WorldWideScience

Sample records for exploiting flow-based approaches

  1. An improved approach for flow-based cloud point extraction.

    Science.gov (United States)

    Frizzarin, Rejane M; Rocha, Fábio R P

    2014-04-11

    Novel strategies are proposed to circumvent the main drawbacks of flow-based cloud point extraction (CPE). The surfactant-rich phase (SRP) was directly retained into the optical path of the spectrophotometric cell, thus avoiding its dilution previously to the measurement and yielding higher sensitivity. Solenoid micro-pumps were exploited to improve mixing by the pulsed flow and also to modulate the flow-rate for retention and removal of the SRP, thus avoiding the elution step, often carried out with organic solvents. The heat released and the increase of the salt concentration provided by an on-line neutralization reaction were exploited to induce the cloud point without an external heating device. These innovations were demonstrated by the spectrophotometric determination of iron, yielding a linear response from 10 to 200 μg L(-1) with a coefficient of variation of 2.3% (n=7). Detection limit and sampling rate were estimated at 5 μg L(-1) (95% confidence level) and 26 samples per hour, respectively. The enrichment factor was 8.9 and the procedure consumed only 6 μg of TAN and 390 μg of Triton X-114 per determination. At the 95% confidence level, the results obtained for freshwater samples agreed with the reference procedure and those obtained for digests of bovine muscle, rice flour, brown bread and tort lobster agreed with the certified reference values. The proposed procedure thus shows advantages in relation to previously proposed approaches for flow-based CPE, being a fast and environmental friendly alternative for on-line separation and pre-concentration. Copyright © 2014 Elsevier B.V. All rights reserved.

  2. Flow-based approach for holistic factory engineering and design

    OpenAIRE

    Constantinescu, C.; Westkämper, E.

    2010-01-01

    The engineering of future factories requires digital tools along life cycle phases from investment planning to ramp-up. Manufacturers need scientific-based integrated highly dynamic data management systems for the participative and integrated factory planning. The paper presents a new approach for the continuously integrated product design, factory and process planning, through a service-oriented architecture for the implementation of digital factory tools. A first prototype of the digital fa...

  3. Exploitation as the Unequal Exchange of Labour : An Axiomatic Approach

    OpenAIRE

    Yoshihara, Naoki; Veneziani, Roberto

    2009-01-01

    In subsistence economies with general convex technology and rational optimising agents, a new, axiomatic approach is developed, which allows an explicit analysis of the core positive and normative intuitions behind the concept of exploitation. Three main new axioms, called Labour Exploitation in Subsistence Economies , Relational Exploitation , and Feasibility of Non-Exploitation , are presented and it is proved that they uniquely characterise a definition of exploitation conceptually related...

  4. A distributed predictive control approach for periodic flow-based networks: application to drinking water systems

    Science.gov (United States)

    Grosso, Juan M.; Ocampo-Martinez, Carlos; Puig, Vicenç

    2017-10-01

    This paper proposes a distributed model predictive control approach designed to work in a cooperative manner for controlling flow-based networks showing periodic behaviours. Under this distributed approach, local controllers cooperate in order to enhance the performance of the whole flow network avoiding the use of a coordination layer. Alternatively, controllers use both the monolithic model of the network and the given global cost function to optimise the control inputs of the local controllers but taking into account the effect of their decisions over the remainder subsystems conforming the entire network. In this sense, a global (all-to-all) communication strategy is considered. Although the Pareto optimality cannot be reached due to the existence of non-sparse coupling constraints, the asymptotic convergence to a Nash equilibrium is guaranteed. The resultant strategy is tested and its effectiveness is shown when applied to a large-scale complex flow-based network: the Barcelona drinking water supply system.

  5. Recent developments in automatic solid-phase extraction with renewable surfaces exploiting flow-based approaches

    DEFF Research Database (Denmark)

    Miró, Manuel; Hartwell, Supaporn Kradtap; Jakmunee, Jaroon

    2008-01-01

    ,on-line SPE assays performed in permanent mode lack sufficient reliability as a consequence of progressively tighter packing of the bead reactor, contamination of the solid surfaces and potential leakage of functional moieties. This article overviews the current state-of-the-art of an appealing tool...... chemical-derivatization reactions, and it pinpoints the most common instrumental detection techniques utilized. We present and discuss in detail relevant environmental and bioanalytical applications reported in the past few years....

  6. Real-Time and Resilient Intrusion Detection: A Flow-Based Approach

    NARCIS (Netherlands)

    Hofstede, R.J.; Pras, Aiko

    Due to the demanding performance requirements of packet-based monitoring solutions on network equipment, flow-based intrusion detection systems will play an increasingly important role in current high-speed networks. The required technologies are already available and widely deployed: NetFlow and

  7. An Equity Centered Management Approach to Exploiting Sport Employee Productivity

    OpenAIRE

    Schneider, Robert C.

    2017-01-01

    A primary goal ofsport organizations is to exploit employees’ abilities to their fullestcapacities. Sport managers who successfully maximize employee productivity willgreatly increase the chances of achieving the organization’s goals andobjectives. The full potential of sport employees’ abilities can be realizedthrough the application of the equity component grounded in Adam’s EquityTheory (Adams, 1963). Centered on the premise that the relationship betweensport manager and employer must be o...

  8. Synthetic biology approaches: Towards sustainable exploitation of marine bioactive molecules.

    Science.gov (United States)

    Seghal Kiran, G; Ramasamy, Pasiyappazham; Sekar, Sivasankari; Ramu, Meenatchi; Hassan, Saqib; Ninawe, A S; Selvin, Joseph

    2018-06-01

    The discovery of genes responsible for the production of bioactive metabolites via metabolic pathways combined with the advances in synthetic biology tools, has allowed the establishment of numerous microbial cell factories, for instance the yeast cell factories, for the manufacture of highly useful metabolites from renewable biomass. Genome mining and metagenomics are two platforms provide base-line data for reconstruction of genomes and metabolomes which is based in the development of synthetic/semi-synthetic genomes for marine natural products discovery. Engineered biofilms are being innovated on synthetic biology platform using genetic circuits and cell signalling systems as represillators controlling biofilm formation. Recombineering is a process of homologous recombination mediated genetic engineering, includes insertion, deletion or modification of any sequence specifically. Although this discipline considered new to the scientific domain, this field has now developed as promising endeavor on the accomplishment of sustainable exploitation of marine natural products. Copyright © 2018 Elsevier B.V. All rights reserved.

  9. Exploitation of BEPU Approach for the Licensing Process

    International Nuclear Information System (INIS)

    D'Auria, F.; Petruzzi, A.; Muellner, A.N.; Mazzantini, O.

    2011-01-01

    Within the licensing process of the Atucha II PHWR (Pressurized Heavy Water Reactor) the BEPU (Best Estimate Plus Uncertainty) approach has been selected for issuing of the Chapter 15 on FSAR (Final Safety Analysis Report). The key steps of the entire process are basically two: a) the selection of PIE (Postulated Initiating Events) and, b) the analysis by best estimate models supported by uncertainty evaluation. The key elements of the approach are: 1) availability of qualified computational tools including suitable uncertainty method; 2) demonstration of quality; 3) acceptability and endorsement by the licensing authority. The effort of issuing Chapter 15 is terminated at the time of issuing of the present paper and the safety margins available for the operation of the concerned NPP (Nuclear Power Plant) have been quantified. (authors)

  10. Simultaneously Exploiting Two Formulations: an Exact Benders Decomposition Approach

    DEFF Research Database (Denmark)

    Lusby, Richard Martin; Gamst, Mette; Spoorendonk, Simon

    When modelling a given problem using linear programming techniques several possibilities often exist, and each results in a different mathematical formulation of the problem. Usually, advantages and disadvantages can be identified in any single formulation. In this paper we consider mixed integer...... to the standard branch-and-price approach from the literature, the method shows promising performance and appears to be an attractive alternative....

  11. A multicriteria approach to identify investment opportunities for the exploitation of the clean development mechanism

    International Nuclear Information System (INIS)

    Diakoulaki, D.; Georgiou, P.; Tourkolias, C.; Georgopoulou, E.; Lalas, D.; Mirasgedis, S.; Sarafidis, Y.

    2007-01-01

    The aim of the present paper is to investigate the prospects for the exploitation of the Kyoto Protocol's Clean Development Mechanism (CDM) in Greece. The paper is addressing 3 questions: in which country, what kind of investment, with which economic and environmental return? The proposed approach is based on a multicriteria analysis for identifying priority countries and interesting investment opportunities in each priority country. These opportunities are then evaluated through a conventional financial analysis in order to assess their economic and environmental attractiveness. To this purpose, the IRR of a typical project in each investment category is calculated by taking into account country-specific parameters, such as baseline emission factors, load factors, costs, energy prices etc. The results reveal substantial differences in the economic and environmental return of different types of projects in different host-countries and show that for the full exploitation of the CDM a multifaceted approach to decision-making is necessary

  12. Up-Rating - An Alternative Approach to Meeting Future Power Demands - Exploitation of Design Margins

    Energy Technology Data Exchange (ETDEWEB)

    Bruce, Barnaby; Schwarz, Thomas [AREVA NP GmbH, Freyeslebenstr. 1, 91058 Erlangen (Germany)

    2008-07-01

    Up-rating is a world-wide implemented approach that takes advantage of increased calculation and analytic abilities developed since commissioning and applies them to old plants. In doing so, what would possibly be considered today as over-engineered design margins are exploited and plant performance is improved, without necessarily involving extensive modifications or replacement of hardware. It is therefore a short-term alternative, compared to new plants, with little change in environmental ramifications for power production capacity gained. Up-rating is also more accepted by the wider community and licensing authorities, thus complimenting the building of new plants. The 10% thermal up-rating of the nuclear power plant at Almaraz, Spain, requires a comprehensive reanalysis of all power components. This paper focuses on those measures required to ensure the performance of the steam generators at increased load as an example of design margin exploitation in such crucial components. (authors)

  13. Metagenomic approaches to exploit the biotechnological potential of the microbial consortia of marine sponges.

    Science.gov (United States)

    Kennedy, Jonathan; Marchesi, Julian R; Dobson, Alan D W

    2007-05-01

    Natural products isolated from sponges are an important source of new biologically active compounds. However, the development of these compounds into drugs has been held back by the difficulties in achieving a sustainable supply of these often-complex molecules for pre-clinical and clinical development. Increasing evidence implicates microbial symbionts as the source of many of these biologically active compounds, but the vast majority of the sponge microbial community remain uncultured. Metagenomics offers a biotechnological solution to this supply problem. Metagenomes of sponge microbial communities have been shown to contain genes and gene clusters typical for the biosynthesis of biologically active natural products. Heterologous expression approaches have also led to the isolation of secondary metabolism gene clusters from uncultured microbial symbionts of marine invertebrates and from soil metagenomic libraries. Combining a metagenomic approach with heterologous expression holds much promise for the sustainable exploitation of the chemical diversity present in the sponge microbial community.

  14. Geographically distributed Batch System as a Service: the INDIGO-DataCloud approach exploiting HTCondor

    Science.gov (United States)

    Aiftimiei, D. C.; Antonacci, M.; Bagnasco, S.; Boccali, T.; Bucchi, R.; Caballer, M.; Costantini, A.; Donvito, G.; Gaido, L.; Italiano, A.; Michelotto, D.; Panella, M.; Salomoni, D.; Vallero, S.

    2017-10-01

    One of the challenges a scientific computing center has to face is to keep delivering well consolidated computational frameworks (i.e. the batch computing farm), while conforming to modern computing paradigms. The aim is to ease system administration at all levels (from hardware to applications) and to provide a smooth end-user experience. Within the INDIGO- DataCloud project, we adopt two different approaches to implement a PaaS-level, on-demand Batch Farm Service based on HTCondor and Mesos. In the first approach, described in this paper, the various HTCondor daemons are packaged inside pre-configured Docker images and deployed as Long Running Services through Marathon, profiting from its health checks and failover capabilities. In the second approach, we are going to implement an ad-hoc HTCondor framework for Mesos. Container-to-container communication and isolation have been addressed exploring a solution based on overlay networks (based on the Calico Project). Finally, we have studied the possibility to deploy an HTCondor cluster that spans over different sites, exploiting the Condor Connection Broker component, that allows communication across a private network boundary or firewall as in case of multi-site deployments. In this paper, we are going to describe and motivate our implementation choices and to show the results of the first tests performed.

  15. Exploiting impedance shaping approaches to overcome force overshoots in delicate interaction tasks

    Directory of Open Access Journals (Sweden)

    Loris Roveda

    2016-09-01

    Full Text Available The aim of the presented article is to overcome the force overshoot issue in impedance based force tracking applications. Nowadays, light-weight manipulators are involved in high-accurate force control applications (such as polishing tasks, where the force overshoot issue is critical (i.e. damaging the component causing a production waste, exploiting the impedance control. Two main force tracking impedance control approaches are described in literature: (a set-point deformation and (b variable stiffness approaches. However, no contributions are directly related to the force overshoot issue. The presented article extends both such methodologies to analytically achieve the force overshoots avoidance in interaction tasks based on the on-line estimation of the interacting environment stiffness (available through an EKF. Both the proposed control algorithms allow to achieve a linear closed-loop dynamics for the coupled robot-environment system. Therefore, control gains can be analytically on-line calculated to achieve an over-damped closed-loop dynamics of the controlled coupled system. Control strategies have been validated in experiments, involving a KUKA LWR 4+. A probing task has been performed, representative of many industrial tasks (e.g. assembly tasks, in which a main force task direction is defined.

  16. Legal Approaches to Combating the Exploitation of Third-Country National Seasonal Workers

    NARCIS (Netherlands)

    Rijken, Conny

    2015-01-01

    The Directive on Seasonal workers is aimed at combating exploitative practices vis-a-vis seasonal workers from outside the EU. After a thorough analysis of the conditions under which practices can be qualified as exploitative, this article assesses the extent to which the directive is equipped to

  17. Parallel exploitation of a spatial-spectral classification approach for hyperspectral images on RVC-CAL

    Science.gov (United States)

    Lazcano, R.; Madroñal, D.; Fabelo, H.; Ortega, S.; Salvador, R.; Callicó, G. M.; Juárez, E.; Sanz, C.

    2017-10-01

    Hyperspectral Imaging (HI) assembles high resolution spectral information from hundreds of narrow bands across the electromagnetic spectrum, thus generating 3D data cubes in which each pixel gathers the spectral information of the reflectance of every spatial pixel. As a result, each image is composed of large volumes of data, which turns its processing into a challenge, as performance requirements have been continuously tightened. For instance, new HI applications demand real-time responses. Hence, parallel processing becomes a necessity to achieve this requirement, so the intrinsic parallelism of the algorithms must be exploited. In this paper, a spatial-spectral classification approach has been implemented using a dataflow language known as RVCCAL. This language represents a system as a set of functional units, and its main advantage is that it simplifies the parallelization process by mapping the different blocks over different processing units. The spatial-spectral classification approach aims at refining the classification results previously obtained by using a K-Nearest Neighbors (KNN) filtering process, in which both the pixel spectral value and the spatial coordinates are considered. To do so, KNN needs two inputs: a one-band representation of the hyperspectral image and the classification results provided by a pixel-wise classifier. Thus, spatial-spectral classification algorithm is divided into three different stages: a Principal Component Analysis (PCA) algorithm for computing the one-band representation of the image, a Support Vector Machine (SVM) classifier, and the KNN-based filtering algorithm. The parallelization of these algorithms shows promising results in terms of computational time, as the mapping of them over different cores presents a speedup of 2.69x when using 3 cores. Consequently, experimental results demonstrate that real-time processing of hyperspectral images is achievable.

  18. Flow-Based Provenance

    Directory of Open Access Journals (Sweden)

    Sabah Al-Fedaghi

    2017-02-01

    Full Text Available Aim/Purpose: With information almost effortlessly created and spontaneously available, current progress in Information and Communication Technology (ICT has led to the complication that information must be scrutinized for trustworthiness and provenance. Information systems must become provenance-aware to be satisfactory in accountability, reproducibility, and trustworthiness of data. Background:\tMultiple models for abstract representation of provenance have been proposed to describe entities, people, and activities involved in producing a piece of data, including the Open Provenance Model (OPM and the World Wide Web Consortium. These models lack certain concepts necessary for specifying workflows and encoding the provenance of data products used and generated. Methodology: Without loss of generality, the focus of this paper is on OPM depiction of provenance in terms of a directed graph. We have redrawn several case studies in the framework of our proposed model in order to compare and evaluate it against OPM for representing these cases. Contribution: This paper offers an alternative flow-based diagrammatic language that can form a foundation for modeling of provenance. The model described here provides an (abstract machine-like representation of provenance. Findings: The results suggest a viable alternative in the area of diagrammatic representation for provenance applications. Future Research: Future work will seek to achieve more accurate comparisons with current models in the field.

  19. Exploration of Exploitation Approaches of European Projects on ICT and Foreign Language Learning: the CEFcult project case

    NARCIS (Netherlands)

    Rusman, Ellen; Rajagopal, Kamakshi; Stoyanov, Slavi; Van Maele, Jan

    2011-01-01

    Rusman, E., Rajagopal, K., Stoyanov, S., & Van Maele, J. (2011, 20-21 October). Exploration of Exploitation Approaches of European Projects on ICT and Foreign Language Learning: the CEFcult project case. Paper presented at the 4th International Conference ICT for Language Learning, Florence, Italy.

  20. Exploration of Exploitation Approaches of European Projects on ICT and Foreign Language Learning: the CEFcult project case

    OpenAIRE

    Rusman, Ellen; Rajagopal, Kamakshi; Stoyanov, Slavi; Van Maele, Jan

    2011-01-01

    Rusman, E., Rajagopal, K., Stoyanov, S., & Van Maele, J. (2011, 20-21 October). Exploration of Exploitation Approaches of European Projects on ICT and Foreign Language Learning: the CEFcult project case. Paper presented at the 4th International Conference ICT for Language Learning, Florence, Italy. Available at: http://www.pixel-online.net/ICT4LL2011/conferenceproceedings.php

  1. Helix Nebula and CERN: A Symbiotic approach to exploiting commercial clouds

    CERN Document Server

    Barreiro Megino, Fernando Harald; Kucharczyk, Katarzyna; Medrano Llamas, Ramón; van der Ster, Daniel

    2014-01-01

    The recent paradigm shift toward cloud computing in IT, and general interest in "Big Data" in particular, have demonstrated that the computing requirements of HEP are no longer globally unique. Indeed, the CERN IT department and LHC experiments have already made significant R&D investments in delivering and exploiting cloud computing resources. While a number of technical evaluations of interesting commercial offerings from global IT enterprises have been performed by various physics labs, further technical, security, sociological, and legal issues need to be address before their large-scale adoption by the research community can be envisaged. Helix Nebula - the Science Cloud is an initiative that explores these questions by joining the forces of three European research institutes (CERN, ESA and EMBL) with leading European commercial IT enterprises. The goals of Helix Nebula are to establish a cloud platform federating multiple commercial cloud providers, along with new business models, which can sustain ...

  2. Modeling a hierarchical structure of factors influencing exploitation policy for water distribution systems using ISM approach

    Science.gov (United States)

    Jasiulewicz-Kaczmarek, Małgorzata; Wyczółkowski, Ryszard; Gładysiak, Violetta

    2017-12-01

    Water distribution systems are one of the basic elements of contemporary technical infrastructure of urban and rural areas. It is a complex engineering system composed of transmission networks and auxiliary equipment (e.g. controllers, checkouts etc.), scattered territorially over a large area. From the water distribution system operation point of view, its basic features are: functional variability, resulting from the need to adjust the system to temporary fluctuations in demand for water and territorial dispersion. The main research questions are: What external factors should be taken into account when developing an effective water distribution policy? Does the size and nature of the water distribution system significantly affect the exploitation policy implemented? These questions have shaped the objectives of research and the method of research implementation.

  3. Helix Nebula and CERN: A Symbiotic approach to exploiting commercial clouds

    CERN Multimedia

    Barreiro Megino, Fernando Harald; Kucharczyk, Katarzyna; Medrano Llamas, Ramón; van der Ster, Daniel

    2013-01-01

    The recent paradigm shift toward cloud computing in IT, and general interest in "Big Data" in particular, have demonstrated that the computing requirements of HEP are no longer globally unique. Indeed, the CERN IT department and LHC experiments have already made significant R&D; investments in delivering and exploiting cloud computing resources. While a number of technical evaluations of interesting commercial offerings from global IT enterprises have been performed by various physics labs, further technical, security, sociological, and legal issues need to be address before their large-scale adoption by the research community can be envisaged. Helix Nebula - the Science Cloud is an initiative that explores these questions by joining the forces of three European research institutes (CERN, ESA and EMBL) with leading European commercial IT enterprises. The goals of Helix Nebula are to establish a cloud platform federating multiple commercial cloud providers, along with new business models, which can sustain...

  4. magHD: a new approach to multi-dimensional data storage, analysis, display and exploitation

    International Nuclear Information System (INIS)

    Angleraud, Christophe

    2014-01-01

    The ever increasing amount of data and processing capabilities – following the well- known Moore's law – is challenging the way scientists and engineers are currently exploiting large datasets. The scientific visualization tools, although quite powerful, are often too generic and provide abstract views of phenomena, thus preventing cross disciplines fertilization. On the other end, Geographic information Systems allow nice and visually appealing maps to be built but they often get very confused as more layers are added. Moreover, the introduction of time as a fourth analysis dimension to allow analysis of time dependent phenomena such as meteorological or climate models, is encouraging real-time data exploration techniques that allow spatial-temporal points of interests to be detected by integration of moving images by the human brain. Magellium is involved in high performance image processing chains for satellite image processing as well as scientific signal analysis and geographic information management since its creation (2003). We believe that recent work on big data, GPU and peer-to-peer collaborative processing can open a new breakthrough in data analysis and display that will serve many new applications in collaborative scientific computing, environment mapping and understanding. The magHD (for Magellium Hyper-Dimension) project aims at developing software solutions that will bring highly interactive tools for complex datasets analysis and exploration commodity hardware, targeting small to medium scale clusters with expansion capabilities to large cloud based clusters

  5. RF cavity design exploiting a new derivative-free trust region optimization approach

    Directory of Open Access Journals (Sweden)

    Abdel-Karim S.O. Hassan

    2015-11-01

    Full Text Available In this article, a novel derivative-free (DF surrogate-based trust region optimization approach is proposed. In the proposed approach, quadratic surrogate models are constructed and successively updated. The generated surrogate model is then optimized instead of the underlined objective function over trust regions. Truncated conjugate gradients are employed to find the optimal point within each trust region. The approach constructs the initial quadratic surrogate model using few data points of order O(n, where n is the number of design variables. The proposed approach adopts weighted least squares fitting for updating the surrogate model instead of interpolation which is commonly used in DF optimization. This makes the approach more suitable for stochastic optimization and for functions subject to numerical error. The weights are assigned to give more emphasis to points close to the current center point. The accuracy and efficiency of the proposed approach are demonstrated by applying it to a set of classical bench-mark test problems. It is also employed to find the optimal design of RF cavity linear accelerator with a comparison analysis with a recent optimization technique.

  6. Helix Nebula and CERN: A Symbiotic approach to exploiting commercial clouds

    International Nuclear Information System (INIS)

    Megino, Fernando H Barreiro; Jones, Robert; Llamas, Ramón Medrano; Ster, Daniel van der; Kucharczyk, Katarzyna

    2014-01-01

    The recent paradigm shift toward cloud computing in IT, and general interest in 'Big Data' in particular, have demonstrated that the computing requirements of HEP are no longer globally unique. Indeed, the CERN IT department and LHC experiments have already made significant R and D investments in delivering and exploiting cloud computing resources. While a number of technical evaluations of interesting commercial offerings from global IT enterprises have been performed by various physics labs, further technical, security, sociological, and legal issues need to be address before their large-scale adoption by the research community can be envisaged. Helix Nebula – the Science Cloud is an initiative that explores these questions by joining the forces of three European research institutes (CERN, ESA and EMBL) with leading European commercial IT enterprises. The goals of Helix Nebula are to establish a cloud platform federating multiple commercial cloud providers, along with new business models, which can sustain the cloud marketplace for years to come. This contribution will summarize the participation of CERN in Helix Nebula. We will explain CERN's flagship use-case and the model used to integrate several cloud providers with an LHC experiment's workload management system. During the first proof of concept, this project contributed over 40.000 CPU-days of Monte Carlo production throughput to the ATLAS experiment with marginal manpower required. CERN's experience, together with that of ESA and EMBL, is providing a great insight into the cloud computing industry and highlighted several challenges that are being tackled in order to ease the export of the scientific workloads to the cloud environments.

  7. Helix Nebula and CERN: A Symbiotic approach to exploiting commercial clouds

    Science.gov (United States)

    Barreiro Megino, Fernando H.; Jones, Robert; Kucharczyk, Katarzyna; Medrano Llamas, Ramón; van der Ster, Daniel

    2014-06-01

    The recent paradigm shift toward cloud computing in IT, and general interest in "Big Data" in particular, have demonstrated that the computing requirements of HEP are no longer globally unique. Indeed, the CERN IT department and LHC experiments have already made significant R&D investments in delivering and exploiting cloud computing resources. While a number of technical evaluations of interesting commercial offerings from global IT enterprises have been performed by various physics labs, further technical, security, sociological, and legal issues need to be address before their large-scale adoption by the research community can be envisaged. Helix Nebula - the Science Cloud is an initiative that explores these questions by joining the forces of three European research institutes (CERN, ESA and EMBL) with leading European commercial IT enterprises. The goals of Helix Nebula are to establish a cloud platform federating multiple commercial cloud providers, along with new business models, which can sustain the cloud marketplace for years to come. This contribution will summarize the participation of CERN in Helix Nebula. We will explain CERN's flagship use-case and the model used to integrate several cloud providers with an LHC experiment's workload management system. During the first proof of concept, this project contributed over 40.000 CPU-days of Monte Carlo production throughput to the ATLAS experiment with marginal manpower required. CERN's experience, together with that of ESA and EMBL, is providing a great insight into the cloud computing industry and highlighted several challenges that are being tackled in order to ease the export of the scientific workloads to the cloud environments.

  8. Novel approach to the exploitation of the tidal energy. Volume 1: Summary and discussion

    Science.gov (United States)

    Gorlov, A. M.

    1981-12-01

    The hydropneumatic concept in the approach to harnessing low tidal hydropower is discussed. The energy of water flow is converted into the energy of an air jet by a specialized air chamber which is placed on the ocean floor across a flowing watercourse. Water passes through the chamber where it works as a natural piston compressing air in the upper part of the closure. Compressed air is used as a new working plenum to drive air turbines. The kinetic energy of an air jet provided by the air chamber is sufficient for stable operation of industrial air turbines. It is possible to use light plastic barriers instead of conventional rigid dams (the water sail concept). It is confirmed that the concept can result in a less expensive and more effective tidal power plant project than the conventional hydroturbine approach.

  9. Hybrid approaches to nanometer-scale patterning: Exploiting tailored intermolecular interactions

    International Nuclear Information System (INIS)

    Mullen, Thomas J.; Srinivasan, Charan; Shuster, Mitchell J.; Horn, Mark W.; Andrews, Anne M.; Weiss, Paul S.

    2008-01-01

    In this perspective, we explore hybrid approaches to nanometer-scale patterning, where the precision of molecular self-assembly is combined with the sophistication and fidelity of lithography. Two areas - improving existing lithographic techniques through self-assembly and fabricating chemically patterned surfaces - will be discussed in terms of their advantages, limitations, applications, and future outlook. The creation of such chemical patterns enables new capabilities, including the assembly of biospecific surfaces to be recognized by, and to capture analytes from, complex mixtures. Finally, we speculate on the potential impact and upcoming challenges of these hybrid strategies.

  10. Exploiting Flexibility in Coupled Electricity and Natural Gas Markets: A Price-Based Approach

    DEFF Research Database (Denmark)

    Ordoudis, Christos; Delikaraoglou, Stefanos; Pinson, Pierre

    2017-01-01

    Natural gas-fired power plants (NGFPPs) are considered a highly flexible component of the energy system and can facilitate the large-scale integration of intermittent renewable generation. Therefore, it is necessary to improve the coordination between electric power and natural gas systems....... Considering a market-based coupling of these systems, we introduce a decision support tool that increases market efficiency in the current setup where day-ahead and balancing markets are cleared sequentially. The proposed approach relies on the optimal adjustment of natural gas price to modify the scheduling...

  11. Interdisciplinary approach to exploit the tectonic memory in the continental crust of collisional belts.

    Science.gov (United States)

    Gosso, G.; Marotta, A. M.; Rebay, G.; Regorda, A.; Roda, M.; Spalla, M. I.; Zanoni, D.; Zucali, M.

    2015-12-01

    Collisional belts result by thoroughly competing thermo-mechanical disaggregation and coupling within both continental and oceanic lithospheric slices, during construction of tectono-metamorphic architectures. In multiply reworked metamorphics, tectonic units may be contoured nowadays on the base of coherent thermo-baric and structural time-sequences rather than simply relying on lithologic affinities. Sequences of equilibrium assemblages and related fabric imprints are an approach that appears as a more reliable procedure, that enables to define tectonic units as the volume of crustal slices that underwent corresponding variations during the dynamics of an active margin and takes into account a history of physical imprints. The dimensions of these tectonic units may have varied over time and must be reconstructed combining the tracers of structural and metamorphic changes of basement rocks, since such kind of tectono-metamorphic units (TMUs) is a realistic configuration of the discrete portions of orogenic crust that experienced a coherent sequence of metamorphic and textural variations. Their translational trajectories, and bulk shape changes during deformation, cannot simply be derived from the analysis of the geometries and kinematics of tectonic units, but are to be obtained by adding the reconstruction of quantitative P-T-d-t paths making full use of fossil mineral equilibria. The joint TMU field-and-laboratory definition is an investigation procedure that bears a distinct thermo-tectonic connotation, that, through modelling, offers the opportunity to test the physical compatibilities of plate-scale interconnected variables, such as density, viscosity, and heat transfer, with respect to what current interpretative geologic histories may imply. Comparison between predictions from numerical modelling and natural data obtained by this analytical approach can help to solve ambiguities on geodynamic significance of structural and thermal signatures, also as a

  12. A planning of exploitation to electric systems approach considering environmental criteria Description of a multicriteria optimization paradigm

    International Nuclear Information System (INIS)

    Schweickardt, Gustavo Alejandro; Gimenez Alvarez, Juan Manuel

    2012-01-01

    This work presents a context and a Model to approach the Planning of Exploitation of Electric Systems problem, in the medium term, considering environmental criteria. A decision making process from a Multicriteria Paradigm is introduced. In the past, environmental criteria just were considered or they were ignored. Due to the growing consciousness about environmental impacts of productive processes, a new orientation to the problem is required: a bigger integral quality of the planning process, instead of searching an optimal solution, based in a minimum investment cost. The Application Model considers the Total Cost of Energy Production and the Environmental Impact produced by emissions of CO 2 , SO 2 y NO x from Thermal Units, and is based in a Fuzzy Sets decision-making to represent the uncertainties in the system decision variables and satisfaction degree of solutions. The results obtained from the Traditional and Multicriteria Model, are finally presented.

  13. TwitterSensing: An Event-Based Approach for Wireless Sensor Networks Optimization Exploiting Social Media in Smart City Applications.

    Science.gov (United States)

    Costa, Daniel G; Duran-Faundez, Cristian; Andrade, Daniel C; Rocha-Junior, João B; Peixoto, João Paulo Just

    2018-04-03

    Modern cities are subject to periodic or unexpected critical events, which may bring economic losses or even put people in danger. When some monitoring systems based on wireless sensor networks are deployed, sensing and transmission configurations of sensor nodes may be adjusted exploiting the relevance of the considered events, but efficient detection and classification of events of interest may be hard to achieve. In Smart City environments, several people spontaneously post information in social media about some event that is being observed and such information may be mined and processed for detection and classification of critical events. This article proposes an integrated approach to detect and classify events of interest posted in social media, notably in Twitter , and the assignment of sensing priorities to source nodes. By doing so, wireless sensor networks deployed in Smart City scenarios can be optimized for higher efficiency when monitoring areas under the influence of the detected events.

  14. TwitterSensing: An Event-Based Approach for Wireless Sensor Networks Optimization Exploiting Social Media in Smart City Applications

    Directory of Open Access Journals (Sweden)

    Daniel G. Costa

    2018-04-01

    Full Text Available Modern cities are subject to periodic or unexpected critical events, which may bring economic losses or even put people in danger. When some monitoring systems based on wireless sensor networks are deployed, sensing and transmission configurations of sensor nodes may be adjusted exploiting the relevance of the considered events, but efficient detection and classification of events of interest may be hard to achieve. In Smart City environments, several people spontaneously post information in social media about some event that is being observed and such information may be mined and processed for detection and classification of critical events. This article proposes an integrated approach to detect and classify events of interest posted in social media, notably in Twitter, and the assignment of sensing priorities to source nodes. By doing so, wireless sensor networks deployed in Smart City scenarios can be optimized for higher efficiency when monitoring areas under the influence of the detected events.

  15. Exploiting neurovascular coupling: a Bayesian sequential Monte Carlo approach applied to simulated EEG fNIRS data

    Science.gov (United States)

    Croce, Pierpaolo; Zappasodi, Filippo; Merla, Arcangelo; Chiarelli, Antonio Maria

    2017-08-01

    Objective. Electrical and hemodynamic brain activity are linked through the neurovascular coupling process and they can be simultaneously measured through integration of electroencephalography (EEG) and functional near-infrared spectroscopy (fNIRS). Thanks to the lack of electro-optical interference, the two procedures can be easily combined and, whereas EEG provides electrophysiological information, fNIRS can provide measurements of two hemodynamic variables, such as oxygenated and deoxygenated hemoglobin. A Bayesian sequential Monte Carlo approach (particle filter, PF) was applied to simulated recordings of electrical and neurovascular mediated hemodynamic activity, and the advantages of a unified framework were shown. Approach. Multiple neural activities and hemodynamic responses were simulated in the primary motor cortex of a subject brain. EEG and fNIRS recordings were obtained by means of forward models of volume conduction and light propagation through the head. A state space model of combined EEG and fNIRS data was built and its dynamic evolution was estimated through a Bayesian sequential Monte Carlo approach (PF). Main results. We showed the feasibility of the procedure and the improvements in both electrical and hemodynamic brain activity reconstruction when using the PF on combined EEG and fNIRS measurements. Significance. The investigated procedure allows one to combine the information provided by the two methodologies, and, by taking advantage of a physical model of the coupling between electrical and hemodynamic response, to obtain a better estimate of brain activity evolution. Despite the high computational demand, application of such an approach to in vivo recordings could fully exploit the advantages of this combined brain imaging technology.

  16. Is Kissamos Bay in NW Crete, Greece worth to be exploited as a marine aggregates deposit? An integrated approach

    Science.gov (United States)

    Anastasatou, Marianthi; Tsoutsia, Antonia; Petrakis, Stelios; Rousakis, Grigoris; Karditsa, Aikaterini; Hasiotis, Thomas; Kapsimalis, Vasilios; Poulos, Serafim; Stamatakis, Michael

    2017-04-01

    This study uses an integrated approach to investigate the offshore area of Kissamos Bay, NW Crete Island, Greece, as a prospective marine aggregate (MA) deposit. Non-fuel marine minerals and especially marine aggregates (sand and gravel) are reviewed from the perspective of resources during the last decades. The possible MA deposit of Kissamos Bay was explored during the implementation of the research project THALES-MARE, considering existing information of previous extraction activities in the wider area. Kissamos Bay is located at the inner continental shelf off NW Crete. The onshore basement rocks are composed of Mesozoic to Eocene limestones, shale and sandstone units, along with Neogene sediments such as marls, sandstones and claystones, which locally host Messinian gypsum layers. Sixteen sea-bottom sediment samples were collected with a Smith-McIntyretype grab along four transects, vertical to the shoreline, at water depths of 11 to 44m. A sub-bottom acoustic profiler survey was conducted in order to quantitatively determine the deposit (dimensions and structure). Mineralogical, geochemical, sedimentological and benthic analyses of the samples were carried out, in order to determine the quality of the reservoir and the environmental impact of a potential exploitation. Mineralogical results indicated that the bulk samples consist predominantly of quartz, while calcite occurs as a second significant phase. Chemical analysis of major and trace elements revealed that the average SiO2 content is around 55% with samples closer to the beach (depths Culture and Sports.

  17. A Novel Approach to Model Earth Fissure Caused by Extensive Aquifer Exploitation and its Application to the Wuxi Case, China

    Science.gov (United States)

    Ye, Shujun; Franceschini, Andrea; Zhang, Yan; Janna, Carlo; Gong, Xulong; Yu, Jun; Teatini, Pietro

    2018-03-01

    Initially observed in the semiarid basins of southwestern USA, earth fissures due to aquifer over-exploitation are presently threatening a large number of subsiding basins in various countries worldwide. Different mechanics have been proposed to explain this process, such as differential compaction, horizontal movements, and fault reactivation. Numerical modeling and prediction of this major geohazard caused by overuse of groundwater resources are challenging because of two main requirements: shifting from the classical continuous to discontinuous geomechanics and incorporating two-dimensional features (the earth fissures) into large three-dimensional (3-D) modeling domain (the subsiding basin). In this work, we proposed a novel modeling approach to simulate earth fissure generation and propagation in 3-D complex geological settings. A nested two-scale approach associated with an original nonlinear elastoplastic finite element/interface element simulator allows modeling the mechanics of earth discontinuities, in terms of both sliding and opening. The model is applied on a case study in Wuxi, China, where groundwater pumping between 1985 and 2004 has caused land subsidence larger than 2 m. The model outcomes highlight that the presence of a shallow (˜80 m deep) bedrock ridge crossing the Yangtze River delta is the key factor triggering the earth fissure development in this area. Bending of the alluvial deposits around the ridge tip and shear stress due to the uneven piezometric change and asymmetrical shape of the bedrock have caused the earth fissure to onset at the land surface and propagate downward to a maximum depth of about 20-30 m. Maximum sliding and opening are computed in the range of 10-40 cm, in agreement with the order of magnitude estimated in the field.

  18. An ethnomethodological approach to examine exploitation in the context of capacity, trust and experience of commercial surrogacy in India

    Science.gov (United States)

    2013-01-01

    The socio-ethical concerns regarding exploitation in commercial surrogacy are premised on asymmetric vulnerability and the commercialization of women’s reproductive capacity to suit individualistic motives. In examining the exploitation argument, this article reviews the social contract theory that describes an individual as an ‘economic man’ with moral and/or political motivations to satisfy individual desires. This study considers the critique by feminists, who argue that patriarchal and medical control prevails in the surrogacy contracts. It also explores the exploitative dynamics amongst actors in the light of Baier’s conceptualization of trust and human relationship, within which both justice and exploitation thrive, and Foucault’s concept of bio-power. Drawing on these concepts, this paper aims to investigate the manifestations of exploitation in commercial surrogacy in the context of trust, power and experiences of actors, using a case study of one clinic in India. The actors’ experiences are evaluated at different stages of the surrogacy process: recruitment, medical procedures, living in the surrogate home, bonding with the child and amongst actors, financial dealings, relinquishment and post-relinquishment. This study applies ethnomethodology to identify phenomena as perceived by the actors in a situation, giving importance to their interpretations of the rules that make collective activity possible. The methods include semi-structured interviews, discussions, participant observation and explanation of the phenomena from the actors’ perspectives. Between August 2009 and April 2010, 13 surrogate mothers (SMs), 4 intended parents (IPs) and 2 medical practitioners (MPs) from one clinic in Western India were interviewed. This study reveals that asymmetries of capacity amongst the MPs, SMs, IPs and surrogate agents (SAs) lead to a network of trust and designation of powers through rules, bringing out the relevance of Baier’s conceptualization

  19. An ethnomethodological approach to examine exploitation in the context of capacity, trust and experience of commercial surrogacy in India.

    Science.gov (United States)

    Saravanan, Sheela

    2013-08-20

    The socio-ethical concerns regarding exploitation in commercial surrogacy are premised on asymmetric vulnerability and the commercialization of women's reproductive capacity to suit individualistic motives. In examining the exploitation argument, this article reviews the social contract theory that describes an individual as an 'economic man' with moral and/or political motivations to satisfy individual desires. This study considers the critique by feminists, who argue that patriarchal and medical control prevails in the surrogacy contracts. It also explores the exploitative dynamics amongst actors in the light of Baier's conceptualization of trust and human relationship, within which both justice and exploitation thrive, and Foucault's concept of bio-power. Drawing on these concepts, this paper aims to investigate the manifestations of exploitation in commercial surrogacy in the context of trust, power and experiences of actors, using a case study of one clinic in India. The actors' experiences are evaluated at different stages of the surrogacy process: recruitment, medical procedures, living in the surrogate home, bonding with the child and amongst actors, financial dealings, relinquishment and post-relinquishment.This study applies ethnomethodology to identify phenomena as perceived by the actors in a situation, giving importance to their interpretations of the rules that make collective activity possible. The methods include semi-structured interviews, discussions, participant observation and explanation of the phenomena from the actors' perspectives. Between August 2009 and April 2010, 13 surrogate mothers (SMs), 4 intended parents (IPs) and 2 medical practitioners (MPs) from one clinic in Western India were interviewed.This study reveals that asymmetries of capacity amongst the MPs, SMs, IPs and surrogate agents (SAs) lead to a network of trust and designation of powers through rules, bringing out the relevance of Baier's conceptualization of asymmetric

  20. An ethnomethodological approach to examine exploitation in the context of capacity, trust and experience of commercial surrogacy in India

    OpenAIRE

    Saravanan, Sheela

    2013-01-01

    The socio-ethical concerns regarding exploitation in commercial surrogacy are premised on asymmetric vulnerability and the commercialization of women’s reproductive capacity to suit individualistic motives. In examining the exploitation argument, this article reviews the social contract theory that describes an individual as an ‘economic man’ with moral and/or political motivations to satisfy individual desires. This study considers the critique by feminists, who argue that ...

  1. Redefining Exploitation

    DEFF Research Database (Denmark)

    Agarwala, Rina

    2016-01-01

    This article examines how self-employed workers are organizing in the garments and waste collection industries in India. Although the question of who is profiting from self-employed workers’ labor is complex, the cases outlined in this paper highlight telling instances of how some self......-employed workers are organizing as workers. They are fighting labor exploitation by redefining the concept to include additional exploitation axes (from the state and middle class) and forms (including sexual). In doing so, they are redefining potential solutions, including identities and material benefits, to fit...... their unique needs. By expanding the category of “workers” beyond those defined by a narrow focus on a standard employer-employee relationship, these movements are also fighting exclusion from earlier labor protections by increasing the number of entitled beneficiaries. These struggles provide an important...

  2. Learning Metasploit exploitation and development

    CERN Document Server

    Balapure, Aditya

    2013-01-01

    A practical, hands-on tutorial with step-by-step instructions. The book will follow a smooth and easy-to-follow tutorial approach, covering the essentials and then showing the readers how to write more sophisticated exploits.This book targets exploit developers, vulnerability analysts and researchers, network administrators, and ethical hackers looking to gain advanced knowledge in exploitation development and identifying vulnerabilities. The primary goal is to take readers wishing to get into more advanced exploitation discovery and reaching the next level.Prior experience exploiting basic st

  3. Capacity-Approaching Modulation Formats for Optical Transmission Systems: Signal shaping and advanced de/muxing for efficient resource exploitation

    DEFF Research Database (Denmark)

    Estaran Tolosa, Jose Manuel

    Aiming for efficient fiber-optic data transport, this thesis addresses three scenario-specific modulation and/or multiplexing techniques which, leveraging digital signal processing, can further exploit the available resources.The considered environments are: (i) (ultra) long-haul networks, where we...... focus on improving the receiver sensitivity; (ii) metropolitan area networks, where the target is providing spectral and rate adaptability with fine granularity and easy reconfigurability; and (iii) short-haul networks, where facilitating more affordable throughput scaling is pursued. Functioning...

  4. DNA barcoding approaches for fishing authentication of exploited grouper species including the endangered and legally protected goliath grouper Epinephelus itajara

    Directory of Open Access Journals (Sweden)

    Rodrigo A. Torres

    2013-09-01

    Full Text Available Fishing strategies are constantly changing to meet the needs for new or alternative food sources. Consequently, management of fishing activities regarding rates of exploitation is essential, as a number of resources have reached situations of overexploitation. The aim of the present study was to use DNA barcoding from the goliath grouper and other exploited epinephelids in order to provide procedures for DNA authentication to be used as evidence for combating putative illegal fishing. The species studied were Epinephelus adscensionis, Mycteroperca bonaci, Mycteroperca interstitialis, Epinephelus itajara, Mycteroperca venenosa, Epinephelus mystacinus, Dermatolepis inermis, Alphestes afer, Cephalopholis fulva, Mycteroperca acutirostris, Rypticus saponaceus, Mycteroperca marginata and Epinephelus morio. Four of these species are the main epinephelids fished in the Atlantic Ocean. Differential patterns of polymerase chain reaction–restriction fragment length polymorphism were obtained from the species and additional single nucleotide polymorphisms were also detected among the four main epinephelids studied. The procedures proved very efficient and we suggest their applicability to the other fish groups as a way to control illegal capture and retail around the world, especially in cases in which filleting and other forms of de-characterization cause a lack of morpho-anatomical key characters.

  5. New approach to exploit optimally the PV array output energy by maximizing the discharge rate of a directly-coupled photovoltaic water pumping system (DC/PVPS)

    International Nuclear Information System (INIS)

    Boutelhig, Azzedine; Hadj Arab, Amar; Hanini, Salah

    2016-01-01

    Highlights: • Mismatches on a designed d-c PV pumping system have been highlighted. • A new approach predicting the maximal discharge has been developed. • The approach has been discussed versus its linearity coefficient. • The approach effectiveness has been investigated and approved. • Theoretical and experimental obtained values have been compared and approved. - Abstract: A directly-coupled photovoltaic water pumping system (DC/PVPS) is generally designed by considering the worst month conditions on lowest daylight-hours, the maximum monthly daily required water volume and tank to store the excess water. In case of absence of hydraulic storage (water tank) or it is not enough dimensioned, the extra amount of pumped water is lost or is not reasonably used, when the system is operated on full daylight-hour. Beside that the extra amount of energy, which might be produced by the PV generator, is not exploited, when the system is operated only during a specified period-time needed to satisfy the demand. Beyond the accurate design that satisfying the end-user, a new approach has been developed as target to exploit maximally the PV array energy production, by maximizing the discharge rate of the system. The methodology consists of approaching maximally the demanded energy to the supplied energy on full operating day. Based on the demand/supply energy condition, the approach has been developed, upon the PV array and the pump performance models. The issued approach predicts the maximum delivery capacity of the system on monthly daily water volumes versus the monthly daily averages of solar irradiation, previously recorded. Its efficacy has been investigated and discussed according to the estimated and experimental values of its linearity coefficient, following the characterization tests of a designed system, carried out at our pumping test facility in Ghardaia (Algeria). The new theoretically and experimentally obtained flow-rates fit well, except

  6. Recent developments in automated determinations of trace level concentrations of elements and on-line fractionations schemes exploiting the micro-sequential injection - lab-on-valve approach

    DEFF Research Database (Denmark)

    Hansen, Elo Harald; Miró, Manuel; Long, Xiangbao

    2006-01-01

    The determination of trace level concentrations of elements, such as metal species, in complex matrices by atomic absorption or emission spectrometric methods often require appropriate pretreatments comprising separation of the analyte from interfering constituents and analyte preconcentration...... are presented as based on the exploitation of micro-sequential injection (μSI-LOV) using hydrophobic as well as hydrophilic bead materials. The examples given comprise the presentation of a universal approach for SPE-assays, front-end speciation of Cr(III) and Cr(VI) in a fully automated and enclosed set...

  7. Flow-Based Network Analysis of the Caenorhabditis elegans Connectome.

    Science.gov (United States)

    Bacik, Karol A; Schaub, Michael T; Beguerisse-Díaz, Mariano; Billeh, Yazan N; Barahona, Mauricio

    2016-08-01

    We exploit flow propagation on the directed neuronal network of the nematode C. elegans to reveal dynamically relevant features of its connectome. We find flow-based groupings of neurons at different levels of granularity, which we relate to functional and anatomical constituents of its nervous system. A systematic in silico evaluation of the full set of single and double neuron ablations is used to identify deletions that induce the most severe disruptions of the multi-resolution flow structure. Such ablations are linked to functionally relevant neurons, and suggest potential candidates for further in vivo investigation. In addition, we use the directional patterns of incoming and outgoing network flows at all scales to identify flow profiles for the neurons in the connectome, without pre-imposing a priori categories. The four flow roles identified are linked to signal propagation motivated by biological input-response scenarios.

  8. A Novel Approach to the Identification of Compromised Pulmonary Systems in Smokers by Exploiting Tidal Breathing Patterns

    Directory of Open Access Journals (Sweden)

    Raj Rakshit

    2018-04-01

    Full Text Available Smoking causes unalterable physiological abnormalities in the pulmonary system. This is emerging as a serious threat worldwide. Unlike spirometry, tidal breathing does not require subjects to undergo forceful breathing maneuvers and is progressing as a new direction towards pulmonary health assessment. The aim of the paper is to evaluate whether tidal breathing signatures can indicate deteriorating adult lung condition in an otherwise healthy person. If successful, such a system can be used as a pre-screening tool for all people before some of them need to undergo a thorough clinical checkup. This work presents a novel systematic approach to identify compromised pulmonary systems in smokers from acquired tidal breathing patterns. Tidal breathing patterns are acquired during restful breathing of adult participants. Thereafter, physiological attributes are extracted from the acquired tidal breathing signals. Finally, a unique classification approach of locally weighted learning with ridge regression (LWL-ridge is implemented, which handles the subjective variations in tidal breathing data without performing feature normalization. The LWL-ridge classifier recognized compromised pulmonary systems in smokers with an average classification accuracy of 86.17% along with a sensitivity of 80% and a specificity of 92%. The implemented approach outperformed other variants of LWL as well as other standard classifiers and generated comparable results when applied on an external cohort. This end-to-end automated system is suitable for pre-screening people routinely for early detection of lung ailments as a preventive measure in an infrastructure-agnostic way.

  9. A Novel Approach to the Identification of Compromised Pulmonary Systems in Smokers by Exploiting Tidal Breathing Patterns.

    Science.gov (United States)

    Rakshit, Raj; Khasnobish, Anwesha; Chowdhury, Arijit; Sinharay, Arijit; Pal, Arpan; Chakravarty, Tapas

    2018-04-25

    Smoking causes unalterable physiological abnormalities in the pulmonary system. This is emerging as a serious threat worldwide. Unlike spirometry, tidal breathing does not require subjects to undergo forceful breathing maneuvers and is progressing as a new direction towards pulmonary health assessment. The aim of the paper is to evaluate whether tidal breathing signatures can indicate deteriorating adult lung condition in an otherwise healthy person. If successful, such a system can be used as a pre-screening tool for all people before some of them need to undergo a thorough clinical checkup. This work presents a novel systematic approach to identify compromised pulmonary systems in smokers from acquired tidal breathing patterns. Tidal breathing patterns are acquired during restful breathing of adult participants. Thereafter, physiological attributes are extracted from the acquired tidal breathing signals. Finally, a unique classification approach of locally weighted learning with ridge regression (LWL-ridge) is implemented, which handles the subjective variations in tidal breathing data without performing feature normalization. The LWL-ridge classifier recognized compromised pulmonary systems in smokers with an average classification accuracy of 86.17% along with a sensitivity of 80% and a specificity of 92%. The implemented approach outperformed other variants of LWL as well as other standard classifiers and generated comparable results when applied on an external cohort. This end-to-end automated system is suitable for pre-screening people routinely for early detection of lung ailments as a preventive measure in an infrastructure-agnostic way.

  10. When death approaches: reverting or exploiting emergent inequity in a complex land-use table-board game

    Directory of Open Access Journals (Sweden)

    Luís García-Barrios

    2015-06-01

    Full Text Available The lives of poor landowners in tropical mountains depend upon their collective capacity to create and coordinate social preferences derived from their interacting communalistic, hierarchical, and reciprocal exchanges. External actors currently contend for these territories under market rules that are modifying such preferences. We present the design, experimental implementation, and analysis of results of a four-player, land-use board game with stark resource and livelihood limits and coordination/cooperation challenges, as played (separately by 116 farmers and 108 academics, mainly in the tropical mountains of Chiapas, Mexico. In game session one, we trained and framed players in moral economy, a human core feeling and communalistic norm of solidarity and mutual obligation, which translates into "all players must survive." In session two, we explored to what extent moral economy resisted as a social preference under a hypothetical external monetary incentive scheme unfavorable to it. Using an approach that combines spot game analysis and experimental work, we studied the social preferences that emerged during session two among advantaged and disadvantaged players to deal with inequity in land appropriation and use when imminent "death" approaches. We make comparisons between farmers and academics. Players evolved moral economy, competitive domination, i.e., let competition decide, and coalition, i.e., advantaged players ask the dying to surrender land and die prematurely in exchange for a share of the dismal profits. Farmers basically stuck to the first two preferences in similar proportions whereas academics clearly shifted to coalition, a last-resort choice, which allowed disadvantaged players some final leverage and advantaged players use of liberated resources to improve efficiency. Coalition as strategic cooperation among the unequal is part of the culture in which academics are being educated as sustainability professionals and toward

  11. Influence of Urbanization on Body Size, Condition, and Physiology in an Urban Exploiter: A Multi-Component Approach.

    Directory of Open Access Journals (Sweden)

    Alizée Meillère

    Full Text Available Consistent expanding urbanization dramatically transforms natural habitats and exposes organisms to novel environmental challenges, often leading to reduced species richness and diversity in cities. However, it remains unclear how individuals are affected by the urban environment and how they can or cannot adjust to the specific characteristics of urban life (e.g. food availability. In this study, we used an integrative multi-component approach to investigate the effects of urbanization on the nutritional status of house sparrows (Passer domesticus. We assessed several morphological and physiological indices of body condition in both juveniles (early post-fledging and breeding adults from four sites with different levels of urbanization in France, Western Europe. We found that sparrows in more urbanized habitats have reduced body size and body mass compared to their rural conspecifics. However, we did not find any consistent differences in a number of complementary indices of condition (scaled mass index, muscle score, hematocrit, baseline and stress-induced corticosterone levels between urban and rural birds, indicating that urban sparrows may not be suffering nutritional stress. Our results suggest that the urban environment is unlikely to energetically constrain adult sparrows, although other urban-related variables may constrain them. On the other hand, we found significant difference in juvenile fat scores, suggesting that food types provided to young sparrows differed highly between habitats. In addition to the observed smaller size of urban sparrows, these results suggest that the urban environment is inadequate to satisfy early-life sparrows' nutritional requirements, growth, and development. The urban environment may therefore have life-long consequences for developing birds.

