WorldWideScience

Sample records for exploitation

  1. Consensual exploitation : the moral wrong in exploitation and legal restrictions on consensual exploitative transactions

    OpenAIRE

    van der Neut, Wendy

    2014-01-01

    This thesis is about so-­‐called consensual exploitative transactions: transactions to which all parties agree voluntarily, and which are beneficial for all parties, but which are still widely considered exploitative, and for that reason legally restricted in many countries. The thesis asks two main questions: 1. What is wrong with consensual exploitation? 2.What implications does the answer to this question have for the legal restriction of consensual transactions ...

  2. The Ethics of Exploitation

    Directory of Open Access Journals (Sweden)

    Paul McLaughlin

    2008-11-01

    Full Text Available Philosophical inquiry into exploitation has two major deficiencies to date: it assumes that exploitation is wrong by definition; and it pays too much attention to the Marxian account of exploitation. Two senses of exploitation should be distinguished: the ‘moral’ or pejorative sense and the ‘non-moral’ or ‘non-prejudicial’ sense. By demonstrating the conceptual inadequacy of exploitation as defined in the first sense, and by defining exploitation adequately in the latter sense, we seek to demonstrate the moral complexity of exploitation. We contend, moreover, that moral evaluation of exploitation is only possible once we abandon a strictly Marxian framework and attempt, in the long run, to develop an integral ethic along Godwinian lines.

  3. Hacking the art of exploitation

    CERN Document Server

    Erickson, Jon

    2003-01-01

    A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking," Hacking: The Art of Exploitation is for both technical and non-technical people who are interested in computer security. It shows how hackers exploit programs and write exploits, instead of just how to run other people's exploits. Unlike many so-called hacking books, this book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.

  4. Exploitation of Labour and Exploitation of Commodities: a “New Interpretation”

    OpenAIRE

    Veneziani, Roberto; Yoshihara, Naoki

    2011-01-01

    In the standard Okishio-Morishima approach, the existence of profits is proved to be equivalent to the exploitation of labour. Yet, it can also be proved that the existence of profits is equivalent to the ‘exploitation’ of any good. Labour and commodity exploitation are just different numerical representations of the productiveness of the economy. This paper presents an alternative approach to exploitation theory which is related to the New Interpretation (Duménil 1980; Foley 1982). In this a...

  5. Exploitation and disadvantage

    NARCIS (Netherlands)

    Ferguson, B.

    2016-01-01

    According to some accounts of exploitation, most notably Ruth Sample's (2003) degradation-based account and Robert Goodin's (1987) vulnerability-based account, exploitation occurs when an advantaged party fails to constrain their advantage in light of another's disadvantage, regardless of the cause

  6. Learning Metasploit exploitation and development

    CERN Document Server

    Balapure, Aditya

    2013-01-01

    A practical, hands-on tutorial with step-by-step instructions. The book will follow a smooth and easy-to-follow tutorial approach, covering the essentials and then showing the readers how to write more sophisticated exploits.This book targets exploit developers, vulnerability analysts and researchers, network administrators, and ethical hackers looking to gain advanced knowledge in exploitation development and identifying vulnerabilities. The primary goal is to take readers wishing to get into more advanced exploitation discovery and reaching the next level.Prior experience exploiting basic st

  7. Anthropology of sexual exploitation

    Directory of Open Access Journals (Sweden)

    Lalić Velibor

    2009-01-01

    Full Text Available In this paper, the authors observe sexual exploitation from an anthropological perspective. They analyze the rational, ethical, emotional and mythological dimensions of human sexuality. Consequently, after setting the phenomenon in a social and historical context, sexual exploitation is closely observed in the contemporary age. Based on thoughts of relevant thinkers, they make the conclusion that the elimination of sexual exploitation is not an utterly legal issue, but political and economical issues as well. Namely, legal norms are not sufficient to overcome sexual exploitation, but, political and economical relationships in contemporary societies, which will be based on sincere equal opportunities must be established.

  8. The exploitation argument against commercial surrogacy.

    Science.gov (United States)

    Wilkinson, Stephen

    2003-04-01

    This paper discusses the exploitation argument against commercial surrogacy: the claim that commercial surrogacy is morally objectionable because it is exploitative. The following questions are addressed. First, what exactly does the exploitation argument amount to? Second, is commercial surrogacy in fact exploitative? Third, if it were exploitative, would this provide a sufficient reason to prohibit (or otherwise legislatively discourage) it? The focus throughout is on the exploitation of paid surrogates, although it is noted that other parties (e.g. 'commissioning parents') may also be the victims of exploitation. It is argued that there are good reasons for believing that commercial surrogacy is often exploitative. However, even if we accept this, the exploitation argument for prohibiting (or otherwise legislatively discouraging) commercial surrogacy remains quite weak. One reason for this is that prohibition may well 'backfire' and lead to potential surrogates having to do other things that are more exploitative and/or more harmful than paid surrogacy. It is concluded therefore that those who oppose exploitation should (rather than attempting to stop particular practices like commercial surrogacy) concentrate on: (a) improving the conditions under which paid surrogates 'work'; and (b) changing the background conditions (in particular, the unequal distribution of power and wealth) which generate exploitative relationships.

  9. Exploitability Assessment with TEASER

    Science.gov (United States)

    2017-05-01

    for architectural neutral taint analysis on top of LLVM and QEMU. POC Proof of Concept : Demonstration of an exploit on a program . vii RCE Remote Code...bug with a Proof of Concept (POC), or input to a program demonstrating the ability to use a bug to exploit the application, to demonstrate the...often leads to either computationally difficult constraint solving problems or taint explosion. Given the computational difficulty of exploit

  10. Two questions about surrogacy and exploitation.

    Science.gov (United States)

    Wertheimer, Alan

    1992-01-01

    In this article I will consider two related questions about surrogacy and exploitation: (1) Is surrogacy exploitative? (2) If surrogacy is exploitative, what is the moral force of this exploitation? Briefly stated, I shall argue that whether surrogacy is exploitative depends on whether exploitation must be harmful to the exploited party or whether (as I think) there can be mutually advantageous exploitation. It also depends on some facts about surrogacy about which we have little reliable evidence and on our philosophical view on what counts as a harm to the surrogate. Our answer to the second question will turn in part on the account of exploitation we invoke in answering the first question and in part on the way in which we resolve some other questions about the justification of state interference. I shall suggest, however, that if surrogacy is a form of voluntary and mutually advantageous exploitation, then there is a strong presumption that surrogacy contracts should be permitted and even enforceable, although that presumption may be overridden on other grounds.

  11. Exploit Kit traffic analysis

    OpenAIRE

    Καπίρης, Σταμάτης; Kapiris, Stamatis

    2017-01-01

    Exploit kits have become one of the most widespread and destructive threat that Internet users face on a daily basis. Since the first actor, which has been categorized as exploit kit, namely MPack, appeared in 2006, we have seen a new era on exploit kit variants compromising popular websites, infecting hosts and delivering destructive malware, following an exponentially evolvement to date. With the growing threat landscape, large enterprises to domestic networks, have starte...

  12. A new measure of interpersonal exploitativeness

    Directory of Open Access Journals (Sweden)

    Amy B. Brunell

    2013-05-01

    Full Text Available Measures of exploitativeness evidence problems with validity and reliability. The present set of studies assessed a new measure (the Interpersonal Exploitativeness Scale that defines exploitativeness in terms of reciprocity. In Studies 1 and 2, 33 items were administered to participants. Exploratory and Confirmatory Factor Analysis demonstrated that a single factor consisting of six items adequately assess interpersonal exploitativeness. Study 3 results revealed that the Interpersonal Exploitativeness Scale was positively associated with normal narcissism, pathological narcissism, psychological entitlement, and negative reciprocity and negatively correlated with positive reciprocity. In Study 4, participants competed in a commons dilemma. Those who scored higher on the Interpersonal Exploitativeness Scale were more likely to harvest a greater share of resources over time, even while controlling for other relevant variables, such as entitlement. Together, these studies show the Interpersonal Exploitativeness Scale to be a valid and reliable measure of interpersonal exploitativeness. The authors discuss the implications of these studies.

  13. EXPLOITATION OF GRANITE BOULDER

    Directory of Open Access Journals (Sweden)

    Ivan Cotman

    1994-12-01

    Full Text Available The processes of forming, petrography, features, properties and exploitation of granite boulders are described. The directional drilling and black powder blasting is the succesful method in exploitation of granite boulders (boulder technology (the paper is published in Croatian.

  14. Exploiting VM/XA

    International Nuclear Information System (INIS)

    Boeheim, C.

    1990-03-01

    The Stanford Linear Accelerator Center has recently completed a conversion to IBM's VM/XA SP Release 2 operating system. The primary physics application had been constrained by the previous 16 megabyte memory limit. Work is underway to enable this application to exploit the new features of VM/XA. This paper presents a brief tutorial on how to convert an application to exploit VM/XA and discusses some of the SLAC experiences in doing so. 13 figs

  15. The economics of exploiting gas hydrates

    International Nuclear Information System (INIS)

    Döpke, Lena-Katharina; Requate, Till

    2014-01-01

    We investigate the optimal exploitation of methane hydrates, a recent discovery of methane resources under the sea floor, mainly located along the continental margins. Combustion of methane (releasing CO2) and leakage through blow-outs (releasing CH4) contribute to the accumulation of greenhouse gases. A second externality arises since removing solid gas hydrates from the sea bottom destabilizes continental margins and thus increases the risk of marine earthquakes. We show that in such a model three regimes can occur: i) resource exploitation will be stopped in finite time, and some of the resource will stay in situ, ii) the resource will be used up completely in finite time, and iii) the resource will be exhausted in infinite time. We also show how to internalize the externalities by policy instruments. - Highlights: • We set up a model of optimal has hydrate exploitation • We incorporate to types of damages: contribution to global warming and geo-hazards • We characterize optimal exploitation paths and study decentralization with an exploitation tax. • Three regimes can occur: • i) exploitation in finite time and some of the stock remaining in situ, • ii) exploitation in finite time and the resource will be exhausted, • iii) exploitation and exhaustion in infinite time

  16. Exploitation in International Paid Surrogacy Arrangements

    OpenAIRE

    Wilkinson, Stephen

    2015-01-01

    Abstract Many critics have suggested that international paid surrogacy is exploitative. Taking such concerns as its starting point, this article asks: (1) how defensible is the claim that international paid surrogacy is exploitative and what could be done to make it less exploitative? (2) In the light of the answer to (1), how strong is the case for prohibiting it? Exploitation could in principle be dealt with by improving surrogates' pay and conditions. However, doing so may exacerbate probl...

  17. Profits and Exploitation: A Reappraisal

    OpenAIRE

    Yoshihara, Naoki; Veneziani, Roberto

    2011-01-01

    This paper provides a mathematical analysis of the Marxian theory of the exploitation of labour in general equilibrium models. The two main definitions of Marxian exploitation in the literature, proposed by Morishima (1974) and Roemer (1982), respectively, are analysed in the context of general convex economies. It is shown that, contrary to the received view, in general these definitions do not preserve the so-called Fundamental Marxian Theorem (FMT), which states that the exploitation of la...

  18. Redefining Exploitation

    DEFF Research Database (Denmark)

    Agarwala, Rina

    2016-01-01

    This article examines how self-employed workers are organizing in the garments and waste collection industries in India. Although the question of who is profiting from self-employed workers’ labor is complex, the cases outlined in this paper highlight telling instances of how some self......-employed workers are organizing as workers. They are fighting labor exploitation by redefining the concept to include additional exploitation axes (from the state and middle class) and forms (including sexual). In doing so, they are redefining potential solutions, including identities and material benefits, to fit...... their unique needs. By expanding the category of “workers” beyond those defined by a narrow focus on a standard employer-employee relationship, these movements are also fighting exclusion from earlier labor protections by increasing the number of entitled beneficiaries. These struggles provide an important...

  19. Exploration, Exploitation, and Organizational Coordination Mechanisms

    Directory of Open Access Journals (Sweden)

    Silvio Popadiuk

    2016-03-01

    Full Text Available This paper presents an empirical relationship among exploration, exploitation, and organizational coordination mechanisms, classified as the centralization of decision-making, formalization, and connectedness. In order to analyze the findings of this survey, we used two techniques: Principal Component Analysis (PCA and Partial Least Squares Path Modeling (PLS-PM. Our analysis was supported by 249 answers from managers of companies located in Brazil (convenience sampling. Contrary to expectations, centralization and exploitation were negatively associated. Our data supports the research hypothesis that formalization is positively associated with exploitation. Although the relationship between formalization and exploration were significant, the result is contrary to the research hypothesis that we made. The relationships among connectedness and exploitation, and connectedness and exploration were both positive and significant. This relationship means that the more connectedness increases, the higher the likelihood of exploitation and exploration.

  20. Organ sales: exploitative at any price?

    Science.gov (United States)

    Lawlor, Rob

    2014-05-01

    In many cases, claims that a transaction is exploitative will focus on the details of the transaction, such as the price paid or conditions. For example, in a claim that a worker is exploited, the grounds for the claim are usually that the pay is not sufficient or the working conditions too dangerous. In some cases, however, the claim that a transaction is exploitative is not seen to rely on these finer details. Many, for example, claim that organ sales would be exploitative, in a way that doesn't seem to depend on the details. This article considers, but ultimately rejects, a number of arguments which could be used to defend this sort of claim. © 2012 John Wiley & Sons Ltd.

  1. Herbivory eliminates fitness costs of mutualism exploiters.

    Science.gov (United States)

    Simonsen, Anna K; Stinchcombe, John R

    2014-04-01

    A common empirical observation in mutualistic interactions is the persistence of variation in partner quality and, in particular, the persistence of exploitative phenotypes. For mutualisms between hosts and symbionts, most mutualism theory assumes that exploiters always impose fitness costs on their host. We exposed legume hosts to mutualistic (nitrogen-fixing) and exploitative (non-nitrogen-fixing) symbiotic rhizobia in field conditions, and manipulated the presence or absence of insect herbivory to determine if the costly fitness effects of exploitative rhizobia are context-dependent. Exploitative rhizobia predictably reduced host fitness when herbivores were excluded. However, insects caused greater damage on hosts associating with mutualistic rhizobia, as a consequence of feeding preferences related to leaf nitrogen content, resulting in the elimination of fitness costs imposed on hosts by exploitative rhizobia. Our experiment shows that herbivory is potentially an important factor in influencing the evolutionary dynamic between legumes and rhizobia. Partner choice and host sanctioning are theoretically predicted to stabilize mutualisms by reducing the frequency of exploitative symbionts. We argue that herbivore pressure may actually weaken selection on choice and sanction mechanisms, thus providing one explanation of why host-based discrimination mechanisms may not be completely effective in eliminating nonbeneficial partners. © 2014 The Authors. New Phytologist © 2014 New Phytologist Trust.

  2. Dissemination and Exploitation Strategy

    DEFF Research Database (Denmark)

    Badger, Merete; Monaco, Lucio; Fransson, Torsten

    of Technology in Sweden, Politecnico di Torino in Italy, and Eindhoven University of Technology in the Netherlands. The project is partially funded by the European Commission under the 7th Framework Programme (project no. RI-283746). This report describes the final dissemination and exploitation strategy...... for project Virtual Campus Hub. A preliminary dissemination and exploitation plan was setup early in the project as described in the deliverable D6.1 Dissemination strategy paper - preliminary version. The plan has been revised on a monthly basis during the project’s lifecycle in connection with the virtual...

  3. Exploitative and Deceptive Resource Acquisition Strategies

    Directory of Open Access Journals (Sweden)

    Joshua J. Reynolds

    2015-07-01

    Full Text Available Life history strategy (LHS and life history contingencies (LHCs should theoretically influence the use of exploitative and deceptive resource acquisition strategies. However, little research has been done in this area. The purpose of the present work was to create measures of exploitative strategies and test the predictions of life history theory. Pilot studies developed and validated a behavioral measure of cheating called the Dot Game. The role of individual LHS and LHCs (manipulated via validated story primes on cheating was investigated in Study 1. Studies 2a through 2c were conducted to develop and validate a self-report measure called the Exploitative and Deceptive Resource Acquisition Strategy Scale (EDRASS. Finally, Study 3 investigated life history and EDRASS. Results indicated that while LHS influences exploitative strategies, life history contingences had little effect. Implications of these findings are discussed.

  4. Trajectories and cycles of sexual exploitation and trafficking for sexual exploitation of women in the Peruvian Amazon

    OpenAIRE

    Mujica, Jaris

    2015-01-01

    The commercial sexual exploitation is a constant activity in the Peruvian Amazon. Around the river port of Pucallpa in ucayali region, the practice appears systematically: teenage attend taverns around the port, and those dedicated to the work of cooking camps logging, are victims of constant exploitation and many also of trafficking. this article aims to reconstruct the path of life and reproductive cycle of the forms of exploitation in a sample of 20 women, and focuses on: (i) evidence of s...

  5. Exploitation in International Paid Surrogacy Arrangements.

    Science.gov (United States)

    Wilkinson, Stephen

    2016-05-01

    Many critics have suggested that international paid surrogacy is exploitative. Taking such concerns as its starting point, this article asks: (1) how defensible is the claim that international paid surrogacy is exploitative and what could be done to make it less exploitative? (2) In the light of the answer to (1), how strong is the case for prohibiting it? Exploitation could in principle be dealt with by improving surrogates' pay and conditions. However, doing so may exacerbate problems with consent. Foremost amongst these is the argument that surrogates from economically disadvantaged countries cannot validly consent because their background circumstances are coercive. Several versions of this argument are examined and I conclude that at least one has some merit. The article's overall conclusion is that while ethically there is something to be concerned about, paid surrogacy is in no worse a position than many other exploitative commercial transactions which take place against a backdrop of global inequality and constrained options, such as poorly-paid and dangerous construction work. Hence, there is little reason to single surrogacy out for special condemnation. On a policy level, the case for prohibiting international commercial surrogacy is weak, despite legitimate concerns about consent and background poverty.

  6. Exploitation in International Paid Surrogacy Arrangements

    Science.gov (United States)

    Wilkinson, Stephen

    2015-01-01

    Abstract Many critics have suggested that international paid surrogacy is exploitative. Taking such concerns as its starting point, this article asks: (1) how defensible is the claim that international paid surrogacy is exploitative and what could be done to make it less exploitative? (2) In the light of the answer to (1), how strong is the case for prohibiting it? Exploitation could in principle be dealt with by improving surrogates' pay and conditions. However, doing so may exacerbate problems with consent. Foremost amongst these is the argument that surrogates from economically disadvantaged countries cannot validly consent because their background circumstances are coercive. Several versions of this argument are examined and I conclude that at least one has some merit. The article's overall conclusion is that while ethically there is something to be concerned about, paid surrogacy is in no worse a position than many other exploitative commercial transactions which take place against a backdrop of global inequality and constrained options, such as poorly‐paid and dangerous construction work. Hence, there is little reason to single surrogacy out for special condemnation. On a policy level, the case for prohibiting international commercial surrogacy is weak, despite legitimate concerns about consent and background poverty. PMID:27471338

  7. Exploitation and exploration dynamics in recessionary times

    OpenAIRE

    Walrave, B.

    2012-01-01

    Firm performance largely depends on the ability to adapt to, and exploit, changes in the business environment. That is, firms should maintain ecological fitness by reconfiguring their resource base to cope with emerging threats and explore new opportunities, while at the same time exploiting existing resources. As such, firms possessing the ability to simultaneously perform exploitative and explorative initiatives are more resilient. In this respect, the performance implications of balancing ...

  8. Poverty-Exploitation-Alienation.

    Science.gov (United States)

    Bronfenbrenner, Martin

    1980-01-01

    Illustrates how knowledge derived from the discipline of economics can be used to help shed light on social problems such as poverty, exploitation, and alienation, and can help decision makers form policy to minimize these and similar problems. (DB)

  9. Radiation environmental impact assessment of copper exploitation

    International Nuclear Information System (INIS)

    Fan Guang; Wen Zhijian

    2010-01-01

    The radiation environmental impact of mineral exploitation on the surrounding environment has become a public concern. This paper presents the radiation environmental impact assessment of copper exploitation. Based on the project description and detailed investigations of surrounding environment, systematic radiation environmental impacts have been identified. The environmental impacts are assessed during both construction and operation phase. The environmental protection measures have also been proposed. The related conclusion and measures can play an active role in copper exploitation and environmental protection. (authors)

  10. Competing Discourses about Youth Sexual Exploitation in Canadian News Media.

    Science.gov (United States)

    Saewyc, Elizabeth M; Miller, Bonnie B; Rivers, Robert; Matthews, Jennifer; Hilario, Carla; Hirakata, Pam

    2013-10-01

    Media holds the power to create, maintain, or break down stigmatizing attitudes, which affect policies, funding, and services. To understand how Canadian news media depicts the commercial sexual exploitation of children and youth, we examined 835 Canadian newspaper articles from 1989-2008 using a mixed methods critical discourse analysis approach, comparing representations to existing research about sexually exploited youth. Despite research evidence that equal rates of boys and girls experience exploitation, Canadian news media depicted exploited youth predominantly as heterosexual girls, and described them alternately as victims or workers in a trade, often both in the same story. News media mentioned exploiters far less often than victims, and portrayed them almost exclusively as male, most often called 'customers' or 'consumers,' and occasionally 'predators'; in contrast, research has documented the majority of sexually exploited boys report female exploiters. Few news stories over the past two decades portrayed the diversity of victims, perpetrators, and venues of exploitation reported in research. The focus on victims but not exploiters helps perpetuate stereotypes of sexual exploitation as business or a 'victimless crime,' maintains the status quo, and blurs responsibility for protecting youth under the UN Convention on the Rights of the Child. Health care providers and researchers can be advocates for accuracy in media coverage about sexual exploitation; news reporters and editors should focus on exploiters more than victims, draw on existing research evidence to avoid perpetuating stereotypes, and use accurate terms, such as commercial sexual exploitation, rather than terms related to business or trade.

  11. Simulated population responses of common carp to commercial exploitation

    Energy Technology Data Exchange (ETDEWEB)

    Weber, Michael J.; Hennen, Matthew J.; Brown, Michael L.

    2011-12-01

    Common carp Cyprinus carpio is a widespread invasive species that can become highly abundant and impose deleterious ecosystem effects. Thus, aquatic resource managers are interested in controlling common carp populations. Control of invasive common carp populations is difficult, due in part to the inherent uncertainty of how populations respond to exploitation. To understand how common carp populations respond to exploitation, we evaluated common carp population dynamics (recruitment, growth, and mortality) in three natural lakes in eastern South Dakota. Common carp exhibited similar population dynamics across these three systems that were characterized by consistent recruitment (ages 3 to 15 years present), fast growth (K = 0.37 to 0.59), and low mortality (A = 1 to 7%). We then modeled the effects of commercial exploitation on size structure, abundance, and egg production to determine its utility as a management tool to control populations. All three populations responded similarly to exploitation simulations with a 575-mm length restriction, representing commercial gear selectivity. Simulated common carp size structure modestly declined (9 to 37%) in all simulations. Abundance of common carp declined dramatically (28 to 56%) at low levels of exploitation (0 to 20%) but exploitation >40% had little additive effect and populations were only reduced by 49 to 79% despite high exploitation (>90%). Maximum lifetime egg production was reduced from 77 to 89% at a moderate level of exploitation (40%), indicating the potential for recruitment overfishing. Exploitation further reduced common carp size structure, abundance, and egg production when simulations were not size selective. Our results provide insights to how common carp populations may respond to exploitation. Although commercial exploitation may be able to partially control populations, an integrated removal approach that removes all sizes of common carp has a greater chance of controlling population abundance

  12. Managing the Innovators for Exploration and Exploitation

    Directory of Open Access Journals (Sweden)

    C. Annique UN

    2007-09-01

    Full Text Available I analyze how to manage employees to achieve a balance between exploration and exploitation in large established firms. Previous studies suggest that, although firms need to undertake both exploration and exploitation simultaneously, this is difficult either because of the scarcity of resources or because of the incompatibility of these two processes. Proposed solutions have been ambidexterity, punctuated equilibrium or specialization. I suggest another method: managing employees. Specifically, I argue that using the so-called “innovative” system of human resource management practices, consisting of team-based incentive system, team-based job design, and job rotation, enables the firm to undertake exploration and exploitation simultaneously because it provides the psychological safety for people to explore new knowledge to make novel products and develops employees to have the perspective-taking capability that enables the integration of knowledge cross-functionally for efficiency. Using the so-called “traditional” system of human resource management practices, consisting of individual-based incentive system, individual-based job design, and no job rotation, has limited impact on either exploration or exploitation because it does not create the psychological safety for people to explore new knowledge and does not develop the perspective-taking capability needed for exploitation. Moreover, mixing practices from both systems is better than only using the traditional system in achieving exploration or exploitation, but less effective than only using the innovative system as the mix of practices can create inconsistent expectations on employees.

  13. Transnational gestational surrogacy: does it have to be exploitative?

    Science.gov (United States)

    Kirby, Jeffrey

    2014-01-01

    This article explores the controversial practice of transnational gestational surrogacy and poses a provocative question: Does it have to be exploitative? Various existing models of exploitation are considered and a novel exploitation-evaluation heuristic is introduced to assist in the analysis of the potentially exploitative dimensions/elements of complex health-related practices. On the basis of application of the heuristic, I conclude that transnational gestational surrogacy, as currently practiced in low-income country settings (such as rural, western India), is exploitative of surrogate women. Arising out of consideration of the heuristic's exploitation conditions, a set of public education and enabled choice, enhanced protections, and empowerment reforms to transnational gestational surrogacy practice is proposed that, if incorporated into a national regulatory framework and actualized within a low income country, could possibly render such practice nonexploitative.

  14. Exploitation as the Unequal Exchange of Labour : An Axiomatic Approach

    OpenAIRE

    Yoshihara, Naoki; Veneziani, Roberto

    2009-01-01

    In subsistence economies with general convex technology and rational optimising agents, a new, axiomatic approach is developed, which allows an explicit analysis of the core positive and normative intuitions behind the concept of exploitation. Three main new axioms, called Labour Exploitation in Subsistence Economies , Relational Exploitation , and Feasibility of Non-Exploitation , are presented and it is proved that they uniquely characterise a definition of exploitation conceptually related...

  15. SEXUAL EXPLOITATION AND ABUSE BY UN PEACEKEEPERS ...

    African Journals Online (AJOL)

    Allaiac

    sexual exploitation of children by peacekeepers is particularly insidious. ... sexual exploitation and abuse should involve an understanding of the social .... The charges of sexual misconduct, and the consequent media exposure, have ..... awareness programmes such as video tapes, lectures and training manuals, designed.

  16. Exploitation and exploration dynamics in recessionary times

    NARCIS (Netherlands)

    Walrave, B.

    2012-01-01

    Firm performance largely depends on the ability to adapt to, and exploit, changes in the business environment. That is, firms should maintain ecological fitness by reconfiguring their resource base to cope with emerging threats and explore new opportunities, while at the same time exploiting

  17. Main principles of developing exploitation models of semiconductor devices

    Science.gov (United States)

    Gradoboev, A. V.; Simonova, A. V.

    2018-05-01

    The paper represents primary tasks, solutions of which allow to develop the exploitation modes of semiconductor devices taking into account complex and combined influence of ionizing irradiation and operation factors. The structure of the exploitation model of the semiconductor device is presented, which is based on radiation and reliability models. Furthermore, it was shown that the exploitation model should take into account complex and combine influence of various ionizing irradiation types and operation factors. The algorithm of developing the exploitation model of the semiconductor devices is proposed. The possibility of creating the radiation model of Schottky barrier diode, Schottky field-effect transistor and Gunn diode is shown based on the available experimental data. The basic exploitation model of IR-LEDs based upon double AlGaAs heterostructures is represented. The practical application of the exploitation models will allow to output the electronic products with guaranteed operational properties.

  18. Packaging of Sin Goods - Commitment or Exploitation?

    DEFF Research Database (Denmark)

    Nafziger, Julia

    to such self-control problems, and possibly exploit them, by offering different package sizes. In a competitive market, either one or three (small, medium and large) packages are offered. In contrast to common intuition, the large, and not the small package is a commitment device. The latter serves to exploit...

  19. A Theory of Exploitative Child Labor

    OpenAIRE

    Carol Ann Rogers; Kenneth A. Swinnerton

    2003-01-01

    Child labor laws should aim to protect children who work, instead of trying to remove children from work. In this paper, we identify an instance when the risk of exploitation lowers the expected bene…t of child labor to the child,and therefore suppresses child labor force participation. Targeted legal intervention that lowers or removes the risk of exploitation raises child participation in the labor market, child welfare, and overall societal welfare. Targeting on child labor more broadly ma...

  20. Rationalising predictors of child sexual exploitation and sex-trading.

    Science.gov (United States)

    Klatt, Thimna; Cavner, Della; Egan, Vincent

    2014-02-01

    Although there is evidence for specific risk factors leading to child sexual exploitation and prostitution, these influences overlap and have rarely been examined concurrently. The present study examined case files for 175 young persons who attended a voluntary organization in Leicester, United Kingdom, which supports people who are sexually exploited or at risk of sexual exploitation. Based on the case files, the presence or absence of known risk factors for becoming a sex worker was coded. Data were analyzed using t-test, logistic regression, and smallest space analysis. Users of the voluntary organization's services who had been sexually exploited exhibited a significantly greater number of risk factors than service users who had not been victims of sexual exploitation. The logistic regression produced a significant model fit. However, of the 14 potential predictors--many of which were associated with each other--only four variables significantly predicted actual sexual exploitation: running away, poverty, drug and/or alcohol use, and having friends or family members in prostitution. Surprisingly, running away was found to significantly decrease the odds of becoming involved in sexual exploitation. Smallest space analysis of the data revealed 5 clusters of risk factors. Two of the clusters, which reflected a desperation and need construct and immature or out-of-control lifestyles, were significantly associated with sexual exploitation. Our research suggests that some risk factors (e.g. physical and emotional abuse, early delinquency, and homelessness) for becoming involved in sexual exploitation are common but are part of the problematic milieu of the individuals affected and not directly associated with sex trading itself. Our results also indicate that it is important to engage with the families and associates of young persons at risk of becoming (or remaining) a sex worker if one wants to reduce the numbers of persons who engage in this activity. Copyright

  1. Shale gas exploitation: Status, problems and prospect

    Directory of Open Access Journals (Sweden)

    Shiqian Wang

    2018-02-01

    Full Text Available Over the past five years, great progress has been made in shale gas exploitation, which has become the most driving force for global gas output growth. Hydrocarbon extraction from shale helps drive the USA on the road to energy independence. Besides, shale oil & gas production has been kept in a sustained growth by continuous improvement in drilling efficiency and well productivity in the case of tumbling oil prices and rig counts. Shale gas reserves and production have been in a rapid growth in China owing to the Lower Paleozoic Wufeng and Longmaxi shale gas exploitation in the Sichuan Basin, which has become an important sector for the future increment of gas reserves and output in China. However, substantial progress has been made neither in non-marine shale gas exploitation as previously expected nor in the broad complicated tectonic areas in South China for which a considerable investment was made. Analysis of the basic situation and issues in domestic shale gas development shows that shale gas exploitation prospects are constrained by many problems in terms of resources endowment, horizontal well fracturing technology, etc. especially in non-marine shale deposits and complicated tectonic areas in South China where hot shales are widely distributed but geological structures are found severely deformed and over matured. Discussion on the prospects shows that the sustained and steady growth in shale gas reserves and production capacity in the coming years lies in the discovery and supersession of new shale plays in addition to Wufeng and Longmaxi shale plays, and that a technological breakthrough in ultra-high-pressure and ultra-deep (over 3500 m buried in the Sichuan Basin marine shale gas exploitation is the key and hope. Keywords: Shale gas, Exploitation, Marine facies, Hot shale, Resource endowment, Sichuan Basin, South China, Complicated tectonic area, Gas play

  2. The possibilities of exploitation of Serbian thermomineral waters

    International Nuclear Information System (INIS)

    Jovanovic, L.

    2002-01-01

    Global ecological problem of petrol resources deficit caused an intensive search of alternative energy sources. Deficit of conventional energy fluids in Yugoslavia requires serious efforts to create a program of alternative energy sources exploitation. Geothermal energy represents an important energetic source for the countries with poor energy resources. Geothermal energy can become the basis for economic development. At present these geothermal resources are not being exploited in Yugoslavia. The possibilities of effective exploitation of thermal and thermomineral water resources in Yugoslavia are presented in this paper

  3. Thermal Property Engineering: Exploiting the Properties of Ceramic Nanocomposites

    Science.gov (United States)

    2018-03-01

    ARL-TR-8308 ● MAR 2018 US Army Research Laboratory Thermal Property Engineering : Exploiting the Properties of Ceramic...return it to the originator. ARL-TR-8308 ● MAR 2018 US Army Research Laboratory Thermal Property Engineering : Exploiting the...2015 – Dec 31 2017 4. TITLE AND SUBTITLE Thermal Property Engineering : Exploiting the Properties of Ceramic Nanocomposites 5a. CONTRACT NUMBER 5b

  4. Rethinking exploitation: a process-centered account.

    Science.gov (United States)

    Jansen, Lynn A; Wall, Steven

    2013-12-01

    Exploitation has become an important topic in recent discussions of biomedical and research ethics. This is due in no small measure to the influence of Alan Wertheimer's path-breaking work on the subject. This paper presents some objections to Wertheimer's account of the concept. The objections attempt to show that his account places too much emphasis on outcome-based considerations and too little on process-based considerations. Building on these objections, the paper develops an alternative process-centered account of the concept. This alternative account of exploitation takes as its point of departure the broadly Kantian notion that it is wrong to use another as an instrument for the advancement of one's own ends. It sharpens this slippery notion and adds a number of refinements to it. The paper concludes by arguing that process-centered accounts of exploitation better illuminate the ethical challenges posed by research on human subjects than outcome-centered accounts.

  5. The Theory of Exploitation as the Unequal Exchange of Labour

    OpenAIRE

    Veneziani, Roberto; Yoshihara, Naoki

    2016-01-01

    This paper analyses the normative and positive foundations of the theory of exploitation as the unequal exchange of labour (UEL). The key intuitions behind all of the main approaches to UEL exploitation are explicitly analysed as a series of formal claims in a general economic environment. It is then argued that these intuitions can be captured by one fundamental axiom - called Labour Exploitation - which defines the basic domain of all UEL exploitation forms and identifies the formal and the...

  6. The theory of exploitation as the unequal exchange of labour

    OpenAIRE

    Veneziani, Roberto; Yoshihara, Naoki

    2017-01-01

    This paper analyses the normative and positive foundations of the theory of exploitation as the unequal exchange of labour (UEL). The key intuitions behind all of the main approaches to UEL exploitation are explicitly analysed as a series of formal claims in a general economic environment. It is then argued that these intuitions can be captured by one fundamental axiom - called Labour Exploitation - which defines the basic domain of all UEL exploitation forms and identifies the formal and the...

  7. Fishery Development and Exploitation in South East Australia

    Directory of Open Access Journals (Sweden)

    Camilla Novaglio

    2018-04-01

    Full Text Available Understanding the full extent of past ecological changes in human-influenced marine systems is needed to inform present management policies, but is often hampered by the scarcity of information about exploitation practices and population status over the entire history of fishing. The history of commercial fishing in South East Australia is relatively recent and thus easier to document. Our aim is to reconstruct such history and to use this information to understand general patterns and consequences of fishing exploitation. Intense exploitation of marine resources arrived in South East Australia with European colonization in the early 1800s, and unregulated sealing, whaling and oyster dredging resulted in the first documented significant impact on local marine populations. Exploitation extended to demersal resources in 1915 when the trawl fishery developed. Between the early 1800s and the 1980s, some of the exploited stocks collapsed, but fishing moved further offshore and in deeper waters as technology improved and new resources became available or were discovered. This phase of fisheries expansion masked the unsustainable nature of some fishing industries, such as trawling and whaling, and postponed the need for management regulations. From the 1990s onward, an increasing awareness of the depleted nature of some fisheries led to the establishment of management strategies aiming at a more sustainable exploitation of target stocks and, from the mid-2000s onwards, management strategies were revised and improved to better address the effect of fishing on multiple components of marine ecosystems. This led to the recovery of some depleted populations and to increased habitat protection. The relatively short history of fishing exploitation and the small scale of the fishing industry in South East Australia played a significant role in limiting the magnitude of fishing impacts on local populations and helped to achieve recoveries when fisheries

  8. From Exploitation to Industry: Definitions, Risks, and Consequences of Domestic Sexual Exploitation and Sex Work Among Women and Girls.

    Science.gov (United States)

    Gerassi, Lara

    In the last 15 years, terms such as prostitution, sex trafficking, sexual exploitation, modern-day slavery, and sex work have elicited much confusion and debate as to their definitions. Consequently several challenges have emerged for both law enforcement in the prosecution of criminals and practitioners in service provision. This article reviews the state of the literature with regard to domestic, sexual exploitation among women and girls in the United States and seeks to (1) provide definitions and describe the complexity of all terms relating to domestic sexual exploitation of women and girls in the United States, (2) explore available national prevalence data according to the definitions provided, and (3) review the evidence of mental health, social, and structural risk factors at the micro-, mezzo-, and macrolevels.

  9. The ESA Geohazard Exploitation Platform

    Science.gov (United States)

    Bally, Philippe; Laur, Henri; Mathieu, Pierre-Philippe; Pinto, Salvatore

    2015-04-01

    Earthquakes represent one of the world's most significant hazards in terms both of loss of life and damages. In the first decade of the 21st century, earthquakes accounted for 60 percent of fatalities from natural disasters, according to the United Nations International Strategy for Disaster Reduction (UNISDR). To support mitigation activities designed to assess and reduce risks and improve response in emergency situations, satellite EO can be used to provide a broad range of geo-information services. This includes for instance crustal block boundary mapping to better characterize active faults, strain rate mapping to assess how rapidly faults are deforming, soil vulnerability mapping to help estimate how the soil is behaving in reaction to seismic phenomena, geo-information to assess the extent and intensity of the earthquake impact on man-made structures and formulate assumptions on the evolution of the seismic sequence, i.e. where local aftershocks or future main shocks (on nearby faults) are most likely to occur. In May 2012, the European Space Agency and the GEO Secretariat convened the International Forum on Satellite EO for Geohazards now known as the Santorini Conference. The event was the continuation of a series of international workshops such as those organized by the Geohazards Theme of the Integrated Global Observing Strategy Partnership. In Santorini the seismic community has set out a vision of the EO contribution to an operational global seismic risk program, which lead to the Geohazard Supersites and Natural Laboratories (GSNL) initiative. The initial contribution of ESA to suuport the GSNL was the first Supersites Exploitation Platform (SSEP) system in the framework of Grid Processing On Demand (GPOD), now followed by the Geohazard Exploitation Platform (GEP). In this presentation, we will describe the contribution of the GEP for exploiting satellite EO for geohazard risk assessment. It is supporting the GEO Supersites and has been further

  10. Oil exploitation and the environmental Kuznets curve

    International Nuclear Information System (INIS)

    Esmaeili, Abdoulkarim; Abdollahzadeh, Negar

    2009-01-01

    This study refers to a panel estimation of an environmental Kuznets curve (EKC) for oil to determine the factors most affecting oil exploitation in 38 oil-producing countries during 1990-2000. Control variables such as oil reserves, oil price, population, political rights, and the Gini index were used to determine its contribution to the main EKC model. The empirical results fully support the existence of an EKC for oil exploitation. Furthermore, the result indicates that the proved oil reserves has a significant and positive role in oil production, but oil price and population do not significantly affect crude oil production. Also, increased freedoms and a better income distribution will reduce the rate of oil exploitation. Thus, policies aiming at enhancing democratic society and better income distribution would be more compatible with sustainability. (author)

  11. Oil exploitation and the environmental Kuznets curve

    Energy Technology Data Exchange (ETDEWEB)

    Esmaeili, Abdoulkarim; Abdollahzadeh, Negar [Department of Agricultural Economics, College of Agriculture, Shiraz University, Shiraz, Fars (Iran)

    2009-01-15

    This study refers to a panel estimation of an environmental Kuznets curve (EKC) for oil to determine the factors most affecting oil exploitation in 38 oil-producing countries during 1990-2000. Control variables such as oil reserves, oil price, population, political rights, and the Gini index were used to determine its contribution to the main EKC model. The empirical results fully support the existence of an EKC for oil exploitation. Furthermore, the result indicates that the proved oil reserves has a significant and positive role in oil production, but oil price and population do not significantly affect crude oil production. Also, increased freedoms and a better income distribution will reduce the rate of oil exploitation. Thus, policies aiming at enhancing democratic society and better income distribution would be more compatible with sustainability. (author)

  12. Security option file - Exploitation (DOS-Expl)

    International Nuclear Information System (INIS)

    2016-01-01

    This document aims at presenting functions performed by Cigeo during its exploitation phase, its main technical and security options which are envisaged with respect to different types of internal or external risks, and a first assessment of its impact on mankind and on the environment during its exploitation in normal operation as well as in incidental or accidental situations. A first volume addresses security principles, approach and management in relationship with the legal and regulatory framework. The second volume presents input data related to waste parcels and used for the installation sizing and operation, the main site characteristics, the main technical options regarding structures and equipment, and the main options regarding exploitation (parcel management, organisational and human aspects, and effluent management). The third volume describes how parcel are processed from their arrival to their setting in storage compartment, an inventory of internal and external risks, and a first assessment of consequences of scenarios on mankind and on the environment. The fourth volume presents options and operations which are envisaged regarding Cigeo closure, and inventory of associated risks

  13. From Exploitation to Industry: Definitions, Risks, and Consequences of Domestic Sexual Exploitation and Sex Work Among Women and Girls

    Science.gov (United States)

    Gerassi, Lara

    2015-01-01

    In the last 15 years, terms such as prostitution, sex trafficking, sexual exploitation, modern-day slavery, and sex work have elicited much confusion and debate as to their definitions. Consequently several challenges have emerged for both law enforcement in the prosecution of criminals and practitioners in service provision. This article reviews the state of the literature with regard to domestic, sexual exploitation among women and girls in the United States and seeks to (1) provide definitions and describe the complexity of all terms relating to domestic sexual exploitation of women and girls in the United States, (2) explore available national prevalence data according to the definitions provided, and (3) review the evidence of mental health, social, and structural risk factors at the micro-, mezzo-, and macrolevels. PMID:26726289

  14. Early Sexual Exploitation as an Influence in Prostitution.

    Science.gov (United States)

    Silbert, Mimi H.; Pines, Ayala M.

    1983-01-01

    Surveyed 200 female street prostitutes to determine whether they were sexually exploited during childhood. Results showed 60 percent of the subjects were sexually exploited. The few girls who discussed their abuse with others were met with shame and most often inaction. Only 10 percent were abused by strangers. (JAC)

  15. Dissemination and Exploitation: Project Goals beyond Science

    Science.gov (United States)

    Hamann, Kristin; Reitz, Anja

    2017-04-01

    Dissemination and Exploitation are essential parts of public funded projects. In Horizon 2020 a plan for the exploitation and dissemination of results (PEDR) is a requirement. The plan should contain a clear vision on the objectives of the project in relation to actions for dissemination and potential exploitation of the project results. The actions follow the basic idea to spread the knowledge and results gathered within the project and face the challenge of how to bring the results into potentially relevant policy circle and how they impact the market. The plan follows the purpose to assess the impact of the project and to address various target groups who are interested in the project results. Simply put, dissemination concentrates on the transfer of knowledge and exploitation on the commercialization of the project. Beyond the question of the measurability of project`s impact, strategies within science marketing can serve purposes beyond internal and external communication. Accordingly, project managers are facing the challenge to implement a dissemination and exploitation strategy that ideally supports the identification of all partners with the project and matches the current discourse of the project`s content within the society, politics and economy. A consolidated plan might unite all projects partners under a central idea and supports the identification with the project beyond the individual research questions. Which applications, strategies and methods can be used to bring forward a PEDR that accompanies a project successfully and allows a comprehensive assessment of the project afterwards? Which hurdles might project managers experience in the dissemination process and which tasks should be fulfilled by the project manager?

  16. [Ecotourism exploitation model in Bita Lake Natural Reserve of Yunnan].

    Science.gov (United States)

    Yang, G; Wang, Y; Zhong, L

    2000-12-01

    Bita lake provincial natural reserve is located in Shangri-La region of North-western Yunnan, and was set as a demonstrating area for ecotourism exploitation in 1998. After a year's exploitation construction and half a year's operation as a branch of the 99' Kunming International Horticulture Exposition to accept tourists, it was proved that the ecotourism demonstrating area attained four integrated functions of ecotourism, i.e., tourism, protection, poverty clearing and environment education. Five exploitation and management models including function zoned exploitation model, featured tourism communication model signs system designing model, local Tibetan family reception model and environmental monitoring model, were also successful, which were demonstrated and spreaded to the whole province. Bita lake provincial natural reserve could be a good sample for the ecotourism exploitation natural reserves of the whole country.

  17. Exploitation program of ''Adamow'' quarry up to 2015

    International Nuclear Information System (INIS)

    Hadlaw, A.

    1994-01-01

    The brown coal deposits exploited by the quarry ''Adamow'' located in Central Poland are shortly described and the prognosis of their exploitation up to 2015 is given. The basis data on the perspective deposits in the quarry's area are also presented. All deposits are shown on the map. 3 ills, 2 tabs

  18. zero day exploits and national readiness for cyber-warfare

    African Journals Online (AJOL)

    HOD

    A zero day vulnerability is an unknown exploit that divulges security flaws in software before such a flaw is publicly ... Keywords: exploits, zero day, vulnerability, cyberspace, cyber-warfare. 1. ..... industries and companies across the globe. The.

  19. From Exploitation to Industry: Definitions, Risks, and Consequences of Domestic Sexual Exploitation and Sex Work Among Women and Girls

    OpenAIRE

    Gerassi, Lara

    2015-01-01

    In the last 15 years, terms such as prostitution, sex trafficking, sexual exploitation, modern-day slavery, and sex work have elicited much confusion and debate as to their definitions. Consequently several challenges have emerged for both law enforcement in the prosecution of criminals and practitioners in service provision. This article reviews the state of the literature with regard to domestic, sexual exploitation among women and girls in the United States and seeks to (1) provide definit...

  20. Teotihuacan, tepeapulco, and obsidian exploitation.

    Science.gov (United States)

    Charlton, T H

    1978-06-16

    Current cultural ecological models of the development of civilization in central Mexico emphasize the role of subsistence production techniques and organization. The recent use of established and productive archeological surface survey techniques along natural corridors of communication between favorable niches for cultural development within the Central Mexican symbiotic region resulted in the location of sites that indicate an early development of a decentralized resource exploitation, manufacturing, and exchange network. The association of the development of this system with Teotihuacán indicates the importance such nonsubsistence production and exchange had in the evolution of this first central Mexican civilization. The later expansion of Teotihuacán into more distant areas of Mesoamerica was based on this resource exploitation model. Later civilizations centered at Tula and Tenochtitlán also used such a model in their expansion.

  1. Aspects économiques de l'exploitation des resources halieutiques ...

    African Journals Online (AJOL)

    Aspects économiques de l'exploitation des resources halieutiques des petits barrages du Nord de la Côte d' lvoire : Economic aspects of the exploitation of halieutic resources of petits barrages inland waters in the north of Côte d'lvoire.

  2. Information source exploitation/exploration and NPD decision-making

    DEFF Research Database (Denmark)

    Jespersen, Kristina Risom

    different Scandinavian companies. Data was analyzed using hierarchical regression models across decision criteria dimensions and NPD stages as well as analyzing the combination of selected information sources. Rather than forwarding one optimal search behavior for the entire NPD process, we find optimal...... information search behavior at either end of the exploitation/exploration continuum. Additionally, we find that overexploitation and overexploration is caused by managerial bias. This creates managerial misbehavior at gate decision-points of the NPD process.......The purpose of this study is to examine how the exploration/exploitation continuum is applied by decision-makers in new product gate decision-making. Specifically, we analyze at gate decision-points how the evaluation of a new product project is affected by the information source exploitation...

  3. Exploiting opportunities at all cost? Entrepreneurial intent and externalities

    NARCIS (Netherlands)

    Urbig, D.; Weitzel, G.U.; Rosenkranz, S.; van Witteloostuijn, A.

    2011-01-01

    they exploit welfare-enhancing opportunities as it is assumed in several normative models? Do we need to prevent potential entrepreneurs from being destructive or are there intrinsic limits to harm others? We experimentally investigate how people with different entrepreneurial intent exploit risky

  4. Exploitation and Utilization of Oilfield Geothermal Resources in China

    Directory of Open Access Journals (Sweden)

    Shejiao Wang

    2016-09-01

    Full Text Available Geothermal energy is a clean, green renewable resource, which can be utilized for power generation, heating, cooling, and could effectively replace oil, gas, and coal. In recent years, oil companies have put more efforts into exploiting and utilizing geothermal energy with advanced technologies for heat-tracing oil gathering and transportation, central heating, etc., which has not only reduced resource waste, but also improved large-scale and industrial resource utilization levels, and has achieved remarkable economic and social benefits. Based on the analysis of oilfield geothermal energy development status, resource potential, and exploitation and utilization modes, the advantages and disadvantages of harnessing oilfield geothermal resource have been discussed. Oilfield geothermal energy exploitation and utilization have advantages in resources, technical personnel, technology, and a large number of abandoned wells that could be reconstructed and utilized. Due to the high heat demand in oilfields, geothermal energy exploitation and utilization can effectively replace oil, gas, coal, and other fossil fuels, and has bright prospects. The key factors limiting oilfield geothermal energy exploitation and utilization are also pointed out in this paper, including immature technologies, lack of overall planning, lack of standards in resource assessment, and economic assessment, lack of incentive policies, etc.

  5. Network exploitation using WAMI tracks

    Science.gov (United States)

    Rimey, Ray; Record, Jim; Keefe, Dan; Kennedy, Levi; Cramer, Chris

    2011-06-01

    Creating and exploiting network models from wide area motion imagery (WAMI) is an important task for intelligence analysis. Tracks of entities observed moving in the WAMI sensor data are extracted, then large numbers of tracks are studied over long time intervals to determine specific locations that are visited (e.g., buildings in an urban environment), what locations are related to other locations, and the function of each location. This paper describes several parts of the network detection/exploitation problem, and summarizes a solution technique for each: (a) Detecting nodes; (b) Detecting links between known nodes; (c) Node attributes to characterize a node; (d) Link attributes to characterize each link; (e) Link structure inferred from node attributes and vice versa; and (f) Decomposing a detected network into smaller networks. Experimental results are presented for each solution technique, and those are used to discuss issues for each problem part and its solution technique.

  6. Nanostructured Basaltfiberconcrete Exploitational Characteristics

    Science.gov (United States)

    Saraykina, K. A.; Shamanov, V. A.

    2017-11-01

    The article demonstrates that the mass use of basalt fiber concrete (BFC) is constrained by insufficient study of their durability and serviceability in a variety of environments. This research is aimed at the study of the basalt fiber corrosion processes in the cement stone of BFC, the control of the new products structure formation in order to protect the reinforcing fiber from alkaline destruction and thereby improve the exploitational characteristics of the composite. The research result revealed that the modification of basaltfiber concrete by the dispersion of MWNTs contributes to the directional formation of new products in the cement matrix. The HAM additive in basaltfiberconcrete provides for the binding of portlandite to low-basic calcium hydroaluminosilicates, thus reducing the aggressive effect of the cement environment on the reinforcing fibers properties. The complex modification of BFC with nanostructured additives provides for an increase in its durability and exploitational properties (strength, frost resistance and water resistance) due to basalt fiber protection from alkali corrosion on account of the compacting of the contact zone “basalt fiber - cement stone” and designing of the new products structure and morphology of cement matrix over the fiber surface.

  7. On species preservation and Non-Cooperative Exploiters

    DEFF Research Database (Denmark)

    Kronbak, Lone Grønbæk; Lindroos, Marko

    cases where several non-cooperative exploiters are involved in mixed fisheries. This paper is targeting biodiversity preservation by setting up a two species model with the aim of ensuring both species survive harvesting of exploiters adapting a non-cooperative behaviour. The model starts out as a multi......-species model without biological dependency and is then modified to include also biological dependency. We contribute to the literature by analytically finding the limits on the number of players preserving both species including the conditions to be satisfied. For visual purposes we simulate a two species...

  8. Trolling may intensify exploitation in crappie fisheries

    Science.gov (United States)

    Meals, K. O.; Dunn, A. W.; Miranda, Leandro E.

    2012-01-01

    In some parts of the USA, anglers targeting crappies Pomoxis spp. are transitioning from mostly stationary angling with a single pole around submerged structures to using multiple poles while drifting with the wind or under power. This shift in fishing methods could result in a change in catch efficiency, possibly increasing exploitation rates to levels that would be of concern to managers. We studied the catch statistics of anglers fishing while trolling with multiple poles (trollers) and those fishing with single poles (polers) in Mississippi reservoirs. Specifically, we tested whether (1) various catch statistics differed between trollers and polers, (2) catch rates of trollers were related to the number of poles fished, and (3) trollers could raise exploitation rates to potentially unsustainable levels. Results showed that participation in the crappie fisheries was about equally split between polers and trollers. In spring, 90% of crappie anglers were polers; in summer, 85% of crappie anglers were trollers. The size of harvested crappies was similar for the two angler groups, but the catch per hour was almost three times higher for trollers than for polers. Catch rates by trollers were directly correlated to the number of poles fished, although the relationship flattened as the number of poles increased. The average harvest rate for one troller fishing with three poles was similar to the harvest rate obtained by one poler. Simulations predicted that at the existing mix of about 50% polers and 50% trollers and with no restrictions on the number of poles used by trollers, exploitation of crappies is about 1.3 times higher than that in a polers-only fishery; under a scenario in which 100% of crappie anglers were trollers, exploitation was forecasted to increase to about 1.7 times the polers-only rate. The efficiency of trolling for crappies should be of concern to fishery managers because crappie fisheries are mostly consumptive and may increase exploitation

  9. Models of Social Exploitation with Special Emphasis on Slovenc Traffic Economics

    Directory of Open Access Journals (Sweden)

    Iztok Ostan

    2005-01-01

    Full Text Available In order to decipher the organisational behaviour operatingin the transport sector of the economy it is necessary to discoverthe prevalent patterns of social exploitation at work. PreliminaJyresults of a study of experienced irregular traffic studentsshow that, according to them there is no significant differencein Slovenia between exploitation in traffic and other sectors.Thus, general models of exploitation could be used to explainthe behaviour in the traffic sector. Empirical research amongSlovene students showed that according to their statements inthe 90s the managerial and capitalistic types of exploitation prevailedin Slovenia over non-exploitative types of economic behaviour.It also showed that statements of students do not differmuch from those of the general public regarding this question,nor from the statements of irregular students with extensivework experience. It was also found that there were no substantialdifferences between the statements of Italian and Slovenestudents regarding the type of exploitation operative in theircountries. Students of traffic are basically of the same opinionregarding this topic as students in general, though slightly morecritical, especially towards business managers and politicians.

  10. Meaning, function and methods of the recultivation in mining exploitation

    OpenAIRE

    Dambov, Risto; Ljatifi, Ejup

    2015-01-01

    With the exploitation of mineral resources is performed degradation and deformation of the relief and the general part of surface of the Earth's crust. Depending on the type of open pit mine, this degradation can be expressed to a lesser or greater extent, and sometimes in several square kilometers. The exploitation of mineral resources is with unbreakable link with the environment. Very often it is said that mining is „enemy No. 1“ for environment. With exploitation comes to degradation of h...

  11. Peat exploitation - Environment. Effects and measures

    International Nuclear Information System (INIS)

    Stenbeck, G.

    1996-01-01

    This report gives a detailed description of the influence of peat exploitation on the land-, water- and atmospheric environments. Proposals for mitigatory measures to minimize damage to the environment are also given

  12. Intelligence, mapping, and geospatial exploitation system (IMAGES)

    Science.gov (United States)

    Moellman, Dennis E.; Cain, Joel M.

    1998-08-01

    This paper provides further detail to one facet of the battlespace visualization concept described in last year's paper Battlespace Situation Awareness for Force XXI. It focuses on the National Imagery and Mapping Agency (NIMA) goal to 'provide customers seamless access to tailorable imagery, imagery intelligence, and geospatial information.' This paper describes Intelligence, Mapping, and Geospatial Exploitation System (IMAGES), an exploitation element capable of CONUS baseplant operations or field deployment to provide NIMA geospatial information collaboratively into a reconnaissance, surveillance, and target acquisition (RSTA) environment through the United States Imagery and Geospatial Information System (USIGS). In a baseplant CONUS setting IMAGES could be used to produce foundation data to support mission planning. In the field it could be directly associated with a tactical sensor receiver or ground station (e.g. UAV or UGV) to provide near real-time and mission specific RSTA to support mission execution. This paper provides IMAGES functional level design; describes the technologies, their interactions and interdependencies; and presents a notional operational scenario to illustrate the system flexibility. Using as a system backbone an intelligent software agent technology, called Open Agent ArchitectureTM (OAATM), IMAGES combines multimodal data entry, natural language understanding, and perceptual and evidential reasoning for system management. Configured to be DII COE compliant, it would utilize, to the extent possible, COTS applications software for data management, processing, fusion, exploitation, and reporting. It would also be modular, scaleable, and reconfigurable. This paper describes how the OAATM achieves data synchronization and enables the necessary level of information to be rapidly available to various command echelons for making informed decisions. The reasoning component will provide for the best information to be developed in the timeline

  13. Rational Exploitation and Utilizing of Groundwater in Jiangsu Coastal Area

    Science.gov (United States)

    Kang, B.; Lin, X.

