose. Experiments were performed using automated microwell studies at the 150 or 800 mu L scale. The derived kinetic parameters were then verified in a second round of experiments where model predictions showed excellent agreement with experimental data obtained under conditions not included in the original......Reliable models of enzyme kinetics are required for the effective design of bioconversion processes. Kinetic expressions of the enzyme-catalysed reaction rate however, are frequently complex and establishing accurate values of kinetic parameters normally requires a large number of experiments....... These can be both time consuming and expensive when working with the types of non-natural chiral intermediates important in pharmaceutical syntheses. This paper presents ail automated microscale approach to the rapid and cost effective generation of reliable kinetic models useful for bioconversion process...

  12. 25 CFR 20.516 - How are child abuse, neglect or exploitation cases to be handled?

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false How are child abuse, neglect or exploitation cases to be... FINANCIAL ASSISTANCE AND SOCIAL SERVICES PROGRAMS Child Assistance Foster Care § 20.516 How are child abuse, neglect or exploitation cases to be handled? Reported child abuse, neglect or exploitation cases and the...

  13. An experimental MOSFET approach to characterize (192)Ir HDR source anisotropy.

    Science.gov (United States)

    Toye, W C; Das, K R; Todd, S P; Kenny, M B; Franich, R D; Johnston, P N

    2007-09-07

    The dose anisotropy around a (192)Ir HDR source in a water phantom has been measured using MOSFETs as relative dosimeters. In addition, modeling using the EGSnrc code has been performed to provide a complete dose distribution consistent with the MOSFET measurements. Doses around the Nucletron 'classic' (192)Ir HDR source were measured for a range of radial distances from 5 to 30 mm within a 40 x 30 x 30 cm(3) water phantom, using a TN-RD-50 MOSFET dosimetry system with an active area of 0.2 mm by 0.2 mm. For each successive measurement a linear stepper capable of movement in intervals of 0.0125 mm re-positioned the MOSFET at the required radial distance, while a rotational stepper enabled angular displacement of the source at intervals of 0.9 degrees . The source-dosimeter arrangement within the water phantom was modeled using the standardized cylindrical geometry of the DOSRZnrc user code. In general, the measured relative anisotropy at each radial distance from 5 mm to 30 mm is in good agreement with the EGSnrc simulations, benchmark Monte Carlo simulation and TLD measurements where they exist. The experimental approach employing a MOSFET detection system of small size, high spatial resolution and fast read out capability allowed a practical approach to the determination of dose anisotropy around a HDR source.

  14. Administrative, institutional and legislative issues on agricultural waste exploitation in Turkey

    Energy Technology Data Exchange (ETDEWEB)

    Kaya, Durmus; Baban, Ahmet; Dikec, Stephanie [TUBITAK MRC Chemistry and Enviorenment Institute, P.O. Box 21, 41470 Gebze-Kocaeli (Turkey); Canka Kilic, Fatma [Kocaeli University, KMYO, Department of Air Conditioning and Refrigeration, Kullar/Kocaeli (Turkey)

    2008-02-15

    In this study, the influence of non-technical issues on the exploitation of agricultural waste in Turkey was investigated in accordance with the work program requirements for the project entitled ''Exploitation of Agricultural Waste in Turkey'' under the EU Life Third Countries Program. The study has been organized and presented according to the following four phases: (i) study of existing Turkish legislation and the administrative and institutional framework, (ii) review and analysis of the EU policy and legislation relevant to agricultural waste, including identification of potential market instruments, (iii) identification of barriers to the promotion of agricultural waste exploitation in Turkey, and (iv) Identification of gaps and formulation of recommendations. An ultimate objective of this study is to transfer the European experience and practices relative to the overall framework of managing agricultural waste. (author)

  15. Functional Associations by Response Overlap (FARO, a functional genomics approach matching gene expression phenotypes.

    Directory of Open Access Journals (Sweden)

    Henrik Bjørn Nielsen

    2007-08-01

    Full Text Available The systematic comparison of transcriptional responses of organisms is a powerful tool in functional genomics. For example, mutants may be characterized by comparing their transcript profiles to those obtained in other experiments querying the effects on gene expression of many experimental factors including treatments, mutations and pathogen infections. Similarly, drugs may be discovered by the relationship between the transcript profiles effectuated or impacted by a candidate drug and by the target disease. The integration of such data enables systems biology to predict the interplay between experimental factors affecting a biological system. Unfortunately, direct comparisons of gene expression profiles obtained in independent, publicly available microarray experiments are typically compromised by substantial, experiment-specific biases. Here we suggest a novel yet conceptually simple approach for deriving 'Functional Association(s by Response Overlap' (FARO between microarray gene expression studies. The transcriptional response is defined by the set of differentially expressed genes independent from the magnitude or direction of the change. This approach overcomes the limited comparability between studies that is typical for methods that rely on correlation in gene expression. We apply FARO to a compendium of 242 diverse Arabidopsis microarray experimental factors, including phyto-hormones, stresses and pathogens, growth conditions/stages, tissue types and mutants. We also use FARO to confirm and further delineate the functions of Arabidopsis MAP kinase 4 in disease and stress responses. Furthermore, we find that a large, well-defined set of genes responds in opposing directions to different stress conditions and predict the effects of different stress combinations. This demonstrates the usefulness of our approach for exploiting public microarray data to derive biologically meaningful associations between experimental factors. Finally, our

  16. A cyber-physical approach to experimental fluid mechanics

    Science.gov (United States)

    Mackowski, Andrew Williams

    This Thesis documents the design, implementation, and use of a novel type of experimental apparatus, termed Cyber-Physical Fluid Dynamics (CPFD). Unlike traditional fluid mechanics experiments, CPFD is a general-purpose technique that allows one to impose arbitrary forces on an object submerged in a fluid. By combining fluid mechanics with robotics, we can perform experiments that would otherwise be incredibly difficult or time-consuming. More generally, CPFD allows a high degree of automation and control of the experimental process, allowing for much more efficient use of experimental facilities. Examples of CPFD's capabilites include imposing a gravitational force in the horizontal direction (allowing a test object to "fall" sideways in a water channel), simulating nonlinear springs for a vibrating fluid-structure system, or allowing a self-propelled body to move forward under its own force. Because experimental parameters (including forces and even the mass of the test object) are defined in software, one can define entire ensembles of experiments to run autonomously. CPFD additionally integrates related systems such as water channel speed control, LDV flow speed measurements, and PIV flowfield measurements. The end result is a general-purpose experimental system that opens the door to a vast array of fluid-structure interaction problems. We begin by describing the design and implementation of CPFD, the heart of which is a high-performance force-feedback control system. Precise measurement of time-varying forces (including removing effects of the test object's inertia) is more critical here than in typical robotic force-feedback applications. CPFD is based on an integration of ideas from control theory, fluid dynamics, computer science, electrical engineering, and solid mechanics. We also describe experiments using the CPFD experimental apparatus to study vortex-induced vibration (VIV) and oscillating-airfoil propulsion. We show how CPFD can be used to simulate

  17. Environmental Impacts of Sand Exploitation. Analysis of Sand Market

    Directory of Open Access Journals (Sweden)

    Marius Dan Gavriletea

    2017-06-01

    Full Text Available Sand is an indispensable natural resource for any society. Despite society’s increasing dependence on sand, there are major challenges that this industry needs to deal with: limited sand resources, illegal mining, and environmental impact of sand mining. The purpose of this paper is twofold: to present an overview of the sand market, highlighting the main trends and actors for production, export and import, and to review the main environmental impacts associated with sand exploitation process. Based on these findings, we recommend different measures to be followed to reduce negative impacts. Sand mining should be done in a way that limits environmental damage during exploitation and restores the land after mining operations are completed.

  18. Uncertainty avoidance and the exploration-exploitation trade-off

    NARCIS (Netherlands)

    Broekhuizen, Thijs; Giarratana, Marco S.; Torres, Anna

    2017-01-01

    Purpose - This study aims to investigate how a firm's uncertainty avoidance - as indicated by the headquarters' national culture - impacts firm performance by affecting exploratory (product innovation) and exploitative (brand trademark protection) activities. It aims to show that firms characterized

  19. Un premier service mobile en Égypte qui relie les petits exploitants ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Un premier service mobile en Égypte qui relie les petits exploitants aux acheteurs. Un homme qui parle sur un téléphone mobile. Les petits exploitants agricoles dominent l'agriculture égyptienne, mais leur manque de connaissances en matière de commercialisation et de compétences techniques, ainsi qu'une mauvaise ...

  20. magHD: a new approach to multi-dimensional data storage, analysis, display and exploitation

    International Nuclear Information System (INIS)

    Angleraud, Christophe

    2014-01-01

    The ever increasing amount of data and processing capabilities – following the well- known Moore's law – is challenging the way scientists and engineers are currently exploiting large datasets. The scientific visualization tools, although quite powerful, are often too generic and provide abstract views of phenomena, thus preventing cross disciplines fertilization. On the other end, Geographic information Systems allow nice and visually appealing maps to be built but they often get very confused as more layers are added. Moreover, the introduction of time as a fourth analysis dimension to allow analysis of time dependent phenomena such as meteorological or climate models, is encouraging real-time data exploration techniques that allow spatial-temporal points of interests to be detected by integration of moving images by the human brain. Magellium is involved in high performance image processing chains for satellite image processing as well as scientific signal analysis and geographic information management since its creation (2003). We believe that recent work on big data, GPU and peer-to-peer collaborative processing can open a new breakthrough in data analysis and display that will serve many new applications in collaborative scientific computing, environment mapping and understanding. The magHD (for Magellium Hyper-Dimension) project aims at developing software solutions that will bring highly interactive tools for complex datasets analysis and exploration commodity hardware, targeting small to medium scale clusters with expansion capabilities to large cloud based clusters

  1. An experimental approach of decoupling Seebeck coefficient and electrical resistivity

    Science.gov (United States)

    Muhammed Sabeer N., A.; Paulson, Anju; Pradyumnan, P. P.

    2018-04-01

    The Thermoelectrics (TE) has drawn increased attention among renewable energy technologies. The performance of a thermoelectric material is quantified by a dimensionless thermoelectric figure of merit, ZT=S2σT/κ, where S and σ vary inversely each other. Thus, improvement in ZT is not an easy task. So, researchers have been trying different parameter variations during thin film processing to improve TE properties. In this work, tin nitride (Sn3N4) thin films were deposited on glass substrates by reactive RF magnetron sputtering and investigated its thermoelectric response. To decouple the covariance nature of Seebeck coefficient and electrical resistivity for the enhancement of power factor (S2σ), the nitrogen gas pressure during sputtering was reduced. Reduction in nitrogen gas pressure reduced both sputtering pressure and amount of nitrogen available for reaction during sputtering. This experimental approach of combined effect introduced preferred orientation and stoichiometric variations simultaneously in the sputtered Sn3N4 thin films. The scattering mechanism associated with these variations enhanced TE properties by independently drive the Seebeck coefficient and electrical resistivity parameters.