  12. Influence of Urbanization on Body Size, Condition, and Physiology in an Urban Exploiter: A Multi-Component Approach.

    Science.gov (United States)

    Meillère, Alizée; Brischoux, François; Parenteau, Charline; Angelier, Frédéric

    2015-01-01

    Consistent expanding urbanization dramatically transforms natural habitats and exposes organisms to novel environmental challenges, often leading to reduced species richness and diversity in cities. However, it remains unclear how individuals are affected by the urban environment and how they can or cannot adjust to the specific characteristics of urban life (e.g. food availability). In this study, we used an integrative multi-component approach to investigate the effects of urbanization on the nutritional status of house sparrows (Passer domesticus). We assessed several morphological and physiological indices of body condition in both juveniles (early post-fledging) and breeding adults from four sites with different levels of urbanization in France, Western Europe. We found that sparrows in more urbanized habitats have reduced body size and body mass compared to their rural conspecifics. However, we did not find any consistent differences in a number of complementary indices of condition (scaled mass index, muscle score, hematocrit, baseline and stress-induced corticosterone levels) between urban and rural birds, indicating that urban sparrows may not be suffering nutritional stress. Our results suggest that the urban environment is unlikely to energetically constrain adult sparrows, although other urban-related variables may constrain them. On the other hand, we found significant difference in juvenile fat scores, suggesting that food types provided to young sparrows differed highly between habitats. In addition to the observed smaller size of urban sparrows, these results suggest that the urban environment is inadequate to satisfy early-life sparrows' nutritional requirements, growth, and development. The urban environment may therefore have life-long consequences for developing birds.

  13. The Ethics of Exploitation

    Directory of Open Access Journals (Sweden)

    Paul McLaughlin

    2008-11-01

    Full Text Available Philosophical inquiry into exploitation has two major deficiencies to date: it assumes that exploitation is wrong by definition; and it pays too much attention to the Marxian account of exploitation. Two senses of exploitation should be distinguished: the ‘moral’ or pejorative sense and the ‘non-moral’ or ‘non-prejudicial’ sense. By demonstrating the conceptual inadequacy of exploitation as defined in the first sense, and by defining exploitation adequately in the latter sense, we seek to demonstrate the moral complexity of exploitation. We contend, moreover, that moral evaluation of exploitation is only possible once we abandon a strictly Marxian framework and attempt, in the long run, to develop an integral ethic along Godwinian lines.

  14. Exploit Kit traffic analysis

    OpenAIRE

    Καπίρης, Σταμάτης; Kapiris, Stamatis

    2017-01-01

    Exploit kits have become one of the most widespread and destructive threat that Internet users face on a daily basis. Since the first actor, which has been categorized as exploit kit, namely MPack, appeared in 2006, we have seen a new era on exploit kit variants compromising popular websites, infecting hosts and delivering destructive malware, following an exponentially evolvement to date. With the growing threat landscape, large enterprises to domestic networks, have starte...

  15. Exploitability Assessment with TEASER

    Science.gov (United States)

    2017-05-01

    for architectural neutral taint analysis on top of LLVM and QEMU. POC Proof of Concept : Demonstration of an exploit on a program . vii RCE Remote Code...bug with a Proof of Concept (POC), or input to a program demonstrating the ability to use a bug to exploit the application, to demonstrate the...often leads to either computationally difficult constraint solving problems or taint explosion. Given the computational difficulty of exploit

  16. Anthropology of sexual exploitation

    Directory of Open Access Journals (Sweden)

    Lalić Velibor

    2009-01-01

    Full Text Available In this paper, the authors observe sexual exploitation from an anthropological perspective. They analyze the rational, ethical, emotional and mythological dimensions of human sexuality. Consequently, after setting the phenomenon in a social and historical context, sexual exploitation is closely observed in the contemporary age. Based on thoughts of relevant thinkers, they make the conclusion that the elimination of sexual exploitation is not an utterly legal issue, but political and economical issues as well. Namely, legal norms are not sufficient to overcome sexual exploitation, but, political and economical relationships in contemporary societies, which will be based on sincere equal opportunities must be established.

  17. Exploitation and disadvantage

    NARCIS (Netherlands)

    Ferguson, B.

    2016-01-01

    According to some accounts of exploitation, most notably Ruth Sample's (2003) degradation-based account and Robert Goodin's (1987) vulnerability-based account, exploitation occurs when an advantaged party fails to constrain their advantage in light of another's disadvantage, regardless of the cause

  18. EXPLOITATION OF GRANITE BOULDER

    Directory of Open Access Journals (Sweden)

    Ivan Cotman

    1994-12-01

    Full Text Available The processes of forming, petrography, features, properties and exploitation of granite boulders are described. The directional drilling and black powder blasting is the succesful method in exploitation of granite boulders (boulder technology (the paper is published in Croatian.

  19. Exploitation of Labour and Exploitation of Commodities: a “New Interpretation”

    OpenAIRE

    Veneziani, Roberto; Yoshihara, Naoki

    2011-01-01

    In the standard Okishio-Morishima approach, the existence of profits is proved to be equivalent to the exploitation of labour. Yet, it can also be proved that the existence of profits is equivalent to the ‘exploitation’ of any good. Labour and commodity exploitation are just different numerical representations of the productiveness of the economy. This paper presents an alternative approach to exploitation theory which is related to the New Interpretation (Duménil 1980; Foley 1982). In this a...

  20. Fusion of optical flow based motion pattern analysis and silhouette classification for person tracking and detection

    NARCIS (Netherlands)

    Tangelder, J.W.H.; Lebert, E.; Burghouts, G.J.; Zon, K. van; Den Uyl, M.J.

    2014-01-01

    This paper presents a novel approach to detect persons in video by combining optical flow based motion analysis and silhouette based recognition. A new fast optical flow computation method is described, and its application in a motion based analysis framework unifying human tracking and detection is

  1. A Labeled Data Set For Flow-based Intrusion Detection

    NARCIS (Netherlands)

    Sperotto, Anna; Sadre, R.; van Vliet, Frank; Pras, Aiko; Nunzi, Giorgio; Scoglio, Caterina; Li, Xing

    2009-01-01

    Flow-based intrusion detection has recently become a promising security mechanism in high speed networks (1-10 Gbps). Despite the richness in contributions in this field, benchmarking of flow-based IDS is still an open issue. In this paper, we propose the first publicly available, labeled data set

  2. Poverty-Exploitation-Alienation.

    Science.gov (United States)

    Bronfenbrenner, Martin

    1980-01-01

    Illustrates how knowledge derived from the discipline of economics can be used to help shed light on social problems such as poverty, exploitation, and alienation, and can help decision makers form policy to minimize these and similar problems. (DB)

  3. Exploiting VM/XA

    International Nuclear Information System (INIS)

    Boeheim, C.

    1990-03-01

    The Stanford Linear Accelerator Center has recently completed a conversion to IBM's VM/XA SP Release 2 operating system. The primary physics application had been constrained by the previous 16 megabyte memory limit. Work is underway to enable this application to exploit the new features of VM/XA. This paper presents a brief tutorial on how to convert an application to exploit VM/XA and discusses some of the SLAC experiences in doing so. 13 figs

  4. Material flow-based economic assessment of landfill mining processes.

    Science.gov (United States)

    Kieckhäfer, Karsten; Breitenstein, Anna; Spengler, Thomas S

    2017-02-01

    This paper provides an economic assessment of alternative processes for landfill mining compared to landfill aftercare with the goal of assisting landfill operators with the decision to choose between the two alternatives. A material flow-based assessment approach is developed and applied to a landfill in Germany. In addition to landfill aftercare, six alternative landfill mining processes are considered. These range from simple approaches where most of the material is incinerated or landfilled again to sophisticated technology combinations that allow for recovering highly differentiated products such as metals, plastics, glass, recycling sand, and gravel. For the alternatives, the net present value of all relevant cash flows associated with plant installation and operation, supply, recycling, and disposal of material flows, recovery of land and landfill airspace, as well as landfill closure and aftercare is computed with an extensive sensitivity analyses. The economic performance of landfill mining processes is found to be significantly influenced by the prices of thermal treatment (waste incineration as well as refuse-derived fuels incineration plant) and recovered land or airspace. The results indicate that the simple process alternatives have the highest economic potential, which contradicts the aim of recovering most of the resources. Copyright © 2016 Elsevier Ltd. All rights reserved.

  5. Dissemination and Exploitation Strategy

    DEFF Research Database (Denmark)

    Badger, Merete; Monaco, Lucio; Fransson, Torsten

    of Technology in Sweden, Politecnico di Torino in Italy, and Eindhoven University of Technology in the Netherlands. The project is partially funded by the European Commission under the 7th Framework Programme (project no. RI-283746). This report describes the final dissemination and exploitation strategy...... for project Virtual Campus Hub. A preliminary dissemination and exploitation plan was setup early in the project as described in the deliverable D6.1 Dissemination strategy paper - preliminary version. The plan has been revised on a monthly basis during the project’s lifecycle in connection with the virtual...

  6. Information-flow-based Access Control for Virtualized Systems

    Directory of Open Access Journals (Sweden)

    Dmitriy Aleksandrovich Postoev

    2014-12-01

    Full Text Available The article is devoted to the method of information-flow-based access control, adopted for virtualized systems. General structure of access control system for virtual infrastructure is proposed.

  7. A multi-pumping flow-based procedure with improved sensitivity for the spectrophotometric determination of acid-dissociable cyanide in natural waters.

    Science.gov (United States)

    Frizzarin, Rejane M; Rocha, Fábio R P

    2013-01-03

    An analytical procedure with improved sensitivity was developed for cyanide determination in natural waters, exploiting the reaction with the complex of Cu(I) with 2,2'-biquinoline 4,4'-dicarboxylic acid (BCA). The flow system was based on the multi-pumping approach and long pathlength spectrophotometry with a flow cell based on a Teflon AF 2400(®) liquid core waveguide was exploited to increase sensitivity. A linear response was achieved from 5 to 200μg L(-1), with coefficient of variation of 1.5% (n=10). The detection limit and the sampling rate were 2μg L(-1) (99.7% confidence level), and 22h(-1), respectively. Per determination, 48ng of Cu(II), 5μg of ascorbic acid and 0.9μg of BCA were consumed. As high as 100mg L(-1) thiocyanate, nitrite or sulfite did not affect cyanide determination. Sulfide did not interfere at concentrations lower than 40 and 200μg L(-1) before or after sample pretreatment with hydrogen peroxide. The results for natural waters samples agreed with those obtained by a fluorimetric flow-based procedure at the 95% confidence level. The proposed procedure is then a reliable, fast and environmentally friendly alternative for cyanide determination in natural waters. Copyright © 2012 Elsevier B.V. All rights reserved.

  8. The Theory of Exploitation as the Unequal Exchange of Labour

    OpenAIRE

    Veneziani, Roberto; Yoshihara, Naoki

    2016-01-01

    This paper analyses the normative and positive foundations of the theory of exploitation as the unequal exchange of labour (UEL). The key intuitions behind all of the main approaches to UEL exploitation are explicitly analysed as a series of formal claims in a general economic environment. It is then argued that these intuitions can be captured by one fundamental axiom - called Labour Exploitation - which defines the basic domain of all UEL exploitation forms and identifies the formal and the...

  9. The theory of exploitation as the unequal exchange of labour

    OpenAIRE

    Veneziani, Roberto; Yoshihara, Naoki

    2017-01-01

    This paper analyses the normative and positive foundations of the theory of exploitation as the unequal exchange of labour (UEL). The key intuitions behind all of the main approaches to UEL exploitation are explicitly analysed as a series of formal claims in a general economic environment. It is then argued that these intuitions can be captured by one fundamental axiom - called Labour Exploitation - which defines the basic domain of all UEL exploitation forms and identifies the formal and the...

  10. Towards A New Approach For Arabic Root Extraction:Exploit Relations Between The Word Letters And Their Placement In The Word For Arabic Root Extraction

    Directory of Open Access Journals (Sweden)

    Fatma Abu Hawas

    2013-01-01

    Full Text Available In this paper we present a new root-extraction approach for Arabic words. The approach tries to assign for Arabic word a unique root without having a database of word roots, a list of words patterns or even a list of all the prefixes and the suffixes of the Arabic words. Unlike most of Arabic rule-based stemmers, it tries to predict the letters positions that may form the word root one by one using some rules based on the relations among the Arabic word letters and their placement in the word. This paper will focus on two parts of the approach. The first one deals with the rules that distinguish between the Arabic definite article “ال -AL” and the permanent component “ال -AL” that may found in any Arabic word. The second part of the approach adopts the segmentation of the word into three parts and classifies Arabic letters in to groups according to their positions in each segment. The proposed approach is a system composed of several modules that corporate together to extract the word root. The approach has been tested and evaluated using the Holy Quran words. The results of the evaluation show a promising root extraction algorithm.

  11. Integrating data infrastructure to facilitate holistic approach to the investigations of anthropogenic hazards evoked by exploration and exploitation of geo-resources

    Science.gov (United States)

    Orlecka-Sikora, Beata; Kwiatek, Grzegorz; Olszewska, Dorota; Lasocki, Stanisław; Gasparini, Paolo; Kozlovskaya, Elena; Nevalainen, Jouni; Schmittbuhl, Jean; Grasso, Jean Robert; Schaming, Marc; Biggare, Pascal; Saccarotti, Gilberto; Garcia, Alexander; Cassidy, Nigel; Toon, Sam; Mutke, Grzegorz; Sterzel, Mariusz; Szepieniec, Tomasz

    2016-04-01

    The EPOS integration plan assumes a significant contribution to the research on anthropogenic hazards (AH) associated with the exploration and exploitation of geo-resources. These problems will be dealt in Thematic Core Service "Anthropogenic Hazards" (TCS AH). TCS AH is based on the prototype built in the framework of the IS-EPOS platform project (https://tcs.ah-epos.eu/), financed from Polish structural funds (POIG.02.03.00-14-090/13-00), with will be further developed within EPOS IP project (H2020-INFRADEV-1-2015-1, INFRADEV-3-2015). TCS AH aims to have a measurable impact on innovative research and development as well as on society by providing comprehensive, wide-scale and high quality AH research infrastructure. One of the main deliverables are numerous comprehensive induced seismicity datasets called "episodes". The episode is a comprehensive data description of a geophysical process, induced or triggered by technological activity, which under certain circumstances can become hazardous for people, infrastructure and the environment. In addition to the six episodes already implemented during the mentioned IS-EPOS project, at least 20 new episodes related to conventional hydrocarbon extraction, reservoir treatment, underground mining and geothermal energy production are being integrated into the e-environment of the TCS AH. The heterogeneous multi-disciplinary data are transformed to unified structures developed within IS-EPOS project, to form integrated and validated datasets. Dedicated visualization tools for multidisciplinary data comprising episodes are also implemented. These tools are capable to aggregate and combine different data types and facilitating specific visualization possibilities (e.g. combining seismic and technological information). The implementation process, tailored for each episode, consists of four steps: (i) Data revision, determination of its accuracy and limitations; (ii) Data preparation and homogenization to follow the TCS AH

  12. Hacking the art of exploitation

    CERN Document Server

    Erickson, Jon

    2003-01-01

    A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking," Hacking: The Art of Exploitation is for both technical and non-technical people who are interested in computer security. It shows how hackers exploit programs and write exploits, instead of just how to run other people's exploits. Unlike many so-called hacking books, this book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.

  13. Competing Discourses about Youth Sexual Exploitation in Canadian News Media.

    Science.gov (United States)

    Saewyc, Elizabeth M; Miller, Bonnie B; Rivers, Robert; Matthews, Jennifer; Hilario, Carla; Hirakata, Pam

    2013-10-01

    Media holds the power to create, maintain, or break down stigmatizing attitudes, which affect policies, funding, and services. To understand how Canadian news media depicts the commercial sexual exploitation of children and youth, we examined 835 Canadian newspaper articles from 1989-2008 using a mixed methods critical discourse analysis approach, comparing representations to existing research about sexually exploited youth. Despite research evidence that equal rates of boys and girls experience exploitation, Canadian news media depicted exploited youth predominantly as heterosexual girls, and described them alternately as victims or workers in a trade, often both in the same story. News media mentioned exploiters far less often than victims, and portrayed them almost exclusively as male, most often called 'customers' or 'consumers,' and occasionally 'predators'; in contrast, research has documented the majority of sexually exploited boys report female exploiters. Few news stories over the past two decades portrayed the diversity of victims, perpetrators, and venues of exploitation reported in research. The focus on victims but not exploiters helps perpetuate stereotypes of sexual exploitation as business or a 'victimless crime,' maintains the status quo, and blurs responsibility for protecting youth under the UN Convention on the Rights of the Child. Health care providers and researchers can be advocates for accuracy in media coverage about sexual exploitation; news reporters and editors should focus on exploiters more than victims, draw on existing research evidence to avoid perpetuating stereotypes, and use accurate terms, such as commercial sexual exploitation, rather than terms related to business or trade.

  14. Nanostructured Basaltfiberconcrete Exploitational Characteristics

    Science.gov (United States)

    Saraykina, K. A.; Shamanov, V. A.

    2017-11-01

    The article demonstrates that the mass use of basalt fiber concrete (BFC) is constrained by insufficient study of their durability and serviceability in a variety of environments. This research is aimed at the study of the basalt fiber corrosion processes in the cement stone of BFC, the control of the new products structure formation in order to protect the reinforcing fiber from alkaline destruction and thereby improve the exploitational characteristics of the composite. The research result revealed that the modification of basaltfiber concrete by the dispersion of MWNTs contributes to the directional formation of new products in the cement matrix. The HAM additive in basaltfiberconcrete provides for the binding of portlandite to low-basic calcium hydroaluminosilicates, thus reducing the aggressive effect of the cement environment on the reinforcing fibers properties. The complex modification of BFC with nanostructured additives provides for an increase in its durability and exploitational properties (strength, frost resistance and water resistance) due to basalt fiber protection from alkali corrosion on account of the compacting of the contact zone “basalt fiber - cement stone” and designing of the new products structure and morphology of cement matrix over the fiber surface.

  15. The neural exploitation hypothesis and its implications for an embodied approach to language and cognition: Insights from the study of action verbs processing and motor disorders in Parkinson's disease.

    Science.gov (United States)

    Gallese, Vittorio; Cuccio, Valentina

    2018-03-01

    As it is widely known, Parkinson's disease is clinically characterized by motor disorders such as the loss of voluntary movement control, including resting tremor, postural instability, and bradykinesia (Bocanegra et al., 2015; Helmich, Hallett, Deuschl, Toni, & Bloem, 2012; Liu et al., 2006; Rosin, Topka, & Dichgans, 1997). In the last years, many empirical studies (e.g., Bocanegra et al., 2015; Spadacenta et al., 2012) have also shown that the processing of action verbs is selectively impaired in patients affected by this neurodegenerative disorder. In the light of these findings, it has been suggested that Parkinson disorder can be interpreted within an embodied cognition framework (e.g., Bocanegra et al., 2015). The central tenet of any embodied approach to language and cognition is that high order cognitive functions are grounded in the sensory-motor system. With regard to this point, Gallese (2008) proposed the neural exploitation hypothesis to account for, at the phylogenetic level, how key aspects of human language are underpinned by brain mechanisms originally evolved for sensory-motor integration. Glenberg and Gallese (2012) also applied the neural exploitation hypothesis to the ontogenetic level. On the basis of these premises, they developed a theory of language acquisition according to which, sensory-motor mechanisms provide a neurofunctional architecture for the acquisition of language, while retaining their original functions as well. The neural exploitation hypothesis is here applied to interpret the profile of patients affected by Parkinson's disease. It is suggested that action semantic impairments directly tap onto motor disorders. Finally, a discussion of what theory of language is needed to account for the interactions between language and movement disorders is presented. Copyright © 2018 Elsevier Ltd. All rights reserved.

  16. A network-flow based valve-switching aware binding algorithm for flow-based microfluidic biochips

    DEFF Research Database (Denmark)

    Tseng, Kai-Han; You, Sheng-Chi; Minhass, Wajid Hassan

    2013-01-01

    -flow based resource binding algorithm based on breadth-first search (BFS) and minimum cost maximum flow (MCMF) in architectural-level synthesis. The experimental results show that our methodology not only makes significant reduction of valve-switching activities but also diminishes the application completion......Designs of flow-based microfluidic biochips are receiving much attention recently because they replace conventional biological automation paradigm and are able to integrate different biochemical analysis functions on a chip. However, as the design complexity increases, a flow-based microfluidic...... biochip needs more chip-integrated micro-valves, i.e., the basic unit of fluid-handling functionality, to manipulate the fluid flow for biochemical applications. Moreover, frequent switching of micro-valves results in decreased reliability. To minimize the valve-switching activities, we develop a network...

  17. Flowbca : A flow-based cluster algorithm in Stata

    NARCIS (Netherlands)

    Meekes, J.; Hassink, W.H.J.

    In this article, we introduce the Stata implementation of a flow-based cluster algorithm written in Mata. The main purpose of the flowbca command is to identify clusters based on relational data of flows. We illustrate the command by providing multiple applications, from the research fields of

  18. Towards Separation of Concerns in Flow-Based Programming

    DEFF Research Database (Denmark)

    Zarrin, Bahram; Baumeister, Hubert

    2015-01-01

    Flow-Based Programming (FBP) is a programming paradigm that models software systems as a directed graph of predefined processes which run asynchronously and exchange data through input and output ports. FBP decomposes software systems into a network of processes. However there are concerns...

  19. Exploitation by Economic Necessity

    Directory of Open Access Journals (Sweden)

    Kristian F. Braekkan

    2015-10-01

    Full Text Available This study develops and tests a model that proposes economic necessity moderates the relationship between psychological contract violations (PCVs and organizational commitment and trust in the employing organization among non-unionized manufacturing workers (N = 226. Moderated regression analyses revealed that there was a significant interaction between PCV and economic necessity in predicting both outcomes. Specifically, the findings indicated that individuals experiencing high PCV and high economic necessity did not decrease their organizational commitment like their counterparts who endorsed lower economic necessity. They did, however, experience significantly decreased trust in their employer. The findings suggest that individuals who are forced to sell their labor power and obtain what they need through the market are more likely to continue to be exploited by their employer, as they have no other options than to continue the relationship. The importance of the findings is discussed, and recommendations for future research are provided.

  20. Exploitative Learning by Exporting

    DEFF Research Database (Denmark)

    Golovko, Elena; Lopes Bento, Cindy; Sofka, Wolfgang

    Decisions on entering foreign markets are among the most challenging but also potentially rewarding strategy choices managers can make. In this study, we examine the effect of export entry on the firm investment decisions in two activities associated with learning about new technologies...... and learning about new markets ? R&D investments and marketing investments, in search of novel insights into the content and process underlying learning by exporting. We draw from organizational learning theory for predicting changes in both R&D and marketing investment patterns that accompany firm entry......, it is predominantly the marketing-related investment decisions associated with starting to export that lead to increases in firm productivity. We conclude that learning-by-exporting might be more properly characterized as ?learning about and exploiting new markets? rather than ?learning about new technologies...

  1. Exploiting Quantum Resonance to Solve Combinatorial Problems

    Science.gov (United States)

    Zak, Michail; Fijany, Amir

    2006-01-01

    Quantum resonance would be exploited in a proposed quantum-computing approach to the solution of combinatorial optimization problems. In quantum computing in general, one takes advantage of the fact that an algorithm cannot be decoupled from the physical effects available to implement it. Prior approaches to quantum computing have involved exploitation of only a subset of known quantum physical effects, notably including parallelism and entanglement, but not including resonance. In the proposed approach, one would utilize the combinatorial properties of tensor-product decomposability of unitary evolution of many-particle quantum systems for physically simulating solutions to NP-complete problems (a class of problems that are intractable with respect to classical methods of computation). In this approach, reinforcement and selection of a desired solution would be executed by means of quantum resonance. Classes of NP-complete problems that are important in practice and could be solved by the proposed approach include planning, scheduling, search, and optimal design.

  2. Towards Domain-specific Flow-based Languages

    DEFF Research Database (Denmark)

    Zarrin, Bahram; Baumeister, Hubert; Sarjoughian, Hessam S.

    2018-01-01

    describe their problems and solutions, instead of using general purpose programming languages. The goal of these languages is to improve the productivity and efficiency of the development and simulation of concurrent scientific models and systems. Moreover, they help to expose parallelism and to specify...... the concurrency within a component or across different independent components. In this paper, we introduce the concept of domain-specific flowbased languages which allows domain experts to use flow-based languages adapted to a particular problem domain. Flow-based programming is used to support concurrency, while......Due to the significant growth of the demand for data-intensive computing, in addition to the emergence of new parallel and distributed computing technologies, scientists and domain experts are leveraging languages specialized for their problem domain, i.e., domain-specific languages, to help them...

  3. Profits and Exploitation: A Reappraisal

    OpenAIRE

    Yoshihara, Naoki; Veneziani, Roberto

    2011-01-01

    This paper provides a mathematical analysis of the Marxian theory of the exploitation of labour in general equilibrium models. The two main definitions of Marxian exploitation in the literature, proposed by Morishima (1974) and Roemer (1982), respectively, are analysed in the context of general convex economies. It is shown that, contrary to the received view, in general these definitions do not preserve the so-called Fundamental Marxian Theorem (FMT), which states that the exploitation of la...

  4. Consensual exploitation : the moral wrong in exploitation and legal restrictions on consensual exploitative transactions

    OpenAIRE

    van der Neut, Wendy

    2014-01-01

    This thesis is about so-­‐called consensual exploitative transactions: transactions to which all parties agree voluntarily, and which are beneficial for all parties, but which are still widely considered exploitative, and for that reason legally restricted in many countries. The thesis asks two main questions: 1. What is wrong with consensual exploitation? 2.What implications does the answer to this question have for the legal restriction of consensual transactions ...

  5. Flow-based market coupling. Stepping stone towards nodal pricing?

    International Nuclear Information System (INIS)

    Van der Welle, A.J.

    2012-07-01

    For achieving one internal energy market for electricity by 2014, market coupling is deployed to integrate national markets into regional markets and ultimately one European electricity market. The extent to which markets can be coupled depends on the available transmission capacities between countries. Since interconnections are congested from time to time, congestion management methods are deployed to divide the scarce available transmission capacities over market participants. For further optimization of the use of available transmission capacities while maintaining current security of supply levels, flow-based market coupling (FBMC) will be implemented in the CWE region by 2013. Although this is an important step forward, important hurdles for efficient congestion management remain. Hence, flow based market coupling is compared to nodal pricing, which is often considered as the most optimal solution from theoretical perspective. In the context of decarbonised power systems it is concluded that advantages of nodal pricing are likely to exceed its disadvantages, warranting further development of FBMC in the direction of nodal pricing.

  6. Sustainable exploitation and management of aquatic resources

    DEFF Research Database (Denmark)

    Neuenfeldt, Stefan; Köster, Fritz

    2014-01-01

    DTU Aqua conducts research, provides advice,educates at university level and contributes toinnovation in sustainable exploitation andmanagement of aquatic resources. The vision of DTUAqua is to enable ecologically and economicallysustainable exploitation of aquatic resourcesapplying an integrated...... management. Marineecosystems aims at understanding the mechanisms that govern the interaction between individuals,species and populations in an ecosystem enabling us to determine the stability and flexibility of theecosystem.Marine living resources looks at the sustainable utilization of fish and shellfish...... stocks.Ecosystem effects expands from the ecosystem approach to fisheries management to an integratedapproach where other human activities are taken into consideration. Fisheries management developsmethods, models and tools for predicting and evaluating the effects of management measures andregulations...

  7. A two-stage flow-based intrusion detection model for next-generation networks.

    Science.gov (United States)

    Umer, Muhammad Fahad; Sher, Muhammad; Bi, Yaxin

    2018-01-01

    The next-generation network provides state-of-the-art access-independent services over converged mobile and fixed networks. Security in the converged network environment is a major challenge. Traditional packet and protocol-based intrusion detection techniques cannot be used in next-generation networks due to slow throughput, low accuracy and their inability to inspect encrypted payload. An alternative solution for protection of next-generation networks is to use network flow records for detection of malicious activity in the network traffic. The network flow records are independent of access networks and user applications. In this paper, we propose a two-stage flow-based intrusion detection system for next-generation networks. The first stage uses an enhanced unsupervised one-class support vector machine which separates malicious flows from normal network traffic. The second stage uses a self-organizing map which automatically groups malicious flows into different alert clusters. We validated the proposed approach on two flow-based datasets and obtained promising results.

  8. Simulated population responses of common carp to commercial exploitation

    Energy Technology Data Exchange (ETDEWEB)

    Weber, Michael J.; Hennen, Matthew J.; Brown, Michael L.

    2011-12-01

    Common carp Cyprinus carpio is a widespread invasive species that can become highly abundant and impose deleterious ecosystem effects. Thus, aquatic resource managers are interested in controlling common carp populations. Control of invasive common carp populations is difficult, due in part to the inherent uncertainty of how populations respond to exploitation. To understand how common carp populations respond to exploitation, we evaluated common carp population dynamics (recruitment, growth, and mortality) in three natural lakes in eastern South Dakota. Common carp exhibited similar population dynamics across these three systems that were characterized by consistent recruitment (ages 3 to 15 years present), fast growth (K = 0.37 to 0.59), and low mortality (A = 1 to 7%). We then modeled the effects of commercial exploitation on size structure, abundance, and egg production to determine its utility as a management tool to control populations. All three populations responded similarly to exploitation simulations with a 575-mm length restriction, representing commercial gear selectivity. Simulated common carp size structure modestly declined (9 to 37%) in all simulations. Abundance of common carp declined dramatically (28 to 56%) at low levels of exploitation (0 to 20%) but exploitation >40% had little additive effect and populations were only reduced by 49 to 79% despite high exploitation (>90%). Maximum lifetime egg production was reduced from 77 to 89% at a moderate level of exploitation (40%), indicating the potential for recruitment overfishing. Exploitation further reduced common carp size structure, abundance, and egg production when simulations were not size selective. Our results provide insights to how common carp populations may respond to exploitation. Although commercial exploitation may be able to partially control populations, an integrated removal approach that removes all sizes of common carp has a greater chance of controlling population abundance

  9. Security option file - Exploitation (DOS-Expl)

    International Nuclear Information System (INIS)

    2016-01-01

    This document aims at presenting functions performed by Cigeo during its exploitation phase, its main technical and security options which are envisaged with respect to different types of internal or external risks, and a first assessment of its impact on mankind and on the environment during its exploitation in normal operation as well as in incidental or accidental situations. A first volume addresses security principles, approach and management in relationship with the legal and regulatory framework. The second volume presents input data related to waste parcels and used for the installation sizing and operation, the main site characteristics, the main technical options regarding structures and equipment, and the main options regarding exploitation (parcel management, organisational and human aspects, and effluent management). The third volume describes how parcel are processed from their arrival to their setting in storage compartment, an inventory of internal and external risks, and a first assessment of consequences of scenarios on mankind and on the environment. The fourth volume presents options and operations which are envisaged regarding Cigeo closure, and inventory of associated risks

  10. Flow-based model of computer hackers' motivation.

    Science.gov (United States)

    Voiskounsky, Alexander E; Smyslova, Olga V

    2003-04-01

    Hackers' psychology, widely discussed in the media, is almost entirely unexplored by psychologists. In this study, hackers' motivation is investigated, using the flow paradigm. Flow is likely to motivate hackers, according to views expressed by researchers and by hackers themselves. Taken as granted that hackers experience flow, it was hypothesized that flow increases with the increase of hackers' competence in IT use. Self-selected subjects were recruited on specialized web sources; 457 hackers filled out a web questionnaire. Competence in IT use, specific flow experience, and demographic data were questioned. An on-line research was administered within the Russian-speaking community (though one third of Ss are non-residents of Russian Federation); since hacking seems to be international, the belief is expressed that the results are universal. The hypothesis is not confirmed: flow motivation characterizes the least and the most competent hackers, and the members of an intermediate group, that is, averagely competent Ss report the "flow crisis"-no (or less) flow experience. Two differing strategies of task choice were self-reported by Ss: a step-by-step increase of the difficulty of choices leads to a match of challenges and skills (and to preserving the flow experience); putting choices irrespective of the likelihood of solution leads to a "flow crisis." The findings give productive hints on processes of hackers' motivational development. The flow-based model of computer hackers' motivation was developed. It combines both empirically confirmed and theoretically possible ways of hackers' "professional" growth.

  11. Teotihuacan, tepeapulco, and obsidian exploitation.

    Science.gov (United States)

    Charlton, T H

    1978-06-16

    Current cultural ecological models of the development of civilization in central Mexico emphasize the role of subsistence production techniques and organization. The recent use of established and productive archeological surface survey techniques along natural corridors of communication between favorable niches for cultural development within the Central Mexican symbiotic region resulted in the location of sites that indicate an early development of a decentralized resource exploitation, manufacturing, and exchange network. The association of the development of this system with Teotihuacán indicates the importance such nonsubsistence production and exchange had in the evolution of this first central Mexican civilization. The later expansion of Teotihuacán into more distant areas of Mesoamerica was based on this resource exploitation model. Later civilizations centered at Tula and Tenochtitlán also used such a model in their expansion.

  12. Network exploitation using WAMI tracks

    Science.gov (United States)

    Rimey, Ray; Record, Jim; Keefe, Dan; Kennedy, Levi; Cramer, Chris

    2011-06-01

    Creating and exploiting network models from wide area motion imagery (WAMI) is an important task for intelligence analysis. Tracks of entities observed moving in the WAMI sensor data are extracted, then large numbers of tracks are studied over long time intervals to determine specific locations that are visited (e.g., buildings in an urban environment), what locations are related to other locations, and the function of each location. This paper describes several parts of the network detection/exploitation problem, and summarizes a solution technique for each: (a) Detecting nodes; (b) Detecting links between known nodes; (c) Node attributes to characterize a node; (d) Link attributes to characterize each link; (e) Link structure inferred from node attributes and vice versa; and (f) Decomposing a detected network into smaller networks. Experimental results are presented for each solution technique, and those are used to discuss issues for each problem part and its solution technique.

  13. Geometric saliency to characterize radar exploitation performance

    Science.gov (United States)

    Nolan, Adam; Keserich, Brad; Lingg, Andrew; Goley, Steve

    2014-06-01

    Based on the fundamental scattering mechanisms of facetized computer-aided design (CAD) models, we are able to define expected contributions (EC) to the radar signature. The net result of this analysis is the prediction of the salient aspects and contributing vehicle morphology based on the aspect. Although this approach does not provide the fidelity of an asymptotic electromagnetic (EM) simulation, it does provide very fast estimates of the unique scattering that can be consumed by a signature exploitation algorithm. The speed of this approach is particularly relevant when considering the high dimensionality of target configuration variability due to articulating parts which are computationally burdensome to predict. The key scattering phenomena considered in this work are the specular response from a single bounce interaction with surfaces and dihedral response formed between the ground plane and vehicle. Results of this analysis are demonstrated for a set of civilian target models.

  14. The ESA Geohazard Exploitation Platform

    Science.gov (United States)

    Bally, Philippe; Laur, Henri; Mathieu, Pierre-Philippe; Pinto, Salvatore

    2015-04-01

    Earthquakes represent one of the world's most significant hazards in terms both of loss of life and damages. In the first decade of the 21st century, earthquakes accounted for 60 percent of fatalities from natural disasters, according to the United Nations International Strategy for Disaster Reduction (UNISDR). To support mitigation activities designed to assess and reduce risks and improve response in emergency situations, satellite EO can be used to provide a broad range of geo-information services. This includes for instance crustal block boundary mapping to better characterize active faults, strain rate mapping to assess how rapidly faults are deforming, soil vulnerability mapping to help estimate how the soil is behaving in reaction to seismic phenomena, geo-information to assess the extent and intensity of the earthquake impact on man-made structures and formulate assumptions on the evolution of the seismic sequence, i.e. where local aftershocks or future main shocks (on nearby faults) are most likely to occur. In May 2012, the European Space Agency and the GEO Secretariat convened the International Forum on Satellite EO for Geohazards now known as the Santorini Conference. The event was the continuation of a series of international workshops such as those organized by the Geohazards Theme of the Integrated Global Observing Strategy Partnership. In Santorini the seismic community has set out a vision of the EO contribution to an operational global seismic risk program, which lead to the Geohazard Supersites and Natural Laboratories (GSNL) initiative. The initial contribution of ESA to suuport the GSNL was the first Supersites Exploitation Platform (SSEP) system in the framework of Grid Processing On Demand (GPOD), now followed by the Geohazard Exploitation Platform (GEP). In this presentation, we will describe the contribution of the GEP for exploiting satellite EO for geohazard risk assessment. It is supporting the GEO Supersites and has been further

  15. Final Report, “Exploiting Global View for Resilience”

    Energy Technology Data Exchange (ETDEWEB)

    Chien, Andrew [Univ. of Chicago, IL (United States)

    2017-03-29

    Final technical report for the "Exploiting Global View for Resilience" project. The GVR project aims to create a new approach to portable, resilient applications. The GVR approach builds on a global view data model,, adding versioning (multi-version), user control of timing and rate (multi-stream), and flexible cross layer error signalling and recovery. With a versioned array as a portable abstraction, GVR enables application programmers to exploit deep scientific and application code insights to manage resilience (and its overhead) in a flexible, portable fashion.

  16. Prospects of geothermal resource exploitation

    International Nuclear Information System (INIS)

    Bourrelier, P.H.; Cornet, F.; Fouillac, C.

    1994-01-01

    The use of geothermal energy to generate electricity has only occurred during the past 50 years by drilling wells in aquifers close to magmas and producing either dry steam or hot water. The world's production of electricity from geothermal energy is over 6000 MWe and is still growing. The direct use of geothermal energy for major urban communities has been developed recently by exploitation of aquifers in sedimentary basins under large towns. Scaling up the extraction of heat implies the exploitation of larger and better located fields requiring an appropriate method of extraction; the objective of present attempts in USA, Japan and Europe is to create heat exchangers by the circulation of water between several deep wells. Two field categories are considered: the extension of classical geothermal fields beyond the aquifer areas, and areas favoured by both a high geothermal gradient, fractures inducing a natural permeability at large scale, and good commercial prospects (such as in the Rhenan Graben). Hot dry rocks concept has gained a large interest. 1 fig., 5 tabs., 11 refs

  17. A new measure of interpersonal exploitativeness

    Directory of Open Access Journals (Sweden)

    Amy B. Brunell

    2013-05-01

    Full Text Available Measures of exploitativeness evidence problems with validity and reliability. The present set of studies assessed a new measure (the Interpersonal Exploitativeness Scale that defines exploitativeness in terms of reciprocity. In Studies 1 and 2, 33 items were administered to participants. Exploratory and Confirmatory Factor Analysis demonstrated that a single factor consisting of six items adequately assess interpersonal exploitativeness. Study 3 results revealed that the Interpersonal Exploitativeness Scale was positively associated with normal narcissism, pathological narcissism, psychological entitlement, and negative reciprocity and negatively correlated with positive reciprocity. In Study 4, participants competed in a commons dilemma. Those who scored higher on the Interpersonal Exploitativeness Scale were more likely to harvest a greater share of resources over time, even while controlling for other relevant variables, such as entitlement. Together, these studies show the Interpersonal Exploitativeness Scale to be a valid and reliable measure of interpersonal exploitativeness. The authors discuss the implications of these studies.

  18. Exploitation in International Paid Surrogacy Arrangements

    OpenAIRE

    Wilkinson, Stephen

    2015-01-01

    Abstract Many critics have suggested that international paid surrogacy is exploitative. Taking such concerns as its starting point, this article asks: (1) how defensible is the claim that international paid surrogacy is exploitative and what could be done to make it less exploitative? (2) In the light of the answer to (1), how strong is the case for prohibiting it? Exploitation could in principle be dealt with by improving surrogates' pay and conditions. However, doing so may exacerbate probl...

  19. The exploitation argument against commercial surrogacy.

    Science.gov (United States)

    Wilkinson, Stephen

    2003-04-01

    This paper discusses the exploitation argument against commercial surrogacy: the claim that commercial surrogacy is morally objectionable because it is exploitative. The following questions are addressed. First, what exactly does the exploitation argument amount to? Second, is commercial surrogacy in fact exploitative? Third, if it were exploitative, would this provide a sufficient reason to prohibit (or otherwise legislatively discourage) it? The focus throughout is on the exploitation of paid surrogates, although it is noted that other parties (e.g. 'commissioning parents') may also be the victims of exploitation. It is argued that there are good reasons for believing that commercial surrogacy is often exploitative. However, even if we accept this, the exploitation argument for prohibiting (or otherwise legislatively discouraging) commercial surrogacy remains quite weak. One reason for this is that prohibition may well 'backfire' and lead to potential surrogates having to do other things that are more exploitative and/or more harmful than paid surrogacy. It is concluded therefore that those who oppose exploitation should (rather than attempting to stop particular practices like commercial surrogacy) concentrate on: (a) improving the conditions under which paid surrogates 'work'; and (b) changing the background conditions (in particular, the unequal distribution of power and wealth) which generate exploitative relationships.

  20. The Exploitation of Evolving Resources

    CERN Document Server

    McGlade, Jacqueline; Law, Richard

    1993-01-01

    The impact of man on the biosphere is profound. Quite apart from our capacity to destroy natural ecosystems and to drive species to extinction, we mould the evolution of the survivors by the selection pressures we apply to them. This has implications for the continued health of our natural biological resources and for the way in which we seek to optimise yield from those resources. Of these biological resources, fish stocks are particularly important to mankind as a source of protein. On a global basis, fish stocks provide the major source of protein for human consumption from natural ecosystems, amounting to some seventy million tonnes in 1970. Although fisheries management has been extensively developed over the last century, it has not hitherto considered the evolutionary consequences of fishing activity. While this omission may not have been serious in the past, the ever increasing intensity of exploitation and the deteriorating health of fish stocks has generated an urgent need for a better understanding...

  1. Swedish mines. Underground exploitation methods

    International Nuclear Information System (INIS)

    Paucard, A.

    1960-01-01

    Between 1949 and 1957, 10 engineers of the Mining research and exploitation department of the CEA visited 17 Swedish mines during 5 field trips. This paper presents a compilation of the information gathered during these field trips concerning the different underground mining techniques used in Swedish iron mines: mining with backfilling (Central Sweden and Boliden mines); mining without backfilling (mines of the polar circle area). The following techniques are described successively: pillar drawing and backfilled slices (Ammeberg, Falun, Garpenberg, Boliden group), sub-level pillar drawing (Grangesberg, Bloettberget, Haeksberg), empty room and sub-level pillar drawing (Bodas, Haksberg, Stripa, Bastkarn), storage chamber pillar drawing (Bodas, Haeksberg, Bastkarn), and pillar drawing by block caving (ldkerberget). Reprint of a paper published in Revue de l'Industrie Minerale, vol. 41, no. 12, 1959 [fr

  2. Exploiting social evolution in biofilms

    DEFF Research Database (Denmark)

    Boyle, Kerry E; Heilmann, Silja; van Ditmarsch, Dave

    2013-01-01

    Bacteria are highly social organisms that communicate via signaling molecules, move collectively over surfaces and make biofilm communities. Nonetheless, our main line of defense against pathogenic bacteria consists of antibiotics-drugs that target individual-level traits of bacterial cells...... and thus, regrettably, select for resistance against their own action. A possible solution lies in targeting the mechanisms by which bacteria interact with each other within biofilms. The emerging field of microbial social evolution combines molecular microbiology with evolutionary theory to dissect...... the molecular mechanisms and the evolutionary pressures underpinning bacterial sociality. This exciting new research can ultimately lead to new therapies against biofilm infections that exploit evolutionary cheating or the trade-off between biofilm formation and dispersal....

  3. Energy for lunar resource exploitation

    Science.gov (United States)

    Glaser, Peter E.

    1992-02-01

    Humanity stands at the threshold of exploiting the known lunar resources that have opened up with the access to space. America's role in the future exploitation of space, and specifically of lunar resources, may well determine the level of achievement in technology development and global economic competition. Space activities during the coming decades will significantly influence the events on Earth. The 'shifting of history's tectonic plates' is a process that will be hastened by the increasingly insistent demands for higher living standards of the exponentially growing global population. Key to the achievement of a peaceful world in the 21st century, will be the development of a mix of energy resources at a societally acceptable and affordable cost within a realistic planning horizon. This must be the theme for the globally applicable energy sources that are compatible with the Earth's ecology. It is in this context that lunar resources development should be a primary goal for science missions to the Moon, and for establishing an expanding human presence. The economic viability and commercial business potential of mining, extracting, manufacturing, and transporting lunar resource based materials to Earth, Earth orbits, and to undertake macroengineering projects on the Moon remains to be demonstrated. These extensive activities will be supportive of the realization of the potential of space energy sources for use on Earth. These may include generating electricity for use on Earth based on beaming power from Earth orbits and from the Moon to the Earth, and for the production of helium 3 as a fuel for advanced fusion reactors.

  4. Features for Exploiting Black-Box Optimization Problem Structure

    DEFF Research Database (Denmark)

    Tierney, Kevin; Malitsky, Yuri; Abell, Tinus

    2013-01-01

    landscape of BBO problems and show how an algorithm portfolio approach can exploit these general, problem indepen- dent features and outperform the utilization of any single minimization search strategy. We test our methodology on data from the GECCO Workshop on BBO Benchmarking 2012, which contains 21...

  5. Assisting children born of sexual exploitation and abuse

    Directory of Open Access Journals (Sweden)

    Lauren Rumble

    2007-01-01

    Full Text Available The UN Secretary-General has issued a strategy tosupport victims of sexual exploitation and abuse by UNstaff. It includes a controversial proposal to introduceDNA sampling for all UN staff. Unless this suggestionis adopted, an important opportunity to implementa truly survivor-centred approach may be lost.

  6. Exploiting Symmetry on Parallel Architectures.

    Science.gov (United States)

    Stiller, Lewis Benjamin

    1995-01-01

    This thesis describes techniques for the design of parallel programs that solve well-structured problems with inherent symmetry. Part I demonstrates the reduction of such problems to generalized matrix multiplication by a group-equivariant matrix. Fast techniques for this multiplication are described, including factorization, orbit decomposition, and Fourier transforms over finite groups. Our algorithms entail interaction between two symmetry groups: one arising at the software level from the problem's symmetry and the other arising at the hardware level from the processors' communication network. Part II illustrates the applicability of our symmetry -exploitation techniques by presenting a series of case studies of the design and implementation of parallel programs. First, a parallel program that solves chess endgames by factorization of an associated dihedral group-equivariant matrix is described. This code runs faster than previous serial programs, and discovered it a number of results. Second, parallel algorithms for Fourier transforms for finite groups are developed, and preliminary parallel implementations for group transforms of dihedral and of symmetric groups are described. Applications in learning, vision, pattern recognition, and statistics are proposed. Third, parallel implementations solving several computational science problems are described, including the direct n-body problem, convolutions arising from molecular biology, and some communication primitives such as broadcast and reduce. Some of our implementations ran orders of magnitude faster than previous techniques, and were used in the investigation of various physical phenomena.

  7. Two questions about surrogacy and exploitation.

    Science.gov (United States)

    Wertheimer, Alan

    1992-01-01

    In this article I will consider two related questions about surrogacy and exploitation: (1) Is surrogacy exploitative? (2) If surrogacy is exploitative, what is the moral force of this exploitation? Briefly stated, I shall argue that whether surrogacy is exploitative depends on whether exploitation must be harmful to the exploited party or whether (as I think) there can be mutually advantageous exploitation. It also depends on some facts about surrogacy about which we have little reliable evidence and on our philosophical view on what counts as a harm to the surrogate. Our answer to the second question will turn in part on the account of exploitation we invoke in answering the first question and in part on the way in which we resolve some other questions about the justification of state interference. I shall suggest, however, that if surrogacy is a form of voluntary and mutually advantageous exploitation, then there is a strong presumption that surrogacy contracts should be permitted and even enforceable, although that presumption may be overridden on other grounds.

  8. Exploiting Thread Parallelism for Ocean Modeling on Cray XC Supercomputers

    Energy Technology Data Exchange (ETDEWEB)

    Sarje, Abhinav [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Jacobsen, Douglas W. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Williams, Samuel W. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Ringler, Todd [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Oliker, Leonid [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2016-05-01

    The incorporation of increasing core counts in modern processors used to build state-of-the-art supercomputers is driving application development towards exploitation of thread parallelism, in addition to distributed memory parallelism, with the goal of delivering efficient high-performance codes. In this work we describe the exploitation of threading and our experiences with it with respect to a real-world ocean modeling application code, MPAS-Ocean. We present detailed performance analysis and comparisons of various approaches and configurations for threading on the Cray XC series supercomputers.

  9. Cultural Work as a Site of Struggle: Freelancers and Exploitation

    Directory of Open Access Journals (Sweden)

    Nicole S. Cohen

    2012-05-01

    Full Text Available This paper argues that Marxist political economy is a useful framework for understanding contemporary conditions of cultural work. Drawing on Karl Marx’s foundational concepts, labour process theory, and a case study of freelance writers, I argue that the debate over autonomy and control in cultural work ignores exploitation in labour-capital relationships, which is a crucial process shaping cultural work. To demonstrate the benefits of this approach, I discuss two methods media firms use to extract surplus value from freelance writers: exploitation of unpaid labour time and exploitation of intellectual property through aggressive copyright regimes. I argue that a Marxist perspective can uncover the dynamics that are transforming cultural industries and workers’ experiences. From this perspective, cultural work is understood as a site of struggle.

  10. Trends in Flow-based Biosensing Systems for Pesticide Assessment

    Directory of Open Access Journals (Sweden)

    Jean-Louis Marty

    2006-10-01

    Full Text Available This review gives a survey on the state of the art of pesticide detection usingflow-based biosensing systems for sample screening. Although immunosensor systems havebeen proposed as powerful pesticide monitoring tools, this review is mainly focused onenzyme-based biosensors, as they are the most commonly employed when using a flowsystem. Among the different detection methods able to be integrated into flow-injectionanalysis (FIA systems, the electrochemical ones will be treated in more detail, due to theirhigh sensitivity, simple sample pretreatment, easy operational procedures and real-timedetection. During the last decade, new trends have been emerging in order to increase theenzyme stability, the sensitivity and selectivity of the measurements, and to lower thedetection limits. These approaches are based on (i the design of novel matrices for enzymeimmobilisation, (ii new manifold configurations of the FIA system, sometimes includingminiaturisation or lab-on-chip protocols thanks to micromachining technology, (iii the useof cholinesterase enzymes either from various commercial sources or genetically modifiedwith the aim of being more sensitive, (iv the incorporation of other highly specificenzymes, such as organophosphate hydrolase (OPH or parathion hydrolase (PH and (v thecombination of different electrochemical methods of detection. This article discusses thesenovel strategies and their advantages and limitations.

  11. Radiation environmental impact assessment of copper exploitation

    International Nuclear Information System (INIS)

    Fan Guang; Wen Zhijian

    2010-01-01

    The radiation environmental impact of mineral exploitation on the surrounding environment has become a public concern. This paper presents the radiation environmental impact assessment of copper exploitation. Based on the project description and detailed investigations of surrounding environment, systematic radiation environmental impacts have been identified. The environmental impacts are assessed during both construction and operation phase. The environmental protection measures have also been proposed. The related conclusion and measures can play an active role in copper exploitation and environmental protection. (authors)

  12. Exploitation and exploration dynamics in recessionary times

    OpenAIRE

    Walrave, B.

    2012-01-01

    Firm performance largely depends on the ability to adapt to, and exploit, changes in the business environment. That is, firms should maintain ecological fitness by reconfiguring their resource base to cope with emerging threats and explore new opportunities, while at the same time exploiting existing resources. As such, firms possessing the ability to simultaneously perform exploitative and explorative initiatives are more resilient. In this respect, the performance implications of balancing ...

  13. Towards agile large-scale predictive modelling in drug discovery with flow-based programming design principles.

    Science.gov (United States)

    Lampa, Samuel; Alvarsson, Jonathan; Spjuth, Ola

    2016-01-01

    Predictive modelling in drug discovery is challenging to automate as it often contains multiple analysis steps and might involve cross-validation and parameter tuning that create complex dependencies between tasks. With large-scale data or when using computationally demanding modelling methods, e-infrastructures such as high-performance or cloud computing are required, adding to the existing challenges of fault-tolerant automation. Workflow management systems can aid in many of these challenges, but the currently available systems are lacking in the functionality needed to enable agile and flexible predictive modelling. We here present an approach inspired by elements of the flow-based programming paradigm, implemented as an extension of the Luigi system which we name SciLuigi. We also discuss the experiences from using the approach when modelling a large set of biochemical interactions using a shared computer cluster.Graphical abstract.