    2017-12-01

    Jiangsu coastal area is located in the southeast coast of China, where is a new industrial base and an important coastal and Land Resources Development Zone of China. In the areas with strong human exploitation activities, regional groundwater evolution is obviously affected by human activities. In order to solve the environmental geological problems caused by groundwater exploitation fundamentally, we must find out the forming conditions of regional groundwater hydrodynamic field, and the impact of human activities on groundwater hydrodynamic field evolution and hydrogeochemical evolition. Based on these results, scientific management and reasonable exploitation of the regional groundwater resources can be provided for the utilization. Taking the coastal area of Jiangsu as the research area, we investigate and analyze of the regional hydrogeological conditions. The numerical simulation model of groundwater flow was established according to the water power, chemical and isotopic methods, the conditions of water flow and the influence of hydrodynamic field on the water chemical field. We predict the evolution of regional groundwater dynamics under the influence of human activities and climate change and evaluate the influence of groundwater dynamic field evolution on the environmental geological problems caused by groundwater exploitation under various conditions. We get the following conclusions: Three groundwater exploitation optimal schemes were established. The groundwater salinization was taken as the primary control condition. The substitution model was proposed to model groundwater exploitation and water level changes by BP network method.Then genetic algorithm was used to solve the optimization solution. Three groundwater exploitation optimal schemes were submit to local water resource management. The first sheme was used to solve the groundwater salinization problem. The second sheme focused on dual water supply. The third sheme concerned on emergency water

  14. Elder Financial Exploitation: Implications for Future Policy and Research in Elder Mistreatment

    Directory of Open Access Journals (Sweden)

    Price, Thomas

    2011-07-01

    Full Text Available Recent advances in the understanding of elder mistreatment have demonstrated that financial exploitation tends to be one of the most common forms of mistreatment affecting older populations. Agencies such as the World Bank and World Health Organization show significant concern regarding financial exploitation and its connection to physical and emotional injury to victims. The World Bank uses the term “financial violence” as a means of generally describing the harm caused to an individual as a result of financial exploitation or abuse. The proportion of financial exploitation in relation to other forms of elder mistreatment is defined in our research. We discuss the potential impact of elder financial exploitation on victims as well as explore the implications for future research and policy development focused on financial aspects of elder mistreatment and call for further study in the concept of financial exploitation as a violent act. [West J Emerg Med. 2011;12(3:354-356.

  15. Exploitation of commercial remote sensing images: reality ignored?

    Science.gov (United States)

    Allen, Paul C.

    1999-12-01

    The remote sensing market is on the verge of being awash in commercial high-resolution images. Market estimates are based on the growing numbers of planned commercial remote sensing electro-optical, radar, and hyperspectral satellites and aircraft. EarthWatch, Space Imaging, SPOT, and RDL among others are all working towards launch and service of one to five meter panchromatic or radar-imaging satellites. Additionally, new advances in digital air surveillance and reconnaissance systems, both manned and unmanned, are also expected to expand the geospatial customer base. Regardless of platform, image type, or location, each system promises images with some combination of increased resolution, greater spectral coverage, reduced turn-around time (request-to- delivery), and/or reduced image cost. For the most part, however, market estimates for these new sources focus on the raw digital images (from collection to the ground station) while ignoring the requirements for a processing and exploitation infrastructure comprised of exploitation tools, exploitation training, library systems, and image management systems. From this it would appear the commercial imaging community has failed to learn the hard lessons of national government experience choosing instead to ignore reality and replicate the bias of collection over processing and exploitation. While this trend may be not impact the small quantity users that exist today it will certainly adversely affect the mid- to large-sized users of the future.

  16. Exploitation of cloud computing in management of construction projects in Slovakia

    Directory of Open Access Journals (Sweden)

    Mandičák Tomáš

    2016-12-01

    Full Text Available The issue of cloud computing is a highly topical issue. Cloud computing represents a new model for information technology (IT services based on the exploitation of Web (it represents a cloud and other application platforms, as well as software as a service. In general, the exploitation of cloud computing in construction project management has several advantages, as demonstrated by several research reports. Currently, research quantifying the exploitation of cloud computing in the Slovak construction industry has not yet been carried out. The article discusses the issue of exploitation of cloud computing in construction project management in Slovakia. The main objective of the research is to confirm whether factors such as size of construction enterprise, owner of construction enterprise and participant of construction project have any impact on the exploitation level of cloud computing in construction project management. It includes confirmation of differences in use between different participants of the construction project or between construction enterprises broken down by size and shareholders.

  17. Sexual exploitation and labor during adolescence: A case study

    Directory of Open Access Journals (Sweden)

    Luciana Dutra-Thomé

    2011-09-01

    Full Text Available The present article focused on the perception of sexual exploitation as a job, using a single case study design. The aim of the study was to investigate the case of a 14 year-old girl, involved in commercial sexual exploitation, who considered this situation as her labor activity. A content analysis showed protective and risk factors as categories, especially related to her labor activities. The girl perceived the sexual exploitation activity as a job that provided autonomy, subsistence, and survival. The study revealed that the negative effects of working during adolescence may bring consequences to health and development. Youth work may be defined as a risk factor, especially when the labour conditions are not adequate and protected.

  18. Automated UAV-based video exploitation using service oriented architecture framework

    Science.gov (United States)

    Se, Stephen; Nadeau, Christian; Wood, Scott

    2011-05-01

    Airborne surveillance and reconnaissance are essential for successful military missions. Such capabilities are critical for troop protection, situational awareness, mission planning, damage assessment, and others. Unmanned Aerial Vehicles (UAVs) gather huge amounts of video data but it is extremely labour-intensive for operators to analyze hours and hours of received data. At MDA, we have developed a suite of tools that can process the UAV video data automatically, including mosaicking, change detection and 3D reconstruction, which have been integrated within a standard GIS framework. In addition, the mosaicking and 3D reconstruction tools have also been integrated in a Service Oriented Architecture (SOA) framework. The Visualization and Exploitation Workstation (VIEW) integrates 2D and 3D visualization, processing, and analysis capabilities developed for UAV video exploitation. Visualization capabilities are supported through a thick-client Graphical User Interface (GUI), which allows visualization of 2D imagery, video, and 3D models. The GUI interacts with the VIEW server, which provides video mosaicking and 3D reconstruction exploitation services through the SOA framework. The SOA framework allows multiple users to perform video exploitation by running a GUI client on the operator's computer and invoking the video exploitation functionalities residing on the server. This allows the exploitation services to be upgraded easily and allows the intensive video processing to run on powerful workstations. MDA provides UAV services to the Canadian and Australian forces in Afghanistan with the Heron, a Medium Altitude Long Endurance (MALE) UAV system. On-going flight operations service provides important intelligence, surveillance, and reconnaissance information to commanders and front-line soldiers.

  19. Prospects of geothermal resource exploitation

    International Nuclear Information System (INIS)

    Bourrelier, P.H.; Cornet, F.; Fouillac, C.

    1994-01-01

    The use of geothermal energy to generate electricity has only occurred during the past 50 years by drilling wells in aquifers close to magmas and producing either dry steam or hot water. The world's production of electricity from geothermal energy is over 6000 MWe and is still growing. The direct use of geothermal energy for major urban communities has been developed recently by exploitation of aquifers in sedimentary basins under large towns. Scaling up the extraction of heat implies the exploitation of larger and better located fields requiring an appropriate method of extraction; the objective of present attempts in USA, Japan and Europe is to create heat exchangers by the circulation of water between several deep wells. Two field categories are considered: the extension of classical geothermal fields beyond the aquifer areas, and areas favoured by both a high geothermal gradient, fractures inducing a natural permeability at large scale, and good commercial prospects (such as in the Rhenan Graben). Hot dry rocks concept has gained a large interest. 1 fig., 5 tabs., 11 refs

  20. Malware Sandbox Analysis for Secure Observation of Vulnerability Exploitation

    Science.gov (United States)

    Yoshioka, Katsunari; Inoue, Daisuke; Eto, Masashi; Hoshizawa, Yuji; Nogawa, Hiroki; Nakao, Koji

    Exploiting vulnerabilities of remote systems is one of the fundamental behaviors of malware that determines their potential hazards. Understanding what kind of propagation tactics each malware uses is essential in incident response because such information directly links with countermeasures such as writing a signature for IDS. Although recently malware sandbox analysis has been studied intensively, little work is done on securely observing the vulnerability exploitation by malware. In this paper, we propose a novel sandbox analysis method for securely observing malware's vulnerability exploitation in a totally isolated environment. In our sandbox, we prepare two victim hosts. We first execute the sample malware on one of these hosts and then let it attack the other host which is running multiple vulnerable services. As a simple realization of the proposed method, we have implemented a sandbox using Nepenthes, a low-interaction honeypot, as the second victim. Because Nepenthes can emulate a variety of vulnerable services, we can efficiently observe the propagation of sample malware. In the experiments, among 382 samples whose scan capabilities are confirmed, 381 samples successfully started exploiting vulnerabilities of the second victim. This indicates the certain level of feasibility of the proposed method.

  1. Final Report, “Exploiting Global View for Resilience”

    Energy Technology Data Exchange (ETDEWEB)

    Chien, Andrew [Univ. of Chicago, IL (United States)

    2017-03-29

    Final technical report for the "Exploiting Global View for Resilience" project. The GVR project aims to create a new approach to portable, resilient applications. The GVR approach builds on a global view data model,, adding versioning (multi-version), user control of timing and rate (multi-stream), and flexible cross layer error signalling and recovery. With a versioned array as a portable abstraction, GVR enables application programmers to exploit deep scientific and application code insights to manage resilience (and its overhead) in a flexible, portable fashion.

  2. How Less Alienation Creates More Exploitation? Audience Labour on Social Network Sites.

    Directory of Open Access Journals (Sweden)

    Eran Fisher

    2012-05-01

    Full Text Available Abstract: The notion of audience labour has been an important contribution to Marxist political economy of the media. It revised the traditional political economy analysis, which focused on media ownership, by suggesting that media was also a site of production, constituting particular relations of production. Such analysis highlighted the active role of audience in the creation of media value as both commodities and workers, thus pointing to audience exploitation. Recently, in light of paradigmatic transformations in the media environment – particularly the emergence of Web 2.0 and social network sites – there has been a renewed interest in such analysis, and a reexamination of audience exploitation. Focusing on Facebook as a case-study, this article examines audience labour on social network sites along two Marxist themes – exploitation and alienation. It argues for a historical shift in the link between exploitation and alienation of audience labour, concurrent with the shift from mass media to social media. In the mass media, the capacity for exploitation of audience labour was quite limited while the alienation that such work created was high. In contrast, social media allows for the expansion and intensification of exploitation. Simultaneously, audience labour on social media – because it involves communication and sociability – also ameliorates alienation by allowing self-expression, authenticity, and relations with others. Moreover, the article argues that the political economy of social network sites is founded on a dialectical link between exploitation and alienation: in order to be de-alienated, Facebook users must communicate and socialize, thus exacerbating their exploitation. And vice-versa, in order for Facebook to exploit the work of its users, it must contribute to their de-alienation.

  3. Boys are not exempt: Sexual exploitation of adolescents in sub-Saharan Africa.

    Science.gov (United States)

    Adjei, Jones K; Saewyc, Elizabeth M

    2017-03-01

    Research on youth sexual exploitation in Africa has largely neglected the experiences of exploited boys. To date, much of the research in sub-Saharan Africa continues to consider boys mainly as exploiters but not as exploited. Using the only publicly available population-based surveys from the National Survey of Adolescents, conducted in four sub-Saharan African countries - Burkina Faso, Ghana, Malawi, and Uganda-we assessed factors associated with transactional sexual behaviour among never-married adolescent boys and girls. We also examined whether boys' reported sexual exploitation was linked to similar risky sexual behaviours as has been noted among girls in sub-Saharan Africa. Results from our analyses indicated that even though adolescent girls have a somewhat higher likelihood of reporting sexual abuse and exploitation, the odds of trading sex were significantly elevated for previously traumatized boys (that is those with a history of sexual and physical abuse) but not for their female counterparts. Just like adolescent girls, transactional sexual behaviour was associated with the risk of having concurrent multiple sexual partners for boys. These findings support the reality of boys' sexual exploitation within the African context, and further highlight the importance of including males in general and boys in particular in population-based studies on sexual health, risk, and protective factors in the sub-Saharan African region. Understanding the factors linked to sexual exploitation for both boys and girls will help in developing policies and programs that could improve the overall sexual and reproductive health outcomes among adolescents and youth in sub-Saharan Africa. Copyright © 2017 Elsevier Ltd. All rights reserved.

  4. A Descriptive Study on Sexually Exploited Children in Residential Treatment

    Science.gov (United States)

    Twill, Sarah E.; Green, Denise M.; Traylor, Amy

    2010-01-01

    Sexual exploitation and prostitution of children and adolescents is a multibillion dollar industry in the United States (Estes and Weiner in "Medical, legal & social science aspects of child sexual exploitation: A comprehensive review of pornography, prostitution, and internet crimes, vol I," G.W. Medical Publishing, Inc, St Louis,…

  5. Sustainable exploitation and management of aquatic resources

    DEFF Research Database (Denmark)

    Neuenfeldt, Stefan; Köster, Fritz

    2014-01-01

    DTU Aqua conducts research, provides advice,educates at university level and contributes toinnovation in sustainable exploitation andmanagement of aquatic resources. The vision of DTUAqua is to enable ecologically and economicallysustainable exploitation of aquatic resourcesapplying an integrated...... management. Marineecosystems aims at understanding the mechanisms that govern the interaction between individuals,species and populations in an ecosystem enabling us to determine the stability and flexibility of theecosystem.Marine living resources looks at the sustainable utilization of fish and shellfish...... stocks.Ecosystem effects expands from the ecosystem approach to fisheries management to an integratedapproach where other human activities are taken into consideration. Fisheries management developsmethods, models and tools for predicting and evaluating the effects of management measures andregulations...

  6. Imouraren mining exploitation : Complementary studies Synthetic report Volum B - Mines

    International Nuclear Information System (INIS)

    1980-01-01

    The object of the current study is to determine the main technical characteristics of the reference project of a mine that can supply the necessary ore quantity at a production of 3000 tonnes uranium per year, along 10 years. The project is one of the possible solutions for exploiting the mine. The current study permits to establish : investment and functioning cost estimation, overall project of the mining exploitation program, necessary strength estimation, average ore grades evaluation and variations of these grades, utilities needs, production vizing program, main exploitation methods and necessary materials. Reference project study of the mine serves as base to the economics studies and studies optimization [fr

  7. Exploitative and hierarchical antagonism in a cooperative bacterium.

    Directory of Open Access Journals (Sweden)

    Francesca Fiegna

    2005-11-01

    Full Text Available Social organisms that cooperate with some members of their own species, such as close relatives, may fail to cooperate with other genotypes of the same species. Such noncooperation may take the form of outright antagonism or social exploitation. Myxococcus xanthus is a highly social prokaryote that cooperatively develops into spore-bearing, multicellular fruiting bodies in response to starvation. Here we have characterized the nature of social interactions among nine developmentally proficient strains of M. xanthus isolated from spatially distant locations. Strains were competed against one another in all possible pairwise combinations during starvation-induced development. In most pairings, at least one competitor exhibited strong antagonism toward its partner and a majority of mixes showed bidirectional antagonism that decreased total spore production, even to the point of driving whole populations to extinction. Differential response to mixing was the primary determinant of competitive superiority rather than the sporulation efficiencies of unmixed populations. In some competitive pairings, the dominant partner sporulated more efficiently in mixed populations than in clonal isolation. This finding represents a novel form of exploitation in bacteria carried out by socially competent genotypes and is the first documentation of social exploitation among natural bacterial isolates. Patterns of antagonistic superiority among these strains form a highly linear dominance hierarchy. At least some competition pairs construct chimeric, rather than segregated, fruiting bodies. The cooperative prokaryote M. xanthus has diverged into a large number of distinct social types that cooperate with clone-mates but exhibit intense antagonism toward distinct social types of the same species. Most lengthy migration events in nature may thus result in strong antagonism between migratory and resident populations, and this antagonism may have large effects on local

  8. EXPLOITATION OF GLASS SAND ON THE OPEN PIT »VRTLINSKA« (MOSLAVINA, CROATIA

    Directory of Open Access Journals (Sweden)

    Slavko Vujec

    1994-12-01

    Full Text Available The exploitation of glass sand in Slavonia and Moslavina has a long tradition. The open-pit »Vrtlinska« is-accordirtg to its dimensions and production capacity the biggest one in this regions. Exploitation reserves within this open pit amount about 1 000 000 t glass sand of a very good quality, and the production capacity is 200 000 t yearly according to real needs during design and opening the pit, i. e. before the war. This article discusses geological and geomechanical characteristics of the deposit, as well as the exploitation process, which is considerably matching natural characteristics of the deposit. A more detailed description is given of the planned exploitation phase I above groundwater level which is carried out according to discontinuous system. For the exploitation of the depth part under groundwater level in the phase II, the necessity of further examination of hydrogeological characteristics of the deposit is presented, in order to acquire necessary information on groundwater regime and drainage conditions. Such knowledge will influence the choice of the most appropriate solutions in the exploitation of the depth part of the deposit.

  9. [Impacts of hydroelectric cascade exploitation on river ecosystem and landscape: a review].

    Science.gov (United States)

    Yang, Kun; Deng, Xi; Li, Xue-Ling; Wen, Ping

    2011-05-01

    Hydroelectric cascade exploitation, one of the major ways for exploiting water resources and developing hydropower, not only satisfies the needs of various national economic sectors, but also promotes the socio-economic sustainable development of river basin. unavoidable anthropogenic impacts on the entire basin ecosystem. Based on the process of hydroelectric cascade exploitation and the ecological characteristics of river basins, this paper reviewed the major impacts of hydroelectric cascade exploitation on dam-area ecosystems, river reservoirs micro-climate, riparian ecosystems, river aquatic ecosystems, wetlands, and river landscapes. Some prospects for future research were offered, e.g., strengthening the research of chain reactions and cumulative effects of ecological factors affected by hydroelectric cascade exploitation, intensifying the study of positive and negative ecological effects under the dam networks and their joint operations, and improving the research of successional development and stability of basin ecosystems at different temporal and spatial scales.

  10. The exploitation of living resources in the Dutch Wadden Sea : a historical overview

    NARCIS (Netherlands)

    Wolff, W J

    An overview, based on written sources and personal observations, is presented of exploitation of living resources in and around the Dutch Wadden Sea during the past few centuries. It is concluded that before about 1900 exploitation was almost unrestricted. Exploitation of plants has been documented

  11. PROBA-V Mission Exploitation Platform

    Directory of Open Access Journals (Sweden)

    Erwin Goor

    2016-07-01

    Full Text Available As an extension of the PROBA-Vegetation (PROBA-V user segment, the European Space Agency (ESA, de Vlaamse Instelling voor Technologisch Onderzoek (VITO, and partners TRASYS and Spacebel developed an operational Mission Exploitation Platform (MEP to drastically improve the exploitation of the PROBA-V Earth Observation (EO data archive, the archive from the historical SPOT-VEGETATION mission, and derived products by researchers, service providers, and thematic users. The analysis of the time series of data (petabyte range is addressed, as well as the large scale on-demand processing of the complete archive, including near real-time data. The platform consists of a private cloud environment, a Hadoop-based processing environment and a data manager. Several applications are released to the users, e.g., a full resolution viewing service, a time series viewer, pre-defined on-demand processing chains, and virtual machines with powerful tools and access to the data. After an initial release in January 2016 a research platform was deployed gradually, allowing users to design, debug, and test applications on the platform. From the PROBA-V MEP, access to, e.g., Sentinel-2 and Sentinel-3 data will be addressed as well.

  12. Risk assessment by dynamic representation of vulnerability, exploitation, and impact

    Science.gov (United States)

    Cam, Hasan

    2015-05-01

    Assessing and quantifying cyber risk accurately in real-time is essential to providing security and mission assurance in any system and network. This paper presents a modeling and dynamic analysis approach to assessing cyber risk of a network in real-time by representing dynamically its vulnerabilities, exploitations, and impact using integrated Bayesian network and Markov models. Given the set of vulnerabilities detected by a vulnerability scanner in a network, this paper addresses how its risk can be assessed by estimating in real-time the exploit likelihood and impact of vulnerability exploitation on the network, based on real-time observations and measurements over the network. The dynamic representation of the network in terms of its vulnerabilities, sensor measurements, and observations is constructed dynamically using the integrated Bayesian network and Markov models. The transition rates of outgoing and incoming links of states in hidden Markov models are used in determining exploit likelihood and impact of attacks, whereas emission rates help quantify the attack states of vulnerabilities. Simulation results show the quantification and evolving risk scores over time for individual and aggregated vulnerabilities of a network.

  13. Panel discussion on exploitation of geothermal resources in thermal zones

    Energy Technology Data Exchange (ETDEWEB)

    Viramonte, J G; Mange, J; Stefani, G

    1978-03-01

    The topics discussed include the major known geothermal resources, varying ways of exploiting geothermal resources, technical and economic difficulties in the exploitation, the place of geothermal energy in the total energy policy of a given country, advanced exploration techniques, and indications of needed areas of study. The panelists represented most of the South American countries, Mexico, and Italy. (JSR)

  14. Exploiting Non-Markovianity for Quantum Control.

    Science.gov (United States)

    Reich, Daniel M; Katz, Nadav; Koch, Christiane P

    2015-07-22

    Quantum technology, exploiting entanglement and the wave nature of matter, relies on the ability to accurately control quantum systems. Quantum control is often compromised by the interaction of the system with its environment since this causes loss of amplitude and phase. However, when the dynamics of the open quantum system is non-Markovian, amplitude and phase flow not only from the system into the environment but also back. Interaction with the environment is then not necessarily detrimental. We show that the back-flow of amplitude and phase can be exploited to carry out quantum control tasks that could not be realized if the system was isolated. The control is facilitated by a few strongly coupled, sufficiently isolated environmental modes. Our paradigmatic example considers a weakly anharmonic ladder with resonant amplitude control only, restricting realizable operations to SO(N). The coupling to the environment, when harnessed with optimization techniques, allows for full SU(N) controllability.

  15. Local Perspectives on Environmental Insecurity and Its Influence on Illegal Biodiversity Exploitation.

    Directory of Open Access Journals (Sweden)

    Meredith L Gore

    Full Text Available Environmental insecurity is a source and outcome of biodiversity declines and social conflict. One challenge to scaling insecurity reduction policies is that empirical evidence about local attitudes is overwhelmingly missing. We set three objectives: determine how local people rank risk associated with different sources of environmental insecurity; assess perceptions of environmental insecurity, biodiversity exploitation, myths of nature and risk management preferences; and explore relationships between perceptions and biodiversity exploitation. We conducted interviews (N = 88 with residents of Madagascar's Torotorofotsy Protected Area, 2014. Risk perceptions had a moderate effect on perceptions of environmental insecurity. We found no effects of environmental insecurity on biodiversity exploitation. Results offer one if not the first exploration of local perceptions of illegal biodiversity exploitation and environmental security. Local people's perception of risk seriousness associated with illegal biodiversity exploitation such as lemur hunting (low overall may not reflect perceptions of policy-makers (considered to be high. Discord is a key entry point for attention.

  16. An Exploitability Analysis Technique for Binary Vulnerability Based on Automatic Exception Suppression

    Directory of Open Access Journals (Sweden)

    Zhiyuan Jiang

    2018-01-01

    Full Text Available To quickly verify and fix vulnerabilities, it is necessary to judge the exploitability of the massive crash generated by the automated vulnerability mining tool. While the current manual analysis of the crash process is inefficient and time-consuming, the existing automated tools can only handle execute exceptions and some write exceptions but cannot handle common read exceptions. To address this problem, we propose a method of determining the exploitability based on the exception type suppression. This method enables the program to continue to execute until an exploitable exception is triggered. The method performs a symbolic replay of the crash sample, constructing and reusing data gadget, to bypass the complex exception, thereby improving the efficiency and accuracy of vulnerability exploitability analysis. The testing of typical CGC/RHG binary software shows that this method can automatically convert a crash that cannot be judged by existing analysis tools into a different crash type and judge the exploitability successfully.

  17. The ALARA project of the EDF nuclear park exploitation

    International Nuclear Information System (INIS)

    Potoczek, J.

    1998-01-01

    To bring the exploitation of the nuclear park of EDF at the level of the best exploiters in the world in matter of collective and individual dosimetry, the ALARA principle coordinates numerous actions: to associate the temporary societies, to define common language, methods and tools for the whole park to organize a level effect in this area, to optimize the maintenance that is expansive in radiation doses, to make the different levels of management responsible on dosimetric stakes, to reduce the singular sources of exposure, to assure the organisation and exploitation of the experience back in this field and adapt consequently the system of information. The results are cheerful and the objectives for 2000 are: less than 1.2 h.Sv by year and by reactor, no intervener whom annual radiation dose is upper than 20 mSv (out of exceptional case). (N.C.)

  18. Cloud Based Earth Observation Data Exploitation Platforms

    Science.gov (United States)

    Romeo, A.; Pinto, S.; Loekken, S.; Marin, A.

    2017-12-01

    In the last few years data produced daily by several private and public Earth Observation (EO) satellites reached the order of tens of Terabytes, representing for scientists and commercial application developers both a big opportunity for their exploitation and a challenge for their management. New IT technologies, such as Big Data and cloud computing, enable the creation of web-accessible data exploitation platforms, which offer to scientists and application developers the means to access and use EO data in a quick and cost effective way. RHEA Group is particularly active in this sector, supporting the European Space Agency (ESA) in the Exploitation Platforms (EP) initiative, developing technology to build multi cloud platforms for the processing and analysis of Earth Observation data, and collaborating with larger European initiatives such as the European Plate Observing System (EPOS) and the European Open Science Cloud (EOSC). An EP is a virtual workspace, providing a user community with access to (i) large volume of data, (ii) algorithm development and integration environment, (iii) processing software and services (e.g. toolboxes, visualization routines), (iv) computing resources, (v) collaboration tools (e.g. forums, wiki, etc.). When an EP is dedicated to a specific Theme, it becomes a Thematic Exploitation Platform (TEP). Currently, ESA has seven TEPs in a pre-operational phase dedicated to geo-hazards monitoring and prevention, costal zones, forestry areas, hydrology, polar regions, urban areas and food security. On the technology development side, solutions like the multi cloud EO data processing platform provides the technology to integrate ICT resources and EO data from different vendors in a single platform. In particular it offers (i) Multi-cloud data discovery, (ii) Multi-cloud data management and access and (iii) Multi-cloud application deployment. This platform has been demonstrated with the EGI Federated Cloud, Innovation Platform Testbed Poland

  19. The concept of exploitation in international human trafficking law

    OpenAIRE

    von der Pütten, Tuija Kaarina

    2017-01-01

    Human trafficking is commonly known as a criminal practice that takes place in the framework of sex trade: women and children are trafficked within a state, or from one state to another, for the purpose of sexual exploitation. Similarly, the early 20th century international conventions aimed to tackle ‘white slave traffic’, trafficking of women and children for sexual exploitation. However, it is misleading to see trafficking only within this context. People are trafficked so that they can be...

  20. Assessing uncertainty and risk in exploited marine populations

    International Nuclear Information System (INIS)

    Fogarty, M.J.; Mayo, R.K.; O'Brien, L.; Serchuk, F.M.; Rosenberg, A.A.

    1996-01-01

    The assessment and management of exploited fish and invertebrate populations is subject to several types of uncertainty. This uncertainty translates into risk to the population in the development and implementation of fishery management advice. Here, we define risk as the probability that exploitation rates will exceed a threshold level where long term sustainability of the stock is threatened. We distinguish among several sources of error or uncertainty due to (a) stochasticity in demographic rates and processes, particularly in survival rates during the early fife stages; (b) measurement error resulting from sampling variation in the determination of population parameters or in model estimation; and (c) the lack of complete information on population and ecosystem dynamics. The first represents a form of aleatory uncertainty while the latter two factors represent forms of epistemic uncertainty. To illustrate these points, we evaluate the recent status of the Georges Bank cod stock in a risk assessment framework. Short term stochastic projections are made accounting for uncertainty in population size and for random variability in the number of young surviving to enter the fishery. We show that recent declines in this cod stock can be attributed to exploitation rates that have substantially exceeded sustainable levels

  1. Commercial sexual exploitation and sex trafficking of adolescents.

    Science.gov (United States)

    Chung, Richard J; English, Abigail

    2015-08-01

    This review describes the current state of commercial sexual exploitation and sex trafficking of adolescents in the United States and globally, the legal and health implications of this severe form of abuse, and the roles that pediatric and adolescent healthcare providers can play in addressing this issue. Although this form of exploitation and abuse is shrouded in secrecy, pediatric and adolescent healthcare providers are well positioned to respond when it arises. However, awareness and understanding of the issue are generally lacking among healthcare professionals, currently limiting their effectiveness in combating this problem. Although the empirical evidence base available to guide clinical care of victims of trafficking remains limited given the secretive nature of the abuse, important contributions to the multidisciplinary literature on this issue have been made in recent years, including the Institute of Medicine's landmark report in the United States. Commercial sexual exploitation and sex trafficking of adolescents represent a human rights tragedy that remains inadequately addressed. As preeminent advocates for the health and well-being of adolescents, pediatric and adolescent healthcare providers can play a crucial role in advancing efforts not only to intervene but also to prevent further victimization of vulnerable youth.

  2. Exploitation of linkage learning in evolutionary algorithms

    CERN Document Server

    Chen, Ying-ping

    2010-01-01

    The exploitation of linkage learning is enhancing the performance of evolutionary algorithms. This monograph examines recent progress in linkage learning, with a series of focused technical chapters that cover developments and trends in the field.

  3. Annexe 3. Constitution d'une exploitation à Homs

    OpenAIRE

    2015-01-01

    ‘Abd al-Laṭīf, né en 1925, est jardinier à Horns. Il exploite avec son fils aîné et l'aide de deux de ses petits-fils un jardin de quelques 35 dunum (3,5 hectares) situé dans le zūr al-Ǧdīdeh, secteur central de la zone agricole. Cette grande exploitation, constituée de plusieurs parcelles ayant différents statuts, est en partie le produit d'une histoire familiale dont je voudrais présenter ici brièvement les principaux aspects. Figure 50 – Alliances matrimoniales entre la lignée de ‘Abbās e...

  4. Open pit coal exploitation viability. Margarita mine. Case of study

    International Nuclear Information System (INIS)

    Veloza, Julia; Molina, Jorge; Mejia, Humberto

    2006-01-01

    This paper provides an analysis of financial viability, planning and design for the new coal open pit exploitation for La Margarita mine, with coal-resources estimated on 440.139,7 ton. Dimension, design and economic evaluation were possible by three exploitation methods: (multiple bench, open cast contour, and terraces). Net present values (NVP) were calculated: $c 817,5; $c 518,5 and $c 645,2 respectively for each method (given in million current Colombian pesos $. $c 2380 are equivalent to $us 1) and rate of return (ROR) 78,33%; 34,0% and 38,62% respectively for each method. These indicators served as a parameter to choose the multiple bench method, which should be recalculated because it was necessary to work jointly with two pits and making feasible the project. in addition a general environmental evaluation was done, which is vital for the exploitation. Important impacts on the flower, animals, air, water were found, and measures of control, prevention and mitigation were stated. it is expected that this paper can be useful as a technical-economical support for the development of the open pit exploitation in the margarita mine

  5. SEXUAL EXPLOITATION AND ABUSE BY UN PEACEKEEPERS ...

    African Journals Online (AJOL)

    Allaiac

    from sexual exploitation and sexual abuse (ST/SGB/2003/13) (UN, Secretary .... In addition, in most situations, UN personnel have enjoyed immunity from local .... 9 Official UN statistics show a higher incidence of allegations reported against.

  6. The exploitation of swamp plants for dewatering liquid sewage sludge

    Directory of Open Access Journals (Sweden)

    Jiří Šálek

    2006-01-01

    Full Text Available The operators of little rural wastewater treatment plants have been interested in economic exploitation of sewage sludge in local conditions. The chance is searching simply and natural ways of processing and exploitation stabilized sewage sludge in agriculture. Manure substrate have been obtained by composting waterless sewage sludge including rest plant biomass after closing 6–8 years period of filling liquid sewage sludge to the basin. Main attention was focused on exploitation of swamp plants for dewatering liquid sewage sludge and determination of influence sewage sludge on plants, intensity and course of evapotranspiration and design and setting of drying beds. On the base of determined ability of swamp plants evapotranspiration were edited suggestion solutions of design and operation sludge bed facilities in the conditions of small rural wastewater treatment plant.

  7. Cultural Work as a Site of Struggle: Freelancers and Exploitation

    Directory of Open Access Journals (Sweden)

    Nicole S. Cohen

    2012-05-01

    Full Text Available This paper argues that Marxist political economy is a useful framework for understanding contemporary conditions of cultural work. Drawing on Karl Marx’s foundational concepts, labour process theory, and a case study of freelance writers, I argue that the debate over autonomy and control in cultural work ignores exploitation in labour-capital relationships, which is a crucial process shaping cultural work. To demonstrate the benefits of this approach, I discuss two methods media firms use to extract surplus value from freelance writers: exploitation of unpaid labour time and exploitation of intellectual property through aggressive copyright regimes. I argue that a Marxist perspective can uncover the dynamics that are transforming cultural industries and workers’ experiences. From this perspective, cultural work is understood as a site of struggle.

  8. Financial Exploitation Is Associated With Structural and Functional Brain Differences in Healthy Older Adults.

    Science.gov (United States)

    Spreng, R Nathan; Cassidy, Benjamin N; Darboh, Bri S; DuPre, Elizabeth; Lockrow, Amber W; Setton, Roni; Turner, Gary R

    2017-10-01

    Age-related brain changes leading to altered socioemotional functioning may increase vulnerability to financial exploitation. If confirmed, this would suggest a novel mechanism leading to heightened financial exploitation risk in older adults. Development of predictive neural markers could facilitate increased vigilance and prevention. In this preliminary study, we sought to identify structural and functional brain differences associated with financial exploitation in older adults. Financially exploited older adults (n = 13, 7 female) and a matched cohort of older adults who had been exposed to, but avoided, a potentially exploitative situation (n = 13, 7 female) were evaluated. Using magnetic resonance imaging, we examined cortical thickness and resting state functional connectivity. Behavioral data were collected using standardized cognitive assessments, self-report measures of mood and social functioning. The exploited group showed cortical thinning in anterior insula and posterior superior temporal cortices, regions associated with processing affective and social information, respectively. Functional connectivity encompassing these regions, within default and salience networks, was reduced, while between network connectivity was increased. Self-reported anger and hostility was higher for the exploited group. We observed financial exploitation associated with brain differences in regions involved in socioemotional functioning. These exploratory and preliminary findings suggest that alterations in brain regions implicated in socioemotional functioning may be a marker of financial exploitation risk. Large-scale, prospective studies are necessary to validate this neural mechanism, and develop predictive markers for use in clinical practice. © The Author 2017. Published by Oxford University Press on behalf of The Gerontological Society of America.

  9. Availability Control for Means of Transport in Decisive Semi-Markov Models of Exploitation Process

    Science.gov (United States)

    Migawa, Klaudiusz

    2012-12-01

    The issues presented in this research paper refer to problems connected with the control process for exploitation implemented in the complex systems of exploitation for technical objects. The article presents the description of the method concerning the control availability for technical objects (means of transport) on the basis of the mathematical model of the exploitation process with the implementation of the decisive processes by semi-Markov. The presented method means focused on the preparing the decisive for the exploitation process for technical objects (semi-Markov model) and after that specifying the best control strategy (optimal strategy) from among possible decisive variants in accordance with the approved criterion (criteria) of the activity evaluation of the system of exploitation for technical objects. In the presented method specifying the optimal strategy for control availability in the technical objects means a choice of a sequence of control decisions made in individual states of modelled exploitation process for which the function being a criterion of evaluation reaches the extreme value. In order to choose the optimal control strategy the implementation of the genetic algorithm was chosen. The opinions were presented on the example of the exploitation process of the means of transport implemented in the real system of the bus municipal transport. The model of the exploitation process for the means of transports was prepared on the basis of the results implemented in the real transport system. The mathematical model of the exploitation process was built taking into consideration the fact that the model of the process constitutes the homogenous semi-Markov process.

  10. Geographical aspects of exploitation of nuclear energy in Europe

    International Nuclear Information System (INIS)

    Kurucova, S.

    2007-05-01

    The topic of exploitation of nuclear energy is becoming increasingly actual in the present time in connection with frequently discussed question of 'renaissance of nuclear energetics'. The work is aimed at research of geographical aspects of exploitation of nuclear energy for military and civil purposes on the territory of Europe. The base of work represents the analysis of theoretical aspects of research of energy, mainly of nuclear energy. The work examines the historical development of exploitation of nuclear energy since its discovery, through development of military nuclear industry in Europe, big attention is paid to spreading of nuclear energetics on the territory of Europe from its beginnings up to the present time. The main part of the work represents the analysis of the present situation of exploitation of nuclear energy for civil purposes in Europe. The attention is paid to so-called nuclear fuel cycle as complex chain of several reciprocally interconnected operations of nuclear fuel treatment. The monitoring of spatial relations among individual countries within their nuclear fuel cycles is emphasised. The analysis of historical development and of the present state of nuclear energetics finished up in the outline of the perspectives of its further development in Europe. The analysis of the tendencies of evolution of world energetic economy mentions on the trend of growth of energy consumption in the world and Europe, as well as on the important position of nuclear energy in the structure of energy sources. Summary in English language is included. (author)

  11. Exploiting HRM in support of lean manufacturing

    DEFF Research Database (Denmark)

    Jørgensen, Frances; Matthiesen, Rikke

    The purpose of this paper is to investigate the ways in HRM practices are-and could potentially be-exploited to support lean manufacturing in practice. First, a review of the pertinent literature regarding HRM, SHRM, and lean manufacturing is presented to provide an understanding of the mechanisms...... by which HRM practices could, theoretically, be used to support a lean implementation. Data presented in the paper are derived from 1) a longitudinal case study on lean implementation and 2) from managers currently involved with lean manufacturing in a second company. The relevant literature and the data...... depicting the potential role in supporting HRM/lean integrated practices. The analysis of the model with respect to the theoretical background emphasizes a number of areas in which HRM could be more fully exploited in order to more successfully support lean implementation, for example, by stressing HRM...

  12. SEXUAL EXPLOITATION OF CHILDREN IN THE TOURISM – THE DARK SIDE OF TOURISM

    Directory of Open Access Journals (Sweden)

    Janez Mekinc

    2015-05-01

    Full Text Available The underlying causes of sexual exploitation and prostitution are poverty, inequality between women and men, high population growth and rural - urban migration. Victims are, predominantly, women and children with lower socio-economic status. One particular form of sexual exploitation is child sex tourism. This ruthless exploitation of children can be found throughout the world, predominantly in the third world and developing countries. Children, mainly between the ages of 6 to 14 years, are trapped in a vicious battle between large impoverished families who are dependent on their support, and a society that ruthlessly exploits them. In line with the trend in increasing child exploitation, there is, also, increasing exploitation of children for the purposes of child sex tourism. Based on the analysis of forms, reasons, impacts, consequences and trends of child sex tourism, it has been possible to develop from these findings some necessary measures to prevent this practice from occurring. Analysis of the phenomenon of child sex tourism has highlighted some fundamental conditions for preventing it becoming a social phenomenon. These include the strict implementation of laws against child labour and the political will to enforce them.

  13. The ESA Scientific Exploitation of Operational Missions element

    Science.gov (United States)

    Desnos, Yves-Louis; Regner, Peter; Delwart, Steven; Benveniste, Jerome; Engdahl, Marcus; Zehner, Claus; Mathieu, Pierre-Philippe; Bojkov, Bojan; Gascon, Ferran; Donlon, Craig; Davidson, Malcolm; Goryl, Philippe; Pinnock, Simon

    2015-04-01

    SEOM is a program element within the fourth period (2013-2017) of ESA's Earth Observation Envelope Programme (http://seom.esa.int/). The prime objective is to federate, support and expand the international research community that the ERS,ENVISAT and the Envelope programmes have built up over the last 25 years. It aims to further strengthen the leadership of the European Earth Observation research community by enabling them to extensively exploit future European operational EO missions. SEOM will enable the science community to address new scientific research that are opened by free and open access to data from operational EO missions. Based on community-wide recommendations for actions on key research issues, gathered through a series of international thematic workshops and scientific user consultation meetings, a work plan has been established and is approved every year by ESA Members States. The 2015 SEOM work plan is covering the organisation of three Science users consultation workshops for Sentinel1/3/5P , the launch of new R&D studies for scientific exploitation of the Sentinels, the development of open-source multi-mission scientific toolboxes, the organisation of advanced international training courses, summer schools and educational materials, as well as activities for promoting the scientific use of EO data. The first SEOM projects have been tendered since 2013 including the development of Sentinel toolboxes, advanced INSAR algorithms for Sentinel-1 TOPS data exploitation, Improved Atmospheric Spectroscopic data-base (IAS), as well as grouped studies for Sentinel-1, -2, and -3 land and ocean applications and studies for exploiting the synergy between the Sentinels. The status and first results from these SEOM projects will be presented and an outlook for upcoming SEOM studies will be given.

  14. Regulatory Framework on Exploration and Exploitation of Croatian Part of Adriatic

    International Nuclear Information System (INIS)

    Mudric, M.

    2015-01-01

    As the prelude to the regulation of marine exploration and exploitation activities in the Croatian Adriatic waters, the new Mining Act and Act on exploration and exploitation of hydrocarbons have provided a general legal framework for the natural resources exploration and exploitation. The latter Act also appropriated the establishment of the independent regulatory body, the Hydrocarbon Agency. It is important to mention the Decree on Fees for exploration and production of hydrocarbons, and the Decree on main technical requirements on safety and security of offshore exploration and production of hydrocarbons in the Republic of Croatia, that are of special relevance for the current activities with regard the proposed project of exploration and exploitation of the Croatian waters in search for gas and oil sea-bed deposits. The Hydrocarbon Agency has published the Strategic Study of the Likely Significant Environmental Impact of the Framework Plan and Program of Exploration and Production of Hydrocarbons in the Adriatic, a document receiving a lot of criticism from the legal experts and general public. At the same time, the experts tend to support the general idea of sea-bed exploration and exploitation, with the major antagonism still being present in the general public, with several initiatives introducing the possibility of a public referenda to oppose the sea-bed exploration and exploitation. The Government is currently preparing the Act on the Safety of Offshore Hydrocarbon Exploration and Production Operations, based on the Directive 94/22/EC of the European Parliament and of the Council of 30 May 1994 on the conditions for granting and using authorizations for the prospection, exploration and production of hydrocarbons, the Commission Implementing Regulation (EU) No 1112/2014 of 13 October 2014 determining a common format for sharing of information on major hazard indicators by the operators and owners of offshore oil and gas installations and a common format

  15. Exploitation of Factory Workers: A Study of Union Dicon Salt, Lagos ...

    African Journals Online (AJOL)

    The study examined labour exploitation in Nigeria with particular reference to Union Dicon Salt Plc., Lagos. The review of literature points to the fact that exploitation of the factory workers in the long run leads to strained relationships between management and staff. The situation becomes conflictual to the extent that both ...

  16. Economic factors of vulnerability trade and exploitation

    NARCIS (Netherlands)

    Allodi, L.

    2017-01-01

    Cybercrime markets support the development and diffusion of new attack technologies, vulnerability exploits, and malware. Whereas the revenue streams of cyber attackers have been studied multiple times in the literature, no quantitative account currently exists on the economics of attack acquisition

  17. Thermal exploitation of shallow aquifers. Guide for the preparation of preliminary studies of technical feasibility

    International Nuclear Information System (INIS)

    Ausseur, J.Y.; Sauty, J.P.

    1982-08-01

    This report presents the main devices aimed at exploiting surface aquifers. After an introduction to the different systems of thermal exploitation of aquifers (generalities, very low energy geothermal, sensitive heat storage, interest of thermal exploitation of aquifers, indication of possible systems), this report presents the different possible systems and analyses their characteristics and performance. These systems are: direct exploitation of groundwater bodies at their natural temperature by heat sink and with release in surface networks or by geothermal dipole, or exploitation with artificial thermal refill. Thus the report addresses the single sink device with or without storage, heat pumps on dipole in surface groundwater bodies or very low temperature geothermal, the scanning dipole system, and the dipole system with hot sink and cold sink. It discusses the choice and sizing of the exploitation system. An appendix reports a feasibility preliminary study of nine cases of thermal exploitation of surface aquifers by double drills

  18. Ultrasonic imaging of material flaws exploiting multipath information

    Science.gov (United States)

    Shen, Xizhong; Zhang, Yimin D.; Demirli, Ramazan; Amin, Moeness G.

    2011-05-01

    In this paper, we consider ultrasonic imaging for the visualization of flaws in a material. Ultrasonic imaging is a powerful nondestructive testing (NDT) tool which assesses material conditions via the detection, localization, and classification of flaws inside a structure. Multipath exploitations provide extended virtual array apertures and, in turn, enhance imaging capability beyond the limitation of traditional multisensor approaches. We utilize reflections of ultrasonic signals which occur when encountering different media and interior discontinuities. The waveforms observed at the physical as well as virtual sensors yield additional measurements corresponding to different aspect angles. Exploitation of multipath information addresses unique issues observed in ultrasonic imaging. (1) Utilization of physical and virtual sensors significantly extends the array aperture for image enhancement. (2) Multipath signals extend the angle of view of the narrow beamwidth of the ultrasound transducers, allowing improved visibility and array design flexibility. (3) Ultrasonic signals experience difficulty in penetrating a flaw, thus the aspect angle of the observation is limited unless access to other sides is available. The significant extension of the aperture makes it possible to yield flaw observation from multiple aspect angles. We show that data fusion of physical and virtual sensor data significantly improves the detection and localization performance. The effectiveness of the proposed multipath exploitation approach is demonstrated through experimental studies.

  19. Sexual slavery without borders: trafficking for commercial sexual exploitation in India

    Science.gov (United States)

    Joffres, Christine; Mills, Edward; Joffres, Michel; Khanna, Tinku; Walia, Harleen; Grund, Darrin

    2008-01-01

    Trafficking in women and children is a gross violation of human rights. However, this does not prevent an estimated 800 000 women and children to be trafficked each year across international borders. Eighty per cent of trafficked persons end in forced sex work. India has been identified as one of the Asian countries where trafficking for commercial sexual exploitation has reached alarming levels. While there is a considerable amount of internal trafficking from one state to another or within states, India has also emerged as a international supplier of trafficked women and children to the Gulf States and South East Asia, as well as a destination country for women and girls trafficked for commercial sexual exploitation from Nepal and Bangladesh. Trafficking for commercial sexual exploitation is a highly profitable and low risk business that preys on particularly vulnerable populations. This paper presents an overview of the trafficking of women and girls for sexual exploitation (CSE) in India; identifies the health impacts of CSE; and suggest strategies to respond to trafficking and related issues. PMID:18817576

  20. Sexual slavery without borders: trafficking for commercial sexual exploitation in India.

    Science.gov (United States)

    Joffres, Christine; Mills, Edward; Joffres, Michel; Khanna, Tinku; Walia, Harleen; Grund, Darrin

    2008-09-25

    Trafficking in women and children is a gross violation of human rights. However, this does not prevent an estimated 800 000 women and children to be trafficked each year across international borders. Eighty per cent of trafficked persons end in forced sex work. India has been identified as one of the Asian countries where trafficking for commercial sexual exploitation has reached alarming levels. While there is a considerable amount of internal trafficking from one state to another or within states, India has also emerged as a international supplier of trafficked women and children to the Gulf States and South East Asia, as well as a destination country for women and girls trafficked for commercial sexual exploitation from Nepal and Bangladesh. Trafficking for commercial sexual exploitation is a highly profitable and low risk business that preys on particularly vulnerable populations. This paper presents an overview of the trafficking of women and girls for sexual exploitation (CSE) in India; identifies the health impacts of CSE; and suggest strategies to respond to trafficking and related issues.

  1. Piloting the older adult financial exploitation measure in adult safeguarding services.

    Science.gov (United States)

    Phelan, A; Fealy, G; Downes, C

    Financial abuse is arguably the most complex form of elder abuse as it may occur remote to the older person and it is impacted by issues such as cultural values, perpetrator intent and family expectations. Financial abuse may not be recognised by either the older person or the perpetrator, thus, its prevention, early identification and amelioration are important. The (Irish) National Centre for the Protection of Older People undertook a study to determine the appropriateness of the Older Adult Financial Exploitation Measure for use by the national safeguarding older person services. Findings from a small pilot study involving 16 safeguarding staff's use of the Older Adult Financial Exploitation Measure with 52 community dwelling older people referred to their service demonstrate a higher suspicion of financial abuse as well as identifying multiple instances of possible financial exploitation in a single individual. Thus, the Older Adult Financial Exploitation Measure is considered appropriate to assist safeguarding personnel's assessment of older people related to a suspicion of financial abuse. Copyright © 2017 Elsevier B.V. All rights reserved.

  2. Algorithms exploiting ultrasonic sensors for subject classification

    Science.gov (United States)

    Desai, Sachi; Quoraishee, Shafik

    2009-09-01

    Proposed here is a series of techniques exploiting micro-Doppler ultrasonic sensors capable of characterizing various detected mammalian targets based on their physiological movements captured a series of robust features. Employed is a combination of unique and conventional digital signal processing techniques arranged in such a manner they become capable of classifying a series of walkers. These processes for feature extraction develops a robust feature space capable of providing discrimination of various movements generated from bipeds and quadrupeds and further subdivided into large or small. These movements can be exploited to provide specific information of a given signature dividing it in a series of subset signatures exploiting wavelets to generate start/stop times. After viewing a series spectrograms of the signature we are able to see distinct differences and utilizing kurtosis, we generate an envelope detector capable of isolating each of the corresponding step cycles generated during a walk. The walk cycle is defined as one complete sequence of walking/running from the foot pushing off the ground and concluding when returning to the ground. This time information segments the events that are readily seen in the spectrogram but obstructed in the temporal domain into individual walk sequences. This walking sequence is then subsequently translated into a three dimensional waterfall plot defining the expected energy value associated with the motion at particular instance of time and frequency. The value is capable of being repeatable for each particular class and employable to discriminate the events. Highly reliable classification is realized exploiting a classifier trained on a candidate sample space derived from the associated gyrations created by motion from actors of interest. The classifier developed herein provides a capability to classify events as an adult humans, children humans, horses, and dogs at potentially high rates based on the tested sample

  3. Exploiting indigenous knowledge in the environmental conservation ...

    African Journals Online (AJOL)

    ... of agriculture and reared livestock (especially goats). Over several years, they developed sustainable and effective exploitation mechanisms of the existing biodiversity resources to satisfy their individual needs and those of their societies in general. Journal of Language, Technology and Entrepreneurship in Africa Vol.

  4. Managerial attention to exploitation versus exploration : Toward a dynamic perspective on ambidexterity

    NARCIS (Netherlands)

    Walrave, B.; Romme, A.G.L.; van Oorschot, K.E.; Langerak, F.

    2017-01-01

    Managerial attention to exploitation and exploration has a strong influence on organizational performance. However, there is hardly any knowledge about whether senior managers need to adjust their distribution of attention to exploitation and exploration in response to major changes in demand

  5. Water Exploitation and Its Outcomes Caused by Capitalism as Reflected on Gore Verbinski's Rango Movie

    OpenAIRE

    SETIAWAN, DANIEL NUGRAHA

    2014-01-01

    Nugraha Setiawan, Daniel. 2014. Water Exploitation and Its Outcome Caused byCapitalism as Reflected on Gore Verbinski's Rango Movie. Study Program ofEnglish, Universitas Brawijaya.Supervisor: Yusri Fajar, Co-supervisor: Melania Shinta Harendika.Keywords: water exploitation, environment, capitalism, Rango movie. Water exploitation threats ecosystem and causes a great damage to environment. One of the causes of the water exploitation is capitalism. The movie entitled Rango reveals some causes a...

  6. Boldness predicts an individual's position along an exploration-exploitation foraging trade-off.

    Science.gov (United States)

    Patrick, Samantha C; Pinaud, David; Weimerskirch, Henri

    2017-09-01

    Individuals do not have complete information about the environment and therefore they face a trade-off between gathering information (exploration) and gathering resources (exploitation). Studies have shown individual differences in components of this trade-off but how stable these strategies are in a population and the intrinsic drivers of these differences is not well understood. Top marine predators are expected to experience a particularly strong trade-off as many species have large foraging ranges and their prey often have a patchy distribution. This environment leads these species to exhibit pronounced exploration and exploitation phases but differences between individuals are poorly resolved. Personality differences are known to be important in foraging behaviour but also in the trade-off between exploration and exploitation. Here we test whether personality predicts an individual exploration-exploitation strategy using wide ranging wandering albatrosses (Diomedea exulans) as a model system. Using GPS tracking data from 276 wandering albatrosses, we extract foraging parameters indicative of exploration (searching) and exploitation (foraging) and show that foraging effort, time in patch and size of patch are strongly correlated, demonstrating these are indicative of an exploration-exploitation (EE) strategy. Furthermore, we show these are consistent within individuals and appear stable in the population, with no reproductive advantage. The searching and foraging behaviour of bolder birds placed them towards the exploration end of the trade-off, whereas shy birds showed greater exploitation. This result provides a mechanism through which individual foraging strategies may emerge. Age and sex affected components of the trade-off, but not the trade-off itself, suggesting these factors may drive behavioural compensation to maintain resource acquisition and this was supported by the evidence that there were no fitness consequence of any EE trait nor the trade

  7. Exploiting citation contexts for physics retrieval

    DEFF Research Database (Denmark)

    Dabrowska, Anna; Larsen, Birger

    2015-01-01

    The text surrounding citations within scientific papers may contain terms that usefully describe cited documents and can benefit retrieval. We present a preliminary study that investigates appending ci- tation contexts from citing documents to cited documents in the iSearch test collection. We ex...... in a large collection of physics papers, paving the way for future research that exploits citation contexts for retrieval....

  8. Normative Beliefs about Aggression as a Mediator of Narcissistic Exploitativeness and Cyberbullying

    Science.gov (United States)

    Ang, Rebecca P.; Tan, Kit-Aun; Mansor, Abu Talib

    2011-01-01

    The current study examined normative beliefs about aggression as a mediator between narcissistic exploitativeness and cyberbullying using two Asian adolescent samples from Singapore and Malaysia. Narcissistic exploitativeness was significantly and positively associated with cyberbullying and normative beliefs about aggression and normative beliefs…

  9. SEXUAL EXPLOITATION OF CHILDREN IN THE TOURISM – THE DARK SIDE OF TOURISM

    OpenAIRE

    Janez Mekinc; Katarina Music

    2015-01-01

    The underlying causes of sexual exploitation and prostitution are poverty, inequality between women and men, high population growth and rural - urban migration. Victims are, predominantly, women and children with lower socio-economic status. One particular form of sexual exploitation is child sex tourism. This ruthless exploitation of children can be found throughout the world, predominantly in the third world and developing countries. Children, mainly between the ages of 6 to 14 years, are t...

  10. Escaping from the exploitation trap by shaping the digital future

    OpenAIRE

    Füzes, Péter; Gódor, Zoltán; Szabó, Zsolt Roland

    2017-01-01

    Even Fortune 500 firms can disappear quickly, because many of them falls into an exploitation trap. Examples show that certain organizations – that manifest ambidextrous features – can avoid the exploitation trap. But, how can they do it? Authors tracked the digital transformation of a Fortune 500 company in order to understand the strategic and organizational challenges and solutions to become resilient and prosperous. A cutting edge example is shown in the paper about how an industry leader...

  11. Impact socio-environnemental de l'exploitation du sable marin sur le ...

    African Journals Online (AJOL)

    En effet, l'exploitation du sable marin dans cette contrée s'est ouverte et évolue du fait de l'urbanisation galopante de la Commune liée à l'érection des ... In addition, the uncontrolled exploitation increased coastal erosion and does little to improve the conditions of economic and social life of the people who indulge ...

  12. Uncovering Indicators of Commercial Sexual Exploitation.

    Science.gov (United States)

    Bounds, Dawn; Delaney, Kathleen R; Julion, Wrenetha; Breitenstein, Susan

    2017-07-01

    It is estimated that annually 100,000 to 300,000 youth are at risk for sex trafficking; a commercial sex act induced by force, fraud, or coercion, or any such act where the person induced to perform such an act is younger than 18 years of age. Increasingly, such transactions are occurring online via Internet-based sites that serve the commercial sex industry. Commercial sex transactions involving trafficking are illegal; thus, Internet discussions between those involved must be veiled. Even so, transactions around sex trafficking do occur. Within these transactions are innuendos that provide one avenue for detecting potential activity. The purpose of this study is to identify linguistic indicators of potential commercial sexual exploitation within the online comments of men posted on an Internet site. Six hundred sixty-six posts from five Midwest cities and 363 unique members were analyzed via content analysis. Three main indicators were found: the presence of youth or desire for youthfulness, presence of pimps, and awareness of vulnerability. These findings begin a much-needed dialogue on uncovering online risks of commercial sexual exploitation and support the need for further research on Internet indicators of sex trafficking.

  13. Growth, Mortality and Exploitation Rates of Sarotherodon ...

    African Journals Online (AJOL)

    Evans

    ABSTRACT. Sarotherodon melanotheron population of Dominli Lagoon in the Western Region of Ghana was studied for its growth and mortality parameters as well as exploitation rate. The study generally aimed at providing basic information necessary for the assessment and management of the fish stock in the lagoon.

  14. The exploitation of "Exploitation" in the tenofovir prep trial in Cameroon: Lessons learned from media coverage of an HIV prevention trial.