  2. Bridging the PSI Knowledge Gap: A Multi-Scale Approach

    Energy Technology Data Exchange (ETDEWEB)

    Wirth, Brian D. [Univ. of Tennessee, Knoxville, TN (United States)

    2015-01-08

    Plasma-surface interactions (PSI) pose an immense scientific hurdle in magnetic confinement fusion and our present understanding of PSI in confinement environments is highly inadequate; indeed, a recent Fusion Energy Sciences Advisory Committee report found that 4 out of the 5 top five fusion knowledge gaps were related to PSI. The time is appropriate to develop a concentrated and synergistic science effort that would expand, exploit and integrate the wealth of laboratory ion-beam and plasma research, as well as exciting new computational tools, towards the goal of bridging the PSI knowledge gap. This effort would broadly advance plasma and material sciences, while providing critical knowledge towards progress in fusion PSI. This project involves the development of a Science Center focused on a new approach to PSI science; an approach that both exploits access to state-of-the-art PSI experiments and modeling, as well as confinement devices. The organizing principle is to develop synergistic experimental and modeling tools that treat the truly coupled multi-scale aspect of the PSI issues in confinement devices. This is motivated by the simple observation that while typical lab experiments and models allow independent manipulation of controlling variables, the confinement PSI environment is essentially self-determined with few outside controls. This means that processes that may be treated independently in laboratory experiments, because they involve vastly different physical and time scales, will now affect one another in the confinement environment. Also, lab experiments cannot simultaneously match all exposure conditions found in confinement devices typically forcing a linear extrapolation of lab results. At the same time programmatic limitations prevent confinement experiments alone from answering many key PSI questions. The resolution to this problem is to usefully exploit access to PSI science in lab devices, while retooling our thinking from a linear and de

  3. Human trafficking and exploitation: A global health concern.

    Science.gov (United States)

    Zimmerman, Cathy; Kiss, Ligia

    2017-11-01

    In this collection review, Cathy Zimmerman and colleague introduce the PLOS Medicine Collection on Human Trafficking, Exploitation and Health, laying out the magnitude of the global trafficking problem and offering a public health policy framework to guide responses to trafficking.

  4. Angular plasmon response of gold nanoparticles arrays: approaching the Rayleigh limit

    Directory of Open Access Journals (Sweden)

    Marae-Djouda Joseph

    2016-07-01

    Full Text Available The regular arrangement of metal nanoparticles influences their plasmonic behavior. It has been previously demonstrated that the coupling between diffracted waves and plasmon modes can give rise to extremely narrow plasmon resonances. This is the case when the single-particle localized surface plasmon resonance (λLSP is very close in value to the Rayleigh anomaly wavelength (λRA of the nanoparticles array. In this paper, we performed angle-resolved extinction measurements on a 2D array of gold nano-cylinders designed to fulfil the condition λRA<λLSP. Varying the angle of excitation offers a unique possibility to finely modify the value of λRA, thus gradually approaching the condition of coupling between diffracted waves and plasmon modes. The experimental observation of a collective dipolar resonance has been interpreted by exploiting a simplified model based on the coupling of evanescent diffracted waves with plasmon modes. Among other plasmon modes, the measurement technique has also evidenced and allowed the study of a vertical plasmon mode, only visible in TM polarization at off-normal excitation incidence. The results of numerical simulations, based on the periodic Green’s tensor formalism, match well with the experimental transmission spectra and show fine details that could go unnoticed by considering only experimental data.

  5. Proactive control for solar energy exploitation: A german high-inertia building case study

    International Nuclear Information System (INIS)

    Michailidis, Iakovos T.; Baldi, Simone; Pichler, Martin F.; Kosmatopoulos, Elias B.; Santiago, Juan R.

    2015-01-01

    Highlights: • Solar gains exploitation by utilizing large glass facades and concrete core thermal energy storing capacity. • Efficient Building Energy Management in a well-insulated modern building construction. • Energy consumption reduction by maintaining user comfort. • High inertia large scale office building test case, located in Germany. - Abstract: Energy efficient passive designs and constructions have been extensively studied in the last decades as a way to improve the ability of a building to store thermal energy, increase its thermal mass, increase passive insulation and reduce heat losses. However, many studies show that passive thermal designs alone are not enough to fully exploit the potential for energy efficiency in buildings: in fact, harmonizing the active elements for indoor thermal comfort with the passive design of the building can lead to further improvements in both energy efficiency and comfort. These improvements can be achieved via the design of appropriate Building Optimization and Control (BOC) systems, a task which is more complex in high-inertia buildings than in conventional ones. This is because high thermal mass implies a high memory, so that wrong control decisions will have negative repercussions over long time horizons. The design of proactive control strategies with the capability of acting in advance of a future situation, rather than just reacting to current conditions, is of crucial importance for a full exploitation of the capabilities of a high-inertia building. This paper applies a simulation-assisted control methodology to a high-inertia building in Kassel, Germany. A simulation model of the building is used to proactively optimize, using both current and future information about the external weather condition and the building state, a combined criterion composed of the energy consumption and the thermal comfort index. Both extensive simulation as well as real-life experiments performed during the unstable German

  6. Advances in the indirect, descriptive, and experimental approaches to the functional analysis of problem behavior.

    Science.gov (United States)

    Wightman, Jade; Julio, Flávia; Virués-Ortega, Javier

    2014-05-01

    Experimental functional analysis is an assessment methodology to identify the environmental factors that maintain problem behavior in individuals with developmental disabilities and in other populations. Functional analysis provides the basis for the development of reinforcement-based approaches to treatment. This article reviews the procedures, validity, and clinical implementation of the methodological variations of functional analysis and function-based interventions. We present six variations of functional analysis methodology in addition to the typical functional analysis: brief functional analysis, single-function tests, latency-based functional analysis, functional analysis of precursors, and trial-based functional analysis. We also present the three general categories of function-based interventions: extinction, antecedent manipulation, and differential reinforcement. Functional analysis methodology is a valid and efficient approach to the assessment of problem behavior and the selection of treatment strategies.

  7. Energy for lunar resource exploitation

    Science.gov (United States)

    Glaser, Peter E.

    1992-02-01

    Humanity stands at the threshold of exploiting the known lunar resources that have opened up with the access to space. America's role in the future exploitation of space, and specifically of lunar resources, may well determine the level of achievement in technology development and global economic competition. Space activities during the coming decades will significantly influence the events on Earth. The 'shifting of history's tectonic plates' is a process that will be hastened by the increasingly insistent demands for higher living standards of the exponentially growing global population. Key to the achievement of a peaceful world in the 21st century, will be the development of a mix of energy resources at a societally acceptable and affordable cost within a realistic planning horizon. This must be the theme for the globally applicable energy sources that are compatible with the Earth's ecology. It is in this context that lunar resources development should be a primary goal for science missions to the Moon, and for establishing an expanding human presence. The economic viability and commercial business potential of mining, extracting, manufacturing, and transporting lunar resource based materials to Earth, Earth orbits, and to undertake macroengineering projects on the Moon remains to be demonstrated. These extensive activities will be supportive of the realization of the potential of space energy sources for use on Earth. These may include generating electricity for use on Earth based on beaming power from Earth orbits and from the Moon to the Earth, and for the production of helium 3 as a fuel for advanced fusion reactors.

  8. On a model of mixtures with internal variables: Extended Liu procedure for the exploitation of the entropy principle

    Directory of Open Access Journals (Sweden)

    Francesco Oliveri

    2016-01-01

    Full Text Available The exploitation of second law of thermodynamics for a mixture of two fluids with a scalar internal variable and a first order nonlocal state space is achieved by using the extended Liu approach. This method requires to insert as constraints in the entropy inequality either the field equations or their gradient extensions. Consequently, the thermodynamic restrictions imposed by the entropy principle are derived without introducing extra terms neither in the energy balance equation nor in the entropy inequality.

  9. Access to mental health and psychosocial services in Cambodia by survivors of trafficking and exploitation: a qualitative study.

    Science.gov (United States)

    Aberdein, Charlotte; Zimmerman, Cathy

    2015-01-01

    Emerging evidence indicates the extreme forms of violence and acute and longer-term mental health consequences associated with trafficking and exploitation. However, there has been little research on post-trafficking mental health and psychosocial support services for survivors. This study explored the availability and accessibility of mental health and psychosocial support services in Cambodia for women, men and children trafficked and exploited for sex or labour purposes. Semi-structured interviews were conducted with a purposively selected sample of representatives from seven service organizations providing mental health and psychosocial support services for people who have been trafficked. This qualitative method was selected to gain insights into the service approaches and challenges faced by the small number of post-trafficking service providers in Cambodia. A conceptual framework outlining access dimensions associated with service provision guided the structure of the study. Findings indicate that among the available post-trafficking services, there are few trained mental health specialists, an over-representation of shelter services in urban versus rural areas and limited services for males, people with disabilities, individuals exploited for labour (versus sexual exploitation) and those with more serious mental illnesses. Providers believe that discrimination and stigma related to both mental health and human trafficking hinder trafficked people's willingness to access services, but suggest that awareness-raising may reduce these prejudices. Care in this sector is precarious due to over-reliance on financial support by donors versus government. Recent increases in newly qualified professionals and providers suggest potential improvements in the quality and availability of psychological support for trafficking survivors. Psychological support for the growing number of identified trafficking survivors in Cambodia will depend on improved geographical

  10. EXCI-CEST: Exploiting pharmaceutical excipients as MRI-CEST contrast agents for tumor imaging.

    Science.gov (United States)

    Longo, Dario Livio; Moustaghfir, Fatima Zzahra; Zerbo, Alexandre; Consolino, Lorena; Anemone, Annasofia; Bracesco, Martina; Aime, Silvio

    2017-06-15

    Chemical Exchange Saturation Transfer (CEST) approach is a novel tool within magnetic resonance imaging (MRI) that allows visualization of molecules possessing exchangeable protons with water. Many molecules, employed as excipients for the formulation of finished drug products, are endowed with hydroxyl, amine or amide protons, thus can be exploitable as MRI-CEST contrast agents. Their high safety profiles allow them to be injected at very high doses. Here we investigated the MRI-CEST properties of several excipients (ascorbic acid, sucrose, N-acetyl-d-glucosamine, meglumine and 2-pyrrolidone) and tested them as tumor-detecting agents in two different murine tumor models (breast and melanoma cancers). All the investigated molecules showed remarkable CEST contrast upon i.v. administration in the range 1-3ppm according to the type of mobile proton groups. A marked increase of CEST contrast was observed in tumor regions up to 30min post injection. The combination of marked tumor contrast enhancement and lack of toxicity make these molecules potential candidates for the diagnosis of tumors within the MRI-CEST approach. Copyright © 2017 Elsevier B.V. All rights reserved.

  11. Beliefs about the Potential Impacts of Exploiting Non-Timber Forest Products Predict Voluntary Participation in Monitoring

    Science.gov (United States)

    Dantas Brites, Alice; Morsello, Carla

    2017-06-01

    Harvesting and trading non-timber forest products is advocated as a win-win strategy for conservation and development, yet it can produce negative ecological and socioeconomic impacts. Hence, monitoring exploitation outcomes is essential, and participatory monitoring has been suggested to be the most suitable approach. Among possible approaches, participatory monitoring is preferred because it is likely to increase people's awareness and beliefs regarding impacts or potential impacts, thus inducing behavioral changes, although the evidence in this regard is contradictory. We therefore evaluated whether people's beliefs about the potential ecological and socioeconomic impacts of non-timber forest product exploitation increased their likelihood of volunteering to monitor. We studied a community of forest inhabitants in the Brazilian Amazon who harvested and traded a commercially important non-timber forest product. Two methods of data gathering were employed: (i) a survey of 166 adults (51 households) to evaluate people's beliefs and their stated intention to engage in four different monitoring tasks and (ii) four pilot monitoring tasks to evaluate who actually participated. Based on mixed-effects regressions, the results indicated that beliefs regarding both types of impacts could predict participation in certain tasks, although gender, age and schooling were occasionally stronger predictors. On average, people had stronger beliefs about potential socioeconomic impacts than about potential ecological impacts, with the former also predicting participation in ecological data gathering. This finding reinforces the importance of monitoring both types of impacts to help achieve the win-win outcomes originally proposed by non-timber forest product trade initiatives.