  14. Target Localization with a Single Antenna via Directional Multipath Exploitation

    Directory of Open Access Journals (Sweden)

    Ali H. Muqaibel

    2015-01-01

    Full Text Available Target localization in urban sensing can benefit from angle dependency of the pulse shape at a radar receiver antenna. We propose a localization approach that utilizes the embedded directivity in ultra-wideband (UWB antennas to estimate target positions. A single radar unit sensing operation of indoor targets surrounded by interior walls is considered, where interior wall multipaths are exploited to provide target cross-range. This exploitation assumes resolvability of the multipath components, which is made possible by the virtue of using UWB radar signals. The proposed approach is most attractive when only few multipaths are detectable due to propagation obstructions or owing to low signal-to-noise ratios. Both simulated and experimental data are used to demonstrate the effectiveness of the proposed approach.

  15. Flow-based determination of methionine in pharmaceutical formulations exploiting TGA-capped CdTe quantum dots for enhancing the luminol-KIO{sub 4} chemiluminescence

    Energy Technology Data Exchange (ETDEWEB)

    Zhou, Min, E-mail: mzhou8367@sina.com [Key Laboratory of Eco-Environment-Related Polymer Materials, Ministry of Education, Key Laboratory of Polymer Materials of Gansu Province, Key Laboratory of Bioelectrochemistry & Environmental Analysis of Gansu Province, College of Chemistry and Chemical Engineering, Northwest Normal University, Lanzhou 730070 (China); Wang, Ailian [Key Laboratory of Eco-Environment-Related Polymer Materials, Ministry of Education, Key Laboratory of Polymer Materials of Gansu Province, Key Laboratory of Bioelectrochemistry & Environmental Analysis of Gansu Province, College of Chemistry and Chemical Engineering, Northwest Normal University, Lanzhou 730070 (China); Jiuquan Enviromental Protection Bureau, Jiuquan 735000 (China); Li, Cong; Luo, Xiaowei; Ma, Yongjun [Key Laboratory of Eco-Environment-Related Polymer Materials, Ministry of Education, Key Laboratory of Polymer Materials of Gansu Province, Key Laboratory of Bioelectrochemistry & Environmental Analysis of Gansu Province, College of Chemistry and Chemical Engineering, Northwest Normal University, Lanzhou 730070 (China)

    2017-03-15

    A novel flow-injection chemiluminescence method (FI-CL) was established for the determination of methionine in this paper, based on its strong enhancement on CL intensity of the luminol-KIO{sub 4} system catalyzed by thioglycolic acid-capped CdTe quantum dots in alkaline media. Under the optimized conditions, the relative CL intensity was in proportion to methionine concentration in the range from 1.0×10{sup −8} to 1.0×10{sup −5} g mL{sup −1} with a detection limit of 6.6×10{sup −9} g mL{sup −1} (3σ). The relative standard deviation (RSD) of the CL intensity for 1.0×10{sup −6} g mL{sup −1} standard methionine solution was 0.97% (n=11). The proposed method was successfully applied to determine methionine in commercial pharmaceutical formulations with recoveries between 98.0% and 101.9%. The possible CL mechanism was discussed as well. - Graphical abstract: Methionine in commercial pharmaceutical formulations was determined by flow-injection chemiluminescence and the possible chemiluminescence mechanism was discussed as well.

  16. The economics of exploiting gas hydrates

    International Nuclear Information System (INIS)

    Döpke, Lena-Katharina; Requate, Till

    2014-01-01

    We investigate the optimal exploitation of methane hydrates, a recent discovery of methane resources under the sea floor, mainly located along the continental margins. Combustion of methane (releasing CO2) and leakage through blow-outs (releasing CH4) contribute to the accumulation of greenhouse gases. A second externality arises since removing solid gas hydrates from the sea bottom destabilizes continental margins and thus increases the risk of marine earthquakes. We show that in such a model three regimes can occur: i) resource exploitation will be stopped in finite time, and some of the resource will stay in situ, ii) the resource will be used up completely in finite time, and iii) the resource will be exhausted in infinite time. We also show how to internalize the externalities by policy instruments. - Highlights: • We set up a model of optimal has hydrate exploitation • We incorporate to types of damages: contribution to global warming and geo-hazards • We characterize optimal exploitation paths and study decentralization with an exploitation tax. • Three regimes can occur: • i) exploitation in finite time and some of the stock remaining in situ, • ii) exploitation in finite time and the resource will be exhausted, • iii) exploitation and exhaustion in infinite time

  17. Exploitation and exploration dynamics in recessionary times

    NARCIS (Netherlands)

    Walrave, B.

    2012-01-01

    Firm performance largely depends on the ability to adapt to, and exploit, changes in the business environment. That is, firms should maintain ecological fitness by reconfiguring their resource base to cope with emerging threats and explore new opportunities, while at the same time exploiting

  18. Packaging of Sin Goods - Commitment or Exploitation?

    DEFF Research Database (Denmark)

    Nafziger, Julia

    to such self-control problems, and possibly exploit them, by offering different package sizes. In a competitive market, either one or three (small, medium and large) packages are offered. In contrast to common intuition, the large, and not the small package is a commitment device. The latter serves to exploit...

  19. SEXUAL EXPLOITATION AND ABUSE BY UN PEACEKEEPERS ...

    African Journals Online (AJOL)

    Allaiac

    sexual exploitation of children by peacekeepers is particularly insidious. ... sexual exploitation and abuse should involve an understanding of the social .... The charges of sexual misconduct, and the consequent media exposure, have ..... awareness programmes such as video tapes, lectures and training manuals, designed.

  20. Exploration, Exploitation, and Organizational Coordination Mechanisms

    Directory of Open Access Journals (Sweden)

    Silvio Popadiuk

    2016-03-01

    Full Text Available This paper presents an empirical relationship among exploration, exploitation, and organizational coordination mechanisms, classified as the centralization of decision-making, formalization, and connectedness. In order to analyze the findings of this survey, we used two techniques: Principal Component Analysis (PCA and Partial Least Squares Path Modeling (PLS-PM. Our analysis was supported by 249 answers from managers of companies located in Brazil (convenience sampling. Contrary to expectations, centralization and exploitation were negatively associated. Our data supports the research hypothesis that formalization is positively associated with exploitation. Although the relationship between formalization and exploration were significant, the result is contrary to the research hypothesis that we made. The relationships among connectedness and exploitation, and connectedness and exploration were both positive and significant. This relationship means that the more connectedness increases, the higher the likelihood of exploitation and exploration.

  1. Flow-Based Systems for Rapid and High-Precision Enzyme Kinetics Studies

    Directory of Open Access Journals (Sweden)

    Supaporn Kradtap Hartwell

    2012-01-01

    Full Text Available Enzyme kinetics studies normally focus on the initial rate of enzymatic reaction. However, the manual operation of steps of the conventional enzyme kinetics method has some drawbacks. Errors can result from the imprecise time control and time necessary for manual changing the reaction cuvettes into and out of the detector. By using the automatic flow-based analytical systems, enzyme kinetics studies can be carried out at real-time initial rate avoiding the potential errors inherent in manual operation. Flow-based systems have been developed to provide rapid, low-volume, and high-precision analyses that effectively replace the many tedious and high volume requirements of conventional wet chemistry analyses. This article presents various arrangements of flow-based techniques and their potential use in future enzyme kinetics applications.

  2. Architectural Synthesis of Flow-Based Microfluidic Large-Scale Integration Biochips

    DEFF Research Database (Denmark)

    Minhass, Wajid Hassan; Pop, Paul; Madsen, Jan

    2012-01-01

    ,we propose a top-down architectural synthesis methodology for the flow-based biochips. Starting from a given biochemical application and a microfluidic component library, we are interested in synthesizing a biochip architecture, i.e., performing component allocation from the library based on the biochemical....... By combining several microvalves, more complex units, such as micropumps, switches, mixers, and multiplexers, can be built. The manufacturing technology, soft lithography, used for the flow-based biochips is advancing faster than Moore's law, resulting in increased architectural complexity. However...... by synthesizing architectures for real-life applications as well as synthetic benchmarks....

  3. Control Synthesis for the Flow-Based Microfluidic Large-Scale Integration Biochips

    DEFF Research Database (Denmark)

    Minhass, Wajid Hassan; Pop, Paul; Madsen, Jan

    2013-01-01

    In this paper we are interested in flow-based microfluidic biochips, which are able to integrate the necessary functions for biochemical analysis on-chip. In these chips, the flow of liquid is manipulated using integrated microvalves. By combining severalmicrovalves, more complex units, such asmi......In this paper we are interested in flow-based microfluidic biochips, which are able to integrate the necessary functions for biochemical analysis on-chip. In these chips, the flow of liquid is manipulated using integrated microvalves. By combining severalmicrovalves, more complex units...

  4. Herbivory eliminates fitness costs of mutualism exploiters.

    Science.gov (United States)

    Simonsen, Anna K; Stinchcombe, John R

    2014-04-01

    A common empirical observation in mutualistic interactions is the persistence of variation in partner quality and, in particular, the persistence of exploitative phenotypes. For mutualisms between hosts and symbionts, most mutualism theory assumes that exploiters always impose fitness costs on their host. We exposed legume hosts to mutualistic (nitrogen-fixing) and exploitative (non-nitrogen-fixing) symbiotic rhizobia in field conditions, and manipulated the presence or absence of insect herbivory to determine if the costly fitness effects of exploitative rhizobia are context-dependent. Exploitative rhizobia predictably reduced host fitness when herbivores were excluded. However, insects caused greater damage on hosts associating with mutualistic rhizobia, as a consequence of feeding preferences related to leaf nitrogen content, resulting in the elimination of fitness costs imposed on hosts by exploitative rhizobia. Our experiment shows that herbivory is potentially an important factor in influencing the evolutionary dynamic between legumes and rhizobia. Partner choice and host sanctioning are theoretically predicted to stabilize mutualisms by reducing the frequency of exploitative symbionts. We argue that herbivore pressure may actually weaken selection on choice and sanction mechanisms, thus providing one explanation of why host-based discrimination mechanisms may not be completely effective in eliminating nonbeneficial partners. © 2014 The Authors. New Phytologist © 2014 New Phytologist Trust.

  5. Stability assessment of the stopes and crown pillar of the S’Argentera abandoned mines (Ibiza, Spain) using geomechanical classifications, an empirical approach and numerical analysis focused on a possible tourist exploitation

    International Nuclear Information System (INIS)

    Jordá-Bordehore, L.; Jordá-Bordehore, R.; Durán Valsero, J.J.; Romero-Crespo, P.L.

    2017-01-01

    The argentiferous lead mines of S’Argentera in Ibiza (Balearic Islands, Spain) are some abandoned underground workings from the first decade of the 20th century. The stability of the main stopes and the crown pillar of the mines has been evaluated - part of which is located below the road between Santa Eulalia and San Carles de Peralta. The possibility of allowing public access to the surface of the mining area and setting up a project of a “show mine” on the underground stopes and galleries is analysed. The stability is assessed with an empirical approach using the O index, the scaled span method and a stability graph together with a numerical approach. Results show that the stopes of the mines are globally stable but some lack an adequate safety factor. Therefore some local reinforcements and monitoring are needed. The finite element modelling in two dimensions yields realistic results on the current stope stability and possible rock falls which have already occurred. [es

  6. System-Level Modeling and Synthesis Techniques for Flow-Based Microfluidic Very Large Scale Integration Biochips

    DEFF Research Database (Denmark)

    Minhass, Wajid Hassan

    Microfluidic biochips integrate different biochemical analysis functionalities on-chip and offer several advantages over the conventional biochemical laboratories. In this thesis, we focus on the flow-based biochips. The basic building block of such a chip is a valve which can be fabricated at very...... propose a framework for mapping the biochemical applications onto the mVLSI biochips, binding and scheduling the operations and performing fluid routing. A control synthesis framework for determining the exact valve activation sequence required to execute the application is also proposed. In order...... to reduce the macro-assembly around the chip and enhance chip scalability, we propose an approach for the biochip pin count minimization. We also propose a throughput maximization scheme for the cell culture mVLSI biochips, saving time and reducing costs. We have extensively evaluated the proposed...

  7. Risk assessment by dynamic representation of vulnerability, exploitation, and impact

    Science.gov (United States)

    Cam, Hasan

    2015-05-01

    Assessing and quantifying cyber risk accurately in real-time is essential to providing security and mission assurance in any system and network. This paper presents a modeling and dynamic analysis approach to assessing cyber risk of a network in real-time by representing dynamically its vulnerabilities, exploitations, and impact using integrated Bayesian network and Markov models. Given the set of vulnerabilities detected by a vulnerability scanner in a network, this paper addresses how its risk can be assessed by estimating in real-time the exploit likelihood and impact of vulnerability exploitation on the network, based on real-time observations and measurements over the network. The dynamic representation of the network in terms of its vulnerabilities, sensor measurements, and observations is constructed dynamically using the integrated Bayesian network and Markov models. The transition rates of outgoing and incoming links of states in hidden Markov models are used in determining exploit likelihood and impact of attacks, whereas emission rates help quantify the attack states of vulnerabilities. Simulation results show the quantification and evolving risk scores over time for individual and aggregated vulnerabilities of a network.

  8. Peat exploitation - Environment. Effects and measures

    International Nuclear Information System (INIS)

    Stenbeck, G.

    1996-01-01

    This report gives a detailed description of the influence of peat exploitation on the land-, water- and atmospheric environments. Proposals for mitigatory measures to minimize damage to the environment are also given

  9. SEXUAL EXPLOITATION AND ABUSE BY UN PEACEKEEPERS ...

    African Journals Online (AJOL)

    Allaiac

    from sexual exploitation and sexual abuse (ST/SGB/2003/13) (UN, Secretary .... In addition, in most situations, UN personnel have enjoyed immunity from local .... 9 Official UN statistics show a higher incidence of allegations reported against.

  10. Exploitation of linkage learning in evolutionary algorithms

    CERN Document Server

    Chen, Ying-ping

    2010-01-01

    The exploitation of linkage learning is enhancing the performance of evolutionary algorithms. This monograph examines recent progress in linkage learning, with a series of focused technical chapters that cover developments and trends in the field.

  11. Exploitative and Deceptive Resource Acquisition Strategies

    Directory of Open Access Journals (Sweden)

    Joshua J. Reynolds

    2015-07-01

    Full Text Available Life history strategy (LHS and life history contingencies (LHCs should theoretically influence the use of exploitative and deceptive resource acquisition strategies. However, little research has been done in this area. The purpose of the present work was to create measures of exploitative strategies and test the predictions of life history theory. Pilot studies developed and validated a behavioral measure of cheating called the Dot Game. The role of individual LHS and LHCs (manipulated via validated story primes on cheating was investigated in Study 1. Studies 2a through 2c were conducted to develop and validate a self-report measure called the Exploitative and Deceptive Resource Acquisition Strategy Scale (EDRASS. Finally, Study 3 investigated life history and EDRASS. Results indicated that while LHS influences exploitative strategies, life history contingences had little effect. Implications of these findings are discussed.

  12. Organ sales: exploitative at any price?

    Science.gov (United States)

    Lawlor, Rob

    2014-05-01

    In many cases, claims that a transaction is exploitative will focus on the details of the transaction, such as the price paid or conditions. For example, in a claim that a worker is exploited, the grounds for the claim are usually that the pay is not sufficient or the working conditions too dangerous. In some cases, however, the claim that a transaction is exploitative is not seen to rely on these finer details. Many, for example, claim that organ sales would be exploitative, in a way that doesn't seem to depend on the details. This article considers, but ultimately rejects, a number of arguments which could be used to defend this sort of claim. © 2012 John Wiley & Sons Ltd.

  13. Development of substance flow based Life Cycle Assessment tool for sewage sludge treatment and disposal

    DEFF Research Database (Denmark)

    Yoshida, Hiroko; Clavreul, Julie; Scheutz, Charlotte

    Life Cycle Assessment (LCA) is a method to quantify environmental impacts of products or systems. It is often done by correlating material and energy demands with certain input characteristics. An attempt was made to evaluate the robustness of the substance flow based LCA for wastewater and sludg...

  14. Flow-Based Network Management: A Report from the IRTF NMRG Workshop

    NARCIS (Netherlands)

    de Oliveira Schmidt, R.; Sadre, R.; Hendriks, Luuk

    This is the report on the Workshop on Flow-Based Network Management, held within the 37th IRTF NMRG meeting, during IETF 93, on 24th July 2015, in Prague, Czech Republic. Following the tradition of the IRTF NMRG, the workshop focused on technologies, developments, and challenges of using flow-level

  15. Synthesis of Biochemical Applications on Flow-Based Microfluidic Biochips using Constraint Programming

    DEFF Research Database (Denmark)

    Minhass, Wajid Hassan; Pop, Paul; Madsen, Jan

    2012-01-01

    Microfluidic biochips are replacing the conventional biochemical analyzers and are able to integrate the necessary functions for biochemical analysis on-chip. In this paper we are interested in flow-based biochips, in which the flow of liquid is manipulated using integrated microvalves. By combin...

  16. A Theory of Exploitative Child Labor

    OpenAIRE

    Carol Ann Rogers; Kenneth A. Swinnerton

    2003-01-01

    Child labor laws should aim to protect children who work, instead of trying to remove children from work. In this paper, we identify an instance when the risk of exploitation lowers the expected bene…t of child labor to the child,and therefore suppresses child labor force participation. Targeted legal intervention that lowers or removes the risk of exploitation raises child participation in the labor market, child welfare, and overall societal welfare. Targeting on child labor more broadly ma...

  17. Managing the Innovators for Exploration and Exploitation

    Directory of Open Access Journals (Sweden)

    C. Annique UN

    2007-09-01

    Full Text Available I analyze how to manage employees to achieve a balance between exploration and exploitation in large established firms. Previous studies suggest that, although firms need to undertake both exploration and exploitation simultaneously, this is difficult either because of the scarcity of resources or because of the incompatibility of these two processes. Proposed solutions have been ambidexterity, punctuated equilibrium or specialization. I suggest another method: managing employees. Specifically, I argue that using the so-called “innovative” system of human resource management practices, consisting of team-based incentive system, team-based job design, and job rotation, enables the firm to undertake exploration and exploitation simultaneously because it provides the psychological safety for people to explore new knowledge to make novel products and develops employees to have the perspective-taking capability that enables the integration of knowledge cross-functionally for efficiency. Using the so-called “traditional” system of human resource management practices, consisting of individual-based incentive system, individual-based job design, and no job rotation, has limited impact on either exploration or exploitation because it does not create the psychological safety for people to explore new knowledge and does not develop the perspective-taking capability needed for exploitation. Moreover, mixing practices from both systems is better than only using the traditional system in achieving exploration or exploitation, but less effective than only using the innovative system as the mix of practices can create inconsistent expectations on employees.

  18. Exploiting Untapped Information Resources in Earth Science

    Science.gov (United States)

    Ramachandran, R.; Fox, P. A.; Kempler, S.; Maskey, M.

    2015-12-01

    One of the continuing challenges in any Earth science investigation is the amount of time and effort required for data preparation before analysis can begin. Current Earth science data and information systems have their own shortcomings. For example, the current data search systems are designed with the assumption that researchers find data primarily by metadata searches on instrument or geophysical keywords, assuming that users have sufficient knowledge of the domain vocabulary to be able to effectively utilize the search catalogs. These systems lack support for new or interdisciplinary researchers who may be unfamiliar with the domain vocabulary or the breadth of relevant data available. There is clearly a need to innovate and evolve current data and information systems in order to improve data discovery and exploration capabilities to substantially reduce the data preparation time and effort. We assert that Earth science metadata assets are dark resources, information resources that organizations collect, process, and store for regular business or operational activities but fail to utilize for other purposes. The challenge for any organization is to recognize, identify and effectively utilize the dark data stores in their institutional repositories to better serve their stakeholders. NASA Earth science metadata catalogs contain dark resources consisting of structured information, free form descriptions of data and pre-generated images. With the addition of emerging semantic technologies, such catalogs can be fully utilized beyond their original design intent of supporting current search functionality. In this presentation, we will describe our approach of exploiting these information resources to provide novel data discovery and exploration pathways to science and education communities

  19. Ultrasonic imaging of material flaws exploiting multipath information

    Science.gov (United States)

    Shen, Xizhong; Zhang, Yimin D.; Demirli, Ramazan; Amin, Moeness G.

    2011-05-01

    In this paper, we consider ultrasonic imaging for the visualization of flaws in a material. Ultrasonic imaging is a powerful nondestructive testing (NDT) tool which assesses material conditions via the detection, localization, and classification of flaws inside a structure. Multipath exploitations provide extended virtual array apertures and, in turn, enhance imaging capability beyond the limitation of traditional multisensor approaches. We utilize reflections of ultrasonic signals which occur when encountering different media and interior discontinuities. The waveforms observed at the physical as well as virtual sensors yield additional measurements corresponding to different aspect angles. Exploitation of multipath information addresses unique issues observed in ultrasonic imaging. (1) Utilization of physical and virtual sensors significantly extends the array aperture for image enhancement. (2) Multipath signals extend the angle of view of the narrow beamwidth of the ultrasound transducers, allowing improved visibility and array design flexibility. (3) Ultrasonic signals experience difficulty in penetrating a flaw, thus the aspect angle of the observation is limited unless access to other sides is available. The significant extension of the aperture makes it possible to yield flaw observation from multiple aspect angles. We show that data fusion of physical and virtual sensor data significantly improves the detection and localization performance. The effectiveness of the proposed multipath exploitation approach is demonstrated through experimental studies.

  20. Exploring, exploiting and evolving diversity of aquatic ecosystem models

    DEFF Research Database (Denmark)

    Janssen, Annette B G; Arhonditsis, George B.; Beusen, Arthur

    2015-01-01

    Here, we present a community perspective on how to explore, exploit and evolve the diversity in aquatic ecosystem models. These models play an important role in understanding the functioning of aquatic ecosystems, filling in observation gaps and developing effective strategies for water quality...... management. In this spirit, numerous models have been developed since the 1970s. We set off to explore model diversity by making an inventory among 42 aquatic ecosystem modellers, by categorizing the resulting set of models and by analysing them for diversity. We then focus on how to exploit model diversity...... available through open-source policies, to standardize documentation and technical implementation of models, and to compare models through ensemble modelling and interdisciplinary approaches. We end with our perspective on how the field of aquatic ecosystem modelling might develop in the next 5–10 years...

  1. Exploitation of the Virtual Worlds in Tourism and Tourism Education

    Directory of Open Access Journals (Sweden)

    Zejda Pavel

    2016-12-01

    Full Text Available Academics perceive a great potential of virtual worlds in various areas, including tourism and education. Efforts adapting the virtual worlds in practice are, however, still marginal. There is no clear definition of the virtual world. Therefore the author of this article attempts to provide one. The paper also focuses on the barriers of a wider exploitation of the virtual worlds and discusses the principles that might help to increase their potential in tourism area. One of the principles – gamification – favours a wider adaptation of the virtual worlds in tourism. Applying gamification principles provides visitors with some unique experiences while serving as a powerful marketing tool for institutions. The benefits of implementing tourism education activities based on cooperative principles set in an immersive environment of the virtual worlds are depicted afterwards. Finally, this paper includes successful case studies, which show advantages and drawbacks of some approaches in exploiting the virtual worlds in tourism and tourism education.

  2. Exploitation in International Paid Surrogacy Arrangements

    Science.gov (United States)

    Wilkinson, Stephen

    2015-01-01

    Abstract Many critics have suggested that international paid surrogacy is exploitative. Taking such concerns as its starting point, this article asks: (1) how defensible is the claim that international paid surrogacy is exploitative and what could be done to make it less exploitative? (2) In the light of the answer to (1), how strong is the case for prohibiting it? Exploitation could in principle be dealt with by improving surrogates' pay and conditions. However, doing so may exacerbate problems with consent. Foremost amongst these is the argument that surrogates from economically disadvantaged countries cannot validly consent because their background circumstances are coercive. Several versions of this argument are examined and I conclude that at least one has some merit. The article's overall conclusion is that while ethically there is something to be concerned about, paid surrogacy is in no worse a position than many other exploitative commercial transactions which take place against a backdrop of global inequality and constrained options, such as poorly‐paid and dangerous construction work. Hence, there is little reason to single surrogacy out for special condemnation. On a policy level, the case for prohibiting international commercial surrogacy is weak, despite legitimate concerns about consent and background poverty. PMID:27471338

  3. Exploitation in International Paid Surrogacy Arrangements.

    Science.gov (United States)

    Wilkinson, Stephen

    2016-05-01

    Many critics have suggested that international paid surrogacy is exploitative. Taking such concerns as its starting point, this article asks: (1) how defensible is the claim that international paid surrogacy is exploitative and what could be done to make it less exploitative? (2) In the light of the answer to (1), how strong is the case for prohibiting it? Exploitation could in principle be dealt with by improving surrogates' pay and conditions. However, doing so may exacerbate problems with consent. Foremost amongst these is the argument that surrogates from economically disadvantaged countries cannot validly consent because their background circumstances are coercive. Several versions of this argument are examined and I conclude that at least one has some merit. The article's overall conclusion is that while ethically there is something to be concerned about, paid surrogacy is in no worse a position than many other exploitative commercial transactions which take place against a backdrop of global inequality and constrained options, such as poorly-paid and dangerous construction work. Hence, there is little reason to single surrogacy out for special condemnation. On a policy level, the case for prohibiting international commercial surrogacy is weak, despite legitimate concerns about consent and background poverty.

  4. Oil exploitation and the environmental Kuznets curve

    International Nuclear Information System (INIS)

    Esmaeili, Abdoulkarim; Abdollahzadeh, Negar

    2009-01-01

    This study refers to a panel estimation of an environmental Kuznets curve (EKC) for oil to determine the factors most affecting oil exploitation in 38 oil-producing countries during 1990-2000. Control variables such as oil reserves, oil price, population, political rights, and the Gini index were used to determine its contribution to the main EKC model. The empirical results fully support the existence of an EKC for oil exploitation. Furthermore, the result indicates that the proved oil reserves has a significant and positive role in oil production, but oil price and population do not significantly affect crude oil production. Also, increased freedoms and a better income distribution will reduce the rate of oil exploitation. Thus, policies aiming at enhancing democratic society and better income distribution would be more compatible with sustainability. (author)

  5. Oil exploitation and the environmental Kuznets curve

    Energy Technology Data Exchange (ETDEWEB)

    Esmaeili, Abdoulkarim; Abdollahzadeh, Negar [Department of Agricultural Economics, College of Agriculture, Shiraz University, Shiraz, Fars (Iran)

    2009-01-15

    This study refers to a panel estimation of an environmental Kuznets curve (EKC) for oil to determine the factors most affecting oil exploitation in 38 oil-producing countries during 1990-2000. Control variables such as oil reserves, oil price, population, political rights, and the Gini index were used to determine its contribution to the main EKC model. The empirical results fully support the existence of an EKC for oil exploitation. Furthermore, the result indicates that the proved oil reserves has a significant and positive role in oil production, but oil price and population do not significantly affect crude oil production. Also, increased freedoms and a better income distribution will reduce the rate of oil exploitation. Thus, policies aiming at enhancing democratic society and better income distribution would be more compatible with sustainability. (author)

  6. Rethinking exploitation: a process-centered account.

    Science.gov (United States)

    Jansen, Lynn A; Wall, Steven

    2013-12-01

    Exploitation has become an important topic in recent discussions of biomedical and research ethics. This is due in no small measure to the influence of Alan Wertheimer's path-breaking work on the subject. This paper presents some objections to Wertheimer's account of the concept. The objections attempt to show that his account places too much emphasis on outcome-based considerations and too little on process-based considerations. Building on these objections, the paper develops an alternative process-centered account of the concept. This alternative account of exploitation takes as its point of departure the broadly Kantian notion that it is wrong to use another as an instrument for the advancement of one's own ends. It sharpens this slippery notion and adds a number of refinements to it. The paper concludes by arguing that process-centered accounts of exploitation better illuminate the ethical challenges posed by research on human subjects than outcome-centered accounts.

  7. Flow-based vulnerability measures for network component importance: Experimentation with preparedness planning

    International Nuclear Information System (INIS)

    Nicholson, Charles D.; Barker, Kash; Ramirez-Marquez, Jose E.

    2016-01-01

    This work develops and compares several flow-based vulnerability measures to prioritize important network edges for the implementation of preparedness options. These network vulnerability measures quantify different characteristics and perspectives on enabling maximum flow, creating bottlenecks, and partitioning into cutsets, among others. The efficacy of these vulnerability measures to motivate preparedness options against experimental geographically located disruption simulations is measured. Results suggest that a weighted flow capacity rate, which accounts for both (i) the contribution of an edge to maximum network flow and (ii) the extent to which the edge is a bottleneck in the network, shows most promise across four instances of varying network sizes and densities. - Highlights: • We develop new flow-based measures of network vulnerability. • We apply these measures to determine the importance of edges after disruptions. • Networks of varying size and density are explored.

  8. An efficient flow-based botnet detection using supervised machine learning

    DEFF Research Database (Denmark)

    Stevanovic, Matija; Pedersen, Jens Myrup

    2014-01-01

    Botnet detection represents one of the most crucial prerequisites of successful botnet neutralization. This paper explores how accurate and timely detection can be achieved by using supervised machine learning as the tool of inferring about malicious botnet traffic. In order to do so, the paper...... introduces a novel flow-based detection system that relies on supervised machine learning for identifying botnet network traffic. For use in the system we consider eight highly regarded machine learning algorithms, indicating the best performing one. Furthermore, the paper evaluates how much traffic needs...... to accurately and timely detect botnet traffic using purely flow-based traffic analysis and supervised machine learning. Additionally, the results show that in order to achieve accurate detection traffic flows need to be monitored for only a limited time period and number of packets per flow. This indicates...

  9. Shale gas exploitation: Status, problems and prospect

    Directory of Open Access Journals (Sweden)

    Shiqian Wang

    2018-02-01

    Full Text Available Over the past five years, great progress has been made in shale gas exploitation, which has become the most driving force for global gas output growth. Hydrocarbon extraction from shale helps drive the USA on the road to energy independence. Besides, shale oil & gas production has been kept in a sustained growth by continuous improvement in drilling efficiency and well productivity in the case of tumbling oil prices and rig counts. Shale gas reserves and production have been in a rapid growth in China owing to the Lower Paleozoic Wufeng and Longmaxi shale gas exploitation in the Sichuan Basin, which has become an important sector for the future increment of gas reserves and output in China. However, substantial progress has been made neither in non-marine shale gas exploitation as previously expected nor in the broad complicated tectonic areas in South China for which a considerable investment was made. Analysis of the basic situation and issues in domestic shale gas development shows that shale gas exploitation prospects are constrained by many problems in terms of resources endowment, horizontal well fracturing technology, etc. especially in non-marine shale deposits and complicated tectonic areas in South China where hot shales are widely distributed but geological structures are found severely deformed and over matured. Discussion on the prospects shows that the sustained and steady growth in shale gas reserves and production capacity in the coming years lies in the discovery and supersession of new shale plays in addition to Wufeng and Longmaxi shale plays, and that a technological breakthrough in ultra-high-pressure and ultra-deep (over 3500 m buried in the Sichuan Basin marine shale gas exploitation is the key and hope. Keywords: Shale gas, Exploitation, Marine facies, Hot shale, Resource endowment, Sichuan Basin, South China, Complicated tectonic area, Gas play

  10. Activity-based exploitation of Full Motion Video (FMV)

    Science.gov (United States)

    Kant, Shashi

    2012-06-01

    Video has been a game-changer in how US forces are able to find, track and defeat its adversaries. With millions of minutes of video being generated from an increasing number of sensor platforms, the DOD has stated that the rapid increase in video is overwhelming their analysts. The manpower required to view and garner useable information from the flood of video is unaffordable, especially in light of current fiscal restraints. "Search" within full-motion video has traditionally relied on human tagging of content, and video metadata, to provision filtering and locate segments of interest, in the context of analyst query. Our approach utilizes a novel machine-vision based approach to index FMV, using object recognition & tracking, events and activities detection. This approach enables FMV exploitation in real-time, as well as a forensic look-back within archives. This approach can help get the most information out of video sensor collection, help focus the attention of overburdened analysts form connections in activity over time and conserve national fiscal resources in exploiting FMV.

  11. Exploiting Weaknesses: An Approach to Counter Cartel Strategy

    Science.gov (United States)

    2011-12-01

    Surveillance MISO Military Information Support Operations MSB Money Services Businesses NAFTA North American Free Trade Agreement NHRC National...structure. Finally, the last phase constitutes the development of a pragmatic disruption strategy against the financial practices, key terrain and...Forces Unconventional Warfare manual defines an insurgency as, “An organized movement aimed at the overthrow of a constituted government through use of

  12. Exploiting the Errors: A Simple Approach for Improved Volatility Forecasting

    DEFF Research Database (Denmark)

    Bollerslev, Tim; Patton, Andrew J.; Quaedvlieg, Rogier

    with the (estimated) degree of measurement error, the models exhibit stronger persistence, and in turn generate more responsive forecasts, when the measurement error is relatively low. Implementing the new class of models for the S&P500 equity index and the individual constituents of the Dow Jones Industrial Average...

  13. Exploiting Surroundedness for Saliency Detection: A Boolean Map Approach.

    Science.gov (United States)

    Zhang, Jianming; Sclaroff, Stan

    2016-05-01

    We demonstrate the usefulness of surroundedness for eye fixation prediction by proposing a Boolean Map based Saliency model (BMS). In our formulation, an image is characterized by a set of binary images, which are generated by randomly thresholding the image's feature maps in a whitened feature space. Based on a Gestalt principle of figure-ground segregation, BMS computes a saliency map by discovering surrounded regions via topological analysis of Boolean maps. Furthermore, we draw a connection between BMS and the Minimum Barrier Distance to provide insight into why and how BMS can properly captures the surroundedness cue via Boolean maps. The strength of BMS is verified by its simplicity, efficiency and superior performance compared with 10 state-of-the-art methods on seven eye tracking benchmark datasets.

  14. Fishing elevates variability in the abundance of exploited species.

    Science.gov (United States)

    Hsieh, Chih-Hao; Reiss, Christian S; Hunter, John R; Beddington, John R; May, Robert M; Sugihara, George

    2006-10-19

    The separation of the effects of environmental variability from the impacts of fishing has been elusive, but is essential for sound fisheries management. We distinguish environmental effects from fishing effects by comparing the temporal variability of exploited versus unexploited fish stocks living in the same environments. Using the unique suite of 50-year-long larval fish surveys from the California Cooperative Oceanic Fisheries Investigations we analyse fishing as a treatment effect in a long-term ecological experiment. Here we present evidence from the marine environment that exploited species exhibit higher temporal variability in abundance than unexploited species. This remains true after accounting for life-history effects, abundance, ecological traits and phylogeny. The increased variability of exploited populations is probably caused by fishery-induced truncation of the age structure, which reduces the capacity of populations to buffer environmental events. Therefore, to avoid collapse, fisheries must be managed not only to sustain the total viable biomass but also to prevent the significant truncation of age structure. The double jeopardy of fishing to potentially deplete stock sizes and, more immediately, to amplify the peaks and valleys of population variability, calls for a precautionary management approach.

  15. On the dynamics of exploited fish populations

    National Research Council Canada - National Science Library

    Beverton, R. J. H; Holt, Sidney J

    1993-01-01

    ...-brooding cichlids, and viviparity in many sharks and toothcarps. Moreover, fish are of considerable importance to the survival of the human species in the form of nutritious, delicious and diverse food. Rational exploitation and management of our global stocks of fishes must rely upon a detailed and precise insight of their biology. The...

  16. Child Exploitation: Some Pieces of the Puzzle.

    Science.gov (United States)

    Rohlader, Dorothy

    The report addresses the status in North Carolina and in the nation of child exploitation. Legislative and judicial backgrounds of child pornography and child prostitution are reviewed, and difficulties in obtaining statistical data are noted. Law enforcement issues in pornography are cited, and suggestions for further legislation regarding child…

  17. Exploiting a natural auxotrophy for genetic selection.

    Science.gov (United States)

    Ramage, Elizabeth; Gallagher, Larry; Manoil, Colin

    2012-08-01

    We exploited the natural histidine auxotrophy of Francisella species to develop hisD (encodes histidinol dehydrogenase) as a positive selection marker. A shuttle plasmid (pBR103) carrying Escherichia coli hisD and designed for cloning of PCR fragments replicated in both attenuated and highly virulent Francisella strains. During this work, we formulated a simplified defined growth medium for Francisella novicida.

  18. Growth, Mortality and Exploitation Rates of Sarotherodon ...

    African Journals Online (AJOL)

    Evans

    ABSTRACT. Sarotherodon melanotheron population of Dominli Lagoon in the Western Region of Ghana was studied for its growth and mortality parameters as well as exploitation rate. The study generally aimed at providing basic information necessary for the assessment and management of the fish stock in the lagoon.

  19. Economic factors of vulnerability trade and exploitation

    NARCIS (Netherlands)

    Allodi, L.

    2017-01-01

    Cybercrime markets support the development and diffusion of new attack technologies, vulnerability exploits, and malware. Whereas the revenue streams of cyber attackers have been studied multiple times in the literature, no quantitative account currently exists on the economics of attack acquisition

  20. Exploiting indigenous knowledge in the environmental conservation ...

    African Journals Online (AJOL)

    ... of agriculture and reared livestock (especially goats). Over several years, they developed sustainable and effective exploitation mechanisms of the existing biodiversity resources to satisfy their individual needs and those of their societies in general. Journal of Language, Technology and Entrepreneurship in Africa Vol.

  1. Exploiting citation contexts for physics retrieval

    DEFF Research Database (Denmark)

    Dabrowska, Anna; Larsen, Birger

    2015-01-01

    The text surrounding citations within scientific papers may contain terms that usefully describe cited documents and can benefit retrieval. We present a preliminary study that investigates appending ci- tation contexts from citing documents to cited documents in the iSearch test collection. We ex...... in a large collection of physics papers, paving the way for future research that exploits citation contexts for retrieval....

  2. Dissemination and Exploitation: Project Goals beyond Science

    Science.gov (United States)

    Hamann, Kristin; Reitz, Anja

    2017-04-01

    Dissemination and Exploitation are essential parts of public funded projects. In Horizon 2020 a plan for the exploitation and dissemination of results (PEDR) is a requirement. The plan should contain a clear vision on the objectives of the project in relation to actions for dissemination and potential exploitation of the project results. The actions follow the basic idea to spread the knowledge and results gathered within the project and face the challenge of how to bring the results into potentially relevant policy circle and how they impact the market. The plan follows the purpose to assess the impact of the project and to address various target groups who are interested in the project results. Simply put, dissemination concentrates on the transfer of knowledge and exploitation on the commercialization of the project. Beyond the question of the measurability of project`s impact, strategies within science marketing can serve purposes beyond internal and external communication. Accordingly, project managers are facing the challenge to implement a dissemination and exploitation strategy that ideally supports the identification of all partners with the project and matches the current discourse of the project`s content within the society, politics and economy. A consolidated plan might unite all projects partners under a central idea and supports the identification with the project beyond the individual research questions. Which applications, strategies and methods can be used to bring forward a PEDR that accompanies a project successfully and allows a comprehensive assessment of the project afterwards? Which hurdles might project managers experience in the dissemination process and which tasks should be fulfilled by the project manager?

  3. Trolling may intensify exploitation in crappie fisheries

    Science.gov (United States)

    Meals, K. O.; Dunn, A. W.; Miranda, Leandro E.

    2012-01-01

    In some parts of the USA, anglers targeting crappies Pomoxis spp. are transitioning from mostly stationary angling with a single pole around submerged structures to using multiple poles while drifting with the wind or under power. This shift in fishing methods could result in a change in catch efficiency, possibly increasing exploitation rates to levels that would be of concern to managers. We studied the catch statistics of anglers fishing while trolling with multiple poles (trollers) and those fishing with single poles (polers) in Mississippi reservoirs. Specifically, we tested whether (1) various catch statistics differed between trollers and polers, (2) catch rates of trollers were related to the number of poles fished, and (3) trollers could raise exploitation rates to potentially unsustainable levels. Results showed that participation in the crappie fisheries was about equally split between polers and trollers. In spring, 90% of crappie anglers were polers; in summer, 85% of crappie anglers were trollers. The size of harvested crappies was similar for the two angler groups, but the catch per hour was almost three times higher for trollers than for polers. Catch rates by trollers were directly correlated to the number of poles fished, although the relationship flattened as the number of poles increased. The average harvest rate for one troller fishing with three poles was similar to the harvest rate obtained by one poler. Simulations predicted that at the existing mix of about 50% polers and 50% trollers and with no restrictions on the number of poles used by trollers, exploitation of crappies is about 1.3 times higher than that in a polers-only fishery; under a scenario in which 100% of crappie anglers were trollers, exploitation was forecasted to increase to about 1.7 times the polers-only rate. The efficiency of trolling for crappies should be of concern to fishery managers because crappie fisheries are mostly consumptive and may increase exploitation

  4. Exploiting for medical and biological applications

    Science.gov (United States)

    Giano, Michael C.

    Biotherapeutics are an emerging class of drug composed of molecules ranging in sizes from peptides to large proteins. Due to their poor stability and mucosal membrane permeability, biotherapeutics are administered by a parenteral method (i.e., syringe, intravenous or intramuscular). Therapeutics delivered systemically often experience short half-lives. While, local administration may involve invasive surgical procedures and suffer from poor retention at the site of application. To compensate, the patient receives frequent doses of highly concentrated therapeutic. Unfortunately, the off-target side effects and discomfort associated with multiple injections results in poor patient compliance. Therefore, new delivery methods which can improve therapeutic retention, reduce the frequency of administration and may aid in decreasing the off-target side effects is a necessity. Hydrogels are a class of biomaterials that are gaining interests for tissue engineering and drug delivery applications. Hydrogel materials are defined as porous, 3-dimensional networks that are primarily composed of water. Generally, they are mechanically rigid, cytocompatible and easily chemically functionalized. Collectively, these properties make hydrogels fantastic candidates to perform as drug delivery depots. Current hydrogel delivery systems physically entrap the target therapeutic which is then subsequently released over time at the site of administration. The swelling and degradation of the material effect the diffusion of the therapy from the hydrogel, and therefore should be controlled. Although these strategies provide some regulation over therapeutic release, full control of the delivery is not achieved. Newer approaches are focused on designing hydrogels that exploit known interactions, covalently attach the therapy or respond to an external stimulus in an effort to gain improved control over the therapy's release. Unfortunately, the biotherapeutic is typically required to be chemically

  5. Exploiting similarity in turbulent shear flows for turbulence modeling

    Science.gov (United States)

    Robinson, David F.; Harris, Julius E.; Hassan, H. A.

    1992-01-01

    It is well known that current k-epsilon models cannot predict the flow over a flat plate and its wake. In an effort to address this issue and other issues associated with turbulence closure, a new approach for turbulence modeling is proposed which exploits similarities in the flow field. Thus, if we consider the flow over a flat plate and its wake, then in addition to taking advantage of the log-law region, we can exploit the fact that the flow becomes self-similar in the far wake. This latter behavior makes it possible to cast the governing equations as a set of total differential equations. Solutions of this set and comparison with measured shear stress and velocity profiles yields the desired set of model constants. Such a set is, in general, different from other sets of model constants. The rational for such an approach is that if we can correctly model the flow over a flat plate and its far wake, then we can have a better chance of predicting the behavior in between. It is to be noted that the approach does not appeal, in any way, to the decay of homogeneous turbulence. This is because the asymptotic behavior of the flow under consideration is not representative of the decay of homogeneous turbulence.

  6. Exploiting similarity in turbulent shear flows for turbulence modeling

    Science.gov (United States)

    Robinson, David F.; Harris, Julius E.; Hassan, H. A.

    1992-12-01

    It is well known that current k-epsilon models cannot predict the flow over a flat plate and its wake. In an effort to address this issue and other issues associated with turbulence closure, a new approach for turbulence modeling is proposed which exploits similarities in the flow field. Thus, if we consider the flow over a flat plate and its wake, then in addition to taking advantage of the log-law region, we can exploit the fact that the flow becomes self-similar in the far wake. This latter behavior makes it possible to cast the governing equations as a set of total differential equations. Solutions of this set and comparison with measured shear stress and velocity profiles yields the desired set of model constants. Such a set is, in general, different from other sets of model constants. The rational for such an approach is that if we can correctly model the flow over a flat plate and its far wake, then we can have a better chance of predicting the behavior in between. It is to be noted that the approach does not appeal, in any way, to the decay of homogeneous turbulence. This is because the asymptotic behavior of the flow under consideration is not representative of the decay of homogeneous turbulence.

  7. Intelligence, mapping, and geospatial exploitation system (IMAGES)

    Science.gov (United States)

    Moellman, Dennis E.; Cain, Joel M.

    1998-08-01

    This paper provides further detail to one facet of the battlespace visualization concept described in last year's paper Battlespace Situation Awareness for Force XXI. It focuses on the National Imagery and Mapping Agency (NIMA) goal to 'provide customers seamless access to tailorable imagery, imagery intelligence, and geospatial information.' This paper describes Intelligence, Mapping, and Geospatial Exploitation System (IMAGES), an exploitation element capable of CONUS baseplant operations or field deployment to provide NIMA geospatial information collaboratively into a reconnaissance, surveillance, and target acquisition (RSTA) environment through the United States Imagery and Geospatial Information System (USIGS). In a baseplant CONUS setting IMAGES could be used to produce foundation data to support mission planning. In the field it could be directly associated with a tactical sensor receiver or ground station (e.g. UAV or UGV) to provide near real-time and mission specific RSTA to support mission execution. This paper provides IMAGES functional level design; describes the technologies, their interactions and interdependencies; and presents a notional operational scenario to illustrate the system flexibility. Using as a system backbone an intelligent software agent technology, called Open Agent ArchitectureTM (OAATM), IMAGES combines multimodal data entry, natural language understanding, and perceptual and evidential reasoning for system management. Configured to be DII COE compliant, it would utilize, to the extent possible, COTS applications software for data management, processing, fusion, exploitation, and reporting. It would also be modular, scaleable, and reconfigurable. This paper describes how the OAATM achieves data synchronization and enables the necessary level of information to be rapidly available to various command echelons for making informed decisions. The reasoning component will provide for the best information to be developed in the timeline

  8. Risk of bacterial cross infection associated with inspiration through flow-based spirometers.

    Science.gov (United States)

    Bracci, Massimo; Strafella, Elisabetta; Croce, Nicola; Staffolani, Sara; Carducci, Annalaura; Verani, Marco; Valentino, Matteo; Santarelli, Lory

    2011-02-01

    Bacterial contamination of spirometers has been documented in water-sealed devices, mouthpieces, and connection tubes. Little information is available about bacterial contamination of flow-based apparatuses such as turbine-type spirometers and pneumotachographs. Inspiration through contaminated equipment is a potential source of cross infection. To investigate bacteria mobilization (ie, bacteria detachment and aerosolization from the instrument) during routine spirometric testing, 2 types of flow-based spirometers were used. Bacteria mobilization during artificial inspiration through in-line filters or cardboard mouthpieces was evaluated. Nine hundred workers undergoing periodic spirometric testing were enrolled at the occupational physician office in 30 sessions of 30 subjects each. The participants were asked to perform a forced vital capacity test in a turbine-type spirometer and in an unheated pneumotachograph fitted with disposable in-line filters or cardboard mouthpieces. To evaluate bacterial mobilization, an artificial inspiration was performed and bacterial growth determined. The bacterial growth analysis was assessed after the first and the thirtieth spirometric tests of each session without disinfecting the instruments between tests. In addition, instrument bacterial contamination was evaluated. No significant bacterial mobilization and instrument contamination were found in spirometric tests executed with in-line filters. Conversely, a significant bacterial mobilization and instrument contamination were observed in tests performed with cardboard mouthpieces. Differences between the 2 spirometers were not significant. In-line filters may effectively reduce the risk of bacterial cross infection. Inspiration through flow-based spirometers fitted with disposable cardboard mouthpieces is completely safe when combined with spirometer disinfection/sterilization between subjects. Copyright © 2011 Association for Professionals in Infection Control and

  9. Exploiting HRM in support of lean manufacturing

    DEFF Research Database (Denmark)

    Jørgensen, Frances; Matthiesen, Rikke

    The purpose of this paper is to investigate the ways in HRM practices are-and could potentially be-exploited to support lean manufacturing in practice. First, a review of the pertinent literature regarding HRM, SHRM, and lean manufacturing is presented to provide an understanding of the mechanisms...... by which HRM practices could, theoretically, be used to support a lean implementation. Data presented in the paper are derived from 1) a longitudinal case study on lean implementation and 2) from managers currently involved with lean manufacturing in a second company. The relevant literature and the data...... depicting the potential role in supporting HRM/lean integrated practices. The analysis of the model with respect to the theoretical background emphasizes a number of areas in which HRM could be more fully exploited in order to more successfully support lean implementation, for example, by stressing HRM...

  10. Exploiting Non-Markovianity for Quantum Control.

    Science.gov (United States)

    Reich, Daniel M; Katz, Nadav; Koch, Christiane P

    2015-07-22

    Quantum technology, exploiting entanglement and the wave nature of matter, relies on the ability to accurately control quantum systems. Quantum control is often compromised by the interaction of the system with its environment since this causes loss of amplitude and phase. However, when the dynamics of the open quantum system is non-Markovian, amplitude and phase flow not only from the system into the environment but also back. Interaction with the environment is then not necessarily detrimental. We show that the back-flow of amplitude and phase can be exploited to carry out quantum control tasks that could not be realized if the system was isolated. The control is facilitated by a few strongly coupled, sufficiently isolated environmental modes. Our paradigmatic example considers a weakly anharmonic ladder with resonant amplitude control only, restricting realizable operations to SO(N). The coupling to the environment, when harnessed with optimization techniques, allows for full SU(N) controllability.

  11. Exploiting Inhibitory Siglecs to Combat Food Allergies

    Science.gov (United States)

    2017-10-01

    AWARD NUMBER: W81XWH-16-1-0302 TITLE: Exploiting Inhibitory Siglecs to Combat Food Allergies PRINCIPAL INVESTIGATOR: Michael Kulis, Ph.D...CONTRACTING ORGANIZATION: University of North Carolina at Chapel Hill Chapel Hill, NC 27599 REPORT DATES: October 2017 TYPE OF REPORT: Annual PREPARED FOR...Department of Defense, Washington Headquarters Services , Directorate for Information Operations and Reports (0704-0188), 1215 Jefferson Davis Highway, Suite

  12. Dandruff: The most commercially exploited skin disease

    Directory of Open Access Journals (Sweden)

    Ranganathan S

    2010-01-01

    Full Text Available The article discuss in detail about the prevalence, pathophysiology, clinical manifestations of dandruff including the etio-pathology. The article also discusses in detail about various treatment methods available for dandruff. The status of dandruff being amphibious - a disease/disorder, and relatively less medical intervention is sought after for the treatment, dandruff is the most commercially exploited skin and scalp disorder/disease by personal care industries.

  13. Exploiting partial knowledge for efficient model analysis

    OpenAIRE

    Macedo, Nuno; Cunha, Alcino; Pessoa, Eduardo José Dias

    2017-01-01

    The advancement of constraint solvers and model checkers has enabled the effective analysis of high-level formal specification languages. However, these typically handle a specification in an opaque manner, amalgamating all its constraints in a single monolithic verification task, which often proves to be a performance bottleneck. This paper addresses this issue by proposing a solving strategy that exploits user-provided partial knowledge, namely by assigning symbolic bounds to the problem’s ...

  14. Amplifiers Exploiting Thermal Noise Canceling: A Review

    OpenAIRE

    Klumperink, Eric A.M.; Bruccoleri, Federico; Stroet, Peter; Nauta, Bram

    2004-01-01

    Wide-band LNAs suffer from a fundamental trade-off between noise figure NF and source impedance matching, which limits NF to values typically above 3dB. Recently, a feed-forward noise canceling technique has been proposed to break this trade-off. This paper reviews the principle of the technique and its key properties. Although the technique has been applied to wideband CMOS LNAs, it can just as well be implemented exploiting transconductance elements realized with oth...

  15. Exploiting thesauri knowledge in medical guideline formalization

    OpenAIRE

    Serban, R.C.; ten Teije, A.C.M.

    2009-01-01

    Objectives: As in software product lifecycle, the effort spent in maintaining medical knowl edge in guidelines can be reduced, if modularization, formalization and tracking of domain knowledge are employed across the guideline development phases. Methods: We propose to exploit and combine knowledge templates with medical background knowledge from existing thesauri in order to produce reusable building blocks used in guideline development. These tem- plates enable easier guideline formalizatio...

  16. Fully Exploiting The Potential Of The Periodic Table Through Pattern Recognition.

    Science.gov (United States)

    Schultz, Emeric

    2005-01-01

    An approach to learning chemical facts that starts with the periodic table and depends primarily on recognizing and completing patterns and following a few simple rules is described. This approach exploits the exceptions that arise and uses them as opportunities for further concept development.

  17. Exploiting Software Tool Towards Easier Use And Higher Efficiency

    Science.gov (United States)

    Lin, G. H.; Su, J. T.; Deng, Y. Y.