    Science.gov (United States)

    Mack, Natasha; Robinson, Elizabeth T; MacQueen, Kathleen M; Moffett, Jill; Johnson, Laura M

    2010-06-01

    media coverage influences how clinical trials are perceived internationally and in communities where trials occur, affecting recruitment, retention, and political support for research. We conducted a discourse analysis of news coverage from 2004-2005 of a trial in Cameroon on oral PrEP for HIV prevention, to identify messages, communication techniques, and sources of messages that were amplified via media. We identified two parallel discourses: one on ethical concerns about the Cameroon trial, and a second, more general "science exploitation" discourse concerned with the potential for trials with vulnerable participant populations to be conducted unethically, benefiting only wealthy populations. Researchers should overtly address exploitation as an integral, ongoing component of research, particularly where historical or cultural conditions set the stage for controversy to emerge.

  15. The exploration-exploitation dilemma: a multidisciplinary framework.

    Directory of Open Access Journals (Sweden)

    Oded Berger-Tal

    Full Text Available The trade-off between the need to obtain new knowledge and the need to use that knowledge to improve performance is one of the most basic trade-offs in nature, and optimal performance usually requires some balance between exploratory and exploitative behaviors. Researchers in many disciplines have been searching for the optimal solution to this dilemma. Here we present a novel model in which the exploration strategy itself is dynamic and varies with time in order to optimize a definite goal, such as the acquisition of energy, money, or prestige. Our model produced four very distinct phases: Knowledge establishment, Knowledge accumulation, Knowledge maintenance, and Knowledge exploitation, giving rise to a multidisciplinary framework that applies equally to humans, animals, and organizations. The framework can be used to explain a multitude of phenomena in various disciplines, such as the movement of animals in novel landscapes, the most efficient resource allocation for a start-up company, or the effects of old age on knowledge acquisition in humans.

  16. Exploiting Quantum Resonance to Solve Combinatorial Problems

    Science.gov (United States)

    Zak, Michail; Fijany, Amir

    2006-01-01

    Quantum resonance would be exploited in a proposed quantum-computing approach to the solution of combinatorial optimization problems. In quantum computing in general, one takes advantage of the fact that an algorithm cannot be decoupled from the physical effects available to implement it. Prior approaches to quantum computing have involved exploitation of only a subset of known quantum physical effects, notably including parallelism and entanglement, but not including resonance. In the proposed approach, one would utilize the combinatorial properties of tensor-product decomposability of unitary evolution of many-particle quantum systems for physically simulating solutions to NP-complete problems (a class of problems that are intractable with respect to classical methods of computation). In this approach, reinforcement and selection of a desired solution would be executed by means of quantum resonance. Classes of NP-complete problems that are important in practice and could be solved by the proposed approach include planning, scheduling, search, and optimal design.

  17. Legal Approaches to Combating the Exploitation of Third-Country National Seasonal Workers

    NARCIS (Netherlands)

    Rijken, Conny

    2015-01-01

    The Directive on Seasonal workers is aimed at combating exploitative practices vis-a-vis seasonal workers from outside the EU. After a thorough analysis of the conditions under which practices can be qualified as exploitative, this article assesses the extent to which the directive is equipped to

  18. Exploiting the opportunities of Internet and multi-channel pricing : An exploratory research

    NARCIS (Netherlands)

    Sotgiu, Francesca; Ancarani, Fabio

    2004-01-01

    Smart firms are not worried about the impact of the Internet on pricing, but realise that they have the unique opportunity to exploit new options and improve their marketing performance. Multi-channel pricing is one of the most interesting opportunities firms can exploit in the digital economy.

  19. Residual coal exploitation and its impact on sustainable development of the coal industry in China

    International Nuclear Information System (INIS)

    Zhang, Yujiang; Feng, Guorui; Zhang, Min; Ren, Hongrui; Bai, Jinwen; Guo, Yuxia; Jiang, Haina; Kang, Lixun

    2016-01-01

    Although China owns large coal reserves, it now faces the problem of depletion of its coal resources in advance. The coal-based energy mix in China will not change in the short term, and a means of delaying the coal resources depletion is therefore urgently required. The residual coal was exploited first with a lower recovery percentage and was evaluated as commercially valuable damaged coal. This approach is in comparison to past evaluations when the residual coal was allocated as exploitation losses. Coal recovery rates, the calculation method of residual coal reserves and statistics of its mines in China were given. On this basis, a discussion concerning the impacts on the delay of China's coal depletion, development of coal exploitation and sustainable developments, as well as technologies and relevant policies, were presented. It is considered that the exploitation of residual coal can effectively delay China's coal depletion, inhibit the construction of new mines, redress the imbalance between supply and demand of coal in eastern China, improve the mining area environment and guarantee social stability. The Chinese government supports the exploitation technologies of residual coal. Hence, exploiting residual coal is of considerable importance in sustainable development of the coal industry in China. - Highlights: •Pay attention to residual coal under changing energy-mix environment in China. •Estimate residual coal reserves and investigate its exploitation mines. •Discuss impacts of residual coal exploitation on delay of coal depletion in China. •Discuss impacts on coal mining industry and residual coal exploitation technology. •Give corresponding policy prescriptions.

  20. Child Exploitation: Some Pieces of the Puzzle.

    Science.gov (United States)

    Rohlader, Dorothy

    The report addresses the status in North Carolina and in the nation of child exploitation. Legislative and judicial backgrounds of child pornography and child prostitution are reviewed, and difficulties in obtaining statistical data are noted. Law enforcement issues in pornography are cited, and suggestions for further legislation regarding child…

  1. Fishing elevates variability in the abundance of exploited species.

    Science.gov (United States)

    Hsieh, Chih-Hao; Reiss, Christian S; Hunter, John R; Beddington, John R; May, Robert M; Sugihara, George

    2006-10-19

    The separation of the effects of environmental variability from the impacts of fishing has been elusive, but is essential for sound fisheries management. We distinguish environmental effects from fishing effects by comparing the temporal variability of exploited versus unexploited fish stocks living in the same environments. Using the unique suite of 50-year-long larval fish surveys from the California Cooperative Oceanic Fisheries Investigations we analyse fishing as a treatment effect in a long-term ecological experiment. Here we present evidence from the marine environment that exploited species exhibit higher temporal variability in abundance than unexploited species. This remains true after accounting for life-history effects, abundance, ecological traits and phylogeny. The increased variability of exploited populations is probably caused by fishery-induced truncation of the age structure, which reduces the capacity of populations to buffer environmental events. Therefore, to avoid collapse, fisheries must be managed not only to sustain the total viable biomass but also to prevent the significant truncation of age structure. The double jeopardy of fishing to potentially deplete stock sizes and, more immediately, to amplify the peaks and valleys of population variability, calls for a precautionary management approach.

  2. Administrative, institutional and legislative issues on agricultural waste exploitation in Turkey

    International Nuclear Information System (INIS)

    Kaya, Durmus; Baban, Ahmet; Dikec, Stephanie; Canka Kilic, Fatma

    2008-01-01

    In this study, the influence of non-technical issues on the exploitation of agricultural waste in Turkey was investigated in accordance with the work program requirements for the project entitled ''Exploitation of Agricultural Waste in Turkey'' under the EU Life Third Countries Program. The study has been organized and presented according to the following four phases: (i) study of existing Turkish legislation and the administrative and institutional framework, (ii) review and analysis of the EU policy and legislation relevant to agricultural waste, including identification of potential market instruments, (iii) identification of barriers to the promotion of agricultural waste exploitation in Turkey, and (iv) Identification of gaps and formulation of recommendations. An ultimate objective of this study is to transfer the European experience and practices relative to the overall framework of managing agricultural waste. (author)

  3. Exploiting Thread Parallelism for Ocean Modeling on Cray XC Supercomputers

    Energy Technology Data Exchange (ETDEWEB)

    Sarje, Abhinav [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Jacobsen, Douglas W. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Williams, Samuel W. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Ringler, Todd [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Oliker, Leonid [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2016-05-01

    The incorporation of increasing core counts in modern processors used to build state-of-the-art supercomputers is driving application development towards exploitation of thread parallelism, in addition to distributed memory parallelism, with the goal of delivering efficient high-performance codes. In this work we describe the exploitation of threading and our experiences with it with respect to a real-world ocean modeling application code, MPAS-Ocean. We present detailed performance analysis and comparisons of various approaches and configurations for threading on the Cray XC series supercomputers.

  4. On the dynamics of exploited fish populations

    National Research Council Canada - National Science Library

    Beverton, R. J. H; Holt, Sidney J

    1993-01-01

    ...-brooding cichlids, and viviparity in many sharks and toothcarps. Moreover, fish are of considerable importance to the survival of the human species in the form of nutritious, delicious and diverse food. Rational exploitation and management of our global stocks of fishes must rely upon a detailed and precise insight of their biology. The...

  5. 25 CFR 20.516 - How are child abuse, neglect or exploitation cases to be handled?

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false How are child abuse, neglect or exploitation cases to be... FINANCIAL ASSISTANCE AND SOCIAL SERVICES PROGRAMS Child Assistance Foster Care § 20.516 How are child abuse, neglect or exploitation cases to be handled? Reported child abuse, neglect or exploitation cases and the...

  6. Administrative, institutional and legislative issues on agricultural waste exploitation in Turkey

    Energy Technology Data Exchange (ETDEWEB)

    Kaya, Durmus; Baban, Ahmet; Dikec, Stephanie [TUBITAK MRC Chemistry and Enviorenment Institute, P.O. Box 21, 41470 Gebze-Kocaeli (Turkey); Canka Kilic, Fatma [Kocaeli University, KMYO, Department of Air Conditioning and Refrigeration, Kullar/Kocaeli (Turkey)

    2008-02-15

    In this study, the influence of non-technical issues on the exploitation of agricultural waste in Turkey was investigated in accordance with the work program requirements for the project entitled ''Exploitation of Agricultural Waste in Turkey'' under the EU Life Third Countries Program. The study has been organized and presented according to the following four phases: (i) study of existing Turkish legislation and the administrative and institutional framework, (ii) review and analysis of the EU policy and legislation relevant to agricultural waste, including identification of potential market instruments, (iii) identification of barriers to the promotion of agricultural waste exploitation in Turkey, and (iv) Identification of gaps and formulation of recommendations. An ultimate objective of this study is to transfer the European experience and practices relative to the overall framework of managing agricultural waste. (author)

  7. Environmental Impacts of Sand Exploitation. Analysis of Sand Market

    Directory of Open Access Journals (Sweden)

    Marius Dan Gavriletea

    2017-06-01

    Full Text Available Sand is an indispensable natural resource for any society. Despite society’s increasing dependence on sand, there are major challenges that this industry needs to deal with: limited sand resources, illegal mining, and environmental impact of sand mining. The purpose of this paper is twofold: to present an overview of the sand market, highlighting the main trends and actors for production, export and import, and to review the main environmental impacts associated with sand exploitation process. Based on these findings, we recommend different measures to be followed to reduce negative impacts. Sand mining should be done in a way that limits environmental damage during exploitation and restores the land after mining operations are completed.

  8. Uncertainty avoidance and the exploration-exploitation trade-off

    NARCIS (Netherlands)

    Broekhuizen, Thijs; Giarratana, Marco S.; Torres, Anna

    2017-01-01

    Purpose - This study aims to investigate how a firm's uncertainty avoidance - as indicated by the headquarters' national culture - impacts firm performance by affecting exploratory (product innovation) and exploitative (brand trademark protection) activities. It aims to show that firms characterized

  9. Un premier service mobile en Égypte qui relie les petits exploitants ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Un premier service mobile en Égypte qui relie les petits exploitants aux acheteurs. Un homme qui parle sur un téléphone mobile. Les petits exploitants agricoles dominent l'agriculture égyptienne, mais leur manque de connaissances en matière de commercialisation et de compétences techniques, ainsi qu'une mauvaise ...

  10. Human trafficking and exploitation: A global health concern.

    Science.gov (United States)

    Zimmerman, Cathy; Kiss, Ligia

    2017-11-01

    In this collection review, Cathy Zimmerman and colleague introduce the PLOS Medicine Collection on Human Trafficking, Exploitation and Health, laying out the magnitude of the global trafficking problem and offering a public health policy framework to guide responses to trafficking.

  11. Energy for lunar resource exploitation

    Science.gov (United States)

    Glaser, Peter E.

    1992-02-01

    Humanity stands at the threshold of exploiting the known lunar resources that have opened up with the access to space. America's role in the future exploitation of space, and specifically of lunar resources, may well determine the level of achievement in technology development and global economic competition. Space activities during the coming decades will significantly influence the events on Earth. The 'shifting of history's tectonic plates' is a process that will be hastened by the increasingly insistent demands for higher living standards of the exponentially growing global population. Key to the achievement of a peaceful world in the 21st century, will be the development of a mix of energy resources at a societally acceptable and affordable cost within a realistic planning horizon. This must be the theme for the globally applicable energy sources that are compatible with the Earth's ecology. It is in this context that lunar resources development should be a primary goal for science missions to the Moon, and for establishing an expanding human presence. The economic viability and commercial business potential of mining, extracting, manufacturing, and transporting lunar resource based materials to Earth, Earth orbits, and to undertake macroengineering projects on the Moon remains to be demonstrated. These extensive activities will be supportive of the realization of the potential of space energy sources for use on Earth. These may include generating electricity for use on Earth based on beaming power from Earth orbits and from the Moon to the Earth, and for the production of helium 3 as a fuel for advanced fusion reactors.

  12. Research on Factors Affecting the Optimal Exploitation of Natural Gas Resources in China

    Directory of Open Access Journals (Sweden)

    Jianzhong Xiao

    2016-05-01

    Full Text Available This paper develops an optimizing model for the long-term exploitation of limited natural gas reserves in China. In addition to describing the life cycle characteristics of natural gas production and introducing the inter-temporal allocation theory, this paper builds the optimal exploitation model of natural gas resources within a gas field in the Ordos Basin as an example to analyze its exploitation scale and how influence factors, such as recovery rate, discount rate and the gas well exhausting cycle, affect the optimal exploration path of this gas field. We determine that an increase in the discount rate stimulates investors to invest more aggressively in natural gas exploitation in the early period due to the lower discounted value, thereby increasing the pace of the exploitation of natural gas and the exhaustion of gas fields. A higher recoverable factor implies more recoverable reserves and greater potential of increasing the output of gas fields. The exhaustion rate of gas wells affects the capability of converting capacity to output. When exhaustion occurs quickly in gas wells, the output will likely increase in the output rising period, and the output will likely decrease at a faster rate in the output reduction period. Price reform affects the economic recoverable reserves of gas fields.

  13. Understanding and Responding to the Needs of Commercially Sexually Exploited Youth: Recommendations for the Mental Health Provider.

    Science.gov (United States)

    Ijadi-Maghsoodi, Roya; Cook, Mekeila; Barnert, Elizabeth S; Gaboian, Shushanik; Bath, Eraka

    2016-01-01

    Mental health providers are frequently at the forefront of addressing the multifaceted needs of commercially sexually exploited youth. This article provides an overview of the definition of commercial sexual exploitation of children and relevant legislation including the shift toward decriminalization of commercially sexually exploited youth. To provide clinicians with tools needed to deliver competent care to this population, a review of risk factors for commercial sexual exploitation of children and the role of the clinician in identification, assessment, and treatment of commercially sexually exploited youth are discussed. Published by Elsevier Inc.

  14. Human trafficking for labour exploitation: Interpreting the crime

    NARCIS (Netherlands)

    Coster van Voorhout, J.E.B.

    2007-01-01

    The definition of human trafficking for labour exploitation, as follows from the European Council Framework Decision, proves to be unclear. Literal interpretation does not suffice, because it does not clarify all elements of what is deemed to be criminal behaviour, and hermeneutical interpretation

  15. Indicators of Nuclear safety and exploitation in ANAV

    International Nuclear Information System (INIS)

    Quintana Prieto, M.; Jorda Alcove, M.

    2013-01-01

    The use of indicators by ANAV plants, aims to be a tool to facilitate the assessment of the behaviour of the plants nuclear over a specific time period. The following are and are they explain those related to Nuclear safety and exploitation.

  16. Human trafficking and exploitation: A global health concern.

    Directory of Open Access Journals (Sweden)

    Cathy Zimmerman

    2017-11-01

    Full Text Available In this collection review, Cathy Zimmerman and colleague introduce the PLOS Medicine Collection on Human Trafficking, Exploitation and Health, laying out the magnitude of the global trafficking problem and offering a public health policy framework to guide responses to trafficking.

  17. Human collective intelligence under dual exploration-exploitation dilemmas.

    Directory of Open Access Journals (Sweden)

    Wataru Toyokawa

    Full Text Available The exploration-exploitation dilemma is a recurrent adaptive problem for humans as well as non-human animals. Given a fixed time/energy budget, every individual faces a fundamental trade-off between exploring for better resources and exploiting known resources to optimize overall performance under uncertainty. Colonies of eusocial insects are known to solve this dilemma successfully via evolved coordination mechanisms that function at the collective level. For humans and other non-eusocial species, however, this dilemma operates within individuals as well as between individuals, because group members may be motivated to take excessive advantage of others' exploratory findings through social learning. Thus, even though social learning can reduce collective exploration costs, the emergence of disproportionate "information scroungers" may severely undermine its potential benefits. We investigated experimentally whether social learning opportunities might improve the performance of human participants working on a "multi-armed bandit" problem in groups, where they could learn about each other's past choice behaviors. Results showed that, even though information scroungers emerged frequently in groups, social learning opportunities reduced total group exploration time while increasing harvesting from better options, and consequentially improved collective performance. Surprisingly, enriching social information by allowing participants to observe others' evaluations of chosen options (e.g., Amazon's 5-star rating system in addition to choice-frequency information had a detrimental impact on performance compared to the simpler situation with only the choice-frequency information. These results indicate that humans groups can handle the fundamental "dual exploration-exploitation dilemmas" successfully, and that social learning about simple choice-frequencies can help produce collective intelligence.

  18. Evaluating Maximum Wind Energy Exploitation in Active Distribution Networks

    DEFF Research Database (Denmark)

    Siano, Pierluigi; Chen, Peiyuan; Chen, Zhe

    2010-01-01

    The increased spreading of distributed and renewable generation requires moving towards active management of distribution networks. In this paper, in order to evaluate maximum wind energy exploitation in active distribution networks, a method based on a multi-period optimal power flow (OPF......) analysis is proposed. Active network management schemes such as coordinated voltage control, energy curtailment and power factor control are integrated in the method in order to investigate their impacts on the maximization of wind energy exploitation. Some case studies, using real data from a Danish...... distribution system, confirmed the effectiveness of the proposed method in evaluating the optimal applications of active management schemes to increase wind energy harvesting without costly network reinforcement for the connection of wind generation....

  19. Wideband Low Noise Amplifiers Exploiting Thermal Noise Cancellation

    NARCIS (Netherlands)

    Bruccoleri, F.; Klumperink, Eric A.M.; Nauta, Bram

    2005-01-01

    Low Noise Amplifiers (LNAs) are commonly used to amplify signals that are too weak for direct processing for example in radio or cable receivers. Traditionally, low noise amplifiers are implemented via tuned amplifiers, exploiting inductors and capacitors in resonating LC-circuits. This can render

  20. Exploitative Learning by Exporting

    DEFF Research Database (Denmark)

    Golovko, Elena; Lopes Bento, Cindy; Sofka, Wolfgang

    Decisions on entering foreign markets are among the most challenging but also potentially rewarding strategy choices managers can make. In this study, we examine the effect of export entry on the firm investment decisions in two activities associated with learning about new technologies...... and learning about new markets ? R&D investments and marketing investments, in search of novel insights into the content and process underlying learning by exporting. We draw from organizational learning theory for predicting changes in both R&D and marketing investment patterns that accompany firm entry......, it is predominantly the marketing-related investment decisions associated with starting to export that lead to increases in firm productivity. We conclude that learning-by-exporting might be more properly characterized as ?learning about and exploiting new markets? rather than ?learning about new technologies...

  1. Exploiting a natural auxotrophy for genetic selection.

    Science.gov (United States)

    Ramage, Elizabeth; Gallagher, Larry; Manoil, Colin

    2012-08-01

    We exploited the natural histidine auxotrophy of Francisella species to develop hisD (encodes histidinol dehydrogenase) as a positive selection marker. A shuttle plasmid (pBR103) carrying Escherichia coli hisD and designed for cloning of PCR fragments replicated in both attenuated and highly virulent Francisella strains. During this work, we formulated a simplified defined growth medium for Francisella novicida.

  2. Assessment of the potential for exploitation of the remaining reserves of coal in Poland

    International Nuclear Information System (INIS)

    Wodarski, K.; Bijanska, J.

    2014-01-01

    In mining areas belonging to the Polish mining companies, there is a significant amount of coal, contained in remaining reserves, that have not been exploited so far. For years, the mines have been evaluating the possibility of its exploitation, since it would expand its resource base and would extend its useful life. In addition, exploitation of the remaining reserves can minimize stress concentration zones in the soil, the rebel y improving conditions for maintenance of excavations and limiting the risk of shock rock. (Author)

  3. Potentially exploitable supercritical geothermal resources in the ductile crust

    Science.gov (United States)

    Watanabe, Noriaki; Numakura, Tatsuya; Sakaguchi, Kiyotoshi; Saishu, Hanae; Okamoto, Atsushi; Ingebritsen, Steven E.; Tsuchiya, Noriyoshi

    2017-01-01

    The hypothesis that the brittle–ductile transition (BDT) drastically reduces permeability implies that potentially exploitable geothermal resources (permeability >10−16 m2) consisting of supercritical water could occur only in rocks with unusually high transition temperatures such as basalt. However, tensile fracturing is possible even in ductile rocks, and some permeability–depth relations proposed for the continental crust show no drastic permeability reduction at the BDT. Here we present experimental results suggesting that the BDT is not the first-order control on rock permeability, and that potentially exploitable resources may occur in rocks with much lower BDT temperatures, such as the granitic rocks that comprise the bulk of the continental crust. We find that permeability behaviour for fractured granite samples at 350–500 °C under effective confining stress is characterized by a transition from a weakly stress-dependent and reversible behaviour to a strongly stress-dependent and irreversible behaviour at a specific, temperature-dependent effective confining stress level. This transition is induced by onset of plastic normal deformation of the fracture surface (elastic–plastic transition) and, importantly, causes no ‘jump’ in the permeability. Empirical equations for this permeability behaviour suggest that potentially exploitable resources exceeding 450 °C may form at depths of 2–6 km even in the nominally ductile crust.

  4. Features for Exploiting Black-Box Optimization Problem Structure

    DEFF Research Database (Denmark)

    Tierney, Kevin; Malitsky, Yuri; Abell, Tinus

    2013-01-01

    landscape of BBO problems and show how an algorithm portfolio approach can exploit these general, problem indepen- dent features and outperform the utilization of any single minimization search strategy. We test our methodology on data from the GECCO Workshop on BBO Benchmarking 2012, which contains 21...

  5. Relativistic quantum metrology: exploiting relativity to improve quantum measurement technologies.

    Science.gov (United States)

    Ahmadi, Mehdi; Bruschi, David Edward; Sabín, Carlos; Adesso, Gerardo; Fuentes, Ivette

    2014-05-22

    We present a framework for relativistic quantum metrology that is useful for both Earth-based and space-based technologies. Quantum metrology has been so far successfully applied to design precision instruments such as clocks and sensors which outperform classical devices by exploiting quantum properties. There are advanced plans to implement these and other quantum technologies in space, for instance Space-QUEST and Space Optical Clock projects intend to implement quantum communications and quantum clocks at regimes where relativity starts to kick in. However, typical setups do not take into account the effects of relativity on quantum properties. To include and exploit these effects, we introduce techniques for the application of metrology to quantum field theory. Quantum field theory properly incorporates quantum theory and relativity, in particular, at regimes where space-based experiments take place. This framework allows for high precision estimation of parameters that appear in quantum field theory including proper times and accelerations. Indeed, the techniques can be applied to develop a novel generation of relativistic quantum technologies for gravimeters, clocks and sensors. As an example, we present a high precision device which in principle improves the state-of-the-art in quantum accelerometers by exploiting relativistic effects.

  6. Exploitation of puddles for breakthroughs in claustrum research

    Directory of Open Access Journals (Sweden)

    John Irwin Johnson

    2014-05-01

    Full Text Available Since its first identification as a thin strip of gray matter enclosed between stretches of neighboring fiber bundles, the claustrum has been considered impossible to study by many modern techniques that need a certain roominess of tissue for their application. The claustrum was known as the front wall, vormauren in German from 1822, and is still called avant-mur in French. We here propose a means for breaking into and through this wall, by utilizing the instances where the claustral tissue itself has broken free into more spacious dimensions. This has occurred several times in the evolution of modern mammals, and all that needs be done is to exploit these natural expansions in order to take advantage of a great panoply of technological advances now at our disposal. So here we review the kinds of breakout puddles that await productive exploitation, to bring our knowledge of structure and function up to the level enjoyed for other more accessible regions of the brain..

  7. Expelling Slavery from the Nation: Representations of labour exploitation in Australia’s supply chain

    Directory of Open Access Journals (Sweden)

    Anna Szörényi

    2016-09-01

    Full Text Available On 4 May 2015, the Australian national broadcaster’s current affairs programme Four Corners aired an episode titled ‘Slaving Away: The dirty secrets behind Australia’s fresh food’, that provided revelations of labour exploitation of migrant workers on working holiday visas. The government reacted swiftly to these allegations with an ‘operation’ ostensibly designed to stop the exploitation. In reports of Operation Cloudburst, however, there was a shift in the media’s definition of the problem: worker exploitation became visa violations and newspapers shortly reported the resulting action taken: the ‘illegal workers’ in Australia’s food industry had been arrested. This paper tracks the competing discursive and visual representations of this case that ultimately made questions of labour rights become questions of immigration, making it plausible and acceptable that concern over exploitation of workers should be addressed by deportation of ‘illegal immigrants’. Such discursive slippage is enabled by cultural amnesia over Australia’s history of exploitation of racialised and migrant labourers, which allows ‘slavery’ to be represented as a ‘foreign’ problem that can be expelled in defence of the purity of the national domestic space.

  8. Preliminary studies of dry rock geothermal exploitation in south west England

    Energy Technology Data Exchange (ETDEWEB)

    Batchelor, A. S.; Pearson, C. M.

    1978-07-01

    A research program to develop a method to exploit the heat usually found in mines in the Cornwall area is described. Temperature gradients range from 27 to 34/sup 0/C/Km with a mean of 29.8/sup 0/C/Km. The exploitable area is defined and methods of creating an artificial geothermal field or artificial reservoir are described. Tests to determine fractures in rocks including gamma-gamma logging, tv camera, caliper, and 3-D sonic are described as are pumping tests. 15 references, 3 figures.

  9. Influence of Machine Exploitation Effectiveness on Furniture Production Quality Level

    Directory of Open Access Journals (Sweden)

    Stasiak-Betlejewska Renata

    2015-12-01

    Full Text Available One of the most important factors determining the company‘s capacity to produce high quality products is the level of machinery operation effectiveness. Companies having modern machinery are characterized by high productivity. To obtain a high quality product, the equipment should be properly used, without any failure, which contributes significantly to the exploitation level increase. The modernity level and the exploitation effectiveness level for chosen machine producing furniture components in relation to the product quality level were analysed in the paper. As a result of the research findings analysis, proposals for corrective actions with regard to machinery maintenance and production processes were presented.

  10. A Case Study of How Organisational Members do Affect the Balancing of Exploitation and Exploration

    DEFF Research Database (Denmark)

    Andreassen, Mads R.

    2008-01-01

    study using semi-structured interviews and observation techniques this paper explores exploitation and exploration in a Danish industrial manufacture. Findings suggest that conditions affecting the balance between exploitation and exploration activities would depend on how an organisational member......Combing operations between the main parties in integration of new products, efficiently, are in practice for most organisations a challenging task demanding strong organisational capabilities, and in accordance to literature, achieving a successfully combination would be possible through...... an organisation's ability to establish dual capabilities in terms of exploitation and exploration (March, 1991). Few studies, however, suggest a classification of which organisational conditions would support a balance allowing exploitation and exploration operating side by side. Based on a single indept case...

  11. Efficient Depth Map Compression Exploiting Segmented Color Data

    DEFF Research Database (Denmark)

    Milani, Simone; Zanuttigh, Pietro; Zamarin, Marco

    2011-01-01

    performances is still an open research issue. This paper presents a novel compression scheme that exploits a segmentation of the color data to predict the shape of the different surfaces in the depth map. Then each segment is approximated with a parameterized plane. In case the approximation is sufficiently...

  12. Describing Data Format Exploits Using Bitstream Segment Graphs

    NARCIS (Netherlands)

    Hartle, Michael; Schumann, Daniel; Botchak, Arsene; Tews, Erik; Mühlhäuser, Max

    2008-01-01

    Exploits based on data processing bugs are delivered through crafted data that seems to follow a data format, yet is altered in some way to trigger a specific bug during processing, eg. in order to execute contained malicious code. Decomposing crafted data according to the purported data format and

  13. Assisting children born of sexual exploitation and abuse

    Directory of Open Access Journals (Sweden)

    Lauren Rumble

    2007-01-01

    Full Text Available The UN Secretary-General has issued a strategy tosupport victims of sexual exploitation and abuse by UNstaff. It includes a controversial proposal to introduceDNA sampling for all UN staff. Unless this suggestionis adopted, an important opportunity to implementa truly survivor-centred approach may be lost.

  14. Exploiting Inhibitory Siglecs to Combat Food Allergies

    Science.gov (United States)

    2017-10-01

    AWARD NUMBER: W81XWH-16-1-0302 TITLE: Exploiting Inhibitory Siglecs to Combat Food Allergies PRINCIPAL INVESTIGATOR: Michael Kulis, Ph.D...CONTRACTING ORGANIZATION: University of North Carolina at Chapel Hill Chapel Hill, NC 27599 REPORT DATES: October 2017 TYPE OF REPORT: Annual PREPARED FOR...Department of Defense, Washington Headquarters Services , Directorate for Information Operations and Reports (0704-0188), 1215 Jefferson Davis Highway, Suite

  15. Low-Level Exploitation Mitigation by Diverse Microservices

    OpenAIRE

    Otterstad , Christian; Yarygina , Tetiana

    2017-01-01

    Part 2: Microservices and Containers; International audience; This paper discusses a combination of isolatable microservices and software diversity as a mitigation technique against low-level exploitation; the effectiveness and benefits of such an architecture are substantiated. We argue that the core security benefit of microservices with diversity is increased control flow isolation. Additionally, a new microservices mitigation technique leveraging a security monitor service is introduced t...

  16. Forced Flexibility and Exploitation: Experiences of Migrant Workers in the Cleaning Industry

    Directory of Open Access Journals (Sweden)

    Natalia Ollus

    2016-03-01

    Full Text Available Globalization has resulted in structural changes in the labor markets over the last decades. These changes have weakened some of the economic and social dimensions of work. At the same time, migration and especially labor migration have increased on the global level. This article looks at the situation of migrant workers in the cleaning industry in Finland. It is based on interviews with migrant workers who have experienced labor exploitation in the cleaning industry, representatives of cleaning industry employers, and representatives of labor unions. The primary aim is to give voice to the migrant workers themselves and to analyze how they experience their work and their position in working life. The findings suggest that there is a risk that migrant workers in the cleaning sector experience various forms of exploitation. This article argues that the demand and need for (employee flexibility may turn into forced flexibility that exploits the powerless and vulnerable migrant workers who have few other options than to agree to work on poor terms. The article suggests that the structural reasons that make the exploitation of migrant labor possible should be identified and addressed in order to prevent misuse of any workers, especially migrants.

  17. Precarious Working Conditions and Exploitation of Workers in the Nigerian Informal Economy

    Directory of Open Access Journals (Sweden)

    Akeem Ayofe Akinwale

    2014-06-01

    Full Text Available Situations in the informal economy expose workers to dangers without opportunity for hazard pay, thereby reflecting exploitation. Based on the Marxist theory of conflict, this paper examines the extent of precarious working conditions and exploitation of workers in the Nigerian informal economy. A total of 500 respondents randomly selected from various informal economy organizations participated in the survey conducted in Lagos State, Nigeria. The findings revealed that most of the respondents (76.4% had worked for up to five years consecutively, followed by a few (18%, who had worked for up to ten years consecutively. Their monthly income ranged from 10,000 naira ($60 to 80,000 naira ($485. Their mean monthly income was 30,000 naira ($182. Most of them (73.5% worked for 10 to 12 hours daily, while 26.5% worked for seven to nine hours daily. The experience of low pay with relatively long daily working hours shows the extent of exploitation in the Nigerian informal economy. Several background characteristics, such as gender, age, level of education, and marital status influenced the workers’ experience of precarious working conditions and exploitation. Therefore, there is an urgent need for a progressive workplace policy that can ensure decent work and adequate protection for workers in the Nigerian informal economy.

  18. Liposomal cancer therapy: exploiting tumor characteristics

    DEFF Research Database (Denmark)

    Kaasgaard, Thomas; Andresen, Thomas Lars

    2010-01-01

    an overview of current strategies for improving the different stages of liposomal cancer therapy, which involve transporting drug-loaded liposomes through the bloodstream, increasing tumor accumulation, and improving drug release and cancer cell uptake after accumulation at the tumor target site. What...... the reader will gain: The review focuses on strategies that exploit characteristic features of solid tumors, such as abnormal vasculature, overexpression of receptors and enzymes, as well as acidic and thiolytic characteristics of the tumor microenvironment. Take home message: It is concluded that the design...

  19. 75 FR 40838 - Establishment of the Advisory Board on Elder Abuse, Neglect, and Exploitation

    Science.gov (United States)

    2010-07-14

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Establishment of the Advisory Board on Elder Abuse...: Notice. Authority: The Advisory Board on Elder Abuse, Neglect, and Exploitation is authorized under... Services announces establishment of the Advisory Board on Elder Abuse, Neglect, and Exploitation, as...

  20. Balancing the Budget through Social Exploitation: Why Hard Times Are Even Harder for Some.

    Science.gov (United States)

    Tropman, John; Nicklett, Emily

    2012-01-01

    In all societies needs and wants regularly exceed resources. Thus societies are always in deficit; demand always exceeds supply and "balancing the budget" is a constant social problem. To make matters somewhat worse, research suggests that need- and want-fulfillment tends to further stimulate the cycle of wantseeking rather than satiating desire. Societies use various resource-allocation mechanisms, including price, to cope with gaps between wants and resources. Social exploitation is a second mechanism, securing labor from population segments that can be coerced or convinced to perform necessary work for free or at below-market compensation. Using practical examples, this article develops a theoretical framework for understanding social exploitation. It then offers case examples of how different segments of the population emerge as exploited groups in the United States, due to changes in social policies. These exploitative processes have been exacerbated and accelerated by the economic downturn that began in 2007.

  1. The Role of External Knowledge Sources and Organizational Design in the Process of Opportunity Exploitation

    DEFF Research Database (Denmark)

    Foss, Nicolai Juul; Lyngsie, Jacob; A. Zahra, Shaker

    involving 536 Danish firms shows that the use of external knowledge sources is positively associated with opportunity exploitation, but the strength of this association is significantly influenced by organizational designs that enable the firm to access external knowledge during the process of exploiting......Research highlights the role of external knowledge sources in the recognition of strategic opportunities, but is less forthcoming with respect to the role of such sources during the process of exploiting or realizing opportunities. We build on the knowledge-based view to propose that realizing...... opportunities often involves significant interactions with external knowledge sources. Organizational design can facilitate a firm’s interactions with these sources, while achieving coordination among organizational members engaged in opportunity exploitation. Our analysis of a double-respondent survey...

  2. The Role of External Knowledge Sources and Organizational Design in the Process of Opportunity Exploitation

    DEFF Research Database (Denmark)

    Foss, Nicolai Juul; Lyngsie, Jacob; Zahra, Shaker A.

    2013-01-01

    involving 536 Danish firms shows that the use of external knowledge sources is positively associated with opportunity exploitation, but the strength of this association is significantly influenced by organizational designs that enable the firm to access external knowledge during the process of exploiting......Research highlights the role of external knowledge sources in the recognition of strategic opportunities but is less forthcoming with respect to the role of such sources during the process of exploiting or realizing opportunities. We build on the knowledge-based view to propose that realizing...... opportunities often involves significant interactions with external knowledge sources. Organizational design can facilitate a firm's interactions with these sources, while achieving coordination among organizational members engaged in opportunity exploitation. Our analysis of a double-respondent survey...

  3. Root Exploit Detection and Features Optimization: Mobile Device and Blockchain Based Medical Data Management.

    Science.gov (United States)

    Firdaus, Ahmad; Anuar, Nor Badrul; Razak, Mohd Faizal Ab; Hashem, Ibrahim Abaker Targio; Bachok, Syafiq; Sangaiah, Arun Kumar

    2018-05-04

    The increasing demand for Android mobile devices and blockchain has motivated malware creators to develop mobile malware to compromise the blockchain. Although the blockchain is secure, attackers have managed to gain access into the blockchain as legal users, thereby comprising important and crucial information. Examples of mobile malware include root exploit, botnets, and Trojans and root exploit is one of the most dangerous malware. It compromises the operating system kernel in order to gain root privileges which are then used by attackers to bypass the security mechanisms, to gain complete control of the operating system, to install other possible types of malware to the devices, and finally, to steal victims' private keys linked to the blockchain. For the purpose of maximizing the security of the blockchain-based medical data management (BMDM), it is crucial to investigate the novel features and approaches contained in root exploit malware. This study proposes to use the bio-inspired method of practical swarm optimization (PSO) which automatically select the exclusive features that contain the novel android debug bridge (ADB). This study also adopts boosting (adaboost, realadaboost, logitboost, and multiboost) to enhance the machine learning prediction that detects unknown root exploit, and scrutinized three categories of features including (1) system command, (2) directory path and (3) code-based. The evaluation gathered from this study suggests a marked accuracy value of 93% with Logitboost in the simulation. Logitboost also helped to predicted all the root exploit samples in our developed system, the root exploit detection system (RODS).

  4. Efforts to Overcome Child Commercial Sexual Exploitation Victims in City Tourism Area, Manado

    Directory of Open Access Journals (Sweden)

    Rahmat Hidayat

    2017-09-01

    Full Text Available The tourism sector has a significant contribution to the economy of Manado City, North Sulawesi Province. However, on the other hand, it has a negative effect on the increase in the number of child commercial sexual exploitation victims and makes children into commercial sex workers. Despite not effective, the Local Government of Manado City, North Sulawesi Province, has made efforts to cope with the child commercial sexual exploitation victims. In connection with the case, this study is designed to analyze the causes of ineffectiveness of Local Government efforts in tackling child commercial sexual exploitation victims. The study was conducted in tourism area of Manado City, North Sulawesi Province. The informants involved in this study were divided into two types: experts and non-experts. The informants were determined by using Opportunistic Sampling, and the sampling is using Snowball Sampling. The results of the study showed that the development of tourism sector has negative effect on children in the communities. Efforts made to cope with child commercial sexual exploitation victims by the local government and relevant parties have not been effective due to limited allocation of budgets and skilled, quality human resources, the lack of harmonious understanding between police with judges and public prosecutors as law apparatus, supervision, and protection of victims in solving the cases of child commercial sexual exploitation victims, the implementation of action committee’s duties and responsibility have been not effect, the number of obstacles facing them.

  5. Exploiting Social Media Sensor Networks through Novel Data Fusion Techniques

    Energy Technology Data Exchange (ETDEWEB)

    Kouri, Tina [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Unprecedented amounts of data are continuously being generated by sensors (“hard” data) and by humans (“soft” data), and this data needs to be exploited to its full potential. The first step in exploiting this data is determine how the hard and soft data are related to each other. In this project we fuse hard and soft data, using the attributes of each (e.g., time and space), to gain more information about interesting events. Next, we attempt to use social networking textual data to predict the present (i.e., predict that an interesting event is occurring and details about the event) using data mining, machine learning, natural language processing, and text analysis techniques.

  6. Dandruff: The most commercially exploited skin disease

    Directory of Open Access Journals (Sweden)

    Ranganathan S

    2010-01-01

    Full Text Available The article discuss in detail about the prevalence, pathophysiology, clinical manifestations of dandruff including the etio-pathology. The article also discusses in detail about various treatment methods available for dandruff. The status of dandruff being amphibious - a disease/disorder, and relatively less medical intervention is sought after for the treatment, dandruff is the most commercially exploited skin and scalp disorder/disease by personal care industries.

  7. Exploiting thesauri knowledge in medical guideline formalization

    OpenAIRE

    Serban, R.C.; ten Teije, A.C.M.

    2009-01-01

    Objectives: As in software product lifecycle, the effort spent in maintaining medical knowl edge in guidelines can be reduced, if modularization, formalization and tracking of domain knowledge are employed across the guideline development phases. Methods: We propose to exploit and combine knowledge templates with medical background knowledge from existing thesauri in order to produce reusable building blocks used in guideline development. These tem- plates enable easier guideline formalizatio...

  8. Exploitation Strategies in Social Parasites of Fungus Growing Ants

    DEFF Research Database (Denmark)

    Clement, Janni Dolby

    One of the most remarkable and complex parasitic interactions is social parasitism, where a parasite exploits a complete society, rather than an individual organism. By integrating into a society the parasite gains protection against predators and diseases, and can redirect resources from the host...... to increase its own fitness. The host will use a sophisticated recognition system in order to accept nestmates and expel intruders from their societies. However this defence barrier can be overcome by parasites. Among the most specialized social parasites are the inquilines that exploit social insect colonies...... to this are Acromyrmex insinuator and Acromyrmex ameliae, parasites of fungus-growing ants. By still producing a worker caste both species offers a rare opportunity to study adaptive features in parasite worker behaviour. Furthermore can closely related inquiline-host combinations give us an insight in the trade...

  9. Exploring, exploiting and evolving diversity of aquatic ecosystem models

    DEFF Research Database (Denmark)

    Janssen, Annette B G; Arhonditsis, George B.; Beusen, Arthur

    2015-01-01

    Here, we present a community perspective on how to explore, exploit and evolve the diversity in aquatic ecosystem models. These models play an important role in understanding the functioning of aquatic ecosystems, filling in observation gaps and developing effective strategies for water quality...... management. In this spirit, numerous models have been developed since the 1970s. We set off to explore model diversity by making an inventory among 42 aquatic ecosystem modellers, by categorizing the resulting set of models and by analysing them for diversity. We then focus on how to exploit model diversity...... available through open-source policies, to standardize documentation and technical implementation of models, and to compare models through ensemble modelling and interdisciplinary approaches. We end with our perspective on how the field of aquatic ecosystem modelling might develop in the next 5–10 years...

  10. Exploiting serological data to understand the epidemiology of foot ...

    African Journals Online (AJOL)

    Exploiting serological data to understand the epidemiology of foot-and-mouth disease virus serotypes circulating in Libya. Ibrahim Eldaghayes, Abdunaser Dayhum, Abdulwahab Kammon, Monier Sharif, Giancarlo Ferrari, Christianus Bartels, Keith Sumption, Donald P. King, Santina Grazioli, Emiliana Brocchi ...

  11. Commix: Automating Evaluation and Exploitation of Command Injection Vulnerabilities in Web Applications

    OpenAIRE

    Stasinopoulos, Anastasios; Ntantogian, Christoforos; Xenakis, Christos

    2018-01-01

    Despite the prevalence and the high impact of command injection attacks, little attention has been given by the research community to this type of code injections. Although there are many software tools to detect and exploit other types of code injections, such as SQL injections or Cross Site Scripting, there is no dedicated and specialized software that detects and exploits, automatically, command injection vulnerabilities. This paper proposes an open source tool that automates the process o...

  12. Exploiting social evolution in biofilms

    DEFF Research Database (Denmark)

    Boyle, Kerry E; Heilmann, Silja; van Ditmarsch, Dave

    2013-01-01

    Bacteria are highly social organisms that communicate via signaling molecules, move collectively over surfaces and make biofilm communities. Nonetheless, our main line of defense against pathogenic bacteria consists of antibiotics-drugs that target individual-level traits of bacterial cells...... and thus, regrettably, select for resistance against their own action. A possible solution lies in targeting the mechanisms by which bacteria interact with each other within biofilms. The emerging field of microbial social evolution combines molecular microbiology with evolutionary theory to dissect...... the molecular mechanisms and the evolutionary pressures underpinning bacterial sociality. This exciting new research can ultimately lead to new therapies against biofilm infections that exploit evolutionary cheating or the trade-off between biofilm formation and dispersal....

  13. Exploitation of pocket gophers and their food caches by grizzly bears

    Science.gov (United States)

    Mattson, D.J.

    2004-01-01

    I investigated the exploitation of pocket gophers (Thomomys talpoides) by grizzly bears (Ursus arctos horribilis) in the Yellowstone region of the United States with the use of data collected during a study of radiomarked bears in 1977-1992. My analysis focused on the importance of pocket gophers as a source of energy and nutrients, effects of weather and site features, and importance of pocket gophers to grizzly bears in the western contiguous United States prior to historical extirpations. Pocket gophers and their food caches were infrequent in grizzly bear feces, although foraging for pocket gophers accounted for about 20-25% of all grizzly bear feeding activity during April and May. Compared with roots individually excavated by bears, pocket gopher food caches were less digestible but more easily dug out. Exploitation of gopher food caches by grizzly bears was highly sensitive to site and weather conditions and peaked during and shortly after snowmelt. This peak coincided with maximum success by bears in finding pocket gopher food caches. Exploitation was most frequent and extensive on gently sloping nonforested sites with abundant spring beauty (Claytonia lanceolata) and yampah (Perdieridia gairdneri). Pocket gophers are rare in forests, and spring beauty and yampah roots are known to be important foods of both grizzly bears and burrowing rodents. Although grizzly bears commonly exploit pocket gophers only in the Yellowstone region, this behavior was probably widespread in mountainous areas of the western contiguous United States prior to extirpations of grizzly bears within the last 150 years.

  14. Examples of Sentinel-2A Mission Exploitation Results

    Science.gov (United States)

    Koetz, Benjamin; Hoersch, Bianca; Gascon, Ferran; Desnos, Yves-Louis; Seifert, Frank Martin; Paganini, Marc; Ramoino, Fabrizio; Arino, Olivier

    2017-04-01

    The Sentinel-2 Copernicus mission will bring significant breakthrough in the exploitation of space borne optical data. Sentinel-2 time series will transform land cover, agriculture, forestry, in-land water and costal EO applications from mapping to monitoring, from snapshot to time series data analysis, from image-based to pixel-based processing. The 5-days temporal revisiting of the Sentinel-2 satellites, when both units will be operated together, will usher us in a new era for time series analysis at high spatial resolutions (HR) of 10-20 meters. The monitoring of seasonal variations and processes in phenology and hydrology are examples of the many R&D areas to be studied. The mission's large swath and systematic acquisitions will further support unprecedented coverage at the national scale addressing information requirements of national to regional policies. Within ESA programs, such as the Data User Element (DUE), Scientific Exploitation of Operational Missions (SEOM) and Climate Change Initiative (CCI), several R&D activities are preparing the exploitation of the Sentinel-2 mission towards reliable measurements and monitoring of e.g. Essential Climate Variables and indicators for the Sustainable Development Goals. Early Sentinel-2 results will be presented related to a range of applications and scientific domains such as agricultural monitoring at national scale (DUE Sen2Agri), wetland extent and condition over African Ramsar sites (DUE GlobWetland-Africa), land cover mapping for climate change (CCI Land Cover), national land monitoring (Cadaster-Env), forest degradation (DUE ForMoSa), urban mapping (DUE EO4Urban), in-land water quality (DUE SPONGE), map of Mediterranean aquaculture (DUE SMART) and coral reef habitat mapping (SEOM S2-4Sci Coral). The above-mentioned activities are only a few examples from the very active international land imaging community building on the long-term Landsat and Spot heritage and knowledge.

  15. FSH: fast spaced seed hashing exploiting adjacent hashes.

    Science.gov (United States)

    Girotto, Samuele; Comin, Matteo; Pizzi, Cinzia

    2018-01-01

    Patterns with wildcards in specified positions, namely spaced seeds , are increasingly used instead of k -mers in many bioinformatics applications that require indexing, querying and rapid similarity search, as they can provide better sensitivity. Many of these applications require to compute the hashing of each position in the input sequences with respect to the given spaced seed, or to multiple spaced seeds. While the hashing of k -mers can be rapidly computed by exploiting the large overlap between consecutive k -mers, spaced seeds hashing is usually computed from scratch for each position in the input sequence, thus resulting in slower processing. The method proposed in this paper, fast spaced-seed hashing (FSH), exploits the similarity of the hash values of spaced seeds computed at adjacent positions in the input sequence. In our experiments we compute the hash for each positions of metagenomics reads from several datasets, with respect to different spaced seeds. We also propose a generalized version of the algorithm for the simultaneous computation of multiple spaced seeds hashing. In the experiments, our algorithm can compute the hashing values of spaced seeds with a speedup, with respect to the traditional approach, between 1.6[Formula: see text] to 5.3[Formula: see text], depending on the structure of the spaced seed. Spaced seed hashing is a routine task for several bioinformatics application. FSH allows to perform this task efficiently and raise the question of whether other hashing can be exploited to further improve the speed up. This has the potential of major impact in the field, making spaced seed applications not only accurate, but also faster and more efficient. The software FSH is freely available for academic use at: https://bitbucket.org/samu661/fsh/overview.

  16. User-driven sampling strategies in image exploitation

    Science.gov (United States)

    Harvey, Neal; Porter, Reid

    2013-12-01

    Visual analytics and interactive machine learning both try to leverage the complementary strengths of humans and machines to solve complex data exploitation tasks. These fields overlap most significantly when training is involved: the visualization or machine learning tool improves over time by exploiting observations of the human-computer interaction. This paper focuses on one aspect of the human-computer interaction that we call user-driven sampling strategies. Unlike relevance feedback and active learning sampling strategies, where the computer selects which data to label at each iteration, we investigate situations where the user selects which data is to be labeled at each iteration. User-driven sampling strategies can emerge in many visual analytics applications but they have not been fully developed in machine learning. User-driven sampling strategies suggest new theoretical and practical research questions for both visualization science and machine learning. In this paper we identify and quantify the potential benefits of these strategies in a practical image analysis application. We find user-driven sampling strategies can sometimes provide significant performance gains by steering tools towards local minima that have lower error than tools trained with all of the data. In preliminary experiments we find these performance gains are particularly pronounced when the user is experienced with the tool and application domain.

  17. Explore or Exploit? A Generic Model and an Exactly Solvable Case

    Science.gov (United States)

    Gueudré, Thomas; Dobrinevski, Alexander; Bouchaud, Jean-Philippe

    2014-02-01

    Finding a good compromise between the exploitation of known resources and the exploration of unknown, but potentially more profitable choices, is a general problem, which arises in many different scientific disciplines. We propose a stylized model for these exploration-exploitation situations, including population or economic growth, portfolio optimization, evolutionary dynamics, or the problem of optimal pinning of vortices or dislocations in disordered materials. We find the exact growth rate of this model for treelike geometries and prove the existence of an optimal migration rate in this case. Numerical simulations in the one-dimensional case confirm the generic existence of an optimum.

  18. Explore or exploit? A generic model and an exactly solvable case.

    Science.gov (United States)

    Gueudré, Thomas; Dobrinevski, Alexander; Bouchaud, Jean-Philippe

    2014-02-07

    Finding a good compromise between the exploitation of known resources and the exploration of unknown, but potentially more profitable choices, is a general problem, which arises in many different scientific disciplines. We propose a stylized model for these exploration-exploitation situations, including population or economic growth, portfolio optimization, evolutionary dynamics, or the problem of optimal pinning of vortices or dislocations in disordered materials. We find the exact growth rate of this model for treelike geometries and prove the existence of an optimal migration rate in this case. Numerical simulations in the one-dimensional case confirm the generic existence of an optimum.

  19. Atomic Energy Authority Bill (amendment on exploitation of results of research)

    International Nuclear Information System (INIS)

    Gray, J.H.N.; Stoddart, D.L.; Lloyd, R.G.

    1986-01-01

    This amendment arises from legal doubts about the extent of the UKAEA's present powers to exploit the results of its research. The new clause, which amends the Atomic Energy Authority Bill, allows that the Authority has power to exploit commercially by selling, licensing the use of, or otherwise dealing with any intellectual property (patents, trademarks, copyright, registered designs etc) resulting from research carried out by it, or on its behalf, or which is available because of exchange of results or collaboration with others. The 12 minute debate is reported verbatim. The amendment was agreed to. (U.K.)

  20. Conceptualizing child labour trafficking and exploitation: The case of Roma children in Montenegro

    Directory of Open Access Journals (Sweden)

    Arhin Antonela

    2012-01-01

    Full Text Available Trafficking of children for labour exploitation is a profit-oriented criminal activity by which children are recruited, transported, harboured or received for the purpose of labour exploitation irrespective of whether or not force, abduction, fraud or other means were used. This paper examines child labour trafficking in the context of human rights violations and as the worst form of child labour. In an attempt to situate the discourse of alleged labour exploitation and trafficking of Roma children in Montenegro, focusing in particular on instances of child begging, this paper offers an overview of the international legal framework as well as the Government of Montenegro’s policy framework relevant to this issue; an analysis of implicated historical, familial and cultural structures; and focuses on identifying root causes in terms of push-pull factors that are associated with enhancing children’s vulnerability and proneness to exploitation. Along with a set of recommendations, in closing, the paper calls for a more sophisticated analysis of child labour trafficking and, in the case of Roma children, a more nuanced understanding of historical and cultural pretexts against the backdrop of labour trafficking.

  1. Exploitation of Clustering Techniques in Transactional Healthcare Data

    Directory of Open Access Journals (Sweden)

    Naeem Ahmad Mahoto

    2014-03-01

    Full Text Available Healthcare service centres equipped with electronic health systems have improved their resources as well as treatment processes. The dynamic nature of healthcare data of each individual makes it complex and difficult for physicians to manually mediate them; therefore, automatic techniques are essential to manage the quality and standardization of treatment procedures. Exploratory data analysis, patternanalysis and grouping of data is managed using clustering techniques, which work as an unsupervised classification. A number of healthcare applications are developed that use several data mining techniques for classification, clustering and extracting useful information from healthcare data. The challenging issue in this domain is to select adequate data mining algorithm for optimal results. This paper exploits three different clustering algorithms: DBSCAN (Density-Based Clustering, agglomerative hierarchical and k-means in real transactional healthcare data of diabetic patients (taken as case study to analyse their performance in large and dispersed healthcare data. The best solution of cluster sets among the exploited algorithms is evaluated using clustering quality indexes and is selected to identify the possible subgroups of patients having similar treatment patterns

  2. Activity-based exploitation of Full Motion Video (FMV)

    Science.gov (United States)

    Kant, Shashi

    2012-06-01

    Video has been a game-changer in how US forces are able to find, track and defeat its adversaries. With millions of minutes of video being generated from an increasing number of sensor platforms, the DOD has stated that the rapid increase in video is overwhelming their analysts. The manpower required to view and garner useable information from the flood of video is unaffordable, especially in light of current fiscal restraints. "Search" within full-motion video has traditionally relied on human tagging of content, and video metadata, to provision filtering and locate segments of interest, in the context of analyst query. Our approach utilizes a novel machine-vision based approach to index FMV, using object recognition & tracking, events and activities detection. This approach enables FMV exploitation in real-time, as well as a forensic look-back within archives. This approach can help get the most information out of video sensor collection, help focus the attention of overburdened analysts form connections in activity over time and conserve national fiscal resources in exploiting FMV.

  3. Exploitation by Economic Necessity

    Directory of Open Access Journals (Sweden)

    Kristian F. Braekkan

    2015-10-01

    Full Text Available This study develops and tests a model that proposes economic necessity moderates the relationship between psychological contract violations (PCVs and organizational commitment and trust in the employing organization among non-unionized manufacturing workers (N = 226. Moderated regression analyses revealed that there was a significant interaction between PCV and economic necessity in predicting both outcomes. Specifically, the findings indicated that individuals experiencing high PCV and high economic necessity did not decrease their organizational commitment like their counterparts who endorsed lower economic necessity. They did, however, experience significantly decreased trust in their employer. The findings suggest that individuals who are forced to sell their labor power and obtain what they need through the market are more likely to continue to be exploited by their employer, as they have no other options than to continue the relationship. The importance of the findings is discussed, and recommendations for future research are provided.

  4. Énergie et environnement: l’exploitation des sables bitumineux en Alberta (Canada

    Directory of Open Access Journals (Sweden)

    Stéphane Héritier

    2007-09-01

    Full Text Available Découverts dans les années 1930, les secteurs de sables bitumineux (ou pétrolifères de l’Ouest canadien sont caractérisés par une intense exploitation, accélérée et stimulée depuis la décennie 1990, liée à l’explosion de la demande mondiale et aux prix élevés du baril de pétrole. Grâce à cette activité, l’Alberta est devenue l’une des provinces les plus dynamiques du Canada. L’exploitation, concédée à des entreprises pétrolières nationales et internationales, contribue à stimuler à la fois l’économie et la démographie de la province, où les revenus et les conditions économiques générales sont devenus particulièrement attractifs. Dans le même temps l’Alberta et le Canada se trouvent en situation délicate par rapport aux engagements internationaux, l’exploitation et la production du pétrole ayant des effets environnementaux importants tels que l’augmentation de la production de gaz à effets de serre, alors que les économies locales et régionales fondent leurs projets de croissance sur les revenus dégagés par cette exploitation.