  12. Research on Factors Affecting the Optimal Exploitation of Natural Gas Resources in China

    Directory of Open Access Journals (Sweden)

    Jianzhong Xiao

    2016-05-01

    Full Text Available This paper develops an optimizing model for the long-term exploitation of limited natural gas reserves in China. In addition to describing the life cycle characteristics of natural gas production and introducing the inter-temporal allocation theory, this paper builds the optimal exploitation model of natural gas resources within a gas field in the Ordos Basin as an example to analyze its exploitation scale and how influence factors, such as recovery rate, discount rate and the gas well exhausting cycle, affect the optimal exploration path of this gas field. We determine that an increase in the discount rate stimulates investors to invest more aggressively in natural gas exploitation in the early period due to the lower discounted value, thereby increasing the pace of the exploitation of natural gas and the exhaustion of gas fields. A higher recoverable factor implies more recoverable reserves and greater potential of increasing the output of gas fields. The exhaustion rate of gas wells affects the capability of converting capacity to output. When exhaustion occurs quickly in gas wells, the output will likely increase in the output rising period, and the output will likely decrease at a faster rate in the output reduction period. Price reform affects the economic recoverable reserves of gas fields.

  13. Decentralized diagnostics based on a distributed micro-genetic algorithm for transducer networks monitoring large experimental systems.

    Science.gov (United States)

    Arpaia, P; Cimmino, P; Girone, M; La Commara, G; Maisto, D; Manna, C; Pezzetti, M

    2014-09-01

    Evolutionary approach to centralized multiple-faults diagnostics is extended to distributed transducer networks monitoring large experimental systems. Given a set of anomalies detected by the transducers, each instance of the multiple-fault problem is formulated as several parallel communicating sub-tasks running on different transducers, and thus solved one-by-one on spatially separated parallel processes. A micro-genetic algorithm merges evaluation time efficiency, arising from a small-size population distributed on parallel-synchronized processors, with the effectiveness of centralized evolutionary techniques due to optimal mix of exploitation and exploration. In this way, holistic view and effectiveness advantages of evolutionary global diagnostics are combined with reliability and efficiency benefits of distributed parallel architectures. The proposed approach was validated both (i) by simulation at CERN, on a case study of a cold box for enhancing the cryogeny diagnostics of the Large Hadron Collider, and (ii) by experiments, under the framework of the industrial research project MONDIEVOB (Building Remote Monitoring and Evolutionary Diagnostics), co-funded by EU and the company Del Bo srl, Napoli, Italy.

  14. Know Your Enemy: Successful Bioinformatic Approaches to Predict Functional RNA Structures in Viral RNAs

    Science.gov (United States)

    Lim, Chun Shen; Brown, Chris M.

    2018-01-01

    Structured RNA elements may control virus replication, transcription and translation, and their distinct features are being exploited by novel antiviral strategies. Viral RNA elements continue to be discovered using combinations of experimental and computational analyses. However, the wealth of sequence data, notably from deep viral RNA sequencing, viromes, and metagenomes, necessitates computational approaches being used as an essential discovery tool. In this review, we describe practical approaches being used to discover functional RNA elements in viral genomes. In addition to success stories in new and emerging viruses, these approaches have revealed some surprising new features of well-studied viruses e.g., human immunodeficiency virus, hepatitis C virus, influenza, and dengue viruses. Some notable discoveries were facilitated by new comparative analyses of diverse viral genome alignments. Importantly, comparative approaches for finding RNA elements embedded in coding and non-coding regions differ. With the exponential growth of computer power we have progressed from stem-loop prediction on single sequences to cutting edge 3D prediction, and from command line to user friendly web interfaces. Despite these advances, many powerful, user friendly prediction tools and resources are underutilized by the virology community. PMID:29354101

  15. Understanding and Responding to the Needs of Commercially Sexually Exploited Youth: Recommendations for the Mental Health Provider.

    Science.gov (United States)

    Ijadi-Maghsoodi, Roya; Cook, Mekeila; Barnert, Elizabeth S; Gaboian, Shushanik; Bath, Eraka

    2016-01-01

    Mental health providers are frequently at the forefront of addressing the multifaceted needs of commercially sexually exploited youth. This article provides an overview of the definition of commercial sexual exploitation of children and relevant legislation including the shift toward decriminalization of commercially sexually exploited youth. To provide clinicians with tools needed to deliver competent care to this population, a review of risk factors for commercial sexual exploitation of children and the role of the clinician in identification, assessment, and treatment of commercially sexually exploited youth are discussed. Published by Elsevier Inc.

  16. Exploiting Deep Neural Networks and Head Movements for Robust Binaural Localization of Multiple Sources in Reverberant Environments

    DEFF Research Database (Denmark)

    Ma, Ning; May, Tobias; Brown, Guy J.

    2017-01-01

    This paper presents a novel machine-hearing system that exploits deep neural networks (DNNs) and head movements for robust binaural localization of multiple sources in reverberant environments. DNNs are used to learn the relationship between the source azimuth and binaural cues, consisting...... of the complete cross-correlation function (CCF) and interaural level differences (ILDs). In contrast to many previous binaural hearing systems, the proposed approach is not restricted to localization of sound sources in the frontal hemifield. Due to the similarity of binaural cues in the frontal and rear...

  17. Human trafficking for labour exploitation: Interpreting the crime

    NARCIS (Netherlands)

    Coster van Voorhout, J.E.B.

    2007-01-01

    The definition of human trafficking for labour exploitation, as follows from the European Council Framework Decision, proves to be unclear. Literal interpretation does not suffice, because it does not clarify all elements of what is deemed to be criminal behaviour, and hermeneutical interpretation

  18. Indicators of Nuclear safety and exploitation in ANAV

    International Nuclear Information System (INIS)

    Quintana Prieto, M.; Jorda Alcove, M.

    2013-01-01

    The use of indicators by ANAV plants, aims to be a tool to facilitate the assessment of the behaviour of the plants nuclear over a specific time period. The following are and are they explain those related to Nuclear safety and exploitation.

  19. Human trafficking and exploitation: A global health concern.

    Directory of Open Access Journals (Sweden)

    Cathy Zimmerman

    2017-11-01

    Full Text Available In this collection review, Cathy Zimmerman and colleague introduce the PLOS Medicine Collection on Human Trafficking, Exploitation and Health, laying out the magnitude of the global trafficking problem and offering a public health policy framework to guide responses to trafficking.

  20. Quality and innovation between tipical products exploiting and new food design

    Directory of Open Access Journals (Sweden)

    Marco Dalla Rosa

    2011-02-01

    Full Text Available Scientific approach is often ignored in the production of typical and marginal foods which come from empiric trial and procedures consolidated along the time. At the beginning of the twentieth century food science starter influencing food production and processing by a multidisciplinary approach aiming at the safety guarantee of industrial products intended for large scale consumption. In the last decades researchers started taking into account traditional and marginal food products by an accurate scientific approach aiming to their exploitation and to define their quality and safety parameters. Scientific approach to marginal products can be schematically divided in two levels: analytical and technological/engineering. In general, the analytical approach focuses on chemical aspects, physical properties, aromatic and sensorial characteristics and on the microbiological and genetic characterizations. 

    The technological/engineering approach must be considered a san integration of the knowledge both about the finished product and the production process and consists of: the definition of markers connecting quality to first matter; the study of seasonal and annual variability; the search for correlations among process/environment/quality on molecular basis; the pointing out of markers to set traceability systems up; the definition of key-factors to characterize the land according to its food production as an impulse for the development of other sectors such as tourism. Finally, innovation in the sector of traditional and marginal production should concern the definition of chemicalphysical and sensorial characteristics, the rationalization of traditional processes and the introduction of new compatible technology phases, the introduction of new packaging forms to elongate the shelf life and to enlarge distribution areas guaranteeing, at the same time, the maintenance of product peculiarity and typicality. New food design is one of the most

  1. Quality and innovation between tipical products exploiting and new food design

    Directory of Open Access Journals (Sweden)

    Dino Mastrocola

    2008-04-01

    Full Text Available Scientific approach is often ignored in the production of typical and marginal foods which come from empiric trial and procedures consolidated along the time. At the beginning of the twentieth century food science starter influencing food production and processing by a multidisciplinary approach aiming at the safety guarantee of industrial products intended for large scale consumption. In the last decades researchers started taking into account traditional and marginal food products by an accurate scientific approach aiming to their exploitation and to define their quality and safety parameters. Scientific approach to marginal products can be schematically divided in two levels: analytical and technological/engineering. In general, the analytical approach focuses on chemical aspects, physical properties, aromatic and sensorial characteristics and on the microbiological and genetic characterizations. The technological/engineering approach must be considered a san integration of the knowledge both about the finished product and the production process and consists of: the definition of markers connecting quality to first matter; the study of seasonal and annual variability; the search for correlations among process/environment/quality on molecular basis; the pointing out of markers to set traceability systems up; the definition of key-factors to characterize the land according to its food production as an impulse for the development of other sectors such as tourism. Finally, innovation in the sector of traditional and marginal production should concern the definition of chemicalphysical and sensorial characteristics, the rationalization of traditional processes and the introduction of new compatible technology phases, the introduction of new packaging forms to elongate the shelf life and to enlarge distribution areas guaranteeing, at the same time, the maintenance of product peculiarity and typicality. New food design is one of the most

  2. A diagnosis method for physical systems using a multi-modeling approach

    International Nuclear Information System (INIS)

    Thetiot, R.