    2006-08-01

    In developing countries, using data based on instrument made by themselves in maximum extent is very important. It is not only related to maximizing science returns upon prophase investment -- deep accumulations in every aspects but also science output. Based on the idea, we are exploiting a software (called THDP: Tool of Huairou Data Processing). It is used for processing a series of issues, which is met necessary in processing data. This paper discusses its designed purpose, functions, method and specialities. The primary vehicle for general data interpretation is through various techniques of data visualization, techniques of interactive. In the software, we employed Object Oriented approach. It is appropriate to the vehicle. it is imperative that the approach provide not only function, but do so in as convenient a fashion as possible. As result of the software exploiting, it is not only easier to learn data processing for beginner and more convenienter to need further improvement for senior but also increase greatly efficiency in every phrases include analyse, parameter adjusting, result display. Under frame of virtual observatory, for developing countries, we should study more and newer related technologies, which can advance ability and efficiency in science research, like the software we are developing

  18. JPEG2000-coded image error concealment exploiting convex sets projections.

    Science.gov (United States)

    Atzori, Luigi; Ginesu, Giaime; Raccis, Alessio

    2005-04-01

    Transmission errors in JPEG2000 can be grouped into three main classes, depending on the affected area: LL, high frequencies at the lower decomposition levels, and high frequencies at the higher decomposition levels. The first type of errors are the most annoying but can be concealed exploiting the signal spatial correlation like in a number of techniques proposed in the past; the second are less annoying but more difficult to address; the latter are often imperceptible. In this paper, we address the problem of concealing the second class or errors when high bit-planes are damaged by proposing a new approach based on the theory of projections onto convex sets. Accordingly, the error effects are masked by iteratively applying two procedures: low-pass (LP) filtering in the spatial domain and restoration of the uncorrupted wavelet coefficients in the transform domain. It has been observed that a uniform LP filtering brought to some undesired side effects that negatively compensated the advantages. This problem has been overcome by applying an adaptive solution, which exploits an edge map to choose the optimal filter mask size. Simulation results demonstrated the efficiency of the proposed approach.

  19. A flow-based methodology for the calculation of TSO to TSO compensations for cross-border flows

    International Nuclear Information System (INIS)

    Glavitsch, H.; Andersson, G.; Lekane, Th.; Marien, A.; Mees, E.; Naef, U.

    2004-01-01

    In the context of the development of the European internal electricity market, several methods for the tarification of cross-border flows have been proposed. This paper presents a flow-based method for the calculation of TSO to TSO compensations for cross-border flows. The basic principle of this approach is the allocation of the costs of cross-border flows to the TSOs who are responsible for these flows. This method is cost reflective, non-transaction based and compatible with domestic tariffs. It can be applied when limited data are available. Each internal transmission network is then modelled as an aggregated node, called 'supernode', and the European network is synthesized by a graph of supernodes and arcs, each arc representing all cross-border lines between two adjacent countries. When detailed data are available, the proposed methodology is also applicable to all the nodes and lines of the transmission network. Costs associated with flows transiting through supernodes or network elements are forwarded through the network in a way reflecting how the flows make use of the network. The costs can be charged either towards loads and exports or towards generations and imports. Combination of the two charging directions can also be considered. (author)

  20. Residual coal exploitation and its impact on sustainable development of the coal industry in China

    International Nuclear Information System (INIS)

    Zhang, Yujiang; Feng, Guorui; Zhang, Min; Ren, Hongrui; Bai, Jinwen; Guo, Yuxia; Jiang, Haina; Kang, Lixun

    2016-01-01

    Although China owns large coal reserves, it now faces the problem of depletion of its coal resources in advance. The coal-based energy mix in China will not change in the short term, and a means of delaying the coal resources depletion is therefore urgently required. The residual coal was exploited first with a lower recovery percentage and was evaluated as commercially valuable damaged coal. This approach is in comparison to past evaluations when the residual coal was allocated as exploitation losses. Coal recovery rates, the calculation method of residual coal reserves and statistics of its mines in China were given. On this basis, a discussion concerning the impacts on the delay of China's coal depletion, development of coal exploitation and sustainable developments, as well as technologies and relevant policies, were presented. It is considered that the exploitation of residual coal can effectively delay China's coal depletion, inhibit the construction of new mines, redress the imbalance between supply and demand of coal in eastern China, improve the mining area environment and guarantee social stability. The Chinese government supports the exploitation technologies of residual coal. Hence, exploiting residual coal is of considerable importance in sustainable development of the coal industry in China. - Highlights: •Pay attention to residual coal under changing energy-mix environment in China. •Estimate residual coal reserves and investigate its exploitation mines. •Discuss impacts of residual coal exploitation on delay of coal depletion in China. •Discuss impacts on coal mining industry and residual coal exploitation technology. •Give corresponding policy prescriptions.

  1. Cloud Based Earth Observation Data Exploitation Platforms

    Science.gov (United States)

    Romeo, A.; Pinto, S.; Loekken, S.; Marin, A.

    2017-12-01

    In the last few years data produced daily by several private and public Earth Observation (EO) satellites reached the order of tens of Terabytes, representing for scientists and commercial application developers both a big opportunity for their exploitation and a challenge for their management. New IT technologies, such as Big Data and cloud computing, enable the creation of web-accessible data exploitation platforms, which offer to scientists and application developers the means to access and use EO data in a quick and cost effective way. RHEA Group is particularly active in this sector, supporting the European Space Agency (ESA) in the Exploitation Platforms (EP) initiative, developing technology to build multi cloud platforms for the processing and analysis of Earth Observation data, and collaborating with larger European initiatives such as the European Plate Observing System (EPOS) and the European Open Science Cloud (EOSC). An EP is a virtual workspace, providing a user community with access to (i) large volume of data, (ii) algorithm development and integration environment, (iii) processing software and services (e.g. toolboxes, visualization routines), (iv) computing resources, (v) collaboration tools (e.g. forums, wiki, etc.). When an EP is dedicated to a specific Theme, it becomes a Thematic Exploitation Platform (TEP). Currently, ESA has seven TEPs in a pre-operational phase dedicated to geo-hazards monitoring and prevention, costal zones, forestry areas, hydrology, polar regions, urban areas and food security. On the technology development side, solutions like the multi cloud EO data processing platform provides the technology to integrate ICT resources and EO data from different vendors in a single platform. In particular it offers (i) Multi-cloud data discovery, (ii) Multi-cloud data management and access and (iii) Multi-cloud application deployment. This platform has been demonstrated with the EGI Federated Cloud, Innovation Platform Testbed Poland

  2. Heisenberg's heirs exploit loopholes in his law

    International Nuclear Information System (INIS)

    Taubes, G.

    1994-01-01

    This article describes research into Heisenberg's Uncertainty Principle. Loopholes in the principle have led to a series of experiments using sophisticated optical techniques to extract information from a quantum system without disturbing the variable being measured. The experiments are based on a technique called back-action evasion, which exploits the possibility of channeling all the uncertainty generated by measuring one quantum variable (e.g. laser beam intensity) onto a related variable known as the conjugate observable (beam phase). These experiments and others are described

  3. Liposomal cancer therapy: exploiting tumor characteristics

    DEFF Research Database (Denmark)

    Kaasgaard, Thomas; Andresen, Thomas Lars

    2010-01-01

    an overview of current strategies for improving the different stages of liposomal cancer therapy, which involve transporting drug-loaded liposomes through the bloodstream, increasing tumor accumulation, and improving drug release and cancer cell uptake after accumulation at the tumor target site. What...... the reader will gain: The review focuses on strategies that exploit characteristic features of solid tumors, such as abnormal vasculature, overexpression of receptors and enzymes, as well as acidic and thiolytic characteristics of the tumor microenvironment. Take home message: It is concluded that the design...

  4. Pilot plant for exploitation of geothermal waters

    Directory of Open Access Journals (Sweden)

    Stojiljković Dragan T.

    2006-01-01

    Full Text Available In Sijarinska spa, there are some 15 mineral and thermomineral springs, that are already being used for therapeutic purposes. For the exploitation of heat energy boring B-4 is very interesting. It is a boring of a closed type, with the water temperature of about 78°C and a flow rate of about 33 l/s. Waters with the flow rate of about 6 l/s are currently used for heating of the Gejzer hotel, and waters of the flow rate of about 0,121 l/s for the pilot drying plant. The paper presents this pilot plant. .

  5. Exploiting Redundancy in an OFDM SDR Receiver

    Directory of Open Access Journals (Sweden)

    Tomas Palenik

    2009-01-01

    Full Text Available Common OFDM system contains redundancy necessary to mitigate interblock interference and allows computationally effective single-tap frequency domain equalization in receiver. Assuming the system implements an outer error correcting code and channel state information is available in the receiver, we show that it is possible to understand the cyclic prefix insertion as a weak inner ECC encoding and exploit the introduced redundancy to slightly improve error performance of such a system. In this paper, an easy way to implement modification to an existing SDR OFDM receiver is presented. This modification enables the utilization of prefix redundancy, while preserving full compatibility with existing OFDM-based communication standards.

  6. Geothermal resources: exploration and exploitation. A bibliography

    Energy Technology Data Exchange (ETDEWEB)

    1976-07-01

    This comprehensive bibliography contains 5476 citations of foreign and domestic research reports, journal articles, patents, conference proceedings, and books concerned with the exploration and exploitation of geothermal resources. The coverage dates back as far as useful references could be obtained and extends through June 1976. References are arranged in broad subject categories and are made up of complete bibliographic citations. These are followed by a listing of subject descriptors used to describe the subject content of each reference. Four indexes are included: Corporate, Personal Author, Subject, and Report Number. Also included is a list of journals from which articles were selected. (LBS)

  7. Algorithms exploiting ultrasonic sensors for subject classification

    Science.gov (United States)

    Desai, Sachi; Quoraishee, Shafik

    2009-09-01

    Proposed here is a series of techniques exploiting micro-Doppler ultrasonic sensors capable of characterizing various detected mammalian targets based on their physiological movements captured a series of robust features. Employed is a combination of unique and conventional digital signal processing techniques arranged in such a manner they become capable of classifying a series of walkers. These processes for feature extraction develops a robust feature space capable of providing discrimination of various movements generated from bipeds and quadrupeds and further subdivided into large or small. These movements can be exploited to provide specific information of a given signature dividing it in a series of subset signatures exploiting wavelets to generate start/stop times. After viewing a series spectrograms of the signature we are able to see distinct differences and utilizing kurtosis, we generate an envelope detector capable of isolating each of the corresponding step cycles generated during a walk. The walk cycle is defined as one complete sequence of walking/running from the foot pushing off the ground and concluding when returning to the ground. This time information segments the events that are readily seen in the spectrogram but obstructed in the temporal domain into individual walk sequences. This walking sequence is then subsequently translated into a three dimensional waterfall plot defining the expected energy value associated with the motion at particular instance of time and frequency. The value is capable of being repeatable for each particular class and employable to discriminate the events. Highly reliable classification is realized exploiting a classifier trained on a candidate sample space derived from the associated gyrations created by motion from actors of interest. The classifier developed herein provides a capability to classify events as an adult humans, children humans, horses, and dogs at potentially high rates based on the tested sample

  8. FSH: fast spaced seed hashing exploiting adjacent hashes.

    Science.gov (United States)

    Girotto, Samuele; Comin, Matteo; Pizzi, Cinzia

    2018-01-01

    Patterns with wildcards in specified positions, namely spaced seeds , are increasingly used instead of k -mers in many bioinformatics applications that require indexing, querying and rapid similarity search, as they can provide better sensitivity. Many of these applications require to compute the hashing of each position in the input sequences with respect to the given spaced seed, or to multiple spaced seeds. While the hashing of k -mers can be rapidly computed by exploiting the large overlap between consecutive k -mers, spaced seeds hashing is usually computed from scratch for each position in the input sequence, thus resulting in slower processing. The method proposed in this paper, fast spaced-seed hashing (FSH), exploits the similarity of the hash values of spaced seeds computed at adjacent positions in the input sequence. In our experiments we compute the hash for each positions of metagenomics reads from several datasets, with respect to different spaced seeds. We also propose a generalized version of the algorithm for the simultaneous computation of multiple spaced seeds hashing. In the experiments, our algorithm can compute the hashing values of spaced seeds with a speedup, with respect to the traditional approach, between 1.6[Formula: see text] to 5.3[Formula: see text], depending on the structure of the spaced seed. Spaced seed hashing is a routine task for several bioinformatics application. FSH allows to perform this task efficiently and raise the question of whether other hashing can be exploited to further improve the speed up. This has the potential of major impact in the field, making spaced seed applications not only accurate, but also faster and more efficient. The software FSH is freely available for academic use at: https://bitbucket.org/samu661/fsh/overview.

  9. ROUNDTABLE - SESSION 2 EXPLOITATION, CONSERVATION AND LEGISLATION

    Directory of Open Access Journals (Sweden)

    EDSMAN L.

    2004-01-01

    Full Text Available The link between socioeconomics and conservation and the role of legislation in conservation work was discussed in the group with participants from nine European countries. Interest and knowledge among the general public, stakeholders and managers is the key to successful conservation of native crayfish species. Exploitation and conservation do not necessarily exclude each other. A controlled fishery, where it can be sustained, may be an essential tool for conservation by increasing the general awareness and involving more people in the task of protecting the native crayfish species. This strategy is mainly possible for the noble crayfish in the northern part of its distribution, where strong traditions connected to crayfish also exist. A balance between utilisation and overexploitation has to be found and local guidelines for sustainable exploitation produced. Media, the Internet and educational material aimed at schools and stakeholders are excellent ways of reaching a wide audience with information. Universal objectives, rules and regulations at the European level are desirable and the noble crayfish and the stone crayfish should be included in Annex II of the Habitat Directive. Based on this framework detailed regulations are best worked out at the national level, considering the specific crayfish situation in the country. Information about the legislation, the purpose of the legislation and the consequences when not obeying it should be distributed. Stricter regulation of the trade with live alien crayfish is vital because of the associated risk of introducing new diseases and species.

  10. Uncovering Indicators of Commercial Sexual Exploitation.

    Science.gov (United States)

    Bounds, Dawn; Delaney, Kathleen R; Julion, Wrenetha; Breitenstein, Susan

    2017-07-01

    It is estimated that annually 100,000 to 300,000 youth are at risk for sex trafficking; a commercial sex act induced by force, fraud, or coercion, or any such act where the person induced to perform such an act is younger than 18 years of age. Increasingly, such transactions are occurring online via Internet-based sites that serve the commercial sex industry. Commercial sex transactions involving trafficking are illegal; thus, Internet discussions between those involved must be veiled. Even so, transactions around sex trafficking do occur. Within these transactions are innuendos that provide one avenue for detecting potential activity. The purpose of this study is to identify linguistic indicators of potential commercial sexual exploitation within the online comments of men posted on an Internet site. Six hundred sixty-six posts from five Midwest cities and 363 unique members were analyzed via content analysis. Three main indicators were found: the presence of youth or desire for youthfulness, presence of pimps, and awareness of vulnerability. These findings begin a much-needed dialogue on uncovering online risks of commercial sexual exploitation and support the need for further research on Internet indicators of sex trafficking.

  11. Large size space construction for space exploitation

    Science.gov (United States)

    Kondyurin, Alexey

    2016-07-01

    Space exploitation is impossible without large space structures. We need to make sufficient large volume of pressurized protecting frames for crew, passengers, space processing equipment, & etc. We have to be unlimited in space. Now the size and mass of space constructions are limited by possibility of a launch vehicle. It limits our future in exploitation of space by humans and in development of space industry. Large-size space construction can be made with using of the curing technology of the fibers-filled composites and a reactionable matrix applied directly in free space. For curing the fabric impregnated with a liquid matrix (prepreg) is prepared in terrestrial conditions and shipped in a container to orbit. In due time the prepreg is unfolded by inflating. After polymerization reaction, the durable construction can be fitted out with air, apparatus and life support systems. Our experimental studies of the curing processes in the simulated free space environment showed that the curing of composite in free space is possible. The large-size space construction can be developed. A project of space station, Moon base, Mars base, mining station, interplanet space ship, telecommunication station, space observatory, space factory, antenna dish, radiation shield, solar sail is proposed and overviewed. The study was supported by Humboldt Foundation, ESA (contract 17083/03/NL/SFe), NASA program of the stratospheric balloons and RFBR grants (05-08-18277, 12-08-00970 and 14-08-96011).

  12. PROBA-V Mission Exploitation Platform

    Directory of Open Access Journals (Sweden)

    Erwin Goor

    2016-07-01

    Full Text Available As an extension of the PROBA-Vegetation (PROBA-V user segment, the European Space Agency (ESA, de Vlaamse Instelling voor Technologisch Onderzoek (VITO, and partners TRASYS and Spacebel developed an operational Mission Exploitation Platform (MEP to drastically improve the exploitation of the PROBA-V Earth Observation (EO data archive, the archive from the historical SPOT-VEGETATION mission, and derived products by researchers, service providers, and thematic users. The analysis of the time series of data (petabyte range is addressed, as well as the large scale on-demand processing of the complete archive, including near real-time data. The platform consists of a private cloud environment, a Hadoop-based processing environment and a data manager. Several applications are released to the users, e.g., a full resolution viewing service, a time series viewer, pre-defined on-demand processing chains, and virtual machines with powerful tools and access to the data. After an initial release in January 2016 a research platform was deployed gradually, allowing users to design, debug, and test applications on the platform. From the PROBA-V MEP, access to, e.g., Sentinel-2 and Sentinel-3 data will be addressed as well.

  13. Exploiting the Dynamics of Soft Materials for Machine Learning.

    Science.gov (United States)

    Nakajima, Kohei; Hauser, Helmut; Li, Tao; Pfeifer, Rolf

    2018-06-01

    Soft materials are increasingly utilized for various purposes in many engineering applications. These materials have been shown to perform a number of functions that were previously difficult to implement using rigid materials. Here, we argue that the diverse dynamics generated by actuating soft materials can be effectively used for machine learning purposes. This is demonstrated using a soft silicone arm through a technique of multiplexing, which enables the rich transient dynamics of the soft materials to be fully exploited as a computational resource. The computational performance of the soft silicone arm is examined through two standard benchmark tasks. Results show that the soft arm compares well to or even outperforms conventional machine learning techniques under multiple conditions. We then demonstrate that this system can be used for the sensory time series prediction problem for the soft arm itself, which suggests its immediate applicability to a real-world machine learning problem. Our approach, on the one hand, represents a radical departure from traditional computational methods, whereas on the other hand, it fits nicely into a more general perspective of computation by way of exploiting the properties of physical materials in the real world.

  14. Self-report measure of financial exploitation of older adults.

    Science.gov (United States)

    Conrad, Kendon J; Iris, Madelyn; Ridings, John W; Langley, Kate; Wilber, Kathleen H

    2010-12-01

    this study was designed to improve the measurement of financial exploitation (FE) by testing psychometric properties of the older adult financial exploitation measure (OAFEM), a client self-report instrument. rasch item response theory and traditional validation approaches were used. Questionnaires were administered by 22 adult protective services investigators from 7 agencies in Illinois to 227 substantiated abuse clients. Analyses included tests for dimensionality, model fit, and additional construct validation. Results from the OAFEM were also compared with the substantiation decision of abuse and with investigators' assessments of FE using a staff report version. Hypotheses were generated to test hypothesized relationships. the OAFEM, including the original 79-, 54-, and 30-item measures, met stringent Rasch analysis fit and unidimensionality criteria and had high internal consistency and item reliability. The validation results were supportive, while leading to reconsideration of aspects of the hypothesized theoretical hierarchy. Thresholds were suggested to demonstrate levels of severity. the measure is now available to aid in the assessment of FE of older adults by both clinicians and researchers. Theoretical refinements developed using the empirically generated item hierarchy may help to improve assessment and intervention.

  15. zero day exploits and national readiness for cyber-warfare

    African Journals Online (AJOL)

    HOD

    A zero day vulnerability is an unknown exploit that divulges security flaws in software before such a flaw is publicly ... Keywords: exploits, zero day, vulnerability, cyberspace, cyber-warfare. 1. ..... industries and companies across the globe. The.

  16. Total exploitation of an ornamental granite quarry

    Directory of Open Access Journals (Sweden)

    Taboada, J.

    2005-09-01

    Full Text Available In this paper we propose a methodology to estimate the recovery percentage for each of the products which can be obtained from the exploitation of an ornamental granite quarry: block, semiblock, masonry-transverse stone, and the smaller materials that can be used to obtain construction aggregates. This methodology ensures that quarry exploitation is exhaustive, thereby minimising the production of spoils and the consequent negative impact on the environment. The analysis is based on a detailed and exhaustive compilation of discontinuity data from the research fronts, which are then interpreted statistically and projected over the three weakness planes that are a particular feature of ornamental granite deposits. Using this information, and bearing in mind the minimum commercially viable sizes for each kind of granite, the corresponding recovery rates are calculated for each material in each plane. The results are then integrated using spatial techniques, and the result is an evaluation of quarry contents with a view to total exploitation. This methodology was applied to a quarry in the opening phase in order to carry out an a priori assessment of the economic feasibility of the quarry.

    En este trabajo se propone una metodología para estimar el porcentaje de recuperación de cada uno de los productos que se pueden obtener en la explotación de una cantera de granito ornamental: bloque, semibloque, manpostería y per piaños, y material restante destinado a la obtención de áridos. De esta manera se logra un aprovechamiento integral de la cantera, evitándose la generación de estériles y el subsiguiente impacto ambiental producido por éstos. La metodología de análisis se basa en la recopilación detallada y exhaustiva de datos de discontinuidades en los frentes de investigación, que se interpretan estadísticamente y se proyectan sobre los tres planos de debilidad propios del granito ornamental. Con esta información, y las

  17. Synthesis of Riboflavines, Quinoxalinones and Benzodiazepines through Chemoselective Flow Based Hydrogenations

    Directory of Open Access Journals (Sweden)

    Marcus Baumann

    2014-07-01

    Full Text Available Robust chemical routes towards valuable bioactive entities such as riboflavines, quinoxalinones and benzodiazepines are described. These make use of modern flow hydrogenation protocols enabling the chemoselective reduction of nitro group containing building blocks in order to rapidly generate the desired amine intermediates in situ. In order to exploit the benefits of continuous processing the individual steps were transformed into a telescoped flow process delivering selected benzodiazepine products on scales of 50 mmol and 120 mmol respectively.

  18. Root Exploit Detection and Features Optimization: Mobile Device and Blockchain Based Medical Data Management.

    Science.gov (United States)

    Firdaus, Ahmad; Anuar, Nor Badrul; Razak, Mohd Faizal Ab; Hashem, Ibrahim Abaker Targio; Bachok, Syafiq; Sangaiah, Arun Kumar

    2018-05-04

    The increasing demand for Android mobile devices and blockchain has motivated malware creators to develop mobile malware to compromise the blockchain. Although the blockchain is secure, attackers have managed to gain access into the blockchain as legal users, thereby comprising important and crucial information. Examples of mobile malware include root exploit, botnets, and Trojans and root exploit is one of the most dangerous malware. It compromises the operating system kernel in order to gain root privileges which are then used by attackers to bypass the security mechanisms, to gain complete control of the operating system, to install other possible types of malware to the devices, and finally, to steal victims' private keys linked to the blockchain. For the purpose of maximizing the security of the blockchain-based medical data management (BMDM), it is crucial to investigate the novel features and approaches contained in root exploit malware. This study proposes to use the bio-inspired method of practical swarm optimization (PSO) which automatically select the exclusive features that contain the novel android debug bridge (ADB). This study also adopts boosting (adaboost, realadaboost, logitboost, and multiboost) to enhance the machine learning prediction that detects unknown root exploit, and scrutinized three categories of features including (1) system command, (2) directory path and (3) code-based. The evaluation gathered from this study suggests a marked accuracy value of 93% with Logitboost in the simulation. Logitboost also helped to predicted all the root exploit samples in our developed system, the root exploit detection system (RODS).

  19. Environmental effects of geothermal energy exploitation

    Energy Technology Data Exchange (ETDEWEB)

    Nakamura, H [Japan Metals and Chemicals Co., Ltd., Japan

    1975-01-01

    The environmental effects of geothermal power generation which cause air and water pollution and destruction of natural areas are reviewed. The production of steam and hot water affect existing hot springs sources and can cause ground subsidence. Harmful gas can be released onto the atmosphere from fumarolic gas and hot springs. Hydrothermal geothermal fields occasionally contain harmful substances such as arsenic in the hot water. Serious environmental effects can result from geothermal exploitation activities such as the felling of trees for road construction, well drilling, and plant construction. Once geothermal power generation has begun, the release of H/sub 2/S into the atmosphere and the reinjection of hot water are conducted continuously and sufficient countermeasures can be taken. One problem is the effects of plant construction and operation on natural parks. It is important to reach a compromise between development and protection of natural senic areas. Two figures, two tables, and 13 references are provided.

  20. CHARACTERISTICS OF HYDROCARBON EXPLOITATION IN ARCTIC CIRCLE

    Directory of Open Access Journals (Sweden)

    Vanja Lež

    2013-12-01

    Full Text Available The existence of large quantities of hydrocarbons is supposed within the Arctic Circle. Assumed quantities are 25% of the total undiscovered hydrocarbon reserves on Earth, mostly natural gas. Over 500 major and minor gas accumulations within the Arctic Circle were discovered so far, but apart from Snøhvit gas field, there is no commercial exploitation of natural gas from these fields. Arctic gas projects are complicated, technically hard to accomplish, and pose a great threat to the return of investment, safety of people and equipment and for the ecosystem. Russia is a country that is closest to the realization of the Arctic gas projects that are based on the giant gas fields. The most extreme weather conditions in the seas around Greenland are the reason why this Arctic region is the least explored and furthest from the realization of any gas project (the paper is published in Croatian .

  1. Protocol to Exploit Waiting Resources for UASNs

    Directory of Open Access Journals (Sweden)

    Li-Ling Hung

    2016-03-01

    Full Text Available The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols.

  2. Exploitation of heterogeneous resources for ATLAS Computing

    CERN Document Server

    Chudoba, Jiri; The ATLAS collaboration

    2018-01-01

    LHC experiments require significant computational resources for Monte Carlo simulations and real data processing and the ATLAS experiment is not an exception. In 2017, ATLAS exploited steadily almost 3M HS06 units, which corresponds to about 300 000 standard CPU cores. The total disk and tape capacity managed by the Rucio data management system exceeded 350 PB. Resources are provided mostly by Grid computing centers distributed in geographically separated locations and connected by the Grid middleware. The ATLAS collaboration developed several systems to manage computational jobs, data files and network transfers. ATLAS solutions for job and data management (PanDA and Rucio) were generalized and now are used also by other collaborations. More components are needed to include new resources such as private and public clouds, volunteers' desktop computers and primarily supercomputers in major HPC centers. Workflows and data flows significantly differ for these less traditional resources and extensive software re...

  3. Exploitation and use of coal field gas

    Energy Technology Data Exchange (ETDEWEB)

    Wang, K; Li, Z; Sun, Q

    1982-04-25

    There are slightly more than 440 mine shafts in the world from which gas is pumped at the same time coal is being mined, the volume pumped being 3.125 billion cubic meters. All the countries of the world today widely use gas as a fuel and as a raw material for the chemical industry. In China 40 percent of the total number of mine shafts are high gas mine shafts. In China, gas is used largely as fuel by the people, to fire boilers, to make formaldehyde, and to make carbon ink. Prospects are good for the exploitation of mine shaft gas that is produced in association with coal. Mine shaft gas is a top quality energy source with an extraction life that is longer than coals. (DP)

  4. Summary of radiation protection in exploitation

    International Nuclear Information System (INIS)

    Garcier, Yves; Guers, Rene; Bidard, Francoise; Colson, Philippe; Gonin, Michele; Delabre, Herve; Hemidy, Pierre-Yves; Corgnet, Bruno; Perrin, Marie-Claire; Phan Hoang, Long; Abela, Gonzague; Crepieux, Virginie; Guyot, Pierre; Haranger, Didier; Warembourg, Philippe

    2004-01-01

    This document proposes a large and detailed overview of notions and practices regarding radiation protection in relationship with an NPP exploitation framework. It presents the main notions: matter structure, radioactivity, interactions between matter and radiations, types of ionizing radiation, magnitudes and measurement units, exposure modes, main principles of radiation protection, means of protection against internal and external exposures. The second part proposes an overview of the origin of radiological risks in a nuclear power plant. This origin can be found in fission products, activation products, actinides, designed protections, or circuit contaminations. These radiological risks are more precisely identified and described in terms of detection and prevention (internal exposure risk, contamination risk, iodine-related risk, alpha radiation-related risk, access to the reactor building). The next part addresses the medical and radiological follow-up of exposed workers by a special medical control, by an individual exposure control, by a specific control of female personnel, and by attention to exceptional exposures. Measurement means are presented (detection principles, installation continuous control, workspaces control, personnel contamination control, follow-up of individual dose) as well as collective and individual protection means. The management of radiation protection is addressed through a presentation of decision and management structures for radiation protection, and of EDF objectives and ambitions in this domain. The organization of radiation protection during exploitation is described: responsibilities for radiation protection in a nuclear power station, requirements for workers, preparation of interventions in controlled zone, work execution in controlled zone, zone controls and radiological cleanness of installations. The two last chapters address issues and practices of radiation protection in the case of deconstruction or dismantling, and

  5. Exploiting CRISPR/Cas: Interference Mechanisms and Applications

    Directory of Open Access Journals (Sweden)

    André Plagens

    2013-07-01

    Full Text Available The discovery of biological concepts can often provide a framework for the development of novel molecular tools, which can help us to further understand and manipulate life. One recent example is the elucidation of the prokaryotic adaptive immune system, clustered regularly interspaced short palindromic repeats (CRISPR/CRISPR-associated (Cas that protects bacteria and archaea against viruses or conjugative plasmids. The immunity is based on small RNA molecules that are incorporated into versatile multi-domain proteins or protein complexes and specifically target viral nucleic acids via base complementarity. CRISPR/Cas interference machines are utilized to develop novel genome editing tools for different organisms. Here, we will review the latest progress in the elucidation and application of prokaryotic CRISPR/Cas systems and discuss possible future approaches to exploit the potential of these interference machineries.

  6. Television production, Funding Models and Exploitation of Content

    Directory of Open Access Journals (Sweden)

    Gillian Doyle

    2016-07-01

    Full Text Available The rise of digital platforms has transformative implications for strategies of financing media production and for exploitation of the economic value in creative content. In the television industry, changes in technologies for distribution and the emergence of SVOD services such as Netflix are gradually shifting audiences and financial power away from broadcasters while at the same time creating unprecedented opportunities for programme-makers.  Drawing on findings from recent RCUK-funded research, this article examines how these shifts are affecting production financing and the economics of supplying television content.  In particular, it focuses on how changes in the dynamics of rights markets and in strategic approaches towards the financing of television production might mean for markets, industries and for policies intended to support the economic sustainability of independent television content production businesses.

  7. Exploiting nonlinearities of micro-machined resonators for filtering applications

    KAUST Repository

    Ilyas, Saad; Chappanda, K. N.; Younis, Mohammad I.

    2017-01-01

    We demonstrate the exploitation of the nonlinear behavior of two electrically coupled microbeam resonators to realize a band-pass filter. More specifically, we combine their nonlinear hardening and softening responses to realize a near flat pass band filter with sharp roll-off characteristics. The device is composed of two near identical doubly clamped and electrostatically actuated microbeams made of silicon. One of the resonators is buckled via thermal loading to produce a softening frequency response. It is then further tuned to create the desired overlap with the second resonator response of hardening behavior. This overlapping improves the pass band flatness. Also, the sudden jumps due to the softening and hardening behaviors create sharp roll-off characteristics. This approach can be promising for the future generation of filters with superior characteristics.

  8. Exploiting nonlinearities of micro-machined resonators for filtering applications

    KAUST Repository

    Ilyas, Saad

    2017-06-21

    We demonstrate the exploitation of the nonlinear behavior of two electrically coupled microbeam resonators to realize a band-pass filter. More specifically, we combine their nonlinear hardening and softening responses to realize a near flat pass band filter with sharp roll-off characteristics. The device is composed of two near identical doubly clamped and electrostatically actuated microbeams made of silicon. One of the resonators is buckled via thermal loading to produce a softening frequency response. It is then further tuned to create the desired overlap with the second resonator response of hardening behavior. This overlapping improves the pass band flatness. Also, the sudden jumps due to the softening and hardening behaviors create sharp roll-off characteristics. This approach can be promising for the future generation of filters with superior characteristics.

  9. Exploiting CRISPR/Cas: Interference Mechanisms and Applications

    Science.gov (United States)

    Richter, Hagen; Randau, Lennart; Plagens, André

    2013-01-01

    The discovery of biological concepts can often provide a framework for the development of novel molecular tools, which can help us to further understand and manipulate life. One recent example is the elucidation of the prokaryotic adaptive immune system, clustered regularly interspaced short palindromic repeats (CRISPR)/CRISPR-associated (Cas) that protects bacteria and archaea against viruses or conjugative plasmids. The immunity is based on small RNA molecules that are incorporated into versatile multi-domain proteins or protein complexes and specifically target viral nucleic acids via base complementarity. CRISPR/Cas interference machines are utilized to develop novel genome editing tools for different organisms. Here, we will review the latest progress in the elucidation and application of prokaryotic CRISPR/Cas systems and discuss possible future approaches to exploit the potential of these interference machineries. PMID:23857052

  10. Exploiting the bead-injection approach in the integrated sequential injection Lab-on-Valve format using hydrophobic packing materials for on-line matrix removal and preconcentration of trace levels of cadmium in environmental and biological samples via formation of non-charged chelates prior

    DEFF Research Database (Denmark)

    Miró, Manuel; Jonczyk, Sylwia; Wang, Jianhua

    2003-01-01

    The concept of renewable microcolumns within the conduits of an automated single injection lab-on-valve system was exploited in a sorption/elution fashion using sorbents of hydrophobic nature. The scheme's practical applicability was demonstrated for the electrothermal atomic absorption spectrome......The concept of renewable microcolumns within the conduits of an automated single injection lab-on-valve system was exploited in a sorption/elution fashion using sorbents of hydrophobic nature. The scheme's practical applicability was demonstrated for the electrothermal atomic absorption...

  11. Exploiting Novel Radiation-Induced Electromagnetic Material Changes for Remote Detection and Monitoring: Final Progress Report

    Science.gov (United States)

    2016-04-01

    Exploiting Novel Radiation -Induced Electromagnetic Material Changes for Remote Detection and Monitoring: Final Progress Report Distribution...assess the effects of ionizing radiation on at least three classes of electromagnetic materials. The proposed approach for radiation detection was...that was desired to be monitored remotely. Microwave or low millimeter wave electromagnetic radiation would be used to interrogate the device

  12. Gaming the gamer? – The ethics of exploiting psychological research in video games

    NARCIS (Netherlands)

    Soraker, Johnny

    2016-01-01

    Purpose The purpose of this paper is to investigate the ethical implications of video game companies employing psychologists and using psychological research in game design. Design/methodology/approach The author first argues that exploiting psychology in video games may be more ethically

  13. Empirical Analysis of Exploiting Review Helpfulness for Extractive Summarization of Online Reviews

    Science.gov (United States)

    Xiong, Wenting; Litman, Diane

    2014-01-01

    We propose a novel unsupervised extractive approach for summarizing online reviews by exploiting review helpfulness ratings. In addition to using the helpfulness ratings for review-level filtering, we suggest using them as the supervision of a topic model for sentence-level content scoring. The proposed method is metadata-driven, requiring no…

  14. Exploiting Multiple Detections for Person Re-Identification

    Directory of Open Access Journals (Sweden)

    Amran Bhuiyan

    2018-01-01

    Full Text Available Re-identification systems aim at recognizing the same individuals in multiple cameras, and one of the most relevant problems is that the appearance of same individual varies across cameras due to illumination and viewpoint changes. This paper proposes the use of cumulative weighted brightness transfer functions (CWBTFs to model these appearance variations. Different from recently proposed methods which only consider pairs of images to learn a brightness transfer function, we exploit such a multiple-frame-based learning approach that leverages consecutive detections of each individual to transfer the appearance. We first present a CWBTF framework for the task of transforming appearance from one camera to another. We then present a re-identification framework where we segment the pedestrian images into meaningful parts and extract features from such parts, as well as from the whole body. Jointly, both of these frameworks contribute to model the appearance variations more robustly. We tested our approach on standard multi-camera surveillance datasets, showing consistent and significant improvements over existing methods on three different datasets without any other additional cost. Our approach is general and can be applied to any appearance-based method.

  15. Proba-V Mission Exploitation Platform

    Science.gov (United States)

    Goor, E.

    2017-12-01

    VITO and partners developed the Proba-V Mission Exploitation Platform (MEP) as an end-to-end solution to drastically improve the exploitation of the Proba-V (an EC Copernicus contributing mission) EO-data archive, the past mission SPOT-VEGETATION and derived vegetation parameters by researchers, service providers (e.g. the EC Copernicus Global Land Service) and end-users. The analysis of time series of data (PB range) is addressed, as well as the large scale on-demand processing of near real-time data on a powerful and scalable processing environment. New features are still developed, but the platform is yet fully operational since November 2016 and offers A time series viewer (browser web client and API), showing the evolution of Proba-V bands and derived vegetation parameters for any country, region, pixel or polygon defined by the user. Full-resolution viewing services for the complete data archive. On-demand processing chains on a powerfull Hadoop/Spark backend. Virtual Machines can be requested by users with access to the complete data archive mentioned above and pre-configured tools to work with this data, e.g. various toolboxes and support for R and Python. This allows users to immediately work with the data without having to install tools or download data, but as well to design, debug and test applications on the platform. Jupyter Notebooks is available with some examples python and R projects worked out to show the potential of the data. Today the platform is already used by several international third party projects to perform R&D activities on the data, and to develop/host data analysis toolboxes. From the Proba-V MEP, access to other data sources such as Sentinel-2 and landsat data is also addressed. Selected components of the MEP are also deployed on public cloud infrastructures in various R&D projects. Users can make use of powerful Web based tools and can self-manage virtual machines to perform their work on the infrastructure at VITO with access to

  16. Mission Exploitation Platform PROBA-V

    Science.gov (United States)

    Goor, Erwin

    2016-04-01

    VITO and partners developed an end-to-end solution to drastically improve the exploitation of the PROBA-V EO-data archive (http://proba-v.vgt.vito.be/), the past mission SPOT-VEGETATION and derived vegetation parameters by researchers, service providers and end-users. The analysis of time series of data (+1PB) is addressed, as well as the large scale on-demand processing of near real-time data. From November 2015 an operational Mission Exploitation Platform (MEP) PROBA-V, as an ESA pathfinder project, will be gradually deployed at the VITO data center with direct access to the complete data archive. Several applications will be released to the users, e.g. - A time series viewer, showing the evolution of PROBA-V bands and derived vegetation parameters for any area of interest. - Full-resolution viewing services for the complete data archive. - On-demand processing chains e.g. for the calculation of N-daily composites. - A Virtual Machine will be provided with access to the data archive and tools to work with this data, e.g. various toolboxes and support for R and Python. After an initial release in January 2016, a research platform will gradually be deployed allowing users to design, debug and test applications on the platform. From the MEP PROBA-V, access to Sentinel-2 and landsat data will be addressed as well, e.g. to support the Cal/Val activities of the users. Users can make use of powerful Web based tools and can self-manage virtual machines to perform their work on the infrastructure at VITO with access to the complete data archive. To realise this, private cloud technology (openStack) is used and a distributed processing environment is built based on Hadoop. The Hadoop ecosystem offers a lot of technologies (Spark, Yarn, Accumulo, etc.) which we integrate with several open-source components. The impact of this MEP on the user community will be high and will completely change the way of working with the data and hence open the large time series to a larger

  17. Transformation of Commercial Flows into Physical Flows of Electricity – Flow Based Method

    Directory of Open Access Journals (Sweden)

    M. Adamec

    2009-01-01

    Full Text Available We are witnesses of large – scale electricity transport between European countries under the umbrella of the UCTE organization. This is due to the inabilyof generators to satisfy the growing consumption in some regions. In this content, we distinguish between two types of flow. The first type is physical flow, which causes costs in the transmission grid, whilst the second type is commercial flow, which provides revenues for the market participants. The old methods for allocating transfer capacity fail to take this duality into account. The old methods that allocate transmission border capacity to “virtual” commercial flows which, in fact, will not flow over this border, do not lead to optimal allocation. Some flows are uselessly rejected and conversely, some accepted flows can cause congestion on another border. The Flow Based Allocation method (FBA is a method which aims to solve this problem.Another goal of FBA is to ensure sustainable development of expansion of transmission capacity. Transmission capacity is important, because it represents a way to establish better transmission system stability, and it provides a distribution channel for electricity to customers abroad. For optimal development, it is necessary to ensure the right division of revenue allocation among the market participants.This paper contains a brief description of the FBA method. Problems of revenue maximization and optimal revenue distribution are mentioned. 

  18. FLOW-BASED NETWORK MEASURES OF BRAIN CONNECTIVITY IN ALZHEIMER'S DISEASE.

    Science.gov (United States)

    Prasad, Gautam; Joshi, Shantanu H; Nir, Talia M; Toga, Arthur W; Thompson, Paul M

    2013-01-01

    We present a new flow-based method for modeling brain structural connectivity. The method uses a modified maximum-flow algorithm that is robust to noise in the diffusion data and guided by biologically viable pathways and structure of the brain. A flow network is first created using a lattice graph by connecting all lattice points (voxel centers) to all their neighbors by edges. Edge weights are based on the orientation distribution function (ODF) value in the direction of the edge. The maximum-flow is computed based on this flow graph using the flow or the capacity between each region of interest (ROI) pair by following the connected tractography fibers projected onto the flow graph edges. Network measures such as global efficiency, transitivity, path length, mean degree, density, modularity, small world, and assortativity are computed from the flow connectivity matrix. We applied our method to diffusion-weighted images (DWIs) from 110 subjects (28 normal elderly, 56 with early and 11 with late mild cognitive impairment, and 15 with AD) and segmented co-registered anatomical MRIs into cortical regions. Experimental results showed better performance compared to the standard fiber-counting methods when distinguishing Alzheimer's disease from normal aging.

  19. A novel flow-based parameter of collateral function assessed by intracoronary thermodilution.

    Science.gov (United States)

    Lindner, Markus; Felix, Stephan B; Empen, Klaus; Reffelmann, Thorsten

    2014-04-01

    Currently, many methods for quantitation of coronary collateral function are based on intracoronary pressure measurements distal of an occluded balloon, which do not fully account for the dynamic nature of collateral flow. Therefore, a flow-based parameter of coronary collateral function based upon principles of thermodilution was evaluated. In 26 patients with a high-grade coronary artery stenosis, intracoronary hemodynamics were analyzed by the RadiAnalyzer system (St Jude Medical), including fractional flow reserve (FFR), index of microcirculatory resistance (IMR), and the pressure-based collateral flow index (CFI) during balloon occlusion and hyperemia (intravenous adenosine). Moreover, immediately after an intracoronary bolus of room-temperature saline, the balloon was occluded and the intracoronary temperature distal to the balloon was analyzed over time. The slope of the temperature-time curve was calculated after logarithmic transformation as an index of collateral blood flow (CBFI). The coefficient of variation between two measurements of CBFI amounted to 11 ± 2%. In patients with CFI ≥0.25, CBFI amounted to 0.55 ± 0.09, whereas in those with CFI function, and should be evaluated in further studies.

  20. Relationship between exploitation, oscillation, MSY and extinction.

    Science.gov (United States)

    Ghosh, Bapan; Kar, T K; Legovic, T

    2014-10-01

    We give answers to two important problems arising in current fisheries: (i) how maximum sustainable yield (MSY) policy is influenced by the initial population level, and (ii) how harvesting, oscillation and MSY are related to each other in prey-predator systems. To examine the impact of initial population on exploitation, we analyze a single species model with strong Allee effect. It is found that even when the MSY exists, the dynamic solution may not converge to the equilibrium stock if the initial population level is higher but near the critical threshold level. In a prey-predator system with Allee effect in the prey species, the initial population does not have such important impact neither on MSY nor on maximum sustainable total yield (MSTY). However, harvesting the top predator may cause extinction of all species if odd number of trophic levels exist in the ecosystem. With regard to the second problem, we study two prey-predator models and establish that increasing harvesting effort either on prey, predator or both prey and predator destroys previously existing oscillation. Moreover, equilibrium stock both at MSY and MSTY level is stable. We also discuss the validity of found results to other prey-predator systems. Copyright © 2014 Elsevier Inc. All rights reserved.

  1. Exploiting Virtualization and Cloud Computing in ATLAS

    International Nuclear Information System (INIS)

    Harald Barreiro Megino, Fernando; Van der Ster, Daniel; Benjamin, Doug; De, Kaushik; Gable, Ian; Paterson, Michael; Taylor, Ryan; Hendrix, Val; Vitillo, Roberto A; Panitkin, Sergey; De Silva, Asoka; Walker, Rod

    2012-01-01

    The ATLAS Computing Model was designed around the concept of grid computing; since the start of data-taking, this model has proven very successful in the federated operation of more than one hundred Worldwide LHC Computing Grid (WLCG) sites for offline data distribution, storage, processing and analysis. However, new paradigms in computing, namely virtualization and cloud computing, present improved strategies for managing and provisioning IT resources that could allow ATLAS to more flexibly adapt and scale its storage and processing workloads on varied underlying resources. In particular, ATLAS is developing a “grid-of-clouds” infrastructure in order to utilize WLCG sites that make resources available via a cloud API. This work will present the current status of the Virtualization and Cloud Computing R and D project in ATLAS Distributed Computing. First, strategies for deploying PanDA queues on cloud sites will be discussed, including the introduction of a “cloud factory” for managing cloud VM instances. Next, performance results when running on virtualized/cloud resources at CERN LxCloud, StratusLab, and elsewhere will be presented. Finally, we will present the ATLAS strategies for exploiting cloud-based storage, including remote XROOTD access to input data, management of EC2-based files, and the deployment of cloud-resident LCG storage elements.

  2. Exploiting intrinsic fluctuations to identify model parameters.

    Science.gov (United States)

    Zimmer, Christoph; Sahle, Sven; Pahle, Jürgen

    2015-04-01

    Parameterisation of kinetic models plays a central role in computational systems biology. Besides the lack of experimental data of high enough quality, some of the biggest challenges here are identification issues. Model parameters can be structurally non-identifiable because of functional relationships. Noise in measured data is usually considered to be a nuisance for parameter estimation. However, it turns out that intrinsic fluctuations in particle numbers can make parameters identifiable that were previously non-identifiable. The authors present a method to identify model parameters that are structurally non-identifiable in a deterministic framework. The method takes time course recordings of biochemical systems in steady state or transient state as input. Often a functional relationship between parameters presents itself by a one-dimensional manifold in parameter space containing parameter sets of optimal goodness. Although the system's behaviour cannot be distinguished on this manifold in a deterministic framework it might be distinguishable in a stochastic modelling framework. Their method exploits this by using an objective function that includes a measure for fluctuations in particle numbers. They show on three example models, immigration-death, gene expression and Epo-EpoReceptor interaction, that this resolves the non-identifiability even in the case of measurement noise with known amplitude. The method is applied to partially observed recordings of biochemical systems with measurement noise. It is simple to implement and it is usually very fast to compute. This optimisation can be realised in a classical or Bayesian fashion.

  3. Fostering the Exploitation of Open Educational Resources

    Directory of Open Access Journals (Sweden)

    Thomas Richter

    2014-07-01

    Full Text Available The central concept behind Open Educational Resources (OER is opening up the access to educational resources for stakeholders who are not the usual target user group. This concept must be perceived as innovative because it describes a general economic and social paradigm shift: Education, which formerly was limited to a specific group of learners, now, is promoted as a public good. However, despite very good intentions, internationally agreed quality standards, and the availability of the required technological infrastructure, the critical threshold is not yet met. Due to several reasons, the usefulness of OER is often limited to the originally targeted context. Questions arise if the existing quality standards for Technology Enhanced Learning (TEL actually meet the specific requirements within the OER value chain, if the existing quality standards are applicable to OER in a meaningful way, and under which conditions related standards generally could support the exploitation of OER.We analyze quality standards for TEL and contrast the life cycle model of commercial learning resources against the life cycle model of OER. We investigate special demands on quality from the context of OER and, taking the former results into account, derive emergent quality criteria for OER. The paper concludes with recommendations for the design of OER and a future standard development.

  4. Exploiting Genetic Interference for Antiviral Therapy.

    Directory of Open Access Journals (Sweden)

    Elizabeth J Tanner

    2016-05-01

    Full Text Available Rapidly evolving viruses are a major threat to human health. Such viruses are often highly pathogenic (e.g., influenza virus, HIV, Ebola virus and routinely circumvent therapeutic intervention through mutational escape. Error-prone genome replication generates heterogeneous viral populations that rapidly adapt to new selection pressures, leading to resistance that emerges with treatment. However, population heterogeneity bears a cost: when multiple viral variants replicate within a cell, they can potentially interfere with each other, lowering viral fitness. This genetic interference can be exploited for antiviral strategies, either by taking advantage of a virus's inherent genetic diversity or through generating de novo interference by engineering a competing genome. Here, we discuss two such antiviral strategies, dominant drug targeting and therapeutic interfering particles. Both strategies harness the power of genetic interference to surmount two particularly vexing obstacles-the evolution of drug resistance and targeting therapy to high-risk populations-both of which impede treatment in resource-poor settings.

  5. Radiation protection in exploitation of uranium ores

    International Nuclear Information System (INIS)

    Pavlov, I.V.; Shalaev, I.L.

    1976-01-01

    The results are analyzed of the study of the radiation conditions in uranium mines, design and testing of protection means, improvement of methods and equipment for the dosimetric control in different countries since 1968 to 1975. There are outlined radiation hazards and their role in the formation of the radiation situation in mines, dispersive composition of aerosols of short-living daughter products of Rn(DPR) in the mine atmosphere. Among means of the radiation protection the following are dealt with: ventilation including the calculation of air requirements, design of ventilation systems, ventilation practices in working mines; lowering of the release of radon into the mine atmosphere by isolating non-exploited pits, application of gas-proof covers to cofferdams in faces of jointing zones, intensification of mining works in dangerous zones. Methods of air cleaning to remove Rn are suggested in brief. Apparatus are described for the individual control of the level of latent energy in the zone of miners' respiration: track dosimeters, thermoluminescent crystalls (TLC), photographic films, semiconductor systems and biophysical methods of the control for uranium mines. The efficient use of existing protection means provides the normal radiation situation in mines without significant additional investments

  6. Accelerating Large Data Analysis By Exploiting Regularities

    Science.gov (United States)

    Moran, Patrick J.; Ellsworth, David

    2003-01-01

    We present techniques for discovering and exploiting regularity in large curvilinear data sets. The data can be based on a single mesh or a mesh composed of multiple submeshes (also known as zones). Multi-zone data are typical to Computational Fluid Dynamics (CFD) simulations. Regularities include axis-aligned rectilinear and cylindrical meshes as well as cases where one zone is equivalent to a rigid-body transformation of another. Our algorithms can also discover rigid-body motion of meshes in time-series data. Next, we describe a data model where we can utilize the results from the discovery process in order to accelerate large data visualizations. Where possible, we replace general curvilinear zones with rectilinear or cylindrical zones. In rigid-body motion cases we replace a time-series of meshes with a transformed mesh object where a reference mesh is dynamically transformed based on a given time value in order to satisfy geometry requests, on demand. The data model enables us to make these substitutions and dynamic transformations transparently with respect to the visualization algorithms. We present results with large data sets where we combine our mesh replacement and transformation techniques with out-of-core paging in order to achieve significant speed-ups in analysis.

  7. Shale Gas Exploration and Exploitation Induced Risks - SHEER

    Science.gov (United States)

    Capuano, Paolo; Orlecka-Sikora, Beata; Lasocki, Stanislaw; Cesca, Simone; Gunning, Andrew; jaroslawsky, Janusz; Garcia-Aristizabal, Alexander; Westwood, Rachel; Gasparini, Paolo

    2017-04-01

    Shale gas operations may affect the quality of air, water and landscapes; furthermore, it can induce seismic activity, with the possible impacts on the surrounding infrastructure. The SHEER project aims at setting up a probabilistic methodology to assess and mitigate the short and the long term environmental risks connected to the exploration and exploitation of shale gas. In particular we are investigating risks associated with groundwater contamination, air pollution and induced seismicity. A shale gas test site located in Poland (Wysin) has been monitored before, during and after the fracking operations with the aim of assessing environmental risks connected with groundwater contamination, air pollution and earthquakes induced by fracking and injection of waste water. The severity of each of these hazards depends strongly on the unexpected enhanced permeability pattern, which may develop as an unwanted by-product of the fracking processes and may become pathway for gas and fluid migration towards underground water reservoirs or the surface. The project is devoted to monitor and understand how far this enhanced permeability pattern develops both in space and time. The considered hazards may be at least partially inter-related as they all depend on this enhanced permeability pattern. Therefore they are being approached from a multi-hazard, multi parameter perspective. We expect to develop methodologies and procedures to track and model fracture evolution around shale gas exploitation sites and a robust statistically based, multi-parameter methodology to assess environmental impacts and risks across the operational lifecycle of shale gas. The developed methodologies are going to be applied and tested on a comprehensive database consisting of seismicity, changes of the quality of ground-waters and air, ground deformations, and operational data collected from the ongoing monitoring episode (Wysin) and past episodes: Lubocino (Poland), Preese Hall (UK), Oklahoma (USA

  8. Exploiting Synergies in European Wind and Hydrogen Sectors: A Cost-benefit Assessment

    OpenAIRE

    SHAW SUZANNE; PETEVES ESTATHIOS

    2007-01-01

    This article outlines an assessment of the perspectives for exploiting synergies between European wind and hydrogen energy sectors, where wind energy conversion to hydrogen is used as a common strategy for reducing network management costs in high wind energy penetration situations, and for production of renewable hydrogen. The attractiveness of this approach, referred to here as a ¿¿wind-hydrogen strategy¿¿, is analysed using a costbenefit approach to evaluate the final impact...

  9. EBITDA/EBIT and cash flow based ICRs: A comparative approach in the agro-food system in Italy

    Directory of Open Access Journals (Sweden)

    Mattia Iotti

    2012-05-01

    Full Text Available The interest coverage ratios (ICRs are used to quantify the ability of firms to pay financial debts; ICRs are then considered by banks such as covenants in the financing term sheet, and are used by researchers and the rating agencies to estimate the probability of default of firms. Typically, ICRs calculation is based on profit margins, such as EBITDA and EBIT; EBITDA and EBIT approximate, but do not directly express, cash flows available to pay financial debts. The article aims to evaluate whether there are significant differences in results using ICRs based on EBITDA or EBIT and ICRs based on different definitions of cash flow (CF. The application is made to a sample of firms characterized by high absorption of capital operating in the Italian agro-food sector. The article highlights that there are statistically significant differences using ICRs EBITDA and EBIT based and ICRs based on different CF definitions.