  5. Ambidextrous Organizations: A Multiple-Level Study of Absorptive Capacity, Exploratory and Exploitative Innovation and Performance

    NARCIS (Netherlands)

    J.J.P. Jansen (Justin)

    2005-01-01

    textabstractBalancing and synchronizing exploration and exploitation is fundamental to the competitive success of firms in dynamic environments. Despite the importance of reconciling exploration and exploitation within organizations, however, relatively little empirical research has examined this

  6. Exploiting partial knowledge for efficient model analysis

    OpenAIRE

    Macedo, Nuno; Cunha, Alcino; Pessoa, Eduardo José Dias

    2017-01-01

    The advancement of constraint solvers and model checkers has enabled the effective analysis of high-level formal specification languages. However, these typically handle a specification in an opaque manner, amalgamating all its constraints in a single monolithic verification task, which often proves to be a performance bottleneck. This paper addresses this issue by proposing a solving strategy that exploits user-provided partial knowledge, namely by assigning symbolic bounds to the problem’s ...

  7. Characteristics of thermal-mineral waters in Backa region (Vojvodina) and their exploitation in spa tourism

    Energy Technology Data Exchange (ETDEWEB)

    Kosic, Kristina; Pivac, Tatjana; Romelic, Jovan; Lazic, Lazar; Stojanovic, Vladimir [Faculty of Science, Department of Geography, Tourism and Hotel Management, University of Novi Sad, Trg Dositeja Obradovica 3, 21000 Novi Sad (RS)

    2011-01-15

    Hydropower, biomass, biogas, biofuels, wind power, solar energy and geothermal energy are the major resources to provide Backa region with most of its. Backa extends between 45 16' and 46 22' of the northern latitude and 18 36' and 20 37' of the eastern longitude. It occupies the north-eastern part of Vojvodina, i.e. the most north-western part of the Republic of Serbia. That is historical-geographic territory bordered on the Danube on its western and eastern side, the Tisa on its eastern side and with the state border towards Hungary on the north. In this paper, the focus will be on renewable sources, specifically geothermal energy in Backa region. The paper analyzes the characteristics of thermal-mineral waters in Backa, the condition and possibilities of their exploitation in spa tourism, and in other economic branches. The tradition of thermo-mineral waters exploitation in spas and public baths is rather long. Today, this type of thermo-mineral waters exploitation in Backa is the widest spread. Permanent, i.e. continuous exploiters of thermal-mineral waters in Backa are primarily balneal-rehabilitation centres and exploiters using the water for technological purposes. (author)

  8. Target Localization with a Single Antenna via Directional Multipath Exploitation

    Directory of Open Access Journals (Sweden)

    Ali H. Muqaibel

    2015-01-01

    Full Text Available Target localization in urban sensing can benefit from angle dependency of the pulse shape at a radar receiver antenna. We propose a localization approach that utilizes the embedded directivity in ultra-wideband (UWB antennas to estimate target positions. A single radar unit sensing operation of indoor targets surrounded by interior walls is considered, where interior wall multipaths are exploited to provide target cross-range. This exploitation assumes resolvability of the multipath components, which is made possible by the virtue of using UWB radar signals. The proposed approach is most attractive when only few multipaths are detectable due to propagation obstructions or owing to low signal-to-noise ratios. Both simulated and experimental data are used to demonstrate the effectiveness of the proposed approach.

  9. Analysis Of Damage Arising From Exploitation Of The Aircraft

    Directory of Open Access Journals (Sweden)

    Woźny Piotr

    2014-12-01

    Full Text Available During exploitation, due to a variety of reasons, aircrafts are damaged or suffer from different failures. In the process of operation, using appropriate methods of diagnosis, failure, damage, and relative deregulation of individual elements or units can be detected. For this purpose, one can apply a number of indirect diagnostic methods with the use of recorded diagnostic signals or a direct diagnosis with the use of non-destructive methods. The proper identification of the technical condition allows to determine the causes of irregularities and take actions aimed at preventing their occurrence. The article presents the types of exploitation damage of a multi-purpose aircraft. In addition, the criteria for the division of damage and research methods of the causes of damage are presented. Furthermore, an analysis of the scope of activities to be performed during the research of causes of damage to the aircraft is made.

  10. Host exploitation strategies of the social parasite Maculinea alcon

    DEFF Research Database (Denmark)

    Fürst, Matthias Alois

    as model systems. These enable the study of adaptations and counter-adaptations that might evolve in the arms-race between a parasite pursuing maximum gain and a host trying to avoid exploitation. One such system is the socially parasitic butterfly Maculinea alcon and its host the ant Myrmica rubra....... Throughout the first instars M. alcon lives on a specific food plant, however, in the last instar before pupation it develops into an obligate social parasite, posing a considerably cost to its host ant colony. I here focus on the different exploitation strategies of M. alcon throughout its lifecycle...... a fitness cost to infected host ant colonies, the host ants are expected to have developed defense mechanisms in response to the presence of the social parasite. I was able to demonstrate that the efficiency of ant colonies to defend themselves against intruders depends on a multitude of often correlated...

  11. Hacking the Cell: Network Intrusion and Exploitation by Adenovirus E1A.

    Science.gov (United States)

    King, Cason R; Zhang, Ali; Tessier, Tanner M; Gameiro, Steven F; Mymryk, Joe S

    2018-05-01

    As obligate intracellular parasites, viruses are dependent on their infected hosts for survival. Consequently, viruses are under enormous selective pressure to utilize available cellular components and processes to their own advantage. As most, if not all, cellular activities are regulated at some level via protein interactions, host protein interaction networks are particularly vulnerable to viral exploitation. Indeed, viral proteins frequently target highly connected "hub" proteins to "hack" the cellular network, defining the molecular basis for viral control over the host. This widespread and successful strategy of network intrusion and exploitation has evolved convergently among numerous genetically distinct viruses as a result of the endless evolutionary arms race between pathogens and hosts. Here we examine the means by which a particularly well-connected viral hub protein, human adenovirus E1A, compromises and exploits the vulnerabilities of eukaryotic protein interaction networks. Importantly, these interactions identify critical regulatory hubs in the human proteome and help define the molecular basis of their function. Copyright © 2018 King et al.

  12. Sex trafficking and sexual exploitation in settings affected by armed conflicts in Africa, Asia and the Middle East: systematic review.

    Science.gov (United States)

    McAlpine, Alys; Hossain, Mazeda; Zimmerman, Cathy

    2016-12-28

    Sex trafficking and sexual exploitation has been widely reported, especially in conflict-affected settings, which appear to increase women's and children's vulnerabilities to these extreme abuses. We conducted a systematic search of ten databases and extensive grey literature to gather evidence of sex trafficking and sexual exploitation in conflict-affected settings. International definitions of "sexual exploitation" and "sex trafficking" set the indicator parameters. We focused on sexual exploitation in forms of early or forced marriage, forced combatant sexual exploitation and sexual slavery. We extracted prevalence measures, health outcomes and sexual exploitation terminology definitions. The review adhered to PRISMA guidelines and includes quality appraisal. The search identified 29 eligible papers with evidence of sex trafficking and sexual exploitation in armed conflict settings in twelve countries in Africa, Asia, and the Middle East. The evidence was limited and not generalizable, due to few prevalence estimates and inconsistent definitions of "sexual exploitation". The prevalence estimates available indicate that females were more likely than males to be victims of sexual exploitation in conflict settings. In some settings, as many as one in four forced marriages took place before the girls reached 18 years old. Findings suggest that the vast majority of former female combatants were sexually exploited during the conflict. These studies provided various indicators of sexual exploitation compatible to the United Nation's definition of sex trafficking, but only 2 studies identified the exploitation as trafficking. None of the studies solely aimed to measure the prevalence of sex trafficking or sexual exploitation. Similar descriptions of types of sexual exploitation and trafficking were found, but the inconsistent terminology or measurements inhibited a meta-analysis. Findings indicate there are various forms of human trafficking and sexual exploitation in

  13. Exploitation of Free Markets and Globalization to Finance Terrorists

    Science.gov (United States)

    2008-09-01

    is their capability to exploit the black market peso exchange or the international foreign exchange arbitrage . Under the scenario of a weak U.S...appears legitimate. By using intermediaries or legitimate businesses, the financial markets are wide open for terrorists to hedge funds and

  14. Amplifiers Exploiting Thermal Noise Canceling: A Review

    OpenAIRE

    Klumperink, Eric A.M.; Bruccoleri, Federico; Stroet, Peter; Nauta, Bram

    2004-01-01

    Wide-band LNAs suffer from a fundamental trade-off between noise figure NF and source impedance matching, which limits NF to values typically above 3dB. Recently, a feed-forward noise canceling technique has been proposed to break this trade-off. This paper reviews the principle of the technique and its key properties. Although the technique has been applied to wideband CMOS LNAs, it can just as well be implemented exploiting transconductance elements realized with oth...

  15. Guide d'exploitation des filières de traitement par boues activées

    OpenAIRE

    Boutin, C.; Caquel, O.; Dimastromatteo, N.,; Dumaine, J.,; Fernandes. G.,; Gervasi, C.; Parotin, S.; Prost Boucle, S.; Tscherter, C.

    2015-01-01

    / Ce guide, à destination des maîtres d'ouvrage et des exploitants, a pour objet de présenter de façon synthétique, les modalités d'exploitation courante d'une station d'épuration par boues activées de capacité < 600 kg DBO5/jour (soit 10 000 équivalents habitants (EH)), et dimensionnée dans le domaine de charge de l'aération prolongée (Cm < 0,1 kg DBO5 /kg MVS/jour). Conçu au fil de l'eau, il recense, tant pour la file eau que pour la file boues, l'ensemble des tâches d'exploitation courante...

  16. Sequential ambidexterity in practice : a longitudinal study on shifts from exploration to exploitation and reverse

    NARCIS (Netherlands)

    de Visser, Matthias; Faems, Dries; Visscher, Klaasjan; de Weerd-Nederhof, Petronella C.

    2017-01-01

    Many scholars have stressed the need for balancing exploitation with sufficient levels of exploration (Levinthal and March, 1993; March, 1991, 2006). Organizations that have a one-sided focus on exploitation by allocating resources to refinement of existing technologies rather than to developing new

  17. Exploiting wild relatives of S. lycopersicum for quality traits

    NARCIS (Netherlands)

    Víquez Zamora, A.M.

    2015-01-01

    Exploiting wild relatives of S. lycopersicum for quality traits Ana Marcela Víquez Zamora Tomatoes are consumed worldwide and became a model for crop plant research. A part of the research aims at expanding genetic diversity in tomato; this can be done by incorporating

  18. Bats track and exploit changes in insect pest populations

    Science.gov (United States)

    The role of bats or any generalist predator in suppressing prey populations depends on the predator’s ability to exploit available prey in space and time. Using a qPCR faecal DNA assay, we document significant association between numbers of Brazilian free-tailed bats (Tadarida brasiliensis) consumin...

  19. The Potential Socio-economic Impacts of Gas Hydrate Exploitation

    Science.gov (United States)

    Riley, David; Schaafsma, Marije; Marin-Moreno, Héctor; Minshull, Tim A.

    2017-04-01

    Gas hydrate has garnered significant interest as a possible clean fossil fuel resource, especially in countries with limited energy supplies. Whilst the sector is still in its infancy, there has been escalating development towards commercial production. To the best of our knowledge it appears that, despite its potential, existing analyses of the social and economic impacts of hydrate exploitation have been very limited. Before any viable commercial production commences, the potential impacts across society must be considered. It is likely that such impact assessments will become a legislative requirement for hydrate exploitation, similar to their requirement in conventional oil and gas projects. Social impact analysis should guide hydrate development to have the highest possible net benefits to the human and natural environment. Without active commercial hydrate operations, potential socio-economic impacts can only be inferred from other fossil fuel resource focused communities, including those directly or indirectly affected by the oil and gas industry either in the vicinity of the well or further afield. This review attempts to highlight potential impacts by synthesising current literature, focusing on social impacts at the extraction stage of operation, over time. Using a DPSIR (Driving forces; Pressures; States; Impacts; Responses) framework, we focus on impacts upon: health and wellbeing, land use and access, services and infrastructure, population, employment opportunities, income and lifestyles. Human populations directly or indirectly related with fossil fuel extraction activities often show boom and bust dynamics, and so any impacts may be finite or change temporally. Therefore potential impacts have to be reassessed throughout the lifetime of the exploitation. Our review shows there are a wide range of possible positive and negative socio-economic impacts from hydrate development. Exploitation can bring jobs and infrastructure to remote areas, although

  20. An automated data exploitation system for airborne sensors

    Science.gov (United States)

    Chen, Hai-Wen; McGurr, Mike

    2014-06-01

    Advanced wide area persistent surveillance (WAPS) sensor systems on manned or unmanned airborne vehicles are essential for wide-area urban security monitoring in order to protect our people and our warfighter from terrorist attacks. Currently, human (imagery) analysts process huge data collections from full motion video (FMV) for data exploitation and analysis (real-time and forensic), providing slow and inaccurate results. An Automated Data Exploitation System (ADES) is urgently needed. In this paper, we present a recently developed ADES for airborne vehicles under heavy urban background clutter conditions. This system includes four processes: (1) fast image registration, stabilization, and mosaicking; (2) advanced non-linear morphological moving target detection; (3) robust multiple target (vehicles, dismounts, and human) tracking (up to 100 target tracks); and (4) moving or static target/object recognition (super-resolution). Test results with real FMV data indicate that our ADES can reliably detect, track, and recognize multiple vehicles under heavy urban background clutters. Furthermore, our example shows that ADES as a baseline platform can provide capability for vehicle abnormal behavior detection to help imagery analysts quickly trace down potential threats and crimes.

  1. The age of exploration and exploitation: Younger-looking leaders endorsed for change and older-looking leaders endorsed for stability

    NARCIS (Netherlands)

    Spisak, B.R.; Grabo, A.E.; Arvey, R.D.; van Vugt, M.

    2014-01-01

    The current contribution extends theorizing on leadership and the exploration-exploitation dilemma using an evolutionary perspective. A theoretical connection is made between the exploration-exploitation dilemma and age-biased leadership preferences for exploratory change versus stable exploitation.

  2. Conflicts Related to Natural Resources Exploitation: A Case Study of ...

    African Journals Online (AJOL)

    Conflicts Related to Natural Resources Exploitation: A Case Study of Oil Crisis in Nigeria's Niger Delta Region and its Socio-Political and Economic Implications. ... on the environment leading to pollution of land, rivers, creeks and waterways.

  3. Human Impact and Vegetation History on Salt Spring Exploitation (Halabutoaia - Tolici, Petricani, Neamt, Romania

    Directory of Open Access Journals (Sweden)

    Mihaela DANU

    2010-09-01

    Full Text Available Salt exploitation from the mineral spring of Halabutoaia - Tolici (Neamt, Romania is one of the earliest in Europe. Salt production is documented from the Early Neolithic to the end of Chalcolithic period (6000-3500 BC with an important stratigraphy of 8 m high. In 2008, a core drilling with a Russian auger in the salty swamp of the spring closed to archaeological site, was realized. Pollen analysis, study of non-pollen palynomorphs and sedimentary signal (geophysical measurements of magnetic susceptibility, suggest a very anthropic environment since the Early Neolithic. Salt exploitation, agriculture and pastoralism (presence of spores of coprophilous fungi are directly in connection with these variations. After this intense exploitation, the forest environment closes but the human impact is always perceptible.

  4. Sex workers perspectives on strategies to reduce sexual exploitation and HIV risk: a qualitative study in Tijuana, Mexico.

    Science.gov (United States)

    Goldenberg, Shira M; Engstrom, David; Rolon, Maria Luisa; Silverman, Jay G; Strathdee, Steffanie A

    2013-01-01

    Globally, female sex workers are a population at greatly elevated risk of HIV infection, and the reasons for and context of sex industry involvement have key implications for HIV risk and prevention. Evidence suggests that experiences of sexual exploitation (i.e., forced/coerced sex exchange) contribute to health-related harms. However, public health interventions that address HIV vulnerability and sexual exploitation are lacking. Therefore, the objective of this study was to elicit recommendations for interventions to prevent sexual exploitation and reduce HIV risk from current female sex workers with a history of sexual exploitation or youth sex work. From 2010-2011, we conducted in-depth interviews with sex workers (n = 31) in Tijuana, Mexico who reported having previously experienced sexual exploitation or youth sex work. Participants recommended that interventions aim to (1) reduce susceptibility to sexual exploitation by providing social support and peer-based education; (2) mitigate harms by improving access to HIV prevention resources and psychological support, and reducing gender-based violence; and (3) provide opportunities to exit the sex industry via vocational supports and improved access to effective drug treatment. Structural interventions incorporating these strategies are recommended to reduce susceptibility to sexual exploitation and enhance capacities to prevent HIV infection among marginalized women and girls in Mexico and across international settings.

  5. Preventing Exploits Against Software of Uncertain Provenance (PEASOUP)

    Science.gov (United States)

    2015-05-01

    two common synchronization idioms: conditional variables (e.g., pthread_cond_wait()) and semaphores that count up and are used for signaling...delay prior to certain synchronization operations. The operations include thread creation, the first lock of each mutex (or decrement of a semaphore ...permissions are shared by all threads in the same process. • Synchronization Primitives . To exploit the race condition, two attacker-controlled

  6. On Roof Geometry for Urban Wind Energy Exploitation in High-Rise Buildings

    Directory of Open Access Journals (Sweden)

    Francisco Toja-Silva

    2015-06-01

    Full Text Available The European program HORIZON2020 aims to have 20% of electricity produced by renewable sources. The building sector represents 40% of the European Union energy consumption. Reducing energy consumption in buildings is therefore a priority for energy efficiency. The present investigation explores the most adequate roof shapes compatible with the placement of different types of small wind energy generators on high-rise buildings for urban wind energy exploitation. The wind flow around traditional state-of-the-art roof shapes is considered. In addition, the influence of the roof edge on the wind flow on high-rise buildings is analyzed. These geometries are investigated, both qualitatively and quantitatively, and the turbulence intensity threshold for horizontal axis wind turbines is considered. The most adequate shapes for wind energy exploitation are identified, studying vertical profiles of velocity, turbulent kinetic energy and turbulence intensity. Curved shapes are the most interesting building roof shapes from the wind energy exploitation point of view, leading to the highest speed-up and the lowest turbulence intensity.

  7. Swedish mines. Underground exploitation methods

    International Nuclear Information System (INIS)

    Paucard, A.

    1960-01-01

    Between 1949 and 1957, 10 engineers of the Mining research and exploitation department of the CEA visited 17 Swedish mines during 5 field trips. This paper presents a compilation of the information gathered during these field trips concerning the different underground mining techniques used in Swedish iron mines: mining with backfilling (Central Sweden and Boliden mines); mining without backfilling (mines of the polar circle area). The following techniques are described successively: pillar drawing and backfilled slices (Ammeberg, Falun, Garpenberg, Boliden group), sub-level pillar drawing (Grangesberg, Bloettberget, Haeksberg), empty room and sub-level pillar drawing (Bodas, Haksberg, Stripa, Bastkarn), storage chamber pillar drawing (Bodas, Haeksberg, Bastkarn), and pillar drawing by block caving (ldkerberget). Reprint of a paper published in Revue de l'Industrie Minerale, vol. 41, no. 12, 1959 [fr

  8. Exploitation et importance socio-économique du bambou de chine ...

    African Journals Online (AJOL)

    importante dans l'adaptation au changement climatique et le .... et de la nature du matériau remplacé par le bambou de chine. ... comprend quatre grandes phases: la production, l'exploitation, ..... https://www.researchgate.net/publication.

  9. Exploitation of unconventional protein sources in the feed of weaner ...

    African Journals Online (AJOL)

    Exploitation of unconventional protein sources in the feed of weaner rabbits ... as protein sources for feeding ruminants but rarely considered as feed for micro ... 26.88 g/100g DM in Centrosema pubescens and Moringa oleifera, respectively.

  10. Exploitation of labour: A study of Migrant labourers in West Bengal

    Directory of Open Access Journals (Sweden)

    Sribas Goswami

    2015-07-01

    Full Text Available Migrant workers, who constitute a major work force, in the unorganized sector, face various psychological stresses and arrive in an aggravated mental position due to their habit of using different varieties of intoxicants. The researcher’s attempt in this paper is to find out the connection of addiction- related stress and social disintegration of the migrant workers with the wide web of exploitation of labour through an empirical analysis. The intoxicants are the only medium for the migrants to leave the sufferings behind them for a time being. This paper highlights the push factors as the fabricated trap to exploit the migrants physically, socially and mentally for surplus production with cheap labour.

  11. Exploiting Patient Labour at Kew Cottages, Australia, 1887-1950

    Science.gov (United States)

    Monk, Lee-Ann

    2010-01-01

    This article examines the exploitation of patient labour at Kew Cottages, Australia's first purpose-built state institution for people with learning disabilities. Analysing historical evidence for the period 1887-1950 shows that unpaid patient labour contributed significantly to the economy of the Cottages and so to the government department of…

  12. Desiring TESOL and International Education: Market Abuse and Exploitation

    Science.gov (United States)

    Chowdhury, Raqib; Ha, Phan Le

    2014-01-01

    This book addresses how Western universities have constructed themselves as global providers of education, and are driven to be globally competitive. It examines how the term "international" has been exploited by the market in the form of government educational policies and agencies, host institutions, academia and the mass media. The…

  13. Beyond the Bravado: Sex Roles and the Exploitive Male.

    Science.gov (United States)

    Taubman, Stan

    1986-01-01

    Examines the tendency of men to engage in domestic violence and sexual exploitation and presents male sex-role acquisition as a process of psychosocial violence against young boys, which creates a sense of shame, powerlessness, self-alienation, isolation from others, and retaliatory rage and inhibits capacities for intimacy and mutuality.…

  14. Exploitation of low-temperature energy sources from cogeneration gas engines

    International Nuclear Information System (INIS)

    Caf, A.; Urbancl, D.; Trop, P.; Goricanec, D.

    2016-01-01

    This paper describes an original and innovative technical solution for exploiting low-temperature energy sources from cogeneration gas reciprocating engines installed within district heating systems. This solution is suitable for those systems in which the heat is generated by the use of reciprocating engines powered by gaseous fuel for combined heat and power production. This new technical solution utilizes low-temperature energy sources from a reciprocating gas engine which is used for a combined production of heat and power. During the operation of the cogeneration system low-temperature heat is released, which can be raised to as much as 85 °C with the use of a high-temperature heat-pump, thus enabling a high-temperature regime for heating commercial buildings, district heating or in industrial processes. In order to demonstrate the efficiency of utilizing low-temperature heat sources in the cogeneration system, an economic calculation is included which proves the effectiveness and rationality of integrating high-temperature heat-pumps into new or existing systems for combined heat and power production with reciprocating gas engines. - Highlights: • The use of low-temperature waste heat from the CHP is described. • Total energy efficiency of the CHP can be increased to more than 103.3%. • Low-temperature heat is exploited with high-temperature heat pump. • High-temperature heat pump allows temperature rise to up to 85 °C. • Exploitation of low-temperature waste heat increases the economics of the CHP.

  15. Exploiting Formation Flying for Fuel Saving Supersonic Oblique Wing Aircraft

    Science.gov (United States)

    2007-07-01

    used and developed during recent wing / winglet / morphing design programmes (Refs.13-14). By exploiting this method, we have assessed the aerodynamics ...parameters, Propulsion Issues, Size Issues, Aero-elastic effects 15. SUBJECT TERMS EOARD, Control System, Aerodynamics 16...

  16. Exploitation of Natural Resources and the Public Sector in Greenland

    DEFF Research Database (Denmark)

    Nielsen, Søren Bo

    This paper considers the role of the public sector in future exploitation of non-renewable resources, especially minerals, in Greenland. The focus is on fiscal sustainability, principles for public sector involvement and the form of government take from mining activities. At present, the public...... budget in Greenland is nearly in balance, but at unchanged policies and standards public expenditures relative to GDP are bound to increase dramatically over the next decades due to population ageing. At the same time, the freezing of the block grant from Denmark implies a decrease in revenues relative...... to GDP. Hence, fiscal policy is quite far from being sustainable. Apart from a need for reforms, these facts also constrain the possible role of the public sector in future resource exploitation. In any case, the government should preferably adhere to strict principles when developing the mineral sector...

  17. Immaterial Boys? A Large-Scale Exploration of Gender-Based Differences in Child Sexual Exploitation Service Users.

    Science.gov (United States)

    Cockbain, Ella; Ashby, Matthew; Brayley, Helen

    2017-10-01

    Child sexual exploitation is increasingly recognized nationally and internationally as a pressing child protection, crime prevention, and public health issue. In the United Kingdom, for example, a recent series of high-profile cases has fueled pressure on policy makers and practitioners to improve responses. Yet, prevailing discourse, research, and interventions around child sexual exploitation have focused overwhelmingly on female victims. This study was designed to help redress fundamental knowledge gaps around boys affected by sexual exploitation. This was achieved through rigorous quantitative analysis of individual-level data for 9,042 users of child sexual exploitation services in the United Kingdom. One third of the sample were boys, and gender was associated with statistically significant differences on many variables. The results of this exploratory study highlight the need for further targeted research and more nuanced and inclusive counter-strategies.

  18. Heisenberg's heirs exploit loopholes in his law

    International Nuclear Information System (INIS)

    Taubes, G.

    1994-01-01

    This article describes research into Heisenberg's Uncertainty Principle. Loopholes in the principle have led to a series of experiments using sophisticated optical techniques to extract information from a quantum system without disturbing the variable being measured. The experiments are based on a technique called back-action evasion, which exploits the possibility of channeling all the uncertainty generated by measuring one quantum variable (e.g. laser beam intensity) onto a related variable known as the conjugate observable (beam phase). These experiments and others are described

  19. Enhanced surrogate models for statistical design exploiting space mapping technology

    DEFF Research Database (Denmark)

    Koziel, Slawek; Bandler, John W.; Mohamed, Achmed S.

    2005-01-01

    We present advances in microwave and RF device modeling exploiting Space Mapping (SM) technology. We propose new SM modeling formulations utilizing input mappings, output mappings, frequency scaling and quadratic approximations. Our aim is to enhance circuit models for statistical analysis...

  20. Organizational Ambidexterity : Balancing Exploitation and Exploration in Organizations

    OpenAIRE

    Yigit, Mert

    2013-01-01

    Purpose: This paper aims to investigate necessity of ambidexterity for organizations. The main interest of this thesis is to investigate why organizations should be ambidextrous and how organizations can reach ambidexterity under the pressure of limited resources and competitive market condition. Findings: This thesis explored relations and tensions between exploitation and exploration in organizational and individual aspects. Findings in the research show that communication skill of the subu...

  1. Exploiting GPUs in Virtual Machine for BioCloud

    OpenAIRE

    Jo, Heeseung; Jeong, Jinkyu; Lee, Myoungho; Choi, Dong Hoon

    2013-01-01

    Recently, biological applications start to be reimplemented into the applications which exploit many cores of GPUs for better computation performance. Therefore, by providing virtualized GPUs to VMs in cloud computing environment, many biological applications will willingly move into cloud environment to enhance their computation performance and utilize infinite cloud computing resource while reducing expenses for computations. In this paper, we propose a BioCloud system architecture that ena...

  2. Sex workers perspectives on strategies to reduce sexual exploitation and HIV risk: a qualitative study in Tijuana, Mexico.

    Directory of Open Access Journals (Sweden)

    Shira M Goldenberg

    Full Text Available Globally, female sex workers are a population at greatly elevated risk of HIV infection, and the reasons for and context of sex industry involvement have key implications for HIV risk and prevention. Evidence suggests that experiences of sexual exploitation (i.e., forced/coerced sex exchange contribute to health-related harms. However, public health interventions that address HIV vulnerability and sexual exploitation are lacking. Therefore, the objective of this study was to elicit recommendations for interventions to prevent sexual exploitation and reduce HIV risk from current female sex workers with a history of sexual exploitation or youth sex work. From 2010-2011, we conducted in-depth interviews with sex workers (n = 31 in Tijuana, Mexico who reported having previously experienced sexual exploitation or youth sex work. Participants recommended that interventions aim to (1 reduce susceptibility to sexual exploitation by providing social support and peer-based education; (2 mitigate harms by improving access to HIV prevention resources and psychological support, and reducing gender-based violence; and (3 provide opportunities to exit the sex industry via vocational supports and improved access to effective drug treatment. Structural interventions incorporating these strategies are recommended to reduce susceptibility to sexual exploitation and enhance capacities to prevent HIV infection among marginalized women and girls in Mexico and across international settings.

  3. Noise-exploitation and adaptation in neuromorphic sensors

    Science.gov (United States)

    Hindo, Thamira; Chakrabartty, Shantanu

    2012-04-01

    Even though current micro-nano fabrication technology has reached integration levels where ultra-sensitive sensors can be fabricated, the sensing performance (resolution per joule) of synthetic systems are still orders of magnitude inferior to those observed in neurobiology. For example, the filiform hairs in crickets operate at fundamental limits of noise; auditory sensors in a parasitoid fly can overcome fundamental limitations to precisely localize ultra-faint acoustic signatures. Even though many of these biological marvels have served as inspiration for different types of neuromorphic sensors, the main focus these designs have been to faithfully replicate the biological functionalities, without considering the constructive role of "noise". In man-made sensors device and sensor noise are typically considered as a nuisance, where as in neurobiology "noise" has been shown to be a computational aid that enables biology to sense and operate at fundamental limits of energy efficiency and performance. In this paper, we describe some of the important noise-exploitation and adaptation principles observed in neurobiology and how they can be systematically used for designing neuromorphic sensors. Our focus will be on two types of noise-exploitation principles, namely, (a) stochastic resonance; and (b) noise-shaping, which are unified within our previously reported framework called Σ▵ learning. As a case-study, we describe the application of Σ▵ learning for the design of a miniature acoustic source localizer whose performance matches that of its biological counterpart(Ormia Ochracea).

  4. ROUNDTABLE - SESSION 2 EXPLOITATION, CONSERVATION AND LEGISLATION

    Directory of Open Access Journals (Sweden)

    EDSMAN L.

    2004-01-01

    Full Text Available The link between socioeconomics and conservation and the role of legislation in conservation work was discussed in the group with participants from nine European countries. Interest and knowledge among the general public, stakeholders and managers is the key to successful conservation of native crayfish species. Exploitation and conservation do not necessarily exclude each other. A controlled fishery, where it can be sustained, may be an essential tool for conservation by increasing the general awareness and involving more people in the task of protecting the native crayfish species. This strategy is mainly possible for the noble crayfish in the northern part of its distribution, where strong traditions connected to crayfish also exist. A balance between utilisation and overexploitation has to be found and local guidelines for sustainable exploitation produced. Media, the Internet and educational material aimed at schools and stakeholders are excellent ways of reaching a wide audience with information. Universal objectives, rules and regulations at the European level are desirable and the noble crayfish and the stone crayfish should be included in Annex II of the Habitat Directive. Based on this framework detailed regulations are best worked out at the national level, considering the specific crayfish situation in the country. Information about the legislation, the purpose of the legislation and the consequences when not obeying it should be distributed. Stricter regulation of the trade with live alien crayfish is vital because of the associated risk of introducing new diseases and species.

  5. Large size space construction for space exploitation

    Science.gov (United States)

    Kondyurin, Alexey

    2016-07-01

    Space exploitation is impossible without large space structures. We need to make sufficient large volume of pressurized protecting frames for crew, passengers, space processing equipment, & etc. We have to be unlimited in space. Now the size and mass of space constructions are limited by possibility of a launch vehicle. It limits our future in exploitation of space by humans and in development of space industry. Large-size space construction can be made with using of the curing technology of the fibers-filled composites and a reactionable matrix applied directly in free space. For curing the fabric impregnated with a liquid matrix (prepreg) is prepared in terrestrial conditions and shipped in a container to orbit. In due time the prepreg is unfolded by inflating. After polymerization reaction, the durable construction can be fitted out with air, apparatus and life support systems. Our experimental studies of the curing processes in the simulated free space environment showed that the curing of composite in free space is possible. The large-size space construction can be developed. A project of space station, Moon base, Mars base, mining station, interplanet space ship, telecommunication station, space observatory, space factory, antenna dish, radiation shield, solar sail is proposed and overviewed. The study was supported by Humboldt Foundation, ESA (contract 17083/03/NL/SFe), NASA program of the stratospheric balloons and RFBR grants (05-08-18277, 12-08-00970 and 14-08-96011).

  6. Widespread exploitation of the honeybee by early Neolithic farmers.

    Science.gov (United States)

    Roffet-Salque, Mélanie; Regert, Martine; Evershed, Richard P; Outram, Alan K; Cramp, Lucy J E; Decavallas, Orestes; Dunne, Julie; Gerbault, Pascale; Mileto, Simona; Mirabaud, Sigrid; Pääkkönen, Mirva; Smyth, Jessica; Šoberl, Lucija; Whelton, Helen L; Alday-Ruiz, Alfonso; Asplund, Henrik; Bartkowiak, Marta; Bayer-Niemeier, Eva; Belhouchet, Lotfi; Bernardini, Federico; Budja, Mihael; Cooney, Gabriel; Cubas, Miriam; Danaher, Ed M; Diniz, Mariana; Domboróczki, László; Fabbri, Cristina; González-Urquijo, Jesus E; Guilaine, Jean; Hachi, Slimane; Hartwell, Barrie N; Hofmann, Daniela; Hohle, Isabel; Ibáñez, Juan J; Karul, Necmi; Kherbouche, Farid; Kiely, Jacinta; Kotsakis, Kostas; Lueth, Friedrich; Mallory, James P; Manen, Claire; Marciniak, Arkadiusz; Maurice-Chabard, Brigitte; Mc Gonigle, Martin A; Mulazzani, Simone; Özdoğan, Mehmet; Perić, Olga S; Perić, Slaviša R; Petrasch, Jörg; Pétrequin, Anne-Marie; Pétrequin, Pierre; Poensgen, Ulrike; Pollard, C Joshua; Poplin, François; Radi, Giovanna; Stadler, Peter; Stäuble, Harald; Tasić, Nenad; Urem-Kotsou, Dushka; Vuković, Jasna B; Walsh, Fintan; Whittle, Alasdair; Wolfram, Sabine; Zapata-Peña, Lydia; Zoughlami, Jamel

    2015-11-12

    The pressures on honeybee (Apis mellifera) populations, resulting from threats by modern pesticides, parasites, predators and diseases, have raised awareness of the economic importance and critical role this insect plays in agricultural societies across the globe. However, the association of humans with A. mellifera predates post-industrial-revolution agriculture, as evidenced by the widespread presence of ancient Egyptian bee iconography dating to the Old Kingdom (approximately 2400 BC). There are also indications of Stone Age people harvesting bee products; for example, honey hunting is interpreted from rock art in a prehistoric Holocene context and a beeswax find in a pre-agriculturalist site. However, when and where the regular association of A. mellifera with agriculturalists emerged is unknown. One of the major products of A. mellifera is beeswax, which is composed of a complex suite of lipids including n-alkanes, n-alkanoic acids and fatty acyl wax esters. The composition is highly constant as it is determined genetically through the insect's biochemistry. Thus, the chemical 'fingerprint' of beeswax provides a reliable basis for detecting this commodity in organic residues preserved at archaeological sites, which we now use to trace the exploitation by humans of A. mellifera temporally and spatially. Here we present secure identifications of beeswax in lipid residues preserved in pottery vessels of Neolithic Old World farmers. The geographical range of bee product exploitation is traced in Neolithic Europe, the Near East and North Africa, providing the palaeoecological range of honeybees during prehistory. Temporally, we demonstrate that bee products were exploited continuously, and probably extensively in some regions, at least from the seventh millennium cal BC, likely fulfilling a variety of technological and cultural functions. The close association of A. mellifera with Neolithic farming communities dates to the early onset of agriculture and may provide

  7. Exploiting Elementary Landscapes for TSP, Vehicle Routing and Scheduling

    Science.gov (United States)

    2015-09-03

    similar mathematical foundation to enable gradient descent methods for discrete combinatorial optimization problems. We are also generalizing our prior...research has exploited statistical and mathematical properties of elementary landscapes to develop new gradient methods for combinatorial optimization... mathematically methods to more automatically identify elementary landscapes. If a combinatorial optimization problem is a superposition of elemen

  8. Influence on exploitation and processing of coal on vital environment in Kostolac coal basin (Yugoslavia)

    International Nuclear Information System (INIS)

    Miletic, Radisa; Milenkovic, Milutin; Milosevic, Vesna

    1997-01-01

    Fast development of industry, makes need of electrical energy bigger and bigger, intensiving exploitation and modification of coal, which constantly imperilment live environment. This paper has purpose to show of the possible reflection on warning and live environment by analysing the factors of exploitation and modification of coal in Kostolac basin in Yugoslavia. (Author)

  9. Sequential ambidexterity in practice : a longitudinal study on shifts from exploration to exploitation and vice versa

    NARCIS (Netherlands)

    de Visser, Matthias; Faems, Dries; Visscher, Klaasjan; de Weerd-Nederhof, Petronella C.

    2017-01-01

    Many scholars have stressed the need for balancing exploitation with sufficient levels of exploration (Levinthal and March, 1993; March, 1991, 2006). Organizations that have a one-sided focus on exploitation by allocating resources to refinement of existing technologies rather than to developing new

  10. The environmental impacts of foamed concrete production and exploitation

    Science.gov (United States)

    Namsone, E.; Korjakins, A.; Sahmenko, G.; Sinka, M.

    2017-10-01

    This paper presents a study focusing on the environmental impacts of foamed concrete production and exploitation. CO2 emissions are very important factor for describing durability and sustainability of any building material and its life cycle. The building sector is one of the largest energy-consuming sectors in the world. In this study CO2 emissions are evaluated with regard to three types of energy resources (gas, coal and eco-friendly fuel). The related savings on raw materials are up to 120 t of water per 1000 t of traditionally mixed foamed concrete and up to 350 t of sand per 1000 t of foamed concrete produced with intensive mixing technology. In addition, total reduction of CO2 emissions (up to 60 t per 1000 m3 of material) and total energy saving from introduction of foamed concrete production (depending on the type of fuel) were calculated. In order to analyze the conditions of exploitation, both thermal conductivity and thickness of wall was determined. All obtained and calculated results were compared to those of the commercially produced autoclaved aerated concrete.

  11. Current state of exploitation of low enthalpy geothermal energy in France

    International Nuclear Information System (INIS)

    Boisdet, A.; Fouillac, C.; Jaudin, F.; Menjoz, A.; Rojas, J.; Ferrandes, R.; Lemale, J.

    1990-01-01

    This paper reports that at present, the geothermal exploitation in France is characterized by sixty plants using geothermal energy for direct heat in district heating. Drilling and connection to networks occurred mainly during the years 1980-1985. From 1985 to 1990, the research efforts have been focused on detailed reservoir knowledge, corrosion-scaling process induced by the fluid composition, methods and techniques for maintenance, rehabilitation of some wells and equipments after work over. Concentrated in two main area, the Paris and Aquitaine basins, the French geothermal potential is large. The improved knowledge obtained during the last five years spared to the valorization of existing plants will allow a new start of geothermal exploitation. Nevertheless this latter is highly dependent on the international energy context

  12. Six scenarios of exploiting an ontology based, mobilized learning environment

    NARCIS (Netherlands)

    Kismihók, G.; Szabó, I.; Vas, R.

    2012-01-01

    In this article, six different exploitation possibilities of an educational ontology based, mobilized learning management system are presented. The focal point of this system is the educational ontology model. The first version of this educational ontology model serves as a foundation for curriculum

  13. 77 FR 36491 - Request for Information Regarding Senior Financial Exploitation

    Science.gov (United States)

    2012-06-19

    ... BUREAU OF CONSUMER FINANCIAL PROTECTION [Docket CFPB-2012-0018] Request for Information Regarding Senior Financial Exploitation AGENCY: Bureau of Consumer Financial Protection. ACTION: Request for Information. SUMMARY: Section 1013(g)(1) of the Dodd-Frank Wall Street Reform and Consumer Protection Act of...

  14. Toward a dynamic perspective on explorative and exploitative innovation activities: a longitudinal study of innovation in the wind blade industry

    NARCIS (Netherlands)

    de Visser, Matthias

    2010-01-01

    Innovation requires a combination of explorative and exploitative innovation activities. Previous studies have provided valuable insights in the antecedents of investing in explorative and exploitative activities, the structural governance of exploration and exploitation and the performance

  15. Toward a dynamic perspective on explorative and exploitative innovation activities: A longitudinal study of innovation in the wind blade industry

    NARCIS (Netherlands)

    de Visser, Matthias; Faems, D.L.M.

    2010-01-01

    Innovation requires a combination of explorative and exploitative innovation activities. Previous studies have provided valuable insights in the antecedents of investing in explorative and exploitative activities, the structural governance of exploration and exploitation and the performance

  16. Gas exploitation and gas conversion; Gassutnyttelse og gasskonvertering

    Energy Technology Data Exchange (ETDEWEB)

    Laading, Gjert

    1998-07-01

    This presentation deals with some of the challenges and possibilities connected with ''stranded'' gas. These are offshore gas reserves, especially associated gas, that is not connected with the market and that cannot be piped onshore, and where reinjection is not profitable, and where flaring off is not an option. There is increasing interest all over the world to find economical and environmentally friendly solutions to this problem. A good solution will render such fields economically developable and will to a high degree increase the total volume of the world's exploitable gas reserves. Since synthesis gas is a dominating cost element in most chemical conversion processes for gas, the synthesis gases are discussed in some detail. There is also a discussion of the conversion of the gas to Methanol, Synthetic oil (Syncrude and Synfuels) and to DME (Di-methyl-ether). Two methods for gas transport from the field are discussed; LNG on floating production storage and off loading (FPSO), and Gas hydrates. Principles, limitations and conditions for placing those processes on a FPSO. Finally, the presentation discusses the most important economic factors related to the exploitation of offshore gas, and suggests some possibilities for future development.11 figs.

  17. Summary of radiation protection in exploitation

    International Nuclear Information System (INIS)

    Garcier, Yves; Guers, Rene; Bidard, Francoise; Colson, Philippe; Gonin, Michele; Delabre, Herve; Hemidy, Pierre-Yves; Corgnet, Bruno; Perrin, Marie-Claire; Phan Hoang, Long; Abela, Gonzague; Crepieux, Virginie; Guyot, Pierre; Haranger, Didier; Warembourg, Philippe

    2004-01-01

    This document proposes a large and detailed overview of notions and practices regarding radiation protection in relationship with an NPP exploitation framework. It presents the main notions: matter structure, radioactivity, interactions between matter and radiations, types of ionizing radiation, magnitudes and measurement units, exposure modes, main principles of radiation protection, means of protection against internal and external exposures. The second part proposes an overview of the origin of radiological risks in a nuclear power plant. This origin can be found in fission products, activation products, actinides, designed protections, or circuit contaminations. These radiological risks are more precisely identified and described in terms of detection and prevention (internal exposure risk, contamination risk, iodine-related risk, alpha radiation-related risk, access to the reactor building). The next part addresses the medical and radiological follow-up of exposed workers by a special medical control, by an individual exposure control, by a specific control of female personnel, and by attention to exceptional exposures. Measurement means are presented (detection principles, installation continuous control, workspaces control, personnel contamination control, follow-up of individual dose) as well as collective and individual protection means. The management of radiation protection is addressed through a presentation of decision and management structures for radiation protection, and of EDF objectives and ambitions in this domain. The organization of radiation protection during exploitation is described: responsibilities for radiation protection in a nuclear power station, requirements for workers, preparation of interventions in controlled zone, work execution in controlled zone, zone controls and radiological cleanness of installations. The two last chapters address issues and practices of radiation protection in the case of deconstruction or dismantling, and

  18. Life history traits and exploitation affect the spatial mean-variance relationship in fish abundance.

    Science.gov (United States)

    Kuo, Ting-chun; Mandal, Sandip; Yamauchi, Atsushi; Hsieh, Chih-hao

    2016-05-01

    Fishing is expected to alter the spatial heterogeneity of fishes. As an effective index to quantify spatial heterogeneity, the exponent b in Taylor's power law (V = aMb) measures how spatial variance (V) varies with changes in mean abundance (M) of a population, with larger b indicating higher spatial aggregation potential (i.e., more heterogeneity). Theory predicts b is related with life history traits, but empirical evidence is lacking. Using 50-yr spatiotemporal data from the California Current Ecosystem, we examined fishing and life history effects on Taylor's exponent by comparing spatial distributions of exploited and unexploited fishes living in the same environment. We found that unexploited species with smaller size and generation time exhibit larger b, supporting theoretical prediction. In contrast, this relationship in exploited species is much weaker, as the exponents of large exploited species were higher than unexploited species with similar traits. Our results suggest that fishing may increase spatial aggregation potential of a species, likely through degrading their size/age structure. Results of moving-window cross-correlation analyses on b vs. age structure indices (mean age and age evenness) for some exploited species corroborate our findings. Furthermore, through linking our findings to other fundamental ecological patterns (occupancy-abundance and size-abundance relationships), we provide theoretical arguments for the usefulness of monitoring the exponent b for management purposes. We propose that age/size-truncated species might have lower recovery rate in spatial occupancy, and the spatial variance-mass relationship of a species might be non-linear. Our findings provide theoretical basis explaining why fishery management strategy should be concerned with changes to the age and spatial structure of exploited fishes.

  19. Impacts d’un changement de politiques énergétiques sur les exploitations irriguées : éclairage sur la base d’un échantillon d’exploitations dans le Saiss (Maroc

    Directory of Open Access Journals (Sweden)

    Imane Rais

    2016-10-01

    Full Text Available Au Maroc, le gaz butane est fortement subventionné pour son usage domestique, et est devenu depuis une dizaine d’années une des sources principales d’énergie utilisées pour le pompage de l’eau souterraine dans les exploitations agricoles. Du fait de son coût élevé pour les finances publiques, il est envisagé un arrêt de cette subvention, couplé à une éventuelle subvention à l’investissement en énergie solaire. La présente étude analyse l’impact de scénarios d’évolutions des politiques énergétiques nationales sur des exploitations irrigantes. Ces évolutions possibles de type d’énergie utilisé sont analysées à la fois en termes de rentabilité et selon le point de vue de l’exploitant lui-même. Un ensemble de 18 exploitations, utilisant 4 différents types d’énergie (gasoil, butane, électrique, photovoltaïque, ont été enquêtées dans la plaine du Saiss. Trois scénarios ont été établis : 1 un arrêt de la subvention au butane ; 2 un arrêt de la subvention couplé à une subvention à l’investissement dans l’énergie solaire ; et 3 un arrêt de la subvention butane couplé à une subvention à l’investissement dans l’énergie électrique. Les résultats montrent que, en cas d’arrêt de la subvention sur le butane, la moitié des exploitants utilisant le butane lors de l’étude envisagent de revenir au gasoil. En cas de subvention de 50% des coûts d’installation de l’énergie photovoltaïque, trois quarts des agriculteurs utilisant le butane ou le gasoil changeraient de système. Seule la moitié des exploitations en butane ou gasoil serait intéressée par un passage à l’électrique, même dans le cas d’une forte subvention à l’investissement. La transition vers le photovoltaïque, préférée par les agriculteurs utilisant le butane ou le gasoil, ne sera pas cependant qu’une question de taux de subvention, du fait notamment d’un fort besoin d’appui technique pour

  20. Cyber Child Sexual Exploitation dalam Perspektif Perlindungan atas Kejahatan Siber

    Directory of Open Access Journals (Sweden)

    Go Lisanawati

    2013-04-01

    Full Text Available Perkembangan teknologi, yang diwujudkan dengan adanya inovasi berupa Internet, yang semakin pesat menempatkan semua pihak berada pada sebuah posisi yang rentan. Kerentanan tersebut dapat berupa tereksploitasinya orang menjadi korban maupun pelaku kejahatan. Teknologi menjadi pedang bermata dua dengan segala kelebihan dan eksplorasi serta eksploitasi atas kelemahan atas pemanfaatan teknologi tersebut oleh orang-orang yang tidak bertanggungjawab. Pada posisi yang sama, anak menjadi korban yang sangat potensial atas penyalahgunaan teknologi, khususnya atas eksploitasi seksual yang dapat meliputi pornografi anak, perdagangan anak, dan child sex tourism. Indonesia memang telah memiliki berbagai perangkat aturan hukum yang dipergunakan untuk memberikan perlindungan kepada anak, termasuk juga di dalamnya adalah perangkat hukum di bidang telematika. Namun demikian belum semua perangkat hukum tersebut dapat dipergunakan secara maksimal untuk mewujudkan perlindungan hukum bagi anak. The rapid development of technology through Internet nowadays has been put all parties in the vulnerable position. The vulnerable form which may appear is the possibility of the exploited parties to be victims and/or the offender of crime. Technology itself brings not only advancement but also the weaknesses which may be explored and exploited by the irresponsible people by doing such a crime. In the same position, children are potentially to be the very vulnerable victims of the misuse of the technology, especially sexual exploitation which including child pornography, child trafficking, and also child sex tourism. Indonesia is already having such kind of law to give protection to children, including also the law related to telematics matter. But not each law could maximize yet implemented to give the law protection for child.

  1. Exploration and exploitation of Victorian science in Darwin's reading notebooks.

    Science.gov (United States)

    Murdock, Jaimie; Allen, Colin; DeDeo, Simon

    2017-02-01

    Search in an environment with an uncertain distribution of resources involves a trade-off between exploitation of past discoveries and further exploration. This extends to information foraging, where a knowledge-seeker shifts between reading in depth and studying new domains. To study this decision-making process, we examine the reading choices made by one of the most celebrated scientists of the modern era: Charles Darwin. From the full-text of books listed in his chronologically-organized reading journals, we generate topic models to quantify his local (text-to-text) and global (text-to-past) reading decisions using Kullback-Liebler Divergence, a cognitively-validated, information-theoretic measure of relative surprise. Rather than a pattern of surprise-minimization, corresponding to a pure exploitation strategy, Darwin's behavior shifts from early exploitation to later exploration, seeking unusually high levels of cognitive surprise relative to previous eras. These shifts, detected by an unsupervised Bayesian model, correlate with major intellectual epochs of his career as identified both by qualitative scholarship and Darwin's own self-commentary. Our methods allow us to compare his consumption of texts with their publication order. We find Darwin's consumption more exploratory than the culture's production, suggesting that underneath gradual societal changes are the explorations of individual synthesis and discovery. Our quantitative methods advance the study of cognitive search through a framework for testing interactions between individual and collective behavior and between short- and long-term consumption choices. This novel application of topic modeling to characterize individual reading complements widespread studies of collective scientific behavior. Copyright © 2016 Elsevier B.V. All rights reserved.

  2. The strv 1 microsatellite semes: Exploiting the geosynchronous transfer orbit

    Science.gov (United States)

    Blott, R. J.; Wells, N. S.; Eves, J.

    Following 3 successful years in orbit, the UK Defence Evaluation and Research Agency's two Space Technology Research Vehicle microsatellites (STRV) 1 a&b will be followed by a second mission. STRV 1 c&d are now in construction for a planned launch in 1999. The new mission, which includes 22 experimental payloads and developmental spacecraft bus technologies from European, US and Canadian military, civil and commercial sponsors, exploits the Geosynchronous Transfer Orbit (GTO) to offer an affordable, working space research tool for both government and industry. The STRV 1 programme objective is to promote the enhancement of military and civil space communications, remote sensing and navigation capabilities at reduced cost and risk. Additional aims are to help industry to achieve commercial benefit from investment in emerging technologies and to develop the synergy between government, commercial and civilian space applications. The paper explains how STRV 1 exploits the variable altitude and high radiation environment of GTO to investigate the performance of emerging technologies and techniques. This includes the accelerated life testing of components and materials, such as infra-red detectors, advanced microprocessors and solar cell technologies, and the prototyping of new techniques to improve communications and spacecraft autonomy. Experiments include implementing a secure version of the Consultative Committee for Space Data Systems (CCSDS) packet telecommand and telemetry standards, further development of the Internet-based Space Communication Protocol Standards (SCPS) and evaluating the exploitation of the Global Positioning System (GPS) in geosynchronous orbit. The new mission also builds on and extends the comprehensive environmental monitoring achieved by STRV 1 a&b.

  3. An ethnomethodological approach to examine exploitation in the context of capacity, trust and experience of commercial surrogacy in India

    Science.gov (United States)

    2013-01-01

    The socio-ethical concerns regarding exploitation in commercial surrogacy are premised on asymmetric vulnerability and the commercialization of women’s reproductive capacity to suit individualistic motives. In examining the exploitation argument, this article reviews the social contract theory that describes an individual as an ‘economic man’ with moral and/or political motivations to satisfy individual desires. This study considers the critique by feminists, who argue that patriarchal and medical control prevails in the surrogacy contracts. It also explores the exploitative dynamics amongst actors in the light of Baier’s conceptualization of trust and human relationship, within which both justice and exploitation thrive, and Foucault’s concept of bio-power. Drawing on these concepts, this paper aims to investigate the manifestations of exploitation in commercial surrogacy in the context of trust, power and experiences of actors, using a case study of one clinic in India. The actors’ experiences are evaluated at different stages of the surrogacy process: recruitment, medical procedures, living in the surrogate home, bonding with the child and amongst actors, financial dealings, relinquishment and post-relinquishment. This study applies ethnomethodology to identify phenomena as perceived by the actors in a situation, giving importance to their interpretations of the rules that make collective activity possible. The methods include semi-structured interviews, discussions, participant observation and explanation of the phenomena from the actors’ perspectives. Between August 2009 and April 2010, 13 surrogate mothers (SMs), 4 intended parents (IPs) and 2 medical practitioners (MPs) from one clinic in Western India were interviewed. This study reveals that asymmetries of capacity amongst the MPs, SMs, IPs and surrogate agents (SAs) lead to a network of trust and designation of powers through rules, bringing out the relevance of Baier’s conceptualization

  4. An ethnomethodological approach to examine exploitation in the context of capacity, trust and experience of commercial surrogacy in India.

    Science.gov (United States)

    Saravanan, Sheela

    2013-08-20

    The socio-ethical concerns regarding exploitation in commercial surrogacy are premised on asymmetric vulnerability and the commercialization of women's reproductive capacity to suit individualistic motives. In examining the exploitation argument, this article reviews the social contract theory that describes an individual as an 'economic man' with moral and/or political motivations to satisfy individual desires. This study considers the critique by feminists, who argue that patriarchal and medical control prevails in the surrogacy contracts. It also explores the exploitative dynamics amongst actors in the light of Baier's conceptualization of trust and human relationship, within which both justice and exploitation thrive, and Foucault's concept of bio-power. Drawing on these concepts, this paper aims to investigate the manifestations of exploitation in commercial surrogacy in the context of trust, power and experiences of actors, using a case study of one clinic in India. The actors' experiences are evaluated at different stages of the surrogacy process: recruitment, medical procedures, living in the surrogate home, bonding with the child and amongst actors, financial dealings, relinquishment and post-relinquishment.This study applies ethnomethodology to identify phenomena as perceived by the actors in a situation, giving importance to their interpretations of the rules that make collective activity possible. The methods include semi-structured interviews, discussions, participant observation and explanation of the phenomena from the actors' perspectives. Between August 2009 and April 2010, 13 surrogate mothers (SMs), 4 intended parents (IPs) and 2 medical practitioners (MPs) from one clinic in Western India were interviewed.This study reveals that asymmetries of capacity amongst the MPs, SMs, IPs and surrogate agents (SAs) lead to a network of trust and designation of powers through rules, bringing out the relevance of Baier's conceptualization of asymmetric

  5. The microeconomics of sexual exploitation of girls and young women in the Peruvian Amazon.

    Science.gov (United States)

    Mujica, Jaris

    2013-01-01

    This paper examines the sexual exploitation of girls and young women as an increasing phenomenon within the extractive industries of wood, oil, minerals and gas in Peruvian Amazonia. The analysis focuses on the city of Pucallpa and the northern part of the Ucayali River and aims to identify the social and economic dynamics underpinning the commercial sexual exploitation of female children and teenagers around the main river port. The study describes the local operating mechanisms of bars and restaurants in the port, the demand for and perceptions of the sexual exploitation of children and teenagers, and the economic logic that it entails. Using a discourse analytic approach, it is argued that this is a business whose profitability is tied to the trade in alcoholic beverages and foods and which responds to a set of family connections and networks.

  6. Exploiting Lexical Regularities in Designing Natural Language Systems.

    Science.gov (United States)

    1988-04-01

    ELEMENT. PROJECT. TASKN Artificial Inteligence Laboratory A1A4WR NTumet 0) 545 Technology Square Cambridge, MA 02139 Ln *t- CONTROLLING OFFICE NAME AND...RO-RI95 922 EXPLOITING LEXICAL REGULARITIES IN DESIGNING NATURAL 1/1 LANGUAGE SYSTENS(U) MASSACHUSETTS INST OF TECH CAMBRIDGE ARTIFICIAL INTELLIGENCE...oes.ary and ftdou.Ip hr Nl wow" L,2This paper presents the lexical component of the START Question Answering system developed at the MIT Artificial

  7. Television production, Funding Models and Exploitation of Content

    OpenAIRE

    Doyle, Gillian

    2016-01-01

    The rise of digital platforms has transformative implications for strategies of financing media production and for exploitation of the economic value in creative content. In the television industry, changes in technologies for distribution and the emergence of SVOD services such as Netflix are gradually shifting audiences and financial power away from broadcasters while at the same time creating unprecedented opportunities for programme-makers.  Drawing on findings from recent RCUK-funded res...

  8. "Nobody Told Me It Was Rape": A Parent's Guide for Talking with Teenagers about Acquaintance Rape and Sexual Exploitation.