    2000-01-01

    In this thesis we propose a method for diagnosis problem solving. This method is based on a multi-modeling approach describing both normal and abnormal behavior of a system. This modeling approach allows to represent a system at different abstraction levels (behavioral, functional and teleological. Fundamental knowledge is described according to a bond-graph representation. We show that bond-graph representation can be exploited in order to generate (completely or partially) the functional models. The different models of the multi-modeling approach allows to define the functional state of a system at different abstraction levels. We exploit this property to exonerate sub-systems for which the expected behavior is observed. The behavioral and functional descriptions of the remaining sub-systems are exploited hierarchically in a two steps process. In a first step, the abnormal behaviors explaining some observations are identified. In a second step, the remaining unexplained observations are used to generate conflict sets and thus the consistency based diagnoses. The modeling method and the diagnosis process have been applied to a Reactor Coolant Pump Sets. This application illustrates the concepts described in this thesis and shows its potentialities. (authors)

  3. On the EU approach for DEMO architecture exploration and dealing with uncertainties

    Energy Technology Data Exchange (ETDEWEB)

    Coleman, M., E-mail: matti.coleman@euro-fusion.org [EUROfusion Consortium, Boltzmannstraße 2, 85748 Garching (Germany); CCFE Fusion Association, Culham Science Centre, Abingdon, Oxfordshire OX14 3DB (United Kingdom); Maviglia, F.; Bachmann, C. [EUROfusion Consortium, Boltzmannstraße 2, 85748 Garching (Germany); Anthony, J. [CCFE Fusion Association, Culham Science Centre, Abingdon, Oxfordshire OX14 3DB (United Kingdom); Federici, G. [EUROfusion Consortium, Boltzmannstraße 2, 85748 Garching (Germany); Shannon, M. [EUROfusion Consortium, Boltzmannstraße 2, 85748 Garching (Germany); CCFE Fusion Association, Culham Science Centre, Abingdon, Oxfordshire OX14 3DB (United Kingdom); Wenninger, R. [EUROfusion Consortium, Boltzmannstraße 2, 85748 Garching (Germany); Max-Planck-Institut für Plasmaphysik, 85748 Garching (Germany)

    2016-11-01

    Highlights: • The issue of epistemic uncertainties in the DEMO design basis is described. • An approach to tackle uncertainty by investigating plant architectures is proposed. • The first wall heat load uncertainty is addressed following the proposed approach. - Abstract: One of the difficulties inherent in designing a future fusion reactor is dealing with uncertainty. As the major step between ITER and the commercial exploitation of nuclear fusion energy, DEMO will have to address many challenges – the natures of which are still not fully known. Unlike fission reactors, fusion reactors suffer from the intrinsic complexity of the tokamak (numerous interdependent system parameters) and from the dependence of plasma physics on scale – prohibiting design exploration founded on incremental progression and small-scale experimentation. For DEMO, this means that significant technical uncertainties will exist for some time to come, and a systems engineering design exploration approach must be developed to explore the reactor architecture when faced with these uncertainties. Important uncertainties in the context of fusion reactor design are discussed and a strategy for dealing with these is presented, treating the uncertainty in the first wall loads as an example.

  4. Evaluating Maximum Wind Energy Exploitation in Active Distribution Networks

    DEFF Research Database (Denmark)

    Siano, Pierluigi; Chen, Peiyuan; Chen, Zhe

    2010-01-01

    The increased spreading of distributed and renewable generation requires moving towards active management of distribution networks. In this paper, in order to evaluate maximum wind energy exploitation in active distribution networks, a method based on a multi-period optimal power flow (OPF......) analysis is proposed. Active network management schemes such as coordinated voltage control, energy curtailment and power factor control are integrated in the method in order to investigate their impacts on the maximization of wind energy exploitation. Some case studies, using real data from a Danish...... distribution system, confirmed the effectiveness of the proposed method in evaluating the optimal applications of active management schemes to increase wind energy harvesting without costly network reinforcement for the connection of wind generation....

  5. THE META-METHOD: AN EXPERIMENTAL EVALUATION OF A THREE-SIDED DIDACTICAL APPROACH TO REINFORCE METACOGNITION AMONG SECONDARY SCHOOL STUDENTS

    NARCIS (Netherlands)

    Ernst-Militaru, Rodica; Ghysels, Joris; Nijhof, Plonie

    To stimulate learning, both cognitive and metacognitive strategies are believed to be effective. This contribution reports on the experimental evaluation of an approach to develop metacognitive skills among students in secondary school. In the experiment 653 students of two schools and three age

  6. A statistical approach to the experimental design of the sulfuric acid leaching of gold-copper ore

    Directory of Open Access Journals (Sweden)

    Mendes F.D.

    2003-01-01

    Full Text Available The high grade of copper in the Igarapé Bahia (Brazil gold-copper ore prevents the direct application of the classic cyanidation process. Copper oxides and sulfides react with cyanides in solution, causing a high consumption of leach reagent and thereby raising processing costs and decreasing recovery of gold. Studies have showm that a feasible route for this ore would be a pretreatment for copper minerals removal prior to the cyanidation stage. The goal of this experimental work was to study the experimental conditions required for copper removal from Igarapé Bahia gold-copper ore by sulfuric acid leaching by applying a statistical approach to the experimental design. By using the Plackett Burman method, it was possible to select the variables that had the largest influence on the percentage of copper extracted at the sulfuric acid leaching stage. These were temperature of leach solution, stirring speed, concentration of sulfuric acid in the leach solution and particle size of the ore. The influence of the individual effects of these variables and their interactions on the experimental response were analyzed by applying the replicated full factorial design method. Finally, the selected variables were optimized by the ascending path statistical method, which determined the best experimental conditions for leaching to achieve the highest percentage of copper extracted. Using the optimized conditions, the best leaching results showed a copper extraction of 75.5%.

  7. Exploiting sparsity of interconnections in spatio-temporal wind speed forecasting using Wavelet Transform

    International Nuclear Information System (INIS)

    Tascikaraoglu, Akin; Sanandaji, Borhan M.; Poolla, Kameshwar; Varaiya, Pravin

    2016-01-01

    Highlights: • We propose a spatio-temporal approach for wind speed forecasting. • The method is based on a combination of Wavelet decomposition and structured-sparse recovery. • Our analyses confirm that low-dimensional structures govern the interactions between stations. • Our method particularly shows improvements for profiles with high ramps. • We examine our approach on real data and illustrate its superiority over a set of benchmark models. - Abstract: Integration of renewable energy resources into the power grid is essential in achieving the envisioned sustainable energy future. Stochasticity and intermittency characteristics of renewable energies, however, present challenges for integrating these resources into the existing grid in a large scale. Reliable renewable energy integration is facilitated by accurate wind forecasts. In this paper, we propose a novel wind speed forecasting method which first utilizes Wavelet Transform (WT) for decomposition of the wind speed data into more stationary components and then uses a spatio-temporal model on each sub-series for incorporating both temporal and spatial information. The proposed spatio-temporal forecasting approach on each sub-series is based on the assumption that there usually exists an intrinsic low-dimensional structure between time series data in a collection of meteorological stations. Our approach is inspired by Compressive Sensing (CS) and structured-sparse recovery algorithms. Based on detailed case studies, we show that the proposed approach based on exploiting the sparsity of correlations between a large set of meteorological stations and decomposing time series for higher-accuracy forecasts considerably improve the short-term forecasts compared to the temporal and spatio-temporal benchmark methods.

  8. Wideband Low Noise Amplifiers Exploiting Thermal Noise Cancellation

    NARCIS (Netherlands)

    Bruccoleri, F.; Klumperink, Eric A.M.; Nauta, Bram

    2005-01-01

    Low Noise Amplifiers (LNAs) are commonly used to amplify signals that are too weak for direct processing for example in radio or cable receivers. Traditionally, low noise amplifiers are implemented via tuned amplifiers, exploiting inductors and capacitors in resonating LC-circuits. This can render

  9. A novel artificial bee colony approach of live virtual machine migration policy using Bayes theorem.

    Science.gov (United States)

    Xu, Gaochao; Ding, Yan; Zhao, Jia; Hu, Liang; Fu, Xiaodong

    2013-01-01

    Green cloud data center has become a research hotspot of virtualized cloud computing architecture. Since live virtual machine (VM) migration technology is widely used and studied in cloud computing, we have focused on the VM placement selection of live migration for power saving. We present a novel heuristic approach which is called PS-ABC. Its algorithm includes two parts. One is that it combines the artificial bee colony (ABC) idea with the uniform random initialization idea, the binary search idea, and Boltzmann selection policy to achieve an improved ABC-based approach with better global exploration's ability and local exploitation's ability. The other one is that it uses the Bayes theorem to further optimize the improved ABC-based process to faster get the final optimal solution. As a result, the whole approach achieves a longer-term efficient optimization for power saving. The experimental results demonstrate that PS-ABC evidently reduces the total incremental power consumption and better protects the performance of VM running and migrating compared with the existing research. It makes the result of live VM migration more high-effective and meaningful.

  10. Genome Scan for Selection in Structured Layer Chicken Populations Exploiting Linkage Disequilibrium Information.

    Directory of Open Access Journals (Sweden)

    Mahmood Gholami

    Full Text Available An increasing interest is being placed in the detection of genes, or genomic regions, that have been targeted by selection because identifying signatures of selection can lead to a better understanding of genotype-phenotype relationships. A common strategy for the detection of selection signatures is to compare samples from distinct populations and to search for genomic regions with outstanding genetic differentiation. The aim of this study was to detect selective signatures in layer chicken populations using a recently proposed approach, hapFLK, which exploits linkage disequilibrium information while accounting appropriately for the hierarchical structure of populations. We performed the analysis on 70 individuals from three commercial layer breeds (White Leghorn, White Rock and Rhode Island Red, genotyped for approximately 1 million SNPs. We found a total of 41 and 107 regions with outstanding differentiation or similarity using hapFLK and its single SNP counterpart FLK respectively. Annotation of selection signature regions revealed various genes and QTL corresponding to productions traits, for which layer breeds were selected. A number of the detected genes were associated with growth and carcass traits, including IGF-1R, AGRP and STAT5B. We also annotated an interesting gene associated with the dark brown feather color mutational phenotype in chickens (SOX10. We compared FST, FLK and hapFLK and demonstrated that exploiting linkage disequilibrium information and accounting for hierarchical population structure decreased the false detection rate.

  11. Exploitative Learning by Exporting

    DEFF Research Database (Denmark)

    Golovko, Elena; Lopes Bento, Cindy; Sofka, Wolfgang

    Decisions on entering foreign markets are among the most challenging but also potentially rewarding strategy choices managers can make. In this study, we examine the effect of export entry on the firm investment decisions in two activities associated with learning about new technologies...... and learning about new markets ? R&D investments and marketing investments, in search of novel insights into the content and process underlying learning by exporting. We draw from organizational learning theory for predicting changes in both R&D and marketing investment patterns that accompany firm entry......, it is predominantly the marketing-related investment decisions associated with starting to export that lead to increases in firm productivity. We conclude that learning-by-exporting might be more properly characterized as ?learning about and exploiting new markets? rather than ?learning about new technologies...

  12. Exploiting a natural auxotrophy for genetic selection.

    Science.gov (United States)

    Ramage, Elizabeth; Gallagher, Larry; Manoil, Colin

    2012-08-01

    We exploited the natural histidine auxotrophy of Francisella species to develop hisD (encodes histidinol dehydrogenase) as a positive selection marker. A shuttle plasmid (pBR103) carrying Escherichia coli hisD and designed for cloning of PCR fragments replicated in both attenuated and highly virulent Francisella strains. During this work, we formulated a simplified defined growth medium for Francisella novicida.

  13. Assessment of the potential for exploitation of the remaining reserves of coal in Poland

    International Nuclear Information System (INIS)

    Wodarski, K.; Bijanska, J.