  10. Performance Evaluation of a SDN/OpenFlow-Based Distributed Mobility Management (DMM) Approach in Virtualized LTE Systems

    NARCIS (Netherlands)

    Valtulina, Luca; Karimzadeh Motallebi Azar, Morteza; Karagiannis, Georgios; Heijenk, Geert; Pras, Aiko

    2014-01-01

    Currently most of the mobility management solutions rely on a centralized mobility anchor entity, which is in charge of both mobility-related control plane and user data forwarding. This makes mobility management prone to several performance limitations such as suboptimal routing, low scalability,

  11. Exploiting tumor shrinkage through temporal optimization of radiotherapy

    International Nuclear Information System (INIS)

    Unkelbach, Jan; Craft, David; Hong, Theodore; Papp, Dávid; Wolfgang, John; Bortfeld, Thomas; Ramakrishnan, Jagdish; Salari, Ehsan

    2014-01-01

    In multi-stage radiotherapy, a patient is treated in several stages separated by weeks or months. This regimen has been motivated mostly by radiobiological considerations, but also provides an approach to reduce normal tissue dose by exploiting tumor shrinkage. The paper considers the optimal design of multi-stage treatments, motivated by the clinical management of large liver tumors for which normal liver dose constraints prohibit the administration of an ablative radiation dose in a single treatment. We introduce a dynamic tumor model that incorporates three factors: radiation induced cell kill, tumor shrinkage, and tumor cell repopulation. The design of multi-stage radiotherapy is formulated as a mathematical optimization problem in which the total dose to the normal tissue is minimized, subject to delivering the prescribed dose to the tumor. Based on the model, we gain insight into the optimal administration of radiation over time, i.e. the optimal treatment gaps and dose levels. We analyze treatments consisting of two stages in detail. The analysis confirms the intuition that the second stage should be delivered just before the tumor size reaches a minimum and repopulation overcompensates shrinking. Furthermore, it was found that, for a large range of model parameters, approximately one-third of the dose should be delivered in the first stage. The projected benefit of multi-stage treatments in terms of normal tissue sparing depends on model assumptions. However, the model predicts large dose reductions by more than a factor of 2 for plausible model parameters. The analysis of the tumor model suggests that substantial reduction in normal tissue dose can be achieved by exploiting tumor shrinkage via an optimal design of multi-stage treatments. This suggests taking a fresh look at multi-stage radiotherapy for selected disease sites where substantial tumor regression translates into reduced target volumes. (paper)

  12. The microeconomics of sexual exploitation of girls and young women in the Peruvian Amazon.

    Science.gov (United States)

    Mujica, Jaris

    2013-01-01

    This paper examines the sexual exploitation of girls and young women as an increasing phenomenon within the extractive industries of wood, oil, minerals and gas in Peruvian Amazonia. The analysis focuses on the city of Pucallpa and the northern part of the Ucayali River and aims to identify the social and economic dynamics underpinning the commercial sexual exploitation of female children and teenagers around the main river port. The study describes the local operating mechanisms of bars and restaurants in the port, the demand for and perceptions of the sexual exploitation of children and teenagers, and the economic logic that it entails. Using a discourse analytic approach, it is argued that this is a business whose profitability is tied to the trade in alcoholic beverages and foods and which responds to a set of family connections and networks.

  13. For your first born child: an ethical defense of the exploitation argument against commercial surrogacy.

    Science.gov (United States)

    Osberg, Brendan

    2006-01-01

    In this essay I explore two arguments against commercial surrogacy, based on commodification and exploitation respectively. I adopt a consequentialist framework and argue that commodification arguments must be grounded in a resultant harm to either child or surrogate, and that a priori arguments which condemn the practice for puritanical reasons cannot form a basis for public law. Furthermore there is no overwhelming evidence of harm caused to either party involved in commercial surrogacy, and hence Canadian law (which forbids the practice) must (and can) be justified on exploitative grounds. Objections raised by Wilkinson based on an 'isolated case' approach are addressed when one takes into account the political implications of public policy. I argue that is precisely these implications that justify laws forbidding commercial surrogacy on the grounds of preventing systematic exploitation.

  14. Main principles of developing exploitation models of semiconductor devices

    Science.gov (United States)

    Gradoboev, A. V.; Simonova, A. V.

    2018-05-01

    The paper represents primary tasks, solutions of which allow to develop the exploitation modes of semiconductor devices taking into account complex and combined influence of ionizing irradiation and operation factors. The structure of the exploitation model of the semiconductor device is presented, which is based on radiation and reliability models. Furthermore, it was shown that the exploitation model should take into account complex and combine influence of various ionizing irradiation types and operation factors. The algorithm of developing the exploitation model of the semiconductor devices is proposed. The possibility of creating the radiation model of Schottky barrier diode, Schottky field-effect transistor and Gunn diode is shown based on the available experimental data. The basic exploitation model of IR-LEDs based upon double AlGaAs heterostructures is represented. The practical application of the exploitation models will allow to output the electronic products with guaranteed operational properties.

  15. Transnational gestational surrogacy: does it have to be exploitative?

    Science.gov (United States)

    Kirby, Jeffrey

    2014-01-01

    This article explores the controversial practice of transnational gestational surrogacy and poses a provocative question: Does it have to be exploitative? Various existing models of exploitation are considered and a novel exploitation-evaluation heuristic is introduced to assist in the analysis of the potentially exploitative dimensions/elements of complex health-related practices. On the basis of application of the heuristic, I conclude that transnational gestational surrogacy, as currently practiced in low-income country settings (such as rural, western India), is exploitative of surrogate women. Arising out of consideration of the heuristic's exploitation conditions, a set of public education and enabled choice, enhanced protections, and empowerment reforms to transnational gestational surrogacy practice is proposed that, if incorporated into a national regulatory framework and actualized within a low income country, could possibly render such practice nonexploitative.

  16. Proba-V Mission Exploitation Platform

    Science.gov (United States)

    Goor, Erwin; Dries, Jeroen

    2017-04-01

    VITO and partners developed the Proba-V Mission Exploitation Platform (MEP) as an end-to-end solution to drastically improve the exploitation of the Proba-V (a Copernicus contributing mission) EO-data archive (http://proba-v.vgt.vito.be/), the past mission SPOT-VEGETATION and derived vegetation parameters by researchers, service providers and end-users. The analysis of time series of data (+1PB) is addressed, as well as the large scale on-demand processing of near real-time data on a powerful and scalable processing environment. Furthermore data from the Copernicus Global Land Service is in scope of the platform. From November 2015 an operational Proba-V MEP environment, as an ESA operation service, is gradually deployed at the VITO data center with direct access to the complete data archive. Since autumn 2016 the platform is operational and yet several applications are released to the users, e.g. - A time series viewer, showing the evolution of Proba-V bands and derived vegetation parameters from the Copernicus Global Land Service for any area of interest. - Full-resolution viewing services for the complete data archive. - On-demand processing chains on a powerfull Hadoop/Spark backend e.g. for the calculation of N-daily composites. - Virtual Machines can be provided with access to the data archive and tools to work with this data, e.g. various toolboxes (GDAL, QGIS, GrassGIS, SNAP toolbox, …) and support for R and Python. This allows users to immediately work with the data without having to install tools or download data, but as well to design, debug and test applications on the platform. - A prototype of jupyter Notebooks is available with some examples worked out to show the potential of the data. Today the platform is used by several third party projects to perform R&D activities on the data, and to develop/host data analysis toolboxes. In parallel the platform is further improved and extended. From the MEP PROBA-V, access to Sentinel-2 and landsat data will

  17. Postural Hand Synergies during Environmental Constraint Exploitation

    Directory of Open Access Journals (Sweden)

    Cosimo Della Santina

    2017-08-01

    Full Text Available Humans are able to intuitively exploit the shape of an object and environmental constraints to achieve stable grasps and perform dexterous manipulations. In doing that, a vast range of kinematic strategies can be observed. However, in this work we formulate the hypothesis that such ability can be described in terms of a synergistic behavior in the generation of hand postures, i.e., using a reduced set of commonly used kinematic patterns. This is in analogy with previous studies showing the presence of such behavior in different tasks, such as grasping. We investigated this hypothesis in experiments performed by six subjects, who were asked to grasp objects from a flat surface. We quantitatively characterized hand posture behavior from a kinematic perspective, i.e., the hand joint angles, in both pre-shaping and during the interaction with the environment. To determine the role of tactile feedback, we repeated the same experiments but with subjects wearing a rigid shell on the fingertips to reduce cutaneous afferent inputs. Results show the persistence of at least two postural synergies in all the considered experimental conditions and phases. Tactile impairment does not alter significantly the first two synergies, and contact with the environment generates a change only for higher order Principal Components. A good match also arises between the first synergy found in our analysis and the first synergy of grasping as quantified by previous work. The present study is motivated by the interest of learning from the human example, extracting lessons that can be applied in robot design and control. Thus, we conclude with a discussion on implications for robotics of our findings.

  18. Exploiting core knowledge for visual object recognition.

    Science.gov (United States)

    Schurgin, Mark W; Flombaum, Jonathan I

    2017-03-01

    Humans recognize thousands of objects, and with relative tolerance to variable retinal inputs. The acquisition of this ability is not fully understood, and it remains an area in which artificial systems have yet to surpass people. We sought to investigate the memory process that supports object recognition. Specifically, we investigated the association of inputs that co-occur over short periods of time. We tested the hypothesis that human perception exploits expectations about object kinematics to limit the scope of association to inputs that are likely to have the same token as a source. In several experiments we exposed participants to images of objects, and we then tested recognition sensitivity. Using motion, we manipulated whether successive encounters with an image took place through kinematics that implied the same or a different token as the source of those encounters. Images were injected with noise, or shown at varying orientations, and we included 2 manipulations of motion kinematics. Across all experiments, memory performance was better for images that had been previously encountered with kinematics that implied a single token. A model-based analysis similarly showed greater memory strength when images were shown via kinematics that implied a single token. These results suggest that constraints from physics are built into the mechanisms that support memory about objects. Such constraints-often characterized as 'Core Knowledge'-are known to support perception and cognition broadly, even in young infants. But they have never been considered as a mechanism for memory with respect to recognition. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  19. Thermal Property Engineering: Exploiting the Properties of Ceramic Nanocomposites

    Science.gov (United States)

    2018-03-01

    ARL-TR-8308 ● MAR 2018 US Army Research Laboratory Thermal Property Engineering : Exploiting the Properties of Ceramic...return it to the originator. ARL-TR-8308 ● MAR 2018 US Army Research Laboratory Thermal Property Engineering : Exploiting the...2015 – Dec 31 2017 4. TITLE AND SUBTITLE Thermal Property Engineering : Exploiting the Properties of Ceramic Nanocomposites 5a. CONTRACT NUMBER 5b

  20. Uncertainty in sap flow-based transpiration due to xylem properties

    Science.gov (United States)

    Looker, N. T.; Hu, J.; Martin, J. T.; Jencso, K. G.

    2014-12-01

    Transpiration, the evaporative loss of water from plants through their stomata, is a key component of the terrestrial water balance, influencing streamflow as well as regional convective systems. From a plant physiological perspective, transpiration is both a means of avoiding destructive leaf temperatures through evaporative cooling and a consequence of water loss through stomatal uptake of carbon dioxide. Despite its hydrologic and ecological significance, transpiration remains a notoriously challenging process to measure in heterogeneous landscapes. Sap flow methods, which estimate transpiration by tracking the velocity of a heat pulse emitted into the tree sap stream, have proven effective for relating transpiration dynamics to climatic variables. To scale sap flow-based transpiration from the measured domain (often area) to the whole-tree level, researchers generally assume constancy of scale factors (e.g., wood thermal diffusivity (k), radial and azimuthal distributions of sap velocity, and conducting sapwood area (As)) through time, across space, and within species. For the widely used heat-ratio sap flow method (HRM), we assessed the sensitivity of transpiration estimates to uncertainty in k (a function of wood moisture content and density) and As. A sensitivity analysis informed by distributions of wood moisture content, wood density and As sampled across a gradient of water availability indicates that uncertainty in these variables can impart substantial error when scaling sap flow measurements to the whole tree. For species with variable wood properties, the application of the HRM assuming a spatially constant k or As may systematically over- or underestimate whole-tree transpiration rates, resulting in compounded error in ecosystem-scale estimates of transpiration.

  1. A lightweight, flow-based toolkit for parallel and distributed bioinformatics pipelines

    Directory of Open Access Journals (Sweden)

    Cieślik Marcin

    2011-02-01

    Full Text Available Abstract Background Bioinformatic analyses typically proceed as chains of data-processing tasks. A pipeline, or 'workflow', is a well-defined protocol, with a specific structure defined by the topology of data-flow interdependencies, and a particular functionality arising from the data transformations applied at each step. In computer science, the dataflow programming (DFP paradigm defines software systems constructed in this manner, as networks of message-passing components. Thus, bioinformatic workflows can be naturally mapped onto DFP concepts. Results To enable the flexible creation and execution of bioinformatics dataflows, we have written a modular framework for parallel pipelines in Python ('PaPy'. A PaPy workflow is created from re-usable components connected by data-pipes into a directed acyclic graph, which together define nested higher-order map functions. The successive functional transformations of input data are evaluated on flexibly pooled compute resources, either local or remote. Input items are processed in batches of adjustable size, all flowing one to tune the trade-off between parallelism and lazy-evaluation (memory consumption. An add-on module ('NuBio' facilitates the creation of bioinformatics workflows by providing domain specific data-containers (e.g., for biomolecular sequences, alignments, structures and functionality (e.g., to parse/write standard file formats. Conclusions PaPy offers a modular framework for the creation and deployment of parallel and distributed data-processing workflows. Pipelines derive their functionality from user-written, data-coupled components, so PaPy also can be viewed as a lightweight toolkit for extensible, flow-based bioinformatics data-processing. The simplicity and flexibility of distributed PaPy pipelines may help users bridge the gap between traditional desktop/workstation and grid computing. PaPy is freely distributed as open-source Python code at http://muralab.org/PaPy, and

  2. Exploiting Laboratory and Heliophysics Plasma Synergies

    Directory of Open Access Journals (Sweden)

    Jill Dahlburg

    2010-05-01

    Full Text Available Recent advances in space-based heliospheric observations, laboratory experimentation, and plasma simulation codes are creating an exciting new cross-disciplinary opportunity for understanding fast energy release and transport mechanisms in heliophysics and laboratory plasma dynamics, which had not been previously accessible. This article provides an overview of some new observational, experimental, and computational assets, and discusses current and near-term activities towards exploitation of synergies involving those assets. This overview does not claim to be comprehensive, but instead covers mainly activities closely associated with the authors’ interests and reearch. Heliospheric observations reviewed include the Sun Earth Connection Coronal and Heliospheric Investigation (SECCHI on the National Aeronautics and Space Administration (NASA Solar Terrestrial Relations Observatory (STEREO mission, the first instrument to provide remote sensing imagery observations with spatial continuity extending from the Sun to the Earth, and the Extreme-ultraviolet Imaging Spectrometer (EIS on the Japanese Hinode spacecraft that is measuring spectroscopically physical parameters of the solar atmosphere towards obtaining plasma temperatures, densities, and mass motions. The Solar Dynamics Observatory (SDO and the upcoming Solar Orbiter with the Heliospheric Imager (SoloHI on-board will also be discussed. Laboratory plasma experiments surveyed include the line-tied magnetic reconnection experiments at University of Wisconsin (relevant to coronal heating magnetic flux tube observations and simulations, and a dynamo facility under construction there; the Space Plasma Simulation Chamber at the Naval Research Laboratory that currently produces plasmas scalable to ionospheric and magnetospheric conditions and in the future also will be suited to study the physics of the solar corona; the Versatile Toroidal Facility at the Massachusetts Institute of Technology that

  3. Early Sexual Exploitation as an Influence in Prostitution.

    Science.gov (United States)

    Silbert, Mimi H.; Pines, Ayala M.

    1983-01-01

    Surveyed 200 female street prostitutes to determine whether they were sexually exploited during childhood. Results showed 60 percent of the subjects were sexually exploited. The few girls who discussed their abuse with others were met with shame and most often inaction. Only 10 percent were abused by strangers. (JAC)

  4. A Descriptive Study on Sexually Exploited Children in Residential Treatment

    Science.gov (United States)

    Twill, Sarah E.; Green, Denise M.; Traylor, Amy

    2010-01-01

    Sexual exploitation and prostitution of children and adolescents is a multibillion dollar industry in the United States (Estes and Weiner in "Medical, legal & social science aspects of child sexual exploitation: A comprehensive review of pornography, prostitution, and internet crimes, vol I," G.W. Medical Publishing, Inc, St Louis,…

  5. Exploiting opportunities at all cost? Entrepreneurial intent and externalities

    NARCIS (Netherlands)

    Urbig, D.; Weitzel, G.U.; Rosenkranz, S.; van Witteloostuijn, A.

    2011-01-01

    they exploit welfare-enhancing opportunities as it is assumed in several normative models? Do we need to prevent potential entrepreneurs from being destructive or are there intrinsic limits to harm others? We experimentally investigate how people with different entrepreneurial intent exploit risky

  6. Exploitation program of ''Adamow'' quarry up to 2015

    International Nuclear Information System (INIS)

    Hadlaw, A.

    1994-01-01

    The brown coal deposits exploited by the quarry ''Adamow'' located in Central Poland are shortly described and the prognosis of their exploitation up to 2015 is given. The basis data on the perspective deposits in the quarry's area are also presented. All deposits are shown on the map. 3 ills, 2 tabs

  7. Panel discussion on exploitation of geothermal resources in thermal zones

    Energy Technology Data Exchange (ETDEWEB)

    Viramonte, J G; Mange, J; Stefani, G

    1978-03-01

    The topics discussed include the major known geothermal resources, varying ways of exploiting geothermal resources, technical and economic difficulties in the exploitation, the place of geothermal energy in the total energy policy of a given country, advanced exploration techniques, and indications of needed areas of study. The panelists represented most of the South American countries, Mexico, and Italy. (JSR)

  8. Making and exploiting fullerenes, graphene, and carbon nanotubes

    Energy Technology Data Exchange (ETDEWEB)

    Marcaccio, Massimo; Paolucci, Francesco (eds.) [Bologna Univ. (Italy). Dept. of Chemistry G. Ciamician

    2014-11-01

    This volume contains nine chapters which are presenting critical reviews of the present and future trends in modern chemistry research. The chapter ''Solubilization of Fullerenes, Carbon Nanotubes and Graphene'' by Alain Penicaud describes the various ingenious approaches to solve the solubility issue and describes in particular how graphite, and modern nanocarbons, can be made soluble by reductive dissolution. A large part of the present volume concerns the merging of nanocarbons with nanotechnology and their impact on technical development in many areas. Fullerenes, carbon nanotubes, nanodiamond and graphene find, for instance, various applications in the development of solar cells, including dye sensitized solar cells. The chapter ''Incorporation of Balls, Tubes and Bowls in Nanotechnology'' by James Mack describes the recent development of the area of fullerene fragments, and corannulene in particular, and their direct applications to organic light emitting diode (OLED) technology, while, in the chapter ''Exploiting Nanocarbons in Dye-Sensitized Solar Cells'' by Ladislav Kavan, the exploitation of nanocarbons in the development of novel dye sensitized solar cells with improved efficiency, durability and costs is thoroughly reviewed. The functionalization of CNSs has the invaluable advantage of combining their unique properties with those of other classes of materials. Supramolecular chemistry represents an elegant alternative approach for the construction of functional systems by means of noncovalent bonding interactions. In the chapter ''Supramolecular Chemistry of Carbon Nanotubes'' by Gildas Gavrel et al., the incredibly varied world of supramolecular, non-covalent functionalization of carbon nanotubes and their applications is examined and reviewed, and the synthetic strategies devised for fabricating mechanically-linked molecular architectures are described in the chapter &apos

  9. Making and exploiting fullerenes, graphene, and carbon nanotubes

    International Nuclear Information System (INIS)

    Marcaccio, Massimo; Paolucci, Francesco

    2014-01-01

    This volume contains nine chapters which are presenting critical reviews of the present and future trends in modern chemistry research. The chapter ''Solubilization of Fullerenes, Carbon Nanotubes and Graphene'' by Alain Penicaud describes the various ingenious approaches to solve the solubility issue and describes in particular how graphite, and modern nanocarbons, can be made soluble by reductive dissolution. A large part of the present volume concerns the merging of nanocarbons with nanotechnology and their impact on technical development in many areas. Fullerenes, carbon nanotubes, nanodiamond and graphene find, for instance, various applications in the development of solar cells, including dye sensitized solar cells. The chapter ''Incorporation of Balls, Tubes and Bowls in Nanotechnology'' by James Mack describes the recent development of the area of fullerene fragments, and corannulene in particular, and their direct applications to organic light emitting diode (OLED) technology, while, in the chapter ''Exploiting Nanocarbons in Dye-Sensitized Solar Cells'' by Ladislav Kavan, the exploitation of nanocarbons in the development of novel dye sensitized solar cells with improved efficiency, durability and costs is thoroughly reviewed. The functionalization of CNSs has the invaluable advantage of combining their unique properties with those of other classes of materials. Supramolecular chemistry represents an elegant alternative approach for the construction of functional systems by means of noncovalent bonding interactions. In the chapter ''Supramolecular Chemistry of Carbon Nanotubes'' by Gildas Gavrel et al., the incredibly varied world of supramolecular, non-covalent functionalization of carbon nanotubes and their applications is examined and reviewed, and the synthetic strategies devised for fabricating mechanically-linked molecular architectures are described in the chapter ''Fullerene-Stoppered Bistable Rotaxanes'' by Aurelio Mateo-Alonso, which presents an

  10. [Ecotourism exploitation model in Bita Lake Natural Reserve of Yunnan].

    Science.gov (United States)

    Yang, G; Wang, Y; Zhong, L

    2000-12-01

    Bita lake provincial natural reserve is located in Shangri-La region of North-western Yunnan, and was set as a demonstrating area for ecotourism exploitation in 1998. After a year's exploitation construction and half a year's operation as a branch of the 99' Kunming International Horticulture Exposition to accept tourists, it was proved that the ecotourism demonstrating area attained four integrated functions of ecotourism, i.e., tourism, protection, poverty clearing and environment education. Five exploitation and management models including function zoned exploitation model, featured tourism communication model signs system designing model, local Tibetan family reception model and environmental monitoring model, were also successful, which were demonstrated and spreaded to the whole province. Bita lake provincial natural reserve could be a good sample for the ecotourism exploitation natural reserves of the whole country.

  11. CellSs: Scheduling Techniques to Better Exploit Memory Hierarchy

    Directory of Open Access Journals (Sweden)

    Pieter Bellens

    2009-01-01

    Full Text Available Cell Superscalar's (CellSs main goal is to provide a simple, flexible and easy programming approach for the Cell Broadband Engine (Cell/B.E. that automatically exploits the inherent concurrency of the applications at a task level. The CellSs environment is based on a source-to-source compiler that translates annotated C or Fortran code and a runtime library tailored for the Cell/B.E. that takes care of the concurrent execution of the application. The first efforts for task scheduling in CellSs derived from very simple heuristics. This paper presents new scheduling techniques that have been developed for CellSs for the purpose of improving an application's performance. Additionally, the design of a new scheduling algorithm is detailed and the algorithm evaluated. The CellSs scheduler takes an extension of the memory hierarchy for Cell/B.E. into account, with a cache memory shared between the SPEs. All new scheduling practices have been evaluated showing better behavior of our system.

  12. Environmental Factors and Zoonotic Pathogen Ecology in Urban Exploiter Species.

    Science.gov (United States)

    Rothenburger, Jamie L; Himsworth, Chelsea H; Nemeth, Nicole M; Pearl, David L; Jardine, Claire M

    2017-09-01

    Knowledge of pathogen ecology, including the impacts of environmental factors on pathogen and host dynamics, is essential for determining the risk that zoonotic pathogens pose to people. This review synthesizes the scientific literature on environmental factors that influence the ecology and epidemiology of zoonotic microparasites (bacteria, viruses and protozoa) in globally invasive urban exploiter wildlife species (i.e., rock doves [Columba livia domestica], European starlings [Sturnus vulgaris], house sparrows [Passer domesticus], Norway rats [Rattus norvegicus], black rats [R. rattus] and house mice [Mus musculus]). Pathogen ecology, including prevalence and pathogen characteristics, is influenced by geographical location, habitat, season and weather. The prevalence of zoonotic pathogens in mice and rats varies markedly over short geographical distances, but tends to be highest in ports, disadvantaged (e.g., low income) and residential areas. Future research should use epidemiological approaches, including random sampling and robust statistical analyses, to evaluate a range of biotic and abiotic environmental factors at spatial scales suitable for host home range sizes. Moving beyond descriptive studies to uncover the causal factors contributing to uneven pathogen distribution among wildlife hosts in urban environments may lead to targeted surveillance and intervention strategies. Application of this knowledge to urban maintenance and planning may reduce the potential impacts of urban wildlife-associated zoonotic diseases on people.

  13. Augmented reality enabling intelligence exploitation at the edge

    Science.gov (United States)

    Kase, Sue E.; Roy, Heather; Bowman, Elizabeth K.; Patton, Debra

    2015-05-01

    Today's Warfighters need to make quick decisions while interacting in densely populated environments comprised of friendly, hostile, and neutral host nation locals. However, there is a gap in the real-time processing of big data streams for edge intelligence. We introduce a big data processing pipeline called ARTEA that ingests, monitors, and performs a variety of analytics including noise reduction, pattern identification, and trend and event detection in the context of an area of operations (AOR). Results of the analytics are presented to the Soldier via an augmented reality (AR) device Google Glass (Glass). Non-intrusive AR devices such as Glass can visually communicate contextually relevant alerts to the Soldier based on the current mission objectives, time, location, and observed or sensed activities. This real-time processing and AR presentation approach to knowledge discovery flattens the intelligence hierarchy enabling the edge Soldier to act as a vital and active participant in the analysis process. We report preliminary observations testing ARTEA and Glass in a document exploitation and person of interest scenario simulating edge Soldier participation in the intelligence process in disconnected deployment conditions.

  14. Plant stress signalling: understanding and exploiting plant-plant interactions.

    Science.gov (United States)

    Pickett, J A; Rasmussen, H B; Woodcock, C M; Matthes, M; Napier, J A

    2003-02-01

    When plants are attacked by insects, volatile chemical signals can be released, not only from the damaged parts, but also systemically from other parts of the plant and this continues after cessation of feeding by the insect. These signals are perceived by olfactory sensory mechanisms in both the herbivorous insects and their parasites. Molecular structures involved can be characterized by means of electrophysiological assays, using the insect sensory system linked to chemical analysis. Evidence is mounting that such signals can also affect neighbouring intact plants, which initiate defence by the induction of further signalling systems, such as those that increase parasitoid foraging. Furthermore, insect electrophysiology can be used in the identification of plant compounds having effects on the plants themselves. It has been found recently that certain plants can release stress signals even when undamaged, and that these can cause defence responses in intact plants. These discoveries provide the basis for new crop protection strategies, that are either delivered by genetic modification of plants or by conventionally produced plants to which the signal is externally applied. Delivery can also be made by means of mixed seed strategies in which the provoking and recipient plants are grown together. Related signalling discoveries within the rhizosphere seem set to extend these approaches into new ways of controlling weeds, by exploiting the elusive potential of allelopathy, but through signalling rather than by direct physiological effects.

  15. Exploitation of Documented Historical Floods for Achieving Better Flood Defense

    Directory of Open Access Journals (Sweden)

    Slobodan Kolaković

    2016-01-01

    Full Text Available Establishing Base Flood Elevation for a stream network corresponding to a big catchment is feasible by interdisciplinary approach, involving stochastic hydrology, river hydraulics, and computer aided simulations. A numerical model calibrated by historical floods has been exploited in this study. The short presentation of the catchment of the Tisza River in this paper is followed by the overview of historical floods which hit the region in the documented period of 130 years. Several well documented historical floods provided opportunity for the calibration of the chosen numerical model. Once established, the model could be used for investigation of different extreme flood scenarios and to establish the Base Flood Elevation. The calibration has shown that the coefficient of friction in case of the Tisza River is dependent both on the actual water level and on the preceding flood events. The effect of flood plain maintenance as well as the activation of six potential detention ponds on flood mitigation has been examined. Furthermore, the expected maximum water levels have also been determined for the case if the ever observed biggest 1888 flood hit the region again. The investigated cases of flood superposition highlighted the impact of tributary Maros on flood mitigation along the Tisza River.

  16. Design principles of a conditional futile cycle exploited for regulation.

    Science.gov (United States)

    Tolla, Dean A; Kiley, Patricia J; Lomnitz, Jason G; Savageau, Michael A

    2015-07-01

    In this report, we characterize the design principles of futile cycling in providing rapid adaptation by regulatory proteins that act as environmental sensors. In contrast to the energetically wasteful futile cycles that are avoided in metabolic pathways, here we describe a conditional futile cycle exploited for a regulatory benefit. The FNR (fumarate and nitrate reduction) cycle in Escherichia coli operates under two regimes - a strictly futile cycle in the presence of O2 and as a pathway under anoxic conditions. The computational results presented here use FNR as a model system and provide evidence that cycling of this transcription factor and its labile sensory cofactor between active and inactive states affords rapid signaling and adaptation. We modify a previously developed mechanistic model to examine a family of FNR models each with different cycling speeds but mathematically constrained to be otherwise equivalent, and we identify a trade-off between energy expenditure and response time that can be tuned by evolution to optimize cycling rate of the FNR system for a particular ecological context. Simulations mimicking experiments with proposed double mutant strains offer suggestions for experimentally testing our predictions and identifying potential fitness effects. Our approach provides a computational framework for analyzing other conditional futile cycles, which when placed in their larger biological context may be found to confer advantages to the organism.

  17. Fit for purpose quality management system for military forensic exploitation.

    Science.gov (United States)

    Wilson, Lauren Elizabeth; Gahan, Michelle Elizabeth; Robertson, James; Lennard, Chris

    2018-03-01

    In a previous publication we described a systems approach to forensic science applied in the military domain. The forensic science 'system of systems' describes forensic science as a sub-system in the larger criminal justice, law enforcement, intelligence, and military systems, with quality management being an important supporting system. Quality management systems help to ensure that organisations achieve their objective and continually improve their capability. Components of forensic science quality management systems can include standardisation of processes, accreditation of facilities to national/international standards, and certification of personnel. A fit for purpose quality management system should be balanced to allow organisations to meet objectives, provide continuous improvement; mitigate risk; and impart a positive quality culture. Considerable attention over the last decades has been given to the need for forensic science quality management systems to meet criminal justice and law enforcement objectives. More recently, the need for the forensic quality management systems to meet forensic intelligence objectives has been considered. This paper, for the first time, discusses the need for a fit for purpose quality management system for military forensic exploitation. Crown Copyright © 2018. Published by Elsevier B.V. All rights reserved.

  18. Chitosan-based nanosystems and their exploited antimicrobial activity.

    Science.gov (United States)

    Perinelli, Diego Romano; Fagioli, Laura; Campana, Raffaella; Lam, Jenny K W; Baffone, Wally; Palmieri, Giovanni Filippo; Casettari, Luca; Bonacucina, Giulia

    2018-05-30

    Chitosan is a biodegradable and biocompatible natural polysaccharide that has a wide range of applications in the field of pharmaceutics, biomedical, chemical, cosmetics, textile and food industry. One of the most interesting characteristics of chitosan is its antibacterial and antifungal activity, and together with its excellent safety profile in human, it has attracted considerable attention in various research disciplines. The antimicrobial activity of chitosan is dependent on a number of factors, including its molecular weight, degree of deacetylation, degree of substitution, physical form, as well as structural properties of the cell wall of the target microorganisms. While the sole use of chitosan may not be sufficient to produce an adequate antimicrobial effect to fulfil different purposes, the incorporation of this biopolymer with other active substances such as drugs, metals and natural compounds in nanosystems is a commonly employed strategy to enhance its antimicrobial potential. In this review, we aim to provide an overview on the different approaches that exploit the antimicrobial activity of chitosan-based nanosystems and their applications, and highlight the latest advances in this field. Copyright © 2018 Elsevier B.V. All rights reserved.

  19. A novel flow-based strategy for implementing differential kinetic analysis

    International Nuclear Information System (INIS)

    Fortes, Paula R.; Meneses, Silvia R.P.; Zagatto, Elias A.G.

    2006-01-01

    Differential kinetic analysis can be implemented in a multi-pumping flow system, and this was demonstrated in relation to an improved spectrophotometric catalytic determination of iron and vanadium in Fe-V alloys. The method exploited the influence of Fe(II) and V(IV) on the rate of iodide oxidation by Cr(VI) under acidic conditions; therefore the Jones reductor was needed. The sample was inserted into an acidic KI stream that acted also as carrier stream, and a Cr(VI) solution was added by confluence. Successive measurements were performed during sample passage through the detector, each one related to a different yet reproducible condition for reaction development. Data treatment involved multivariate calibration by the PLS algorithm. The proposed system is very simple and rugged, allowing about 50 samples to be run per hour, meaning 48 mg KI per determination. The first two latent variables carry ca. 94% of the analytical information, pointing out that the intrinsic dimensionality of the data set is two. Results are in agreement with inductively coupled argon plasma-optical emission spectrometry

  20. The evolution and exploitation of the fiber-optic hydrophone

    Science.gov (United States)

    Hill, David J.

    2007-07-01

    In the late 1970s one of the first applications identified for fibre-optic sensing was the fibre-optic hydrophone. It was recognised that the technology had the potential to provide a cost effective solution for large-scale arrays of highly sensitive hydrophones which could be interrogated over large distances. Consequently both the United Kingdom and United States navies funded the development of this sonar technology to the point that it is now deployed on submarines and as seabed arrays. The basic design of a fibre-optic hydrophone has changed little; comprising a coil of optical fibre wound on a compliant mandrel, interrogated using interferometric techniques. Although other approaches are being investigated, including the development of fibre-laser hydrophones, the interferometric approach remains the most efficient way to create highly multiplexed arrays of acoustic sensors. So much so, that the underlying technology is now being exploited in civil applications. Recently the exploration and production sector of the oil and gas industry has begun funding the development of fibre-optic seismic sensing using seabed mounted, very large-scale arrays of four component (three accelerometers and a hydrophone) packages based upon the original technology developed for sonar systems. This has given new impetus to the development of the sensors and the associated interrogation systems which has led to the technology being adopted for other commercial uses. These include the development of networked in-road fibre-optic Weigh-in-Motion sensors and of intruder detection systems which are able to acoustically monitor long lengths of border, on both land and at sea. After two decades, the fibre-optic hydrophone and associated technology has matured and evolved into a number of highly capable sensing solutions used by a range of industries.

  1. Rationalising predictors of child sexual exploitation and sex-trading.

    Science.gov (United States)

    Klatt, Thimna; Cavner, Della; Egan, Vincent

    2014-02-01

    Although there is evidence for specific risk factors leading to child sexual exploitation and prostitution, these influences overlap and have rarely been examined concurrently. The present study examined case files for 175 young persons who attended a voluntary organization in Leicester, United Kingdom, which supports people who are sexually exploited or at risk of sexual exploitation. Based on the case files, the presence or absence of known risk factors for becoming a sex worker was coded. Data were analyzed using t-test, logistic regression, and smallest space analysis. Users of the voluntary organization's services who had been sexually exploited exhibited a significantly greater number of risk factors than service users who had not been victims of sexual exploitation. The logistic regression produced a significant model fit. However, of the 14 potential predictors--many of which were associated with each other--only four variables significantly predicted actual sexual exploitation: running away, poverty, drug and/or alcohol use, and having friends or family members in prostitution. Surprisingly, running away was found to significantly decrease the odds of becoming involved in sexual exploitation. Smallest space analysis of the data revealed 5 clusters of risk factors. Two of the clusters, which reflected a desperation and need construct and immature or out-of-control lifestyles, were significantly associated with sexual exploitation. Our research suggests that some risk factors (e.g. physical and emotional abuse, early delinquency, and homelessness) for becoming involved in sexual exploitation are common but are part of the problematic milieu of the individuals affected and not directly associated with sex trading itself. Our results also indicate that it is important to engage with the families and associates of young persons at risk of becoming (or remaining) a sex worker if one wants to reduce the numbers of persons who engage in this activity. Copyright

  2. Implementation synergies that exploit situational knowledge strategically

    DEFF Research Database (Denmark)

    Quitzau, Maj-Britt; Petersen, Jens-Phillip

    This paper illustrates how strategic and situated forms of knowledge may increase capacity to implement energy strategies in local urban development projects. Through analysis of front runner implementation projects, we show that the involved planners utilize situational learning processes...... strategically to develop more viable implementation trajectories. These findings resonate well with relational and network orienteered research in contemporary planning theory. In the selected case studies, we can see that planners deliberately seek to extend traditional planning approaches, like e.......g. regulation, with broader context‐specific learning processes. In doing so, we argue that – what we call – an implementation synergy is established by interlacing different forms of situational knowledge with strategic knowledge about how to reach a desired energy target. In conclusion, the paper identifies...

  3. A fuzzy model for exploiting customer requirements

    Directory of Open Access Journals (Sweden)

    Zahra Javadirad

    2016-09-01

    Full Text Available Nowadays, Quality function deployment (QFD is one of the total quality management tools, where customers’ views and requirements are perceived and using various techniques improves the production requirements and operations. The QFD department, after identification and analysis of the competitors, takes customers’ feedbacks to meet the customers’ demands for the products compared with the competitors. In this study, a comprehensive model for assessing the importance of the customer requirements in the products or services for an organization is proposed. The proposed study uses linguistic variables, as a more comprehensive approach, to increase the precision of the expression evaluations. The importance of these requirements specifies the strengths and weaknesses of the organization in meeting the requirements relative to competitors. The results of these experiments show that the proposed method performs better than the other methods.

  4. Meaning, function and methods of the recultivation in mining exploitation

    OpenAIRE

    Dambov, Risto; Ljatifi, Ejup

    2015-01-01

    With the exploitation of mineral resources is performed degradation and deformation of the relief and the general part of surface of the Earth's crust. Depending on the type of open pit mine, this degradation can be expressed to a lesser or greater extent, and sometimes in several square kilometers. The exploitation of mineral resources is with unbreakable link with the environment. Very often it is said that mining is „enemy No. 1“ for environment. With exploitation comes to degradation of h...

  5. The possibilities of exploitation of Serbian thermomineral waters

    International Nuclear Information System (INIS)

    Jovanovic, L.

    2002-01-01

    Global ecological problem of petrol resources deficit caused an intensive search of alternative energy sources. Deficit of conventional energy fluids in Yugoslavia requires serious efforts to create a program of alternative energy sources exploitation. Geothermal energy represents an important energetic source for the countries with poor energy resources. Geothermal energy can become the basis for economic development. At present these geothermal resources are not being exploited in Yugoslavia. The possibilities of effective exploitation of thermal and thermomineral water resources in Yugoslavia are presented in this paper

  6. Imouraren mining exploitation : Complementary studies Synthetic report Volum B - Mines

    International Nuclear Information System (INIS)

    1980-01-01

    The object of the current study is to determine the main technical characteristics of the reference project of a mine that can supply the necessary ore quantity at a production of 3000 tonnes uranium per year, along 10 years. The project is one of the possible solutions for exploiting the mine. The current study permits to establish : investment and functioning cost estimation, overall project of the mining exploitation program, necessary strength estimation, average ore grades evaluation and variations of these grades, utilities needs, production vizing program, main exploitation methods and necessary materials. Reference project study of the mine serves as base to the economics studies and studies optimization [fr

  7. Mobile clouds exploiting distributed resources in wireless, mobile and social networks

    CERN Document Server

    Fitzek, Frank H P

    2013-01-01

    Includes a preface written by Professor Leonard Kleinrock, Distinguished Professor of Computer Science, UCLA, USA This book discusses and explores the concept of mobile cloud, creating an inspiring research space for exploiting opportunistic resource sharing, and covering from theoretical research approaches to the development of commercially profitable ideas. A mobile cloud is a cooperative arrangement of dynamically connected communication nodes sharing opportunistic resources. In this book, authors provide a comprehensive and motivating overview of this rapidly emerging technology. The b

  8. Rapid Exploitation and Analysis of Documents

    Energy Technology Data Exchange (ETDEWEB)

    Buttler, D J; Andrzejewski, D; Stevens, K D; Anastasiu, D; Gao, B

    2011-11-28

    Analysts are overwhelmed with information. They have large archives of historical data, both structured and unstructured, and continuous streams of relevant messages and documents that they need to match to current tasks, digest, and incorporate into their analysis. The purpose of the READ project is to develop technologies to make it easier to catalog, classify, and locate relevant information. We approached this task from multiple angles. First, we tackle the issue of processing large quantities of information in reasonable time. Second, we provide mechanisms that allow users to customize their queries based on latent topics exposed from corpus statistics. Third, we assist users in organizing query results, adding localized expert structure over results. Forth, we use word sense disambiguation techniques to increase the precision of matching user generated keyword lists with terms and concepts in the corpus. Fifth, we enhance co-occurrence statistics with latent topic attribution, to aid entity relationship discovery. Finally we quantitatively analyze the quality of three popular latent modeling techniques to examine under which circumstances each is useful.

  9. Exploiting relational database technology in a GIS

    Science.gov (United States)

    Batty, Peter

    1992-05-01

    All systems for managing data face common problems such as backup, recovery, auditing, security, data integrity, and concurrent update. Other challenges include the ability to share data easily between applications and to distribute data across several computers, whereas continuing to manage the problems already mentioned. Geographic information systems are no exception, and need to tackle all these issues. Standard relational database-management systems (RDBMSs) provide many features to help solve the issues mentioned so far. This paper describes how the IBM geoManager product approaches these issues by storing all its geographic data in a standard RDBMS in order to take advantage of such features. Areas in which standard RDBMS functions need to be extended are highlighted, and the way in which geoManager does this is explained. The performance implications of storing all data in the relational database are discussed. An important distinction is made between the storage and management of geographic data and the manipulation and analysis of geographic data, which needs to be made when considering the applicability of relational database technology to GIS.

  10. Conflicts Related to Natural Resources Exploitation: A Case Study of ...

    African Journals Online (AJOL)

    Conflicts Related to Natural Resources Exploitation: A Case Study of Oil Crisis in Nigeria's Niger Delta Region and its Socio-Political and Economic Implications. ... on the environment leading to pollution of land, rivers, creeks and waterways.

  11. Exploitation of unconventional protein sources in the feed of weaner ...

    African Journals Online (AJOL)

    Exploitation of unconventional protein sources in the feed of weaner rabbits ... as protein sources for feeding ruminants but rarely considered as feed for micro ... 26.88 g/100g DM in Centrosema pubescens and Moringa oleifera, respectively.

  12. Exploiting Formation Flying for Fuel Saving Supersonic Oblique Wing Aircraft

    Science.gov (United States)

    2007-07-01

    used and developed during recent wing / winglet / morphing design programmes (Refs.13-14). By exploiting this method, we have assessed the aerodynamics ...parameters, Propulsion Issues, Size Issues, Aero-elastic effects 15. SUBJECT TERMS EOARD, Control System, Aerodynamics 16...

  13. Human trafficking and exploitation: A global health concern.

    Science.gov (United States)

    Zimmerman, Cathy; Kiss, Ligia

    2017-11-01

    In this collection review, Cathy Zimmerman and colleague introduce the PLOS Medicine Collection on Human Trafficking, Exploitation and Health, laying out the magnitude of the global trafficking problem and offering a public health policy framework to guide responses to trafficking.

  14. Uncertainty avoidance and the exploration-exploitation trade-off

    NARCIS (Netherlands)

    Broekhuizen, Thijs; Giarratana, Marco S.; Torres, Anna

    2017-01-01

    Purpose - This study aims to investigate how a firm's uncertainty avoidance - as indicated by the headquarters' national culture - impacts firm performance by affecting exploratory (product innovation) and exploitative (brand trademark protection) activities. It aims to show that firms characterized

  15. Enhanced surrogate models for statistical design exploiting space mapping technology

    DEFF Research Database (Denmark)

    Koziel, Slawek; Bandler, John W.; Mohamed, Achmed S.

    2005-01-01

    We present advances in microwave and RF device modeling exploiting Space Mapping (SM) technology. We propose new SM modeling formulations utilizing input mappings, output mappings, frequency scaling and quadratic approximations. Our aim is to enhance circuit models for statistical analysis...

  16. Trajectories and cycles of sexual exploitation and trafficking for sexual exploitation of women in the Peruvian Amazon

    OpenAIRE

    Mujica, Jaris

    2015-01-01

    The commercial sexual exploitation is a constant activity in the Peruvian Amazon. Around the river port of Pucallpa in ucayali region, the practice appears systematically: teenage attend taverns around the port, and those dedicated to the work of cooking camps logging, are victims of constant exploitation and many also of trafficking. this article aims to reconstruct the path of life and reproductive cycle of the forms of exploitation in a sample of 20 women, and focuses on: (i) evidence of s...

  17. Exploiting PubChem for Virtual Screening.

    Science.gov (United States)

    Xie, Xiang-Qun

    2010-12-01

    IMPORTANCE OF THE FIELD: PubChem is a public molecular information repository, a scientific showcase of the NIH Roadmap Initiative. The PubChem database holds over 27 million records of unique chemical structures of compounds (CID) derived from nearly 70 million substance depositions (SID), and contains more than 449,000 bioassay records with over thousands of in vitro biochemical and cell-based screening bioassays established, with targeting more than 7000 proteins and genes linking to over 1.8 million of substances. AREAS COVERED IN THIS REVIEW: This review builds on recent PubChem-related computational chemistry research reported by other authors while providing readers with an overview of the PubChem database, focusing on its increasing role in cheminformatics, virtual screening and toxicity prediction modeling. WHAT THE READER WILL GAIN: These publicly available datasets in PubChem provide great opportunities for scientists to perform cheminformatics and virtual screening research for computer-aided drug design. However, the high volume and complexity of the datasets, in particular the bioassay-associated false positives/negatives and highly imbalanced datasets in PubChem, also creates major challenges. Several approaches regarding the modeling of PubChem datasets and development of virtual screening models for bioactivity and toxicity predictions are also reviewed. TAKE HOME MESSAGE: Novel data-mining cheminformatics tools and virtual screening algorithms are being developed and used to retrieve, annotate and analyze the large-scale and highly complex PubChem biological screening data for drug design.

  18. Optimization Models for Petroleum Field Exploitation

    Energy Technology Data Exchange (ETDEWEB)

    Jonsbraaten, Tore Wiig

    1998-12-31

    This thesis presents and discusses various models for optimal development of a petroleum field. The objective of these optimization models is to maximize, under many uncertain parameters, the project`s expected net present value. First, an overview of petroleum field optimization is given from the point of view of operations research. Reservoir equations for a simple reservoir system are derived and discretized and included in optimization models. Linear programming models for optimizing production decisions are discussed and extended to mixed integer programming models where decisions concerning platform, wells and production strategy are optimized. Then, optimal development decisions under uncertain oil prices are discussed. The uncertain oil price is estimated by a finite set of price scenarios with associated probabilities. The problem is one of stochastic mixed integer programming, and the solution approach is to use a scenario and policy aggregation technique developed by Rockafellar and Wets although this technique was developed for continuous variables. Stochastic optimization problems with focus on problems with decision dependent information discoveries are also discussed. A class of ``manageable`` problems is identified and an implicit enumeration algorithm for finding optimal decision policy is proposed. Problems involving uncertain reservoir properties but with a known initial probability distribution over possible reservoir realizations are discussed. Finally, a section on Nash-equilibrium and bargaining in an oil reservoir management game discusses the pool problem arising when two lease owners have access to the same underlying oil reservoir. Because the oil tends to migrate, both lease owners have incentive to drain oil from the competitors part of the reservoir. The discussion is based on a numerical example. 107 refs., 31 figs., 14 tabs.

  19. Escaping from the exploitation trap by shaping the digital future

    OpenAIRE

    Füzes, Péter; Gódor, Zoltán; Szabó, Zsolt Roland

    2017-01-01

    Even Fortune 500 firms can disappear quickly, because many of them falls into an exploitation trap. Examples show that certain organizations – that manifest ambidextrous features – can avoid the exploitation trap. But, how can they do it? Authors tracked the digital transformation of a Fortune 500 company in order to understand the strategic and organizational challenges and solutions to become resilient and prosperous. A cutting edge example is shown in the paper about how an industry leader...

  20. The concept of exploitation in international human trafficking law

    OpenAIRE

    von der Pütten, Tuija Kaarina

    2017-01-01

    Human trafficking is commonly known as a criminal practice that takes place in the framework of sex trade: women and children are trafficked within a state, or from one state to another, for the purpose of sexual exploitation. Similarly, the early 20th century international conventions aimed to tackle ‘white slave traffic’, trafficking of women and children for sexual exploitation. However, it is misleading to see trafficking only within this context. People are trafficked so that they can be...

  1. Optic Flow Based State Estimation for an Indoor Micro Air Vehicle

    NARCIS (Netherlands)

    Verveld, M.J.; Chu, Q.P.; De Wagter, C.; Mulder, J.A.

    2010-01-01

    This work addresses the problem of indoor state estimation for autonomous flying vehicles with an optic flow approach. The paper discusses a sensor configuration using six optic flow sensors of the computer mouse type augmented by a three-axis accelerometer to estimate velocity, rotation, attitude

  2. Collaborative DDoS Defense using Flow-based Security Event Information

    NARCIS (Netherlands)

    Steinberger, Jessica; Kuhnert, Benjamin; Sperotto, Anna; Baier, Harald; Pras, Aiko

    Over recent years, network-based attacks evolved to the top concerns responsible for network infrastructure and service outages. To counteract such attacks, an approach is to move mitigation from the target network to the networks of Internet Service Providers (ISP). In addition, exchanging threat

  3. Architecture Synthesis for Cost-Constrained Fault-Tolerant Flow-based Biochips

    DEFF Research Database (Denmark)

    Eskesen, Morten Chabert; Pop, Paul; Potluri, Seetal

    2016-01-01

    . This increase in fabrication complexity has led to an increase in defect rates during the manufacturing, thereby motivating the need to improve the yield, by designing these biochips such that they are fault tolerant. We propose an approach based on a Greedy Randomized Adaptive Search Procedure (GRASP...

  4. Women in mining still exploited and sexually harassed

    Directory of Open Access Journals (Sweden)

    Doret Botha

    2016-11-01

    Full Text Available Orientation: Globally, women have become an essential part of the mining workforce. Among other jobs, they fulfil management positions, operate heavy machinery and are involved in artisanal mining processes. In South Africa, new mining legislation not only prohibits the exclusion of women but requires from companies to actively change the demographic profile of their workforce. Mining companies are obliged to also employ women in core mining activities. Although well intended, women appointed in core positions work side by side with men, often in isolation, and are frequently at risk of sexual abuse and/or harassment. Research purpose: This research determined perceptions regarding the occurrence of sexual harassment among women working in core mining positions. Motivation for the study: Currently, there is a paucity of published data on the occurrence of sexual harassment in the mining industry. Method: A mixed-method research design was used including quantitative and qualitative research paradigms. Quantitative data were collected by means of a structured questionnaire. Qualitative data were collected by means of individual and group interviews. Main findings: From the literature review and the empirical findings, it is evident that women are still exploited and sexually harassed in the mining industry. Incidents taking place on a daily basis vary from whistling; name calling; use of vulgar or derogatory language; display of body parts; physical contact, ranging from touching to sexual assault and rape; to the exchange of sexual favours for promotion. Practical/managerial implications: It is evident from the research that a holistic approach is required to effectively eradicate sexual harassment in the mining industry, involving the commitment of relevant state departments, human resource managers and labour experts. Contribution: Practical recommendations are made to effectively address sexual harassment in the mining industry.

  5. From Exploitation to Industry: Definitions, Risks, and Consequences of Domestic Sexual Exploitation and Sex Work Among Women and Girls

    OpenAIRE

    Gerassi, Lara

    2015-01-01

    In the last 15 years, terms such as prostitution, sex trafficking, sexual exploitation, modern-day slavery, and sex work have elicited much confusion and debate as to their definitions. Consequently several challenges have emerged for both law enforcement in the prosecution of criminals and practitioners in service provision. This article reviews the state of the literature with regard to domestic, sexual exploitation among women and girls in the United States and seeks to (1) provide definit...

  6. Pattern Extraction Algorithm for NetFlow-Based Botnet Activities Detection

    OpenAIRE

    Kozik, Rafał; Choraś, Michał

    2017-01-01

    As computer and network technologies evolve, the complexity of cybersecurity has dramatically increased. Advanced cyber threats have led to current approaches to cyber-attack detection becoming ineffective. Many currently used computer systems and applications have never been deeply tested from a cybersecurity point of view and are an easy target for cyber criminals. The paradigm of security by design is still more of a wish than a reality, especially in the context of constantly evolving sys...

  7. Exploiting heterogeneous publicly available data sources for drug safety surveillance: computational framework and case studies.

    Science.gov (United States)

    Koutkias, Vassilis G; Lillo-Le Louët, Agnès; Jaulent, Marie-Christine

    2017-02-01

    Driven by the need of pharmacovigilance centres and companies to routinely collect and review all available data about adverse drug reactions (ADRs) and adverse events of interest, we introduce and validate a computational framework exploiting dominant as well as emerging publicly available data sources for drug safety surveillance. Our approach relies on appropriate query formulation for data acquisition and subsequent filtering, transformation and joint visualization of the obtained data. We acquired data from the FDA Adverse Event Reporting System (FAERS), PubMed and Twitter. In order to assess the validity and the robustness of the approach, we elaborated on two important case studies, namely, clozapine-induced cardiomyopathy/myocarditis versus haloperidol-induced cardiomyopathy/myocarditis, and apixaban-induced cerebral hemorrhage. The analysis of the obtained data provided interesting insights (identification of potential patient and health-care professional experiences regarding ADRs in Twitter, information/arguments against an ADR existence across all sources), while illustrating the benefits (complementing data from multiple sources to strengthen/confirm evidence) and the underlying challenges (selecting search terms, data presentation) of exploiting heterogeneous information sources, thereby advocating the need for the proposed framework. This work contributes in establishing a continuous learning system for drug safety surveillance by exploiting heterogeneous publicly available data sources via appropriate support tools.