    Science.gov (United States)

    Adams, Caren; Fay, Jennifer

    This book was written to help parents talk to their adolescent children about acquaintance rape and sexual exploitation. It may also be useful to family life educators presenting units on rape and sexual exploitation. Acquaintance rape and sexual exploitation are explained in the first section. The second section discusses talking with teenagers…

  9. Exploitation de la non-circularité pour les transmissions et l'écoute passive

    OpenAIRE

    Sadok , Mustapha

    2017-01-01

    This thesis is devoted to exploit the non-circularity and non-gaussianity properties of signals of interest (SOI) and/or interference for wireless transmissions and passive listening. In the first part of this thesis, we are interested in the extension of conventional SIMO-MLSE receivers to new architectures exploiting the potential second order non-circularity of co-channel interference (CCI), for the demodulation of rectilinear signals (BPSK, ASK), quasi-rectilinear (MSK, GMSK and OQAM) and...

  10. Paradise lost: Sovereign State Interest, Global Resource Exploitation and the Politics of Human Rights

    OpenAIRE

    Augenstein, Daniel

    2016-01-01

    Taking its cue from the US Supreme Court judgment in Kiobel that restricted the extraterritorial reach of the Alien Tort Claims Act, this article explores how sovereignty structures the relationship between global resource exploitation and the localization of human rights in the international order of states. The argument situates international human rights law in an area of tension between national political self-determination and the global economic exploitation of natural resources. Global...

  11. Diel horizontal migration in streams: juvenile fish exploit spatial heterogeneity in thermal and trophic resources

    Science.gov (United States)

    Armstrong, Jonathan B.; Schindler, Daniel E.; Ruff, Casey P.; Brooks, Gabriel T.; Bentley, Kale E.; Torgersen, Christian E.

    2013-01-01

    Vertical heterogeneity in the physical characteristics of lakes and oceans is ecologically salient and exploited by a wide range of taxa through diel vertical migration to enhance their growth and survival. Whether analogous behaviors exploit horizontal habitat heterogeneity in streams is largely unknown. We investigated fish movement behavior at daily timescales to explore how individuals integrated across spatial variation in food abundance and water temperature. Juvenile coho salmon made feeding forays into cold habitats with abundant food, and then moved long distances (350–1300 m) to warmer habitats that accelerated their metabolism and increased their assimilative capacity. This behavioral thermoregulation enabled fish to mitigate trade-offs between trophic and thermal resources by exploiting thermal heterogeneity. Fish that exploited thermal heterogeneity grew at substantially faster rates than did individuals that assumed other behaviors. Our results provide empirical support for the importance of thermal diversity in lotic systems, and emphasize the importance of considering interactions between animal behavior and habitat heterogeneity when managing and restoring ecosystems.

  12. Mission Exploitation Platform PROBA-V

    Science.gov (United States)

    Goor, Erwin

    2016-04-01

    VITO and partners developed an end-to-end solution to drastically improve the exploitation of the PROBA-V EO-data archive (http://proba-v.vgt.vito.be/), the past mission SPOT-VEGETATION and derived vegetation parameters by researchers, service providers and end-users. The analysis of time series of data (+1PB) is addressed, as well as the large scale on-demand processing of near real-time data. From November 2015 an operational Mission Exploitation Platform (MEP) PROBA-V, as an ESA pathfinder project, will be gradually deployed at the VITO data center with direct access to the complete data archive. Several applications will be released to the users, e.g. - A time series viewer, showing the evolution of PROBA-V bands and derived vegetation parameters for any area of interest. - Full-resolution viewing services for the complete data archive. - On-demand processing chains e.g. for the calculation of N-daily composites. - A Virtual Machine will be provided with access to the data archive and tools to work with this data, e.g. various toolboxes and support for R and Python. After an initial release in January 2016, a research platform will gradually be deployed allowing users to design, debug and test applications on the platform. From the MEP PROBA-V, access to Sentinel-2 and landsat data will be addressed as well, e.g. to support the Cal/Val activities of the users. Users can make use of powerful Web based tools and can self-manage virtual machines to perform their work on the infrastructure at VITO with access to the complete data archive. To realise this, private cloud technology (openStack) is used and a distributed processing environment is built based on Hadoop. The Hadoop ecosystem offers a lot of technologies (Spark, Yarn, Accumulo, etc.) which we integrate with several open-source components. The impact of this MEP on the user community will be high and will completely change the way of working with the data and hence open the large time series to a larger

  13. Mathematics of Sensing, Exploitation, and Execution (MSEE) Hierarchical Representations for the Evaluation of Sensed Data

    Science.gov (United States)

    2016-06-01

    AFRL-RY-WP-TR-2016-0123 MATHEMATICS OF SENSING, EXPLOITATION, AND EXECUTION (MSEE) Hierarchical Representations for the Evaluation of Sensed...December 2015 4. TITLE AND SUBTITLE MATHEMATICS OF SENSING, EXPLOITATION, AND EXECUTION (MSEE) Hierarchical Representations for the Evaluation of...8-98) Prescribed by ANSI Std. Z39-18 Hierarchical Representations for the Evaluation of Sensed Data Final Report Mathematics of Sensing

  14. Prototype Design and Mission Analysis for a Small Satellite Exploiting Environmental Disturbances for Attitude Stabilization

    Science.gov (United States)

    2016-03-01

    AND MISSION ANALYSIS FOR A SMALL SATELLITE EXPLOITING ENVIRONMENTAL DISTURBANCES FOR ATTITUDE STABILIZATION by Halis C. Polat March 2016...FOR A SMALL SATELLITE EXPLOITING ENVIRONMENTAL DISTURBANCES FOR ATTITUDE STABILIZATION 5. FUNDING NUMBERS 6. AUTHOR(S) Halis C. Polat 7...need a robust and accurate attitude control system. Due to the mass- and volume-constrained design environment of CubeSat, conventional methods are

  15. April 1977 The Cape gurnard is a commercially exploited species of ...

    African Journals Online (AJOL)

    The Cape gurnard is a commercially exploited species of which the annual landings between ... fishing operations took place along the eastern Cape coast of South Africa ..... Handbook of computation for biological statistics offish populations.

  16. Explorative and exploitative learning strategies in technology-based alliance networks

    NARCIS (Netherlands)

    Vanhaverbeke, W.P.M.; Beerkens, B.E.; Duysters, G.M.

    2003-01-01

    This paper aims to improve our understanding of how exploitative and explorative learning of firms is enhanced through their social capital. Both types of learning differ considerably from each other and we argue that the distinction between them may be an important contingency factor in explaining

  17. Shale Gas Exploration and Exploitation Induced Risks - SHEER

    Science.gov (United States)

    Capuano, Paolo; Orlecka-Sikora, Beata; Lasocki, Stanislaw; Cesca, Simone; Gunning, Andrew; jaroslawsky, Janusz; Garcia-Aristizabal, Alexander; Westwood, Rachel; Gasparini, Paolo

    2017-04-01

    Shale gas operations may affect the quality of air, water and landscapes; furthermore, it can induce seismic activity, with the possible impacts on the surrounding infrastructure. The SHEER project aims at setting up a probabilistic methodology to assess and mitigate the short and the long term environmental risks connected to the exploration and exploitation of shale gas. In particular we are investigating risks associated with groundwater contamination, air pollution and induced seismicity. A shale gas test site located in Poland (Wysin) has been monitored before, during and after the fracking operations with the aim of assessing environmental risks connected with groundwater contamination, air pollution and earthquakes induced by fracking and injection of waste water. The severity of each of these hazards depends strongly on the unexpected enhanced permeability pattern, which may develop as an unwanted by-product of the fracking processes and may become pathway for gas and fluid migration towards underground water reservoirs or the surface. The project is devoted to monitor and understand how far this enhanced permeability pattern develops both in space and time. The considered hazards may be at least partially inter-related as they all depend on this enhanced permeability pattern. Therefore they are being approached from a multi-hazard, multi parameter perspective. We expect to develop methodologies and procedures to track and model fracture evolution around shale gas exploitation sites and a robust statistically based, multi-parameter methodology to assess environmental impacts and risks across the operational lifecycle of shale gas. The developed methodologies are going to be applied and tested on a comprehensive database consisting of seismicity, changes of the quality of ground-waters and air, ground deformations, and operational data collected from the ongoing monitoring episode (Wysin) and past episodes: Lubocino (Poland), Preese Hall (UK), Oklahoma (USA

  18. Design and Exploitation Problems of Drill String in Directional Drilling

    Directory of Open Access Journals (Sweden)

    Bednarz Stanislaw

    2004-09-01

    Full Text Available Drill string design for directional drilling requires accounting for a number of factors. First, types and expected values of loads should be determined. Then, elements of the drill string should be so selected as to enable realization of the plan at specified loads. Some of additional factors, e. g. purchase, exploitation cost, geological conditions in the bore-hole, washing of the bore-hole, stability, trajectory, rig parameters, accuracy of gauges, pumps parameters remain in conflict. Drill pipes are made of rolled pipes, upset and welded with tool joints to 9,5 m long; the shorter ones can be made of hot forged rods. Exploitation requirements, being a result of practical experience supported by theoretical and laboratory analyses should be a part of syllabuses of technical staff educational programs. Apart from designing the string, it is also vital to lower the risk of a drilling failure. The significance of these aspects seems to be unquestionable.

  19. Concerted actions to support investments exploiting low-enthalpy geothermal energy

    International Nuclear Information System (INIS)

    Catsis, P.; Papadopoulou, A.; Petrogona-Emmanouil, E.

    1996-01-01

    A brief outline is presented of the project 'Information and support to investors for establishment of plants exploiting geothermal energy' co-financed by the Directorate General for Energy of the European Commission in the context of ALTENER programme for promotion of renewable energy sources. The basic supporting products of this project are: 1) Information Guide on the Geothermal Energy Exploitation Possibilities in Greece: 2) Investment Guide for the Use of Geothermal Energy in Productive Activities in Greece: 3) A convenient and user-friendly software GAIN (Microsoft Access 2.0)) for designing and economic evaluation of investments for an 'ideal' geothermal plant . The following steps are executed by GAIN: representation of the entire plant; determination of the size and energy requirements of each respective uses; determination of the type of application installations (heating system); determination of equipment needed for the geothermal plant: series of calculations for economic evaluation. In addition, some organizational measures as training of personnel, demonstration activities, conferences etc. are also foreseen in the programme

  20. Do singing rock hyraxes exploit conspecific calls to gain attention?

    Directory of Open Access Journals (Sweden)

    Amiyaal Ilany

    Full Text Available Signal detection theory predicts that signals directed at distant or busy receivers in noisy backgrounds will begin with an alert component, in order to draw attention. Instead of an alert component, however, animals could get the same effect by using an external stimulus. Here we combined observations of free-living rock hyraxes (Procavia capensis with playback experiments to elucidate the circumstances under which males begin singing. We show that males sing following hyrax pup screams, which elicit a strong response from hyraxes within hearing distance, which are potential receivers. We hypothesize that singers enhance their singing display by exploiting the rarely emitted pup screams. To our knowledge, our findings are the first indication that animals may enhance signal reception by exploiting conspecifics' signals and the differential attention to these signals. We suggest that the utilization of external stimuli by signalers may be widespread, as an adaptive strategy for communication in complex environments.

  1. Exploitation of the Virtual Worlds in Tourism and Tourism Education

    Directory of Open Access Journals (Sweden)

    Zejda Pavel

    2016-12-01

    Full Text Available Academics perceive a great potential of virtual worlds in various areas, including tourism and education. Efforts adapting the virtual worlds in practice are, however, still marginal. There is no clear definition of the virtual world. Therefore the author of this article attempts to provide one. The paper also focuses on the barriers of a wider exploitation of the virtual worlds and discusses the principles that might help to increase their potential in tourism area. One of the principles – gamification – favours a wider adaptation of the virtual worlds in tourism. Applying gamification principles provides visitors with some unique experiences while serving as a powerful marketing tool for institutions. The benefits of implementing tourism education activities based on cooperative principles set in an immersive environment of the virtual worlds are depicted afterwards. Finally, this paper includes successful case studies, which show advantages and drawbacks of some approaches in exploiting the virtual worlds in tourism and tourism education.

  2. Estimating fish exploitation and aquatic habitat loss across diffuse inland recreational fisheries.

    Science.gov (United States)

    de Kerckhove, Derrick Tupper; Minns, Charles Kenneth; Chu, Cindy

    2015-01-01

    The current state of many freshwater fish stocks worldwide is largely unknown but suspected to be vulnerable to exploitation from recreational fisheries and habitat degradation. Both these factors, combined with complex ecological dynamics and the diffuse nature of inland fisheries could lead to an invisible collapse: the drastic decline in fish stocks without great public or management awareness. In this study we provide a method to address the pervasive knowledge gaps in regional rates of exploitation and habitat degradation, and demonstrate its use in one of North America's largest and most diffuse recreational freshwater fisheries (Ontario, Canada). We estimated that (1) fish stocks were highly exploited and in apparent danger of collapse in management zones close to large population centres, and (2) fish habitat was under a low but constant threat of degradation at rates comparable to deforestation in Ontario and throughout Canada. These findings confirm some commonly held, but difficult to quantify, beliefs in inland fisheries management but also provide some further insights including (1) large anthropogenic projects greater than one hectare could contribute much more to fish habitat loss on an area basis than the cumulative effect of smaller projects within one year, (2) hooking mortality from catch-and-release fisheries is likely a greater source of mortality than the harvest itself, and (3) in most northern management zones over 50% of the fisheries resources are not yet accessible to anglers. While this model primarily provides a framework to prioritize management decisions and further targeted stock assessments, we note that our regional estimates of fisheries productivity and exploitation were similar to broadscale monitoring efforts by the Province of Ontario. We discuss the policy implications from our results and extending the model to other jurisdictions and countries.

  3. Pilot plant for exploitation of geothermal waters

    Directory of Open Access Journals (Sweden)

    Stojiljković Dragan T.

    2006-01-01

    Full Text Available In Sijarinska spa, there are some 15 mineral and thermomineral springs, that are already being used for therapeutic purposes. For the exploitation of heat energy boring B-4 is very interesting. It is a boring of a closed type, with the water temperature of about 78°C and a flow rate of about 33 l/s. Waters with the flow rate of about 6 l/s are currently used for heating of the Gejzer hotel, and waters of the flow rate of about 0,121 l/s for the pilot drying plant. The paper presents this pilot plant. .

  4. Geothermal resources: exploration and exploitation. A bibliography

    Energy Technology Data Exchange (ETDEWEB)

    1976-07-01

    This comprehensive bibliography contains 5476 citations of foreign and domestic research reports, journal articles, patents, conference proceedings, and books concerned with the exploration and exploitation of geothermal resources. The coverage dates back as far as useful references could be obtained and extends through June 1976. References are arranged in broad subject categories and are made up of complete bibliographic citations. These are followed by a listing of subject descriptors used to describe the subject content of each reference. Four indexes are included: Corporate, Personal Author, Subject, and Report Number. Also included is a list of journals from which articles were selected. (LBS)

  5. Inequality, Sexual Exploitation and the Risk of Contacting HIV/AIDS ...

    African Journals Online (AJOL)

    Lwati: A Journal of Contemporary Research ... consequent sexual exploitation has continued for centuries due to many factors, which include patriarchal idea that obscures the history of women. This is an idea that affects women's potentials by limiting them mainly to reproductive and nurturing roles. There are various ...

  6. Fight for your alienation: The fantasy of employability and the ironic struggle for self-exploitation

    OpenAIRE

    Bloom, Peter

    2013-01-01

    This paper draws on Lacanian psychoanalysis, to introduce employability as a cultural fantasy that organizes identity around the desire to shape, exploit and ultimately profit from an employable self. Specifically, the paper shows how individuals seek to overcome their subjective and material alienation by maximizing their self-exploitation through constantly enhancing their employability. This linking of empowerment to selfexploitation has expanded into a broader organizational and political...

  7. Total exploitation of an ornamental granite quarry

    Directory of Open Access Journals (Sweden)

    Taboada, J.

    2005-09-01

    Full Text Available In this paper we propose a methodology to estimate the recovery percentage for each of the products which can be obtained from the exploitation of an ornamental granite quarry: block, semiblock, masonry-transverse stone, and the smaller materials that can be used to obtain construction aggregates. This methodology ensures that quarry exploitation is exhaustive, thereby minimising the production of spoils and the consequent negative impact on the environment. The analysis is based on a detailed and exhaustive compilation of discontinuity data from the research fronts, which are then interpreted statistically and projected over the three weakness planes that are a particular feature of ornamental granite deposits. Using this information, and bearing in mind the minimum commercially viable sizes for each kind of granite, the corresponding recovery rates are calculated for each material in each plane. The results are then integrated using spatial techniques, and the result is an evaluation of quarry contents with a view to total exploitation. This methodology was applied to a quarry in the opening phase in order to carry out an a priori assessment of the economic feasibility of the quarry.

    En este trabajo se propone una metodología para estimar el porcentaje de recuperación de cada uno de los productos que se pueden obtener en la explotación de una cantera de granito ornamental: bloque, semibloque, manpostería y per piaños, y material restante destinado a la obtención de áridos. De esta manera se logra un aprovechamiento integral de la cantera, evitándose la generación de estériles y el subsiguiente impacto ambiental producido por éstos. La metodología de análisis se basa en la recopilación detallada y exhaustiva de datos de discontinuidades en los frentes de investigación, que se interpretan estadísticamente y se proyectan sobre los tres planos de debilidad propios del granito ornamental. Con esta información, y las

  8. Comparing recent and abandoned shell middens to detect the impact of human exploitation on the intertidal ecosystem

    NARCIS (Netherlands)

    Boer, de W.F.; Pereira, T.; Guissamulo, A.

    2000-01-01

    Abandoned and recent shell middens were compared from Inhaca island, Mozambique, to investigate the impact of human exploitation. The growing human population was expected to increase the exploitation pressure, decrease the mean shell size, and increase the species diversity. Moreover,

  9. Film-induced, steps for a Real Exploitation in Europe

    Directory of Open Access Journals (Sweden)

    Francesco di Cesare

    2015-03-01

    Full Text Available One of the possible ways to enhance Europe visibility, its entirety rather than a set of destinations, is implementing cooperation between the Member States especially in creating and developing trans-border thematic tourist products and experiences. One of them could be the film-induced tourism. In looking back over the past two cycles of European programming it is possible to find some examples, described in the article, in which the theme of audiovisual productions in their shooting phase in European locations has been the subject of EU attention.This article refers to some previous research results reminding how movie-induced tourism seems to be used just through sporadic attempts and therefore not developed and exploited in a strategic way. Whether from demand-side is clear what potential is inherent in the relationship between movie and tourism, on the supply side there is still much to do.As the current EC funding period (2014-2020 is favouring, at least in the first calls for proposal that came out, SMEs projects and being aware of the apparent lack of such activities developed by private businesses, the article explores new opportunities to be gathered suggesting a new exploitation path.

  10. Human trafficking for labour exploitation:
    Interpreting the crime

    Directory of Open Access Journals (Sweden)

    Jill E.B. Coster van Voorhout

    2007-12-01

    Full Text Available The definition of human trafficking for labour exploitation, as follows from the European Council Framework Decision, proves to be unclear. Literal interpretation does not suffice, because it does not clarify all elements of what is deemed to be criminal behaviour, and hermeneutical interpretation also falls short discouraging the aim of this legislation, namely harmonisation. Hence, another solution is required. This article does so by firstly challenging assumptions about human trafficking for labour exploitation that are generally pertinent, but nonetheless untrue. This accurate appraisal of the crime’s nature is followed by a synopsis of national legislation and adjudication in three Member States, so as to also focus on these actualities regarding the crime that are commonly not conceived. This article examines two countries that have implemented the Framework Decision, namely Belgium and the Netherlands, and one that has not yet done so, the United Kingdom. Thereafter remaining unexplained elements of the Framework Decision’s definition are interpreted with use of international, pan-European and European legislation and adjudication. Based upon all this, a suggested interpretation of the Framework Decision’s definition is provided so as to overcome all identified difficulties with it.

  11. Exploiting the Dynamics of Soft Materials for Machine Learning.

    Science.gov (United States)

    Nakajima, Kohei; Hauser, Helmut; Li, Tao; Pfeifer, Rolf

    2018-06-01

    Soft materials are increasingly utilized for various purposes in many engineering applications. These materials have been shown to perform a number of functions that were previously difficult to implement using rigid materials. Here, we argue that the diverse dynamics generated by actuating soft materials can be effectively used for machine learning purposes. This is demonstrated using a soft silicone arm through a technique of multiplexing, which enables the rich transient dynamics of the soft materials to be fully exploited as a computational resource. The computational performance of the soft silicone arm is examined through two standard benchmark tasks. Results show that the soft arm compares well to or even outperforms conventional machine learning techniques under multiple conditions. We then demonstrate that this system can be used for the sensory time series prediction problem for the soft arm itself, which suggests its immediate applicability to a real-world machine learning problem. Our approach, on the one hand, represents a radical departure from traditional computational methods, whereas on the other hand, it fits nicely into a more general perspective of computation by way of exploiting the properties of physical materials in the real world.

  12. Exploitation of the in-seam miner and operational experience

    Energy Technology Data Exchange (ETDEWEB)

    Wilson, W I.S.; Morris, A H

    1977-12-01

    The In-seam Miner started as an investigatory project at MRDE in 1969. Since that time it has passed through the classic development stages of design of prototype, surface trials, underground trials, modification, production of more machines, assessment of experience and then wider exploitation. At the present time well over 100 machines have been supplied to the National Coal Board. The original machine was hydraulically driven and all but five of the machines supplied to date are of this type. The variety of applications that the machine has found in the mining industry has caused derivative development to embrace machines of length varying from 12-ft centers to 44-ft centers, to work in seams ranging from 40 in. up to 68 in. The range of applications has included face drivages, stablehole operations, in-seam retreat roadways and dirt-absorbing headings. Five electrically driven machines are now coming onto the market and experience with them, though limited, is very encouraging. The paper concentrates on two major aspects of the overall development process: first, the management of exploitation; and second, some operational experience of the In-seam Miner in South Midlands area.

  13. Self-report measure of financial exploitation of older adults.

    Science.gov (United States)

    Conrad, Kendon J; Iris, Madelyn; Ridings, John W; Langley, Kate; Wilber, Kathleen H

    2010-12-01

    this study was designed to improve the measurement of financial exploitation (FE) by testing psychometric properties of the older adult financial exploitation measure (OAFEM), a client self-report instrument. rasch item response theory and traditional validation approaches were used. Questionnaires were administered by 22 adult protective services investigators from 7 agencies in Illinois to 227 substantiated abuse clients. Analyses included tests for dimensionality, model fit, and additional construct validation. Results from the OAFEM were also compared with the substantiation decision of abuse and with investigators' assessments of FE using a staff report version. Hypotheses were generated to test hypothesized relationships. the OAFEM, including the original 79-, 54-, and 30-item measures, met stringent Rasch analysis fit and unidimensionality criteria and had high internal consistency and item reliability. The validation results were supportive, while leading to reconsideration of aspects of the hypothesized theoretical hierarchy. Thresholds were suggested to demonstrate levels of severity. the measure is now available to aid in the assessment of FE of older adults by both clinicians and researchers. Theoretical refinements developed using the empirically generated item hierarchy may help to improve assessment and intervention.

  14. Exploiting GPUs in Virtual Machine for BioCloud

    Science.gov (United States)

    Jo, Heeseung; Jeong, Jinkyu; Lee, Myoungho; Choi, Dong Hoon

    2013-01-01

    Recently, biological applications start to be reimplemented into the applications which exploit many cores of GPUs for better computation performance. Therefore, by providing virtualized GPUs to VMs in cloud computing environment, many biological applications will willingly move into cloud environment to enhance their computation performance and utilize infinite cloud computing resource while reducing expenses for computations. In this paper, we propose a BioCloud system architecture that enables VMs to use GPUs in cloud environment. Because much of the previous research has focused on the sharing mechanism of GPUs among VMs, they cannot achieve enough performance for biological applications of which computation throughput is more crucial rather than sharing. The proposed system exploits the pass-through mode of PCI express (PCI-E) channel. By making each VM be able to access underlying GPUs directly, applications can show almost the same performance as when those are in native environment. In addition, our scheme multiplexes GPUs by using hot plug-in/out device features of PCI-E channel. By adding or removing GPUs in each VM in on-demand manner, VMs in the same physical host can time-share their GPUs. We implemented the proposed system using the Xen VMM and NVIDIA GPUs and showed that our prototype is highly effective for biological GPU applications in cloud environment. PMID:23710465

  15. Exploiting GPUs in Virtual Machine for BioCloud

    Directory of Open Access Journals (Sweden)

    Heeseung Jo

    2013-01-01

    Full Text Available Recently, biological applications start to be reimplemented into the applications which exploit many cores of GPUs for better computation performance. Therefore, by providing virtualized GPUs to VMs in cloud computing environment, many biological applications will willingly move into cloud environment to enhance their computation performance and utilize infinite cloud computing resource while reducing expenses for computations. In this paper, we propose a BioCloud system architecture that enables VMs to use GPUs in cloud environment. Because much of the previous research has focused on the sharing mechanism of GPUs among VMs, they cannot achieve enough performance for biological applications of which computation throughput is more crucial rather than sharing. The proposed system exploits the pass-through mode of PCI express (PCI-E channel. By making each VM be able to access underlying GPUs directly, applications can show almost the same performance as when those are in native environment. In addition, our scheme multiplexes GPUs by using hot plug-in/out device features of PCI-E channel. By adding or removing GPUs in each VM in on-demand manner, VMs in the same physical host can time-share their GPUs. We implemented the proposed system using the Xen VMM and NVIDIA GPUs and showed that our prototype is highly effective for biological GPU applications in cloud environment.

  16. Exploiting GPUs in virtual machine for BioCloud.

    Science.gov (United States)

    Jo, Heeseung; Jeong, Jinkyu; Lee, Myoungho; Choi, Dong Hoon

    2013-01-01

    Recently, biological applications start to be reimplemented into the applications which exploit many cores of GPUs for better computation performance. Therefore, by providing virtualized GPUs to VMs in cloud computing environment, many biological applications will willingly move into cloud environment to enhance their computation performance and utilize infinite cloud computing resource while reducing expenses for computations. In this paper, we propose a BioCloud system architecture that enables VMs to use GPUs in cloud environment. Because much of the previous research has focused on the sharing mechanism of GPUs among VMs, they cannot achieve enough performance for biological applications of which computation throughput is more crucial rather than sharing. The proposed system exploits the pass-through mode of PCI express (PCI-E) channel. By making each VM be able to access underlying GPUs directly, applications can show almost the same performance as when those are in native environment. In addition, our scheme multiplexes GPUs by using hot plug-in/out device features of PCI-E channel. By adding or removing GPUs in each VM in on-demand manner, VMs in the same physical host can time-share their GPUs. We implemented the proposed system using the Xen VMM and NVIDIA GPUs and showed that our prototype is highly effective for biological GPU applications in cloud environment.

  17. For your first born child: an ethical defense of the exploitation argument against commercial surrogacy.

    Science.gov (United States)

    Osberg, Brendan

    2006-01-01

    In this essay I explore two arguments against commercial surrogacy, based on commodification and exploitation respectively. I adopt a consequentialist framework and argue that commodification arguments must be grounded in a resultant harm to either child or surrogate, and that a priori arguments which condemn the practice for puritanical reasons cannot form a basis for public law. Furthermore there is no overwhelming evidence of harm caused to either party involved in commercial surrogacy, and hence Canadian law (which forbids the practice) must (and can) be justified on exploitative grounds. Objections raised by Wilkinson based on an 'isolated case' approach are addressed when one takes into account the political implications of public policy. I argue that is precisely these implications that justify laws forbidding commercial surrogacy on the grounds of preventing systematic exploitation.

  18. The Role of Ambidexterity in Marketing Strategy Implementation: Resolving the Exploration-Exploitation Dilemma

    Directory of Open Access Journals (Sweden)

    Christiane Prange

    2009-12-01

    Full Text Available Formulating consistent marketing strategies is a difficult task, but successfully implementing them is even more challenging. This is even more pertinent as marketing strategies quite often incorporate inherent conflicts between major breakthroughs and consolidation. Consequently, marketers need to balance exploratory and exploitative strategies. However, the literature lacks concrete insights for marketing managers as to how exploratory and exploitative strategies can be best combined. This paper addresses this issue by introducing a framework of multiple types of ambidexterity. Based on qualitative research, tools and procedures are identified to overcome marketing dilemmas and support strategy implementation by drawing on ambidextrous designs.

  19. The ESA Scientific Exploitation of Operational Missions element, first results

    Science.gov (United States)

    Desnos, Yves-Louis; Regner, Peter; Delwart, Steven; Benveniste, Jerome; Engdahl, Marcus; Mathieu, Pierre-Philippe; Gascon, Ferran; Donlon, Craig; Davidson, Malcolm; Pinnock, Simon; Foumelis, Michael; Ramoino, Fabrizio

    2016-04-01

    SEOM is a program element within the fourth period (2013-2017) of ESA's Earth Observation Envelope Programme (http://seom.esa.int/). The prime objective is to federate, support and expand the international research community that the ERS, ENVISAT and the Envelope programmes have built up over the last 25 years. It aims to further strengthen the leadership of the European Earth Observation research community by enabling them to extensively exploit future European operational EO missions. SEOM will enable the science community to address new scientific research that are opened by free and open access to data from operational EO missions. Based on community-wide recommendations for actions on key research issues, gathered through a series of international thematic workshops and scientific user consultation meetings, a work plan is established and is approved every year by ESA Members States. During 2015 SEOM, Science users consultation workshops have been organized for Sentinel1/3/5P ( Fringe, S3 Symposium and Atmospheric science respectively) , new R&D studies for scientific exploitation of the Sentinels have been launched ( S3 for Science SAR Altimetry and Ocean Color , S2 for Science,) , open-source multi-mission scientific toolboxes have been launched (in particular the SNAP/S1-2-3 Toolbox). In addition two advanced international training courses have been organized in Europe to exploit the new S1-A and S2-A data for Land and Ocean remote sensing (over 120 participants from 25 countries) as well as activities for promoting the first scientific results ( e.g. Chili Earthquake) . In addition the First EO Open Science 2.0 was organised at ESA in October 2015 with 225 participants from 31 countries bringing together young EO scientists and data scientists. During the conference precursor activities in EO Open Science and Innovation were presented, while developing a Roadmap preparing for future ESA scientific exploitation activities. Within the conference, the first

  20. Grooming Cybervictims: The Psychosocial Effects of Online Exploitation for Youth.

    Science.gov (United States)

    Berson, Ilene R.

    2003-01-01

    Presents an overview of the benefits and risks of Web-based interactions for youth. Discusses, as an illustrative example, the psychosocial effects of online "grooming" practices that are designed to lure and exploit children by enticing them, typically in a nonsexual way, toward a sexual encounter. Suggests constructive solutions and a…

  1. Exploiting Innocuous Activity for Correlating Users Across Sites

    OpenAIRE

    Goga , Oana; Lei , Howard; Parthasarathi , Sree Hari Krishnan; Friedland , Gerald; Sommer , Robin; Teixeira , Renata

    2013-01-01

    International audience; We study how potential attackers can identify accounts on different social network sites that all belong to the same user, exploiting only innocuous activity that inherently comes with posted content. We examine three specific features on Yelp, Flickr, and Twitter: the geo-location attached to a user's posts, the timestamp of posts, and the user's writing style as captured by language models. We show that among these three features the location of posts is the most powe...

  2. Technical dialogue on High-level and Intermediate-level wastes. Risks during exploitation: co-activity

    International Nuclear Information System (INIS)

    Sene, Monique; Lheureux, Yves; Demet, Michel; Jaquet, Benoit; Gueritte, Michel; Rollinger, Francois; Le Bars, Igor; Bauduin, Eloi; Flachet, Margot; Besnus, Francois; Espivent, Camille; Tichauer, Michael; Serres, Christophe; Rocher, Muriel; Michel, Maurice; Perroud, Geraldine; Sauvage, Marite; Stupien, Maurice; Delamare, Thierry; Klajman, Irene; Castel, Cecile; Makhijani, Arjun; Pellegrini, Delphine; Dessaint, Anthony; Proust, Christophe; Gratton, Laura; Vinot, Thierry; Michel, Maurice; Demet, Michel

    2015-04-01

    This publication contains contributions and the content of debates on these contributions. After introduction speeches, a contribution on safety challenges during exploitation, and an overview of questions asked about these risks by the Citizen Conference, the following issues have been addressed: the accident of the American Isolation Pilot Plant with a fire and a radioactive release in 2014 (facts and analysis, other points of view, debate), fire risks in Cigeo as a major challenge which combines constraints related to mining activities and to the exploitation of a nuclear installation (IRSN point of view, debate), risks related to transportation, risks related to parallel surface and underground activities such as storage filling, digging, road traffic and so on (points of view of SNCF and ANDRA, debate), risk of radioactivity dispersion within Cigeo (problem description, IRSN point of view, debate), and exploitation risks within Cigeo (risks of explosion due to heat and hydrogen releases, IRSN point of view, debate)

  3. The Exploitation of Evolving Resources

    CERN Document Server

    McGlade, Jacqueline; Law, Richard

    1993-01-01

    The impact of man on the biosphere is profound. Quite apart from our capacity to destroy natural ecosystems and to drive species to extinction, we mould the evolution of the survivors by the selection pressures we apply to them. This has implications for the continued health of our natural biological resources and for the way in which we seek to optimise yield from those resources. Of these biological resources, fish stocks are particularly important to mankind as a source of protein. On a global basis, fish stocks provide the major source of protein for human consumption from natural ecosystems, amounting to some seventy million tonnes in 1970. Although fisheries management has been extensively developed over the last century, it has not hitherto considered the evolutionary consequences of fishing activity. While this omission may not have been serious in the past, the ever increasing intensity of exploitation and the deteriorating health of fish stocks has generated an urgent need for a better understanding...

  4. SSC-EKE: Semi-Supervised Classification with Extensive Knowledge Exploitation.

    Science.gov (United States)

    Qian, Pengjiang; Xi, Chen; Xu, Min; Jiang, Yizhang; Su, Kuan-Hao; Wang, Shitong; Muzic, Raymond F

    2018-01-01

    We introduce a new, semi-supervised classification method that extensively exploits knowledge. The method has three steps. First, the manifold regularization mechanism, adapted from the Laplacian support vector machine (LapSVM), is adopted to mine the manifold structure embedded in all training data, especially in numerous label-unknown data. Meanwhile, by converting the labels into pairwise constraints, the pairwise constraint regularization formula (PCRF) is designed to compensate for the few but valuable labelled data. Second, by further combining the PCRF with the manifold regularization, the precise manifold and pairwise constraint jointly regularized formula (MPCJRF) is achieved. Third, by incorporating the MPCJRF into the framework of the conventional SVM, our approach, referred to as semi-supervised classification with extensive knowledge exploitation (SSC-EKE), is developed. The significance of our research is fourfold: 1) The MPCJRF is an underlying adjustment, with respect to the pairwise constraints, to the graph Laplacian enlisted for approximating the potential data manifold. This type of adjustment plays the correction role, as an unbiased estimation of the data manifold is difficult to obtain, whereas the pairwise constraints, converted from the given labels, have an overall high confidence level. 2) By transforming the values of the two terms in the MPCJRF such that they have the same range, with a trade-off factor varying within the invariant interval [0, 1), the appropriate impact of the pairwise constraints to the graph Laplacian can be self-adaptively determined. 3) The implication regarding extensive knowledge exploitation is embodied in SSC-EKE. That is, the labelled examples are used not only to control the empirical risk but also to constitute the MPCJRF. Moreover, all data, both labelled and unlabelled, are recruited for the model smoothness and manifold regularization. 4) The complete framework of SSC-EKE organically incorporates multiple

  5. The law and economics of international sex slavery: prostitution laws and trafficking for sexual exploitation

    OpenAIRE

    Jakobsson, Niklas; Kotsadam, Andreas

    2013-01-01

    International trafficking in humans for sexual exploitation is an eco- nomic activity driven by profit motives. Laws regarding commercial sex influence the profitability of trafficking and may thus affect the inflow of trafficking to a country. Using two recent sources of European cross country data we show that trafficking of persons for commercial sexual exploitation (as proxied by the data sets we are using) is least prevalent in coun...

  6. Impact of tidal phenomenon “Met Ef” on the exploitation of benthos at inshore shoals in Kei islands, Indonesia

    Science.gov (United States)

    Renjaan, Eugenius Alfred; Makailipessy, Marvin Mario

    2017-10-01

    A study on benthos exploitation at five shoals located in Rosenberg and Nerong Straits, the kei islands had been conducted during period of the lowest ebb tide phenomenon which locally termed Met Ef on 2016. The purpose of the study is to know the impact of the Met Ef on benthos exploitation at the shoals by local communities during the Met Ef. Data of tidal amplitudes were obtained from the Tide Charts Mobile Applications which confirmed the observations on tide pole during October, November, and December 2013 until 2016. Data of benthos exploited during periods of Met Ef at the shoals was obtained through direct observation on benthos exploited by the local communities, also by interviewing them using questionnaires. The results showed that the lowest ebb tide of the Met Ef occurred in November, i.e., at 2 to 5 days after the full moon and/or new moon, with an average tidal range of 2.66 m and even have ever one reached 2.80 m. The most exploited benthos at the shoals is Giant clam (Tridacna sp.), Spider conch (Lambis sp.), Hammer oyster (Malleus sp.), Octopus (Octopus spp.). The intensity of benthos exploited at the shoals increased during the period of Met Ef especially in October because at that time the sea was very calm and clear due to relatively lower wind speed and the rain fall was relatively lower. This has promoted an easier accessibility of the communities to exploit benthos at shoals and, therefore October is considered by the local communities as the peak of Met Ef, instead of November. During November and, December the availability of benthos in shoals has been reduced due to it has been exploited intensely in October.

  7. Causation and Effectuation Processes: Opportunity Discovery and Exploitation Logics of Habitual Entrepreneurs

    DEFF Research Database (Denmark)

    Müller, Sabine

    2010-01-01

    This study investigates how habitual entrepreneurs (i.e. serial and portfolio entrepreneurs) discover and exploit opportunities, deal with risk and uncertainty, predict or control the future, and plan their businesses based on a causation and effectuation perspective. This study thereby uncovered...... the causation and effectuation logics applied by habitual entrepreneurs with regard to four dimensions of the venture creation: View of the future (VF), Opportunity Discovery (OD), Opportunity Exploitation (OE), and Dealing with Risk (DR). Six habitual entrepreneurs, who had to meet three strictly defined...... criteria, where sampled and case studies performed. The findings clearly indicate that habitual entrepreneurs mainly apply an effectual logic with regards to the four dimensions examined. Some of the more inexperienced habitual entrepreneurs tend to apply both logics, but almost exclusively become...

  8. Intensively exploited Mediterranean aquifers: resilience and proximity to critical points of seawater intrusion

    Science.gov (United States)

    Mazi, K.; Koussis, A. D.; Destouni, G.

    2013-11-01

    We investigate here seawater intrusion in three prominent Mediterranean aquifers that are subject to intensive exploitation and modified hydrologic regimes by human activities: the Nile Delta Aquifer, the Israel Coastal Aquifer and the Cyprus Akrotiri Aquifer. Using a generalized analytical sharp-interface model, we review the salinization history and current status of these aquifers, and quantify their resilience/vulnerability to current and future sea intrusion forcings. We identify two different critical limits of sea intrusion under groundwater exploitation and/or climatic stress: a limit of well intrusion, at which intruded seawater reaches key locations of groundwater pumping, and a tipping point of complete sea intrusion upto the prevailing groundwater divide of a coastal aquifer. Either limit can be reached, and ultimately crossed, under intensive aquifer exploitation and/or climate-driven change. We show that sea intrusion vulnerability for different aquifer cases can be directly compared in terms of normalized intrusion performance curves. The site-specific assessments show that the advance of seawater currently seriously threatens the Nile Delta Aquifer and the Israel Coastal Aquifer. The Cyprus Akrotiri Aquifer is currently somewhat less threatened by increased seawater intrusion.

  9. Intensively exploited Mediterranean aquifers: resilience to seawater intrusion and proximity to critical thresholds

    Science.gov (United States)

    Mazi, K.; Koussis, A. D.; Destouni, G.

    2014-05-01

    We investigate seawater intrusion in three prominent Mediterranean aquifers that are subject to intensive exploitation and modified hydrologic regimes by human activities: the Nile Delta, Israel Coastal and Cyprus Akrotiri aquifers. Using a generalized analytical sharp interface model, we review the salinization history and current status of these aquifers, and quantify their resilience/vulnerability to current and future seawater intrusion forcings. We identify two different critical limits of seawater intrusion under groundwater exploitation and/or climatic stress: a limit of well intrusion, at which intruded seawater reaches key locations of groundwater pumping, and a tipping point of complete seawater intrusion up to the prevailing groundwater divide of a coastal aquifer. Either limit can be reached, and ultimately crossed, under intensive aquifer exploitation and/or climate-driven change. We show that seawater intrusion vulnerability for different aquifer cases can be directly compared in terms of normalized intrusion performance curves. The site-specific assessments show that (a) the intruding seawater currently seriously threatens the Nile Delta aquifer, (b) in the Israel Coastal aquifer the sharp interface toe approaches the well location and (c) the Cyprus Akrotiri aquifer is currently somewhat less threatened by increased seawater intrusion.

  10. Evaluation of hydrochemical changes due to intensive aquifer exploitation: case studies from Mexico.

    Science.gov (United States)

    Esteller, M V; Rodríguez, R; Cardona, A; Padilla-Sánchez, L

    2012-09-01

    The impact of intensive aquifer exploitation has been observed in numerous places around the world. Mexico is a representative example of this problem. In 2010, 101 out of the 653 aquifers recognized in the country, showed negative social, economic, and environmental effects related to intensive exploitation. The environmental effects include, among others, groundwater level decline, subsidence, attenuation, and drying up of springs, decreased river flow, and deterioration of water quality. This study aimed at determining the hydrochemical changes produced by intensive aquifer exploitation and highlighting water quality modifications, taking as example the Valle de Toluca, Salamanca, and San Luis Potosi aquifers in Mexico's highlands. There, elements such as fluoride, arsenic, iron, and manganese have been detected, resulting from the introduction of older groundwater with longer residence times and distinctive chemical composition (regional flows). High concentrations of other elements such as chloride, sulfate, nitrate, and vanadium, as well as pathogens, all related to anthropogenic pollution sources (wastewater infiltration, irrigation return flow, and atmospheric pollutants, among others) were also observed. Some of these elements (nitrate, fluoride, arsenic, iron, and manganese) have shown concentrations above Mexican and World Health Organization drinking water standards.

  11. Key issues for determining the exploitable water resources in a Mediterranean river basin.

    Science.gov (United States)

    Pedro-Monzonís, María; Ferrer, Javier; Solera, Abel; Estrela, Teodoro; Paredes-Arquiola, Javier

    2015-01-15

    One of the major difficulties in water planning is to determine the water availability in a water resource system in order to distribute water sustainably. In this paper, we analyze the key issues for determining the exploitable water resources as an indicator of water availability in a Mediterranean river basin. Historically, these territories are characterized by heavily regulated water resources and the extensive use of unconventional resources (desalination and wastewater reuse); hence, emulating the hydrological cycle is not enough. This analysis considers the Jucar River Basin as a case study. We have analyzed the different possible combinations between the streamflow time series, the length of the simulation period and the reliability criteria. As expected, the results show a wide dispersion, proving the great influence of the reliability criteria used for the quantification and localization of the exploitable water resources in the system. Therefore, it is considered risky to provide a single value to represent the water availability in the Jucar water resource system. In this sense, it is necessary that policymakers and stakeholders make a decision about the methodology used to determine the exploitable water resources in a river basin. Copyright © 2014 Elsevier B.V. All rights reserved.

  12. Exploiting Redundancy in an OFDM SDR Receiver

    Directory of Open Access Journals (Sweden)

    Tomas Palenik

    2009-01-01

    Full Text Available Common OFDM system contains redundancy necessary to mitigate interblock interference and allows computationally effective single-tap frequency domain equalization in receiver. Assuming the system implements an outer error correcting code and channel state information is available in the receiver, we show that it is possible to understand the cyclic prefix insertion as a weak inner ECC encoding and exploit the introduced redundancy to slightly improve error performance of such a system. In this paper, an easy way to implement modification to an existing SDR OFDM receiver is presented. This modification enables the utilization of prefix redundancy, while preserving full compatibility with existing OFDM-based communication standards.

  13. Using choice architecture to exploit a university Distinct Urban Mine.

    Science.gov (United States)

    Pierron, Xavier; Williams, Ian D; Shaw, Peter J; Cleaver, Victoria

    2017-10-01

    There are widespread concerns regarding the potential future scarcity of ferrous and non-ferrous materials. However, there are already potentially rich reserves of secondary materials via high ownership of Electrical and Electronic Equipment (EEE) in economically-developed nations. Young people are particularly high consumers of EEE, thus university students and campuses may present an opportunity to harness this potential. University Distinct Urban Mines (DUM) may be used to exemplify how potential reserves of secondary metals may be exploited, and could contribute to the transition from a linear to a circular economy. This study aimed to evaluate small household appliances (SHA) DUM from a UK university, with the objectives to identify and quantify student households' SHA ownership, WEEE recycling, stockpiling and discarding habits amongst student households, assess and evaluate the monetary potential of SHA DUM at UK level, and propose methods to exploit DUM for universities in the UK. To this purpose, a quantitative survey was undertaken to measure students' ownership and discarding behaviour with respect to SHA. The amounts of ferrous and non-ferrous materials were then estimated and converted to monetary values from secondary materials market data to appraise the SHA DUM overall value. Thirty-five per cent of SHA are discarded in the general refuse. Broken personal care appliances (PCA) tend to be discarded due to hygiene and small size factors. When in working order, SHA tend to be equally reused, recycled or stockpiled. We conclude that a total of 189 tonnes of ferrous and non-ferrous materials were available via discarding or being stockpiled at the University of Southampton. Extrapolated to UK higher education level, discarded and stockpiled SHA represent a potential worth ∼USD 11 million. To initiate DUM exploitation within Higher Education campuses, we suggest improving users' choice architecture by providing collection methods specific to broken SHA

  14. Exploiting Child-Robot Aesthetic Interaction for a Social Robot

    OpenAIRE

    Lee, Jae-Joon; Kim, Dae-Won; Kang, Bo-Yeong

    2012-01-01

    A social robot interacts and communicates with humans by using the embodied knowledge gained from interactions with its social environment. In recent years, emotion has emerged as a popular concept for designing social robots. Several studies on social robots reported an increase in robot sociability through emotional imitative interactions between the robot and humans. In this paper conventional emotional interactions are extended by exploiting the aesthetic theories that the sociability of ...

  15. D6.7 BRAIN deliverable: Final dissemination, use, and exploitation plan

    NARCIS (Netherlands)

    Garcia Molina, G.

    2012-01-01

    The dissemination and exploitation strategies of BRAIN are reportedin this document. Dissemination activities included maintaining theproject website http://www.brain-project.org/, demonstrating BRAIN’sBCI system at large events such as Hannover fair 2010 and CeBIT 2011, drawing media attention on

  16. Proba-V Mission Exploitation Platform

    Science.gov (United States)

    Goor, E.

    2017-12-01

    VITO and partners developed the Proba-V Mission Exploitation Platform (MEP) as an end-to-end solution to drastically improve the exploitation of the Proba-V (an EC Copernicus contributing mission) EO-data archive, the past mission SPOT-VEGETATION and derived vegetation parameters by researchers, service providers (e.g. the EC Copernicus Global Land Service) and end-users. The analysis of time series of data (PB range) is addressed, as well as the large scale on-demand processing of near real-time data on a powerful and scalable processing environment. New features are still developed, but the platform is yet fully operational since November 2016 and offers A time series viewer (browser web client and API), showing the evolution of Proba-V bands and derived vegetation parameters for any country, region, pixel or polygon defined by the user. Full-resolution viewing services for the complete data archive. On-demand processing chains on a powerfull Hadoop/Spark backend. Virtual Machines can be requested by users with access to the complete data archive mentioned above and pre-configured tools to work with this data, e.g. various toolboxes and support for R and Python. This allows users to immediately work with the data without having to install tools or download data, but as well to design, debug and test applications on the platform. Jupyter Notebooks is available with some examples python and R projects worked out to show the potential of the data. Today the platform is already used by several international third party projects to perform R&D activities on the data, and to develop/host data analysis toolboxes. From the Proba-V MEP, access to other data sources such as Sentinel-2 and landsat data is also addressed. Selected components of the MEP are also deployed on public cloud infrastructures in various R&D projects. Users can make use of powerful Web based tools and can self-manage virtual machines to perform their work on the infrastructure at VITO with access to

  17. Optimizing Search and Ranking in Folksonomy Systems by Exploiting Context Information

    Science.gov (United States)

    Abel, Fabian; Henze, Nicola; Krause, Daniel

    Tagging systems enable users to annotate resources with freely chosen keywords. The evolving bunch of tag assignments is called folksonomy and there exist already some approaches that exploit folksonomies to improve resource retrieval. In this paper, we analyze and compare graph-based ranking algorithms: FolkRank and SocialPageRank. We enhance these algorithms by exploiting the context of tags, and evaluate the results on the GroupMe! dataset. In GroupMe!, users can organize and maintain arbitrary Web resources in self-defined groups. When users annotate resources in GroupMe!, this can be interpreted in context of a certain group. The grouping activity itself is easy for users to perform. However, it delivers valuable semantic information about resources and their context. We present GRank that uses the context information to improve and optimize the detection of relevant search results, and compare different strategies for ranking result lists in folksonomy systems.

  18. Viability study of cold generation from biomass in an agrarian exploitation

    Energy Technology Data Exchange (ETDEWEB)

    Ganan Gomez, J.; Gonzalez, J.F.; Roman, S. [Departamento Ingenieria Quimica y Energetica, E II, Universidad de Extremadura, Avda, Elvas s/n, 06071 Badajoz (Spain); Miranda, A. [Departamento Eng, Electromecanica, Universidade da Beira Interior, 6201-001 Covilha (Portugal); Turegano, J.P. [Esc. Sup. de Tecnologia e Gestao, Instituto Politecnico de Portalegre, 7300 Portalegre (Portugal)

    2006-01-15

    In this work the performance of a cold production plant using biomass residuals from an agrarian exploitation as the primary energy source is analyzed. These residuals are generated in the pruning and renovation of fruit trees and are used in a boiler to convey heat to an absorption refrigeration engine. At first the study carries out the characterization and quantification of the energy produced by the residuals. Furthermore, it ponders on the viability analysis of converting that energy in cold by means of an absorption machine. The estimated thermal power sourced from the biomass generated in the exploitation (approx. 4216 ton) is of approximately 56.92x10{sup 6} MJ/year. This energy was shown to be greater than that required to keep the fruits at a suitable low temperature, thus obviating the use of conventional refrigeration and avoiding their associated high energy consumption. (author)

  19. The problems of over exploitation of aquifers in semi-arid areas: characteristics and proposals for mitigation

    International Nuclear Information System (INIS)

    Rodriguez-Estrella, T.

    2014-01-01

    This article presents a general analysis of the problems arising from overexploited aquifers in semi-arid areas, based on research carried out in the Region of Murcia (one of the most over-exploited areas in Europe). Among the negative impacts of this over exploitation are: the drying up of springs, the continuous drawdown of water levels (up to 10 m/y), piezo metric drops (over 30 m in one year if it is a karstic aquifer), an increase in pumping costs (elevating water from a depth of more than 450 m), abandonment of wells, diminishing groundwater reserves, deteriorating water quality, presence of CO 2 , compartmentalizing of aquifers, etc. A series of internal measures is proposed to alleviate the over exploitation of the region. (Author)

  20. The problems of over exploitation of aquifers in semi-arid areas: characteristics and proposals for mitigation

    Energy Technology Data Exchange (ETDEWEB)

    Rodriguez-Estrella, T.

    2014-06-01

    This article presents a general analysis of the problems arising from overexploited aquifers in semi-arid areas, based on research carried out in the Region of Murcia (one of the most over-exploited areas in Europe). Among the negative impacts of this over exploitation are: the drying up of springs, the continuous drawdown of water levels (up to 10 m/y), piezo metric drops (over 30 m in one year if it is a karstic aquifer), an increase in pumping costs (elevating water from a depth of more than 450 m), abandonment of wells, diminishing groundwater reserves, deteriorating water quality, presence of CO{sub 2}, compartmentalizing of aquifers, etc. A series of internal measures is proposed to alleviate the over exploitation of the region. (Author)

  1. Exploiting similarity in turbulent shear flows for turbulence modeling

    Science.gov (United States)

    Robinson, David F.; Harris, Julius E.; Hassan, H. A.

    1992-12-01

    It is well known that current k-epsilon models cannot predict the flow over a flat plate and its wake. In an effort to address this issue and other issues associated with turbulence closure, a new approach for turbulence modeling is proposed which exploits similarities in the flow field. Thus, if we consider the flow over a flat plate and its wake, then in addition to taking advantage of the log-law region, we can exploit the fact that the flow becomes self-similar in the far wake. This latter behavior makes it possible to cast the governing equations as a set of total differential equations. Solutions of this set and comparison with measured shear stress and velocity profiles yields the desired set of model constants. Such a set is, in general, different from other sets of model constants. The rational for such an approach is that if we can correctly model the flow over a flat plate and its far wake, then we can have a better chance of predicting the behavior in between. It is to be noted that the approach does not appeal, in any way, to the decay of homogeneous turbulence. This is because the asymptotic behavior of the flow under consideration is not representative of the decay of homogeneous turbulence.

  2. Exploiting similarity in turbulent shear flows for turbulence modeling

    Science.gov (United States)

    Robinson, David F.; Harris, Julius E.; Hassan, H. A.

    1992-01-01

    It is well known that current k-epsilon models cannot predict the flow over a flat plate and its wake. In an effort to address this issue and other issues associated with turbulence closure, a new approach for turbulence modeling is proposed which exploits similarities in the flow field. Thus, if we consider the flow over a flat plate and its wake, then in addition to taking advantage of the log-law region, we can exploit the fact that the flow becomes self-similar in the far wake. This latter behavior makes it possible to cast the governing equations as a set of total differential equations. Solutions of this set and comparison with measured shear stress and velocity profiles yields the desired set of model constants. Such a set is, in general, different from other sets of model constants. The rational for such an approach is that if we can correctly model the flow over a flat plate and its far wake, then we can have a better chance of predicting the behavior in between. It is to be noted that the approach does not appeal, in any way, to the decay of homogeneous turbulence. This is because the asymptotic behavior of the flow under consideration is not representative of the decay of homogeneous turbulence.

  3. Exploiting Software Tool Towards Easier Use And Higher Efficiency

    Science.gov (United States)

    Lin, G. H.; Su, J. T.; Deng, Y. Y.

    2006-08-01

    In developing countries, using data based on instrument made by themselves in maximum extent is very important. It is not only related to maximizing science returns upon prophase investment -- deep accumulations in every aspects but also science output. Based on the idea, we are exploiting a software (called THDP: Tool of Huairou Data Processing). It is used for processing a series of issues, which is met necessary in processing data. This paper discusses its designed purpose, functions, method and specialities. The primary vehicle for general data interpretation is through various techniques of data visualization, techniques of interactive. In the software, we employed Object Oriented approach. It is appropriate to the vehicle. it is imperative that the approach provide not only function, but do so in as convenient a fashion as possible. As result of the software exploiting, it is not only easier to learn data processing for beginner and more convenienter to need further improvement for senior but also increase greatly efficiency in every phrases include analyse, parameter adjusting, result display. Under frame of virtual observatory, for developing countries, we should study more and newer related technologies, which can advance ability and efficiency in science research, like the software we are developing

  4. Evidence from the past: exploitation as cause of commercial extinction of autumn-spawning herring in the Gulf of Riga, Baltic Sea

    DEFF Research Database (Denmark)

    MacKenzie, Brian R; Ojaveer, Henn

    2018-01-01

    Historical marine ecology has shown that many exploited animal populations declined before their abundance was quantified by scientists. This situation applies for autumn-spawning herring (Clupea harengus) in the Baltic Sea. This stock used to be the dominant spawning group of herring in the early...... and biological data and conduct population development simulations to evaluate the hypothesis that exploitation may have been sufficient to lead the stock towards commercial extinction. We found that the estimated exploitation pattern, including exploitation of juveniles, was unsustainable and led to stock...

  5. Human exploitation and benthic community structure on a tropical intertidal mudflat

    NARCIS (Netherlands)

    Boer, de W.F.; Prins, H.H.T.

    2002-01-01

    Human exploitation of intertidal marine invertebrates is known to alter benthic community structure. This study describes the impact that harvesting by women and children has on the intertidal community structure of the mudflats of the Saco on Inhaca Island, Mozambique, by comparing the benthic

  6. Fully Exploiting The Potential Of The Periodic Table Through Pattern Recognition.

    Science.gov (United States)

    Schultz, Emeric

    2005-01-01

    An approach to learning chemical facts that starts with the periodic table and depends primarily on recognizing and completing patterns and following a few simple rules is described. This approach exploits the exceptions that arise and uses them as opportunities for further concept development.

  7. The Trauma of Commercial Sexual Exploitation of Youth: A Comparison of CSE Victims to Sexual Abuse Victims in a Clinical Sample.