    2014-01-01

    In mining areas belonging to the Polish mining companies, there is a significant amount of coal, contained in remaining reserves, that have not been exploited so far. For years, the mines have been evaluating the possibility of its exploitation, since it would expand its resource base and would extend its useful life. In addition, exploitation of the remaining reserves can minimize stress concentration zones in the soil, the rebel y improving conditions for maintenance of excavations and limiting the risk of shock rock. (Author)

  14. Exploiting Stretchable Metallic Springs as Compliant Electrodes for Cylindrical Dielectric Elastomer Actuators (DEAs

    Directory of Open Access Journals (Sweden)

    Chien-Hao Liu

    2017-11-01

    Full Text Available In recent years, dielectric elastomer actuators (DEAs have been widely used in soft robots and artificial bio-medical applications. Most DEAs are composed of a thin dielectric elastomer layer sandwiched between two compliant electrodes. DEAs vary in their design to provide bending, torsional, and stretch/contraction motions under the application of high external voltages. Most compliant electrodes are made of carbon powders or thin metallic films. In situations involving large deformations or improper fabrication, the electrodes are susceptible to breakage and increased resistivity. The worst cases result in a loss of conductivity and functional failure. In this study, we developed a method by which to exploit stretchable metallic springs as compliant electrodes for cylindrical DEAs. This design was inspired by the extensibility of mechanical springs. The main advantage of this approach is the fact that the metallic spring-like compliant electrodes remain conductive and do not increase the stiffness as the tube-like DEAs elongate in the axial direction. This can be attributed to a reduction in thickness in the radial direction. The proposed cylindrical structure is composed of highly-stretchable VHB 4905 film folded within a hollow tube and then sandwiched between copper springs (inside and outside to allow for stretching and contraction in the axial direction under the application of high DC voltages. We fabricated a prototype and evaluated the mechanical and electromechanical properties of the device experimentally using a high-voltage source of 9.9 kV. This device demonstrated a non-linear increase in axial stretching with an increase in applied voltage, reaching a maximum extension of 0.63 mm (axial strain of 2.35% at applied voltage of 9.9 kV. Further miniaturization and the incorporation of compressive springs are expected to allow the implementation of the proposed method in soft micro-robots and bio-mimetic applications.

  15. Exploiting Additive Manufacturing Infill in Topology Optimization for Improved Buckling Load

    DEFF Research Database (Denmark)

    Clausen, Anders; Aage, Niels; Sigmund, Ole

    2016-01-01

    Additive manufacturing (AM) permits the fabrication of functionally optimized components with high geometrical complexity. The opportunity of using porous infill as an integrated part of the manufacturing process is an example of a unique AM feature. Automated design methods are still incapable...... the standard and coating approaches to topology optimization for the MBB beam benchmark case. The optimized structures are additively manufactured using a filamentary technique. This experimental study validates the numerical model used in the coating approach. Depending on the properties of the infill...

  16. Relativistic quantum metrology: exploiting relativity to improve quantum measurement technologies.

    Science.gov (United States)

    Ahmadi, Mehdi; Bruschi, David Edward; Sabín, Carlos; Adesso, Gerardo; Fuentes, Ivette

    2014-05-22

    We present a framework for relativistic quantum metrology that is useful for both Earth-based and space-based technologies. Quantum metrology has been so far successfully applied to design precision instruments such as clocks and sensors which outperform classical devices by exploiting quantum properties. There are advanced plans to implement these and other quantum technologies in space, for instance Space-QUEST and Space Optical Clock projects intend to implement quantum communications and quantum clocks at regimes where relativity starts to kick in. However, typical setups do not take into account the effects of relativity on quantum properties. To include and exploit these effects, we introduce techniques for the application of metrology to quantum field theory. Quantum field theory properly incorporates quantum theory and relativity, in particular, at regimes where space-based experiments take place. This framework allows for high precision estimation of parameters that appear in quantum field theory including proper times and accelerations. Indeed, the techniques can be applied to develop a novel generation of relativistic quantum technologies for gravimeters, clocks and sensors. As an example, we present a high precision device which in principle improves the state-of-the-art in quantum accelerometers by exploiting relativistic effects.

  17. Exploitation of puddles for breakthroughs in claustrum research

    Directory of Open Access Journals (Sweden)

    John Irwin Johnson

    2014-05-01

    Full Text Available Since its first identification as a thin strip of gray matter enclosed between stretches of neighboring fiber bundles, the claustrum has been considered impossible to study by many modern techniques that need a certain roominess of tissue for their application. The claustrum was known as the front wall, vormauren in German from 1822, and is still called avant-mur in French. We here propose a means for breaking into and through this wall, by utilizing the instances where the claustral tissue itself has broken free into more spacious dimensions. This has occurred several times in the evolution of modern mammals, and all that needs be done is to exploit these natural expansions in order to take advantage of a great panoply of technological advances now at our disposal. So here we review the kinds of breakout puddles that await productive exploitation, to bring our knowledge of structure and function up to the level enjoyed for other more accessible regions of the brain..

  18. Expelling Slavery from the Nation: Representations of labour exploitation in Australia’s supply chain

    Directory of Open Access Journals (Sweden)

    Anna Szörényi

    2016-09-01

    Full Text Available On 4 May 2015, the Australian national broadcaster’s current affairs programme Four Corners aired an episode titled ‘Slaving Away: The dirty secrets behind Australia’s fresh food’, that provided revelations of labour exploitation of migrant workers on working holiday visas. The government reacted swiftly to these allegations with an ‘operation’ ostensibly designed to stop the exploitation. In reports of Operation Cloudburst, however, there was a shift in the media’s definition of the problem: worker exploitation became visa violations and newspapers shortly reported the resulting action taken: the ‘illegal workers’ in Australia’s food industry had been arrested. This paper tracks the competing discursive and visual representations of this case that ultimately made questions of labour rights become questions of immigration, making it plausible and acceptable that concern over exploitation of workers should be addressed by deportation of ‘illegal immigrants’. Such discursive slippage is enabled by cultural amnesia over Australia’s history of exploitation of racialised and migrant labourers, which allows ‘slavery’ to be represented as a ‘foreign’ problem that can be expelled in defence of the purity of the national domestic space.

  19. Preliminary studies of dry rock geothermal exploitation in south west England

    Energy Technology Data Exchange (ETDEWEB)

    Batchelor, A. S.; Pearson, C. M.

    1978-07-01

    A research program to develop a method to exploit the heat usually found in mines in the Cornwall area is described. Temperature gradients range from 27 to 34/sup 0/C/Km with a mean of 29.8/sup 0/C/Km. The exploitable area is defined and methods of creating an artificial geothermal field or artificial reservoir are described. Tests to determine fractures in rocks including gamma-gamma logging, tv camera, caliper, and 3-D sonic are described as are pumping tests. 15 references, 3 figures.

  20. A Mobile Application Recommendation Framework by Exploiting Personal Preference with Constraints

    Directory of Open Access Journals (Sweden)

    Konglin Zhu

    2017-01-01

    Full Text Available Explosive mobile applications (Apps are proliferating with the popularity of mobile devices (e.g., smartphones, tablets. These Apps are developed to satisfy different function needs of users. Majority of existing App Stores have difficulty in recommending proper Apps for users. Therefore, it is of significance to recommend mobile Apps for users according to personal preference and various constraints of mobile devices (e.g., battery power. In this paper, we propose a mobile App recommendation framework by incorporating different requirements from users. We exploit modern portfolio theory (MPT to combine the popularity of mobile Apps, personal preference, and mobile device constraints for mobile App recommendation. Based on this framework, we discuss the recommendation approaches by constraints of phone power and limited mobile data plan. Extensive evaluations show that the proposed mobile App recommendation framework can well adapt to power and network data plan constraints. It satisfies the user App preference and mobile device constraints.

  1. Exploiting attractiveness in persuasion: senders' implicit theories about receivers' processing motivation.

    Science.gov (United States)

    Vogel, Tobias; Kutzner, Florian; Fiedler, Klaus; Freytag, Peter

    2010-06-01

    Previous research suggests a positive correlation between physical attractiveness and the expectation of positive outcomes in social interactions, such as successful persuasion. However, prominent persuasion theories do not imply a general advantage of attractive senders. Instead, the persuasion success should vary with the receivers' processing motivation and processing capacity. Focusing on the perspective of the sender, the authors elaborate on lay theories about how attractiveness affects persuasion success. They propose that lay theories (a) match scientific models in that they also comprise the interaction of senders' attractiveness and receivers' processing characteristics, (b) guide laypersons' anticipation of persuasion success, and (c) translate into strategic behavior. They show that anticipated persuasion success depends on the interplay of perceived attractiveness and expectations about receivers' processing motivation (Experiment 1 and 2). Further experiments show that laypersons strategically attempt to exploit attractiveness in that they approach situations (Experiment 3) and persons (Experiment 4) that promise persuasion success.

  2. Influence of Machine Exploitation Effectiveness on Furniture Production Quality Level

    Directory of Open Access Journals (Sweden)

    Stasiak-Betlejewska Renata

    2015-12-01

    Full Text Available One of the most important factors determining the company‘s capacity to produce high quality products is the level of machinery operation effectiveness. Companies having modern machinery are characterized by high productivity. To obtain a high quality product, the equipment should be properly used, without any failure, which contributes significantly to the exploitation level increase. The modernity level and the exploitation effectiveness level for chosen machine producing furniture components in relation to the product quality level were analysed in the paper. As a result of the research findings analysis, proposals for corrective actions with regard to machinery maintenance and production processes were presented.

  3. A Case Study of How Organisational Members do Affect the Balancing of Exploitation and Exploration

    DEFF Research Database (Denmark)

    Andreassen, Mads R.

    2008-01-01

    study using semi-structured interviews and observation techniques this paper explores exploitation and exploration in a Danish industrial manufacture. Findings suggest that conditions affecting the balance between exploitation and exploration activities would depend on how an organisational member......Combing operations between the main parties in integration of new products, efficiently, are in practice for most organisations a challenging task demanding strong organisational capabilities, and in accordance to literature, achieving a successfully combination would be possible through...... an organisation's ability to establish dual capabilities in terms of exploitation and exploration (March, 1991). Few studies, however, suggest a classification of which organisational conditions would support a balance allowing exploitation and exploration operating side by side. Based on a single indept case...

  4. An automated approach for segmentation of intravascular ultrasound images based on parametric active contour models

    International Nuclear Information System (INIS)

    Vard, Alireza; Jamshidi, Kamal; Movahhedinia, Naser

    2012-01-01

    This paper presents a fully automated approach to detect the intima and media-adventitia borders in intravascular ultrasound images based on parametric active contour models. To detect the intima border, we compute a new image feature applying a combination of short-term autocorrelations calculated for the contour pixels. These feature values are employed to define an energy function of the active contour called normalized cumulative short-term autocorrelation. Exploiting this energy function, the intima border is separated accurately from the blood region contaminated by high speckle noise. To extract media-adventitia boundary, we define a new form of energy function based on edge, texture and spring forces for the active contour. Utilizing this active contour, the media-adventitia border is identified correctly even in presence of branch openings and calcifications. Experimental results indicate accuracy of the proposed methods. In addition, statistical analysis demonstrates high conformity between manual tracing and the results obtained by the proposed approaches.

  5. Paul Baillon presents the book "Differential manifolds: a basic approach for experimental physicists" | 25 March

    CERN Multimedia

    CERN Library

    2014-01-01

    Tuesday 25 March 2014 at 4 p.m. in the Library, bldg. 52-1-052 "Differential manifolds: a basic approach for experimental physicists" by Paul Baillon,  World Scientific, 2013, ISBN 978-981-4449-56-4. Differential manifold is the framework of particle physics and astrophysics nowadays. It is important for all research physicists to be accustomed to it, and even experimental physicists should be able to manipulate equations and expressions in this framework. This book gives a comprehensive description of the basics of differential manifold with a full proof of elements. A large part of the book is devoted to the basic mathematical concepts, which are all necessary for the development of the differential manifold. This book is self-consistent; it starts from first principles. The mathematical framework is the set theory with its axioms and its formal logic. No special knowledge is needed. Coffee will be served from 3.30 p.m.