  8. Rational Exploitation and Utilizing of Groundwater in Jiangsu Coastal Area

    Science.gov (United States)

    Kang, B.; Lin, X.

    2017-12-01

    Jiangsu coastal area is located in the southeast coast of China, where is a new industrial base and an important coastal and Land Resources Development Zone of China. In the areas with strong human exploitation activities, regional groundwater evolution is obviously affected by human activities. In order to solve the environmental geological problems caused by groundwater exploitation fundamentally, we must find out the forming conditions of regional groundwater hydrodynamic field, and the impact of human activities on groundwater hydrodynamic field evolution and hydrogeochemical evolition. Based on these results, scientific management and reasonable exploitation of the regional groundwater resources can be provided for the utilization. Taking the coastal area of Jiangsu as the research area, we investigate and analyze of the regional hydrogeological conditions. The numerical simulation model of groundwater flow was established according to the water power, chemical and isotopic methods, the conditions of water flow and the influence of hydrodynamic field on the water chemical field. We predict the evolution of regional groundwater dynamics under the influence of human activities and climate change and evaluate the influence of groundwater dynamic field evolution on the environmental geological problems caused by groundwater exploitation under various conditions. We get the following conclusions: Three groundwater exploitation optimal schemes were established. The groundwater salinization was taken as the primary control condition. The substitution model was proposed to model groundwater exploitation and water level changes by BP network method.Then genetic algorithm was used to solve the optimization solution. Three groundwater exploitation optimal schemes were submit to local water resource management. The first sheme was used to solve the groundwater salinization problem. The second sheme focused on dual water supply. The third sheme concerned on emergency water

  9. Managing the exploitation life of the mining machinery for an unlimited duration of time

    Directory of Open Access Journals (Sweden)

    Vujić Slobodan

    2011-01-01

    Full Text Available The problem of determining the optimum exploitation life of machinery, namely, the optimum time for machinery and equipment replacement, represents a complex and highly responsible engineering task. Taking into consideration the situation prevailing at coal pit mines in Serbia, the tasks of this rank are very complex and difficult. To make a decision on the replacement of capital equipment and machinery, such as bucket wheel excavators within the mentioned systems, implies a management task of utmost responsibility. It requires high professional and analytical knowledge as well as reliable arguments, based on a multidisciplinary professional approach. In this paper, the authors present their views on the problem of establishing the optimum exploitation life of bucket wheel excavators, offering an algorithm, based on dynamic programming, as a solution.

  10. Optimizing Search and Ranking in Folksonomy Systems by Exploiting Context Information

    Science.gov (United States)

    Abel, Fabian; Henze, Nicola; Krause, Daniel

    Tagging systems enable users to annotate resources with freely chosen keywords. The evolving bunch of tag assignments is called folksonomy and there exist already some approaches that exploit folksonomies to improve resource retrieval. In this paper, we analyze and compare graph-based ranking algorithms: FolkRank and SocialPageRank. We enhance these algorithms by exploiting the context of tags, and evaluate the results on the GroupMe! dataset. In GroupMe!, users can organize and maintain arbitrary Web resources in self-defined groups. When users annotate resources in GroupMe!, this can be interpreted in context of a certain group. The grouping activity itself is easy for users to perform. However, it delivers valuable semantic information about resources and their context. We present GRank that uses the context information to improve and optimize the detection of relevant search results, and compare different strategies for ranking result lists in folksonomy systems.

  11. Heat transfer optimization of SCO2 porous flow based on Brinkman model

    Directory of Open Access Journals (Sweden)

    Lin David T.W.

    2016-01-01

    Full Text Available The purpose of this study is to obtain the optimal operating condition in order to find the maximum supercritical CO2 heat extraction in the enhanced geothermal system (EGS. In this study, the heat transfer model conjugated with the Brinkman model is used to evaluate the thermal behavior in the reservoir of the EGS. This numerical model is validated by experiment. Optimization is processed based on the Nelder-Mead approach. The optimal operating conditions are proposed with different pressure, porosity. This study will build the optimal platform of heat source of geothermal power plant.

  12. Exploitation and Utilization of Oilfield Geothermal Resources in China

    Directory of Open Access Journals (Sweden)

    Shejiao Wang

    2016-09-01

    Full Text Available Geothermal energy is a clean, green renewable resource, which can be utilized for power generation, heating, cooling, and could effectively replace oil, gas, and coal. In recent years, oil companies have put more efforts into exploiting and utilizing geothermal energy with advanced technologies for heat-tracing oil gathering and transportation, central heating, etc., which has not only reduced resource waste, but also improved large-scale and industrial resource utilization levels, and has achieved remarkable economic and social benefits. Based on the analysis of oilfield geothermal energy development status, resource potential, and exploitation and utilization modes, the advantages and disadvantages of harnessing oilfield geothermal resource have been discussed. Oilfield geothermal energy exploitation and utilization have advantages in resources, technical personnel, technology, and a large number of abandoned wells that could be reconstructed and utilized. Due to the high heat demand in oilfields, geothermal energy exploitation and utilization can effectively replace oil, gas, coal, and other fossil fuels, and has bright prospects. The key factors limiting oilfield geothermal energy exploitation and utilization are also pointed out in this paper, including immature technologies, lack of overall planning, lack of standards in resource assessment, and economic assessment, lack of incentive policies, etc.

  13. Three-Phase AC Optimal Power Flow Based Distribution Locational Marginal Price: Preprint

    Energy Technology Data Exchange (ETDEWEB)

    Yang, Rui; Zhang, Yingchen

    2017-05-17

    Designing market mechanisms for electricity distribution systems has been a hot topic due to the increased presence of smart loads and distributed energy resources (DERs) in distribution systems. The distribution locational marginal pricing (DLMP) methodology is one of the real-time pricing methods to enable such market mechanisms and provide economic incentives to active market participants. Determining the DLMP is challenging due to high power losses, the voltage volatility, and the phase imbalance in distribution systems. Existing DC Optimal Power Flow (OPF) approaches are unable to model power losses and the reactive power, while single-phase AC OPF methods cannot capture the phase imbalance. To address these challenges, in this paper, a three-phase AC OPF based approach is developed to define and calculate DLMP accurately. The DLMP is modeled as the marginal cost to serve an incremental unit of demand at a specific phase at a certain bus, and is calculated using the Lagrange multipliers in the three-phase AC OPF formulation. Extensive case studies have been conducted to understand the impact of system losses and the phase imbalance on DLMPs as well as the potential benefits of flexible resources.

  14. VELOCITY FIELD COMPUTATION IN VIBRATED GRANULAR MEDIA USING AN OPTICAL FLOW BASED MULTISCALE IMAGE ANALYSIS METHOD

    Directory of Open Access Journals (Sweden)

    Johan Debayle

    2011-05-01

    Full Text Available An image analysis method has been developed in order to compute the velocity field of a granular medium (sand grains, mean diameter 600 μm submitted to different kinds of mechanical stresses. The differential method based on optical flow conservation consists in describing a dense motion field with vectors associated to each pixel. A multiscale, coarse-to-fine, analytical approach through tailor sized windows yields the best compromise between accuracy and robustness of the results, while enabling an acceptable computation time. The corresponding algorithmis presented and its validation discussed through different tests. The results of the validation tests of the proposed approach show that the method is satisfactory when attributing specific values to parameters in association with the size of the image analysis window. An application in the case of vibrated sand has been studied. An instrumented laboratory device provides sinusoidal vibrations and enables external optical observations of sand motion in 3D transparent boxes. At 50 Hz, by increasing the relative acceleration G, the onset and development of two convective rolls can be observed. An ultra fast camera records the grain avalanches, and several pairs of images are analysed by the proposed method. The vertical velocity profiles are deduced and allow to precisely quantify the dimensions of the fluidized region as a function of G.

  15. Towards Integrated Powertrain Control: exploiting synergy between a diesel hybrid and aftertreatment system in a distribution truck

    NARCIS (Netherlands)

    Foster, D.L.; Cloudt, R.P.M.; Willems, F.P.T.

    2008-01-01

    With the increasing demands on driveability, fuel efficiency and emissions, it becomes essential to optimize the overall performance of future powertrains. Therefore, a system approach is required. In this study, the Integrated Powertrain Control concept is presented, which exploits the synergy

  16. Towards Integrated Powertrain Control : exploiting synergy between a diesel hybrid and aftertreatment system in a distribution truck

    NARCIS (Netherlands)

    Foster, D.; Cloudt, R.P.M.; Willems, F.P.T.

    2008-01-01

    With the increasing demands on driveability, fuel efficiency and emissions, it becomes essential to optimize the overall performance of future powertrains. Therefore, a system approach is required. In this study, the Integrated Powertrain Control concept is presented, which exploits the synergy

  17. The chert workshop of Tozal de la Mesa (Alins del Monte, Huesca, Spain and its exploitation in historical times

    Directory of Open Access Journals (Sweden)

    Marta Sánchez de la Torre

    2016-09-01

    The first approach to contextualize the recovered materials of Tozal de la Mesa workshop area has allowed determining an exploitation of the Garumnian cherts that has lasted until the late nineteenth century according to some recovered products (e.g., pottery and to oral sources.

  18. GPU Boosted CNN Simulator Library for Graphical Flow-Based Programmability

    Directory of Open Access Journals (Sweden)

    Balázs Gergely Soós

    2009-01-01

    Full Text Available A graphical environment for CNN algorithm development is presented. The new generation of graphical cards with many general purpose processing units introduces the massively parallel computing into PC environment. Universal Machine on Flows- (UMF like notation, highlighting image flows and operations, is a useful tool to describe image processing algorithms. This documentation step can be turned into modeling using our framework backed with MATLAB Simulink and the power of a video card. This latter relatively cheap extension enables a convenient and fast analysis of CNN dynamics and complex algorithms. Comparison with other PC solutions is also presented. For single template execution, our approach yields run times 40x faster than that of the widely used Candy simulator. In the case of simpler algorithms, real-time execution is also possible.

  19. Numerical simulation of multi-dimensional two-phase flow based on flux vector splitting

    Energy Technology Data Exchange (ETDEWEB)

    Staedtke, H.; Franchello, G.; Worth, B. [Joint Research Centre - Ispra Establishment (Italy)

    1995-09-01

    This paper describes a new approach to the numerical simulation of transient, multidimensional two-phase flow. The development is based on a fully hyperbolic two-fluid model of two-phase flow using separated conservation equations for the two phases. Features of the new model include the existence of real eigenvalues, and a complete set of independent eigenvectors which can be expressed algebraically in terms of the major dependent flow parameters. This facilitates the application of numerical techniques specifically developed for high speed single-phase gas flows which combine signal propagation along characteristic lines with the conservation property with respect to mass, momentum and energy. Advantages of the new model for the numerical simulation of one- and two- dimensional two-phase flow are discussed.

  20. Sexual exploitation and labor during adolescence: A case study

    Directory of Open Access Journals (Sweden)

    Luciana Dutra-Thomé

    2011-09-01

    Full Text Available The present article focused on the perception of sexual exploitation as a job, using a single case study design. The aim of the study was to investigate the case of a 14 year-old girl, involved in commercial sexual exploitation, who considered this situation as her labor activity. A content analysis showed protective and risk factors as categories, especially related to her labor activities. The girl perceived the sexual exploitation activity as a job that provided autonomy, subsistence, and survival. The study revealed that the negative effects of working during adolescence may bring consequences to health and development. Youth work may be defined as a risk factor, especially when the labour conditions are not adequate and protected.

  1. Information source exploitation/exploration and NPD decision-making

    DEFF Research Database (Denmark)

    Jespersen, Kristina Risom

    different Scandinavian companies. Data was analyzed using hierarchical regression models across decision criteria dimensions and NPD stages as well as analyzing the combination of selected information sources. Rather than forwarding one optimal search behavior for the entire NPD process, we find optimal...... information search behavior at either end of the exploitation/exploration continuum. Additionally, we find that overexploitation and overexploration is caused by managerial bias. This creates managerial misbehavior at gate decision-points of the NPD process.......The purpose of this study is to examine how the exploration/exploitation continuum is applied by decision-makers in new product gate decision-making. Specifically, we analyze at gate decision-points how the evaluation of a new product project is affected by the information source exploitation...

  2. The ALARA project of the EDF nuclear park exploitation

    International Nuclear Information System (INIS)

    Potoczek, J.

    1998-01-01

    To bring the exploitation of the nuclear park of EDF at the level of the best exploiters in the world in matter of collective and individual dosimetry, the ALARA principle coordinates numerous actions: to associate the temporary societies, to define common language, methods and tools for the whole park to organize a level effect in this area, to optimize the maintenance that is expansive in radiation doses, to make the different levels of management responsible on dosimetric stakes, to reduce the singular sources of exposure, to assure the organisation and exploitation of the experience back in this field and adapt consequently the system of information. The results are cheerful and the objectives for 2000 are: less than 1.2 h.Sv by year and by reactor, no intervener whom annual radiation dose is upper than 20 mSv (out of exceptional case). (N.C.)

  3. The exploitation of swamp plants for dewatering liquid sewage sludge

    Directory of Open Access Journals (Sweden)

    Jiří Šálek

    2006-01-01

    Full Text Available The operators of little rural wastewater treatment plants have been interested in economic exploitation of sewage sludge in local conditions. The chance is searching simply and natural ways of processing and exploitation stabilized sewage sludge in agriculture. Manure substrate have been obtained by composting waterless sewage sludge including rest plant biomass after closing 6–8 years period of filling liquid sewage sludge to the basin. Main attention was focused on exploitation of swamp plants for dewatering liquid sewage sludge and determination of influence sewage sludge on plants, intensity and course of evapotranspiration and design and setting of drying beds. On the base of determined ability of swamp plants evapotranspiration were edited suggestion solutions of design and operation sludge bed facilities in the conditions of small rural wastewater treatment plant.

  4. Influence of Machine Exploitation Effectiveness on Furniture Production Quality Level

    Directory of Open Access Journals (Sweden)

    Stasiak-Betlejewska Renata

    2015-12-01

    Full Text Available One of the most important factors determining the company‘s capacity to produce high quality products is the level of machinery operation effectiveness. Companies having modern machinery are characterized by high productivity. To obtain a high quality product, the equipment should be properly used, without any failure, which contributes significantly to the exploitation level increase. The modernity level and the exploitation effectiveness level for chosen machine producing furniture components in relation to the product quality level were analysed in the paper. As a result of the research findings analysis, proposals for corrective actions with regard to machinery maintenance and production processes were presented.

  5. On species preservation and Non-Cooperative Exploiters

    DEFF Research Database (Denmark)

    Kronbak, Lone Grønbæk; Lindroos, Marko

    cases where several non-cooperative exploiters are involved in mixed fisheries. This paper is targeting biodiversity preservation by setting up a two species model with the aim of ensuring both species survive harvesting of exploiters adapting a non-cooperative behaviour. The model starts out as a multi......-species model without biological dependency and is then modified to include also biological dependency. We contribute to the literature by analytically finding the limits on the number of players preserving both species including the conditions to be satisfied. For visual purposes we simulate a two species...

  6. Fishery Development and Exploitation in South East Australia

    Directory of Open Access Journals (Sweden)

    Camilla Novaglio

    2018-04-01

    Full Text Available Understanding the full extent of past ecological changes in human-influenced marine systems is needed to inform present management policies, but is often hampered by the scarcity of information about exploitation practices and population status over the entire history of fishing. The history of commercial fishing in South East Australia is relatively recent and thus easier to document. Our aim is to reconstruct such history and to use this information to understand general patterns and consequences of fishing exploitation. Intense exploitation of marine resources arrived in South East Australia with European colonization in the early 1800s, and unregulated sealing, whaling and oyster dredging resulted in the first documented significant impact on local marine populations. Exploitation extended to demersal resources in 1915 when the trawl fishery developed. Between the early 1800s and the 1980s, some of the exploited stocks collapsed, but fishing moved further offshore and in deeper waters as technology improved and new resources became available or were discovered. This phase of fisheries expansion masked the unsustainable nature of some fishing industries, such as trawling and whaling, and postponed the need for management regulations. From the 1990s onward, an increasing awareness of the depleted nature of some fisheries led to the establishment of management strategies aiming at a more sustainable exploitation of target stocks and, from the mid-2000s onwards, management strategies were revised and improved to better address the effect of fishing on multiple components of marine ecosystems. This led to the recovery of some depleted populations and to increased habitat protection. The relatively short history of fishing exploitation and the small scale of the fishing industry in South East Australia played a significant role in limiting the magnitude of fishing impacts on local populations and helped to achieve recoveries when fisheries

  7. Cost-optimal power system extension under flow-based market coupling

    Energy Technology Data Exchange (ETDEWEB)

    Hagspiel, Simeon; Jaegemann, Cosima; Lindenberger, Dietmar [Koeln Univ. (Germany). Energiewirtschaftliches Inst.; Brown, Tom; Cherevatskiy, Stanislav; Troester, Eckehard [Energynautics GmbH, Langen (Germany)

    2013-05-15

    Electricity market models, implemented as dynamic programming problems, have been applied widely to identify possible pathways towards a cost-optimal and low carbon electricity system. However, the joint optimization of generation and transmission remains challenging, mainly due to the fact that different characteristics and rules apply to commercial and physical exchanges of electricity in meshed networks. This paper presents a methodology that allows to optimize power generation and transmission infrastructures jointly through an iterative approach based on power transfer distribution factors (PTDFs). As PTDFs are linear representations of the physical load flow equations, they can be implemented in a linear programming environment suitable for large scale problems. The algorithm iteratively updates PTDFs when grid infrastructures are modified due to cost-optimal extension and thus yields an optimal solution with a consistent representation of physical load flows. The method is first demonstrated on a simplified three-node model where it is found to be robust and convergent. It is then applied to the European power system in order to find its cost-optimal development under the prescription of strongly decreasing CO{sub 2} emissions until 2050.

  8. Pattern Extraction Algorithm for NetFlow-Based Botnet Activities Detection

    Directory of Open Access Journals (Sweden)

    Rafał Kozik

    2017-01-01

    Full Text Available As computer and network technologies evolve, the complexity of cybersecurity has dramatically increased. Advanced cyber threats have led to current approaches to cyber-attack detection becoming ineffective. Many currently used computer systems and applications have never been deeply tested from a cybersecurity point of view and are an easy target for cyber criminals. The paradigm of security by design is still more of a wish than a reality, especially in the context of constantly evolving systems. On the other hand, protection technologies have also improved. Recently, Big Data technologies have given network administrators a wide spectrum of tools to combat cyber threats. In this paper, we present an innovative system for network traffic analysis and anomalies detection to utilise these tools. The systems architecture is based on a Big Data processing framework, data mining, and innovative machine learning techniques. So far, the proposed system implements pattern extraction strategies that leverage batch processing methods. As a use case we consider the problem of botnet detection by means of data in the form of NetFlows. Results are promising and show that the proposed system can be a useful tool to improve cybersecurity.

  9. From Exploitation to Industry: Definitions, Risks, and Consequences of Domestic Sexual Exploitation and Sex Work Among Women and Girls.

    Science.gov (United States)

    Gerassi, Lara

    In the last 15 years, terms such as prostitution, sex trafficking, sexual exploitation, modern-day slavery, and sex work have elicited much confusion and debate as to their definitions. Consequently several challenges have emerged for both law enforcement in the prosecution of criminals and practitioners in service provision. This article reviews the state of the literature with regard to domestic, sexual exploitation among women and girls in the United States and seeks to (1) provide definitions and describe the complexity of all terms relating to domestic sexual exploitation of women and girls in the United States, (2) explore available national prevalence data according to the definitions provided, and (3) review the evidence of mental health, social, and structural risk factors at the micro-, mezzo-, and macrolevels.

  10. From Exploitation to Industry: Definitions, Risks, and Consequences of Domestic Sexual Exploitation and Sex Work Among Women and Girls

    Science.gov (United States)

    Gerassi, Lara

    2015-01-01

    In the last 15 years, terms such as prostitution, sex trafficking, sexual exploitation, modern-day slavery, and sex work have elicited much confusion and debate as to their definitions. Consequently several challenges have emerged for both law enforcement in the prosecution of criminals and practitioners in service provision. This article reviews the state of the literature with regard to domestic, sexual exploitation among women and girls in the United States and seeks to (1) provide definitions and describe the complexity of all terms relating to domestic sexual exploitation of women and girls in the United States, (2) explore available national prevalence data according to the definitions provided, and (3) review the evidence of mental health, social, and structural risk factors at the micro-, mezzo-, and macrolevels. PMID:26726289

  11. Robust fluoroscopic tracking of fiducial markers: exploiting the spatial constraints

    International Nuclear Information System (INIS)

    Li Rui; Sharp, Gregory

    2013-01-01

    Two new fluoroscopic fiducial tracking methods that exploit the spatial relationship among the multiple implanted fiducial to achieve fast, accurate and robust tracking are proposed in this paper. The spatial relationship between multiple implanted markers are modeled as Gaussian distributions of their pairwise distances over time. The means and standard deviations of these distances are learned from training sequences, and pairwise distances that deviate from these learned distributions are assigned a low spatial matching score. The spatial constraints are incorporated in two different algorithms: a stochastic tracking method and a detection based method. In the stochastic method, hypotheses of the ‘true’ fiducial position are sampled from a pre-trained respiration motion model. Each hypothesis is assigned an importance value based on image matching score and spatial matching score. Learning the parameters of the motion model is needed in addition to learning the distribution parameters of the pairwise distances in the proposed stochastic tracking approach. In the detection based method, a set of possible marker locations are identified by using a template matching based fiducial detector. The best location is obtained by optimizing the image matching score and spatial matching score through non-serial dynamic programming. In this detection based approach, there is no need to learn the respiration motion model. The two proposed algorithms are compared with a recent work using a multiple hypothesis tracking (MHT) algorithm which is denoted by MHT, Tang et al (2007 Phys. Med. Biol. 52 4081–98). Phantom experiments were performed using fluoroscopic videos captured with known motion relative to an anthropomorphic phantom. The patient experiments were performed using a retrospective study of 16 fluoroscopic videos of liver cancer patients with implanted fiducials. For the motion phantom data sets, the detection based approach has the smallest tracking error (

  12. Optic flow-based collision-free strategies: From insects to robots.

    Science.gov (United States)

    Serres, Julien R; Ruffier, Franck

    2017-09-01

    Flying insects are able to fly smartly in an unpredictable environment. It has been found that flying insects have smart neurons inside their tiny brains that are sensitive to visual motion also called optic flow. Consequently, flying insects rely mainly on visual motion during their flight maneuvers such as: takeoff or landing, terrain following, tunnel crossing, lateral and frontal obstacle avoidance, and adjusting flight speed in a cluttered environment. Optic flow can be defined as the vector field of the apparent motion of objects, surfaces, and edges in a visual scene generated by the relative motion between an observer (an eye or a camera) and the scene. Translational optic flow is particularly interesting for short-range navigation because it depends on the ratio between (i) the relative linear speed of the visual scene with respect to the observer and (ii) the distance of the observer from obstacles in the surrounding environment without any direct measurement of either speed or distance. In flying insects, roll stabilization reflex and yaw saccades attenuate any rotation at the eye level in roll and yaw respectively (i.e. to cancel any rotational optic flow) in order to ensure pure translational optic flow between two successive saccades. Our survey focuses on feedback-loops which use the translational optic flow that insects employ for collision-free navigation. Optic flow is likely, over the next decade to be one of the most important visual cues that can explain flying insects' behaviors for short-range navigation maneuvers in complex tunnels. Conversely, the biorobotic approach can therefore help to develop innovative flight control systems for flying robots with the aim of mimicking flying insects' abilities and better understanding their flight. Copyright © 2017 The Authors. Published by Elsevier Ltd.. All rights reserved.

  13. Modelling of two-phase flow based on separation of the flow according to velocity

    Energy Technology Data Exchange (ETDEWEB)

    Narumo, T. [VTT Energy, Espoo (Finland). Nuclear Energy

    1997-12-31

    The thesis concentrates on the development work of a physical one-dimensional two-fluid model that is based on Separation of the Flow According to Velocity (SFAV). The conventional way to model one-dimensional two-phase flow is to derive conservation equations for mass, momentum and energy over the regions occupied by the phases. In the SFAV approach, the two-phase mixture is divided into two subflows, with as distinct average velocities as possible, and momentum conservation equations are derived over their domains. Mass and energy conservation are treated equally with the conventional model because they are distributed very accurately according to the phases, but momentum fluctuations follow better the flow velocity. Submodels for non-uniform transverse profile of velocity and density, slip between the phases within each subflow and turbulence between the subflows have been derived. The model system is hyperbolic in any sensible flow conditions over the whole range of void fraction. Thus, it can be solved with accurate numerical methods utilizing the characteristics. The characteristics agree well with the used experimental data on two-phase flow wave phenomena Furthermore, the characteristics of the SFAV model are as well in accordance with their physical counterparts as of the best virtual-mass models that are typically optimized for special flow regimes like bubbly flow. The SFAV model has proved to be applicable in describing two-phase flow physically correctly because both the dynamics and steady-state behaviour of the model has been considered and found to agree well with experimental data This makes the SFAV model especially suitable for the calculation of fast transients, taking place in versatile form e.g. in nuclear reactors. 45 refs. The thesis includes also five previous publications by author.

  14. Modelling of two-phase flow based on separation of the flow according to velocity

    International Nuclear Information System (INIS)

    Narumo, T.

    1997-01-01

    The thesis concentrates on the development work of a physical one-dimensional two-fluid model that is based on Separation of the Flow According to Velocity (SFAV). The conventional way to model one-dimensional two-phase flow is to derive conservation equations for mass, momentum and energy over the regions occupied by the phases. In the SFAV approach, the two-phase mixture is divided into two subflows, with as distinct average velocities as possible, and momentum conservation equations are derived over their domains. Mass and energy conservation are treated equally with the conventional model because they are distributed very accurately according to the phases, but momentum fluctuations follow better the flow velocity. Submodels for non-uniform transverse profile of velocity and density, slip between the phases within each subflow and turbulence between the subflows have been derived. The model system is hyperbolic in any sensible flow conditions over the whole range of void fraction. Thus, it can be solved with accurate numerical methods utilizing the characteristics. The characteristics agree well with the used experimental data on two-phase flow wave phenomena Furthermore, the characteristics of the SFAV model are as well in accordance with their physical counterparts as of the best virtual-mass models that are typically optimized for special flow regimes like bubbly flow. The SFAV model has proved to be applicable in describing two-phase flow physically correctly because both the dynamics and steady-state behaviour of the model has been considered and found to agree well with experimental data This makes the SFAV model especially suitable for the calculation of fast transients, taking place in versatile form e.g. in nuclear reactors

  15. A cellular automata model for traffic flow based on kinetics theory, vehicles capabilities and driver reactions

    Science.gov (United States)

    Guzmán, H. A.; Lárraga, M. E.; Alvarez-Icaza, L.; Carvajal, J.

    2018-02-01

    In this paper, a reliable cellular automata model oriented to faithfully reproduce deceleration and acceleration according to realistic reactions of drivers, when vehicles with different deceleration capabilities are considered is presented. The model focuses on describing complex traffic phenomena by coding in its rules the basic mechanisms of drivers behavior, vehicles capabilities and kinetics, while preserving simplicity. In particular, vehiclés kinetics is based on uniform accelerated motion, rather than in impulsive accelerated motion as in most existing CA models. Thus, the proposed model calculates in an analytic way three safe preserving distances to determine the best action a follower vehicle can take under a worst case scenario. Besides, the prediction analysis guarantees that under the proper assumptions, collision between vehicles may not happen at any future time. Simulations results indicate that all interactions of heterogeneous vehicles (i.e., car-truck, truck-car, car-car and truck-truck) are properly reproduced by the model. In addition, the model overcomes one of the major limitations of CA models for traffic modeling: the inability to perform smooth approach to slower or stopped vehicles. Moreover, the model is also capable of reproducing most empirical findings including the backward speed of the downstream front of the traffic jam, and different congested traffic patterns induced by a system with open boundary conditions with an on-ramp. Like most CA models, integer values are used to make the model run faster, which makes the proposed model suitable for real time traffic simulation of large networks.

  16. Consumers’ Acceptance and Use of Information and Communications Technology: A UTAUT and Flow Based Theoretical Model

    Directory of Open Access Journals (Sweden)

    Saleh Alwahaishi

    2013-03-01

    Full Text Available The world has changed a lot in the past years. The rapid advances in technology and the changing of the communication channels have changed the way people work and, for many, where do they work from. The Internet and mobile technology, the two most dynamic technological forces in modern information and communications technology (ICT are converging into one ubiquitous mobile Internet service, which will change our way of both doing business and dealing with our daily routine activities. As the use of ICT expands globally, there is need for further research into cultural aspects and implications of ICT. The acceptance of Information Technology (IT has become a fundamental part of the research plan for most organizations (Igbaria 1993. In IT research, numerous theories are used to understand users’ adoption of new technologies. Various models were developed including the Technology Acceptance Model, Theory of Reasoned Action, Theory of Planned Behavior, and recently, the Unified Theory of Acceptance and Use of Technology. Each of these models has sought to identify the factors which influence a citizen’s intention or actual use of information technology. Drawing on the UTAUT model and Flow Theory, this research composes a new hybrid theoretical framework to identify the factors affecting the acceptance and use of Mobile Internet -as an ICT application- in a consumer context. The proposed model incorporates eight constructs: Performance Expectancy, Effort Expectancy, Facilitating Conditions, Social Influences, Perceived Value, Perceived Playfulness, Attention Focus, and Behavioral intention. Data collected online from 238 respondents in Saudi Arabia were tested against the research model, using the structural equation modeling approach. The proposed model was mostly supported by the empirical data. The findings of this study provide several crucial implications for ICT and, in particular, mobile Internet service practitioners and researchers

  17. Child trafficking and commercial sexual exploitation: a review of promising prevention policies and programs.

    Science.gov (United States)

    Rafferty, Yvonne

    2013-10-01

    Child trafficking, including commercial sexual exploitation (CSE), is one of the fastest growing and most lucrative criminal activities in the world. The global enslavement of children affects countless numbers of victims who are trafficked within their home countries or transported away from their homes and treated as commodities to be bought, sold, and resold for labor or sexual exploitation. All over the world, girls are particularly likely to be trafficked into the sex trade: Girls and women constitute 98% of those who are trafficked for CSE. Health and safety standards in exploitative settings are generally extremely low, and the degree of experienced violence has been linked with adverse physical, psychological, and social-emotional development. The human-rights-based approach to child trafficking provides a comprehensive conceptual framework whereby victim-focused and law enforcement responses can be developed, implemented, and evaluated. This article highlights promising policies and programs designed to prevent child trafficking and CSE by combating demand for sex with children, reducing supply, and strengthening communities. The literature reviewed includes academic publications as well as international and governmental and nongovernmental reports. Implications for social policy and future research are presented. © 2013 American Orthopsychiatric Association.

  18. Intensively exploited Mediterranean aquifers: resilience to seawater intrusion and proximity to critical thresholds

    Science.gov (United States)

    Mazi, K.; Koussis, A. D.; Destouni, G.

    2014-05-01

    We investigate seawater intrusion in three prominent Mediterranean aquifers that are subject to intensive exploitation and modified hydrologic regimes by human activities: the Nile Delta, Israel Coastal and Cyprus Akrotiri aquifers. Using a generalized analytical sharp interface model, we review the salinization history and current status of these aquifers, and quantify their resilience/vulnerability to current and future seawater intrusion forcings. We identify two different critical limits of seawater intrusion under groundwater exploitation and/or climatic stress: a limit of well intrusion, at which intruded seawater reaches key locations of groundwater pumping, and a tipping point of complete seawater intrusion up to the prevailing groundwater divide of a coastal aquifer. Either limit can be reached, and ultimately crossed, under intensive aquifer exploitation and/or climate-driven change. We show that seawater intrusion vulnerability for different aquifer cases can be directly compared in terms of normalized intrusion performance curves. The site-specific assessments show that (a) the intruding seawater currently seriously threatens the Nile Delta aquifer, (b) in the Israel Coastal aquifer the sharp interface toe approaches the well location and (c) the Cyprus Akrotiri aquifer is currently somewhat less threatened by increased seawater intrusion.

  19. Wideband Low Noise Amplifiers Exploiting Thermal Noise Cancellation

    NARCIS (Netherlands)

    Bruccoleri, F.; Klumperink, Eric A.M.; Nauta, Bram

    2005-01-01

    Low Noise Amplifiers (LNAs) are commonly used to amplify signals that are too weak for direct processing for example in radio or cable receivers. Traditionally, low noise amplifiers are implemented via tuned amplifiers, exploiting inductors and capacitors in resonating LC-circuits. This can render

  20. Human trafficking for labour exploitation: Interpreting the crime

    NARCIS (Netherlands)

    Coster van Voorhout, J.E.B.

    2007-01-01

    The definition of human trafficking for labour exploitation, as follows from the European Council Framework Decision, proves to be unclear. Literal interpretation does not suffice, because it does not clarify all elements of what is deemed to be criminal behaviour, and hermeneutical interpretation

  1. Efficient Depth Map Compression Exploiting Segmented Color Data

    DEFF Research Database (Denmark)

    Milani, Simone; Zanuttigh, Pietro; Zamarin, Marco

    2011-01-01

    performances is still an open research issue. This paper presents a novel compression scheme that exploits a segmentation of the color data to predict the shape of the different surfaces in the depth map. Then each segment is approximated with a parameterized plane. In case the approximation is sufficiently...

  2. Bats track and exploit changes in insect pest populations

    Science.gov (United States)

    The role of bats or any generalist predator in suppressing prey populations depends on the predator’s ability to exploit available prey in space and time. Using a qPCR faecal DNA assay, we document significant association between numbers of Brazilian free-tailed bats (Tadarida brasiliensis) consumin...

  3. Describing Data Format Exploits Using Bitstream Segment Graphs

    NARCIS (Netherlands)

    Hartle, Michael; Schumann, Daniel; Botchak, Arsene; Tews, Erik; Mühlhäuser, Max

    2008-01-01

    Exploits based on data processing bugs are delivered through crafted data that seems to follow a data format, yet is altered in some way to trigger a specific bug during processing, eg. in order to execute contained malicious code. Decomposing crafted data according to the purported data format and

  4. Exploiting Patient Labour at Kew Cottages, Australia, 1887-1950

    Science.gov (United States)

    Monk, Lee-Ann

    2010-01-01

    This article examines the exploitation of patient labour at Kew Cottages, Australia's first purpose-built state institution for people with learning disabilities. Analysing historical evidence for the period 1887-1950 shows that unpaid patient labour contributed significantly to the economy of the Cottages and so to the government department of…

  5. Exploiting serological data to understand the epidemiology of foot ...

    African Journals Online (AJOL)

    Exploiting serological data to understand the epidemiology of foot-and-mouth disease virus serotypes circulating in Libya. Ibrahim Eldaghayes, Abdunaser Dayhum, Abdulwahab Kammon, Monier Sharif, Giancarlo Ferrari, Christianus Bartels, Keith Sumption, Donald P. King, Santina Grazioli, Emiliana Brocchi ...

  6. Open pit coal exploitation viability. Margarita mine. Case of study

    International Nuclear Information System (INIS)

    Veloza, Julia; Molina, Jorge; Mejia, Humberto

    2006-01-01

    This paper provides an analysis of financial viability, planning and design for the new coal open pit exploitation for La Margarita mine, with coal-resources estimated on 440.139,7 ton. Dimension, design and economic evaluation were possible by three exploitation methods: (multiple bench, open cast contour, and terraces). Net present values (NVP) were calculated: $c 817,5; $c 518,5 and $c 645,2 respectively for each method (given in million current Colombian pesos $. $c 2380 are equivalent to $us 1) and rate of return (ROR) 78,33%; 34,0% and 38,62% respectively for each method. These indicators served as a parameter to choose the multiple bench method, which should be recalculated because it was necessary to work jointly with two pits and making feasible the project. in addition a general environmental evaluation was done, which is vital for the exploitation. Important impacts on the flower, animals, air, water were found, and measures of control, prevention and mitigation were stated. it is expected that this paper can be useful as a technical-economical support for the development of the open pit exploitation in the margarita mine

  7. Exploiting wild relatives of S. lycopersicum for quality traits

    NARCIS (Netherlands)

    Víquez Zamora, A.M.

    2015-01-01

    Exploiting wild relatives of S. lycopersicum for quality traits Ana Marcela Víquez Zamora Tomatoes are consumed worldwide and became a model for crop plant research. A part of the research aims at expanding genetic diversity in tomato; this can be done by incorporating

  8. Geographical aspects of exploitation of nuclear energy in Europe

    International Nuclear Information System (INIS)

    Kurucova, S.

    2007-05-01

    The topic of exploitation of nuclear energy is becoming increasingly actual in the present time in connection with frequently discussed question of 'renaissance of nuclear energetics'. The work is aimed at research of geographical aspects of exploitation of nuclear energy for military and civil purposes on the territory of Europe. The base of work represents the analysis of theoretical aspects of research of energy, mainly of nuclear energy. The work examines the historical development of exploitation of nuclear energy since its discovery, through development of military nuclear industry in Europe, big attention is paid to spreading of nuclear energetics on the territory of Europe from its beginnings up to the present time. The main part of the work represents the analysis of the present situation of exploitation of nuclear energy for civil purposes in Europe. The attention is paid to so-called nuclear fuel cycle as complex chain of several reciprocally interconnected operations of nuclear fuel treatment. The monitoring of spatial relations among individual countries within their nuclear fuel cycles is emphasised. The analysis of historical development and of the present state of nuclear energetics finished up in the outline of the perspectives of its further development in Europe. The analysis of the tendencies of evolution of world energetic economy mentions on the trend of growth of energy consumption in the world and Europe, as well as on the important position of nuclear energy in the structure of energy sources. Summary in English language is included. (author)

  9. Exploitation of Free Markets and Globalization to Finance Terrorists

    Science.gov (United States)

    2008-09-01

    is their capability to exploit the black market peso exchange or the international foreign exchange arbitrage . Under the scenario of a weak U.S...appears legitimate. By using intermediaries or legitimate businesses, the financial markets are wide open for terrorists to hedge funds and

  10. Exploitation of commercial remote sensing images: reality ignored?

    Science.gov (United States)

    Allen, Paul C.

    1999-12-01

    The remote sensing market is on the verge of being awash in commercial high-resolution images. Market estimates are based on the growing numbers of planned commercial remote sensing electro-optical, radar, and hyperspectral satellites and aircraft. EarthWatch, Space Imaging, SPOT, and RDL among others are all working towards launch and service of one to five meter panchromatic or radar-imaging satellites. Additionally, new advances in digital air surveillance and reconnaissance systems, both manned and unmanned, are also expected to expand the geospatial customer base. Regardless of platform, image type, or location, each system promises images with some combination of increased resolution, greater spectral coverage, reduced turn-around time (request-to- delivery), and/or reduced image cost. For the most part, however, market estimates for these new sources focus on the raw digital images (from collection to the ground station) while ignoring the requirements for a processing and exploitation infrastructure comprised of exploitation tools, exploitation training, library systems, and image management systems. From this it would appear the commercial imaging community has failed to learn the hard lessons of national government experience choosing instead to ignore reality and replicate the bias of collection over processing and exploitation. While this trend may be not impact the small quantity users that exist today it will certainly adversely affect the mid- to large-sized users of the future.

  11. Human trafficking and exploitation: A global health concern.

    Directory of Open Access Journals (Sweden)

    Cathy Zimmerman

    2017-11-01

    Full Text Available In this collection review, Cathy Zimmerman and colleague introduce the PLOS Medicine Collection on Human Trafficking, Exploitation and Health, laying out the magnitude of the global trafficking problem and offering a public health policy framework to guide responses to trafficking.

  12. Six scenarios of exploiting an ontology based, mobilized learning environment

    NARCIS (Netherlands)

    Kismihók, G.; Szabó, I.; Vas, R.

    2012-01-01

    In this article, six different exploitation possibilities of an educational ontology based, mobilized learning management system are presented. The focal point of this system is the educational ontology model. The first version of this educational ontology model serves as a foundation for curriculum

  13. Indicators of Nuclear safety and exploitation in ANAV

    International Nuclear Information System (INIS)

    Quintana Prieto, M.; Jorda Alcove, M.

    2013-01-01

    The use of indicators by ANAV plants, aims to be a tool to facilitate the assessment of the behaviour of the plants nuclear over a specific time period. The following are and are they explain those related to Nuclear safety and exploitation.

  14. Desiring TESOL and International Education: Market Abuse and Exploitation

    Science.gov (United States)

    Chowdhury, Raqib; Ha, Phan Le

    2014-01-01

    This book addresses how Western universities have constructed themselves as global providers of education, and are driven to be globally competitive. It examines how the term "international" has been exploited by the market in the form of government educational policies and agencies, host institutions, academia and the mass media. The…

  15. Exploiting Elementary Landscapes for TSP, Vehicle Routing and Scheduling

    Science.gov (United States)

    2015-09-03

    similar mathematical foundation to enable gradient descent methods for discrete combinatorial optimization problems. We are also generalizing our prior...research has exploited statistical and mathematical properties of elementary landscapes to develop new gradient methods for combinatorial optimization... mathematically methods to more automatically identify elementary landscapes. If a combinatorial optimization problem is a superposition of elemen

  16. 77 FR 36491 - Request for Information Regarding Senior Financial Exploitation

    Science.gov (United States)

    2012-06-19

    ... BUREAU OF CONSUMER FINANCIAL PROTECTION [Docket CFPB-2012-0018] Request for Information Regarding Senior Financial Exploitation AGENCY: Bureau of Consumer Financial Protection. ACTION: Request for Information. SUMMARY: Section 1013(g)(1) of the Dodd-Frank Wall Street Reform and Consumer Protection Act of...

  17. Beyond the Bravado: Sex Roles and the Exploitive Male.

    Science.gov (United States)

    Taubman, Stan

    1986-01-01

    Examines the tendency of men to engage in domestic violence and sexual exploitation and presents male sex-role acquisition as a process of psychosocial violence against young boys, which creates a sense of shame, powerlessness, self-alienation, isolation from others, and retaliatory rage and inhibits capacities for intimacy and mutuality.…

  18. Grooming Cybervictims: The Psychosocial Effects of Online Exploitation for Youth.

    Science.gov (United States)

    Berson, Ilene R.

    2003-01-01

    Presents an overview of the benefits and risks of Web-based interactions for youth. Discusses, as an illustrative example, the psychosocial effects of online "grooming" practices that are designed to lure and exploit children by enticing them, typically in a nonsexual way, toward a sexual encounter. Suggests constructive solutions and a…

  19. Malware Sandbox Analysis for Secure Observation of Vulnerability Exploitation

    Science.gov (United States)

    Yoshioka, Katsunari; Inoue, Daisuke; Eto, Masashi; Hoshizawa, Yuji; Nogawa, Hiroki; Nakao, Koji

    Exploiting vulnerabilities of remote systems is one of the fundamental behaviors of malware that determines their potential hazards. Understanding what kind of propagation tactics each malware uses is essential in incident response because such information directly links with countermeasures such as writing a signature for IDS. Although recently malware sandbox analysis has been studied intensively, little work is done on securely observing the vulnerability exploitation by malware. In this paper, we propose a novel sandbox analysis method for securely observing malware's vulnerability exploitation in a totally isolated environment. In our sandbox, we prepare two victim hosts. We first execute the sample malware on one of these hosts and then let it attack the other host which is running multiple vulnerable services. As a simple realization of the proposed method, we have implemented a sandbox using Nepenthes, a low-interaction honeypot, as the second victim. Because Nepenthes can emulate a variety of vulnerable services, we can efficiently observe the propagation of sample malware. In the experiments, among 382 samples whose scan capabilities are confirmed, 381 samples successfully started exploiting vulnerabilities of the second victim. This indicates the certain level of feasibility of the proposed method.

  20. A novel physical eco-hydrological model concept for preferential flow based on experimental applications.

    Science.gov (United States)

    Jackisch, Conrad; van Schaik, Loes; Graeff, Thomas; Zehe, Erwin

    2014-05-01

    Preferential flow through macropores often determines hydrological characteristics - especially regarding runoff generation and fast transport of solutes. Macropore settings may yet be very different in nature and dynamics, depending on their origin. While biogenic structures follow activity cycles (e.g. earth worms) and population conditions (e.g. roots), pedogenic and geogenic structures may depend on water stress (e.g. cracks) or large events (e.g. flushed voids between skeleton and soil pipes) or simply persist (e.g. bedrock interface). On the one hand, such dynamic site characteristics can be observed in seasonal changes in its reaction to precipitation. On the other hand, sprinkling experiments accompanied by tracers or time-lapse 3D Ground-Penetrating-Radar are suitable tools to determine infiltration patterns and macropore configuration. However, model representation of the macropore-matrix system is still problematic, because models either rely on effective parameters (assuming well-mixed state) or on explicit advection strongly simplifying or neglecting interaction with the diffusive flow domain. Motivated by the dynamic nature of macropores, we present a novel model approach for interacting diffusive and advective water, solutes and energy transport in structured soils. It solely relies on scale- and process-aware observables. A representative set of macropores (data from sprinkling experiments) determines the process model scale through 1D advective domains. These are connected to a 2D matrix domain which is defined by pedo-physical retention properties. Water is represented as particles. Diffusive flow is governed by a 2D random walk of these particles while advection may take place in the macropore domain. Macropore-matrix interaction is computed as dissipation of the advective momentum of a particle by its experienced drag from the matrix domain. Through a representation of matrix and macropores as connected diffusive and advective domains for water

  1. Financial decision-making abilities and financial exploitation in older African Americans: Preliminary validity evidence for the Lichtenberg Financial Decision Rating Scale (LFDRS).

    Science.gov (United States)

    Lichtenberg, Peter A; Ficker, Lisa J; Rahman-Filipiak, Annalise

    2016-01-01

    This study examines preliminary evidence for the Lichtenberg Financial Decision Rating Scale (LFDRS), a new person-centered approach to assessing capacity to make financial decisions, and its relationship to self-reported cases of financial exploitation in 69 older African Americans. More than one third of individuals reporting financial exploitation also had questionable decisional abilities. Overall, decisional ability score and current decision total were significantly associated with cognitive screening test and financial ability scores, demonstrating good criterion validity. Study findings suggest that impaired decisional abilities may render older adults more vulnerable to financial exploitation, and that the LFDRS is a valid tool.

  2. Viability of exploiting L-shell fluorescence for X-ray polarimetry

    Energy Technology Data Exchange (ETDEWEB)

    Weisskopf, M C; Elsner, R F; Ramsey, B D [National Aeronautics and Space Administration, Huntsville, AL (USA). Space Sciences Lab.; Sutherland, P G [McMaster Univ., Hamilton, Ontario (Canada). Dept. of Physics

    1985-05-15

    It has been suggested that one may build an X-ray polarimeter by exploiting the polarization dependence of the angular distribution of L-shell fluorescence photons. In this paper we examine, theoretically, the sensitivity of this approach to polarimetry. We apply our calculations to several detection schemes using imaging proportional counters that would have direct application in X-ray astronomy. We find, however, that the sensitivity of this method for measuring X-ray polarization is too low to be of use for other than laboratory applications.

  3. On the viability of exploiting L-shell fluorescence for X-ray polarimetry

    Energy Technology Data Exchange (ETDEWEB)

    Weisskopf, M C; Elsner, R F; Ramsey, B D; Sutherland, P G

    1985-05-15

    It has been suggested that one may build an X-ray polarimeter by exploiting the polarization dependence of the angular distribution of L-shell fluorescence photons. In this paper we examine, theoretically, the sensitivity of this approach to polarimetry. We apply our calculations to several detection schemes using imaging proportional counters that would have direct application in X-ray astronomy. We find, however, that the sensitivity of this method for measuring X-ray polarization is too low to be of use for other than laboratory applications. (orig.).

  4. Improving Anomaly Detection for Text-Based Protocols by Exploiting Message Structures

    Directory of Open Access Journals (Sweden)

    Christian M. Mueller

    2010-12-01

    Full Text Available Service platforms using text-based protocols need to be protected against attacks. Machine-learning algorithms with pattern matching can be used to detect even previously unknown attacks. In this paper, we present an extension to known Support Vector Machine (SVM based anomaly detection algorithms for the Session Initiation Protocol (SIP. Our contribution is to extend the amount of different features used for classification (feature space by exploiting the structure of SIP messages, which reduces the false positive rate. Additionally, we show how combining our approach with attribute reduction significantly improves throughput.

  5. Annexe 3. Constitution d'une exploitation à Homs

    OpenAIRE

    2015-01-01

    ‘Abd al-Laṭīf, né en 1925, est jardinier à Horns. Il exploite avec son fils aîné et l'aide de deux de ses petits-fils un jardin de quelques 35 dunum (3,5 hectares) situé dans le zūr al-Ǧdīdeh, secteur central de la zone agricole. Cette grande exploitation, constituée de plusieurs parcelles ayant différents statuts, est en partie le produit d'une histoire familiale dont je voudrais présenter ici brièvement les principaux aspects. Figure 50 – Alliances matrimoniales entre la lignée de ‘Abbās e...

  6. Design and Exploitation Problems of Drill String in Directional Drilling

    Directory of Open Access Journals (Sweden)

    Bednarz Stanislaw

    2004-09-01

    Full Text Available Drill string design for directional drilling requires accounting for a number of factors. First, types and expected values of loads should be determined. Then, elements of the drill string should be so selected as to enable realization of the plan at specified loads. Some of additional factors, e. g. purchase, exploitation cost, geological conditions in the bore-hole, washing of the bore-hole, stability, trajectory, rig parameters, accuracy of gauges, pumps parameters remain in conflict. Drill pipes are made of rolled pipes, upset and welded with tool joints to 9,5 m long; the shorter ones can be made of hot forged rods. Exploitation requirements, being a result of practical experience supported by theoretical and laboratory analyses should be a part of syllabuses of technical staff educational programs. Apart from designing the string, it is also vital to lower the risk of a drilling failure. The significance of these aspects seems to be unquestionable.

  7. Environmental Impacts of Sand Exploitation. Analysis of Sand Market

    Directory of Open Access Journals (Sweden)

    Marius Dan Gavriletea

    2017-06-01

    Full Text Available Sand is an indispensable natural resource for any society. Despite society’s increasing dependence on sand, there are major challenges that this industry needs to deal with: limited sand resources, illegal mining, and environmental impact of sand mining. The purpose of this paper is twofold: to present an overview of the sand market, highlighting the main trends and actors for production, export and import, and to review the main environmental impacts associated with sand exploitation process. Based on these findings, we recommend different measures to be followed to reduce negative impacts. Sand mining should be done in a way that limits environmental damage during exploitation and restores the land after mining operations are completed.

  8. Analysis Of Damage Arising From Exploitation Of The Aircraft

    Directory of Open Access Journals (Sweden)

    Woźny Piotr

    2014-12-01

    Full Text Available During exploitation, due to a variety of reasons, aircrafts are damaged or suffer from different failures. In the process of operation, using appropriate methods of diagnosis, failure, damage, and relative deregulation of individual elements or units can be detected. For this purpose, one can apply a number of indirect diagnostic methods with the use of recorded diagnostic signals or a direct diagnosis with the use of non-destructive methods. The proper identification of the technical condition allows to determine the causes of irregularities and take actions aimed at preventing their occurrence. The article presents the types of exploitation damage of a multi-purpose aircraft. In addition, the criteria for the division of damage and research methods of the causes of damage are presented. Furthermore, an analysis of the scope of activities to be performed during the research of causes of damage to the aircraft is made.

  9. Exploiting Social Media Sensor Networks through Novel Data Fusion Techniques

    Energy Technology Data Exchange (ETDEWEB)

    Kouri, Tina [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Unprecedented amounts of data are continuously being generated by sensors (“hard” data) and by humans (“soft” data), and this data needs to be exploited to its full potential. The first step in exploiting this data is determine how the hard and soft data are related to each other. In this project we fuse hard and soft data, using the attributes of each (e.g., time and space), to gain more information about interesting events. Next, we attempt to use social networking textual data to predict the present (i.e., predict that an interesting event is occurring and details about the event) using data mining, machine learning, natural language processing, and text analysis techniques.

  10. Exploitation Strategies in Social Parasites of Fungus Growing Ants

    DEFF Research Database (Denmark)

    Clement, Janni Dolby

    One of the most remarkable and complex parasitic interactions is social parasitism, where a parasite exploits a complete society, rather than an individual organism. By integrating into a society the parasite gains protection against predators and diseases, and can redirect resources from the host...... to increase its own fitness. The host will use a sophisticated recognition system in order to accept nestmates and expel intruders from their societies. However this defence barrier can be overcome by parasites. Among the most specialized social parasites are the inquilines that exploit social insect colonies...... to this are Acromyrmex insinuator and Acromyrmex ameliae, parasites of fungus-growing ants. By still producing a worker caste both species offers a rare opportunity to study adaptive features in parasite worker behaviour. Furthermore can closely related inquiline-host combinations give us an insight in the trade...