    Science.gov (United States)

    Cole, Jennifer; Sprang, Ginny; Lee, Robert; Cohen, Judith

    2016-01-01

    This study examined the demographic features, trauma profiles, clinical severity indicators, problem behaviors, and service utilization characteristics of youth victims of commercial sexual exploitation (CSE) compared with a matched sample of sexually abused/assaulted youth who were not exploited in commercial sex. Secondary data analysis and propensity score matching were used to select a sample of 215 help-seeking youth who were exploited in prostitution (n = 43) or who were sexually abused/assaulted but not exploited in prostitution (n = 172) from the National Child Traumatic Stress Network Core Data Set (NCTSN CDS). Propensity Score Matching was used to select a comparison sample based on age, race, ethnicity, and primary residence. Statistically significant differences were noted between the groups on standardized (e.g., UCLA Posttraumatic Stress Disorder Reaction Index [PTSD-RI], Child Behavior Checklist [CBCL]) and other measures of emotional and behavioral problems (e.g., avoidance and hyperarousal symptoms, dissociation, truancy, running away, conduct disorder, sexualized behaviors, and substance abuse). This study provides useful insight into the symptom and service utilization profiles of youth exploited in commercial sex as compared with youth with other types of sexually exploitive experiences. Targeted screening and event-sensitive measures are recommended to more accurately identify youth exploited in commercial sex. More research is needed to determine if and what modifications to trauma therapies may be required to address the more severe symptomatology and behavior problems associated with youth exploited in commercial sex. © The Author(s) 2014.

  8. Exploiting water versus tolerating drought: water-use strategies of trees in a secondary successional tropical dry forest

    Science.gov (United States)

    Fernando Pineda-García; Horacio Paz; Frederick C. Meinzer; Guillermo Angeles; Guillermo Goldstein

    2015-01-01

    In seasonal plant communities where water availability changes dramatically both between and within seasons, understanding the mechanisms that enable plants to exploit water pulses and to survive drought periods is crucial. By measuring rates of physiological processes, we examined the trade-off between water exploitation and drought tolerance among seedlings of trees...

  9. Flavins contained in yeast extract are exploited for anodic electron transfer by Lactococcus lactis.

    Science.gov (United States)

    Masuda, Masaki; Freguia, Stefano; Wang, Yung-Fu; Tsujimura, Seiya; Kano, Kenji

    2010-06-01

    Cyclic voltammograms of yeast extract-containing medium exhibit a clear redox peak around -0.4V vs. Ag|AgCl. Fermentative bacterium Lactococcus lactis was hereby shown to exploit this redox compound for extracellular electron transfer towards a graphite anode using glucose as an electron donor. High performance liquid chromatography revealed that this may be a flavin-type compound. The ability of L. lactis to exploit exogenous flavins for anodic glucose oxidation was confirmed by tests where flavin-type compounds were supplied to the bacterium in well defined media. Based on its mid-point potential, riboflavin can be regarded as a near-optimal mediator for microbially catalyzed anodic electron transfer. Riboflavin derivative flavin mononucleotide (FMN) was also exploited by L. lactis as a redox shuttle, unlike flavin adenine dinucleotide (FAD), possibly due to the absence of a specific transporter for the latter. The use of yeast extract in microbial fuel cell media is herein discouraged based on the related unwanted artificial addition of redox mediators which may distort experimental results. Copyright 2009 Elsevier B.V. All rights reserved.

  10. Exploiting short-term memory in soft body dynamics as a computational resource.

    Science.gov (United States)

    Nakajima, K; Li, T; Hauser, H; Pfeifer, R

    2014-11-06

    Soft materials are not only highly deformable, but they also possess rich and diverse body dynamics. Soft body dynamics exhibit a variety of properties, including nonlinearity, elasticity and potentially infinitely many degrees of freedom. Here, we demonstrate that such soft body dynamics can be employed to conduct certain types of computation. Using body dynamics generated from a soft silicone arm, we show that they can be exploited to emulate functions that require memory and to embed robust closed-loop control into the arm. Our results suggest that soft body dynamics have a short-term memory and can serve as a computational resource. This finding paves the way towards exploiting passive body dynamics for control of a large class of underactuated systems. © 2014 The Author(s) Published by the Royal Society. All rights reserved.

  11. Exploitation and Utilization of Oilfield Geothermal Resources in China

    OpenAIRE

    Shejiao Wang; Jiahong Yan; Feng Li; Junwen Hu; Kewen Li

    2016-01-01

    Geothermal energy is a clean, green renewable resource, which can be utilized for power generation, heating, cooling, and could effectively replace oil, gas, and coal. In recent years, oil companies have put more efforts into exploiting and utilizing geothermal energy with advanced technologies for heat-tracing oil gathering and transportation, central heating, etc., which has not only reduced resource waste, but also improved large-scale and industrial resource utilization levels, and has ac...

  12. Endangered Species and Natural Resource Exploitation: Extinction vs. Coexistence

    OpenAIRE

    Tsur, Yacov; Zemel, Amos

    1994-01-01

    The threat on the survival of animal species due to intensive use of natural resources is incorporated within resource management models, paying special attention to uncertainty regarding the conditions that lead to extinction. The manner in which the potential benefits forgone due to the species extinction (denoted extinction penalty) induce more conservative exploitation policies is studied in detail. When the extinction penalty is ignored, the optimal policy is to drive the resource stock ...

  13. Liking and hyperlinking: Community detection in online child sexual exploitation networks.

    Science.gov (United States)

    Westlake, Bryce G; Bouchard, Martin

    2016-09-01

    The online sexual exploitation of children is facilitated by websites that form virtual communities, via hyperlinks, to distribute images, videos, and other material. However, how these communities form, are structured, and evolve over time is unknown. Collected using a custom-designed webcrawler, we begin from known child sexual exploitation (CE) seed websites and follow hyperlinks to connected, related, websites. Using a repeated measure design we analyze 10 networks of 300 + websites each - over 4.8 million unique webpages in total, over a period of 60 weeks. Community detection techniques reveal that CE-related networks were dominated by two large communities hosting varied material -not necessarily matching the seed website. Community stability, over 60 weeks, varied across networks. Reciprocity in hyperlinking between community members was substantially higher than within the full network, however, websites were not more likely to connect to homogeneous-content websites. Copyright © 2016 Elsevier Inc. All rights reserved.

  14. Balancing exploration and exploitation in transferring research into practice: a comparison of five knowledge translation entity archetypes.

    Science.gov (United States)

    Oborn, Eivor; Barrett, Michael; Prince, Karl; Racko, Girts

    2013-09-05

    Translating knowledge from research into clinical practice has emerged as a practice of increasing importance. This has led to the creation of new organizational entities designed to bridge knowledge between research and practice. Within the UK, the Collaborations for Leadership in Applied Health Research and Care (CLAHRC) have been introduced to ensure that emphasis is placed in ensuring research is more effectively translated and implemented in clinical practice. Knowledge translation (KT) can be accomplished in various ways and is affected by the structures, activities, and coordination practices of organizations. We draw on concepts in the innovation literature--namely exploration, exploitation, and ambidexterity--to examine these structures and activities as well as the ensuing tensions between research and implementation. Using a qualitative research approach, the study was based on 106 semi-structured, in-depth interviews with the directors, theme leads and managers, key professionals involved in research and implementation in nine CLAHRCs. Data was also collected from intensive focus group workshops. In this article we develop five archetypes for organizing KT. The results show how the various CLAHRC entities work through partnerships to create explorative research and deliver exploitative implementation. The different archetypes highlight a range of structures that can achieve ambidextrous balance as they organize activity and coordinate practice on a continuum of exploration and exploitation. This work suggests that KT entities aim to reach their goals through a balance between exploration and exploitation in the support of generating new research and ensuring knowledge implementation. We highlight different organizational archetypes that support various ways to maintain ambidexterity, where both exploration and exploitation are supported in an attempt to narrow the knowledge gaps. The KT entity archetypes offer insights on strategies in structuring

  15. The Peace and Power Conceptual Model: An Assessment Guide for School Nurses Regarding Commercial Sexual Exploitation of Children.

    Science.gov (United States)

    Fraley, Hannah E; Aronowitz, Teri

    2017-10-01

    Human trafficking is a global problem; more than half of all victims are children. In the United States (US), at-risk youth continue to attend school. School nurses are on the frontlines, presenting a window of opportunity to identify and prevent exploitation. Available papers targeting school nurses report that school nurses may lack awareness of commercial sexual exploitation and may have attitudes and misperceptions about behaviors of school children at risk. This is a theoretical paper applying the Peace and Power Conceptual Model to understand the role of school nurses in commercial sexual exploitation of children.

  16. Stagnation of the exploitation of Al ores and the depression of world prices of Al

    Directory of Open Access Journals (Sweden)

    Slavkovský Jozef

    1999-03-01

    Full Text Available In the contribution, data on Al – a metal of the 20th century are compiled together with the problems of genesis of the Al mineral raw ma-terials as well as types of bauxite and Al-laterite deposits. Furthermore, an overview of the world exploitation of bauxite during 1935-1980 is given along with the prognoses to 2000 and present situation (1992-1996. Overviews of the production of Al follows, providing its rela-tion to the bauxite exploitation. Contrary to the prognoses, a stabilization or stagnation has been observed in the exploitation of bauxite and production of Al during nineties, which a tendency is directly reflected in the world price of this commodity. When analyzing the Al prices for a longer period, some serious deviations can be noticed, that however presently represent a long-term minimum. We hope the stagnation of the production and the price decline are only temporary and new possibilities of the utilization of Al will be found soon.

  17. Managing Organizational Tensions: A Multi-Level Perspective on Exploration, Exploitation and Ambidexterity

    NARCIS (Netherlands)

    S.P.L. Fourné (Sebastian)

    2014-01-01

    markdownabstract__Abstract__ "This dissertation draws on organizational learning and paradox theory to develop fine-grained insights at the individual, unit, and organizational level that contribute to the theoretical development of the exploration-exploitation framework. The four studies

  18. Purposeful Collections: Exploiting the Potential of Children's Literature in the Classroom

    Science.gov (United States)

    Boyd, Maureen; Montgomery, Lydia; Paterson, Devon; Schrag, Jolene

    2006-01-01

    Purposefully selected collections of literature can extend, contrast or illuminate an experience or perspective to effectively exploit the potential of children's literature to shape curriculum and engage student learning. This paper offers a practical framework for creating purposeful collections of literature. As an illustration of this process,…

  19. Measuring Sandy Bottom Dynamics by Exploiting Depth from Stereo Video Sequences

    DEFF Research Database (Denmark)

    Musumeci, Rosaria E.; Farinella, Giovanni M.; Foti, Enrico

    2013-01-01

    In this paper an imaging system for measuring sandy bottom dynamics is proposed. The system exploits stereo sequences and projected laser beams to build the 3D shape of the sandy bottom during time. The reconstruction is used by experts of the field to perform accurate measurements and analysis...

  20. Exploration and exploitation in innovation systems : the case of pharmaceutical biotechnology

    NARCIS (Netherlands)

    Gilsing, V.A.; Nooteboom, B.

    2006-01-01

    Abstract This paper develops a theoretical framework for an explanation of how exploitation and exploration build on each other, in a ‘cycle of discovery’, developed in earlier research. The framework is tested empirically, in the sense of seeing whether it can help to reconstruct and understand the

  1. 129 Durabilité agro-écologique des exploitations agricoles dans la ...

    African Journals Online (AJOL)

    User

    durabilité alors que la composante «organisation de l'espace» constitue un facteur limitant. ... la performance agro-écologique de l'exploitation agricole, à un moment ... Pour mener cette étude, deux types de données ont été nécessaires : les ...

  2. Geodetic monitoring (TLS of a steel transport trestle bridge located in an active mining exploitation site

    Directory of Open Access Journals (Sweden)

    Skoczylas Arkadiusz

    2016-09-01

    Full Text Available Underground mining exploitation causes, in general, irregular vertical and horizontal shifts in the superficial layer of the rock mass. In the case of construction objects seated on this layer, a deformation of the object’s foundation can be observed. This leads to additional loads and deformations. Identification of surface geometry changes in construction objects located within the premises of underground mining exploitation areas is an important task as far as safety of mining sites is concerned. Surveys targeting shifts and deformations in engineering objects preformed with the use of classic methods are of a selective nature and do not provide the full image of the phenomenon being the subject of the observation. This paper presents possibilities of terrestrial laser scanning technology application in the monitoring of engineering objects that allows for a complete spatial documentation of an object subjected to the influence of an active mining exploitation. This paper describes an observation of a 100 m section of a steel transport trestle bridge located on the premises of hard coal mine Lubelski Węgiel “Bogdanka” S.A. carried out in 2015. Measurements were carried out using a Z+F Imager 5010C scanner at an interval of 3.5 months. Changes in the structure’s geometry were determined by comparing the point clouds recorded during the two measurement periods. The results of the analyses showed shifts in the trestle bridge towards the exploited coal wall accompanied by object deformation. The obtained results indicate the possibility of of terrestrial laser scanning application in studying the aftereffects of underground mining exploitation on surface engineering objects.

  3. JPEG2000-coded image error concealment exploiting convex sets projections.

    Science.gov (United States)

    Atzori, Luigi; Ginesu, Giaime; Raccis, Alessio

    2005-04-01

    Transmission errors in JPEG2000 can be grouped into three main classes, depending on the affected area: LL, high frequencies at the lower decomposition levels, and high frequencies at the higher decomposition levels. The first type of errors are the most annoying but can be concealed exploiting the signal spatial correlation like in a number of techniques proposed in the past; the second are less annoying but more difficult to address; the latter are often imperceptible. In this paper, we address the problem of concealing the second class or errors when high bit-planes are damaged by proposing a new approach based on the theory of projections onto convex sets. Accordingly, the error effects are masked by iteratively applying two procedures: low-pass (LP) filtering in the spatial domain and restoration of the uncorrupted wavelet coefficients in the transform domain. It has been observed that a uniform LP filtering brought to some undesired side effects that negatively compensated the advantages. This problem has been overcome by applying an adaptive solution, which exploits an edge map to choose the optimal filter mask size. Simulation results demonstrated the efficiency of the proposed approach.

  4. Exploitation of the bloc 17: development schemes for Rosa-Lirio; L'exploitation du bloc 17: des schemas de developpement pour Rosa-Lirio

    Energy Technology Data Exchange (ETDEWEB)

    Legros, E.

    2002-12-01

    New developments are expected on the prolific bloc 17 of the Angola offshore. Among the tenth of discoveries that followed the discovery of the Girassol giant field, TotalFinaElf initially selected the Dalia field, for which engineering studies started in December 2000. However, it is still not excluded that the development of the Rosa-Lirio field will start first. This article describes the specific characteristics of this field and the solutions proposed for its exploitation. (J.S.)

  5. The cost of being valuable: predictors of extinction risk in marine invertebrates exploited as luxury seafood

    OpenAIRE

    Purcell, Steven W.; Polidoro, Beth A.; Hamel, Jean-François; Gamboa, Ruth U.; Mercier, Annie

    2014-01-01

    Extinction risk has been linked to biological and anthropogenic variables. Prediction of extinction risk in valuable fauna may not follow mainstream drivers when species are exploited for international markets. We use results from an International Union for Conservation of Nature Red List assessment of extinction risk in all 377 known species of sea cucumber within the order Aspidochirotida, many of which are exploited worldwide as luxury seafood for Asian markets. Extinction risk was primari...

  6. Exploitation of natural resources and conflict in Colombia

    Directory of Open Access Journals (Sweden)

    Luis Eduardo Sandoval

    2017-11-01

    Full Text Available Colombia has increasingly been specializing in the extraction of mineral and energy resources such as gold, coal, oil and ferronickel. These activities, in the context of state weakness, have engendered conflicts of different dimensions. This paper proposes an indicator of conflict related to mineral exploitation that classifies five dimensions of conflict: social, economic, cultural, political and environmental. The aggregate indicator shows that murders, displacement of Afrodescendent populations, flooding, pollution, fires, infant mortality, coca crops and sexual offenses are highly and positively correlated with the number of conflicts.

  7. Exploiting first-class arrays in Fortran for accelerator programming

    International Nuclear Information System (INIS)

    Rasmussen, Craig E.; Weseloh, Wayne N.; Robey, Robert W.; Sottile, Matthew J.; Quinlan, Daniel; Overbey, Jeffrey

    2010-01-01

    Emerging architectures for high performance computing often are well suited to a data parallel programming model. This paper presents a simple programming methodology based on existing languages and compiler tools that allows programmers to take advantage of these systems. We will work with the array features of Fortran 90 to show how this infrequently exploited, standardized language feature is easily transformed to lower level accelerator code. Our transformations are based on a mapping from Fortran 90 to C++ code with OpenCL extensions. The sheer complexity of programming for clusters of many or multi-core processors with tens of millions threads of execution make the simplicity of the data parallel model attractive. Furthermore, the increasing complexity of todays applications (especially when convolved with the increasing complexity of the hardware) and the need for portability across hardware architectures make a higher-level and simpler programming model like data parallel attractive. The goal of this work has been to exploit source-to-source transformations that allow programmers to develop and maintain programs at a high-level of abstraction, without coding to a specific hardware architecture. Furthermore these transformations allow multiple hardware architectures to be targeted without changing the high-level source. It also removes the necessity for application programmers to understand details of the accelerator architecture or to know OpenCL.

  8. Child trafficking and commercial sexual exploitation: a review of promising prevention policies and programs.

    Science.gov (United States)

    Rafferty, Yvonne

    2013-10-01

    Child trafficking, including commercial sexual exploitation (CSE), is one of the fastest growing and most lucrative criminal activities in the world. The global enslavement of children affects countless numbers of victims who are trafficked within their home countries or transported away from their homes and treated as commodities to be bought, sold, and resold for labor or sexual exploitation. All over the world, girls are particularly likely to be trafficked into the sex trade: Girls and women constitute 98% of those who are trafficked for CSE. Health and safety standards in exploitative settings are generally extremely low, and the degree of experienced violence has been linked with adverse physical, psychological, and social-emotional development. The human-rights-based approach to child trafficking provides a comprehensive conceptual framework whereby victim-focused and law enforcement responses can be developed, implemented, and evaluated. This article highlights promising policies and programs designed to prevent child trafficking and CSE by combating demand for sex with children, reducing supply, and strengthening communities. The literature reviewed includes academic publications as well as international and governmental and nongovernmental reports. Implications for social policy and future research are presented. © 2013 American Orthopsychiatric Association.

  9. Guest Editorial: The Exploitation of the Black Athlete: Some Alternative Solutions.

    Science.gov (United States)

    Sailes, Gary A.

    1986-01-01

    At the cost of losing the chance to develop nonathletic marketable skills, Black athletes allow themselves to be exploited in the hopes of gaining stardom and wealth. Mass media, sports heroes, and peer pressure can help athletes channel their field talent into the classroom. Some successful high school programs are described. (PS)

  10. Context-aware System Service Call-oriented Symbolic Execution of Android Framework with Application to Exploit Generation

    OpenAIRE

    Luo, Lannan; Zeng, Qiang; Cao, Chen; Chen, Kai; Liu, Jian; Liu, Limin; Gao, Neng; Yang, Min; Xing, Xinyu; Liu, Peng

    2016-01-01

    Android Framework is a layer of software that exists in every Android system managing resources of all Android apps. A vulnerability in Android Framework can lead to severe hacks, such as destroying user data and leaking private information. With tens of millions of Android devices unpatched due to Android fragmentation, vulnerabilities in Android Framework certainly attract attackers to exploit them. So far, enormous manual effort is needed to craft such exploits. To our knowledge, no resear...

  11. Exploring, exploiting and evolving diversity of aquatic ecosystem models: a community perspective

    NARCIS (Netherlands)

    Janssen, A.B.G.; Gerla, D.J.

    2015-01-01

    Here, we present a community perspective on how to explore, exploit and evolve the diversity in aquatic ecosystem models. These models play an important role in understanding the functioning of aquatic ecosystems, filling in observation gaps and developing effective strategies for water quality

  12. Effect of habitat productivity and exploitation on populations with complex life cycles

    NARCIS (Netherlands)

    Wolfshaar, van de K.E.; Hille Ris Lambers, R.; Gardmark, A.

    2011-01-01

    In this paper we study the consequences of habitat switching and the corresponding ontogenetic diet shifts between adult and juvenile life stages for harvesting and management of exploited populations using a consumer-resource model with stage-specific mortality. Specifically, we study how

  13. Sherlockology and Galactica.tv: Fan sites as gifts or exploited labor?

    Directory of Open Access Journals (Sweden)

    Bertha Chin

    2014-03-01

    Full Text Available Current scholarship on fandom has been preoccupied with examining the changing relationship between media industry professionals and fans. Media producers, celebrities, and industry insiders are increasingly establishing contact with fans, bypassing traditional media entertainment outlets to provide them with information directly. This contact is facilitated by social media networks. Fans serve as grassroots campaigners, promoters, and sometimes even public relations officers, acting as liaisons between media producers, celebrities, or industry insiders and fandom in general. In doing so, they take on roles traditionally fulfilled by professional PR and marketing personnel, and they do it for free, resulting in accusations that they are being exploited for their labor. However, fans do not necessarily view themselves as being exploited. We need to consider the possibility that they may regard their contributions as a service—or gift—to fandom. In examining the roles played by two popular fan sites, Sherlockology and Galactica.tv, I propose to examine how fan labor may be considered an act of gift giving in fandom.

  14. Comparison of Spatiotemporal Mapping Techniques for Enormous Etl and Exploitation Patterns

    Science.gov (United States)

    Deiotte, R.; La Valley, R.

    2017-10-01

    The need to extract, transform, and exploit enormous volumes of spatiotemporal data has exploded with the rise of social media, advanced military sensors, wearables, automotive tracking, etc. However, current methods of spatiotemporal encoding and exploitation simultaneously limit the use of that information and increase computing complexity. Current spatiotemporal encoding methods from Niemeyer and Usher rely on a Z-order space filling curve, a relative of Peano's 1890 space filling curve, for spatial hashing and interleaving temporal hashes to generate a spatiotemporal encoding. However, there exist other space-filling curves, and that provide different manifold coverings that could promote better hashing techniques for spatial data and have the potential to map spatiotemporal data without interleaving. The concatenation of Niemeyer's and Usher's techniques provide a highly efficient space-time index. However, other methods have advantages and disadvantages regarding computational cost, efficiency, and utility. This paper explores the several methods using a range of sizes of data sets from 1K to 10M observations and provides a comparison of the methods.

  15. COMPARISON OF SPATIOTEMPORAL MAPPING TECHNIQUES FOR ENORMOUS ETL AND EXPLOITATION PATTERNS

    Directory of Open Access Journals (Sweden)

    R. Deiotte

    2017-10-01

    Full Text Available The need to extract, transform, and exploit enormous volumes of spatiotemporal data has exploded with the rise of social media, advanced military sensors, wearables, automotive tracking, etc. However, current methods of spatiotemporal encoding and exploitation simultaneously limit the use of that information and increase computing complexity. Current spatiotemporal encoding methods from Niemeyer and Usher rely on a Z-order space filling curve, a relative of Peano’s 1890 space filling curve, for spatial hashing and interleaving temporal hashes to generate a spatiotemporal encoding. However, there exist other space-filling curves, and that provide different manifold coverings that could promote better hashing techniques for spatial data and have the potential to map spatiotemporal data without interleaving. The concatenation of Niemeyer’s and Usher’s techniques provide a highly efficient space-time index. However, other methods have advantages and disadvantages regarding computational cost, efficiency, and utility. This paper explores the several methods using a range of sizes of data sets from 1K to 10M observations and provides a comparison of the methods.

  16. Exploiting Microwave Imaging Methods for Real-Time Monitoring of Thermal Ablation

    Directory of Open Access Journals (Sweden)

    Rosa Scapaticci

    2017-01-01

    Full Text Available Microwave thermal ablation is a cancer treatment that exploits local heating caused by a microwave electromagnetic field to induce coagulative necrosis of tumor cells. Recently, such a technique has significantly progressed in the clinical practice. However, its effectiveness would dramatically improve if paired with a noninvasive system for the real-time monitoring of the evolving dimension and shape of the thermally ablated area. In this respect, microwave imaging can be a potential candidate to monitor the overall treatment evolution in a noninvasive way, as it takes direct advantage from the dependence of the electromagnetic properties of biological tissues from temperature. This paper explores such a possibility by presenting a proof of concept validation based on accurate simulated imaging experiments, run with respect to a scenario that mimics an ex vivo experimental setup. In particular, two model-based inversion algorithms are exploited to tackle the imaging task. These methods provide independent results in real-time and their integration improves the quality of the overall tracking of the variations occurring in the target and surrounding regions.

  17. Intensive exploitation of a karst aquifer leads to Cryptosporidium water supply contamination.

    Science.gov (United States)

    Khaldi, S; Ratajczak, M; Gargala, G; Fournier, M; Berthe, T; Favennec, L; Dupont, J P

    2011-04-01

    Groundwater from karst aquifers is an important source of drinking water worldwide. Outbreaks of cryptosporidiosis linked to surface water and treated public water are regularly reported. Cryptosporidium oocysts are resistant to conventional drinking water disinfectants and are a major concern for the water industry. Here, we examined conditions associated with oocyst transport along a karstic hydrosystem, and the impact of intensive exploitation on Cryptosporidium oocyst contamination of the water supply. We studied a well-characterized karstic hydrosystem composed of a sinkhole, a spring and a wellbore. Thirty-six surface water and groundwater samples were analyzed for suspended particulate matter, turbidity, electrical conductivity, and Cryptosporidium and Giardia (oo)cyst concentrations. (Oo)cysts were identified and counted by means of solid-phase cytometry (ChemScan RDI(®)), a highly sensitive method. Cryptosporidium oocysts were detected in 78% of both surface water and groundwater samples, while Giardia cysts were found in respectively 22% and 8% of surface water and groundwater samples. Mean Cryptosporidium oocyst concentrations were 29, 13 and 4/100 L at the sinkhole, spring and wellbore, respectively. Cryptosporidium oocysts were transported from the sinkhole to the spring and the wellbore, with respective release rates of 45% and 14%, suggesting that oocysts are subject to storage and remobilization in karst conduits. Principal components analysis showed that Cryptosporidium oocyst concentrations depended on variations in hydrological forcing factors. All water samples collected during intensive exploitation contained oocysts. Control of Cryptosporidium oocyst contamination during intensive exploitation is therefore necessary to ensure drinking water quality. Copyright © 2011. Published by Elsevier Ltd.

  18. Labour exploitation and health: a case series of men and women seeking post-trafficking services.

    Science.gov (United States)

    Turner-Moss, Eleanor; Zimmerman, Cathy; Howard, Louise M; Oram, Siân

    2014-06-01

    Research on the health of trafficked men and on the health problems associated with trafficking for labor exploitation are extremely limited. This study analysed data from a case series of anonymised case records of a consecutive sample of 35 men and women who had been trafficked for labor exploitation in the UK and who were receiving support from a non-governmental service between June 2009 and July 2010. Over three-quarters of our sample was male (77 %) and two-thirds aged between 18 and 35 years (mean 32.9 years, SD 10.2). Forty percent reported experiencing physical violence while they were trafficked. Eighty-one percent (25/31) reported one or more physical health symptoms. Fifty-seven percent (17/30) reported one or more post-traumatic stress symptoms. A substantial proportion of men and women who are trafficked for labor exploitation may experience violence and abuse, and have physical and mental health symptoms. People who have been trafficked for forced labor need access to medical assessment and treatment.

  19. An Equity Centered Management Approach to Exploiting Sport Employee Productivity

    OpenAIRE

    Schneider, Robert C.

    2017-01-01

    A primary goal ofsport organizations is to exploit employees’ abilities to their fullestcapacities. Sport managers who successfully maximize employee productivity willgreatly increase the chances of achieving the organization’s goals andobjectives. The full potential of sport employees’ abilities can be realizedthrough the application of the equity component grounded in Adam’s EquityTheory (Adams, 1963). Centered on the premise that the relationship betweensport manager and employer must be o...

  20. Environmental effects of geothermal energy exploitation

    Energy Technology Data Exchange (ETDEWEB)

    Nakamura, H [Japan Metals and Chemicals Co., Ltd., Japan

    1975-01-01

    The environmental effects of geothermal power generation which cause air and water pollution and destruction of natural areas are reviewed. The production of steam and hot water affect existing hot springs sources and can cause ground subsidence. Harmful gas can be released onto the atmosphere from fumarolic gas and hot springs. Hydrothermal geothermal fields occasionally contain harmful substances such as arsenic in the hot water. Serious environmental effects can result from geothermal exploitation activities such as the felling of trees for road construction, well drilling, and plant construction. Once geothermal power generation has begun, the release of H/sub 2/S into the atmosphere and the reinjection of hot water are conducted continuously and sufficient countermeasures can be taken. One problem is the effects of plant construction and operation on natural parks. It is important to reach a compromise between development and protection of natural senic areas. Two figures, two tables, and 13 references are provided.

  1. Exploiting Genetic Interference for Antiviral Therapy.

    Directory of Open Access Journals (Sweden)

    Elizabeth J Tanner

    2016-05-01

    Full Text Available Rapidly evolving viruses are a major threat to human health. Such viruses are often highly pathogenic (e.g., influenza virus, HIV, Ebola virus and routinely circumvent therapeutic intervention through mutational escape. Error-prone genome replication generates heterogeneous viral populations that rapidly adapt to new selection pressures, leading to resistance that emerges with treatment. However, population heterogeneity bears a cost: when multiple viral variants replicate within a cell, they can potentially interfere with each other, lowering viral fitness. This genetic interference can be exploited for antiviral strategies, either by taking advantage of a virus's inherent genetic diversity or through generating de novo interference by engineering a competing genome. Here, we discuss two such antiviral strategies, dominant drug targeting and therapeutic interfering particles. Both strategies harness the power of genetic interference to surmount two particularly vexing obstacles-the evolution of drug resistance and targeting therapy to high-risk populations-both of which impede treatment in resource-poor settings.

  2. Possibilities of collecting evidences about crime act of sexual exploitation in human beings

    Directory of Open Access Journals (Sweden)

    Mijalković Saša

    2006-01-01

    Full Text Available Collecting evidences about organized crime act of sexual exploitation in human begins often is very difficult because of high level of organization, secrecy ant precaution taken during committing prostitution, pornography, sex tourism and human trafficking. On the other side, high illegal profit enable criminals to engage "expensive" and experienced lawyers, whose often make values and reliability of collected evidences questionable, appealing to irregularities during police collecting procedure. Among traditional criminalities methods and proofing activities, in the study, modern tendencies in special investigative measures and techniques are considered. After that, there is pointing at specificity, meaning and value of material tracks and objects, which are essential for proofing crime act or perpetrator’s guiltiness. On the end, there is pointing at importance of victims’ cooperation in collecting evidences about their sexual exploitation.

  3. Genomics-Assisted Exploitation of Heterosis in Perennial Ryegrass (Lolium perenne L.)

    DEFF Research Database (Denmark)

    Islam, Md. Shofiqul

    ryegrass for the development of improved varieties. During his PhD studies, Mohammad Shofiqul Islam studied the feasibility of developing novel hybrid breeding schemes based on cytoplasmic male sterility (CMS) systems in perennial ryegrass. He successfully completed the assembly and annotation of a male......-fertile perennial ryegrass mitochondrial genome, and identified candidate genes responsible for the CMS phenotype by comparing male-fertile and male-sterile mitochondrial genomes. His findings constitute a good basis for continuing research to produce hybrid grass varieties to address the future needs......, breeding activities have been carried out to improve the population and develop synthetic varieties. This does not fully exploit the potential of heterosis, however. Hybrid breeding is an alternative strategy and provides opportunities to fully exploit the genetically available heterosis in perennial...

  4. Isotopic assessment of long term groundwater exploitation. Proceedings of a final research coordination meeting

    International Nuclear Information System (INIS)

    2006-10-01

    The stress imposed on the available water resources due to man's impact (exploitation, release of pollutants and agricultural practices) has resulted in depletion of the available reserves as well as deterioration of water quality in many parts of the world. Over wide areas, abstractions are exceeding current natural recharge and it is apparent from scientific studies that these water resources are being mined, especially in arid and semi-arid areas. Sustainable development and management of those water resources needs long term monitoring records to understand the changes and dynamic responses due to the exploitation. These proceedings provide a synthesis of a series of hydrochemical, isotope and geohydrological data sets which will be used for quantitative assessment of the long term dynamic response of the groundwater system. The results show that both stable and radioactive isotopes are excellent tools for characterizing and understanding aquifer systems that are undergoing long term exploitation. Specific outcomes include establishment of methodologies for monitoring and predicting changes in water quality and quantity that will lead to improved water resources management. This publication is a summary of the results achieved during the coordinated research project (CRP) and the various studies performed by the participating institutions are presented as individual presentations. The overall achievements are presented as an executive summary, and the detailed findings are presented in each contribution. These results were presented in the final coordination meeting held in Vienna, 12-16 May 2003. The results obtained from this CRP will be used to improve the predictions of future behaviour of groundwater resources in response to exploitation. The scientific component of this CRP will be a valuable source of information for isotope hydrologists involved in isotope field applications and a useful guide for groundwater managers involved in groundwater resources

  5. Child Sexual Abuse and Exploitation: Guest Editor’s Introduction

    Directory of Open Access Journals (Sweden)

    Michael Salter

    2015-07-01

    Full Text Available One of the most unnerving aspects of child sexual abuse is that it is constantly manifesting in unexpected ways. The current Royal Commission into Institutional Responses to Child Sexual Abuse has collected testimony of abuse in churches, schools, out-of-home care, hospitals and religious communities, demonstrating the breadth of institutional arrangements whose structures and cultures have facilitated child sexual abuse. Cases of serious and prolonged sexual abuse in family contexts have been excluded from the terms of reference of the Royal Commission but nonetheless continue to surface in media reports. In 2013, twelve children were permanently removed from an extended family living in rural NSW in what has been described as one of the worst cases of child abuse in Australia, involving intergenerational incest going back at least three generations (Auebach 2014. Another recent high-profile case involved the use of the Internet to facilitate the sexual exploitation of an adopted child by his parents in Queensland (Ralston 2013. These cases challenge the received wisdom that child sexual abuse is characterised by the victimisation of one child by one opportunistic offender. Such incidents suggest instead that child sexual abuse takes varied and systemic forms, and can operate to perpetuate and entrench toxic cultures and power structures.   This special issue on Child Sexual Abuse and Exploitation is a timely contribution to ongoing efforts to understand the multiplicity of child sexual abuse. It is an interdisciplinary collection of insights drawn from criminology, sociology, psychiatry, psychology and psychoanalysis, and includes papers from academic researchers alongside academic practitioners whose writing is grounded in their work with affected individuals and communities. A key aim of the special issue is to contextualise the diversity of child sexual abuse socially, politically and historically, recognising the dynamic and iterative

  6. Cheating by exploitation of developmental prestalk patterning in Dictyostelium discoideum.

    Directory of Open Access Journals (Sweden)

    Anupama Khare

    2010-02-01

    Full Text Available The cooperative developmental system of the social amoeba Dictyostelium discoideum is susceptible to exploitation by cheaters-strains that make more than their fair share of spores in chimerae. Laboratory screens in Dictyostelium have shown that the genetic potential for facultative cheating is high, and field surveys have shown that cheaters are abundant in nature, but the cheating mechanisms are largely unknown. Here we describe cheater C (chtC, a strong facultative cheater mutant that cheats by affecting prestalk differentiation. The chtC gene is developmentally regulated and its mRNA becomes stalk-enriched at the end of development. chtC mutants are defective in maintaining the prestalk cell fate as some of their prestalk cells transdifferentiate into prespore cells, but that defect does not affect gross developmental morphology or sporulation efficiency. In chimerae between wild-type and chtC mutant cells, the wild-type cells preferentially give rise to prestalk cells, and the chtC mutants increase their representation in the spore mass. Mixing chtC mutants with other cell-type proportioning mutants revealed that the cheating is directly related to the prestalk-differentiation propensity of the victim. These findings illustrate that a cheater can victimize cooperative strains by exploiting an established developmental pathway.

  7. The HACMS program: using formal methods to eliminate exploitable bugs.

    Science.gov (United States)

    Fisher, Kathleen; Launchbury, John; Richards, Raymond

    2017-10-13

    For decades, formal methods have offered the promise of verified software that does not have exploitable bugs. Until recently, however, it has not been possible to verify software of sufficient complexity to be useful. Recently, that situation has changed. SeL4 is an open-source operating system microkernel efficient enough to be used in a wide range of practical applications. Its designers proved it to be fully functionally correct, ensuring the absence of buffer overflows, null pointer exceptions, use-after-free errors, etc., and guaranteeing integrity and confidentiality. The CompCert Verifying C Compiler maps source C programs to provably equivalent assembly language, ensuring the absence of exploitable bugs in the compiler. A number of factors have enabled this revolution, including faster processors, increased automation, more extensive infrastructure, specialized logics and the decision to co-develop code and correctness proofs rather than verify existing artefacts. In this paper, we explore the promise and limitations of current formal-methods techniques. We discuss these issues in the context of DARPA's HACMS program, which had as its goal the creation of high-assurance software for vehicles, including quadcopters, helicopters and automobiles.This article is part of the themed issue 'Verified trustworthy software systems'. © 2017 The Authors.

  8. Indirect evolution of social fitness inequalities and facultative social exploitation.

    Science.gov (United States)

    Nair, Ramith R; Fiegna, Francesca; Velicer, Gregory J

    2018-03-28

    Microbial genotypes with similarly high proficiency at a cooperative behaviour in genetically pure groups often exhibit fitness inequalities caused by social interaction in mixed groups. Winning competitors in this scenario have been referred to as 'cheaters' in some studies. Such interaction-specific fitness inequalities, as well as social exploitation (in which interaction between genotypes increases absolute fitness), might evolve due to selection for competitiveness at the focal behaviour or might arise non-adaptively due to pleiotropy, hitchhiking or genetic drift. The bacterium Myxococcus xanthus sporulates during cooperative development of multicellular fruiting bodies. Using M. xanthus lineages that underwent experimental evolution in allopatry without selection on sporulation, we demonstrate that interaction-specific fitness inequalities and facultative social exploitation during development readily evolved indirectly among descendant lineages. Fitness inequalities between evolved genotypes were not caused by divergence in developmental speed, as faster-developing strains were not over-represented among competition winners. In competitions between ancestors and several evolved strains, all evolved genotypes produced more spores than the ancestors, including losers of evolved-versus-evolved competitions, indicating that adaptation in non-developmental contexts pleiotropically increased competitiveness for spore production. Overall, our results suggest that fitness inequalities caused by social interaction during cooperative processes may often evolve non-adaptively in natural populations. © 2018 The Authors.

  9. Cheating by Exploitation of Developmental Prestalk Patterning in Dictyostelium discoideum

    Science.gov (United States)

    Khare, Anupama; Shaulsky, Gad

    2010-01-01

    The cooperative developmental system of the social amoeba Dictyostelium discoideum is susceptible to exploitation by cheaters—strains that make more than their fair share of spores in chimerae. Laboratory screens in Dictyostelium have shown that the genetic potential for facultative cheating is high, and field surveys have shown that cheaters are abundant in nature, but the cheating mechanisms are largely unknown. Here we describe cheater C (chtC), a strong facultative cheater mutant that cheats by affecting prestalk differentiation. The chtC gene is developmentally regulated and its mRNA becomes stalk-enriched at the end of development. chtC mutants are defective in maintaining the prestalk cell fate as some of their prestalk cells transdifferentiate into prespore cells, but that defect does not affect gross developmental morphology or sporulation efficiency. In chimerae between wild-type and chtC mutant cells, the wild-type cells preferentially give rise to prestalk cells, and the chtC mutants increase their representation in the spore mass. Mixing chtC mutants with other cell-type proportioning mutants revealed that the cheating is directly related to the prestalk-differentiation propensity of the victim. These findings illustrate that a cheater can victimize cooperative strains by exploiting an established developmental pathway. PMID:20195510

  10. The HACMS program: using formal methods to eliminate exploitable bugs

    Science.gov (United States)

    Launchbury, John; Richards, Raymond

    2017-01-01

    For decades, formal methods have offered the promise of verified software that does not have exploitable bugs. Until recently, however, it has not been possible to verify software of sufficient complexity to be useful. Recently, that situation has changed. SeL4 is an open-source operating system microkernel efficient enough to be used in a wide range of practical applications. Its designers proved it to be fully functionally correct, ensuring the absence of buffer overflows, null pointer exceptions, use-after-free errors, etc., and guaranteeing integrity and confidentiality. The CompCert Verifying C Compiler maps source C programs to provably equivalent assembly language, ensuring the absence of exploitable bugs in the compiler. A number of factors have enabled this revolution, including faster processors, increased automation, more extensive infrastructure, specialized logics and the decision to co-develop code and correctness proofs rather than verify existing artefacts. In this paper, we explore the promise and limitations of current formal-methods techniques. We discuss these issues in the context of DARPA’s HACMS program, which had as its goal the creation of high-assurance software for vehicles, including quadcopters, helicopters and automobiles. This article is part of the themed issue ‘Verified trustworthy software systems’. PMID:28871050

  11. Exploiting Group Symmetry in Semidefinite Programming Relaxations of the Quadratic Assignment Problem

    NARCIS (Netherlands)

    de Klerk, E.; Sotirov, R.

    2007-01-01

    We consider semidefinite programming relaxations of the quadratic assignment problem, and show how to exploit group symmetry in the problem data. Thus we are able to compute the best known lower bounds for several instances of quadratic assignment problems from the problem library: [R.E. Burkard,

  12. Exniffer: Learning to Prioritize Crashes by Assessing the Exploitability from Memory Dump

    NARCIS (Netherlands)

    Tripathi, Shubham; Grieco, Gustavo; Rawat, Sanjay

    2018-01-01

    An important component of software reliability is the assurance of certain security guarantees, such as absence of low-level bugs that may result in code exploitation, for example. A program crash is an early indicator of possible errors in the program like memory corruption, access violation or

  13. Exploiting CRISPR/Cas: Interference Mechanisms and Applications

    Directory of Open Access Journals (Sweden)

    André Plagens

    2013-07-01

    Full Text Available The discovery of biological concepts can often provide a framework for the development of novel molecular tools, which can help us to further understand and manipulate life. One recent example is the elucidation of the prokaryotic adaptive immune system, clustered regularly interspaced short palindromic repeats (CRISPR/CRISPR-associated (Cas that protects bacteria and archaea against viruses or conjugative plasmids. The immunity is based on small RNA molecules that are incorporated into versatile multi-domain proteins or protein complexes and specifically target viral nucleic acids via base complementarity. CRISPR/Cas interference machines are utilized to develop novel genome editing tools for different organisms. Here, we will review the latest progress in the elucidation and application of prokaryotic CRISPR/Cas systems and discuss possible future approaches to exploit the potential of these interference machineries.

  14. Exploitation and use of coal field gas

    Energy Technology Data Exchange (ETDEWEB)

    Wang, K; Li, Z; Sun, Q

    1982-04-25

    There are slightly more than 440 mine shafts in the world from which gas is pumped at the same time coal is being mined, the volume pumped being 3.125 billion cubic meters. All the countries of the world today widely use gas as a fuel and as a raw material for the chemical industry. In China 40 percent of the total number of mine shafts are high gas mine shafts. In China, gas is used largely as fuel by the people, to fire boilers, to make formaldehyde, and to make carbon ink. Prospects are good for the exploitation of mine shaft gas that is produced in association with coal. Mine shaft gas is a top quality energy source with an extraction life that is longer than coals. (DP)

  15. Exploiting CRISPR/Cas: Interference Mechanisms and Applications

    Science.gov (United States)

    Richter, Hagen; Randau, Lennart; Plagens, André

    2013-01-01

    The discovery of biological concepts can often provide a framework for the development of novel molecular tools, which can help us to further understand and manipulate life. One recent example is the elucidation of the prokaryotic adaptive immune system, clustered regularly interspaced short palindromic repeats (CRISPR)/CRISPR-associated (Cas) that protects bacteria and archaea against viruses or conjugative plasmids. The immunity is based on small RNA molecules that are incorporated into versatile multi-domain proteins or protein complexes and specifically target viral nucleic acids via base complementarity. CRISPR/Cas interference machines are utilized to develop novel genome editing tools for different organisms. Here, we will review the latest progress in the elucidation and application of prokaryotic CRISPR/Cas systems and discuss possible future approaches to exploit the potential of these interference machineries. PMID:23857052

  16. Exploiting opportunistic resources for ATLAS with ARC CE and the Event Service

    CERN Document Server

    AUTHOR|(INSPIRE)INSPIRE-00226583; The ATLAS collaboration; Filipčič, Andrej; Guan, Wen; Tsulaia, Vakhtang; Walker, Rodney; Wenaus, Torre

    2017-01-01

    With ever-greater computing needs and fixed budgets, big scientific experiments are turning to opportunistic resources as a means to add much-needed extra computing power. These resources can be very different in design from the resources that comprise the Grid computing of most experiments, therefore exploiting these resources requires a change in strategy for the experiment. The resources may be highly restrictive in what can be run or in connections to the outside world, or tolerate opportunistic usage only on condition that tasks may be terminated without warning. The ARC CE with its non-intrusive architecture is designed to integrate resources such as High Performance Computing (HPC) systems into a computing Grid. The ATLAS experiment developed the Event Service primarily to address the issue of jobs that can be terminated at any point when opportunistic resources are needed by someone else. This paper describes the integration of these two systems in order to exploit opportunistic resources for ATLAS in...

  17. Exploiting Opportunistic Resources for ATLAS with ARC CE and the Event Service

    CERN Document Server

    Cameron, David; The ATLAS collaboration

    2016-01-01

    With ever-greater computing needs and fixed budgets, big scientific experiments are turning to opportunistic resources as a means to add much-needed extra computing power. These resources can be very different in design from the resources that comprise the Grid computing of most experiments, therefore exploiting these resources requires a change in strategy for the experiment. The resources may be highly restrictive in what can be run or in connections to the outside world, or tolerate opportunistic usage only on condition that tasks may be terminated without warning. The ARC CE with its non-intrusive architecture is designed to integrate resources such as High Performance Computing (HPC) systems into a computing Grid. The ATLAS experiment developed the Event Service primarily to address the issue of jobs that can be terminated at any point when opportunistic resources are needed by someone else. This paper describes the integration of these two systems in order to exploit opportunistic resources for ATLAS in...

  18. Exploiting endogenous fibrocartilage stem cells to regenerate cartilage and repair joint injury

    Science.gov (United States)

    Embree, Mildred C.; Chen, Mo; Pylawka, Serhiy; Kong, Danielle; Iwaoka, George M.; Kalajzic, Ivo; Yao, Hai; Shi, Chancheng; Sun, Dongming; Sheu, Tzong-Jen; Koslovsky, David A.; Koch, Alia; Mao, Jeremy J.

    2016-01-01

    Tissue regeneration using stem cell-based transplantation faces many hurdles. Alternatively, therapeutically exploiting endogenous stem cells to regenerate injured or diseased tissue may circumvent these challenges. Here we show resident fibrocartilage stem cells (FCSCs) can be used to regenerate and repair cartilage. We identify FCSCs residing within the superficial zone niche in the temporomandibular joint (TMJ) condyle. A single FCSC spontaneously generates a cartilage anlage, remodels into bone and organizes a haematopoietic microenvironment. Wnt signals deplete the reservoir of FCSCs and cause cartilage degeneration. We also show that intra-articular treatment with the Wnt inhibitor sclerostin sustains the FCSC pool and regenerates cartilage in a TMJ injury model. We demonstrate the promise of exploiting resident FCSCs as a regenerative therapeutic strategy to substitute cell transplantation that could be beneficial for patients suffering from fibrocartilage injury and disease. These data prompt the examination of utilizing this strategy for other musculoskeletal tissues. PMID:27721375

  19. Mirror neurons and the social nature of language: the neural exploitation hypothesis.

    Science.gov (United States)

    Gallese, Vittorio

    2008-01-01

    This paper discusses the relevance of the discovery of mirror neurons in monkeys and of the mirror neuron system in humans to a neuroscientific account of primates' social cognition and its evolution. It is proposed that mirror neurons and the functional mechanism they underpin, embodied simulation, can ground within a unitary neurophysiological explanatory framework important aspects of human social cognition. In particular, the main focus is on language, here conceived according to a neurophenomenological perspective, grounding meaning on the social experience of action. A neurophysiological hypothesis--the "neural exploitation hypothesis"--is introduced to explain how key aspects of human social cognition are underpinned by brain mechanisms originally evolved for sensorimotor integration. It is proposed that these mechanisms were later on adapted as new neurofunctional architecture for thought and language, while retaining their original functions as well. By neural exploitation, social cognition and language can be linked to the experiential domain of action.

  20. Making Money from Exploiting Schumpeterian Opportunities: John Sanguinetti and the Electronic Design Automation Industry

    Directory of Open Access Journals (Sweden)

    Arthur Low

    2012-05-01

    Full Text Available Accounts of the effect that John Sanguinetti’s two companies had on the market for integrated circuit design languages were used to gain insights on how to profit from the exploitation of Schumpeterian opportunities. This article will be of interest to entrepreneurs who expect to profit from exploiting opportunities that disrupt the status quo. To write this article, the author reviewed the literature on Schumpeterian and Kirznerian opportunities and examined the writings of and about Sanguinetti and his companies, blogs written by industry insiders, and articles in industry trade journals. Sanguinetti’s first company introduced a new technology and his second company introduced a new business strategy and a new technology. Both of Sanguinetti's companies undermined the capital investments of the established incumbents and created new value for customers. The article provides three main insights. First, deep knowledge and experience in the customer domain enable an entrepreneur to recognize and act to profit from a Schumpeterian opportunity. Second, to profit from a Schumpeterian opportunity the entrepreneur needs to combine technology and business model components in a way that adds significant value to customers. Third, large amounts of venture capital may or may not be required to exploit Schumpeterian opportunities.

  1. Chaînes d'exploits scénarios de hacking avancés et prévention

    CERN Document Server

    Whitaker, Andrew; Voth, Jack B

    2009-01-01

    Un pirate informatique s'appuie rarement sur une unique attaque, mais utilise plutôt des chaînes d'exploits, qui impliquent plusieurs méthodes et attaques coordonnées, pour atteindre sa cible et arriver à ses fins. Ces chaînes d'exploits sont généralement complexes et difficiles à prévenir. Or la plupart des ouvrages de sécurité ne les couvrent pas, ou sinon de manière superficielle. Cet ouvrage présente en profondeur les principales chaînes d'exploits qui sévissent actuellement. À travers des exemples basés sur des stratégies d'attaques réelles, utilisant les outils actuels les plus courants et visant des cibles importantes comme des données bancaires ou de sécurité sociale, vous découvrirez le spectre complet des attaques, des réseaux sans-fil à l'accès physique en passant par l'ingénierie sociale. Dans chaque scénario, les exploits sont décortiqués un à un en vue d'expliquer la chaîne qui va conduire à l'attaque finale. Les mesures de prévention à appliquer pour éviter...

  2. Construct exploit constraint in crash analysis by bypassing canary

    Science.gov (United States)

    Huang, Ning; Huang, Shuguang; Huang, Hui; Chang, Chao

    2017-08-01

    Selective symbolic execution is a common program testing technology. Developed on the basis of it, some crash analysis systems are often used to test the fragility of the program by constructing exploit constraints, such as CRAX. From the study of crash analysis based on symbolic execution, this paper find that this technology cannot bypass the canary stack protection mechanisms. This paper makes the improvement uses the API hook in Linux. Experimental results show that the use of API hook can effectively solve the problem that crash analysis cannot bypass the canary protection.

  3. The ESA Scientific Exploitation of Operational Missions element

    Science.gov (United States)

    Desnos, Yves-Louis; Regner, Peter; Zehner, Claus; Engdahl, Marcus; Benveniste, Jerome; Delwart, Steven; Gascon, Ferran; Mathieu, Pierre-Philippe; Bojkov, Bojan; Koetz, Benjamin; Arino, Olivier; Donlon, Craig; Davidson, Malcolm; Goryl, Philippe; Foumelis, Michael

    2014-05-01

    The objectives of the ESA Scientific Exploitation of Operational Missions (SEOM) programme element are • to federate, support and expand the research community • to strengthen the leadership of European EO research community • to enable the science community to address new scientific research As a preparation for the SEOM element a series of international science users consultation has been organized by ESA in 2012 and 2013 In particular the ESA Living Planet Symposium was successfully organized in Edinburgh September 2013 and involving 1700 participants from 60 countries. The science users recommendations have been gathered and form the basis for the 2014 SEOM work plan approved by ESA member states. The SEOM element is organized along the following action lines: 1. Developing open-source, multi-mission, scientific toolboxes : the new toolboxes for Sentinel 1/2/3 and 5P will be introduced 2. Research and development studies: the first SEOM studies are being launched such as the INSARAP studies for Sentinel 1 interferometry in orbit demonstration , the IAS study to generate an improved spectroscopic database of the trace gas species CH4, H2O, and CO in the 2.3 μm region and SO2 in the UV region for Sentinel 5 P. In addition larger Sentinels for science call will be tendered in 2014 covering grouped studies for Sentinel 1 Land , Sentinel 1 Ocean , Sentinel 2 Land, Sentinel 3 SAR Altimetry ,Sentinel 3 Ocean color, Sentinel 3 Land and Sentinels Synergy . 3. Science users consultation : the Sentinel 2 for Science workshop is planned from 20 to 22 may 2014 at ESRIN to prepare for scientific exploitation of the Sentinel-2 mission (http://seom.esa.int/S2forScience2014 ) . In addition the FRINGE workshop focusing on scientific explotation of Sentinel1 using SAR interferometry is planned to be held at ESA ESRIN in Q2 2015 4. Training the next generation of European EO scientists on the scientific exploitation of Sentinels data: the Advanced Training course Land

  4. Pack Light on the Move: Exploitation and Exploration in a Dynamic Environment

    DEFF Research Database (Denmark)

    LiCalzi, Marco; Marchiori, Davide

    2014-01-01

    This paper revisits a recent study by Posen and Levinthal (Manag Sci 58:587–601, 2012) on the exploration/exploitation tradeoff for a multi-armed bandit problem, where the reward probabilities undergo random shocks. We show that their analysis suffers two shortcomings: it assumes that learning is...

  5. Little Adults: Child and Teenage Commercial Sexual Exploitation in Contemporary Brazilian Cinema

    Science.gov (United States)

    da Silvia, Antonio Marcio

    2016-01-01

    This current study explores three contemporary Brazilian films' depiction of commercial sexual exploitation of young girls and teenagers. It points out how the young female characters cope with the abuses they suffer and proposes that these filmic representations of the characters' experiences expose a significant social problem of contemporary…

  6. Exploitation of the Fourier chopper in neutron diffractometry at pulsed sources

    International Nuclear Information System (INIS)

    Hiismaeki, P.; Poeyry, H.; Tiitta, A.

    1988-01-01

    The application of the Fourier chopper in the reverse time-of-flight mode to upgrading the performance of neutron powder diffractometry at pulsed sources is considered. Exploitation of a dual-delay-line binary correlator is suggested and a comprehensive analysis of the necessary data acquisition process is given. The best benefit is shown to be achievable at intensity optimized moderators. (orig.)

  7. An Opportunity on Exploiting of Geology and Mineral Resource Data for Regional Development

    International Nuclear Information System (INIS)

    Agus-Hendratno

    2004-01-01

    Indonesia archipelago have the very complex geo diversity. The complexity of geo diversity gives a lot of opportunity on exploiting of earth resources for society prosperity. In other side, the complexity of geology also gives a lot of resistance and various limitation at one particular region to expand. Hence, various data of geology as well as data of result of mapping of minerals resources (mapping at macro scale and also have detail scale) require to be managed and exploited maximally. Effort the exploiting also require various infrastructure which is concerning regulatory, technological, human resources being, market-drive of an economic geo material, social environment and culture which grow around geology data, and also availability and readiness of geology and mineral resources data. This study is expected can give a few description of how the geology and minerals resources data can be as reference in regional development planning. This paper was writed by assessment of description qualitative and comparative inter-region case study in various regency area, where writer have been involved to conduct the activity of geological mapping and mineral resources data and also involved by a discussion with a few officers of local government in so many opportunity. Some of the case study region for example : in Kampar Regency (Riau), Tanjung Jabung Timur Regency (Jambi), Biak Numfor Regency (Papua), Gunung Kidul Regency (Yogyakarta), Pacitan Regency (East Java), and also Klaten Regency (Central Java). (author)

  8. Compete, coordinate, and cooperate: How to exploit uncertain environments with social interaction.

    Science.gov (United States)

    Schulze, Christin; Newell, Ben R

    2015-10-01

    Countless decisions, from the trivial to the crucial, are made in complex social contexts while facing uncertain consequences. Yet a large portion of decision making research focuses on either the effects of social interaction or the effects of environmental uncertainty by examining strategic games against others or individual games against nature. Drawing a connection between these approaches, the authors extend a standard individual choice paradigm to include social interaction with 1 other person. In this paradigm, 2 competing decision makers repeatedly select among 2 options, each offering a particular probability of a fixed payoff. When both players choose the same, correct option, the payoff is evenly split; when they choose different options, the player choosing the correct option receives the full payoff. The addition of this social dimension gives players an opportunity to fully exploit an uncertain environment via cooperation: By consistently choosing opposite options, two players can exploit the uncertain environment more effectively than a single player could. We present 2 experiments that manipulate environmental (Experiment 1) and social (Experiment 2) aspects of the paradigm. In Experiment 1, the outcome probabilities were either known or unknown to participants; in Experiment 2, participants' attention was drawn to individual or group gains by introducing either within- or between-group competition. Efficient cooperation did not emerge spontaneously in Experiment 1. Instead, most people probability maximized, mirroring the behavior observed in individual choice. By contrast, between--group competition in Experiment 2 facilitated efficient-but not always equitable--exploitation of uncertain environments. This work links the concepts of individual risky choice and strategic decision making under both environmental and social uncertainty. (c) 2015 APA, all rights reserved).