  6. Deformation behavior of dragonfly-inspired nodus structured wing in gliding flight through experimental visualization approach.

    Science.gov (United States)

    Zhang, Sheng; Sunami, Yuta; Hashimoto, Hiromu

    2018-04-10

    Dragonfly has excellent flight performance and maneuverability due to the complex vein structure of wing. In this research, nodus as an important structural element of the dragonfly wing is investigated through an experimental visualization approach. Three vein structures were fabricated as, open-nodus structure, closed-nodus structure (with a flex-limiter) and rigid wing. The samples were conducted in a wind tunnel with a high speed camera to visualize the deformation of wing structure in order to study the function of nodus structured wing in gliding flight. According to the experimental results, nodus has a great influence on the flexibility of the wing structure. Moreover, the closed-nodus wing (with a flex-limiter) enables the vein structure to be flexible without losing the strength and rigidity of the joint. These findings enhance the knowledge of insect-inspired nodus structured wing and facilitate the application of Micro Air Vehicle (MAV) in gliding flight.

  7. Efficient Depth Map Compression Exploiting Segmented Color Data

    DEFF Research Database (Denmark)

    Milani, Simone; Zanuttigh, Pietro; Zamarin, Marco

    2011-01-01

    performances is still an open research issue. This paper presents a novel compression scheme that exploits a segmentation of the color data to predict the shape of the different surfaces in the depth map. Then each segment is approximated with a parameterized plane. In case the approximation is sufficiently...

  8. Describing Data Format Exploits Using Bitstream Segment Graphs

    NARCIS (Netherlands)

    Hartle, Michael; Schumann, Daniel; Botchak, Arsene; Tews, Erik; Mühlhäuser, Max

    2008-01-01

    Exploits based on data processing bugs are delivered through crafted data that seems to follow a data format, yet is altered in some way to trigger a specific bug during processing, eg. in order to execute contained malicious code. Decomposing crafted data according to the purported data format and

  9. Exploiting Inhibitory Siglecs to Combat Food Allergies

    Science.gov (United States)

    2017-10-01

    AWARD NUMBER: W81XWH-16-1-0302 TITLE: Exploiting Inhibitory Siglecs to Combat Food Allergies PRINCIPAL INVESTIGATOR: Michael Kulis, Ph.D...CONTRACTING ORGANIZATION: University of North Carolina at Chapel Hill Chapel Hill, NC 27599 REPORT DATES: October 2017 TYPE OF REPORT: Annual PREPARED FOR...Department of Defense, Washington Headquarters Services , Directorate for Information Operations and Reports (0704-0188), 1215 Jefferson Davis Highway, Suite

  10. Low-Level Exploitation Mitigation by Diverse Microservices

    OpenAIRE

    Otterstad , Christian; Yarygina , Tetiana

    2017-01-01

    Part 2: Microservices and Containers; International audience; This paper discusses a combination of isolatable microservices and software diversity as a mitigation technique against low-level exploitation; the effectiveness and benefits of such an architecture are substantiated. We argue that the core security benefit of microservices with diversity is increased control flow isolation. Additionally, a new microservices mitigation technique leveraging a security monitor service is introduced t...

  11. Forced Flexibility and Exploitation: Experiences of Migrant Workers in the Cleaning Industry

    Directory of Open Access Journals (Sweden)

    Natalia Ollus

    2016-03-01

    Full Text Available Globalization has resulted in structural changes in the labor markets over the last decades. These changes have weakened some of the economic and social dimensions of work. At the same time, migration and especially labor migration have increased on the global level. This article looks at the situation of migrant workers in the cleaning industry in Finland. It is based on interviews with migrant workers who have experienced labor exploitation in the cleaning industry, representatives of cleaning industry employers, and representatives of labor unions. The primary aim is to give voice to the migrant workers themselves and to analyze how they experience their work and their position in working life. The findings suggest that there is a risk that migrant workers in the cleaning sector experience various forms of exploitation. This article argues that the demand and need for (employee flexibility may turn into forced flexibility that exploits the powerless and vulnerable migrant workers who have few other options than to agree to work on poor terms. The article suggests that the structural reasons that make the exploitation of migrant labor possible should be identified and addressed in order to prevent misuse of any workers, especially migrants.

  12. Precarious Working Conditions and Exploitation of Workers in the Nigerian Informal Economy

    Directory of Open Access Journals (Sweden)

    Akeem Ayofe Akinwale

    2014-06-01

    Full Text Available Situations in the informal economy expose workers to dangers without opportunity for hazard pay, thereby reflecting exploitation. Based on the Marxist theory of conflict, this paper examines the extent of precarious working conditions and exploitation of workers in the Nigerian informal economy. A total of 500 respondents randomly selected from various informal economy organizations participated in the survey conducted in Lagos State, Nigeria. The findings revealed that most of the respondents (76.4% had worked for up to five years consecutively, followed by a few (18%, who had worked for up to ten years consecutively. Their monthly income ranged from 10,000 naira ($60 to 80,000 naira ($485. Their mean monthly income was 30,000 naira ($182. Most of them (73.5% worked for 10 to 12 hours daily, while 26.5% worked for seven to nine hours daily. The experience of low pay with relatively long daily working hours shows the extent of exploitation in the Nigerian informal economy. Several background characteristics, such as gender, age, level of education, and marital status influenced the workers’ experience of precarious working conditions and exploitation. Therefore, there is an urgent need for a progressive workplace policy that can ensure decent work and adequate protection for workers in the Nigerian informal economy.

  13. TH-E-BRF-01: Exploiting Tumor Shrinkage in Split-Course Radiotherapy

    International Nuclear Information System (INIS)

    Unkelbach, J; Craft, D; Hong, T; Papp, D; Wolfgang, J; Bortfeld, T; Ramakrishnan, J; Salari, E

    2014-01-01

    Purpose: In split-course radiotherapy, a patient is treated in several stages separated by weeks or months. This regimen has been motivated by radiobiological considerations. However, using modern image-guidance, it also provides an approach to reduce normal tissue dose by exploiting tumor shrinkage. In this work, we consider the optimal design of split-course treatments, motivated by the clinical management of large liver tumors for which normal liver dose constraints prohibit the administration of an ablative radiation dose in a single treatment. Methods: We introduce a dynamic tumor model that incorporates three factors: radiation induced cell kill, tumor shrinkage, and tumor cell repopulation. The design of splitcourse radiotherapy is formulated as a mathematical optimization problem in which the total dose to the liver is minimized, subject to delivering the prescribed dose to the tumor. Based on the model, we gain insight into the optimal administration of radiation over time, i.e. the optimal treatment gaps and dose levels. Results: We analyze treatments consisting of two stages in detail. The analysis confirms the intuition that the second stage should be delivered just before the tumor size reaches a minimum and repopulation overcompensates shrinking. Furthermore, it was found that, for a large range of model parameters, approximately one third of the dose should be delivered in the first stage. The projected benefit of split-course treatments in terms of liver sparing depends on model assumptions. However, the model predicts large liver dose reductions by more than a factor of two for plausible model parameters. Conclusion: The analysis of the tumor model suggests that substantial reduction in normal tissue dose can be achieved by exploiting tumor shrinkage via an optimal design of multi-stage treatments. This suggests taking a fresh look at split-course radiotherapy for selected disease sites where substantial tumor regression translates into reduced

  14. TH-E-BRF-01: Exploiting Tumor Shrinkage in Split-Course Radiotherapy

    Energy Technology Data Exchange (ETDEWEB)

    Unkelbach, J; Craft, D; Hong, T; Papp, D; Wolfgang, J; Bortfeld, T [Massachusetts General Hospital, Boston, MA (United States); Ramakrishnan, J [University of Wisconsin, Madison, Wisconsin (United States); Salari, E [Wichita State University, Wichita, KS (United States)

    2014-06-15

    Purpose: In split-course radiotherapy, a patient is treated in several stages separated by weeks or months. This regimen has been motivated by radiobiological considerations. However, using modern image-guidance, it also provides an approach to reduce normal tissue dose by exploiting tumor shrinkage. In this work, we consider the optimal design of split-course treatments, motivated by the clinical management of large liver tumors for which normal liver dose constraints prohibit the administration of an ablative radiation dose in a single treatment. Methods: We introduce a dynamic tumor model that incorporates three factors: radiation induced cell kill, tumor shrinkage, and tumor cell repopulation. The design of splitcourse radiotherapy is formulated as a mathematical optimization problem in which the total dose to the liver is minimized, subject to delivering the prescribed dose to the tumor. Based on the model, we gain insight into the optimal administration of radiation over time, i.e. the optimal treatment gaps and dose levels. Results: We analyze treatments consisting of two stages in detail. The analysis confirms the intuition that the second stage should be delivered just before the tumor size reaches a minimum and repopulation overcompensates shrinking. Furthermore, it was found that, for a large range of model parameters, approximately one third of the dose should be delivered in the first stage. The projected benefit of split-course treatments in terms of liver sparing depends on model assumptions. However, the model predicts large liver dose reductions by more than a factor of two for plausible model parameters. Conclusion: The analysis of the tumor model suggests that substantial reduction in normal tissue dose can be achieved by exploiting tumor shrinkage via an optimal design of multi-stage treatments. This suggests taking a fresh look at split-course radiotherapy for selected disease sites where substantial tumor regression translates into reduced

  15. Liposomal cancer therapy: exploiting tumor characteristics

    DEFF Research Database (Denmark)

    Kaasgaard, Thomas; Andresen, Thomas Lars

    2010-01-01

    an overview of current strategies for improving the different stages of liposomal cancer therapy, which involve transporting drug-loaded liposomes through the bloodstream, increasing tumor accumulation, and improving drug release and cancer cell uptake after accumulation at the tumor target site. What...... the reader will gain: The review focuses on strategies that exploit characteristic features of solid tumors, such as abnormal vasculature, overexpression of receptors and enzymes, as well as acidic and thiolytic characteristics of the tumor microenvironment. Take home message: It is concluded that the design...

  16. 75 FR 40838 - Establishment of the Advisory Board on Elder Abuse, Neglect, and Exploitation

    Science.gov (United States)

    2010-07-14

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Establishment of the Advisory Board on Elder Abuse...: Notice. Authority: The Advisory Board on Elder Abuse, Neglect, and Exploitation is authorized under... Services announces establishment of the Advisory Board on Elder Abuse, Neglect, and Exploitation, as...