  11. Do singing rock hyraxes exploit conspecific calls to gain attention?

    Directory of Open Access Journals (Sweden)

    Amiyaal Ilany

    Full Text Available Signal detection theory predicts that signals directed at distant or busy receivers in noisy backgrounds will begin with an alert component, in order to draw attention. Instead of an alert component, however, animals could get the same effect by using an external stimulus. Here we combined observations of free-living rock hyraxes (Procavia capensis with playback experiments to elucidate the circumstances under which males begin singing. We show that males sing following hyrax pup screams, which elicit a strong response from hyraxes within hearing distance, which are potential receivers. We hypothesize that singers enhance their singing display by exploiting the rarely emitted pup screams. To our knowledge, our findings are the first indication that animals may enhance signal reception by exploiting conspecifics' signals and the differential attention to these signals. We suggest that the utilization of external stimuli by signalers may be widespread, as an adaptive strategy for communication in complex environments.

  12. Host exploitation strategies of the social parasite Maculinea alcon

    DEFF Research Database (Denmark)

    Fürst, Matthias Alois

    as model systems. These enable the study of adaptations and counter-adaptations that might evolve in the arms-race between a parasite pursuing maximum gain and a host trying to avoid exploitation. One such system is the socially parasitic butterfly Maculinea alcon and its host the ant Myrmica rubra....... Throughout the first instars M. alcon lives on a specific food plant, however, in the last instar before pupation it develops into an obligate social parasite, posing a considerably cost to its host ant colony. I here focus on the different exploitation strategies of M. alcon throughout its lifecycle...... a fitness cost to infected host ant colonies, the host ants are expected to have developed defense mechanisms in response to the presence of the social parasite. I was able to demonstrate that the efficiency of ant colonies to defend themselves against intruders depends on a multitude of often correlated...

  13. Exploitation of Natural Resources and the Public Sector in Greenland

    DEFF Research Database (Denmark)

    Nielsen, Søren Bo

    This paper considers the role of the public sector in future exploitation of non-renewable resources, especially minerals, in Greenland. The focus is on fiscal sustainability, principles for public sector involvement and the form of government take from mining activities. At present, the public...... budget in Greenland is nearly in balance, but at unchanged policies and standards public expenditures relative to GDP are bound to increase dramatically over the next decades due to population ageing. At the same time, the freezing of the block grant from Denmark implies a decrease in revenues relative...... to GDP. Hence, fiscal policy is quite far from being sustainable. Apart from a need for reforms, these facts also constrain the possible role of the public sector in future resource exploitation. In any case, the government should preferably adhere to strict principles when developing the mineral sector...

  14. Evaluating Maximum Wind Energy Exploitation in Active Distribution Networks

    DEFF Research Database (Denmark)

    Siano, Pierluigi; Chen, Peiyuan; Chen, Zhe

    2010-01-01

    The increased spreading of distributed and renewable generation requires moving towards active management of distribution networks. In this paper, in order to evaluate maximum wind energy exploitation in active distribution networks, a method based on a multi-period optimal power flow (OPF......) analysis is proposed. Active network management schemes such as coordinated voltage control, energy curtailment and power factor control are integrated in the method in order to investigate their impacts on the maximization of wind energy exploitation. Some case studies, using real data from a Danish...... distribution system, confirmed the effectiveness of the proposed method in evaluating the optimal applications of active management schemes to increase wind energy harvesting without costly network reinforcement for the connection of wind generation....

  15. The ESA Scientific Exploitation of Operational Missions element

    Science.gov (United States)

    Desnos, Yves-Louis; Regner, Peter; Delwart, Steven; Benveniste, Jerome; Engdahl, Marcus; Zehner, Claus; Mathieu, Pierre-Philippe; Bojkov, Bojan; Gascon, Ferran; Donlon, Craig; Davidson, Malcolm; Goryl, Philippe; Pinnock, Simon

    2015-04-01

    SEOM is a program element within the fourth period (2013-2017) of ESA's Earth Observation Envelope Programme (http://seom.esa.int/). The prime objective is to federate, support and expand the international research community that the ERS,ENVISAT and the Envelope programmes have built up over the last 25 years. It aims to further strengthen the leadership of the European Earth Observation research community by enabling them to extensively exploit future European operational EO missions. SEOM will enable the science community to address new scientific research that are opened by free and open access to data from operational EO missions. Based on community-wide recommendations for actions on key research issues, gathered through a series of international thematic workshops and scientific user consultation meetings, a work plan has been established and is approved every year by ESA Members States. The 2015 SEOM work plan is covering the organisation of three Science users consultation workshops for Sentinel1/3/5P , the launch of new R&D studies for scientific exploitation of the Sentinels, the development of open-source multi-mission scientific toolboxes, the organisation of advanced international training courses, summer schools and educational materials, as well as activities for promoting the scientific use of EO data. The first SEOM projects have been tendered since 2013 including the development of Sentinel toolboxes, advanced INSAR algorithms for Sentinel-1 TOPS data exploitation, Improved Atmospheric Spectroscopic data-base (IAS), as well as grouped studies for Sentinel-1, -2, and -3 land and ocean applications and studies for exploiting the synergy between the Sentinels. The status and first results from these SEOM projects will be presented and an outlook for upcoming SEOM studies will be given.

  16. Exploitation of the Virtual Worlds in Tourism and Tourism Education

    OpenAIRE

    Zejda Pavel; Zejda David

    2016-01-01

    Academics perceive a great potential of virtual worlds in various areas, including tourism and education. Efforts adapting the virtual worlds in practice are, however, still marginal. There is no clear definition of the virtual world. Therefore the author of this article attempts to provide one. The paper also focuses on the barriers of a wider exploitation of the virtual worlds and discusses the principles that might help to increase their potential in tourism area. One of the principles – g...

  17. Exploration and Exploitation of Victorian Science in Darwin's Reading Notebooks

    OpenAIRE

    Murdock, Jaimie; Allen, Colin; DeDeo, Simon

    2015-01-01

    Search in an environment with an uncertain distribution of resources involves a trade-off between exploitation of past discoveries and further exploration. This extends to information foraging, where a knowledge-seeker shifts between reading in depth and studying new domains. To study this decision-making process, we examine the reading choices made by one of the most celebrated scientists of the modern era: Charles Darwin. From the full-text of books listed in his chronologically-organized r...

  18. Exploiting Lexical Regularities in Designing Natural Language Systems.

    Science.gov (United States)

    1988-04-01

    ELEMENT. PROJECT. TASKN Artificial Inteligence Laboratory A1A4WR NTumet 0) 545 Technology Square Cambridge, MA 02139 Ln *t- CONTROLLING OFFICE NAME AND...RO-RI95 922 EXPLOITING LEXICAL REGULARITIES IN DESIGNING NATURAL 1/1 LANGUAGE SYSTENS(U) MASSACHUSETTS INST OF TECH CAMBRIDGE ARTIFICIAL INTELLIGENCE...oes.ary and ftdou.Ip hr Nl wow" L,2This paper presents the lexical component of the START Question Answering system developed at the MIT Artificial

  19. Television production, Funding Models and Exploitation of Content

    OpenAIRE

    Doyle, Gillian

    2016-01-01

    The rise of digital platforms has transformative implications for strategies of financing media production and for exploitation of the economic value in creative content. In the television industry, changes in technologies for distribution and the emergence of SVOD services such as Netflix are gradually shifting audiences and financial power away from broadcasters while at the same time creating unprecedented opportunities for programme-makers.  Drawing on findings from recent RCUK-funded res...

  20. Exploitation and Utilization of Oilfield Geothermal Resources in China

    OpenAIRE

    Shejiao Wang; Jiahong Yan; Feng Li; Junwen Hu; Kewen Li

    2016-01-01

    Geothermal energy is a clean, green renewable resource, which can be utilized for power generation, heating, cooling, and could effectively replace oil, gas, and coal. In recent years, oil companies have put more efforts into exploiting and utilizing geothermal energy with advanced technologies for heat-tracing oil gathering and transportation, central heating, etc., which has not only reduced resource waste, but also improved large-scale and industrial resource utilization levels, and has ac...

  1. Low-Level Exploitation Mitigation by Diverse Microservices

    OpenAIRE

    Otterstad , Christian; Yarygina , Tetiana

    2017-01-01

    Part 2: Microservices and Containers; International audience; This paper discusses a combination of isolatable microservices and software diversity as a mitigation technique against low-level exploitation; the effectiveness and benefits of such an architecture are substantiated. We argue that the core security benefit of microservices with diversity is increased control flow isolation. Additionally, a new microservices mitigation technique leveraging a security monitor service is introduced t...

  2. Organizational Ambidexterity : Balancing Exploitation and Exploration in Organizations

    OpenAIRE

    Yigit, Mert

    2013-01-01

    Purpose: This paper aims to investigate necessity of ambidexterity for organizations. The main interest of this thesis is to investigate why organizations should be ambidextrous and how organizations can reach ambidexterity under the pressure of limited resources and competitive market condition. Findings: This thesis explored relations and tensions between exploitation and exploration in organizational and individual aspects. Findings in the research show that communication skill of the subu...

  3. Exploiting Child-Robot Aesthetic Interaction for a Social Robot

    OpenAIRE

    Lee, Jae-Joon; Kim, Dae-Won; Kang, Bo-Yeong

    2012-01-01

    A social robot interacts and communicates with humans by using the embodied knowledge gained from interactions with its social environment. In recent years, emotion has emerged as a popular concept for designing social robots. Several studies on social robots reported an increase in robot sociability through emotional imitative interactions between the robot and humans. In this paper conventional emotional interactions are extended by exploiting the aesthetic theories that the sociability of ...

  4. Preventing Exploits Against Software of Uncertain Provenance (PEASOUP)

    Science.gov (United States)

    2015-05-01

    two common synchronization idioms: conditional variables (e.g., pthread_cond_wait()) and semaphores that count up and are used for signaling...delay prior to certain synchronization operations. The operations include thread creation, the first lock of each mutex (or decrement of a semaphore ...permissions are shared by all threads in the same process. • Synchronization Primitives . To exploit the race condition, two attacker-controlled

  5. Endangered Species and Natural Resource Exploitation: Extinction vs. Coexistence

    OpenAIRE

    Tsur, Yacov; Zemel, Amos

    1994-01-01

    The threat on the survival of animal species due to intensive use of natural resources is incorporated within resource management models, paying special attention to uncertainty regarding the conditions that lead to extinction. The manner in which the potential benefits forgone due to the species extinction (denoted extinction penalty) induce more conservative exploitation policies is studied in detail. When the extinction penalty is ignored, the optimal policy is to drive the resource stock ...

  6. Exploiting GPUs in Virtual Machine for BioCloud

    OpenAIRE

    Jo, Heeseung; Jeong, Jinkyu; Lee, Myoungho; Choi, Dong Hoon

    2013-01-01

    Recently, biological applications start to be reimplemented into the applications which exploit many cores of GPUs for better computation performance. Therefore, by providing virtualized GPUs to VMs in cloud computing environment, many biological applications will willingly move into cloud environment to enhance their computation performance and utilize infinite cloud computing resource while reducing expenses for computations. In this paper, we propose a BioCloud system architecture that ena...

  7. Exploiting Innocuous Activity for Correlating Users Across Sites

    OpenAIRE

    Goga , Oana; Lei , Howard; Parthasarathi , Sree Hari Krishnan; Friedland , Gerald; Sommer , Robin; Teixeira , Renata

    2013-01-01

    International audience; We study how potential attackers can identify accounts on different social network sites that all belong to the same user, exploiting only innocuous activity that inherently comes with posted content. We examine three specific features on Yelp, Flickr, and Twitter: the geo-location attached to a user's posts, the timestamp of posts, and the user's writing style as captured by language models. We show that among these three features the location of posts is the most powe...

  8. Assessing uncertainty and risk in exploited marine populations

    International Nuclear Information System (INIS)

    Fogarty, M.J.; Mayo, R.K.; O'Brien, L.; Serchuk, F.M.; Rosenberg, A.A.

    1996-01-01

    The assessment and management of exploited fish and invertebrate populations is subject to several types of uncertainty. This uncertainty translates into risk to the population in the development and implementation of fishery management advice. Here, we define risk as the probability that exploitation rates will exceed a threshold level where long term sustainability of the stock is threatened. We distinguish among several sources of error or uncertainty due to (a) stochasticity in demographic rates and processes, particularly in survival rates during the early fife stages; (b) measurement error resulting from sampling variation in the determination of population parameters or in model estimation; and (c) the lack of complete information on population and ecosystem dynamics. The first represents a form of aleatory uncertainty while the latter two factors represent forms of epistemic uncertainty. To illustrate these points, we evaluate the recent status of the Georges Bank cod stock in a risk assessment framework. Short term stochastic projections are made accounting for uncertainty in population size and for random variability in the number of young surviving to enter the fishery. We show that recent declines in this cod stock can be attributed to exploitation rates that have substantially exceeded sustainable levels

  9. Commercial sexual exploitation and sex trafficking of adolescents.

    Science.gov (United States)

    Chung, Richard J; English, Abigail

    2015-08-01

    This review describes the current state of commercial sexual exploitation and sex trafficking of adolescents in the United States and globally, the legal and health implications of this severe form of abuse, and the roles that pediatric and adolescent healthcare providers can play in addressing this issue. Although this form of exploitation and abuse is shrouded in secrecy, pediatric and adolescent healthcare providers are well positioned to respond when it arises. However, awareness and understanding of the issue are generally lacking among healthcare professionals, currently limiting their effectiveness in combating this problem. Although the empirical evidence base available to guide clinical care of victims of trafficking remains limited given the secretive nature of the abuse, important contributions to the multidisciplinary literature on this issue have been made in recent years, including the Institute of Medicine's landmark report in the United States. Commercial sexual exploitation and sex trafficking of adolescents represent a human rights tragedy that remains inadequately addressed. As preeminent advocates for the health and well-being of adolescents, pediatric and adolescent healthcare providers can play a crucial role in advancing efforts not only to intervene but also to prevent further victimization of vulnerable youth.

  10. Potentially exploitable supercritical geothermal resources in the ductile crust

    Science.gov (United States)

    Watanabe, Noriaki; Numakura, Tatsuya; Sakaguchi, Kiyotoshi; Saishu, Hanae; Okamoto, Atsushi; Ingebritsen, Steven E.; Tsuchiya, Noriyoshi

    2017-01-01

    The hypothesis that the brittle–ductile transition (BDT) drastically reduces permeability implies that potentially exploitable geothermal resources (permeability >10−16 m2) consisting of supercritical water could occur only in rocks with unusually high transition temperatures such as basalt. However, tensile fracturing is possible even in ductile rocks, and some permeability–depth relations proposed for the continental crust show no drastic permeability reduction at the BDT. Here we present experimental results suggesting that the BDT is not the first-order control on rock permeability, and that potentially exploitable resources may occur in rocks with much lower BDT temperatures, such as the granitic rocks that comprise the bulk of the continental crust. We find that permeability behaviour for fractured granite samples at 350–500 °C under effective confining stress is characterized by a transition from a weakly stress-dependent and reversible behaviour to a strongly stress-dependent and irreversible behaviour at a specific, temperature-dependent effective confining stress level. This transition is induced by onset of plastic normal deformation of the fracture surface (elastic–plastic transition) and, importantly, causes no ‘jump’ in the permeability. Empirical equations for this permeability behaviour suggest that potentially exploitable resources exceeding 450 °C may form at depths of 2–6 km even in the nominally ductile crust.

  11. Relativistic quantum metrology: exploiting relativity to improve quantum measurement technologies.

    Science.gov (United States)

    Ahmadi, Mehdi; Bruschi, David Edward; Sabín, Carlos; Adesso, Gerardo; Fuentes, Ivette

    2014-05-22

    We present a framework for relativistic quantum metrology that is useful for both Earth-based and space-based technologies. Quantum metrology has been so far successfully applied to design precision instruments such as clocks and sensors which outperform classical devices by exploiting quantum properties. There are advanced plans to implement these and other quantum technologies in space, for instance Space-QUEST and Space Optical Clock projects intend to implement quantum communications and quantum clocks at regimes where relativity starts to kick in. However, typical setups do not take into account the effects of relativity on quantum properties. To include and exploit these effects, we introduce techniques for the application of metrology to quantum field theory. Quantum field theory properly incorporates quantum theory and relativity, in particular, at regimes where space-based experiments take place. This framework allows for high precision estimation of parameters that appear in quantum field theory including proper times and accelerations. Indeed, the techniques can be applied to develop a novel generation of relativistic quantum technologies for gravimeters, clocks and sensors. As an example, we present a high precision device which in principle improves the state-of-the-art in quantum accelerometers by exploiting relativistic effects.

  12. Exploiting synergies in European wind and hydrogen sectors: A cost-benefit assessment

    International Nuclear Information System (INIS)

    Shaw, Suzanne; Peteves, Estathios

    2008-01-01

    This article outlines an assessment of the perspectives for exploiting synergies between European wind and hydrogen energy sectors, where wind energy conversion to hydrogen is used as a common strategy for reducing network management costs in high wind energy penetration situations, and for production of renewable hydrogen. The attractiveness of this approach, referred to here as a 'wind-hydrogen strategy', is analysed using a cost-benefit approach to evaluate the final impact at the level of the end-consumer when this strategy is implemented. The analysis is conducted for four scenarios, based on different levels of: wind energy penetration in the electricity network area, hydrogen energy price, and environmental taxation on fuels. The effect of technological learning on the outcome is also analysed for the period up to 2050. The results of the analysis indicate that the relative value of the wind energy in the electricity market compared to the hydrogen market is a deciding factor in the attractiveness of the strategy; here the wind energy penetration in the network is a key consideration. Finally, in order to exploit learning effects from linking European wind and hydrogen sectors, action would need to be taken in the short term. (author)

  13. Increasing the power of accelerated molecular dynamics methods and plans to exploit the coming exascale

    Science.gov (United States)

    Voter, Arthur

    Many important materials processes take place on time scales that far exceed the roughly one microsecond accessible to molecular dynamics simulation. Typically, this long-time evolution is characterized by a succession of thermally activated infrequent events involving defects in the material. In the accelerated molecular dynamics (AMD) methodology, known characteristics of infrequent-event systems are exploited to make reactive events take place more frequently, in a dynamically correct way. For certain processes, this approach has been remarkably successful, offering a view of complex dynamical evolution on time scales of microseconds, milliseconds, and sometimes beyond. We have recently made advances in all three of the basic AMD methods (hyperdynamics, parallel replica dynamics, and temperature accelerated dynamics (TAD)), exploiting both algorithmic advances and novel parallelization approaches. I will describe these advances, present some examples of our latest results, and discuss what should be possible when exascale computing arrives in roughly five years. Funded by the U.S. Department of Energy, Office of Basic Energy Sciences, Materials Sciences and Engineering Division, and by the Los Alamos Laboratory Directed Research and Development program.

  14. Data Curation for the Exploitation of Large Earth Observation Products Databases - The MEA system

    Science.gov (United States)

    Mantovani, Simone; Natali, Stefano; Barboni, Damiano; Cavicchi, Mario; Della Vecchia, Andrea

    2014-05-01

    National Space Agencies under the umbrella of the European Space Agency are performing a strong activity to handle and provide solutions to Big Data and related knowledge (metadata, software tools and services) management and exploitation. The continuously increasing amount of long-term and of historic data in EO facilities in the form of online datasets and archives, the incoming satellite observation platforms that will generate an impressive amount of new data and the new EU approach on the data distribution policy make necessary to address technologies for the long-term management of these data sets, including their consolidation, preservation, distribution, continuation and curation across multiple missions. The management of long EO data time series of continuing or historic missions - with more than 20 years of data available already today - requires technical solutions and technologies which differ considerably from the ones exploited by existing systems. Several tools, both open source and commercial, are already providing technologies to handle data and metadata preparation, access and visualization via OGC standard interfaces. This study aims at describing the Multi-sensor Evolution Analysis (MEA) system and the Data Curation concept as approached and implemented within the ASIM and EarthServer projects, funded by the European Space Agency and the European Commission, respectively.

  15. Exploitative and hierarchical antagonism in a cooperative bacterium.

    Directory of Open Access Journals (Sweden)

    Francesca Fiegna

    2005-11-01

    Full Text Available Social organisms that cooperate with some members of their own species, such as close relatives, may fail to cooperate with other genotypes of the same species. Such noncooperation may take the form of outright antagonism or social exploitation. Myxococcus xanthus is a highly social prokaryote that cooperatively develops into spore-bearing, multicellular fruiting bodies in response to starvation. Here we have characterized the nature of social interactions among nine developmentally proficient strains of M. xanthus isolated from spatially distant locations. Strains were competed against one another in all possible pairwise combinations during starvation-induced development. In most pairings, at least one competitor exhibited strong antagonism toward its partner and a majority of mixes showed bidirectional antagonism that decreased total spore production, even to the point of driving whole populations to extinction. Differential response to mixing was the primary determinant of competitive superiority rather than the sporulation efficiencies of unmixed populations. In some competitive pairings, the dominant partner sporulated more efficiently in mixed populations than in clonal isolation. This finding represents a novel form of exploitation in bacteria carried out by socially competent genotypes and is the first documentation of social exploitation among natural bacterial isolates. Patterns of antagonistic superiority among these strains form a highly linear dominance hierarchy. At least some competition pairs construct chimeric, rather than segregated, fruiting bodies. The cooperative prokaryote M. xanthus has diverged into a large number of distinct social types that cooperate with clone-mates but exhibit intense antagonism toward distinct social types of the same species. Most lengthy migration events in nature may thus result in strong antagonism between migratory and resident populations, and this antagonism may have large effects on local

  16. Balancing exploration and exploitation in transferring research into practice: a comparison of five knowledge translation entity archetypes.

    Science.gov (United States)

    Oborn, Eivor; Barrett, Michael; Prince, Karl; Racko, Girts

    2013-09-05

    Translating knowledge from research into clinical practice has emerged as a practice of increasing importance. This has led to the creation of new organizational entities designed to bridge knowledge between research and practice. Within the UK, the Collaborations for Leadership in Applied Health Research and Care (CLAHRC) have been introduced to ensure that emphasis is placed in ensuring research is more effectively translated and implemented in clinical practice. Knowledge translation (KT) can be accomplished in various ways and is affected by the structures, activities, and coordination practices of organizations. We draw on concepts in the innovation literature--namely exploration, exploitation, and ambidexterity--to examine these structures and activities as well as the ensuing tensions between research and implementation. Using a qualitative research approach, the study was based on 106 semi-structured, in-depth interviews with the directors, theme leads and managers, key professionals involved in research and implementation in nine CLAHRCs. Data was also collected from intensive focus group workshops. In this article we develop five archetypes for organizing KT. The results show how the various CLAHRC entities work through partnerships to create explorative research and deliver exploitative implementation. The different archetypes highlight a range of structures that can achieve ambidextrous balance as they organize activity and coordinate practice on a continuum of exploration and exploitation. This work suggests that KT entities aim to reach their goals through a balance between exploration and exploitation in the support of generating new research and ensuring knowledge implementation. We highlight different organizational archetypes that support various ways to maintain ambidexterity, where both exploration and exploitation are supported in an attempt to narrow the knowledge gaps. The KT entity archetypes offer insights on strategies in structuring

  17. Friend or foe: exploiting sensor failures for transparent object localization and classification

    Science.gov (United States)

    Seib, Viktor; Barthen, Andreas; Marohn, Philipp; Paulus, Dietrich

    2017-02-01

    In this work we address the problem of detecting and recognizing transparent objects using depth images from an RGB-D camera. Using this type of sensor usually prohibits the localization of transparent objects since the structured light pattern of these cameras is not reflected by transparent surfaces. Instead, transparent surfaces often appear as undefined values in the resulting images. However, these erroneous sensor readings form characteristic patterns that we exploit in the presented approach. The sensor data is fed into a deep convolutional neural network that is trained to classify and localize drinking glasses. We evaluate our approach with four different types of transparent objects. To our best knowledge, no datasets offering depth images of transparent objects exist so far. With this work we aim at closing this gap by providing our data to the public.

  18. Exploiting natural killer group 2D receptors for CAR T-cell therapy.

    Science.gov (United States)

    Demoulin, Benjamin; Cook, W James; Murad, Joana; Graber, David J; Sentman, Marie-Louise; Lonez, Caroline; Gilham, David E; Sentman, Charles L; Agaugue, Sophie

    2017-08-01

    Chimeric antigen receptors (CARs) are genetically engineered proteins that combine an extracellular antigen-specific recognition domain with one or several intracellular T-cell signaling domains. When expressed in T cells, these CARs specifically trigger T-cell activation upon antigen recognition. While the clinical proof of principle of CAR T-cell therapy has been established in hematological cancers, CAR T cells are only at the early stages of being explored to tackle solid cancers. This special report discusses the concept of exploiting natural killer cell receptors as an approach that could broaden the specificity of CAR T cells and potentially enhance the efficacy of this therapy against solid tumors. New data demonstrating feasibility of this approach in humans and supporting the ongoing clinical trial are also presented.

  19. Exploration and exploitation of Victorian science in Darwin's reading notebooks.

    Science.gov (United States)

    Murdock, Jaimie; Allen, Colin; DeDeo, Simon

    2017-02-01

    Search in an environment with an uncertain distribution of resources involves a trade-off between exploitation of past discoveries and further exploration. This extends to information foraging, where a knowledge-seeker shifts between reading in depth and studying new domains. To study this decision-making process, we examine the reading choices made by one of the most celebrated scientists of the modern era: Charles Darwin. From the full-text of books listed in his chronologically-organized reading journals, we generate topic models to quantify his local (text-to-text) and global (text-to-past) reading decisions using Kullback-Liebler Divergence, a cognitively-validated, information-theoretic measure of relative surprise. Rather than a pattern of surprise-minimization, corresponding to a pure exploitation strategy, Darwin's behavior shifts from early exploitation to later exploration, seeking unusually high levels of cognitive surprise relative to previous eras. These shifts, detected by an unsupervised Bayesian model, correlate with major intellectual epochs of his career as identified both by qualitative scholarship and Darwin's own self-commentary. Our methods allow us to compare his consumption of texts with their publication order. We find Darwin's consumption more exploratory than the culture's production, suggesting that underneath gradual societal changes are the explorations of individual synthesis and discovery. Our quantitative methods advance the study of cognitive search through a framework for testing interactions between individual and collective behavior and between short- and long-term consumption choices. This novel application of topic modeling to characterize individual reading complements widespread studies of collective scientific behavior. Copyright © 2016 Elsevier B.V. All rights reserved.

  20. Cyber Child Sexual Exploitation dalam Perspektif Perlindungan atas Kejahatan Siber

    Directory of Open Access Journals (Sweden)

    Go Lisanawati

    2013-04-01

    Full Text Available Perkembangan teknologi, yang diwujudkan dengan adanya inovasi berupa Internet, yang semakin pesat menempatkan semua pihak berada pada sebuah posisi yang rentan. Kerentanan tersebut dapat berupa tereksploitasinya orang menjadi korban maupun pelaku kejahatan. Teknologi menjadi pedang bermata dua dengan segala kelebihan dan eksplorasi serta eksploitasi atas kelemahan atas pemanfaatan teknologi tersebut oleh orang-orang yang tidak bertanggungjawab. Pada posisi yang sama, anak menjadi korban yang sangat potensial atas penyalahgunaan teknologi, khususnya atas eksploitasi seksual yang dapat meliputi pornografi anak, perdagangan anak, dan child sex tourism. Indonesia memang telah memiliki berbagai perangkat aturan hukum yang dipergunakan untuk memberikan perlindungan kepada anak, termasuk juga di dalamnya adalah perangkat hukum di bidang telematika. Namun demikian belum semua perangkat hukum tersebut dapat dipergunakan secara maksimal untuk mewujudkan perlindungan hukum bagi anak. The rapid development of technology through Internet nowadays has been put all parties in the vulnerable position. The vulnerable form which may appear is the possibility of the exploited parties to be victims and/or the offender of crime. Technology itself brings not only advancement but also the weaknesses which may be explored and exploited by the irresponsible people by doing such a crime. In the same position, children are potentially to be the very vulnerable victims of the misuse of the technology, especially sexual exploitation which including child pornography, child trafficking, and also child sex tourism. Indonesia is already having such kind of law to give protection to children, including also the law related to telematics matter. But not each law could maximize yet implemented to give the law protection for child.

  1. Widespread exploitation of the honeybee by early Neolithic farmers.

    Science.gov (United States)

    Roffet-Salque, Mélanie; Regert, Martine; Evershed, Richard P; Outram, Alan K; Cramp, Lucy J E; Decavallas, Orestes; Dunne, Julie; Gerbault, Pascale; Mileto, Simona; Mirabaud, Sigrid; Pääkkönen, Mirva; Smyth, Jessica; Šoberl, Lucija; Whelton, Helen L; Alday-Ruiz, Alfonso; Asplund, Henrik; Bartkowiak, Marta; Bayer-Niemeier, Eva; Belhouchet, Lotfi; Bernardini, Federico; Budja, Mihael; Cooney, Gabriel; Cubas, Miriam; Danaher, Ed M; Diniz, Mariana; Domboróczki, László; Fabbri, Cristina; González-Urquijo, Jesus E; Guilaine, Jean; Hachi, Slimane; Hartwell, Barrie N; Hofmann, Daniela; Hohle, Isabel; Ibáñez, Juan J; Karul, Necmi; Kherbouche, Farid; Kiely, Jacinta; Kotsakis, Kostas; Lueth, Friedrich; Mallory, James P; Manen, Claire; Marciniak, Arkadiusz; Maurice-Chabard, Brigitte; Mc Gonigle, Martin A; Mulazzani, Simone; Özdoğan, Mehmet; Perić, Olga S; Perić, Slaviša R; Petrasch, Jörg; Pétrequin, Anne-Marie; Pétrequin, Pierre; Poensgen, Ulrike; Pollard, C Joshua; Poplin, François; Radi, Giovanna; Stadler, Peter; Stäuble, Harald; Tasić, Nenad; Urem-Kotsou, Dushka; Vuković, Jasna B; Walsh, Fintan; Whittle, Alasdair; Wolfram, Sabine; Zapata-Peña, Lydia; Zoughlami, Jamel

    2015-11-12

    The pressures on honeybee (Apis mellifera) populations, resulting from threats by modern pesticides, parasites, predators and diseases, have raised awareness of the economic importance and critical role this insect plays in agricultural societies across the globe. However, the association of humans with A. mellifera predates post-industrial-revolution agriculture, as evidenced by the widespread presence of ancient Egyptian bee iconography dating to the Old Kingdom (approximately 2400 BC). There are also indications of Stone Age people harvesting bee products; for example, honey hunting is interpreted from rock art in a prehistoric Holocene context and a beeswax find in a pre-agriculturalist site. However, when and where the regular association of A. mellifera with agriculturalists emerged is unknown. One of the major products of A. mellifera is beeswax, which is composed of a complex suite of lipids including n-alkanes, n-alkanoic acids and fatty acyl wax esters. The composition is highly constant as it is determined genetically through the insect's biochemistry. Thus, the chemical 'fingerprint' of beeswax provides a reliable basis for detecting this commodity in organic residues preserved at archaeological sites, which we now use to trace the exploitation by humans of A. mellifera temporally and spatially. Here we present secure identifications of beeswax in lipid residues preserved in pottery vessels of Neolithic Old World farmers. The geographical range of bee product exploitation is traced in Neolithic Europe, the Near East and North Africa, providing the palaeoecological range of honeybees during prehistory. Temporally, we demonstrate that bee products were exploited continuously, and probably extensively in some regions, at least from the seventh millennium cal BC, likely fulfilling a variety of technological and cultural functions. The close association of A. mellifera with Neolithic farming communities dates to the early onset of agriculture and may provide

  2. The strv 1 microsatellite semes: Exploiting the geosynchronous transfer orbit

    Science.gov (United States)

    Blott, R. J.; Wells, N. S.; Eves, J.

    Following 3 successful years in orbit, the UK Defence Evaluation and Research Agency's two Space Technology Research Vehicle microsatellites (STRV) 1 a&b will be followed by a second mission. STRV 1 c&d are now in construction for a planned launch in 1999. The new mission, which includes 22 experimental payloads and developmental spacecraft bus technologies from European, US and Canadian military, civil and commercial sponsors, exploits the Geosynchronous Transfer Orbit (GTO) to offer an affordable, working space research tool for both government and industry. The STRV 1 programme objective is to promote the enhancement of military and civil space communications, remote sensing and navigation capabilities at reduced cost and risk. Additional aims are to help industry to achieve commercial benefit from investment in emerging technologies and to develop the synergy between government, commercial and civilian space applications. The paper explains how STRV 1 exploits the variable altitude and high radiation environment of GTO to investigate the performance of emerging technologies and techniques. This includes the accelerated life testing of components and materials, such as infra-red detectors, advanced microprocessors and solar cell technologies, and the prototyping of new techniques to improve communications and spacecraft autonomy. Experiments include implementing a secure version of the Consultative Committee for Space Data Systems (CCSDS) packet telecommand and telemetry standards, further development of the Internet-based Space Communication Protocol Standards (SCPS) and evaluating the exploitation of the Global Positioning System (GPS) in geosynchronous orbit. The new mission also builds on and extends the comprehensive environmental monitoring achieved by STRV 1 a&b.

  3. Using choice architecture to exploit a university Distinct Urban Mine.

    Science.gov (United States)

    Pierron, Xavier; Williams, Ian D; Shaw, Peter J; Cleaver, Victoria

    2017-10-01

    There are widespread concerns regarding the potential future scarcity of ferrous and non-ferrous materials. However, there are already potentially rich reserves of secondary materials via high ownership of Electrical and Electronic Equipment (EEE) in economically-developed nations. Young people are particularly high consumers of EEE, thus university students and campuses may present an opportunity to harness this potential. University Distinct Urban Mines (DUM) may be used to exemplify how potential reserves of secondary metals may be exploited, and could contribute to the transition from a linear to a circular economy. This study aimed to evaluate small household appliances (SHA) DUM from a UK university, with the objectives to identify and quantify student households' SHA ownership, WEEE recycling, stockpiling and discarding habits amongst student households, assess and evaluate the monetary potential of SHA DUM at UK level, and propose methods to exploit DUM for universities in the UK. To this purpose, a quantitative survey was undertaken to measure students' ownership and discarding behaviour with respect to SHA. The amounts of ferrous and non-ferrous materials were then estimated and converted to monetary values from secondary materials market data to appraise the SHA DUM overall value. Thirty-five per cent of SHA are discarded in the general refuse. Broken personal care appliances (PCA) tend to be discarded due to hygiene and small size factors. When in working order, SHA tend to be equally reused, recycled or stockpiled. We conclude that a total of 189 tonnes of ferrous and non-ferrous materials were available via discarding or being stockpiled at the University of Southampton. Extrapolated to UK higher education level, discarded and stockpiled SHA represent a potential worth ∼USD 11 million. To initiate DUM exploitation within Higher Education campuses, we suggest improving users' choice architecture by providing collection methods specific to broken SHA

  4. Human collective intelligence under dual exploration-exploitation dilemmas.

    Directory of Open Access Journals (Sweden)

    Wataru Toyokawa

    Full Text Available The exploration-exploitation dilemma is a recurrent adaptive problem for humans as well as non-human animals. Given a fixed time/energy budget, every individual faces a fundamental trade-off between exploring for better resources and exploiting known resources to optimize overall performance under uncertainty. Colonies of eusocial insects are known to solve this dilemma successfully via evolved coordination mechanisms that function at the collective level. For humans and other non-eusocial species, however, this dilemma operates within individuals as well as between individuals, because group members may be motivated to take excessive advantage of others' exploratory findings through social learning. Thus, even though social learning can reduce collective exploration costs, the emergence of disproportionate "information scroungers" may severely undermine its potential benefits. We investigated experimentally whether social learning opportunities might improve the performance of human participants working on a "multi-armed bandit" problem in groups, where they could learn about each other's past choice behaviors. Results showed that, even though information scroungers emerged frequently in groups, social learning opportunities reduced total group exploration time while increasing harvesting from better options, and consequentially improved collective performance. Surprisingly, enriching social information by allowing participants to observe others' evaluations of chosen options (e.g., Amazon's 5-star rating system in addition to choice-frequency information had a detrimental impact on performance compared to the simpler situation with only the choice-frequency information. These results indicate that humans groups can handle the fundamental "dual exploration-exploitation dilemmas" successfully, and that social learning about simple choice-frequencies can help produce collective intelligence.

  5. Examples of Sentinel-2A Mission Exploitation Results

    Science.gov (United States)

    Koetz, Benjamin; Hoersch, Bianca; Gascon, Ferran; Desnos, Yves-Louis; Seifert, Frank Martin; Paganini, Marc; Ramoino, Fabrizio; Arino, Olivier

    2017-04-01

    The Sentinel-2 Copernicus mission will bring significant breakthrough in the exploitation of space borne optical data. Sentinel-2 time series will transform land cover, agriculture, forestry, in-land water and costal EO applications from mapping to monitoring, from snapshot to time series data analysis, from image-based to pixel-based processing. The 5-days temporal revisiting of the Sentinel-2 satellites, when both units will be operated together, will usher us in a new era for time series analysis at high spatial resolutions (HR) of 10-20 meters. The monitoring of seasonal variations and processes in phenology and hydrology are examples of the many R&D areas to be studied. The mission's large swath and systematic acquisitions will further support unprecedented coverage at the national scale addressing information requirements of national to regional policies. Within ESA programs, such as the Data User Element (DUE), Scientific Exploitation of Operational Missions (SEOM) and Climate Change Initiative (CCI), several R&D activities are preparing the exploitation of the Sentinel-2 mission towards reliable measurements and monitoring of e.g. Essential Climate Variables and indicators for the Sustainable Development Goals. Early Sentinel-2 results will be presented related to a range of applications and scientific domains such as agricultural monitoring at national scale (DUE Sen2Agri), wetland extent and condition over African Ramsar sites (DUE GlobWetland-Africa), land cover mapping for climate change (CCI Land Cover), national land monitoring (Cadaster-Env), forest degradation (DUE ForMoSa), urban mapping (DUE EO4Urban), in-land water quality (DUE SPONGE), map of Mediterranean aquaculture (DUE SMART) and coral reef habitat mapping (SEOM S2-4Sci Coral). The above-mentioned activities are only a few examples from the very active international land imaging community building on the long-term Landsat and Spot heritage and knowledge.

  6. On a model of mixtures with internal variables: Extended Liu procedure for the exploitation of the entropy principle

    Directory of Open Access Journals (Sweden)

    Francesco Oliveri

    2016-01-01

    Full Text Available The exploitation of second law of thermodynamics for a mixture of two fluids with a scalar internal variable and a first order nonlocal state space is achieved by using the extended Liu approach. This method requires to insert as constraints in the entropy inequality either the field equations or their gradient extensions. Consequently, the thermodynamic restrictions imposed by the entropy principle are derived without introducing extra terms neither in the energy balance equation nor in the entropy inequality.

  7. The ESA Scientific Exploitation of Operational Missions element, first results

    Science.gov (United States)

    Desnos, Yves-Louis; Regner, Peter; Delwart, Steven; Benveniste, Jerome; Engdahl, Marcus; Mathieu, Pierre-Philippe; Gascon, Ferran; Donlon, Craig; Davidson, Malcolm; Pinnock, Simon; Foumelis, Michael; Ramoino, Fabrizio

    2016-04-01

    SEOM is a program element within the fourth period (2013-2017) of ESA's Earth Observation Envelope Programme (http://seom.esa.int/). The prime objective is to federate, support and expand the international research community that the ERS, ENVISAT and the Envelope programmes have built up over the last 25 years. It aims to further strengthen the leadership of the European Earth Observation research community by enabling them to extensively exploit future European operational EO missions. SEOM will enable the science community to address new scientific research that are opened by free and open access to data from operational EO missions. Based on community-wide recommendations for actions on key research issues, gathered through a series of international thematic workshops and scientific user consultation meetings, a work plan is established and is approved every year by ESA Members States. During 2015 SEOM, Science users consultation workshops have been organized for Sentinel1/3/5P ( Fringe, S3 Symposium and Atmospheric science respectively) , new R&D studies for scientific exploitation of the Sentinels have been launched ( S3 for Science SAR Altimetry and Ocean Color , S2 for Science,) , open-source multi-mission scientific toolboxes have been launched (in particular the SNAP/S1-2-3 Toolbox). In addition two advanced international training courses have been organized in Europe to exploit the new S1-A and S2-A data for Land and Ocean remote sensing (over 120 participants from 25 countries) as well as activities for promoting the first scientific results ( e.g. Chili Earthquake) . In addition the First EO Open Science 2.0 was organised at ESA in October 2015 with 225 participants from 31 countries bringing together young EO scientists and data scientists. During the conference precursor activities in EO Open Science and Innovation were presented, while developing a Roadmap preparing for future ESA scientific exploitation activities. Within the conference, the first

  8. Exploiting the Potential of Data Centers in the Smart Grid

    Science.gov (United States)

    Wang, Xiaoying; Zhang, Yu-An; Liu, Xiaojing; Cao, Tengfei

    As the number of cloud computing data centers grows rapidly in recent years, from the perspective of smart grid, they are really large and noticeable electric load. In this paper, we focus on the important role and the potential of data centers as controllable loads in the smart grid. We reviewed relevant research in the area of letting data centers participate in the ancillary services market and demand response programs of the grid, and further investigate the possibility of exploiting the impact of data center placement on the grid. Various opportunities and challenges are summarized, which could provide more chances for researches to explore this field.

  9. Exploitation of natural resources and conflict in Colombia

    Directory of Open Access Journals (Sweden)

    Luis Eduardo Sandoval

    2017-11-01

    Full Text Available Colombia has increasingly been specializing in the extraction of mineral and energy resources such as gold, coal, oil and ferronickel. These activities, in the context of state weakness, have engendered conflicts of different dimensions. This paper proposes an indicator of conflict related to mineral exploitation that classifies five dimensions of conflict: social, economic, cultural, political and environmental. The aggregate indicator shows that murders, displacement of Afrodescendent populations, flooding, pollution, fires, infant mortality, coca crops and sexual offenses are highly and positively correlated with the number of conflicts.

  10. Assessing Africa-wide Pangolin exploitation by scaling local data

    DEFF Research Database (Denmark)

    Ingram, Daniel J.; Coad, Lauren; Abernethy, Katharine A.

    2018-01-01

    on regional trends in exploitation of threatened species to inform conservation actions and policy. We estimate that 0.4-2.7 million pangolins are hunted annually in Central African forests. The number of pangolins hunted has increased by ∼150% and the proportion of pangolins of all vertebrates hunted...... increased from 0.04% to 1.83% over the past four decades. However, there were no trends in pangolins observed at markets, suggesting use of alternative supply chains. We found evidence that the price of giant (Smutsia gigantea) and arboreal (Phataginus sp.) pangolins in urban markets has increased...

  11. The largest renewable, easily exploitable, and economically sustainable energy resource

    Science.gov (United States)

    Abbate, Giancarlo; Saraceno, Eugenio

    2018-02-01

    Sun, the ultimate energy resource of our planet, transfers energy to the Earth at an average power of 23,000 TW. Earth surface can be regarded as a huge panel transforming solar energy into a more convenient mechanical form, the wind. Since millennia wind is recognized as an exploitable form of energy and it is common knowledge that the higher you go, the stronger the winds flow. To go high is difficult; however Bill Gates cites high wind among possible energy miracles in the near future. Public awareness of this possible miracle is still missing, but today's technology is ready for it.

  12. On the Exploitation of Sensitivity Derivatives for Improving Sampling Methods

    Science.gov (United States)

    Cao, Yanzhao; Hussaini, M. Yousuff; Zang, Thomas A.

    2003-01-01

    Many application codes, such as finite-element structural analyses and computational fluid dynamics codes, are capable of producing many sensitivity derivatives at a small fraction of the cost of the underlying analysis. This paper describes a simple variance reduction method that exploits such inexpensive sensitivity derivatives to increase the accuracy of sampling methods. Three examples, including a finite-element structural analysis of an aircraft wing, are provided that illustrate an order of magnitude improvement in accuracy for both Monte Carlo and stratified sampling schemes.

  13. Synergy in spreading processes: from exploitative to explorative foraging strategies.

    Science.gov (United States)

    Pérez-Reche, Francisco J; Ludlam, Jonathan J; Taraskin, Sergei N; Gilligan, Christopher A

    2011-05-27

    An epidemiological model which incorporates synergistic effects that allow the infectivity and/or susceptibility of hosts to be dependent on the number of infected neighbors is proposed. Constructive synergy induces an exploitative behavior which results in a rapid invasion that infects a large number of hosts. Interfering synergy leads to a slower and sparser explorative foraging strategy that traverses larger distances by infecting fewer hosts. The model can be mapped to a dynamical bond percolation with spatial correlations that affect the mechanism of spread but do not influence the critical behavior of epidemics. © 2011 American Physical Society

  14. VCSELs and silicon light sources exploiting SOI grating mirrors

    DEFF Research Database (Denmark)

    Chung, Il-Sug; Mørk, Jesper

    2012-01-01

    In this talk, novel vertical-cavity laser structure consisting of a dielectric Bragg reflector, a III-V active region, and a high-index-contrast grating made in the Si layer of a silicon-on-insulator (SOI) wafer will be presented. In the Si light source version of this laser structure, the SOI...... the Bragg reflector. Numerical simulations show that both the silicon light source and the VCSEL exploiting SOI grating mirrors have superior performances, compared to existing silicon light sources and long wavelength VCSELs. These devices are highly adequate for chip-level optical interconnects as well...

  15. Construct exploit constraint in crash analysis by bypassing canary

    Science.gov (United States)

    Huang, Ning; Huang, Shuguang; Huang, Hui; Chang, Chao

    2017-08-01

    Selective symbolic execution is a common program testing technology. Developed on the basis of it, some crash analysis systems are often used to test the fragility of the program by constructing exploit constraints, such as CRAX. From the study of crash analysis based on symbolic execution, this paper find that this technology cannot bypass the canary stack protection mechanisms. This paper makes the improvement uses the API hook in Linux. Experimental results show that the use of API hook can effectively solve the problem that crash analysis cannot bypass the canary protection.

  16. Geothermal exploitation activity by the United Nations in Ethiopia

    Energy Technology Data Exchange (ETDEWEB)

    Nakamura, H. (Geological Survey of Japan)

    1971-01-01

    The Rift Valley in Ethiopia was investigated for geothermal exploitation by the United Nations because it has Quaternary volcanoes which often indicate possible geothermal power generation. Preparations for the project are still being made, and the chemical analysis of hot springs is being conducted. The Rift Valley has high temperature springs and potential mineral deposits. The Danakil basin in Ethiopia which is included in the Northern Afar, has several active volcanoes made up of basalt deposits and has active hot springs. The East Africa Rift Valley, the Red Sea Rift Valley, and the Afar area are also areas suitable for investigation. Seven maps are included.

  17. Compete, coordinate, and cooperate: How to exploit uncertain environments with social interaction.

    Science.gov (United States)

    Schulze, Christin; Newell, Ben R

    2015-10-01

    Countless decisions, from the trivial to the crucial, are made in complex social contexts while facing uncertain consequences. Yet a large portion of decision making research focuses on either the effects of social interaction or the effects of environmental uncertainty by examining strategic games against others or individual games against nature. Drawing a connection between these approaches, the authors extend a standard individual choice paradigm to include social interaction with 1 other person. In this paradigm, 2 competing decision makers repeatedly select among 2 options, each offering a particular probability of a fixed payoff. When both players choose the same, correct option, the payoff is evenly split; when they choose different options, the player choosing the correct option receives the full payoff. The addition of this social dimension gives players an opportunity to fully exploit an uncertain environment via cooperation: By consistently choosing opposite options, two players can exploit the uncertain environment more effectively than a single player could. We present 2 experiments that manipulate environmental (Experiment 1) and social (Experiment 2) aspects of the paradigm. In Experiment 1, the outcome probabilities were either known or unknown to participants; in Experiment 2, participants' attention was drawn to individual or group gains by introducing either within- or between-group competition. Efficient cooperation did not emerge spontaneously in Experiment 1. Instead, most people probability maximized, mirroring the behavior observed in individual choice. By contrast, between--group competition in Experiment 2 facilitated efficient-but not always equitable--exploitation of uncertain environments. This work links the concepts of individual risky choice and strategic decision making under both environmental and social uncertainty. (c) 2015 APA, all rights reserved).

  18. Sensory exploitation and cultural transmission: the late emergence of iconic representations in human evolution.

    Science.gov (United States)

    Verpooten, Jan; Nelissen, Mark

    2010-09-01

    Iconic representations (i.e., figurative imagery and realistic art) only started to appear consistently some 45,000 years ago, although humans have been anatomically modern since 200,000-160,000 years ago. What explains this? Some authors have suggested a neurocognitive change took place, leading to a creative explosion, although this has been contested. Here, we examine the hypothesis that demographic changes caused cultural "cumulative adaptive evolution" and as such the emergence of modern symbolic behavior. This approach usefully explains the evolution of utilitarian skills and tools, and the creation of symbols to identify groups. However, it does not equally effectively explain the evolution of behaviors that may not be directly adaptive, such as the production of iconic representations like figurines and rock art. In order to shed light on their emergence, we propose to combine the above-mentioned cultural hypothesis with the concept of sensory exploitation. The concept essentially states that behavioral traits (in this case iconic art production) which exploit pre-existing sensory sensitivities will evolve if not hindered by costs (i.e., natural selection). In this view, iconic art traditions are evolved by piggy-backing on cumulative adaptive evolution. Since it is to date uncertain whether art has served any adaptive function in human evolution, parsimony demands paying more attention to the primary and a functional mechanism of sensory exploitation as opposed to mechanisms of models based exclusively on secondary benefits (such as Miller's, for instance, in which art is proposed to evolve as a sexual display of fitness).

  19. Cheating by exploitation of developmental prestalk patterning in Dictyostelium discoideum.

    Directory of Open Access Journals (Sweden)

    Anupama Khare

    2010-02-01

    Full Text Available The cooperative developmental system of the social amoeba Dictyostelium discoideum is susceptible to exploitation by cheaters-strains that make more than their fair share of spores in chimerae. Laboratory screens in Dictyostelium have shown that the genetic potential for facultative cheating is high, and field surveys have shown that cheaters are abundant in nature, but the cheating mechanisms are largely unknown. Here we describe cheater C (chtC, a strong facultative cheater mutant that cheats by affecting prestalk differentiation. The chtC gene is developmentally regulated and its mRNA becomes stalk-enriched at the end of development. chtC mutants are defective in maintaining the prestalk cell fate as some of their prestalk cells transdifferentiate into prespore cells, but that defect does not affect gross developmental morphology or sporulation efficiency. In chimerae between wild-type and chtC mutant cells, the wild-type cells preferentially give rise to prestalk cells, and the chtC mutants increase their representation in the spore mass. Mixing chtC mutants with other cell-type proportioning mutants revealed that the cheating is directly related to the prestalk-differentiation propensity of the victim. These findings illustrate that a cheater can victimize cooperative strains by exploiting an established developmental pathway.

  20. Noise-exploitation and adaptation in neuromorphic sensors

    Science.gov (United States)

    Hindo, Thamira; Chakrabartty, Shantanu

    2012-04-01

    Even though current micro-nano fabrication technology has reached integration levels where ultra-sensitive sensors can be fabricated, the sensing performance (resolution per joule) of synthetic systems are still orders of magnitude inferior to those observed in neurobiology. For example, the filiform hairs in crickets operate at fundamental limits of noise; auditory sensors in a parasitoid fly can overcome fundamental limitations to precisely localize ultra-faint acoustic signatures. Even though many of these biological marvels have served as inspiration for different types of neuromorphic sensors, the main focus these designs have been to faithfully replicate the biological functionalities, without considering the constructive role of "noise". In man-made sensors device and sensor noise are typically considered as a nuisance, where as in neurobiology "noise" has been shown to be a computational aid that enables biology to sense and operate at fundamental limits of energy efficiency and performance. In this paper, we describe some of the important noise-exploitation and adaptation principles observed in neurobiology and how they can be systematically used for designing neuromorphic sensors. Our focus will be on two types of noise-exploitation principles, namely, (a) stochastic resonance; and (b) noise-shaping, which are unified within our previously reported framework called Σ▵ learning. As a case-study, we describe the application of Σ▵ learning for the design of a miniature acoustic source localizer whose performance matches that of its biological counterpart(Ormia Ochracea).

  1. The environmental impacts of foamed concrete production and exploitation

    Science.gov (United States)

    Namsone, E.; Korjakins, A.; Sahmenko, G.; Sinka, M.

    2017-10-01

    This paper presents a study focusing on the environmental impacts of foamed concrete production and exploitation. CO2 emissions are very important factor for describing durability and sustainability of any building material and its life cycle. The building sector is one of the largest energy-consuming sectors in the world. In this study CO2 emissions are evaluated with regard to three types of energy resources (gas, coal and eco-friendly fuel). The related savings on raw materials are up to 120 t of water per 1000 t of traditionally mixed foamed concrete and up to 350 t of sand per 1000 t of foamed concrete produced with intensive mixing technology. In addition, total reduction of CO2 emissions (up to 60 t per 1000 m3 of material) and total energy saving from introduction of foamed concrete production (depending on the type of fuel) were calculated. In order to analyze the conditions of exploitation, both thermal conductivity and thickness of wall was determined. All obtained and calculated results were compared to those of the commercially produced autoclaved aerated concrete.

  2. The exploration-exploitation dilemma: a multidisciplinary framework.

    Directory of Open Access Journals (Sweden)

    Oded Berger-Tal

    Full Text Available The trade-off between the need to obtain new knowledge and the need to use that knowledge to improve performance is one of the most basic trade-offs in nature, and optimal performance usually requires some balance between exploratory and exploitative behaviors. Researchers in many disciplines have been searching for the optimal solution to this dilemma. Here we present a novel model in which the exploration strategy itself is dynamic and varies with time in order to optimize a definite goal, such as the acquisition of energy, money, or prestige. Our model produced four very distinct phases: Knowledge establishment, Knowledge accumulation, Knowledge maintenance, and Knowledge exploitation, giving rise to a multidisciplinary framework that applies equally to humans, animals, and organizations. The framework can be used to explain a multitude of phenomena in various disciplines, such as the movement of animals in novel landscapes, the most efficient resource allocation for a start-up company, or the effects of old age on knowledge acquisition in humans.