  9. Automated motion imagery exploitation for surveillance and reconnaissance

    Science.gov (United States)

    Se, Stephen; Laliberte, France; Kotamraju, Vinay; Dutkiewicz, Melanie

    2012-06-01

    Airborne surveillance and reconnaissance are essential for many military missions. Such capabilities are critical for troop protection, situational awareness, mission planning and others, such as post-operation analysis / damage assessment. Motion imagery gathered from both manned and unmanned platforms provides surveillance and reconnaissance information that can be used for pre- and post-operation analysis, but these sensors can gather large amounts of video data. It is extremely labour-intensive for operators to analyse hours of collected data without the aid of automated tools. At MDA Systems Ltd. (MDA), we have previously developed a suite of automated video exploitation tools that can process airborne video, including mosaicking, change detection and 3D reconstruction, within a GIS framework. The mosaicking tool produces a geo-referenced 2D map from the sequence of video frames. The change detection tool identifies differences between two repeat-pass videos taken of the same terrain. The 3D reconstruction tool creates calibrated geo-referenced photo-realistic 3D models. The key objectives of the on-going project are to improve the robustness, accuracy and speed of these tools, and make them more user-friendly to operational users. Robustness and accuracy are essential to provide actionable intelligence, surveillance and reconnaissance information. Speed is important to reduce operator time on data analysis. We are porting some processor-intensive algorithms to run on a Graphics Processing Unit (GPU) in order to improve throughput. Many aspects of video processing are highly parallel and well-suited for optimization on GPUs, which are now commonly available on computers. Moreover, we are extending the tools to handle video data from various airborne platforms and developing the interface to the Coalition Shared Database (CSD). The CSD server enables the dissemination and storage of data from different sensors among NATO countries. The CSD interface allows

  10. Exploiting tumor shrinkage through temporal optimization of radiotherapy

    International Nuclear Information System (INIS)

    Unkelbach, Jan; Craft, David; Hong, Theodore; Papp, Dávid; Wolfgang, John; Bortfeld, Thomas; Ramakrishnan, Jagdish; Salari, Ehsan

    2014-01-01

    In multi-stage radiotherapy, a patient is treated in several stages separated by weeks or months. This regimen has been motivated mostly by radiobiological considerations, but also provides an approach to reduce normal tissue dose by exploiting tumor shrinkage. The paper considers the optimal design of multi-stage treatments, motivated by the clinical management of large liver tumors for which normal liver dose constraints prohibit the administration of an ablative radiation dose in a single treatment. We introduce a dynamic tumor model that incorporates three factors: radiation induced cell kill, tumor shrinkage, and tumor cell repopulation. The design of multi-stage radiotherapy is formulated as a mathematical optimization problem in which the total dose to the normal tissue is minimized, subject to delivering the prescribed dose to the tumor. Based on the model, we gain insight into the optimal administration of radiation over time, i.e. the optimal treatment gaps and dose levels. We analyze treatments consisting of two stages in detail. The analysis confirms the intuition that the second stage should be delivered just before the tumor size reaches a minimum and repopulation overcompensates shrinking. Furthermore, it was found that, for a large range of model parameters, approximately one-third of the dose should be delivered in the first stage. The projected benefit of multi-stage treatments in terms of normal tissue sparing depends on model assumptions. However, the model predicts large dose reductions by more than a factor of 2 for plausible model parameters. The analysis of the tumor model suggests that substantial reduction in normal tissue dose can be achieved by exploiting tumor shrinkage via an optimal design of multi-stage treatments. This suggests taking a fresh look at multi-stage radiotherapy for selected disease sites where substantial tumor regression translates into reduced target volumes. (paper)

  11. Intensive time series data exploitation: the Multi-sensor Evolution Analysis (MEA) platform

    Science.gov (United States)

    Mantovani, Simone; Natali, Stefano; Folegani, Marco; Scremin, Alessandro

    2014-05-01

    The monitoring of the temporal evolution of natural phenomena must be performed in order to ensure their correct description and to allow improvements in modelling and forecast capabilities. This assumption, that is obvious for ground-based measurements, has not always been true for data collected through space-based platforms: except for geostationary satellites and sensors, that allow providing a very effective monitoring of phenomena with geometric scale from regional to global; smaller phenomena (with characteristic dimension lower than few kilometres) have been monitored with instruments that could collect data only with a time interval in the order of several days; bi-temporal techniques have been the most used ones for years, in order to characterise temporal changes and try identifying specific phenomena. The more the number of flying sensor has grown and their performance improved, the more their capability of monitoring natural phenomena at a smaller geographic scale has grown: we can now count on tenth of years of remotely sensed data, collected by hundreds of sensors that are now accessible from a wide users' community, and the techniques for data processing have to be adapted to move toward a data intensive exploitation. Starting from 2008, the European Space Agency has initiated the development of the Multi-sensor Evolution Analysis (MEA) platform (https://mea.eo.esa.int), whose first aim was to permit the access and exploitation of long term remotely sensed satellite data from different platforms: 15 years of global (A)ATSR data together with 5 years of regional AVNIR-2 data were loaded into the system and were used, through a web-based graphic user interface, for land cover change analysis. The MEA data availability has grown during years integrating multi-disciplinary data that feature spatial and temporal dimensions: so far tenths of Terabytes of data in the land and atmosphere domains are available and can be visualized and exploited, keeping the

  12. Empirical Analysis of Exploiting Review Helpfulness for Extractive Summarization of Online Reviews

    Science.gov (United States)

    Xiong, Wenting; Litman, Diane

    2014-01-01

    We propose a novel unsupervised extractive approach for summarizing online reviews by exploiting review helpfulness ratings. In addition to using the helpfulness ratings for review-level filtering, we suggest using them as the supervision of a topic model for sentence-level content scoring. The proposed method is metadata-driven, requiring no…

  13. Exploration and Exploitation of Victorian Science in Darwin's Reading Notebooks

    OpenAIRE

    Murdock, Jaimie; Allen, Colin; DeDeo, Simon

    2015-01-01

    Search in an environment with an uncertain distribution of resources involves a trade-off between exploitation of past discoveries and further exploration. This extends to information foraging, where a knowledge-seeker shifts between reading in depth and studying new domains. To study this decision-making process, we examine the reading choices made by one of the most celebrated scientists of the modern era: Charles Darwin. From the full-text of books listed in his chronologically-organized r...

  14. THE IMPACT ASSESSMENT OF THE ABANDONED URANIUM MINING EXPLOITATIONS ON ROCKS AND SOILS - ZIMBRU PERIMETER, ARAD COUNTY

    Directory of Open Access Journals (Sweden)

    DIANA M. BANU

    2016-10-01

    Full Text Available The mining exploration and exploitation, especially the activity of uranium mineralization exploration and exploitation has a negative impact on the environment by the alterations of the landscape and the degradation of the environmental factors' quality. The principal environmental factors that could be affected by mining operations resulting from uranium exploitation are: water, air, soil, population, fauna, and flora. The aim of this study is, first, to identify the sources of pollution (natural radionuclides - natural radioactive series of uranium, radium, thorium, potassium and heavy metals that are accompanying the mineralizations for two of the most important environmental factors: rocks and soils: and, second, to assess the pollution impact on those two environmental factors. In order to identify this pollutants and their impact assessment it was selected as a study case an abandoned uranium mining perimeter named the Zimbru perimeter located in Arad County, Romania.

  15. Preliminary exploitation of industrial facility for flue gas treatment

    International Nuclear Information System (INIS)

    Chmielewski, A.G.; Zimek, Z.; Iller, E.; Tyminski, B.; Licki, J.

    2001-01-01

    laboratory and pilot installation in Poland has lead to decision concerning design and construction of the industrial demonstration plant for electron beam flue gas treatment. Industrial demonstration facility for electron beam flue gas treatment was designed and installed in EPS Pomorzany in Szczecin. This flue gas purification installation treats exhaust gases coming from a block which consists of two Benson type boilers of power 56 MWe each, supplying additional steam for heating purposes up to 40 MWth each. The 270,000 Nm 3 /h flue gases (half of produced by the blocks) is treated meet Polish regulations which are imposed since 1997. Four electron accelerators has been constructed by Nissin High Voltage, Kyoto, Japan to provide 1200 kW of total beam power with electron energy 0,8 MeV to be installed in EPS Pomorzany. Two-stage irradiation was applied as it was tested at the pilot plant. The industrial installation located at EPS Pomorzany consist of two independent reaction chambers, humidification tower with water and steam supply systems, ammonia water handling system with ammonia injection, electrostatic precipitator, by product handling system, measuring and control systems. Solid particles which are formed as salts are separated in ESP and byproduct pretreated in handling system with amount up to 700 kg/h. All systems including accelerators were tested separately to meet EPS regulations (72 h continues run) and confirm producer warranted parameters and facility design specification. Some necessary modifications including accelerators were introduced by equipment producers depends on obtained results of performed measurements. The quality of shielding properties of accelerator chamber walls was tested according to national regulation and the license on accelerator exploitation and personnel qualification were issued by polish authorities. The spatial dose distribution and dose rate measurement were carried on with electron energy 700 and 800 keV. Preliminary results

  16. Exploiting risk-reward structures in decision making under uncertainty.

    Science.gov (United States)

    Leuker, Christina; Pachur, Thorsten; Hertwig, Ralph; Pleskac, Timothy J

    2018-06-01

    People often have to make decisions under uncertainty-that is, in situations where the probabilities of obtaining a payoff are unknown or at least difficult to ascertain. One solution to this problem is to infer the probability from the magnitude of the potential payoff and thus exploit the inverse relationship between payoffs and probabilities that occurs in many domains in the environment. Here, we investigated how the mind may implement such a solution: (1) Do people learn about risk-reward relationships from the environment-and if so, how? (2) How do learned risk-reward relationships impact preferences in decision-making under uncertainty? Across three experiments (N = 352), we found that participants can learn risk-reward relationships from being exposed to choice environments with a negative, positive, or uncorrelated risk-reward relationship. They were able to learn the associations both from gambles with explicitly stated payoffs and probabilities (Experiments 1 & 2) and from gambles about epistemic events (Experiment 3). In subsequent decisions under uncertainty, participants often exploited the learned association by inferring probabilities from the magnitudes of the payoffs. This inference systematically influenced their preferences under uncertainty: Participants who had been exposed to a negative risk-reward relationship tended to prefer the uncertain option over a smaller sure option for low payoffs, but not for high payoffs. This pattern reversed in the positive condition and disappeared in the uncorrelated condition. This adaptive change in preferences is consistent with the use of the risk-reward heuristic. Copyright © 2018 Elsevier B.V. All rights reserved.

  17. Exploitation of Microdoppler and Multiple Scattering Phenomena for Radar Target Recognition

    Science.gov (United States)

    2006-08-24

    progress on the reserach grant "Exploitation of MicroDoppler and Multiple Scattering Phenomena for Radar Target Recognition" during the period 1...paper describes a methodology of modeling A number of ray-based EM techniques have been interferometric synthetic aperture radar (IFSAR) images...modes including the single present an IFSAR simulation methodology to simulate the antenna transmit mode, the ping-pong mode or the repeat interferogram

  18. Exploiting Auxiliary Information about Examinees in the Estimation of Item Parameters.

    Science.gov (United States)

    1986-05-01

    Research. The author is grateful to Kathleen Sheehan and Martha Stocking for their comments and suggestions. a, • ... Am -. ,** . Exploiting...Research Laboratory Dr. Hans Crombag 103 South Mathews Street University of Leyden Urbana, IL 61801 Education Research Center Boerhaavelaan 2 Dr. Susan...Embretson 23-4 EN Leyden University of Kansas The NETHERLANDS Psychology Department Lawrence, KS 66045 CTR/McGraw-Hill Library 2500 Garden Road ERIC

  19. Exploitation of Aquatic Resources in Ahanve, Badagry, south-western Nigeria

    Directory of Open Access Journals (Sweden)

    Orijemie, Emuobosa Akpo

    2014-11-01

    Full Text Available The Badagry Cultural Area (BCA is one of the significant socio-cultural places in coastal south-western Nigeria. Palynological and archaeological studies at Ahanve, a settlement in the BCA were undertaken recently to improve the understanding of past human exploitation of aquatic resources. Collected data revealed contrasts in the availability and utilisation of aquatic resources between a first occupation phase (9th-17th centuries AD and a second occupation phase (17th century AD to present. The environment during the first phase was characterised by secondary forest and freshwater swamp. During this period, the inhabitants consumed cat-fish (Clariidae and bivalves (Anodonta sp., and engaged in salt production. The salt was produced from brine obtained from the Atlantic Ocean. Aquatic food resources were supplemented with terrestrial animal and plant foods. During the second occupation phase, aquatic resources (cat-fish and bivalves declined and subsequently disappeared; salt production was discontinued while terrestrial foods, particularly plant-based types, increased significantly. These events coincided with the arrival of European travellers. Oral sources suggest that the decline in the exploitation of aquatic resources was in part due to the fear of being taken captive while on fishing expeditions, restrictions by Europeans who controlled the water-ways, and the massive importation of salt which replaced local production.

  20. Views of Swedish Commissioning Parents Relating to the Exploitation Discourse in Using Transnational Surrogacy

    Science.gov (United States)

    Arvidsson, Anna; Johnsdotter, Sara; Essén, Birgitta

    2015-01-01

    Transnational surrogacy, when people travel abroad for reproduction with the help of a surrogate mother, is a heavily debated phenomenon. One of the most salient discourses on surrogacy is the one affirming that Westerners, in their quest for having a child, exploit poor women in countries such as India. As surrogacy within the Swedish health care system is not permitted, Swedish commissioning parents have used transnational surrogacy, and the majority has turned to India. This interview study aimed to explore how commissioning parents negotiate the present discourses on surrogacy. Findings from the study suggest that the commissioning parents’ views on using surrogacy are influenced by competing discourses on surrogacy represented by media and surrogacy agencies. The use of this reproductive method resulted, then, in some ambiguity. Although commissioning parents defy the exploitation discourse by referring to what they have learnt about the surrogate mother’s life situation and by pointing at the significant benefits for her, they still had a request for regulation of surrogacy in Sweden, to better protect all parties involved. This study, then, gives a complex view on surrogacy, where the commissioning parents simultaneously argue against the exploitation discourse but at the same time are uncertain if the surrogate mothers are well protected in the surrogacy arrangements. Their responses to the situation endorse the need for regulation both in Sweden and India. PMID:25955178

  1. Views of Swedish commissioning parents relating to the exploitation discourse in using transnational surrogacy.

    Science.gov (United States)

    Arvidsson, Anna; Johnsdotter, Sara; Essén, Birgitta

    2015-01-01

    Transnational surrogacy, when people travel abroad for reproduction with the help of a surrogate mother, is a heavily debated phenomenon. One of the most salient discourses on surrogacy is the one affirming that Westerners, in their quest for having a child, exploit poor women in countries such as India. As surrogacy within the Swedish health care system is not permitted, Swedish commissioning parents have used transnational surrogacy, and the majority has turned to India. This interview study aimed to explore how commissioning parents negotiate the present discourses on surrogacy. Findings from the study suggest that the commissioning parents' views on using surrogacy are influenced by competing discourses on surrogacy represented by media and surrogacy agencies. The use of this reproductive method resulted, then, in some ambiguity. Although commissioning parents defy the exploitation discourse by referring to what they have learnt about the surrogate mother's life situation and by pointing at the significant benefits for her, they still had a request for regulation of surrogacy in Sweden, to better protect all parties involved. This study, then, gives a complex view on surrogacy, where the commissioning parents simultaneously argue against the exploitation discourse but at the same time are uncertain if the surrogate mothers are well protected in the surrogacy arrangements. Their responses to the situation endorse the need for regulation both in Sweden and India.

  2. Views of Swedish commissioning parents relating to the exploitation discourse in using transnational surrogacy.

    Directory of Open Access Journals (Sweden)

    Anna Arvidsson

    Full Text Available Transnational surrogacy, when people travel abroad for reproduction with the help of a surrogate mother, is a heavily debated phenomenon. One of the most salient discourses on surrogacy is the one affirming that Westerners, in their quest for having a child, exploit poor women in countries such as India. As surrogacy within the Swedish health care system is not permitted, Swedish commissioning parents have used transnational surrogacy, and the majority has turned to India. This interview study aimed to explore how commissioning parents negotiate the present discourses on surrogacy. Findings from the study suggest that the commissioning parents' views on using surrogacy are influenced by competing discourses on surrogacy represented by media and surrogacy agencies. The use of this reproductive method resulted, then, in some ambiguity. Although commissioning parents defy the exploitation discourse by referring to what they have learnt about the surrogate mother's life situation and by pointing at the significant benefits for her, they still had a request for regulation of surrogacy in Sweden, to better protect all parties involved. This study, then, gives a complex view on surrogacy, where the commissioning parents simultaneously argue against the exploitation discourse but at the same time are uncertain if the surrogate mothers are well protected in the surrogacy arrangements. Their responses to the situation endorse the need for regulation both in Sweden and India.

  3. Gaming the gamer? – The ethics of exploiting psychological research in video games

    NARCIS (Netherlands)

    Soraker, Johnny

    2016-01-01

    Purpose The purpose of this paper is to investigate the ethical implications of video game companies employing psychologists and using psychological research in game design. Design/methodology/approach The author first argues that exploiting psychology in video games may be more ethically

  4. Operational experience of the Marcoule reactors; Experience d'exploitation des reacteurs de Marcoule

    Energy Technology Data Exchange (ETDEWEB)

    Conte, F [Commissariat a l' Energie Atomique, Centre de Production de Plutonium, Marcoule (France). Centre d' Etudes Nucleaires

    1963-07-01

    The results obtaining from three years operation of the reactors G-2, G-3 have made it possible to accumulate a considerable amount of operational experience of these reactors. The main original points: - the pre-stressed concrete casing - the possibility of loading while under power - automatic temperature control have been perfectly justified by the results of operation. The author confirms the importance of these original solutions and draws conclusions concerning the study of future nuclear power stations. (author) [French] Les resultats atteints apres trois ans de fonctionnement des reacteurs G-2/G-3 permettent une accumulation considerable de l'experience d'exploitation de ces reacteurs. Les principales originalites: - caisson en beton precontraint - chargement en marche - surveillance automatique des temperatures sont largement justifiees par l'exploitation actuelle. L'auteur confirme l'interet de ces solutions d'avant-garde et en tire des conclusions pour les etudes de futures centrales nucleaires. (auteur)

  5. Assessing Africa-wide Pangolin exploitation by scaling local data

    DEFF Research Database (Denmark)

    Ingram, Daniel J.; Coad, Lauren; Abernethy, Katharine A.

    2018-01-01

    on regional trends in exploitation of threatened species to inform conservation actions and policy. We estimate that 0.4-2.7 million pangolins are hunted annually in Central African forests. The number of pangolins hunted has increased by ∼150% and the proportion of pangolins of all vertebrates hunted...... increased from 0.04% to 1.83% over the past four decades. However, there were no trends in pangolins observed at markets, suggesting use of alternative supply chains. We found evidence that the price of giant (Smutsia gigantea) and arboreal (Phataginus sp.) pangolins in urban markets has increased...

  6. VCSELs and silicon light sources exploiting SOI grating mirrors

    DEFF Research Database (Denmark)

    Chung, Il-Sug; Mørk, Jesper

    2012-01-01

    In this talk, novel vertical-cavity laser structure consisting of a dielectric Bragg reflector, a III-V active region, and a high-index-contrast grating made in the Si layer of a silicon-on-insulator (SOI) wafer will be presented. In the Si light source version of this laser structure, the SOI...... the Bragg reflector. Numerical simulations show that both the silicon light source and the VCSEL exploiting SOI grating mirrors have superior performances, compared to existing silicon light sources and long wavelength VCSELs. These devices are highly adequate for chip-level optical interconnects as well...

  7. HIV risks and needs related to the Sustainable Development Goals among female sex workers who were commercially sexually exploited as children in Lesotho.

    Science.gov (United States)

    Grosso, Ashley; Busch, Shianne; Mothopeng, Tampose; Sweitzer, Stephanie; Nkonyana, John; Mpooa, Nkomile; Taruberekera, Noah; Baral, Stefan

    2018-02-01

    Sustainable Development Goals (SDGs) about gender equality; decent work; and peace, justice, and strong institutions include a focus on eradicating trafficking and sexual exploitation of and violence against women and children. In Lesotho, 86% of women have experienced gender-based violence. In addition, overall HIV prevalence is among the highest globally, and higher among adolescent girls than boys. Moreover, nearly three quarters of female sex workers (FSW) are estimated to be living with HIV in Lesotho. In this context, sexually exploited children may be particularly vulnerable to violence and HIV acquisition risks. This study's objective is to examine the prevalence and correlates of experiencing sexual exploitation as a child among FSW in Lesotho. FSW (≥18 years) recruited through respondent-driven sampling in Maseru and Maputsoe from February to September 2014 completed HIV and syphilis testing and an interviewer-administered survey, including a question about the age at which they started providing sex for money. This study examined correlates of experiencing sexual exploitation as a child (trouble with police (aOR: 3.18, 95% CI: 1.50 to 6.75, p = 0.003). Risk determinants for HIV and violence among sexually exploited children can be studied retrospectively through research with adult FSW. Further research working directly with sexually exploited children will improve understanding of their needs. Preventing commercial sexual exploitation of children and addressing the social and healthcare needs of those who are exploited are necessary to fully achieve SDGs 5, 8 and 16 and an AIDS-Free Generation. © 2018 The Authors. Journal of the International AIDS Society published by John Wiley & sons Ltd on behalf of the International AIDS Society.

  8. The false promises of coal exploitation: How mining affects herdsmen well-being in the grassland ecosystems of Inner Mongolia

    International Nuclear Information System (INIS)

    Dai, G.S.; Ulgiati, S.; Zhang, Y.S.; Yu, B.H.; Kang, M.Y.; Jin, Y.; Dong, X.B.; Zhang, X.S.

    2014-01-01

    The grasslands of Inner Mongolia are not only the source of the necessary resources for the survival and development of herdsmen, but also represent a significant green ecological barrier in North China. Coal-mining production is important in maintaining GDP growth in Inner Mongolia. However, over-exploitation has created serious problems, such as pollution of the environment and significant decreases in grassland ecosystem services, in addition to impacting the well-being of herdsmen and other humans. Based on questionnaires survey performed among 864 herdsmen addressing the relationship between coal exploitation in grasslands and human well-being in Xilinguole League in Inner Mongolia, we found that (1) coal resource exploitation in these grasslands does not benefit the herdsmen by increasing their income; (2) the rapid development of this resource has not obviously materially improved the life of the herdsmen; and (3) these activities have increased the risks that herdsman will have to endure in the future. Overall, coal resource exploitation in grasslands has more negative than positive effects on the well-being of herdsmen. We propose the conservation of coal resources and improvement of ecological compensation should be carried out without blindly pursuing economic growth, instead of focusing on economic development and structural adjustments. - Highlights: • Evaluation of the human well-being of the Xilinguole grassland, Inner Mongolia, China. • Impact of mining affects herdsmen well-being in grassland ecosystem. • Quantity of questionnaires survey. • Addressing the relationship between coal exploitation in grasslands and human well-being

  9. Countermeasure Study on Deep-sea Oil Exploitation in the South China Sea——A Comparison between Deep-sea Oil Exploitation in the South China Sea and the Gulf of Mexico

    Science.gov (United States)

    Zhao, Hui; Qiu, Weiting; Qu, Weilu

    2018-02-01

    The unpromising situation of terrestrial oil resources makes the deep-sea oil industry become an important development strategy. The South China Sea has a vast sea area with a wide distribution of oil and gas resources, but there is a phenomenon that exploration and census rates and oil exploitation are low. In order to solve the above problems, this article analyzes the geology, oil and gas exploration and exploration equipment in the South China Sea and the Gulf of Mexico. Comparing the political environment of China and the United States energy industry and the economic environment of oil companies, this article points out China’s deep-sea oil exploration and mining problems that may exist. Finally, the feasibility of oil exploration and exploitation in the South China Sea is put forward, which will provide reference to improve the conditions of oil exploration in the South China Sea and promoting the stable development of China’s oil industry.

  10. Compte rendu partiel du 10e Colloque sur l'Exploitation des Océans, Paris, 20-22 janvier 1982 Partial Report on the 10th Symposium on Ocean Exploitation, Paris, 20-22 January 1982

    Directory of Open Access Journals (Sweden)

    Bertrand A. R. V.

    2006-11-01

    Full Text Available De ce 10e Colloque de l' ASTEO sur l'exploitation des océans (Paris, 20-22 janvier 1982 nous retiendrons les points suivants : - la reconnaissance unanime du rôle primordial joué par le secteur pétrolier dans l'exploitation des richesse océaniques ; - la grande qualité des communications consacrées à l'exploitation pétrolière marine. On retiendra aussi une excellente table ronde consacrée aux sources d'énergie utilisables en propulsion sous-marine et susceptibles de menacer le quasi monopole des classique batteries au plomb. Les batteries évoluées, dont le développement industriel coûterait trop cher en l'absence de débouchés commerciaux suffisants (le marché de la traction électrique automobile paraissant leur échapper, semblent abandonnées. Les piles à combustible à hydrogène et à électrolyte basique (type IFP et les moteurs Stirling à stockage thermique se présentaient comme les meilleures solutions de remplacement. Mais un conférencier a créé la surprise en présentant un moteur diesel en circuit fermé qui a été certifié par Lloyds Register et dont on parle pour équiper le sous-marin Argyronète. This 10th ASTEO Symposium on Ocean Exploitation (Paris, 20-22 January 1982 concentrated on the following two points: (i unanimous recognition of the primordial rote played by the petroleum sector in exploiting the wealth contained in the ocean, and (ii the high quality of the papers devoted to offshore petroleum operations. There was also an excellent round-table discussion devoted to energy sources that can be used for subsea propulsion and that might act as a threat to the quasi-monopoly of conventional lead batteries. So-called sophisticated batteries, for which industrial development would be too expensive in the absence of a sufficient potential market (since the market for electric automotive traction appears to be beyond their reach, appear to have been abandoned. Hydrogen and basic electrolyte fuel cells

  11. Exploitation of the Virtual Worlds in Tourism and Tourism Education

    OpenAIRE

    Zejda Pavel; Zejda David

    2016-01-01

    Academics perceive a great potential of virtual worlds in various areas, including tourism and education. Efforts adapting the virtual worlds in practice are, however, still marginal. There is no clear definition of the virtual world. Therefore the author of this article attempts to provide one. The paper also focuses on the barriers of a wider exploitation of the virtual worlds and discusses the principles that might help to increase their potential in tourism area. One of the principles – g...

  12. Asylum, Immigration Restrictions and Exploitation: Hyper-precarity as a lens for understanding and tackling forced labour

    Directory of Open Access Journals (Sweden)

    Hannah Lewis

    2015-09-01

    Full Text Available The topic of forced labour is receiving a growing amount of political and policy attention across the globe. This paper makes two clear contributions to emerging debates. First, we focus on a group who are seldom explicitly considered in forced labour debates: forced migrants who interact with the asylum system. We build an argument of the production of susceptibility to forced labour through the United Kingdom’s (UK asylum system, discussing the roles of compromised socio-legal status resulting from restrictive immigration policy, neoliberal labour market characteristics and migrants’ own trajectories. Second, we argue that forced labour needs to be understood as part of, and an outcome of, widespread normalised precarious work. Precarity is a concept used to describe the rise of insecure, casualised and sub-contracted work and is useful in explaining labour market processes that are conducive to the production of forced labour. Using precarity as a lens to examine forced labour encourages the recognition of extreme forms of exploitation as part of a wider picture of systematic exploitation of migrants in the labour market. To understand the reasons why forced migrants might be drawn into severe labour exploitation in the UK, we introduce the concept of hyper-precarity to explain how multidimensional insecurities contribute to forced labour experiences, particularly among forced migrants in the global north. Viewing forced labour as connected to precarity also suggests that avenues and tools for tackling severe labour exploitation need to form part of the wider struggle for migrant labour rights.

  13. Preface to the special issue on ;Optical Communications Exploiting the Space Domain;

    Science.gov (United States)

    Wang, Jian; Yu, Siyuan; Li, Guifang

    2018-02-01

    The demand for high capacity optical communications will continue to be driven by the exponential growth of global internet traffic. Optical communications are about the exploitation of different physical dimensions of light waves, including complex amplitude, frequency (or wavelength), time, polarization, etc. Conventional techniques such as wavelength-division multiplexing (WDM), time-division multiplexing (TDM) and polarization-division multiplexing (PDM) have almost reached their scalability limits. Space domain is the only known physical dimension left and space-division multiplexing (SDM) seems the only option to further scale the transmission capacity and spectral efficiency of optical communications. In recent years, few-mode fiber (FMF), multi-mode fiber (MMF), multi-core fiber (MCF) and few-mode multi-core fiber (FM-MCF) have been widely explored as promising candidates for fiber-based SDM. The challenges for SDM include efficient (de)multiplexer, amplifiers, and multiple-input multiple-output (MIMO) digital signal processing (DSP) techniques. Photonic integration will also be a key technology to SDM. Meanwhile, free-space and underwater optical communications have also exploited the space domain to increase the transmission capacity and spectral efficiency. The challenges include long-distance transmission limited by propagation loss, divergence, scattering and turbulence. Very recently, helically phased light beams carrying orbital angular momentum (OAM) have also seen potential applications both in free-space, underwater and fiber-based optical communications. Actually, different mode bases such as linearly polarized (LP) modes and OAM modes can be employed for SDM. Additionally, SDM could be used in chip-scale photonic interconnects and data center optical interconnects. Quantum processing exploiting the space domain is of great interest. The information capacity limit and physical layer security in SDM optical communications systems are important

  14. Tobacco Industry Promotional Strategies Targeting American Indians/Alaska Natives and Exploiting Tribal Sovereignty.

    Science.gov (United States)

    Lempert, Lauren K; Glantz, Stanton A

    2018-03-12

    American Indians/Alaska Natives have the highest commercial tobacco use in the United States, resulting in higher tobacco-caused deaths and diseases than the general population. Some American Indians/Alaska Natives use commercial tobacco for ceremonial as well as recreational uses. Because federally-recognized Tribal lands are sovereign, they are not subject to state cigarette taxes and smokefree laws. This study analyzes tobacco industry promotional efforts specifically targeting American Indians/Alaska Natives and exploiting Tribal lands to understand appropriate policy responses in light of American Indians'/Alaska Natives' unique sovereign status and culture. We analyzed previously secret tobacco industry documents available at the Truth Tobacco Documents Library (https://industrydocuments.library.ucsf.edu/tobacco/). Tobacco companies used promotional strategies targeting American Indians/Alaska Natives and exploiting Tribal lands that leveraged the federally-recognized Tribes' unique sovereign status exempting them from state cigarette taxes and smokefree laws, and exploited some Tribes' existing traditional uses of ceremonial tobacco and poverty. Tactics included price reductions, coupons, giveaways, gaming promotions, charitable contributions and sponsorships. Additionally, tobacco companies built alliances with Tribal leaders to help improve their corporate image, advance ineffective "youth smoking prevention" programs, and defeat tobacco control policies. The industry's promotional tactics likely contribute to disparities in smoking prevalence and smoking-related diseases among American Indians//Alaska Natives. Proven policy interventions to address these disparities including tobacco price increases, cigarette taxes, comprehensive smokefree laws, and industry denormalization campaigns to reduce smoking prevalence and smoking-related disease could be considered by Tribal communities. The sovereign status of federally-recognized Tribes does not prevent them

  15. Collaborative real-time motion video analysis by human observer and image exploitation algorithms

    Science.gov (United States)

    Hild, Jutta; Krüger, Wolfgang; Brüstle, Stefan; Trantelle, Patrick; Unmüßig, Gabriel; Heinze, Norbert; Peinsipp-Byma, Elisabeth; Beyerer, Jürgen

    2015-05-01

    Motion video analysis is a challenging task, especially in real-time applications. In most safety and security critical applications, a human observer is an obligatory part of the overall analysis system. Over the last years, substantial progress has been made in the development of automated image exploitation algorithms. Hence, we investigate how the benefits of automated video analysis can be integrated suitably into the current video exploitation systems. In this paper, a system design is introduced which strives to combine both the qualities of the human observer's perception and the automated algorithms, thus aiming to improve the overall performance of a real-time video analysis system. The system design builds on prior work where we showed the benefits for the human observer by means of a user interface which utilizes the human visual focus of attention revealed by the eye gaze direction for interaction with the image exploitation system; eye tracker-based interaction allows much faster, more convenient, and equally precise moving target acquisition in video images than traditional computer mouse selection. The system design also builds on prior work we did on automated target detection, segmentation, and tracking algorithms. Beside the system design, a first pilot study is presented, where we investigated how the participants (all non-experts in video analysis) performed in initializing an object tracking subsystem by selecting a target for tracking. Preliminary results show that the gaze + key press technique is an effective, efficient, and easy to use interaction technique when performing selection operations on moving targets in videos in order to initialize an object tracking function.

  16. Proba-V Mission Exploitation Platform

    Science.gov (United States)

    Goor, Erwin; Dries, Jeroen

    2017-04-01

    VITO and partners developed the Proba-V Mission Exploitation Platform (MEP) as an end-to-end solution to drastically improve the exploitation of the Proba-V (a Copernicus contributing mission) EO-data archive (http://proba-v.vgt.vito.be/), the past mission SPOT-VEGETATION and derived vegetation parameters by researchers, service providers and end-users. The analysis of time series of data (+1PB) is addressed, as well as the large scale on-demand processing of near real-time data on a powerful and scalable processing environment. Furthermore data from the Copernicus Global Land Service is in scope of the platform. From November 2015 an operational Proba-V MEP environment, as an ESA operation service, is gradually deployed at the VITO data center with direct access to the complete data archive. Since autumn 2016 the platform is operational and yet several applications are released to the users, e.g. - A time series viewer, showing the evolution of Proba-V bands and derived vegetation parameters from the Copernicus Global Land Service for any area of interest. - Full-resolution viewing services for the complete data archive. - On-demand processing chains on a powerfull Hadoop/Spark backend e.g. for the calculation of N-daily composites. - Virtual Machines can be provided with access to the data archive and tools to work with this data, e.g. various toolboxes (GDAL, QGIS, GrassGIS, SNAP toolbox, …) and support for R and Python. This allows users to immediately work with the data without having to install tools or download data, but as well to design, debug and test applications on the platform. - A prototype of jupyter Notebooks is available with some examples worked out to show the potential of the data. Today the platform is used by several third party projects to perform R&D activities on the data, and to develop/host data analysis toolboxes. In parallel the platform is further improved and extended. From the MEP PROBA-V, access to Sentinel-2 and landsat data will

  17. An exploratory model of girls' vulnerability to commercial sexual exploitation in prostitution.

    Science.gov (United States)

    Reid, Joan A

    2011-05-01

    Due to inaccessibility of child victims of commercial sexual exploitation, the majority of emergent research on the problem lacks theoretical framing or sufficient data for quantitative analysis. Drawing from Agnew's general strain theory, this study utilized structural equation modeling to explore: whether caregiver strain is linked to child maltreatment, if experiencing maltreatment is associated with risk-inflating behaviors or sexual denigration of self/others, and if these behavioral and psychosocial dysfunctions are related to vulnerability to commercial sexual exploitation. The proposed model was tested with data from 174 predominately African American women, 12% of whom indicated involvement in prostitution while a minor. Findings revealed child maltreatment worsened with increased caregiver strain. Experiencing child maltreatment was linked to running away, initiating substance use at earlier ages, and higher levels of sexual denigration of self/others. Sexual denigration of self/others was significantly related to the likelihood of prostitution as a minor. The network of variables in the model accounted for 34% of the variance in prostitution as a minor.

  18. Un simulateur de production de puits exploité en gas-lift A Production Simulator for Gas-Lift Wells

    Directory of Open Access Journals (Sweden)

    Caralp L.

    2006-11-01

    Full Text Available Le procédé d'exploitation assisté de pétrole par gas-lift " est utilisé dans les applications off-shore. Sa dynamique lente nuit à la réalisation in situ d'études de conditions d'exploitation optimales. Si l'on veut apprendre à conduire ce type de procédé ou optimiser les conditions d'exploitation sur un ensemble de puits, disposer d'un logiciel de simulation est une nécessité. Réalisé à partir des modèles de connaissance : - d'écoulement diphasique incluant le taux de gaz dans les bouchons d'huile (régime poches-bouchons et les échanges de masse entre phases; - de gisement; - de l'injection de gaz; le simulateur, qui emploie les corrélations les plus fréquemment utilisées décrivant les mélanges huile-gaz, fournit des résultats physiquement acceptables qui sont présentés. Le processus est non linéaire et asymétrique. Help oil well process by gas-liftare use in off shore application. Slow dynamic is an handicap for a study of optimal exploitation conditions. To learn to drive this process and to optimize exploitation conditions on an oil field it is necessary to set of a simulator. It is realized from knowledge models :(a two-phases flows, (b oil pool,(c gaz injection, including gas rate in oil slug (slug regime and mass exchange into phases. The simulator work with the most commonly use oil-gas mixture correlations. This results are physically reasonable. Process is non linear and asymetrical.

  19. Managing the exploitation life of the mining machinery for an unlimited duration of time

    Directory of Open Access Journals (Sweden)

    Vujić Slobodan

    2011-01-01

    Full Text Available The problem of determining the optimum exploitation life of machinery, namely, the optimum time for machinery and equipment replacement, represents a complex and highly responsible engineering task. Taking into consideration the situation prevailing at coal pit mines in Serbia, the tasks of this rank are very complex and difficult. To make a decision on the replacement of capital equipment and machinery, such as bucket wheel excavators within the mentioned systems, implies a management task of utmost responsibility. It requires high professional and analytical knowledge as well as reliable arguments, based on a multidisciplinary professional approach. In this paper, the authors present their views on the problem of establishing the optimum exploitation life of bucket wheel excavators, offering an algorithm, based on dynamic programming, as a solution.

  20. The impact of exploiting spectro-temporal context in computational speech segregation

    DEFF Research Database (Denmark)

    Bentsen, Thomas; Kressner, Abigail Anne; Dau, Torsten

    2018-01-01

    Computational speech segregation aims to automatically segregate speech from interfering noise, often by employing ideal binary mask estimation. Several studies have tried to exploit contextual information in speech to improve mask estimation accuracy by using two frequently-used strategies that (1...... for measured intelligibility. The findings may have implications for the design of speech segregation systems, and for the selection of a cost function that correlates with intelligibility....

  1. Geometric saliency to characterize radar exploitation performance

    Science.gov (United States)

    Nolan, Adam; Keserich, Brad; Lingg, Andrew; Goley, Steve

    2014-06-01

    Based on the fundamental scattering mechanisms of facetized computer-aided design (CAD) models, we are able to define expected contributions (EC) to the radar signature. The net result of this analysis is the prediction of the salient aspects and contributing vehicle morphology based on the aspect. Although this approach does not provide the fidelity of an asymptotic electromagnetic (EM) simulation, it does provide very fast estimates of the unique scattering that can be consumed by a signature exploitation algorithm. The speed of this approach is particularly relevant when considering the high dimensionality of target configuration variability due to articulating parts which are computationally burdensome to predict. The key scattering phenomena considered in this work are the specular response from a single bounce interaction with surfaces and dihedral response formed between the ground plane and vehicle. Results of this analysis are demonstrated for a set of civilian target models.

  2. Microbial biosurfactants: challenges and opportunities for future exploitation.

    Science.gov (United States)

    Marchant, Roger; Banat, Ibrahim M

    2012-11-01

    The drive for industrial sustainability has pushed biosurfactants to the top of the agenda of many companies. Biosurfactants offer the possibility of replacing chemical surfactants, produced from nonrenewable resources, with alternatives produced from cheap renewable feedstocks. Biosurfactants are also attractive because they are less damaging to the environment yet are robust enough for industrial use. The most promising biosurfactants at the present time are the glycolipids, sophorolipids produced by Candida yeasts, mannosylerythritol lipids (MELs) produced by Pseudozyma yeasts, and rhamnolipids produced by Pseudomonas. Despite the current enthusiasm for these compounds several residual problems remain. This review highlights remaining problems and indicates the prospects for imminent commercial exploitation of a new generation of microbial biosurfactants. Copyright © 2012 Elsevier Ltd. All rights reserved.

  3. Exploiting heterogeneous publicly available data sources for drug safety surveillance: computational framework and case studies.

    Science.gov (United States)

    Koutkias, Vassilis G; Lillo-Le Louët, Agnès; Jaulent, Marie-Christine

    2017-02-01

    Driven by the need of pharmacovigilance centres and companies to routinely collect and review all available data about adverse drug reactions (ADRs) and adverse events of interest, we introduce and validate a computational framework exploiting dominant as well as emerging publicly available data sources for drug safety surveillance. Our approach relies on appropriate query formulation for data acquisition and subsequent filtering, transformation and joint visualization of the obtained data. We acquired data from the FDA Adverse Event Reporting System (FAERS), PubMed and Twitter. In order to assess the validity and the robustness of the approach, we elaborated on two important case studies, namely, clozapine-induced cardiomyopathy/myocarditis versus haloperidol-induced cardiomyopathy/myocarditis, and apixaban-induced cerebral hemorrhage. The analysis of the obtained data provided interesting insights (identification of potential patient and health-care professional experiences regarding ADRs in Twitter, information/arguments against an ADR existence across all sources), while illustrating the benefits (complementing data from multiple sources to strengthen/confirm evidence) and the underlying challenges (selecting search terms, data presentation) of exploiting heterogeneous information sources, thereby advocating the need for the proposed framework. This work contributes in establishing a continuous learning system for drug safety surveillance by exploiting heterogeneous publicly available data sources via appropriate support tools.

  4. A bi-population based scheme for an explicit exploration/exploitation trade-off in dynamic environments

    Science.gov (United States)

    Ben-Romdhane, Hajer; Krichen, Saoussen; Alba, Enrique

    2017-05-01

    Optimisation in changing environments is a challenging research topic since many real-world problems are inherently dynamic. Inspired by the natural evolution process, evolutionary algorithms (EAs) are among the most successful and promising approaches that have addressed dynamic optimisation problems. However, managing the exploration/exploitation trade-off in EAs is still a prevalent issue, and this is due to the difficulties associated with the control and measurement of such a behaviour. The proposal of this paper is to achieve a balance between exploration and exploitation in an explicit manner. The idea is to use two equally sized populations: the first one performs exploration while the second one is responsible for exploitation. These tasks are alternated from one generation to the next one in a regular pattern, so as to obtain a balanced search engine. Besides, we reinforce the ability of our algorithm to quickly adapt after cnhanges by means of a memory of past solutions. Such a combination aims to restrain the premature convergence, to broaden the search area, and to speed up the optimisation. We show through computational experiments, and based on a series of dynamic problems and many performance measures, that our approach improves the performance of EAs and outperforms competing algorithms.

  5. Assessing the viability of the Species at Risk Act in managing commercial exploitation and recovery of threatened and endangered marine fish in Canada

    OpenAIRE

    Druce, Courtney Danielle

    2012-01-01

    Commercially exploited threatened or endangered marine fish are consistently declined for listing under Canada’s Species at Risk Act (SARA), largely due to predicted socio-economic impacts associated with SARA’s prohibitions. However, commercial exploitation can be exempted from SARA’s general prohibitions. If exemptions were utilized, commercially exploited species could benefit from other aspects of SARA listing, and support continued economic opportunities for fishers. I conducted a litera...

  6. Les effets des grandes exploitations minières sur les collectivités ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    15 juil. 2011 ... Il fixe également des normes environnementales qui, souvent, sont supérieures ... des dangers que l'exploitation pourrait entraîner pour l'environnement. ... ÉTUDE DE CAS — Inde : Suivi de la santé et du bien-être dans la ...

  7. Cloud ecosystem for supporting inquiry learning with online labs : Creation, personalization, and exploitation

    NARCIS (Netherlands)

    Gillet, Denis; Rodríguez-Triana, María Jesús; De Jong, Ton; Bollen, Lars; Dikke, Diana

    2017-01-01

    To effectively and efficiently implement blended science and technology education, teachers should be able to find educational resources that suit their need, fit with their curricula, and that can be easily exploited in their classroom. The European Union has supported the FP7 Go-Lab Integrated

  8. Viability of exploiting L-shell fluorescence for X-ray polarimetry

    Energy Technology Data Exchange (ETDEWEB)

    Weisskopf, M C; Elsner, R F; Ramsey, B D [National Aeronautics and Space Administration, Huntsville, AL (USA). Space Sciences Lab.; Sutherland, P G [McMaster Univ., Hamilton, Ontario (Canada). Dept. of Physics

    1985-05-15

    It has been suggested that one may build an X-ray polarimeter by exploiting the polarization dependence of the angular distribution of L-shell fluorescence photons. In this paper we examine, theoretically, the sensitivity of this approach to polarimetry. We apply our calculations to several detection schemes using imaging proportional counters that would have direct application in X-ray astronomy. We find, however, that the sensitivity of this method for measuring X-ray polarization is too low to be of use for other than laboratory applications.

  9. On the Exploitation of Sensitivity Derivatives for Improving Sampling Methods

    Science.gov (United States)

    Cao, Yanzhao; Hussaini, M. Yousuff; Zang, Thomas A.

    2003-01-01

    Many application codes, such as finite-element structural analyses and computational fluid dynamics codes, are capable of producing many sensitivity derivatives at a small fraction of the cost of the underlying analysis. This paper describes a simple variance reduction method that exploits such inexpensive sensitivity derivatives to increase the accuracy of sampling methods. Three examples, including a finite-element structural analysis of an aircraft wing, are provided that illustrate an order of magnitude improvement in accuracy for both Monte Carlo and stratified sampling schemes.

  10. Beneath Still Waters - Multistage Aquatic Exploitation of Euryale ferox (Salisb. during the Acheulian

    Directory of Open Access Journals (Sweden)

    Naama Goren-Inbar1

    2014-09-01

    Full Text Available Remains of the highly nutritious aquatic plant Fox nut – Euryale ferox Salisb. (Nymphaeaceae – were found at the Acheulian site of Gesher Benot Ya'aqov, Israel. Here, we present new evidence for complex cognitive strategies of hominins as seen in their exploitation of E. ferox nuts. We draw on excavated data and on parallels observed in traditional collecting and processing practices from Bihar, India. We suggest that during the early Middle Pleistocene, hominins implemented multistage procedures comprising underwater gathering and subsequent processing (drying, roasting and popping of E. ferox nuts. Hierarchical processing strategies are observed in the Acheulian lithic reduction sequences and butchering of game at this and other sites, but are poorly understood as regards the exploitation of aquatic plant resources. We highlight the ability of Acheulian hominins to resolve issues related to underwater gathering of E. ferox nuts during the plant's life cycle and to adopt strategies to enhance their nutritive value.

  11. Exploiting Rating Abstention Intervals for Addressing Concept Drift in Social Network Recommender Systems

    Directory of Open Access Journals (Sweden)

    Dionisis Margaris

    2018-04-01

    Full Text Available One of the major problems that social networks face is the continuous production of successful, user-targeted information in the form of recommendations, which are produced exploiting technology from the field of recommender systems. Recommender systems are based on information about users’ past behavior to formulate recommendations about their future actions. However, as time goes by, social network users may change preferences and likings: they may like different types of clothes, listen to different singers or even different genres of music and so on. This phenomenon has been termed as concept drift. In this paper: (1 we establish that when a social network user abstains from rating submission for a long time, it is a strong indication that concept drift has occurred and (2 we present a technique that exploits the abstention interval concept, to drop from the database ratings that do not reflect the current social network user’s interests, thus improving prediction quality.

  12. CIME Summer Course on Exploiting Hidden Structure in Matrix Computations : Algorithms and Applications

    CERN Document Server

    Simoncini, Valeria

    2016-01-01

    Focusing on special matrices and matrices which are in some sense "near" to structured matrices, this volume covers a broad range of topics of current interest in numerical linear algebra. Exploitation of these less obvious structural properties can be of great importance in the design of efficient numerical methods, for example algorithms for matrices with low-rank block structure, matrices with decay, and structured tensor computations. Applications range from quantum chemistry to queuing theory. Structured matrices arise frequently in applications. Examples include banded and sparse matrices, Toeplitz-type matrices, and matrices with semi-separable or quasi-separable structure, as well as Hamiltonian and symplectic matrices. The associated literature is enormous, and many efficient algorithms have been developed for solving problems involving such matrices. The text arose from a C.I.M.E. course held in Cetraro (Italy) in June 2015 which aimed to present this fast growing field to young researchers, exploit...

  13. FY 1999 Report on overseas geological structure surveys. Joint Japan-China Yu Xian exploitation project (Attachments); 1999 nendo kaigai chishitsu kozo nado chosa futai shiryo. Nippon Chugoku sekitan kyodo tansa Yu Xian project

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-03-01

    This reports provides the attachments for the report JN0041264. The contents include (1) minutes of the fourth steering committee, (2) technical reports presented to the fourth steering committee (I: report on FY 1998 joint exploitation works, and II: report on FY 1999 joint exploitation works), (3) minutes of the fifth steering committee, and (4) technical reports presented to the fifth steering committee (I: report on FY 1999 joint exploitation works, and II: report on planned FY 2000 joint exploitation works). The item (1) includes approval of the reports on FY 1998 and 1999 joint exploitation works. The item (2)-I report includes seismic exploitation test works, observation work results and quality evaluation thereof; drilling exploitation work results, quality evaluation thereof, exploitation results and evaluation thereof; exploitation results and evaluation thereof; and proposals. The item (2)-II report includes seismic exploitation, drilling exploitation, and man-hours of the workers from the both countries. The item (3) includes approval of the reports on FY 1999 joint exploitation works and planned FY 2000 joint exploitation works. The (4)-I report includes seismic exploitation work results and evaluation thereof, seismic exploitation test works, drilling exploitation work results, quality evaluation thereof, exploitation results and evaluation thereof, and proposals for the future works. The (4)-II report includes seismic and drilling exploitation plans, and numbers and periods of the workers from the both countries. (NEDO)

  14. Challenges in authorization of exploration and exploitation of radioactive minerals in Slovakia

    International Nuclear Information System (INIS)

    Janova, V.; Turner, M.

    2014-01-01

    Slovakia has a long tradition in the peaceful use of nuclear energy which dates back to the 1950s of last century. In parallel with the development of nuclear power uranium exploitation has started. Whereas the development of nuclear power has continued without interruption the uranium exploitation has been suspended during the political and economic restructuralization until 2005. There is also a difference in the acceptance of nuclear power by the local authorities in comparison with uranium exploration and exploitation. Permitting process of exploration activities in the Slovak Republic is regulated by geological law and falls within the competence of the Ministry of Environment. Radioactive minerals are considered as exclusive minerals and their survey is allowed to the applicant only in exploration territory. The exploration area is determined for four years and then extended for additional periods. The opinions of the affected municipalities and self governing regions (which reflect the compliance of the geological project with the objectives and priorities of the economic and social development programs and with the land-use planning documentation) have to be submitted with the application. Meanwhile, the affected municipality and the self governing region are the parties of administrative procedure of designation, change or cancellation of exploration area for radioactive minerals and they have a right of veto. In case, that affected municipality or autonomous region disagree with proposal, the Ministry of the Environment recommends a modification of proposed exploration area. Extraction of minerals is regulated by the mining act that falls under the competency of the Ministry of Economy. The right to mine exclusive deposits has the organization which has got mining license and which a mining area has been determined to. Preferential right for mining area determination has the company, that exploration area was determined and the research was carried out at

  15. On the optimum joint decoding capacity of wyner circular GCMAC by exploiting hadamard inequality

    KAUST Repository

    Shakir, Muhammad; Durrani, Tariq Salim; Alouini, Mohamed-Slim

    2010-01-01

    inequality established by exploiting the Hadamard operation between the channel fading (G) and channel slow gain (Ω) matrices. This paper demonstrates that the theoretical upper bound converges to the actual capacity for negligible channel slow gain among

  16. Investigation on Alteration of Compression of Knitted Orthopaedic Supports during Exploitation

    Directory of Open Access Journals (Sweden)

    Diana ALIŠAUSKIENĖ

    2012-12-01

    Full Text Available One of the areas of medical textile is the spacer knitted orthopaedic products. The concept of compression therapy of orthopaedic supports lies on a simple and efficient mechanical principle – it consists of applying elastic garment around the limb. Spacer orthopaedic supports are knitted on flat knitting machines equipped with especial elastomeric thread feeder. Compression made by the support depends on the support area, shape and characteristics of knitting. Because of orthopaedic supports are intended for durable wearing and need to vouchsafe compression of fixed value, it is very important to known how processes acting during exploitation influence alteration of compression values. The aim of this study was to establish the alteration of compression of knitted support during exploitation, i. e. after multifold extension, washing and drying. The samples were knitted on a flat double needle bed knitting machine in combined jacquard-laid-in pattern with elastomeric weft threads. It was established that compressive properties of knits after cyclic tensile load changed slightly, i. e. range between margins of error. It was measured that knitted orthopaedic supports dimensions and density after washing and drying cycles changes significant, i. e. knitted supports shrinks and thickens and their compression decreases.DOI: http://dx.doi.org/10.5755/j01.ms.18.4.3097

  17. Exploiting mitochondrial dysfunction for effective elimination of imatinib-resistant leukemic cells.

    Directory of Open Access Journals (Sweden)

    Jérome Kluza

    Full Text Available Challenges today concern chronic myeloid leukemia (CML patients resistant to imatinib. There is growing evidence that imatinib-resistant leukemic cells present abnormal glucose metabolism but the impact on mitochondria has been neglected. Our work aimed to better understand and exploit the metabolic alterations of imatinib-resistant leukemic cells. Imatinib-resistant cells presented high glycolysis as compared to sensitive cells. Consistently, expression of key glycolytic enzymes, at least partly mediated by HIF-1α, was modified in imatinib-resistant cells suggesting that imatinib-resistant cells uncouple glycolytic flux from pyruvate oxidation. Interestingly, mitochondria of imatinib-resistant cells exhibited accumulation of TCA cycle intermediates, increased NADH and low oxygen consumption. These mitochondrial alterations due to the partial failure of ETC were further confirmed in leukemic cells isolated from some imatinib-resistant CML patients. As a consequence, mitochondria generated more ROS than those of imatinib-sensitive cells. This, in turn, resulted in increased death of imatinib-resistant leukemic cells following in vitro or in vivo treatment with the pro-oxidants, PEITC and Trisenox, in a syngeneic mouse tumor model. Conversely, inhibition of glycolysis caused derepression of respiration leading to lower cellular ROS. In conclusion, these findings indicate that imatinib-resistant leukemic cells have an unexpected mitochondrial dysfunction that could be exploited for selective therapeutic intervention.

  18. An ethnomethodological approach to examine exploitation in the context of capacity, trust and experience of commercial surrogacy in India

    OpenAIRE

    Saravanan, Sheela

    2013-01-01

    The socio-ethical concerns regarding exploitation in commercial surrogacy are premised on asymmetric vulnerability and the commercialization of women’s reproductive capacity to suit individualistic motives. In examining the exploitation argument, this article reviews the social contract theory that describes an individual as an ‘economic man’ with moral and/or political motivations to satisfy individual desires. This study considers the critique by feminists, who argue that ...

  19. Exploiting Symmetry on Parallel Architectures.

    Science.gov (United States)

    Stiller, Lewis Benjamin

    1995-01-01

    This thesis describes techniques for the design of parallel programs that solve well-structured problems with inherent symmetry. Part I demonstrates the reduction of such problems to generalized matrix multiplication by a group-equivariant matrix. Fast techniques for this multiplication are described, including factorization, orbit decomposition, and Fourier transforms over finite groups. Our algorithms entail interaction between two symmetry groups: one arising at the software level from the problem's symmetry and the other arising at the hardware level from the processors' communication network. Part II illustrates the applicability of our symmetry -exploitation techniques by presenting a series of case studies of the design and implementation of parallel programs. First, a parallel program that solves chess endgames by factorization of an associated dihedral group-equivariant matrix is described. This code runs faster than previous serial programs, and discovered it a number of results. Second, parallel algorithms for Fourier transforms for finite groups are developed, and preliminary parallel implementations for group transforms of dihedral and of symmetric groups are described. Applications in learning, vision, pattern recognition, and statistics are proposed. Third, parallel implementations solving several computational science problems are described, including the direct n-body problem, convolutions arising from molecular biology, and some communication primitives such as broadcast and reduce. Some of our implementations ran orders of magnitude faster than previous techniques, and were used in the investigation of various physical phenomena.

  20. The 'dirty downside' of global sporting events: focus on human trafficking for sexual exploitation.

    Science.gov (United States)

    Finkel, R; Finkel, M L

    2015-01-01

    Human trafficking is as complex human rights and public health issue. The issue of human trafficking for sexual exploitation at large global sporting events has proven to be elusive given the clandestine nature of the industry. This piece examines the issue from a public health perspective. This is a literature review of the 'most comprehensive' studies published on the topic. A PubMed search was done using MeSH terms 'human traffickings' and 'sex trafficking' and 'human rights abuses'. Subheadings included 'statistics and numerical data', 'legislation and jurispudence', 'prevention and control', and 'therapy'. Only papers published in English were reviewed. The search showed that very few well-designed empirical studies have been conducted on the topic and only one pertinent systematic review was identified. Findings show a high prevalence of physical violence among those trafficked compared to non-trafficked women. Sexually transmitted infections and HIV AIDS are prevalent and preventive care is virtually non-existent. Quantifying human trafficking for sexual exploitation at large global sporting events has proven to be elusive given the clandestine nature of the industry. This is not to say that human trafficking for sex as well as forced sexual exploitation does not occur. It almost certainly exists, but to what extent is the big question. It is a hidden problem on a global scale in plain view with tremendous public health implications. Copyright © 2014 The Royal Society for Public Health. Published by Elsevier Ltd. All rights reserved.