  17. CFD approach to modelling, hydrodynamic analysis and motion characteristics of a laboratory underwater glider with experimental results

    Directory of Open Access Journals (Sweden)

    Yogang Singh

    2017-06-01

    Full Text Available Underwater gliders are buoyancy propelled vehicle which make use of buoyancy for vertical movement and wings to propel the glider in forward direction. Autonomous underwater gliders are a patented technology and are manufactured and marketed by corporations. In this study, we validate the experimental lift and drag characteristics of a glider from the literature using Computational fluid dynamics (CFD approach. This approach is then used for the assessment of the steady state characteristics of a laboratory glider designed at Indian Institute of Technology (IIT Madras. Flow behaviour and lift and drag force distribution at different angles of attack are studied for Reynolds numbers varying from 105 to 106 for NACA0012 wing configurations. The state variables of the glider are the velocity, gliding angle and angle of attack which are simulated by making use of the hydrodynamic drag and lift coefficients obtained from CFD. The effect of the variable buoyancy is examined in terms of the gliding angle, velocity and angle of attack. Laboratory model of glider is developed from the final design asserted by CFD. This model is used for determination of static and dynamic properties of an underwater glider which were validated against an equivalent CAD model and simulation results obtained from equations of motion of glider in vertical plane respectively. In the literature, only empirical approach has been adopted to estimate the hydrodynamic coefficients of the AUG that are required for its trajectory simulation. In this work, a CFD approach has been proposed to estimate the hydrodynamic coefficients and validated with experimental data. A two-mass variable buoyancy engine has been designed and implemented. The equations of motion for this two-mass engine have been obtained by modifying the single mass version of the equations described in the literature. The objectives of the present study are to understand the glider dynamics adopting a CFD approach

  18. On structure-exploiting trust-region regularized nonlinear least squares algorithms for neural-network learning.

    Science.gov (United States)

    Mizutani, Eiji; Demmel, James W

    2003-01-01

    This paper briefly introduces our numerical linear algebra approaches for solving structured nonlinear least squares problems arising from 'multiple-output' neural-network (NN) models. Our algorithms feature trust-region regularization, and exploit sparsity of either the 'block-angular' residual Jacobian matrix or the 'block-arrow' Gauss-Newton Hessian (or Fisher information matrix in statistical sense) depending on problem scale so as to render a large class of NN-learning algorithms 'efficient' in both memory and operation costs. Using a relatively large real-world nonlinear regression application, we shall explain algorithmic strengths and weaknesses, analyzing simulation results obtained by both direct and iterative trust-region algorithms with two distinct NN models: 'multilayer perceptrons' (MLP) and 'complementary mixtures of MLP-experts' (or neuro-fuzzy modular networks).

  19. A new approach to nonlinear constrained Tikhonov regularization

    KAUST Repository

    Ito, Kazufumi; Jin, Bangti

    2011-01-01

    operator. The approach is exploited to derive convergence rate results for a priori as well as a posteriori choice rules, e.g., discrepancy principle and balancing principle, for selecting the regularization parameter. The idea is further illustrated on a

  20. Balancing the Budget through Social Exploitation: Why Hard Times Are Even Harder for Some.

    Science.gov (United States)

    Tropman, John; Nicklett, Emily

    2012-01-01

    In all societies needs and wants regularly exceed resources. Thus societies are always in deficit; demand always exceeds supply and "balancing the budget" is a constant social problem. To make matters somewhat worse, research suggests that need- and want-fulfillment tends to further stimulate the cycle of wantseeking rather than satiating desire. Societies use various resource-allocation mechanisms, including price, to cope with gaps between wants and resources. Social exploitation is a second mechanism, securing labor from population segments that can be coerced or convinced to perform necessary work for free or at below-market compensation. Using practical examples, this article develops a theoretical framework for understanding social exploitation. It then offers case examples of how different segments of the population emerge as exploited groups in the United States, due to changes in social policies. These exploitative processes have been exacerbated and accelerated by the economic downturn that began in 2007.

  1. The Role of External Knowledge Sources and Organizational Design in the Process of Opportunity Exploitation

    DEFF Research Database (Denmark)

    Foss, Nicolai Juul; Lyngsie, Jacob; A. Zahra, Shaker

    involving 536 Danish firms shows that the use of external knowledge sources is positively associated with opportunity exploitation, but the strength of this association is significantly influenced by organizational designs that enable the firm to access external knowledge during the process of exploiting......Research highlights the role of external knowledge sources in the recognition of strategic opportunities, but is less forthcoming with respect to the role of such sources during the process of exploiting or realizing opportunities. We build on the knowledge-based view to propose that realizing...... opportunities often involves significant interactions with external knowledge sources. Organizational design can facilitate a firm’s interactions with these sources, while achieving coordination among organizational members engaged in opportunity exploitation. Our analysis of a double-respondent survey...

  2. The Role of External Knowledge Sources and Organizational Design in the Process of Opportunity Exploitation

    DEFF Research Database (Denmark)

    Foss, Nicolai Juul; Lyngsie, Jacob; Zahra, Shaker A.

    2013-01-01

    involving 536 Danish firms shows that the use of external knowledge sources is positively associated with opportunity exploitation, but the strength of this association is significantly influenced by organizational designs that enable the firm to access external knowledge during the process of exploiting......Research highlights the role of external knowledge sources in the recognition of strategic opportunities but is less forthcoming with respect to the role of such sources during the process of exploiting or realizing opportunities. We build on the knowledge-based view to propose that realizing...... opportunities often involves significant interactions with external knowledge sources. Organizational design can facilitate a firm's interactions with these sources, while achieving coordination among organizational members engaged in opportunity exploitation. Our analysis of a double-respondent survey...

  3. Preliminary exploitation of industrial facility for flue gas treatment

    International Nuclear Information System (INIS)

    Chmielewski, A.G.; Zimek, Z.; Iller, E.; Tyminski, B.; Licki, J.

    2001-01-01

    have shown that the construction solution of the reaction chamber (irradiation with scanning along the chamber axis and protective air curtain under the window to introduce the electron beam into the reaction chamber) approve themselves under industrial conditions. Calibration procedures of analytical equipment were applied to test instruments and obtain reliable data regarding facility running parameters. Experimental data obtained during preliminary exploitation show good agreement with results of theoretical calculations and performed pilot plant experiments. The results of the industrial facility preliminary exploitation indicate that: SO 2 and NO x desired pollutants removal efficiency from the flue gas can be obtained under certain conditions like sufficient humidity, suitable flue gas temperature, dose rate and ammonia stoichiometry; depends on local conditions SO 2 or NO x removal can be optimized to achieve primary goals of the installation; good reliability of the accelerators are crucial for smooth exploitation of the facility; by-product quality may be influenced by coal and water quality used in the process. The primary task of preliminary exploitation is related to facility and separate systems optimization in respect to pollutants removal efficiency, energy consumption, by-product filtration efficiency, by-product handling system perfection, accelerator testing and improvement control systems perfection. The details procedures regarding facility operation were established to achieve smooth facility exploitation under typical conditions related to EPS service. The successful implementation of this technology in EPS Pomorzany may led to decisions concerning designing and construction other flue gas treatment facilities to solve environmental problems in Poland. (author)

  4. Postural Hand Synergies during Environmental Constraint Exploitation

    Directory of Open Access Journals (Sweden)

    Cosimo Della Santina

    2017-08-01

    Full Text Available Humans are able to intuitively exploit the shape of an object and environmental constraints to achieve stable grasps and perform dexterous manipulations. In doing that, a vast range of kinematic strategies can be observed. However, in this work we formulate the hypothesis that such ability can be described in terms of a synergistic behavior in the generation of hand postures, i.e., using a reduced set of commonly used kinematic patterns. This is in analogy with previous studies showing the presence of such behavior in different tasks, such as grasping. We investigated this hypothesis in experiments performed by six subjects, who were asked to grasp objects from a flat surface. We quantitatively characterized hand posture behavior from a kinematic perspective, i.e., the hand joint angles, in both pre-shaping and during the interaction with the environment. To determine the role of tactile feedback, we repeated the same experiments but with subjects wearing a rigid shell on the fingertips to reduce cutaneous afferent inputs. Results show the persistence of at least two postural synergies in all the considered experimental conditions and phases. Tactile impairment does not alter significantly the first two synergies, and contact with the environment generates a change only for higher order Principal Components. A good match also arises between the first synergy found in our analysis and the first synergy of grasping as quantified by previous work. The present study is motivated by the interest of learning from the human example, extracting lessons that can be applied in robot design and control. Thus, we conclude with a discussion on implications for robotics of our findings.

  5. Efforts to Overcome Child Commercial Sexual Exploitation Victims in City Tourism Area, Manado

    Directory of Open Access Journals (Sweden)

    Rahmat Hidayat

    2017-09-01

    Full Text Available The tourism sector has a significant contribution to the economy of Manado City, North Sulawesi Province. However, on the other hand, it has a negative effect on the increase in the number of child commercial sexual exploitation victims and makes children into commercial sex workers. Despite not effective, the Local Government of Manado City, North Sulawesi Province, has made efforts to cope with the child commercial sexual exploitation victims. In connection with the case, this study is designed to analyze the causes of ineffectiveness of Local Government efforts in tackling child commercial sexual exploitation victims. The study was conducted in tourism area of Manado City, North Sulawesi Province. The informants involved in this study were divided into two types: experts and non-experts. The informants were determined by using Opportunistic Sampling, and the sampling is using Snowball Sampling. The results of the study showed that the development of tourism sector has negative effect on children in the communities. Efforts made to cope with child commercial sexual exploitation victims by the local government and relevant parties have not been effective due to limited allocation of budgets and skilled, quality human resources, the lack of harmonious understanding between police with judges and public prosecutors as law apparatus, supervision, and protection of victims in solving the cases of child commercial sexual exploitation victims, the implementation of action committee’s duties and responsibility have been not effect, the number of obstacles facing them.

  6. Woodward Effect Experimental Verifications

    Science.gov (United States)

    March, Paul

    2004-02-01

    The work of J. F. Woodward (1990 1996a; 1996b; 1998; 2002a; 2002b; 2004) on the existence of ``mass fluctuations'' and their use in exotic propulsion schemes was examined for possible application in improving space flight propulsion and power generation. Woodward examined Einstein's General Relativity Theory (GRT) and assumed that if the strong Machian interpretation of GRT as well as gravitational / inertia like Wheeler-Feynman radiation reaction forces hold, then when an elementary particle is accelerated through a potential gradient, its rest mass should fluctuate around its mean value during its acceleration. Woodward also used GRT to clarify the precise experimental conditions necessary for observing and exploiting these mass fluctuations or ``Woodward effect'' (W-E). Later, in collaboration with his ex-graduate student T. Mahood, they also pushed the experimental verification boundaries of these proposals. If these purported mass fluctuations occur as Woodward claims, and his assumption that gravity and inertia are both byproducts of the same GRT based phenomenon per Mach's Principle is correct, then many innovative applications such as propellantless propulsion and gravitational exotic matter generators may be feasible. This paper examines the reality of mass fluctuations and the feasibility of using the W-E to design propellantless propulsion devices in the near to mid-term future. The latest experimental results, utilizing MHD-like force rectification systems, will also be presented.

  7. Combined Teaching Method: An Experimental Study

    Science.gov (United States)

    Kolesnikova, Iryna V.

    2016-01-01

    The search for the best approach to business education has led educators and researchers to seek many different teaching strategies, ranging from the traditional teaching methods to various experimental approaches such as active learning techniques. The aim of this experimental study was to compare the effects of the traditional and combined…

  8. Exploiting Social Media Sensor Networks through Novel Data Fusion Techniques

    Energy Technology Data Exchange (ETDEWEB)

    Kouri, Tina [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Unprecedented amounts of data are continuously being generated by sensors (“hard” data) and by humans (“soft” data), and this data needs to be exploited to its full potential. The first step in exploiting this data is determine how the hard and soft data are related to each other. In this project we fuse hard and soft data, using the attributes of each (e.g., time and space), to gain more information about interesting events. Next, we attempt to use social networking textual data to predict the present (i.e., predict that an interesting event is occurring and details about the event) using data mining, machine learning, natural language processing, and text analysis techniques.

  9. Dandruff: The most commercially exploited skin disease

    Directory of Open Access Journals (Sweden)

    Ranganathan S

    2010-01-01

    Full Text Available The article discuss in detail about the prevalence, pathophysiology, clinical manifestations of dandruff including the etio-pathology. The article also discusses in detail about various treatment methods available for dandruff. The status of dandruff being amphibious - a disease/disorder, and relatively less medical intervention is sought after for the treatment, dandruff is the most commercially exploited skin and scalp disorder/disease by personal care industries.

  10. Exploiting thesauri knowledge in medical guideline formalization

    OpenAIRE

    Serban, R.C.; ten Teije, A.C.M.

    2009-01-01

    Objectives: As in software product lifecycle, the effort spent in maintaining medical knowl edge in guidelines can be reduced, if modularization, formalization and tracking of domain knowledge are employed across the guideline development phases. Methods: We propose to exploit and combine knowledge templates with medical background knowledge from existing thesauri in order to produce reusable building blocks used in guideline development. These tem- plates enable easier guideline formalizatio...

  11. An approach for formalising the supply chain operations

    Science.gov (United States)

    Zdravković, Milan; Panetto, Hervé; Trajanović, Miroslav; Aubry, Alexis

    2011-11-01

    Reference models play an important role in the knowledge management of the various complex collaboration domains (such as supply chain networks). However, they often show a lack of semantic precision and, they are sometimes incomplete. In this article, we present an approach to overcome semantic inconsistencies and incompleteness of the Supply Chain Operations Reference (SCOR) model and hence improve its usefulness and expand the application domain. First, we describe a literal web ontology language (OWL) specification of SCOR concepts (and related tools) built with the intention to preserve the original approach in the classification of process reference model entities, and hence enable the effectiveness of usage in original contexts. Next, we demonstrate the system for its exploitation, in specific - tools for SCOR framework browsing and rapid supply chain process configuration. Then, we describe the SCOR-Full ontology, its relations with relevant domain ontology and show how it can be exploited for improvement of SCOR ontological framework competence. Finally, we elaborate the potential impact of the presented approach, to interoperability of systems in supply chain networks.

  12. Exploitation Strategies in Social Parasites of Fungus Growing Ants

    DEFF Research Database (Denmark)

    Clement, Janni Dolby

    One of the most remarkable and complex parasitic interactions is social parasitism, where a parasite exploits a complete society, rather than an individual organism. By integrating into a society the parasite gains protection against predators and diseases, and can redirect resources from the host...... to increase its own fitness. The host will use a sophisticated recognition system in order to accept nestmates and expel intruders from their societies. However this defence barrier can be overcome by parasites. Among the most specialized social parasites are the inquilines that exploit social insect colonies...... to this are Acromyrmex insinuator and Acromyrmex ameliae, parasites of fungus-growing ants. By still producing a worker caste both species offers a rare opportunity to study adaptive features in parasite worker behaviour. Furthermore can closely related inquiline-host combinations give us an insight in the trade...

  13. Progress of IFERC project in the Broader Approach Activities

    International Nuclear Information System (INIS)

    Araki, M.; Sakamoto, Y.; Hayashi, K.; Ohuchi, R.; Nishitani, T.

    2010-01-01

    For contributing to the ITER project and promoting a possible early realization of DEMO, since 2007 the International Fusion Energy Research Centre (IFERC) shall perform the activities on (1) DEMO Design and R and D Coordination, (2) Computational Simulation Centre, and (3) ITER Remote Experimentation Centre in the framework under the agreement between the Government of Japan and the European Atomic Energy Community for the joint implementation of the Broader Approach Activities in the field of fusion energy. The DEMO Design activity aims at establishing a common basis for DEMO Design, including design features of DEMO, possible common concepts of DEMO, a roadmap for DEMO, and so on. Based on the common interest of EU and Japan toward DEMO, the DEMO R and D activities have been planned and carried out for the areas which are related to DEMO blanket development: SiC/SiC composites, tritium technology, materials engineering, advanced neutron multiplier, and advanced tritium breeders for DEMO blanket. In the activity of the Computational Simulation Centre, the objective is to provide and exploit a supercomputer for large scale simulation activities to analyse experimental data on fusion plasmas, prepare scenarios for ITER operation, predict the performance of the ITER facilities and contribute to the DEMO Design.

  14. Exploiting Genomic Knowledge in Optimising Molecular Breeding Programmes: Algorithms from Evolutionary Computing

    Science.gov (United States)

    O'Hagan, Steve; Knowles, Joshua; Kell, Douglas B.

    2012-01-01

    Comparatively few studies have addressed directly the question of quantifying the benefits to be had from using molecular genetic markers in experimental breeding programmes (e.g. for improved crops and livestock), nor the question of which organisms should be mated with each other to best effect. We argue that this requires in silico modelling, an approach for which there is a large literature in the field of evolutionary computation (EC), but which has not really been applied in this way to experimental breeding programmes. EC seeks to optimise measurable outcomes (phenotypic fitnesses) by optimising in silico the mutation, recombination and selection regimes that are used. We review some of the approaches from EC, and compare experimentally, using a biologically relevant in silico landscape, some algorithms that have knowledge of where they are in the (genotypic) search space (G-algorithms) with some (albeit well-tuned ones) that do not (F-algorithms). For the present kinds of landscapes, F- and G-algorithms were broadly comparable in quality and effectiveness, although we recognise that the G-algorithms were not equipped with any ‘prior knowledge’ of epistatic pathway interactions. This use of algorithms based on machine learning has important implications for the optimisation of experimental breeding programmes in the post-genomic era when we shall potentially have access to the full genome sequence of every organism in a breeding population. The non-proprietary code that we have used is made freely available (via Supplementary information). PMID:23185279

  15. Exploiting serological data to understand the epidemiology of foot ...

    African Journals Online (AJOL)

    Exploiting serological data to understand the epidemiology of foot-and-mouth disease virus serotypes circulating in Libya. Ibrahim Eldaghayes, Abdunaser Dayhum, Abdulwahab Kammon, Monier Sharif, Giancarlo Ferrari, Christianus Bartels, Keith Sumption, Donald P. King, Santina Grazioli, Emiliana Brocchi ...

  16. Exploiting conformational ensembles in modeling protein-protein interactions on the proteome scale

    Science.gov (United States)

    Kuzu, Guray; Gursoy, Attila; Nussinov, Ruth; Keskin, Ozlem

    2013-01-01

    Cellular functions are performed through protein-protein interactions; therefore, identification of these interactions is crucial for understanding biological processes. Recent studies suggest that knowledge-based approaches are more useful than ‘blind’ docking for modeling at large scales. However, a caveat of knowledge-based approaches is that they treat molecules as rigid structures. The Protein Data Bank (PDB) offers a wealth of conformations. Here, we exploited ensemble of the conformations in predictions by a knowledge-based method, PRISM. We tested ‘difficult’ cases in a docking-benchmark dataset, where the unbound and bound protein forms are structurally different. Considering alternative conformations for each protein, the percentage of successfully predicted interactions increased from ~26% to 66%, and 57% of the interactions were successfully predicted in an ‘unbiased’ scenario, in which data related to the bound forms were not utilized. If the appropriate conformation, or relevant template interface, is unavailable in the PDB, PRISM could not predict the interaction successfully. The pace of the growth of the PDB promises a rapid increase of ensemble conformations emphasizing the merit of such knowledge-based ensemble strategies for higher success rates in protein-protein interaction predictions on an interactome-scale. We constructed the structural network of ERK interacting proteins as a case study. PMID:23590674

  17. Commix: Automating Evaluation and Exploitation of Command Injection Vulnerabilities in Web Applications

    OpenAIRE

    Stasinopoulos, Anastasios; Ntantogian, Christoforos; Xenakis, Christos

    2018-01-01

    Despite the prevalence and the high impact of command injection attacks, little attention has been given by the research community to this type of code injections. Although there are many software tools to detect and exploit other types of code injections, such as SQL injections or Cross Site Scripting, there is no dedicated and specialized software that detects and exploits, automatically, command injection vulnerabilities. This paper proposes an open source tool that automates the process o...

  18. Exploiting social evolution in biofilms

    DEFF Research Database (Denmark)

    Boyle, Kerry E; Heilmann, Silja; van Ditmarsch, Dave

    2013-01-01

    Bacteria are highly social organisms that communicate via signaling molecules, move collectively over surfaces and make biofilm communities. Nonetheless, our main line of defense against pathogenic bacteria consists of antibiotics-drugs that target individual-level traits of bacterial cells...... and thus, regrettably, select for resistance against their own action. A possible solution lies in targeting the mechanisms by which bacteria interact with each other within biofilms. The emerging field of microbial social evolution combines molecular microbiology with evolutionary theory to dissect...... the molecular mechanisms and the evolutionary pressures underpinning bacterial sociality. This exciting new research can ultimately lead to new therapies against biofilm infections that exploit evolutionary cheating or the trade-off between biofilm formation and dispersal....

  19. Exploitation of pocket gophers and their food caches by grizzly bears

    Science.gov (United States)

    Mattson, D.J.

    2004-01-01

    I investigated the exploitation of pocket gophers (Thomomys talpoides) by grizzly bears (Ursus arctos horribilis) in the Yellowstone region of the United States with the use of data collected during a study of radiomarked bears in 1977-1992. My analysis focused on the importance of pocket gophers as a source of energy and nutrients, effects of weather and site features, and importance of pocket gophers to grizzly bears in the western contiguous United States prior to historical extirpations. Pocket gophers and their food caches were infrequent in grizzly bear feces, although foraging for pocket gophers accounted for about 20-25% of all grizzly bear feeding activity during April and May. Compared with roots individually excavated by bears, pocket gopher food caches were less digestible but more easily dug out. Exploitation of gopher food caches by grizzly bears was highly sensitive to site and weather conditions and peaked during and shortly after snowmelt. This peak coincided with maximum success by bears in finding pocket gopher food caches. Exploitation was most frequent and extensive on gently sloping nonforested sites with abundant spring beauty (Claytonia lanceolata) and yampah (Perdieridia gairdneri). Pocket gophers are rare in forests, and spring beauty and yampah roots are known to be important foods of both grizzly bears and burrowing rodents. Although grizzly bears commonly exploit pocket gophers only in the Yellowstone region, this behavior was probably widespread in mountainous areas of the western contiguous United States prior to extirpations of grizzly bears within the last 150 years.

  20. Population characteristics and assessment of overfishing for an exploited paddlefish population in the lower Tennessee River

    Science.gov (United States)

    Scholten, G.D.; Bettoli, P.W.

    2005-01-01

    Paddlefish Polyodon spathula (n = 576) were collected from Kentucky Lake, Kentucky-Tennessee, with experimental gill nets in 2003-2004 to assess population characteristics and the potential for commercial overfishing. Additional data were collected from 1,039 paddlefish caught by commercial gillnetters in this impoundment. Since the most recent study in 1991, size and age structure have been reduced and annual mortality has tripled. In the 1991 study, 37% of the fish collected were older than the maximum age we observed (age 11), and in 2003 annual mortality for paddlefish age 7 and older was high (A = 68%). Natural mortality is presumably low (overfishing probably occurs during drought years; however, variation in river discharge has prevented the population from being exploited at unsustainable rates in the past. ?? Copyright by the American Fisheries Society 2005.