  1. Information-guided transmission in decode-and-forward relaying systems: Spatial exploitation and throughput enhancement

    KAUST Repository

    Yang, Yuli; Aissa, Sonia

    2011-01-01

    In addressing the issue of achieving high throughput in half-duplex relay channels, we exploit a concept of information-guided transmission for the network consisting of a source node, a destination node, and multiple half-duplex relay nodes

  2. Exploiting large-scale correlations to detect continuous gravitational waves.

    Science.gov (United States)

    Pletsch, Holger J; Allen, Bruce

    2009-10-30

    Fully coherent searches (over realistic ranges of parameter space and year-long observation times) for unknown sources of continuous gravitational waves are computationally prohibitive. Less expensive hierarchical searches divide the data into shorter segments which are analyzed coherently, then detection statistics from different segments are combined incoherently. The novel method presented here solves the long-standing problem of how best to do the incoherent combination. The optimal solution exploits large-scale parameter-space correlations in the coherent detection statistic. Application to simulated data shows dramatic sensitivity improvements compared with previously available (ad hoc) methods, increasing the spatial volume probed by more than 2 orders of magnitude at lower computational cost.

  3. Geothermal exploitation activity by the United Nations in Ethiopia

    Energy Technology Data Exchange (ETDEWEB)

    Nakamura, H. (Geological Survey of Japan)

    1971-01-01

    The Rift Valley in Ethiopia was investigated for geothermal exploitation by the United Nations because it has Quaternary volcanoes which often indicate possible geothermal power generation. Preparations for the project are still being made, and the chemical analysis of hot springs is being conducted. The Rift Valley has high temperature springs and potential mineral deposits. The Danakil basin in Ethiopia which is included in the Northern Afar, has several active volcanoes made up of basalt deposits and has active hot springs. The East Africa Rift Valley, the Red Sea Rift Valley, and the Afar area are also areas suitable for investigation. Seven maps are included.

  4. Stiffness Control of Variable Serial Elastic Actuators: Energy Efficiency through Exploitation of Natural Dynamics

    Directory of Open Access Journals (Sweden)

    Philipp Beckerle

    2017-09-01

    Full Text Available Variable elastic actuators are very promising for applications in physical human–robot interaction. Besides enabling human safety, such actuators can support energy efficiency, especially if the natural behavior of the system is exploited. In this paper, the power and energy consumption of variable stiffness actuators with serial elasticity is investigated analytically and experimentally. Besides the fundamental mechanics, the influence of friction and electrical losses is discussed. A simple but effective stiffness control method is used to exploit the corresponding knowledge of natural dynamics by tuning the system to antiresonance operation. Despite nonlinear friction effects and additional electrical dynamics, the consideration of the ideal mechanical dynamics is completely sufficient for stiffness control. Simulations and experiments show that this yields a distinct reduction in power and energy consumption, which underlines the suitability of the control strategy.

  5. The Effect of Mutation on Explorative & Exploitative Behaviours with rt-NEAT

    OpenAIRE

    Pham, Khoa Dang Phu

    2017-01-01

    This thesis aims to explore how different factors can affect the search performance of evolutionary algorithms. Additionally how applying different mutation techniques changes the overall search performance of rtNEAT. This thesis demonstrates how mutation affects exploration and exploitation when optimizing for a 3-input XOR gate as well as optimizing agent movements in a real time environment. This thesis is also provided as a guideline in the development of an evolutionary algorithm, partic...

  6. THE REENACTMENT AS TOURISM EXPLOITATION THROUGH HERITAGE INTERPRETATION OF HERITAGE SITES IN TRANSYLVANIA

    Directory of Open Access Journals (Sweden)

    MIHAELA ZOTICA

    2015-06-01

    Full Text Available The Reenactment as Tourism Exploitation through Heritage Interpretation of Heritage Sites in Transylvania. Beside the need of reviewing up to date the theoretical progress in the field, we aimed at reviewing the challenges the reenactment performances in Romania have to face as presented in the literature. Another aim of this paper was to furnish an inventory of all tourism objectives in Transylvania where heritage interpretation in the form of reenactment is performed as a form of tourism exploitation of numerous sites. Another objective of this paper was to investigate the main issues of audience’s expectations regarding the performance of reenactment at Romanian historical tourism sites and issues practitioners have to challenge in their relatively recent activity. No theoretical meta-analysis or literature review paper on theoretical progress was found. The theoretical preoccupations for unifying the terminology and conceptualization seems to date since the Gotteborg (2012 Conference Re/theorisation of Heritage Studies, but from 2012 the interest in theorization was increasing, being visible in the number of papers published per year in peer-reviewed indexed journals. The results on the Romanian context were consistent with previous works stating that audience’s expectations, in their nature and information content, were very diverse. Half of the subjects investigated through semi-structured interviews and questionnaires assessing the expected level of satisfaction with the reenactment performance and the actual level of satisfaction after the performance showed positive differences. The (historical reenactment represents a viable modality of heritage interpretation in Romania and an efficient mean of tourism exploitation with positive results especially for the citadels in Transylvania.

  7. 300 nm bandwidth adiabatic SOI polarization splitter-rotators exploiting continuous symmetry breaking.

    Science.gov (United States)

    Socci, Luciano; Sorianello, Vito; Romagnoli, Marco

    2015-07-27

    Adiabatic polarization splitter-rotators are investigated exploiting continuous symmetry breaking thereby achieving significant device size and losses reduction in a single mask fabrication process for both SOI channel and ridge waveguides. A crosstalk lower than -25 dB is expected over 300nm bandwidth, making the device suitable for full grid CWDM and diplexer/triplexer FTTH applications at 1310, 1490 and 1550nm.

  8. THE IMPACT OF THE MINING EXPLOITATIONS FROM BUDOI ON THE NATURAL ENVIRONMENT

    Directory of Open Access Journals (Sweden)

    Cătălin CREłU

    2013-06-01

    Full Text Available The work is an attempt to respond to what extent the environment affected by serious anthropogenic interventions (the mining exploitation from the Budoi tunnel and the Budoi Village is close to its original state or a similar one, as a result of cessation of anthropic impact and the conduct of a program of restoration and preservation of the environment.

  9. Performance Production Analysis of Romanian Simmental Exploited at „P.F.A Munteanu Cornel” Farm

    Directory of Open Access Journals (Sweden)

    Alin Florin Avram

    2010-10-01

    Full Text Available Research follow to assess levels of productivity and the main indicators of milk of Romanian Simmental cows and its half blood, exploited in terms of milk production into Alba County environmental conditions. There were studied 45 cows from “P.F.A. Munteanu Cornel” farm. The results show that the maximum average of milk production is 5774 kg, registered in the third lactation and the average percentage of fat and protein is 3.92 respectively 3.34. The conclusion learned from the study is that Romanian Simmental cows studied have quantitative and qualitative productions over race standard and it is trying to reduce the period of exploitation and to intensify the process of milk production in first lactations.

  10. Differences in the metabolic rates of exploited and unexploited fish populations: a signature of recreational fisheries induced evolution?

    Directory of Open Access Journals (Sweden)

    Jan-Michael Hessenauer

    Full Text Available Non-random mortality associated with commercial and recreational fisheries have the potential to cause evolutionary changes in fish populations. Inland recreational fisheries offer unique opportunities for the study of fisheries induced evolution due to the ability to replicate study systems, limited gene flow among populations, and the existence of unexploited reference populations. Experimental research has demonstrated that angling vulnerability is heritable in Largemouth Bass Micropterus salmoides, and is correlated with elevated resting metabolic rates (RMR and higher fitness. However, whether such differences are present in wild populations is unclear. This study sought to quantify differences in RMR among replicated exploited and unexploited populations of Largemouth Bass. We collected age-0 Largemouth Bass from two Connecticut drinking water reservoirs unexploited by anglers for almost a century, and two exploited lakes, then transported and reared them in the same pond. Field RMR of individuals from each population was quantified using intermittent-flow respirometry. Individuals from unexploited reservoirs had a significantly higher mean RMR (6% than individuals from exploited populations. These findings are consistent with expectations derived from artificial selection by angling on Largemouth Bass, suggesting that recreational angling may act as an evolutionary force influencing the metabolic rates of fishes in the wild. Reduced RMR as a result of fisheries induced evolution may have ecosystem level effects on energy demand, and be common in exploited recreational populations globally.

  11. Sensor Exposure, Exploitation, and Experimentation Environment (SE4)

    Science.gov (United States)

    Buell, D.; Duff, F.; Goding, J.; Bankston, M.; McLaughlin, T.; Six, S.; Taylor, S.; Wootton, S.

    2011-09-01

    As the resident space object population increases from new launches and events such as the COSMOS/IRIDIUM collision, the maintenance of high-level Space Situational Awareness (SSA) has become increasingly difficult. To maintain situational awareness of the changing environment, new systems and methods must be developed. The Sensor Exposure, Exploitation and Experimentation Environment (SE4) provides a platform to illustrate “The Art of the Possible” that shows the potential benefit of enriched sensor data collections and real-time data sharing. Through modeling and simulation, and a net-centric architecture, SE4 shows the added value of sharing data in real-time and exposing new types of sensor data. The objective of SE4 is to develop an experimentation and innovation environment for sensor data exposure, composable sensor capabilities, reuse, and exploitation that accelerates the delivery of needed Command and Control, Intelligence, Surveillance, and Reconnaissance capabilities to the warfighter. Through modeling, simulation and rapid prototyping, the art of the possible for a fully-connected, net-centric space Command and Control (C2) and sensor enterprise can be demonstrated. This paper provides results that demonstrate the potential for faster cataloging of breakup events and additional event monitoring that are possible with data available today in the Space Surveillance Network (SSN). Demonstrating the art of the possible for the enterprise will guide net-centric requirements definition and facilitate discussions with stakeholder organizations on the Concept of Operations (CONOPS), policy, and Tactics, Techniques, and Procedures (TTP) evolution necessary to take full advantage of net-centric operations. SE4 aligns with direction from Secretary Gates and the Chairman Joint Chief of Staff that emphasizes the need to get the most out of our existing systems. Continuing to utilize SE4 will enable the enterprise by demonstrating the benefits of applying

  12. Protocol to Exploit Waiting Resources for UASNs

    Directory of Open Access Journals (Sweden)

    Li-Ling Hung

    2016-03-01

    Full Text Available The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols.

  13. Exploitation of heterogeneous resources for ATLAS Computing

    CERN Document Server

    Chudoba, Jiri; The ATLAS collaboration

    2018-01-01

    LHC experiments require significant computational resources for Monte Carlo simulations and real data processing and the ATLAS experiment is not an exception. In 2017, ATLAS exploited steadily almost 3M HS06 units, which corresponds to about 300 000 standard CPU cores. The total disk and tape capacity managed by the Rucio data management system exceeded 350 PB. Resources are provided mostly by Grid computing centers distributed in geographically separated locations and connected by the Grid middleware. The ATLAS collaboration developed several systems to manage computational jobs, data files and network transfers. ATLAS solutions for job and data management (PanDA and Rucio) were generalized and now are used also by other collaborations. More components are needed to include new resources such as private and public clouds, volunteers' desktop computers and primarily supercomputers in major HPC centers. Workflows and data flows significantly differ for these less traditional resources and extensive software re...

  14. CHARACTERISTICS OF HYDROCARBON EXPLOITATION IN ARCTIC CIRCLE

    Directory of Open Access Journals (Sweden)

    Vanja Lež

    2013-12-01

    Full Text Available The existence of large quantities of hydrocarbons is supposed within the Arctic Circle. Assumed quantities are 25% of the total undiscovered hydrocarbon reserves on Earth, mostly natural gas. Over 500 major and minor gas accumulations within the Arctic Circle were discovered so far, but apart from Snøhvit gas field, there is no commercial exploitation of natural gas from these fields. Arctic gas projects are complicated, technically hard to accomplish, and pose a great threat to the return of investment, safety of people and equipment and for the ecosystem. Russia is a country that is closest to the realization of the Arctic gas projects that are based on the giant gas fields. The most extreme weather conditions in the seas around Greenland are the reason why this Arctic region is the least explored and furthest from the realization of any gas project (the paper is published in Croatian .

  15. Subjective evaluation of two stereoscopic imaging systems exploiting visual attention to improve 3D quality of experience

    Science.gov (United States)

    Hanhart, Philippe; Ebrahimi, Touradj

    2014-03-01

    Crosstalk and vergence-accommodation rivalry negatively impact the quality of experience (QoE) provided by stereoscopic displays. However, exploiting visual attention and adapting the 3D rendering process on the fly can reduce these drawbacks. In this paper, we propose and evaluate two different approaches that exploit visual attention to improve 3D QoE on stereoscopic displays: an offline system, which uses a saliency map to predict gaze position, and an online system, which uses a remote eye tracking system to measure real time gaze positions. The gaze points were used in conjunction with the disparity map to extract the disparity of the object-of-interest. Horizontal image translation was performed to bring the fixated object on the screen plane. The user preference between standard 3D mode and the two proposed systems was evaluated through a subjective evaluation. Results show that exploiting visual attention significantly improves image quality and visual comfort, with a slight advantage for real time gaze determination. Depth quality is also improved, but the difference is not significant.

  16. Shale gas, Poland pioneer of exploitation in Europe

    International Nuclear Information System (INIS)

    Rybicka, Urszula; Khalatbari, Azar; Schneider, Frederic; Nabrdalik, Maciek

    2012-01-01

    This article presents an installation built by a Polish company to perform drillings in the search for shale gas pockets from which gas would be extracted by hydraulic fracturing. Some technical characteristics of the installation and process are evoked. The article outlines the confidence the population now has gained in this installation. However and despite the fact that the region possesses important underground water reserves, water consumption is reported to be too high with respect to farmer needs. Besides, some farmers have had a compulsory purchase order made on their land and could afford to buy new lands. However, in some other places, the population did not accept the arrival of the multinational company Chevron. In parallel, a brief overview of shale gas exploitation projects or status in other European countries is given

  17. Thirteen years of exploitation with constant oilfield pressure

    Energy Technology Data Exchange (ETDEWEB)

    Dontov-Danu, Gh

    1966-12-01

    The paper describes a restoring and maintaining reservoir pressure by gas injection in two blocks of the Dacian stratum at Buscani. At the beginning of gas injection, the wells produced in gas lift and the crude oil flows were markedly decreasing. After about 6 months of injection the reservoir pressure has been restored, the wells flowed. This system allows constant crude oil flows for long periods. The oilfield recovery factor until December 31, 1965, is 51% i.e. by 150% higher than expected in the case of an exploitation without gas injection. This increase represents the extra crude oil and gasoline production obtained as a result of the application of the reservoir pressure maintenance process. The average consumption of working agent has been of 382 cu m gas per ton of additionally extracted crude oil.

  18. Extreme behavioural shifts by baboons exploiting risky, resource-rich, human-modified environments.

    Science.gov (United States)

    Fehlmann, Gaelle; O'Riain, M Justin; Kerr-Smith, Catherine; Hailes, Stephen; Luckman, Adrian; Shepard, Emily L C; King, Andrew J

    2017-11-08

    A range of species exploit anthropogenic food resources in behaviour known as 'raiding'. Such behavioural flexibility is considered a central component of a species' ability to cope with human-induced environmental changes. Here, we study the behavioural processes by which raiding male chacma baboons (Papio ursinus) exploit the opportunities and mitigate the risks presented by raiding in the suburbs of Cape Town, South Africa. Ecological sampling and interviews conducted with 'rangers' (employed to manage the baboons' space use) revealed that baboons are at risk of being herded out of urban spaces that contain high-energy anthropogenic food sources. Baboon-attached motion/GPS tracking collars showed that raiding male baboons spent almost all of their time at the urban edge, engaging in short, high-activity forays into the urban space. Moreover, activity levels were increased where the likelihood of deterrence by rangers was greater. Overall, these raiding baboons display a time-activity balance that is drastically altered in comparison to individuals living in more remote regions. We suggest our methods can be used to obtain precise estimates of management impact for this and other species in conflict with people.

  19. Exploiting synergies in European wind and hydrogen sectors: A cost-benefit assessment

    International Nuclear Information System (INIS)

    Shaw, Suzanne; Peteves, Estathios

    2008-01-01

    This article outlines an assessment of the perspectives for exploiting synergies between European wind and hydrogen energy sectors, where wind energy conversion to hydrogen is used as a common strategy for reducing network management costs in high wind energy penetration situations, and for production of renewable hydrogen. The attractiveness of this approach, referred to here as a 'wind-hydrogen strategy', is analysed using a cost-benefit approach to evaluate the final impact at the level of the end-consumer when this strategy is implemented. The analysis is conducted for four scenarios, based on different levels of: wind energy penetration in the electricity network area, hydrogen energy price, and environmental taxation on fuels. The effect of technological learning on the outcome is also analysed for the period up to 2050. The results of the analysis indicate that the relative value of the wind energy in the electricity market compared to the hydrogen market is a deciding factor in the attractiveness of the strategy; here the wind energy penetration in the network is a key consideration. Finally, in order to exploit learning effects from linking European wind and hydrogen sectors, action would need to be taken in the short term. (author)

  20. Exploiting opportunistic resources for ATLAS with ARC CE and the Event Service

    Science.gov (United States)

    Cameron, D.; Filipčič, A.; Guan, W.; Tsulaia, V.; Walker, R.; Wenaus, T.; ATLAS Collaboration

    2017-10-01

    With ever-greater computing needs and fixed budgets, big scientific experiments are turning to opportunistic resources as a means to add much-needed extra computing power. These resources can be very different in design from those that comprise the Grid computing of most experiments, therefore exploiting them requires a change in strategy for the experiment. They may be highly restrictive in what can be run or in connections to the outside world, or tolerate opportunistic usage only on condition that tasks may be terminated without warning. The Advanced Resource Connector Computing Element (ARC CE) with its nonintrusive architecture is designed to integrate resources such as High Performance Computing (HPC) systems into a computing Grid. The ATLAS experiment developed the ATLAS Event Service (AES) primarily to address the issue of jobs that can be terminated at any point when opportunistic computing capacity is needed by someone else. This paper describes the integration of these two systems in order to exploit opportunistic resources for ATLAS in a restrictive environment. In addition to the technical details, results from deployment of this solution in the SuperMUC HPC centre in Munich are shown.

  1. Patterns of resource exploitation in four coexisting globeflower fly species ( Chiastocheta sp.)

    Science.gov (United States)

    Pompanon, François; Pettex, Emeline; Després, Laurence

    2006-03-01

    Life history and spatio-temporal patterns of resource utilisation were characterised in four Chiastocheta (Diptera: Anthomyiidae) species, whose larvae compete as seed predators on Trollius europaeus fruits. Interspecific co-occurrence was observed in 80% of the resource patches (= Trollius fruits) in the two communities studied. Isolated larvae from all species had a similar food intake, but differed in development time and size at emergence. Different species exhibit contrasting resource exploitation strategies with specific mining patterns and a partial temporal shift. Two species exhibited particularly singular strategies. C. rotundiventris escaped from strong interactions with other species because it was the first species to develop and the only one to exploit the central pith of Trollius fruits. The key role of this species as the main pollinator of the host-plant appears to be a by-product of constraints imposed by occupying a restricted niche. Although the resource is ephemeral due to seed dispersal, C. dentifera, the last species to oviposit, is not disadvantaged because it has a short development time and rapid food intake. The different patterns can partly explain the stability of Chiastocheta communities, but do not prevent competition to occur at high larval densities.

  2. Instruments to Identify Commercially Sexually Exploited Children: Feasibility of Use in an Emergency Department Setting.

    Science.gov (United States)

    Armstrong, Stephanie

    2017-12-01

    This review examines the screening instruments that are in existence today to identify commercially sexually exploited children. The instruments are compared and evaluated for their feasibility of use in an emergency department setting. Four electronic databases were searched to identify screening instruments that assessed solely for commercial sexual exploitation. Search terms included "commercially sexually exploited children," "CSEC," "domestic minor sex trafficking," "DMST," "juvenile sex trafficking," and "JST." Those terms were then searched in combination with each of the following: "tools," "instruments," "screening," "policies," "procedures," "data collection," "evidence," and "validity." Six screening instruments were found to meet the inclusion criteria. Variation among instruments included number of questions, ease of administration, information sources, scoring methods, and training information provided. Two instruments were determined to be highly feasible for use in the emergency department setting, those being the Asian Health Services and Banteay Srei's CSEC Screening Protocol and Greenbaum et al's CSEC/child sex trafficking 6-item screening tool. A current dearth of screening instruments was confirmed. It is recommended that additional screening instruments be created to include developmentally appropriate instruments for preadolescent children. Numerous positive features were identified within the instruments in this review and are suggested for use in future screening instruments, including succinctness, a simple format, easy administration, training materials, sample questions, multiple information sources, designation of questions requiring mandatory reporting, a straightforward scoring system, and an algorithm format.

  3. Entropy Viscosity and L1-based Approximations of PDEs: Exploiting Sparsity

    Science.gov (United States)

    2015-10-23

    AFRL-AFOSR-VA-TR-2015-0337 Entropy Viscosity and L1-based Approximations of PDEs: Exploiting Sparsity Jean-Luc Guermond TEXAS A & M UNIVERSITY 750...REPORT DATE (DD-MM-YYYY) 09-05-2015 2. REPORT TYPE Final report 3. DATES COVERED (From - To) 01-07-2012 - 30-06-2015 4. TITLE AND SUBTITLE Entropy ...conservation equations can be stabilized by using the so-called entropy viscosity method and we proposed to to investigate this new technique. We

  4. Detecting Recycled Commodity SoCs: Exploiting Aging-Induced SRAM PUF Unreliability

    OpenAIRE

    Gao, Yansong; Ma, Hua; Al-Sarawi, Said F.; Abbott, Derek; Ranasinghe, Damith C.

    2017-01-01

    A physical unclonable function (PUF), analogous to a human fingerprint, has gained an enormous amount of attention from both academia and industry. SRAM PUF is among one of the popular silicon PUF constructions that exploits random initial power-up states from SRAM cells to extract hardware intrinsic secrets for identification and key generation applications. The advantage of SRAM PUFs is that they are widely embedded into commodity devices, thus such a PUF is obtained without a custom design...

  5. Impacts de l'exploitation artisanale de l'or sur les ressources ...

    African Journals Online (AJOL)

    L'exploitation de l'or est devenue ces deux dernières années l'activité principale de la population de Kéméni, une localité située dans la Préfecture de Tchaoudjo (Région Centrale du Togo). La présente étude a identifié l'impact de cette activité sur les ressources naturelles. L'approche méthodologique s'est basée sur des ...

  6. Exploiting Unique Structural and Functional Properties of Malarial Glycolytic Enzymes for Antimalarial Drug Development

    Directory of Open Access Journals (Sweden)

    Asrar Alam

    2014-01-01

    Full Text Available Metabolic enzymes have been known to carry out a variety of functions besides their normal housekeeping roles known as “moonlighting functions.” These functionalities arise from structural changes induced by posttranslational modifications and/or binding of interacting proteins. Glycolysis is the sole source of energy generation for malaria parasite Plasmodium falciparum, hence a potential pathway for therapeutic intervention. Crystal structures of several P. falciparum glycolytic enzymes have been solved, revealing that they exhibit unique structural differences from the respective host enzymes, which could be exploited for their selective targeting. In addition, these enzymes carry out many parasite-specific functions, which could be of potential interest to control parasite development and transmission. This review focuses on the moonlighting functions of P. falciparum glycolytic enzymes and unique structural differences and functional features of the parasite enzymes, which could be exploited for therapeutic and transmission blocking interventions against malaria.

  7. Exploitation of Digital Filters to Advance the Single-Phase T/4 Delay PLL System

    DEFF Research Database (Denmark)

    Yang, Yongheng; Zhou, Keliang; Blaabjerg, Frede

    2016-01-01

    will violate this design rule and it can become a major challenge for digital controllers. To deal with the above issue, this paper first exploits a virtual unit delay (z_v^-1) to emulate the viable sampling behavior in practical digital signal processors with a fixed sampling rate. This exploitation......With the development of digital signal processing technologies, control and monitoring of power electronics conversion systems have been evolving to become fully digital. As the basic element in the design and analysis phase of digital controllers or filters, a number of unit delays (z^-1) have...... been employed, e.g., in a cascaded structure. Practically, the number of unit delays is designed as an integer, which is related to the sampling frequency (e.g., 50 Hz). More common, the sampling frequency is fixed during operation for simplicity and design. Hence, any disturbance in the ac signal...

  8. Up-Rating - An Alternative Approach to Meeting Future Power Demands - Exploitation of Design Margins

    Energy Technology Data Exchange (ETDEWEB)

    Bruce, Barnaby; Schwarz, Thomas [AREVA NP GmbH, Freyeslebenstr. 1, 91058 Erlangen (Germany)

    2008-07-01

    Up-rating is a world-wide implemented approach that takes advantage of increased calculation and analytic abilities developed since commissioning and applies them to old plants. In doing so, what would possibly be considered today as over-engineered design margins are exploited and plant performance is improved, without necessarily involving extensive modifications or replacement of hardware. It is therefore a short-term alternative, compared to new plants, with little change in environmental ramifications for power production capacity gained. Up-rating is also more accepted by the wider community and licensing authorities, thus complimenting the building of new plants. The 10% thermal up-rating of the nuclear power plant at Almaraz, Spain, requires a comprehensive reanalysis of all power components. This paper focuses on those measures required to ensure the performance of the steam generators at increased load as an example of design margin exploitation in such crucial components. (authors)

  9. The Fight against the Least Visible Form of Human Trafficking: Trafficking for Child Labour Exploitation

    Directory of Open Access Journals (Sweden)

    Luz María Puente Aba

    2018-03-01

    Full Text Available Child trafficking for the purpose of labour exploitation is a difficult phenomenon to detect. It is also not readily definable considering that this specific form of trafficking is closely linked with the phenomenon of forced child labour, and even with the broader occurrence of child labour. A lack of globally reliable data and the convergence of different concepts related to child trafficking for labour exploitation pose significant challenges when trying to regulate the circumstances concerning child work and the criminalisation of trafficking for labour exploitation. This article offers a clear overview of the available data related to all the phenomena, and aims to clarify all the situations involved, defining child work, child labour, forced child labour and child trafficking for the purposes of labour exploitation. Furthermore, this article discusses the possible loopholes and critical issues that could hinder global approaches to resolving these issues. La trata infantil con fines de explotación laboral es un fenómeno difícil de detectar, y tampoco es sencillo definirlo si se tiene en cuenta que esta forma específica de trata está estrechamente relacionada con el fenómeno del trabajo forzado infantil e, incluso, con el fenómeno más general de trabajo infantil. Todo ello supone un desafío a la hora de regular las circunstancias que definen el trabajo realizado por niños y la criminalización de la trata para la explotación laboral. Este artículo ofrece un repaso de los datos disponibles en esta materia y procura aclarar las situaciones que se pueden plantear, así como definir trabajo realizado por niños, trabajo infantil, trabajo infantil forzado y trata infantil con fines de explotación laboral. Por último, profundiza en las posibles deficiencias y en los aspectos críticos que podrían obstaculizar un acercamiento global a esta problemática. DOWNLOAD THIS PAPER FROM SSRN: http://ssrn.com/abstract=3088010

  10. Etude de l'exploitation et du marché des produits forestiers non ligneux à Kinshasa

    Directory of Open Access Journals (Sweden)

    Biloso, A.

    2006-01-01

    Full Text Available Study of Non Woody Forest Products Exploitation and Market in Kinshasa. In spite of the considerable number of ethnobotanic studies carried out in many regions of the Democratic Republic of Congo, almost no information is available on the exploitation and commerce of the wild products (non woody forest products, "produits forestiers non ligneux" – PFNL of the Congolese provinces in general and the urban province of Kinshasa in particular. Nevertheless, these products are largely used and marketed. Therefore, direct observations in situ, and socio-economic and ethnoecologic investigations (including interviews were organized in the urban province of Kinshasa to analyse various aspects of consumption of these wild products. The purpose of these investigations was to collect information regarding the use and the marketing of PFNL products by the populations living in the zones surrounding the urban area. The analysis of the various types of exploitation and use of the PFNL has shown twelve categories of PFNL use: energy, food, construction of music instruments, saw mill applications, drink, drugs, dye, packing, construction of baskets, textile fabrication, construction and ornamentation. The majority of these PFNL originate not only from the secondary forests and from forest galleries, but from shrubby savannas and the marshes as well. The exploitations and uses of the PFNL vary rather largely with the level of income, the purchasing power, the attachment with food practices and with local traditions. The various levels of semi-monthly income by owner of the PFNL are estimated for the following plants which were used as vegetables: Gnetum africanum Welw., (275.0 $; Pteridium aquilinium Hieron. (166.7 $; Dracaena camerooniana Baker. (75.5 $; Dioscorea praehensilis (Benth. (71.0 $; Psophocarpus scandens (Endl. Verdc. (58.7 $. The average income resulting from the firewood sale was estimated at 80 $ per month and per person, for a group of 25 owners

  11. Sensory exploitation and cultural transmission: the late emergence of iconic representations in human evolution.

    Science.gov (United States)

    Verpooten, Jan; Nelissen, Mark

    2010-09-01

    Iconic representations (i.e., figurative imagery and realistic art) only started to appear consistently some 45,000 years ago, although humans have been anatomically modern since 200,000-160,000 years ago. What explains this? Some authors have suggested a neurocognitive change took place, leading to a creative explosion, although this has been contested. Here, we examine the hypothesis that demographic changes caused cultural "cumulative adaptive evolution" and as such the emergence of modern symbolic behavior. This approach usefully explains the evolution of utilitarian skills and tools, and the creation of symbols to identify groups. However, it does not equally effectively explain the evolution of behaviors that may not be directly adaptive, such as the production of iconic representations like figurines and rock art. In order to shed light on their emergence, we propose to combine the above-mentioned cultural hypothesis with the concept of sensory exploitation. The concept essentially states that behavioral traits (in this case iconic art production) which exploit pre-existing sensory sensitivities will evolve if not hindered by costs (i.e., natural selection). In this view, iconic art traditions are evolved by piggy-backing on cumulative adaptive evolution. Since it is to date uncertain whether art has served any adaptive function in human evolution, parsimony demands paying more attention to the primary and a functional mechanism of sensory exploitation as opposed to mechanisms of models based exclusively on secondary benefits (such as Miller's, for instance, in which art is proposed to evolve as a sexual display of fitness).

  12. Earliest economic exploitation of chicken outside East Asia: Evidence from the Hellenistic Southern Levant

    Science.gov (United States)

    Perry-Gal, Lee; Erlich, Adi; Gilboa, Ayelet; Bar-Oz, Guy

    2015-01-01

    Chicken (Gallus gallus domesticus) is today one of the most widespread domesticated species and is a main source of protein in the human diet. However, for thousands of years exploitation of chickens was confined to symbolic and social domains such as cockfighting. The question of when and where chickens were first used for economic purposes remains unresolved. The results of our faunal analysis demonstrate that the Hellenistic (fourth–second centuries B.C.E.) site of Maresha, Israel, is the earliest site known today where economic exploitation of chickens was widely practiced. We base our claim on the exceptionally high frequency of chicken bones at that site, the majority of which belong to adult individuals, and on the observed 2:1 ratio of female to male bones. These results are supported further by an extensive survey of faunal remains from 234 sites in the Southern Levant, spanning more than three millennia, which shows a sharp increase in the frequency of chicken during the Hellenistic period. We further argue that the earliest secure evidence for economic exploitation of chickens in Europe dates to the first century B.C.E. and therefore is predated by the finds in the Southern Levant by at least a century. We suggest that the gradual acclimatization of chickens in the Southern Levant and its gradual integration into the local economy, the latter fully accomplished in the Hellenistic period, was a crucial step in the adoption of this species in European husbandry some 100 y later. PMID:26195775

  13. Exploitation and Benefits of BIM in Construction Project Management

    Science.gov (United States)

    Mesároš, Peter; Mandičák, Tomáš

    2017-10-01

    BIM is increasingly getting into the awareness in construction industry. BIM is the process of creating and data managing of the building during its life cycle. BIM became a part of management tools in modern construction companies. Construction projects have a number of participants. It means difficulty process of construction project management and a serious requirement for processing the huge amount of information including design, construction, time and cost parameters, economic efficiency and sustainability. Progressive information and communication technologies support cost management and management of construction project. One of them is Building Information Modelling. Aim of the paper is to examine the impact of BIM exploitation and benefits on construction project management in Slovak companies.

  14. Exploitation of wind energy and its potential in Czechoslovakia

    International Nuclear Information System (INIS)

    Rychetnik, V.

    1990-01-01

    Examples from over the world are shown to demonstrate the potential of wind energy in power generation. The basic types of wind motors and the installed capacities are given. In Czechoslovakia the wind conditions are rather complex. Wind energy can be economically exploited at sites where the mean wind velocity at 10 m above the ground exceeds 4 m/s. This can cover about 2% of annual power generation in Czechoslovakia. The amount of electricity generated and its cost are estimated. The investment into a wind power plant would pay back in several years. The use of small wind power plants to supply, e.g., individual houses will be of limited importance. (M.D.). 4 figs., 8 refs

  15. Financial decision-making abilities and financial exploitation in older African Americans: Preliminary validity evidence for the Lichtenberg Financial Decision Rating Scale (LFDRS).

    Science.gov (United States)

    Lichtenberg, Peter A; Ficker, Lisa J; Rahman-Filipiak, Annalise

    2016-01-01

    This study examines preliminary evidence for the Lichtenberg Financial Decision Rating Scale (LFDRS), a new person-centered approach to assessing capacity to make financial decisions, and its relationship to self-reported cases of financial exploitation in 69 older African Americans. More than one third of individuals reporting financial exploitation also had questionable decisional abilities. Overall, decisional ability score and current decision total were significantly associated with cognitive screening test and financial ability scores, demonstrating good criterion validity. Study findings suggest that impaired decisional abilities may render older adults more vulnerable to financial exploitation, and that the LFDRS is a valid tool.

  16. Paradise lost : Sovereign State Interest, Global Resource Exploitation and the Politics of Human Rights

    NARCIS (Netherlands)

    Augenstein, Daniel

    Taking its cue from the US Supreme Court judgment in Kiobel that restricted the extraterritorial reach of the Alien Tort Claims Act, this article explores how sovereignty structures the relationship between global resource exploitation and the localization of human rights in the international order

  17. The cost of being valuable: predictors of extinction risk in marine invertebrates exploited as luxury seafood.

    Science.gov (United States)

    Purcell, Steven W; Polidoro, Beth A; Hamel, Jean-François; Gamboa, Ruth U; Mercier, Annie

    2014-04-22

    Extinction risk has been linked to biological and anthropogenic variables. Prediction of extinction risk in valuable fauna may not follow mainstream drivers when species are exploited for international markets. We use results from an International Union for Conservation of Nature Red List assessment of extinction risk in all 377 known species of sea cucumber within the order Aspidochirotida, many of which are exploited worldwide as luxury seafood for Asian markets. Extinction risk was primarily driven by high market value, compounded by accessibility and familiarity (well known) in the marketplace. Extinction risk in marine animals often relates closely to body size and small geographical range but our study shows a clear exception. Conservation must not lose sight of common species, especially those of high value. Greater human population density and poorer economies in the geographical ranges of endangered species illustrate that anthropogenic variables can also predict extinction risks in marine animals. Local-level regulatory measures must prevent opportunistic exploitation of high-value species. Trade agreements, for example CITES, may aid conservation but will depend on international technical support to low-income tropical countries. The high proportion of data deficient species also stresses a need for research on the ecology and population demographics of unglamorous invertebrates.

  18. Runoff and Sediment Response to Cascade Hydropower Exploitation in the Middle and Lower Han River, China

    Directory of Open Access Journals (Sweden)

    Junhong Zhang

    2017-01-01

    Full Text Available With the rapid development of hydropower exploitation in China, changes in runoff and sediment transport have become a significant issue that cannot be neglected. In this study, the Han River was selected as a study case, where the runoff variation and changes in sediment load at the Baihe, Huangjiagang, Huangzhuang, and Xiantao stations were analyzed in different time periods. The results indicate that impact of cascade hydropower exploitation on runoff and sediment transport is significantly different even during the same time periods. After reservoir regulation, the decreasing of sediment load is faster than that of runoff. Strong positive correlation between runoff and sediment load exists during different time periods, while reservoir operation leads to different turning points at the Baihe, Huangjiagang, Huangzhuang, and Xiantao stations in the middle and lower Han River. As a key driving factor, runoff variation contributed to sediment transport with different impact index CR. The impact index CR before and after the first change point at the Baihe, Huangjiagang, Huangzhuang, and Xiantao stations is 43.35%, −3.68%, 11.17%, and 30.12%, respectively. This study helps us understand and evaluate the hydrological changes under cascade hydropower exploitation in the middle and lower Han River.

  19. Mobile clouds exploiting distributed resources in wireless, mobile and social networks

    CERN Document Server

    Fitzek, Frank H P

    2013-01-01

    Includes a preface written by Professor Leonard Kleinrock, Distinguished Professor of Computer Science, UCLA, USA This book discusses and explores the concept of mobile cloud, creating an inspiring research space for exploiting opportunistic resource sharing, and covering from theoretical research approaches to the development of commercially profitable ideas. A mobile cloud is a cooperative arrangement of dynamically connected communication nodes sharing opportunistic resources. In this book, authors provide a comprehensive and motivating overview of this rapidly emerging technology. The b

  20. The largest renewable, easily exploitable, and economically sustainable energy resource

    Science.gov (United States)

    Abbate, Giancarlo; Saraceno, Eugenio

    2018-02-01

    Sun, the ultimate energy resource of our planet, transfers energy to the Earth at an average power of 23,000 TW. Earth surface can be regarded as a huge panel transforming solar energy into a more convenient mechanical form, the wind. Since millennia wind is recognized as an exploitable form of energy and it is common knowledge that the higher you go, the stronger the winds flow. To go high is difficult; however Bill Gates cites high wind among possible energy miracles in the near future. Public awareness of this possible miracle is still missing, but today's technology is ready for it.

  1. Synergy in spreading processes: from exploitative to explorative foraging strategies.

    Science.gov (United States)

    Pérez-Reche, Francisco J; Ludlam, Jonathan J; Taraskin, Sergei N; Gilligan, Christopher A

    2011-05-27

    An epidemiological model which incorporates synergistic effects that allow the infectivity and/or susceptibility of hosts to be dependent on the number of infected neighbors is proposed. Constructive synergy induces an exploitative behavior which results in a rapid invasion that infects a large number of hosts. Interfering synergy leads to a slower and sparser explorative foraging strategy that traverses larger distances by infecting fewer hosts. The model can be mapped to a dynamical bond percolation with spatial correlations that affect the mechanism of spread but do not influence the critical behavior of epidemics. © 2011 American Physical Society

  2. Television production, Funding Models and Exploitation of Content

    Directory of Open Access Journals (Sweden)

    Gillian Doyle

    2016-07-01

    Full Text Available The rise of digital platforms has transformative implications for strategies of financing media production and for exploitation of the economic value in creative content. In the television industry, changes in technologies for distribution and the emergence of SVOD services such as Netflix are gradually shifting audiences and financial power away from broadcasters while at the same time creating unprecedented opportunities for programme-makers.  Drawing on findings from recent RCUK-funded research, this article examines how these shifts are affecting production financing and the economics of supplying television content.  In particular, it focuses on how changes in the dynamics of rights markets and in strategic approaches towards the financing of television production might mean for markets, industries and for policies intended to support the economic sustainability of independent television content production businesses.

  3. Environmental impact of atomic minerals exploration and exploitation

    International Nuclear Information System (INIS)

    Dwivedy, K.K.

    1998-01-01

    Terrestrial radiation in the earth's environment is existing since its formation and is shared by all types of rocks, minerals, gases, and water, and to some extent aided by the interstellar radiation. Environmental radiation is ubiquitous and the man and other living beings have been living in such environment for thousands of years. Today they are much concerned about health and environmental risks so that a balance must be achieved between the activities that promote economic growth and the preservation of the natural environment. Atomic minerals are one of the main sources of natural environmental radiation and they are being explored by Atomic Minerals Division (AMD). Mining and milling activities sometimes may cause some radiological impacts but proper monitoring and remedial measures keep them under check. Some of the important aspects related to environmental impacts of uranium exploration and exploitation are presented

  4. ANALYSIS OF ANDROID VULNERABILITIES AND MODERN EXPLOITATION TECHNIQUES

    Directory of Open Access Journals (Sweden)

    Himanshu Shewale

    2014-03-01

    Full Text Available Android is an operating system based on the Linux kernel. It is the most widely used and popular operating system among Smartphones and portable devices. Its programmable and open nature attracts attackers to take undue advantage. Android platform allows developers to freely access and modify source code. But at the same time it increases the security issue. A user is likely to download and install malicious applications written by software hackers. This paper focuses on understanding and analyzing the vulnerabilities present in android platform. In this paper firstly we study the android architecture; analyze the existing threats and security weaknesses. Then we identify various exploit mitigation techniques to mitigate known vulnerabilities. A detailed analysis will help us to identify the existing loopholes and it will give strategic direction to make android operating system more secure.

  5. Exploitation of geographic information system at mapping and modelling of selected soil parameters

    International Nuclear Information System (INIS)

    Palka, B.; Makovnikova, J.; Siran, M.

    2005-01-01

    In this presentation authors describe using of computers and geographic information systems (GIS) at effective use of soil fund, rational exploitation and organization of agricultural soil fund on the territory of the Slovak Republic, its monitoring and modelling. Using and creating of some geographically oriented information systems and databases about soils as well as present trends are discussed

  6. Twenty years of development and transformation in exploiting nuclear energy in the world

    International Nuclear Information System (INIS)

    Khazaneh, R.

    1992-01-01

    Problems concern to exploiting nuclear energy in the world in two decades from 1970-1990 is briefly investigated. Historical prelude of technical evolution of nuclear energy is included to be recognized the relevant events occurred in the seventies. The intention is to give general information to those who have not sufficient time to study deeply in the field

  7. Effect of increased fuel exploitation on the main characteristics of spent WWER 440 fuel

    International Nuclear Information System (INIS)

    Zib, A.

    2001-01-01

    The article deals with the effect of a higher fuel exploitation on the main characteristics (particularly radioactivity and decay heat power) of spent WWER 440 fuel. The main characteristics were calculated by using the Origen code. The study was implemented as a three-stage process. In the first stage, the radioactivity and residual thermal power time evolution values were calculated for the 'typical fuel', i. e. fuel assembly with initial enrichment of 3.6% U-235, 3 years in reactor, and burnup of 30 MWd/kg U. In the second stage, ceteris paribus radioactivity and thermal power analyses of sensitivity to changes in the fuel burnup, initial fuel enrichment, and time in reactor were carried out for the typical fuel assembly. In the third stage, the effect of changes in all three variables was investigated for fuel assemblies possessing parameters that approach those applied at the Dukovany NPP. The effect of a higher fuel exploitation on the interim fuel storage is also mentioned. (author)

  8. DNA evidence of bowhead whale exploitation by Greenlandic Paleo-Inuit 4,000 years ago

    Science.gov (United States)

    Seersholm, Frederik Valeur; Pedersen, Mikkel Winther; Søe, Martin Jensen; Shokry, Hussein; Mak, Sarah Siu Tze; Ruter, Anthony; Raghavan, Maanasa; Fitzhugh, William; Kjær, Kurt H.; Willerslev, Eske; Meldgaard, Morten; Kapel, Christian M. O.; Hansen, Anders Johannes

    2016-11-01

    The demographic history of Greenland is characterized by recurrent migrations and extinctions since the first humans arrived 4,500 years ago. Our current understanding of these extinct cultures relies primarily on preserved fossils found in their archaeological deposits, which hold valuable information on past subsistence practices. However, some exploited taxa, though economically important, comprise only a small fraction of these sub-fossil assemblages. Here we reconstruct a comprehensive record of past subsistence economies in Greenland by sequencing ancient DNA from four well-described midden deposits. Our results confirm that the species found in the fossil record, like harp seal and ringed seal, were a vital part of Inuit subsistence, but also add a new dimension with evidence that caribou, walrus and whale species played a more prominent role for the survival of Paleo-Inuit cultures than previously reported. Most notably, we report evidence of bowhead whale exploitation by the Saqqaq culture 4,000 years ago.

  9. Summary of the subsidy regulations and the exploitation result of wood on arable land

    International Nuclear Information System (INIS)

    Anon.

    1994-01-01

    Part of the EWAB program concerns studies on the feasibility of a large-scale implementation of energy crops in the Netherlands. Next to developments of the processing and conversion techniques attention is paid to the cultivation of crops. The aim of the study on the title subject is to gain insight in the application of relevant subsidy regulations for energy wood, and to determine the costs and benefits for the farmer of energy crops. The overview of subsidies concern support from the European Community, support for projects, and fiscal consequences of wood cultivation. Exploitation results are calculated for two concepts: (1) a four year harvest and a cultivation period of 24 years. Also, the Dutch calculations are compared to results of energy wood exploitation in Sweden; and (2) a comparison of cultivation of wheat, barley, sugar beet, potatoes and energy wood for six different production areas in the Netherlands. 3 figs., 5 appendices

  10. Making and exploiting fullerenes, graphene, and carbon nanotubes

    International Nuclear Information System (INIS)

    Marcaccio, Massimo; Paolucci, Francesco

    2014-01-01

    This volume contains nine chapters which are presenting critical reviews of the present and future trends in modern chemistry research. The chapter ''Solubilization of Fullerenes, Carbon Nanotubes and Graphene'' by Alain Penicaud describes the various ingenious approaches to solve the solubility issue and describes in particular how graphite, and modern nanocarbons, can be made soluble by reductive dissolution. A large part of the present volume concerns the merging of nanocarbons with nanotechnology and their impact on technical development in many areas. Fullerenes, carbon nanotubes, nanodiamond and graphene find, for instance, various applications in the development of solar cells, including dye sensitized solar cells. The chapter ''Incorporation of Balls, Tubes and Bowls in Nanotechnology'' by James Mack describes the recent development of the area of fullerene fragments, and corannulene in particular, and their direct applications to organic light emitting diode (OLED) technology, while, in the chapter ''Exploiting Nanocarbons in Dye-Sensitized Solar Cells'' by Ladislav Kavan, the exploitation of nanocarbons in the development of novel dye sensitized solar cells with improved efficiency, durability and costs is thoroughly reviewed. The functionalization of CNSs has the invaluable advantage of combining their unique properties with those of other classes of materials. Supramolecular chemistry represents an elegant alternative approach for the construction of functional systems by means of noncovalent bonding interactions. In the chapter ''Supramolecular Chemistry of Carbon Nanotubes'' by Gildas Gavrel et al., the incredibly varied world of supramolecular, non-covalent functionalization of carbon nanotubes and their applications is examined and reviewed, and the synthetic strategies devised for fabricating mechanically-linked molecular architectures are described in the chapter ''Fullerene-Stoppered Bistable Rotaxanes'' by Aurelio Mateo-Alonso, which presents an

  11. Making and exploiting fullerenes, graphene, and carbon nanotubes

    Energy Technology Data Exchange (ETDEWEB)

    Marcaccio, Massimo; Paolucci, Francesco (eds.) [Bologna Univ. (Italy). Dept. of Chemistry G. Ciamician

    2014-11-01

    This volume contains nine chapters which are presenting critical reviews of the present and future trends in modern chemistry research. The chapter ''Solubilization of Fullerenes, Carbon Nanotubes and Graphene'' by Alain Penicaud describes the various ingenious approaches to solve the solubility issue and describes in particular how graphite, and modern nanocarbons, can be made soluble by reductive dissolution. A large part of the present volume concerns the merging of nanocarbons with nanotechnology and their impact on technical development in many areas. Fullerenes, carbon nanotubes, nanodiamond and graphene find, for instance, various applications in the development of solar cells, including dye sensitized solar cells. The chapter ''Incorporation of Balls, Tubes and Bowls in Nanotechnology'' by James Mack describes the recent development of the area of fullerene fragments, and corannulene in particular, and their direct applications to organic light emitting diode (OLED) technology, while, in the chapter ''Exploiting Nanocarbons in Dye-Sensitized Solar Cells'' by Ladislav Kavan, the exploitation of nanocarbons in the development of novel dye sensitized solar cells with improved efficiency, durability and costs is thoroughly reviewed. The functionalization of CNSs has the invaluable advantage of combining their unique properties with those of other classes of materials. Supramolecular chemistry represents an elegant alternative approach for the construction of functional systems by means of noncovalent bonding interactions. In the chapter ''Supramolecular Chemistry of Carbon Nanotubes'' by Gildas Gavrel et al., the incredibly varied world of supramolecular, non-covalent functionalization of carbon nanotubes and their applications is examined and reviewed, and the synthetic strategies devised for fabricating mechanically-linked molecular architectures are described in the chapter &apos

  12. Influence of distribution characteristics and associated seabed features on exploitation of cobalt-rich manganese deposits

    Digital Repository Service at National Institute of Oceanography (India)

    Yamazaki, T.; Sharma, R.; Tsurusaki, K.

    Method of exploitation, selection of mine site and desing of mining system of cobalt-rich manganese deposits on seamounts would be greatly influenced by the distribution characteristics as well as the associated seabed features, wuch as the seabed...

  13. Study of greenhouse gases reduction alternatives for the exploitation of non conventional oil sands in Canada

    Energy Technology Data Exchange (ETDEWEB)

    Bouchonneau, Deborah [Institut Francais du Petrole (IFP), Paris (France)

    2008-07-01

    High energy prices and greenhouse gases reduction represent the main challenges the current worldwide energetic situation has to face. As a consequence, paradox strategies can be highlighted: oil prices are sufficiently high to exploit non conventional oil resources, like extra heavy oils and oil sands. But the production of these resources emits larger GHG than the conventional oil path and implies other major environmental issues (water management, risks of soil pollution, destruction of the boreal forest), incompatible with the rules validated by the protocol of Kyoto. At the light of the new greenhouse gases reduction regulation framework announced by the Canadian Federal government, this work focuses on the study of greenhouse gases reduction alternatives applied to the non conventional oil sands exploitation in Canada. (author)

  14. Exhibition Exploitation: the artful use of art and advertising in urban spaces

    Directory of Open Access Journals (Sweden)

    Alessandro Campolo

    2013-11-01

    Full Text Available Urban space can be a powerful display that offers great chances to media marketing and communication in general. Nowadays, every kind of architecture or structure in the city is part of an expanded scenic backdrop suitable to perform spectacular acts expressing either ephemeral or permanent values. Mutating faster than its architecture, the urban scenario becomes the archetype of social and cultural changes. The contemporary city is the favored place for any kind of communication or intensive propagation of ideas and “suggestions”. Its spaces are contended by art and advertising which, through interventions and a constant crossover process, find a confluence in their specific intents. While the artistic act often exploits urban space for social or promotional purposes, trying to give more visibility to the city’s abandoned or deteriorating places, instead advertising exploits the city’s most visible spots for commercial purposes. But all over the years art and advertising have changed, too. Both have reinforced their connection with each other and both have borrowed tools from each other; in fact, today their parameters and strategies are mixed. The observer or the city user, who is often unaware of this ambiguous communication, frequently assimilates the message but confuses its real meaning.

  15. Population genetics of four heavily exploited shark species around the Arabian Peninsula

    KAUST Repository

    Spaet, Julia L.Y.

    2015-05-01

    The northwestern Indian Ocean harbors a number of larger marine vertebrate taxa that warrant the investigation of genetic population structure given remarkable spatial heterogeneity in biological characteristics such as distribution, behavior, and morphology. Here, we investigate the genetic population structure of four commercially exploited shark species with different biological characteristics (Carcharhinus limbatus, Carcharhinus sorrah, Rhizoprionodon acutus, and Sphyrna lewini) between the Red Sea and all other water bodies surrounding the Arabian Peninsula. To assess intraspecific patterns of connectivity, we constructed statistical parsimony networks among haplotypes and estimated (1) population structure; and (2) time of most recent population expansion, based on mitochondrial control region DNA and a total of 20 microsatellites. Our analysis indicates that, even in smaller, less vagile shark species, there are no contemporary barriers to gene flow across the study region, while historical events, for example, Pleistocene glacial cycles, may have affected connectivity in C. sorrah and R. acutus. A parsimony network analysis provided evidence that Arabian S. lewini may represent a population segment that is distinct from other known stocks in the Indian Ocean, raising a new layer of conservation concern. Our results call for urgent regional cooperation to ensure the sustainable exploitation of sharks in the Arabian region.

  16. Exploitation of Unique Properties of Zeolites in the Development of Gas Sensors

    Directory of Open Access Journals (Sweden)

    Prabir K. Dutta

    2012-04-01

    Full Text Available The unique properties of microporous zeolites, including ion-exchange properties, adsorption, molecular sieving, catalysis, conductivity have been exploited in improving the performance of gas sensors. Zeolites have been employed as physical and chemical filters to improve the sensitivity and selectivity of gas sensors. In addition, direct interaction of gas molecules with the extraframework cations in the nanoconfined space of zeolites has been explored as a basis for developing new impedance-type gas/vapor sensors. In this review, we summarize how these properties of zeolites have been used to develop new sensing paradigms. There is a considerable breadth of transduction processes that have been used for zeolite incorporated sensors, including frequency measurements, optical and the entire gamut of electrochemical measurements. It is clear from the published literature that zeolites provide a route to enhance sensor performance, and it is expected that commercial manifestation of some of the approaches discussed here will take place. The future of zeolite-based sensors will continue to exploit its unique properties and use of other microporous frameworks, including metal organic frameworks. Zeolite composites with electronic materials, including metals will lead to new paradigms in sensing. Use of nano-sized zeolite crystals and zeolite membranes will enhance sensor properties and make possible new routes of miniaturized sensors.

  17. Analysis of energetic exploitation of straw in Vojvodina

    International Nuclear Information System (INIS)

    Dodic, Sinisa N.; Dodic, Jelena M.; Popov, Stevan D.; Zekic, Vladislav N.; Rodic, Vesna O.; Tica, Nedeljko Lj.

    2011-01-01

    The Autonomous Province of Vojvodina is an autonomous province in the Republic of Serbia. It is located in the northern part of the country, in the Pannonia plain. Vojvodina is an energy-deficient province. The average yearly quantity of the cellulose wastes in Vojvodina amounts to about 9 millions tons barely in the agriculture, and the same potential on the level of Serbia estimates to almost 13 million tons. This study gives the analysis of energetic exploitation of straws from stubble cereals processed in different forms. Costs for the equipment that uses biomass in the EU are approximately two times higher with respect to those for the equipment for combustion of natural gas or of fuel oil. Costs of investments for combustion of biomass in Vojvodina if compared with the cited data are approximately for 40-50% lower. The difference of the investment costs for the construction of such units is because units for straw combustion designed and constructed in our country, have neither the complicated devices for manipulation of fuels, nor the devices for the waste gasses processing. The definite conclusions about the economic justification of the energetic exploitation of stubble straws can be obtained only by comparison of costs of the so obtained energy, with the costs of energy obtained through the combustion of classical fuels. Previous comparisons were the most often based on the comparisons of value of prices of the equivalent straw quantity with the process of fuel oil of other classical fuels. Such the comparisons leaded to the very positive evaluations of the economical effects of straws, without taking into account the realizability of the named method. Namely, comparisons of straw and fuel oil hardly could lead to the conclusion that these two fuels are mutually substitutable. According to its physical properties, straw is most similar to firewood, but the preciousness and lacking of this the very resource excludes it from the comparative analysis, so

  18. The strategic and economic value of exploiting heavy crude

    International Nuclear Information System (INIS)

    Saniere, A.

    2003-01-01

    Non-conventional oil, and particularly heavy crude varieties, will play an increasingly important role in meeting growing global energy requirements by 2030 and beyond. These heavy oils currently account for high volumes in certain areas but their proportion of global oil production remains modest for the moment, This should significantly change with the completion of several projects currently underway in Canada and Venezuela. Indeed, the technological innovations occurring over recent years have allowed for a considerable reduction in exploitation costs for these crude varieties and improved economic profitability conditions for the projects. The geographical location of resources (which are independent of the Middle East) and the fact that they are not subject to OPEC quotas also make these crude varieties particularly attractive. (authors)

  19. Selfrando: Securing the Tor Browser against De-anonymization Exploits

    Directory of Open Access Journals (Sweden)

    Conti Mauro

    2016-10-01

    Full Text Available Tor is a well-known anonymous communication system used by millions of users, including journalists and civil rights activists all over the world. The Tor Browser gives non-technical users an easy way to access the Tor Network. However, many government organizations are actively trying to compromise Tor not only in regions with repressive regimes but also in the free world, as the recent FBI incidents clearly demonstrate. Exploiting software vulnerabilities in general, and browser vulnerabilities in particular, constitutes a clear and present threat to the Tor software. The Tor Browser shares a large part of its attack surface with the Firefox browser. Therefore, Firefox vulnerabilities (even patched ones are highly valuable to attackers trying to monitor users of the Tor Browser.

  20. Exploiting Synergies in European Wind and Hydrogen Sectors: A Cost-benefit Assessment

    OpenAIRE

    SHAW SUZANNE; PETEVES ESTATHIOS

    2007-01-01

    This article outlines an assessment of the perspectives for exploiting synergies between European wind and hydrogen energy sectors, where wind energy conversion to hydrogen is used as a common strategy for reducing network management costs in high wind energy penetration situations, and for production of renewable hydrogen. The attractiveness of this approach, referred to here as a ¿¿wind-hydrogen strategy¿¿, is analysed using a costbenefit approach to evaluate the final impact...