  3. The HACMS program: using formal methods to eliminate exploitable bugs.

    Science.gov (United States)

    Fisher, Kathleen; Launchbury, John; Richards, Raymond

    2017-10-13

    For decades, formal methods have offered the promise of verified software that does not have exploitable bugs. Until recently, however, it has not been possible to verify software of sufficient complexity to be useful. Recently, that situation has changed. SeL4 is an open-source operating system microkernel efficient enough to be used in a wide range of practical applications. Its designers proved it to be fully functionally correct, ensuring the absence of buffer overflows, null pointer exceptions, use-after-free errors, etc., and guaranteeing integrity and confidentiality. The CompCert Verifying C Compiler maps source C programs to provably equivalent assembly language, ensuring the absence of exploitable bugs in the compiler. A number of factors have enabled this revolution, including faster processors, increased automation, more extensive infrastructure, specialized logics and the decision to co-develop code and correctness proofs rather than verify existing artefacts. In this paper, we explore the promise and limitations of current formal-methods techniques. We discuss these issues in the context of DARPA's HACMS program, which had as its goal the creation of high-assurance software for vehicles, including quadcopters, helicopters and automobiles.This article is part of the themed issue 'Verified trustworthy software systems'. © 2017 The Authors.

  4. User-driven sampling strategies in image exploitation

    Science.gov (United States)

    Harvey, Neal; Porter, Reid

    2013-12-01

    Visual analytics and interactive machine learning both try to leverage the complementary strengths of humans and machines to solve complex data exploitation tasks. These fields overlap most significantly when training is involved: the visualization or machine learning tool improves over time by exploiting observations of the human-computer interaction. This paper focuses on one aspect of the human-computer interaction that we call user-driven sampling strategies. Unlike relevance feedback and active learning sampling strategies, where the computer selects which data to label at each iteration, we investigate situations where the user selects which data is to be labeled at each iteration. User-driven sampling strategies can emerge in many visual analytics applications but they have not been fully developed in machine learning. User-driven sampling strategies suggest new theoretical and practical research questions for both visualization science and machine learning. In this paper we identify and quantify the potential benefits of these strategies in a practical image analysis application. We find user-driven sampling strategies can sometimes provide significant performance gains by steering tools towards local minima that have lower error than tools trained with all of the data. In preliminary experiments we find these performance gains are particularly pronounced when the user is experienced with the tool and application domain.

  5. Exploiting GPUs in Virtual Machine for BioCloud

    Science.gov (United States)

    Jo, Heeseung; Jeong, Jinkyu; Lee, Myoungho; Choi, Dong Hoon

    2013-01-01

    Recently, biological applications start to be reimplemented into the applications which exploit many cores of GPUs for better computation performance. Therefore, by providing virtualized GPUs to VMs in cloud computing environment, many biological applications will willingly move into cloud environment to enhance their computation performance and utilize infinite cloud computing resource while reducing expenses for computations. In this paper, we propose a BioCloud system architecture that enables VMs to use GPUs in cloud environment. Because much of the previous research has focused on the sharing mechanism of GPUs among VMs, they cannot achieve enough performance for biological applications of which computation throughput is more crucial rather than sharing. The proposed system exploits the pass-through mode of PCI express (PCI-E) channel. By making each VM be able to access underlying GPUs directly, applications can show almost the same performance as when those are in native environment. In addition, our scheme multiplexes GPUs by using hot plug-in/out device features of PCI-E channel. By adding or removing GPUs in each VM in on-demand manner, VMs in the same physical host can time-share their GPUs. We implemented the proposed system using the Xen VMM and NVIDIA GPUs and showed that our prototype is highly effective for biological GPU applications in cloud environment. PMID:23710465

  6. An automated data exploitation system for airborne sensors

    Science.gov (United States)

    Chen, Hai-Wen; McGurr, Mike

    2014-06-01

    Advanced wide area persistent surveillance (WAPS) sensor systems on manned or unmanned airborne vehicles are essential for wide-area urban security monitoring in order to protect our people and our warfighter from terrorist attacks. Currently, human (imagery) analysts process huge data collections from full motion video (FMV) for data exploitation and analysis (real-time and forensic), providing slow and inaccurate results. An Automated Data Exploitation System (ADES) is urgently needed. In this paper, we present a recently developed ADES for airborne vehicles under heavy urban background clutter conditions. This system includes four processes: (1) fast image registration, stabilization, and mosaicking; (2) advanced non-linear morphological moving target detection; (3) robust multiple target (vehicles, dismounts, and human) tracking (up to 100 target tracks); and (4) moving or static target/object recognition (super-resolution). Test results with real FMV data indicate that our ADES can reliably detect, track, and recognize multiple vehicles under heavy urban background clutters. Furthermore, our example shows that ADES as a baseline platform can provide capability for vehicle abnormal behavior detection to help imagery analysts quickly trace down potential threats and crimes.

  7. Exploitation of Clustering Techniques in Transactional Healthcare Data

    Directory of Open Access Journals (Sweden)

    Naeem Ahmad Mahoto

    2014-03-01

    Full Text Available Healthcare service centres equipped with electronic health systems have improved their resources as well as treatment processes. The dynamic nature of healthcare data of each individual makes it complex and difficult for physicians to manually mediate them; therefore, automatic techniques are essential to manage the quality and standardization of treatment procedures. Exploratory data analysis, patternanalysis and grouping of data is managed using clustering techniques, which work as an unsupervised classification. A number of healthcare applications are developed that use several data mining techniques for classification, clustering and extracting useful information from healthcare data. The challenging issue in this domain is to select adequate data mining algorithm for optimal results. This paper exploits three different clustering algorithms: DBSCAN (Density-Based Clustering, agglomerative hierarchical and k-means in real transactional healthcare data of diabetic patients (taken as case study to analyse their performance in large and dispersed healthcare data. The best solution of cluster sets among the exploited algorithms is evaluated using clustering quality indexes and is selected to identify the possible subgroups of patients having similar treatment patterns

  8. Exploitation of puddles for breakthroughs in claustrum research

    Directory of Open Access Journals (Sweden)

    John Irwin Johnson

    2014-05-01

    Full Text Available Since its first identification as a thin strip of gray matter enclosed between stretches of neighboring fiber bundles, the claustrum has been considered impossible to study by many modern techniques that need a certain roominess of tissue for their application. The claustrum was known as the front wall, vormauren in German from 1822, and is still called avant-mur in French. We here propose a means for breaking into and through this wall, by utilizing the instances where the claustral tissue itself has broken free into more spacious dimensions. This has occurred several times in the evolution of modern mammals, and all that needs be done is to exploit these natural expansions in order to take advantage of a great panoply of technological advances now at our disposal. So here we review the kinds of breakout puddles that await productive exploitation, to bring our knowledge of structure and function up to the level enjoyed for other more accessible regions of the brain..

  9. Exploiting GPUs in Virtual Machine for BioCloud

    Directory of Open Access Journals (Sweden)

    Heeseung Jo

    2013-01-01

    Full Text Available Recently, biological applications start to be reimplemented into the applications which exploit many cores of GPUs for better computation performance. Therefore, by providing virtualized GPUs to VMs in cloud computing environment, many biological applications will willingly move into cloud environment to enhance their computation performance and utilize infinite cloud computing resource while reducing expenses for computations. In this paper, we propose a BioCloud system architecture that enables VMs to use GPUs in cloud environment. Because much of the previous research has focused on the sharing mechanism of GPUs among VMs, they cannot achieve enough performance for biological applications of which computation throughput is more crucial rather than sharing. The proposed system exploits the pass-through mode of PCI express (PCI-E channel. By making each VM be able to access underlying GPUs directly, applications can show almost the same performance as when those are in native environment. In addition, our scheme multiplexes GPUs by using hot plug-in/out device features of PCI-E channel. By adding or removing GPUs in each VM in on-demand manner, VMs in the same physical host can time-share their GPUs. We implemented the proposed system using the Xen VMM and NVIDIA GPUs and showed that our prototype is highly effective for biological GPU applications in cloud environment.

  10. Exploiting first-class arrays in Fortran for accelerator programming

    International Nuclear Information System (INIS)

    Rasmussen, Craig E.; Weseloh, Wayne N.; Robey, Robert W.; Sottile, Matthew J.; Quinlan, Daniel; Overbey, Jeffrey

    2010-01-01

    Emerging architectures for high performance computing often are well suited to a data parallel programming model. This paper presents a simple programming methodology based on existing languages and compiler tools that allows programmers to take advantage of these systems. We will work with the array features of Fortran 90 to show how this infrequently exploited, standardized language feature is easily transformed to lower level accelerator code. Our transformations are based on a mapping from Fortran 90 to C++ code with OpenCL extensions. The sheer complexity of programming for clusters of many or multi-core processors with tens of millions threads of execution make the simplicity of the data parallel model attractive. Furthermore, the increasing complexity of todays applications (especially when convolved with the increasing complexity of the hardware) and the need for portability across hardware architectures make a higher-level and simpler programming model like data parallel attractive. The goal of this work has been to exploit source-to-source transformations that allow programmers to develop and maintain programs at a high-level of abstraction, without coding to a specific hardware architecture. Furthermore these transformations allow multiple hardware architectures to be targeted without changing the high-level source. It also removes the necessity for application programmers to understand details of the accelerator architecture or to know OpenCL.

  11. Human trafficking for labour exploitation:
    Interpreting the crime

    Directory of Open Access Journals (Sweden)

    Jill E.B. Coster van Voorhout

    2007-12-01

    Full Text Available The definition of human trafficking for labour exploitation, as follows from the European Council Framework Decision, proves to be unclear. Literal interpretation does not suffice, because it does not clarify all elements of what is deemed to be criminal behaviour, and hermeneutical interpretation also falls short discouraging the aim of this legislation, namely harmonisation. Hence, another solution is required. This article does so by firstly challenging assumptions about human trafficking for labour exploitation that are generally pertinent, but nonetheless untrue. This accurate appraisal of the crime’s nature is followed by a synopsis of national legislation and adjudication in three Member States, so as to also focus on these actualities regarding the crime that are commonly not conceived. This article examines two countries that have implemented the Framework Decision, namely Belgium and the Netherlands, and one that has not yet done so, the United Kingdom. Thereafter remaining unexplained elements of the Framework Decision’s definition are interpreted with use of international, pan-European and European legislation and adjudication. Based upon all this, a suggested interpretation of the Framework Decision’s definition is provided so as to overcome all identified difficulties with it.

  12. Film-induced, steps for a Real Exploitation in Europe

    Directory of Open Access Journals (Sweden)

    Francesco di Cesare

    2015-03-01

    Full Text Available One of the possible ways to enhance Europe visibility, its entirety rather than a set of destinations, is implementing cooperation between the Member States especially in creating and developing trans-border thematic tourist products and experiences. One of them could be the film-induced tourism. In looking back over the past two cycles of European programming it is possible to find some examples, described in the article, in which the theme of audiovisual productions in their shooting phase in European locations has been the subject of EU attention.This article refers to some previous research results reminding how movie-induced tourism seems to be used just through sporadic attempts and therefore not developed and exploited in a strategic way. Whether from demand-side is clear what potential is inherent in the relationship between movie and tourism, on the supply side there is still much to do.As the current EC funding period (2014-2020 is favouring, at least in the first calls for proposal that came out, SMEs projects and being aware of the apparent lack of such activities developed by private businesses, the article explores new opportunities to be gathered suggesting a new exploitation path.

  13. Cheating by Exploitation of Developmental Prestalk Patterning in Dictyostelium discoideum

    Science.gov (United States)

    Khare, Anupama; Shaulsky, Gad

    2010-01-01

    The cooperative developmental system of the social amoeba Dictyostelium discoideum is susceptible to exploitation by cheaters—strains that make more than their fair share of spores in chimerae. Laboratory screens in Dictyostelium have shown that the genetic potential for facultative cheating is high, and field surveys have shown that cheaters are abundant in nature, but the cheating mechanisms are largely unknown. Here we describe cheater C (chtC), a strong facultative cheater mutant that cheats by affecting prestalk differentiation. The chtC gene is developmentally regulated and its mRNA becomes stalk-enriched at the end of development. chtC mutants are defective in maintaining the prestalk cell fate as some of their prestalk cells transdifferentiate into prespore cells, but that defect does not affect gross developmental morphology or sporulation efficiency. In chimerae between wild-type and chtC mutant cells, the wild-type cells preferentially give rise to prestalk cells, and the chtC mutants increase their representation in the spore mass. Mixing chtC mutants with other cell-type proportioning mutants revealed that the cheating is directly related to the prestalk-differentiation propensity of the victim. These findings illustrate that a cheater can victimize cooperative strains by exploiting an established developmental pathway. PMID:20195510

  14. Indirect evolution of social fitness inequalities and facultative social exploitation.

    Science.gov (United States)

    Nair, Ramith R; Fiegna, Francesca; Velicer, Gregory J

    2018-03-28

    Microbial genotypes with similarly high proficiency at a cooperative behaviour in genetically pure groups often exhibit fitness inequalities caused by social interaction in mixed groups. Winning competitors in this scenario have been referred to as 'cheaters' in some studies. Such interaction-specific fitness inequalities, as well as social exploitation (in which interaction between genotypes increases absolute fitness), might evolve due to selection for competitiveness at the focal behaviour or might arise non-adaptively due to pleiotropy, hitchhiking or genetic drift. The bacterium Myxococcus xanthus sporulates during cooperative development of multicellular fruiting bodies. Using M. xanthus lineages that underwent experimental evolution in allopatry without selection on sporulation, we demonstrate that interaction-specific fitness inequalities and facultative social exploitation during development readily evolved indirectly among descendant lineages. Fitness inequalities between evolved genotypes were not caused by divergence in developmental speed, as faster-developing strains were not over-represented among competition winners. In competitions between ancestors and several evolved strains, all evolved genotypes produced more spores than the ancestors, including losers of evolved-versus-evolved competitions, indicating that adaptation in non-developmental contexts pleiotropically increased competitiveness for spore production. Overall, our results suggest that fitness inequalities caused by social interaction during cooperative processes may often evolve non-adaptively in natural populations. © 2018 The Authors.

  15. Gas exploitation and gas conversion; Gassutnyttelse og gasskonvertering

    Energy Technology Data Exchange (ETDEWEB)

    Laading, Gjert

    1998-07-01

    This presentation deals with some of the challenges and possibilities connected with ''stranded'' gas. These are offshore gas reserves, especially associated gas, that is not connected with the market and that cannot be piped onshore, and where reinjection is not profitable, and where flaring off is not an option. There is increasing interest all over the world to find economical and environmentally friendly solutions to this problem. A good solution will render such fields economically developable and will to a high degree increase the total volume of the world's exploitable gas reserves. Since synthesis gas is a dominating cost element in most chemical conversion processes for gas, the synthesis gases are discussed in some detail. There is also a discussion of the conversion of the gas to Methanol, Synthetic oil (Syncrude and Synfuels) and to DME (Di-methyl-ether). Two methods for gas transport from the field are discussed; LNG on floating production storage and off loading (FPSO), and Gas hydrates. Principles, limitations and conditions for placing those processes on a FPSO. Finally, the presentation discusses the most important economic factors related to the exploitation of offshore gas, and suggests some possibilities for future development.11 figs.

  16. Exploitation of the in-seam miner and operational experience

    Energy Technology Data Exchange (ETDEWEB)

    Wilson, W I.S.; Morris, A H

    1977-12-01

    The In-seam Miner started as an investigatory project at MRDE in 1969. Since that time it has passed through the classic development stages of design of prototype, surface trials, underground trials, modification, production of more machines, assessment of experience and then wider exploitation. At the present time well over 100 machines have been supplied to the National Coal Board. The original machine was hydraulically driven and all but five of the machines supplied to date are of this type. The variety of applications that the machine has found in the mining industry has caused derivative development to embrace machines of length varying from 12-ft centers to 44-ft centers, to work in seams ranging from 40 in. up to 68 in. The range of applications has included face drivages, stablehole operations, in-seam retreat roadways and dirt-absorbing headings. Five electrically driven machines are now coming onto the market and experience with them, though limited, is very encouraging. The paper concentrates on two major aspects of the overall development process: first, the management of exploitation; and second, some operational experience of the In-seam Miner in South Midlands area.

  17. Exploiting GPUs in virtual machine for BioCloud.

    Science.gov (United States)

    Jo, Heeseung; Jeong, Jinkyu; Lee, Myoungho; Choi, Dong Hoon

    2013-01-01

    Recently, biological applications start to be reimplemented into the applications which exploit many cores of GPUs for better computation performance. Therefore, by providing virtualized GPUs to VMs in cloud computing environment, many biological applications will willingly move into cloud environment to enhance their computation performance and utilize infinite cloud computing resource while reducing expenses for computations. In this paper, we propose a BioCloud system architecture that enables VMs to use GPUs in cloud environment. Because much of the previous research has focused on the sharing mechanism of GPUs among VMs, they cannot achieve enough performance for biological applications of which computation throughput is more crucial rather than sharing. The proposed system exploits the pass-through mode of PCI express (PCI-E) channel. By making each VM be able to access underlying GPUs directly, applications can show almost the same performance as when those are in native environment. In addition, our scheme multiplexes GPUs by using hot plug-in/out device features of PCI-E channel. By adding or removing GPUs in each VM in on-demand manner, VMs in the same physical host can time-share their GPUs. We implemented the proposed system using the Xen VMM and NVIDIA GPUs and showed that our prototype is highly effective for biological GPU applications in cloud environment.

  18. The HACMS program: using formal methods to eliminate exploitable bugs

    Science.gov (United States)

    Launchbury, John; Richards, Raymond

    2017-01-01

    For decades, formal methods have offered the promise of verified software that does not have exploitable bugs. Until recently, however, it has not been possible to verify software of sufficient complexity to be useful. Recently, that situation has changed. SeL4 is an open-source operating system microkernel efficient enough to be used in a wide range of practical applications. Its designers proved it to be fully functionally correct, ensuring the absence of buffer overflows, null pointer exceptions, use-after-free errors, etc., and guaranteeing integrity and confidentiality. The CompCert Verifying C Compiler maps source C programs to provably equivalent assembly language, ensuring the absence of exploitable bugs in the compiler. A number of factors have enabled this revolution, including faster processors, increased automation, more extensive infrastructure, specialized logics and the decision to co-develop code and correctness proofs rather than verify existing artefacts. In this paper, we explore the promise and limitations of current formal-methods techniques. We discuss these issues in the context of DARPA’s HACMS program, which had as its goal the creation of high-assurance software for vehicles, including quadcopters, helicopters and automobiles. This article is part of the themed issue ‘Verified trustworthy software systems’. PMID:28871050

  19. The Potential Socio-economic Impacts of Gas Hydrate Exploitation

    Science.gov (United States)

    Riley, David; Schaafsma, Marije; Marin-Moreno, Héctor; Minshull, Tim A.

    2017-04-01

    Gas hydrate has garnered significant interest as a possible clean fossil fuel resource, especially in countries with limited energy supplies. Whilst the sector is still in its infancy, there has been escalating development towards commercial production. To the best of our knowledge it appears that, despite its potential, existing analyses of the social and economic impacts of hydrate exploitation have been very limited. Before any viable commercial production commences, the potential impacts across society must be considered. It is likely that such impact assessments will become a legislative requirement for hydrate exploitation, similar to their requirement in conventional oil and gas projects. Social impact analysis should guide hydrate development to have the highest possible net benefits to the human and natural environment. Without active commercial hydrate operations, potential socio-economic impacts can only be inferred from other fossil fuel resource focused communities, including those directly or indirectly affected by the oil and gas industry either in the vicinity of the well or further afield. This review attempts to highlight potential impacts by synthesising current literature, focusing on social impacts at the extraction stage of operation, over time. Using a DPSIR (Driving forces; Pressures; States; Impacts; Responses) framework, we focus on impacts upon: health and wellbeing, land use and access, services and infrastructure, population, employment opportunities, income and lifestyles. Human populations directly or indirectly related with fossil fuel extraction activities often show boom and bust dynamics, and so any impacts may be finite or change temporally. Therefore potential impacts have to be reassessed throughout the lifetime of the exploitation. Our review shows there are a wide range of possible positive and negative socio-economic impacts from hydrate development. Exploitation can bring jobs and infrastructure to remote areas, although

  20. Genome Scan for Selection in Structured Layer Chicken Populations Exploiting Linkage Disequilibrium Information.

    Directory of Open Access Journals (Sweden)

    Mahmood Gholami

    Full Text Available An increasing interest is being placed in the detection of genes, or genomic regions, that have been targeted by selection because identifying signatures of selection can lead to a better understanding of genotype-phenotype relationships. A common strategy for the detection of selection signatures is to compare samples from distinct populations and to search for genomic regions with outstanding genetic differentiation. The aim of this study was to detect selective signatures in layer chicken populations using a recently proposed approach, hapFLK, which exploits linkage disequilibrium information while accounting appropriately for the hierarchical structure of populations. We performed the analysis on 70 individuals from three commercial layer breeds (White Leghorn, White Rock and Rhode Island Red, genotyped for approximately 1 million SNPs. We found a total of 41 and 107 regions with outstanding differentiation or similarity using hapFLK and its single SNP counterpart FLK respectively. Annotation of selection signature regions revealed various genes and QTL corresponding to productions traits, for which layer breeds were selected. A number of the detected genes were associated with growth and carcass traits, including IGF-1R, AGRP and STAT5B. We also annotated an interesting gene associated with the dark brown feather color mutational phenotype in chickens (SOX10. We compared FST, FLK and hapFLK and demonstrated that exploiting linkage disequilibrium information and accounting for hierarchical population structure decreased the false detection rate.

  1. Effect of increased fuel exploitation on the main characteristics of spent WWER 440 fuel

    International Nuclear Information System (INIS)

    Zib, A.

    2001-01-01

    The article deals with the effect of a higher fuel exploitation on the main characteristics (particularly radioactivity and decay heat power) of spent WWER 440 fuel. The main characteristics were calculated by using the Origen code. The study was implemented as a three-stage process. In the first stage, the radioactivity and residual thermal power time evolution values were calculated for the 'typical fuel', i. e. fuel assembly with initial enrichment of 3.6% U-235, 3 years in reactor, and burnup of 30 MWd/kg U. In the second stage, ceteris paribus radioactivity and thermal power analyses of sensitivity to changes in the fuel burnup, initial fuel enrichment, and time in reactor were carried out for the typical fuel assembly. In the third stage, the effect of changes in all three variables was investigated for fuel assemblies possessing parameters that approach those applied at the Dukovany NPP. The effect of a higher fuel exploitation on the interim fuel storage is also mentioned. (author)

  2. The LTDP ALTS Project: Contributing to the Continued Understanding and Exploitation of the ATSR Time Series

    Science.gov (United States)

    Clarke, Hannah; Done, Fay; Casadio, Stefano; Mackin, Stephen; Dinelli, Bianca Maria; Castelli, Elisa

    2016-08-01

    The long time-series of observations made by the Along Track Scanning Radiometers (ATSR) missions represents a valuable resource for a wide range of research and EO applications.With the advent of ESA's Long-TermData Preservation (LTDP) programme, thought has turned to the preservation and improved understanding of such long time-series, to support their continued exploitation in both existing and new areas of research, bringing the possibility of improving the existing data set and to inform and contribute towards future missions. For this reason, the 'Long Term Stability of the ATSR Instrument Series: SWIR Calibration, Cloud Masking and SAA' project, commonly known as the ATSR Long Term Stability (or ALTS) project, is designed to explore the key characteristics of the data set and new and innovative ways of enhancing and exploiting it.Work has focussed on: A new approach to the assessment of Short Wave Infra-Red (SWIR) channel calibration.; Developmentof a new method for Total Column Water Vapour (TCWV) retrieval.; Study of the South Atlantic Anomaly (SAA).; Radiative Transfer (RT) modelling for ATSR.; Providing AATSR observations with their location in the original instrument grid.; Strategies for the retrieval and archiving of historical ATSR documentation.; Study of TCWV retrieval over land; Development of new methods for cloud masking This paper provides an overview of these activities and illustrates the importance of preserving and understanding 'old' data for continued use in the future.

  3. New extractive technologies for unconventional hydrocarbon exploitation and potential environmental hazards to the Guarani aquifer

    International Nuclear Information System (INIS)

    Meroni, E.; Pineiro, G.

    2014-01-01

    This investigation presents a scientific approach about the impact of hydraulic fracturing (f racking) in North America. We focus on the impacts to groundwater, to ascertain whether this technology would produce a similar impact if applied to Norte Basin of Uruguay and a possible impact on the Guarani aquifer. The non- conventional methodologies for hydrocarbon exploitation are described and analysed, taking into account in particular, the characteristics and the profitability of the geological formations that might be potential sources in the Norte Basin of Uruguay. By several in-depth interviews to academic, technic and politic personalities we explored the amount and quality of information that Uruguayan people have about the presence of shale oil and gas resources in the country, as well as on the current normative for their eventual exploitation, and on the contracts that the Uruguayan government has already signed with international oil companies pending the studies required by the current pertinent environmental regulation. The risks for the Guarani Aquifer System if applying hydraulic fracture in rocks directly related to those containing the aquifer, is also analysed

  4. Exploitation of Unique Properties of Zeolites in the Development of Gas Sensors

    Directory of Open Access Journals (Sweden)

    Prabir K. Dutta

    2012-04-01

    Full Text Available The unique properties of microporous zeolites, including ion-exchange properties, adsorption, molecular sieving, catalysis, conductivity have been exploited in improving the performance of gas sensors. Zeolites have been employed as physical and chemical filters to improve the sensitivity and selectivity of gas sensors. In addition, direct interaction of gas molecules with the extraframework cations in the nanoconfined space of zeolites has been explored as a basis for developing new impedance-type gas/vapor sensors. In this review, we summarize how these properties of zeolites have been used to develop new sensing paradigms. There is a considerable breadth of transduction processes that have been used for zeolite incorporated sensors, including frequency measurements, optical and the entire gamut of electrochemical measurements. It is clear from the published literature that zeolites provide a route to enhance sensor performance, and it is expected that commercial manifestation of some of the approaches discussed here will take place. The future of zeolite-based sensors will continue to exploit its unique properties and use of other microporous frameworks, including metal organic frameworks. Zeolite composites with electronic materials, including metals will lead to new paradigms in sensing. Use of nano-sized zeolite crystals and zeolite membranes will enhance sensor properties and make possible new routes of miniaturized sensors.

  5. The Fight against the Least Visible Form of Human Trafficking: Trafficking for Child Labour Exploitation

    Directory of Open Access Journals (Sweden)

    Luz María Puente Aba

    2018-03-01

    Full Text Available Child trafficking for the purpose of labour exploitation is a difficult phenomenon to detect. It is also not readily definable considering that this specific form of trafficking is closely linked with the phenomenon of forced child labour, and even with the broader occurrence of child labour. A lack of globally reliable data and the convergence of different concepts related to child trafficking for labour exploitation pose significant challenges when trying to regulate the circumstances concerning child work and the criminalisation of trafficking for labour exploitation. This article offers a clear overview of the available data related to all the phenomena, and aims to clarify all the situations involved, defining child work, child labour, forced child labour and child trafficking for the purposes of labour exploitation. Furthermore, this article discusses the possible loopholes and critical issues that could hinder global approaches to resolving these issues. La trata infantil con fines de explotación laboral es un fenómeno difícil de detectar, y tampoco es sencillo definirlo si se tiene en cuenta que esta forma específica de trata está estrechamente relacionada con el fenómeno del trabajo forzado infantil e, incluso, con el fenómeno más general de trabajo infantil. Todo ello supone un desafío a la hora de regular las circunstancias que definen el trabajo realizado por niños y la criminalización de la trata para la explotación laboral. Este artículo ofrece un repaso de los datos disponibles en esta materia y procura aclarar las situaciones que se pueden plantear, así como definir trabajo realizado por niños, trabajo infantil, trabajo infantil forzado y trata infantil con fines de explotación laboral. Por último, profundiza en las posibles deficiencias y en los aspectos críticos que podrían obstaculizar un acercamiento global a esta problemática. DOWNLOAD THIS PAPER FROM SSRN: http://ssrn.com/abstract=3088010

  6. Ambidextrous Organizations: A Multiple-Level Study of Absorptive Capacity, Exploratory and Exploitative Innovation and Performance

    NARCIS (Netherlands)

    J.J.P. Jansen (Justin)

    2005-01-01

    textabstractBalancing and synchronizing exploration and exploitation is fundamental to the competitive success of firms in dynamic environments. Despite the importance of reconciling exploration and exploitation within organizations, however, relatively little empirical research has examined this

  7. Water Exploitation and Its Outcomes Caused by Capitalism as Reflected on Gore Verbinski's Rango Movie

    OpenAIRE

    SETIAWAN, DANIEL NUGRAHA

    2014-01-01

    Nugraha Setiawan, Daniel. 2014. Water Exploitation and Its Outcome Caused byCapitalism as Reflected on Gore Verbinski's Rango Movie. Study Program ofEnglish, Universitas Brawijaya.Supervisor: Yusri Fajar, Co-supervisor: Melania Shinta Harendika.Keywords: water exploitation, environment, capitalism, Rango movie. Water exploitation threats ecosystem and causes a great damage to environment. One of the causes of the water exploitation is capitalism. The movie entitled Rango reveals some causes a...

  8. Child Sexual Abuse and Exploitation: Guest Editor’s Introduction

    Directory of Open Access Journals (Sweden)

    Michael Salter

    2015-07-01

    Full Text Available One of the most unnerving aspects of child sexual abuse is that it is constantly manifesting in unexpected ways. The current Royal Commission into Institutional Responses to Child Sexual Abuse has collected testimony of abuse in churches, schools, out-of-home care, hospitals and religious communities, demonstrating the breadth of institutional arrangements whose structures and cultures have facilitated child sexual abuse. Cases of serious and prolonged sexual abuse in family contexts have been excluded from the terms of reference of the Royal Commission but nonetheless continue to surface in media reports. In 2013, twelve children were permanently removed from an extended family living in rural NSW in what has been described as one of the worst cases of child abuse in Australia, involving intergenerational incest going back at least three generations (Auebach 2014. Another recent high-profile case involved the use of the Internet to facilitate the sexual exploitation of an adopted child by his parents in Queensland (Ralston 2013. These cases challenge the received wisdom that child sexual abuse is characterised by the victimisation of one child by one opportunistic offender. Such incidents suggest instead that child sexual abuse takes varied and systemic forms, and can operate to perpetuate and entrench toxic cultures and power structures.   This special issue on Child Sexual Abuse and Exploitation is a timely contribution to ongoing efforts to understand the multiplicity of child sexual abuse. It is an interdisciplinary collection of insights drawn from criminology, sociology, psychiatry, psychology and psychoanalysis, and includes papers from academic researchers alongside academic practitioners whose writing is grounded in their work with affected individuals and communities. A key aim of the special issue is to contextualise the diversity of child sexual abuse socially, politically and historically, recognising the dynamic and iterative

  9. The exploitation of living resources in the Dutch Wadden Sea : a historical overview

    NARCIS (Netherlands)

    Wolff, W J

    An overview, based on written sources and personal observations, is presented of exploitation of living resources in and around the Dutch Wadden Sea during the past few centuries. It is concluded that before about 1900 exploitation was almost unrestricted. Exploitation of plants has been documented

  10. 25 CFR 20.516 - How are child abuse, neglect or exploitation cases to be handled?

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false How are child abuse, neglect or exploitation cases to be... FINANCIAL ASSISTANCE AND SOCIAL SERVICES PROGRAMS Child Assistance Foster Care § 20.516 How are child abuse, neglect or exploitation cases to be handled? Reported child abuse, neglect or exploitation cases and the...

  11. HBC-Evo: predicting human breast cancer by exploiting amino acid sequence-based feature spaces and evolutionary ensemble system.

    Science.gov (United States)

    Majid, Abdul; Ali, Safdar

    2015-01-01

    We developed genetic programming (GP)-based evolutionary ensemble system for the early diagnosis, prognosis and prediction of human breast cancer. This system has effectively exploited the diversity in feature and decision spaces. First, individual learners are trained in different feature spaces using physicochemical properties of protein amino acids. Their predictions are then stacked to develop the best solution during GP evolution process. Finally, results for HBC-Evo system are obtained with optimal threshold, which is computed using particle swarm optimization. Our novel approach has demonstrated promising results compared to state of the art approaches.

  12. Exploiting Wireless Received Signal Strength Indicators to Detect Evil-Twin Attacks in Smart Homes

    Directory of Open Access Journals (Sweden)

    Zhanyong Tang

    2017-01-01

    Full Text Available Evil-Twin is becoming a common attack in smart home environments where an attacker can set up a fake AP to compromise the security of the connected devices. To identify the fake APs, The current approaches of detecting Evil-Twin attacks all rely on information such as SSIDs, the MAC address of the genuine AP, or network traffic patterns. However, such information can be faked by the attacker, often leading to low detection rates and weak protection. This paper presents a novel Evil-Twin attack detection method based on the received signal strength indicator (RSSI. Our approach considers the RSSI as a fingerprint of APs and uses the fingerprint of the genuine AP to identify fake ones. We provide two schemes to detect a fake AP in two different scenarios where the genuine AP can be located at either a single or multiple locations in the property, by exploiting the multipath effect of the Wi-Fi signal. As a departure from prior work, our approach does not rely on any professional measurement devices. Experimental results show that our approach can successfully detect 90% of the fake APs, at the cost of a one-off, modest connection delay.

  13. The strategic and economic value of exploiting heavy crude

    International Nuclear Information System (INIS)

    Saniere, A.

    2003-01-01

    Non-conventional oil, and particularly heavy crude varieties, will play an increasingly important role in meeting growing global energy requirements by 2030 and beyond. These heavy oils currently account for high volumes in certain areas but their proportion of global oil production remains modest for the moment, This should significantly change with the completion of several projects currently underway in Canada and Venezuela. Indeed, the technological innovations occurring over recent years have allowed for a considerable reduction in exploitation costs for these crude varieties and improved economic profitability conditions for the projects. The geographical location of resources (which are independent of the Middle East) and the fact that they are not subject to OPEC quotas also make these crude varieties particularly attractive. (authors)

  14. Exploiting peer group concept for adaptive and highly available services

    CERN Document Server

    Jan, M A; Fraz, M M; Ali, A; Ali, Arshad; Fraz, Mohammad Moazam; Jan, Muhammad Asif; Zahid, Fahd Ali

    2003-01-01

    This paper presents a prototype for redundant, highly available and fault tolerant peer to peer framework for data management. Peer to peer computing is gaining importance due to its flexible organization, lack of central authority, distribution of functionality to participating nodes and ability to utilize unused computational resources. Emergence of GRID computing has provided much needed infrastructure and administrative domain for peer to peer computing. The components of this framework exploit peer group concept to scope service and information search, arrange services and information in a coherent manner, provide selective redundancy and ensure availability in face of failure and high load conditions. A prototype system has been implemented using JXTA peer to peer technology and XML is used for service description and interfaces, allowing peers to communicate with services implemented in various platforms including web services and JINI services. It utilizes code mobility to achieve role interchange amo...

  15. Sustained Administration of Hormones Exploiting Nanoconfined Diffusion through Nanochannel Membranes

    Directory of Open Access Journals (Sweden)

    Thomas Geninatti

    2015-08-01

    Full Text Available Implantable devices may provide a superior means for hormone delivery through maintaining serum levels within target therapeutic windows. Zero-order administration has been shown to reach an equilibrium with metabolic clearance, resulting in a constant serum concentration and bioavailability of released hormones. By exploiting surface-to-molecule interaction within nanochannel membranes, it is possible to achieve a long-term, constant diffusive release of agents from implantable reservoirs. In this study, we sought to demonstrate the controlled release of model hormones from a novel nanochannel system. We investigated the delivery of hormones through our nanochannel membrane over a period of 40 days. Levothyroxine, osteocalcin and testosterone were selected as representative hormones based on their different molecular properties and structures. The release mechanisms and transport behaviors of these hormones within 3, 5 and 40 nm channels were characterized. Results further supported the suitability of the nanochannels for sustained administration from implantable platforms.

  16. Commercial Sexual Exploitation of Children and State Child Welfare Systems.

    Science.gov (United States)

    Bounds, Dawn; Julion, Wrenetha A; Delaney, Kathleen R

    2015-01-01

    In several states, commercial sexual exploitation of children (CSEC) is now a reportable child abuse offense. Illinois has taken the lead in tackling the issue and the Illinois experience illuminates valuable lessons. This article delineates the protection, practice, and policy implications that evolve when CSEC falls under a state child welfare system. The specific aims are to (a) discuss CSEC, its victims, risks, harms, and challenges inherent in providing effective care; (b) use Illinois as an exemplar to explicate the consequences and implementation challenges of establishing a state reporting system that frames CSEC as a child welfare issue; (c) recommend strategies for developing effective state reporting models, and (d) demonstrate how nurses are well poised to advocate for victims of human trafficking on both state and national levels. Recommendations for improving the identification of CSEC victims and overcoming challenges to state implementation are offered. © The Author(s) 2015.

  17. Shale gas, Poland pioneer of exploitation in Europe

    International Nuclear Information System (INIS)

    Rybicka, Urszula; Khalatbari, Azar; Schneider, Frederic; Nabrdalik, Maciek

    2012-01-01

    This article presents an installation built by a Polish company to perform drillings in the search for shale gas pockets from which gas would be extracted by hydraulic fracturing. Some technical characteristics of the installation and process are evoked. The article outlines the confidence the population now has gained in this installation. However and despite the fact that the region possesses important underground water reserves, water consumption is reported to be too high with respect to farmer needs. Besides, some farmers have had a compulsory purchase order made on their land and could afford to buy new lands. However, in some other places, the population did not accept the arrival of the multinational company Chevron. In parallel, a brief overview of shale gas exploitation projects or status in other European countries is given

  18. Exploitation of wind energy and its potential in Czechoslovakia

    International Nuclear Information System (INIS)

    Rychetnik, V.

    1990-01-01

    Examples from over the world are shown to demonstrate the potential of wind energy in power generation. The basic types of wind motors and the installed capacities are given. In Czechoslovakia the wind conditions are rather complex. Wind energy can be economically exploited at sites where the mean wind velocity at 10 m above the ground exceeds 4 m/s. This can cover about 2% of annual power generation in Czechoslovakia. The amount of electricity generated and its cost are estimated. The investment into a wind power plant would pay back in several years. The use of small wind power plants to supply, e.g., individual houses will be of limited importance. (M.D.). 4 figs., 8 refs

  19. Microbial biosurfactants: challenges and opportunities for future exploitation.

    Science.gov (United States)

    Marchant, Roger; Banat, Ibrahim M

    2012-11-01

    The drive for industrial sustainability has pushed biosurfactants to the top of the agenda of many companies. Biosurfactants offer the possibility of replacing chemical surfactants, produced from nonrenewable resources, with alternatives produced from cheap renewable feedstocks. Biosurfactants are also attractive because they are less damaging to the environment yet are robust enough for industrial use. The most promising biosurfactants at the present time are the glycolipids, sophorolipids produced by Candida yeasts, mannosylerythritol lipids (MELs) produced by Pseudozyma yeasts, and rhamnolipids produced by Pseudomonas. Despite the current enthusiasm for these compounds several residual problems remain. This review highlights remaining problems and indicates the prospects for imminent commercial exploitation of a new generation of microbial biosurfactants. Copyright © 2012 Elsevier Ltd. All rights reserved.

  20. International petroleum exploration and exploitation agreements: a comprehensive environmental appraisal

    International Nuclear Information System (INIS)

    Zhiguo Gao

    1994-01-01

    The evolution of the environmental aspects of international petroleum exploration and exploitation is outlined. Four case studies of modern petroleum contracts from four developing countries are presented. These are Thailand's modern concession contract, Indonesia's production sharing contract, Brazil's risk service contract and China's hybrid contract. The failure of these four countries to provide adequate environmental regulation through their petroleum contracts is typical of many countries in the developing world. An urgent need exists to recognise that important environmental and resource consequences are associated with the developments authorised by petroleum contracts and that appropriate legal changes must be made to take them into account. Environmental sustainability should be an explicit part of all investment arrangements. (UK)

  1. Exploiting PV technology for basic need provision in Nigeria

    International Nuclear Information System (INIS)

    Gyoh, L.; Gyoh, S.

    2004-01-01

    Transitional economies are confronted with ever declining standard of living and low per capita income. Development institutions around the world have come to realize the strategic importance of Sustainable Energy as a Basic Need in the development process. Despite the efforts made by emerging democracies to eradicate poverty, there are still millions of people without access to electricity. Unreliable energy supply currently presents a constant obstacle to many poverty alleviation programmes. Against this background, some states government in Nigeria are exploiting the unique advantage offered by PV technology in the provision of Basic Needs. This study appraises some of the scheme in which the authors have been heavily involved with. This paper identifies some of the strategic policies that might accelerate the successful implementation of PV technology as a poverty alleviation tool in terms of electricity provision in transitional economies. (authors)

  2. Exploitation and Benefits of BIM in Construction Project Management

    Science.gov (United States)

    Mesároš, Peter; Mandičák, Tomáš

    2017-10-01

    BIM is increasingly getting into the awareness in construction industry. BIM is the process of creating and data managing of the building during its life cycle. BIM became a part of management tools in modern construction companies. Construction projects have a number of participants. It means difficulty process of construction project management and a serious requirement for processing the huge amount of information including design, construction, time and cost parameters, economic efficiency and sustainability. Progressive information and communication technologies support cost management and management of construction project. One of them is Building Information Modelling. Aim of the paper is to examine the impact of BIM exploitation and benefits on construction project management in Slovak companies.

  3. Environmental impact of atomic minerals exploration and exploitation

    International Nuclear Information System (INIS)

    Dwivedy, K.K.

    1998-01-01

    Terrestrial radiation in the earth's environment is existing since its formation and is shared by all types of rocks, minerals, gases, and water, and to some extent aided by the interstellar radiation. Environmental radiation is ubiquitous and the man and other living beings have been living in such environment for thousands of years. Today they are much concerned about health and environmental risks so that a balance must be achieved between the activities that promote economic growth and the preservation of the natural environment. Atomic minerals are one of the main sources of natural environmental radiation and they are being explored by Atomic Minerals Division (AMD). Mining and milling activities sometimes may cause some radiological impacts but proper monitoring and remedial measures keep them under check. Some of the important aspects related to environmental impacts of uranium exploration and exploitation are presented

  4. Analysis of ecological environment impact of coal exploitation and utilization

    Science.gov (United States)

    Zhang, Baoliu; Luo, Hong; Lv, Lianhong; Wang, Jian; Zhang, Baoshi

    2018-02-01

    Based on the theory of life cycle assessment, the ecological and environmental impacts of coal mining, processing, utilization and transportation will be analyzed, with analysing the status of china’s coal exploitation and utilization as the basis, it will find out the ecological and environmental impact in the development and utilization of coal, mainly consist of ecological impact including land damage, water resource destructionand biodiversity loss, etc., while the environmental impact include air, water, solid waste pollutions. Finally with a summary of the ecological and environmental problems, to propose solutionsand countermeasures to promote the rational development and consumption of coal, as well as to reduce the impact of coal production and consumption on the ecological environment, finally to achieve the coordinated development of energy and the environment.

  5. Tricking the guard: exploiting plant defense for disease susceptibility.

    Science.gov (United States)

    Lorang, J; Kidarsa, T; Bradford, C S; Gilbert, B; Curtis, M; Tzeng, S-C; Maier, C S; Wolpert, T J

    2012-11-02

    Typically, pathogens deploy virulence effectors to disable defense. Plants defeat effectors with resistance proteins that guard effector targets. We found that a pathogen exploits a resistance protein by activating it to confer susceptibility in Arabidopsis. The guard mechanism of plant defense is recapitulated by interactions among victorin (an effector produced by the necrotrophic fungus Cochliobolus victoriae), TRX-h5 (a defense-associated thioredoxin), and LOV1 (an Arabidopsis susceptibility protein). In LOV1's absence, victorin inhibits TRX-h5, resulting in compromised defense but not disease by C. victoriae. In LOV1's presence, victorin binding to TRX-h5 activates LOV1 and elicits a resistance-like response that confers disease susceptibility. We propose that victorin is, or mimics, a conventional pathogen virulence effector that was defeated by LOV1 and confers virulence to C. victoriae solely because it incites defense.

  6. Selfrando: Securing the Tor Browser against De-anonymization Exploits

    Directory of Open Access Journals (Sweden)

    Conti Mauro

    2016-10-01

    Full Text Available Tor is a well-known anonymous communication system used by millions of users, including journalists and civil rights activists all over the world. The Tor Browser gives non-technical users an easy way to access the Tor Network. However, many government organizations are actively trying to compromise Tor not only in regions with repressive regimes but also in the free world, as the recent FBI incidents clearly demonstrate. Exploiting software vulnerabilities in general, and browser vulnerabilities in particular, constitutes a clear and present threat to the Tor software. The Tor Browser shares a large part of its attack surface with the Firefox browser. Therefore, Firefox vulnerabilities (even patched ones are highly valuable to attackers trying to monitor users of the Tor Browser.

  7. Exploiting large-scale correlations to detect continuous gravitational waves.

    Science.gov (United States)

    Pletsch, Holger J; Allen, Bruce

    2009-10-30

    Fully coherent searches (over realistic ranges of parameter space and year-long observation times) for unknown sources of continuous gravitational waves are computationally prohibitive. Less expensive hierarchical searches divide the data into shorter segments which are analyzed coherently, then detection statistics from different segments are combined incoherently. The novel method presented here solves the long-standing problem of how best to do the incoherent combination. The optimal solution exploits large-scale parameter-space correlations in the coherent detection statistic. Application to simulated data shows dramatic sensitivity improvements compared with previously available (ad hoc) methods, increasing the spatial volume probed by more than 2 orders of magnitude at lower computational cost.

  8. SMARTS: Exploiting Temporal Locality and Parallelism through Vertical Execution

    International Nuclear Information System (INIS)

    Beckman, P.; Crotinger, J.; Karmesin, S.; Malony, A.; Oldehoeft, R.; Shende, S.; Smith, S.; Vajracharya, S.

    1999-01-01

    In the solution of large-scale numerical prob- lems, parallel computing is becoming simultaneously more important and more difficult. The complex organization of today's multiprocessors with several memory hierarchies has forced the scientific programmer to make a choice between simple but unscalable code and scalable but extremely com- plex code that does not port to other architectures. This paper describes how the SMARTS runtime system and the POOMA C++ class library for high-performance scientific computing work together to exploit data parallelism in scientific applications while hiding the details of manag- ing parallelism and data locality from the user. We present innovative algorithms, based on the macro -dataflow model, for detecting data parallelism and efficiently executing data- parallel statements on shared-memory multiprocessors. We also desclibe how these algorithms can be implemented on clusters of SMPS

  9. Thirteen years of exploitation with constant oilfield pressure

    Energy Technology Data Exchange (ETDEWEB)

    Dontov-Danu, Gh

    1966-12-01

    The paper describes a restoring and maintaining reservoir pressure by gas injection in two blocks of the Dacian stratum at Buscani. At the beginning of gas injection, the wells produced in gas lift and the crude oil flows were markedly decreasing. After about 6 months of injection the reservoir pressure has been restored, the wells flowed. This system allows constant crude oil flows for long periods. The oilfield recovery factor until December 31, 1965, is 51% i.e. by 150% higher than expected in the case of an exploitation without gas injection. This increase represents the extra crude oil and gasoline production obtained as a result of the application of the reservoir pressure maintenance process. The average consumption of working agent has been of 382 cu m gas per ton of additionally extracted crude oil.

  10. ANALYSIS OF ANDROID VULNERABILITIES AND MODERN EXPLOITATION TECHNIQUES

    Directory of Open Access Journals (Sweden)

    Himanshu Shewale

    2014-03-01

    Full Text Available Android is an operating system based on the Linux kernel. It is the most widely used and popular operating system among Smartphones and portable devices. Its programmable and open nature attracts attackers to take undue advantage. Android platform allows developers to freely access and modify source code. But at the same time it increases the security issue. A user is likely to download and install malicious applications written by software hackers. This paper focuses on understanding and analyzing the vulnerabilities present in android platform. In this paper firstly we study the android architecture; analyze the existing threats and security weaknesses. Then we identify various exploit mitigation techniques to mitigate known vulnerabilities. A detailed analysis will help us to identify the existing loopholes and it will give strategic direction to make android operating system more secure.

  11. SMARTS: Exploiting Temporal Locality and Parallelism through Vertical Execution

    Energy Technology Data Exchange (ETDEWEB)

    Beckman, P.; Crotinger, J.; Karmesin, S.; Malony, A.; Oldehoeft, R.; Shende, S.; Smith, S.; Vajracharya, S.

    1999-01-04

    In the solution of large-scale numerical prob- lems, parallel computing is becoming simultaneously more important and more difficult. The complex organization of today's multiprocessors with several memory hierarchies has forced the scientific programmer to make a choice between simple but unscalable code and scalable but extremely com- plex code that does not port to other architectures. This paper describes how the SMARTS runtime system and the POOMA C++ class library for high-performance scientific computing work together to exploit data parallelism in scientific applications while hiding the details of manag- ing parallelism and data locality from the user. We present innovative algorithms, based on the macro -dataflow model, for detecting data parallelism and efficiently executing data- parallel statements on shared-memory multiprocessors. We also desclibe how these algorithms can be implemented on clusters of SMPS.

  12. Exploiting CRISPR-Cas to manipulate Enterococcus faecalis populations.

    Science.gov (United States)

    Hullahalli, Karthik; Rodrigues, Marinelle; Palmer, Kelli L

    2017-06-23

    CRISPR-Cas provides a barrier to horizontal gene transfer in prokaryotes. It was previously observed that functional CRISPR-Cas systems are absent from multidrug-resistant (MDR) Enterococcus faecalis , which only possess an orphan CRISPR locus, termed CRISPR2, lacking cas genes. Here, we investigate how the interplay between CRISPR-Cas genome defense and antibiotic selection for mobile genetic elements shapes in vitro E. faecalis populations. We demonstrate that CRISPR2 can be reactivated for genome defense in MDR strains. Interestingly, we observe that E. faecalis transiently maintains CRISPR targets despite active CRISPR-Cas systems. Subsequently, if selection for the CRISPR target is present, toxic CRISPR spacers are lost over time, while in the absence of selection, CRISPR targets are lost over time. We find that forced maintenance of CRISPR targets induces a fitness cost that can be exploited to alter heterogeneous E. faecalis populations.

  13. The mobility of radioactive elements in a Uranium exploitation zone

    International Nuclear Information System (INIS)

    Bragea, M.; Toro, L.

    2002-01-01

    One of the purposes of this study is to gain knowledge on the possibilities of accumulations of the radioelements (2 38U , 2 32T h, 2 26R a) in a given ecosystem, and, particularly, the knowledge of the mechanisms implied in the transfer of these radioelements around the abandoned mining exploitations. The final purpose is the evaluation of the quantity of the radioelements susceptible to reach the man. The research is directed towards a quantitative evaluation of the transport rate of the contaminating element in the soil. There have been studied the surroundings of ore mines in the Boul Massif in Poiana Rusca Mountains in Romania. These exploitations had been closed and abandoned in 1990. From a geological point of view, the region is formed from crystalline schists, banat eruptive and sedimentary rocks. The iron deposit is totally situated in crystalline rocks in Poiana Rusca Mountains. The concentration of magnetite in the deposit is 25% with a relatively uniform dissemination in the ore. Brannerite (UCaThY)(TiFe) 2 O 6 , was also found in the same place. It is an ore should contain UO3 in proportion of up to about 33%. In 1963 there were stood out areas with radioactive minerals with gamma doses in the range of 500-9100 nGy/hour. In the same time, there were also identified a few points in which the concentration of thorium and uranium were significant. The areas with radioactive mineralizations were generally limited and strictly located in the limit of the iron ores deposit. By closing the mining activities huge quantities of waste rock stored in unprotected dump remained abandoned. As a result of the process of ore extraction, the waste rock and a very low percentage of metallic minerals were stored in tailing ponds, with a clay liner necessary to isolate the tailing from the reast of the aquifer

  14. Automated motion imagery exploitation for surveillance and reconnaissance

    Science.gov (United States)

    Se, Stephen; Laliberte, France; Kotamraju, Vinay; Dutkiewicz, Melanie

    2012-06-01

    Airborne surveillance and reconnaissance are essential for many military missions. Such capabilities are critical for troop protection, situational awareness, mission planning and others, such as post-operation analysis / damage assessment. Motion imagery gathered from both manned and unmanned platforms provides surveillance and reconnaissance information that can be used for pre- and post-operation analysis, but these sensors can gather large amounts of video data. It is extremely labour-intensive for operators to analyse hours of collected data without the aid of automated tools. At MDA Systems Ltd. (MDA), we have previously developed a suite of automated video exploitation tools that can process airborne video, including mosaicking, change detection and 3D reconstruction, within a GIS framework. The mosaicking tool produces a geo-referenced 2D map from the sequence of video frames. The change detection tool identifies differences between two repeat-pass videos taken of the same terrain. The 3D reconstruction tool creates calibrated geo-referenced photo-realistic 3D models. The key objectives of the on-going project are to improve the robustness, accuracy and speed of these tools, and make them more user-friendly to operational users. Robustness and accuracy are essential to provide actionable intelligence, surveillance and reconnaissance information. Speed is important to reduce operator time on data analysis. We are porting some processor-intensive algorithms to run on a Graphics Processing Unit (GPU) in order to improve throughput. Many aspects of video processing are highly parallel and well-suited for optimization on GPUs, which are now commonly available on computers. Moreover, we are extending the tools to handle video data from various airborne platforms and developing the interface to the Coalition Shared Database (CSD). The CSD server enables the dissemination and storage of data from different sensors among NATO countries. The CSD interface allows

  15. Sensor Exposure, Exploitation, and Experimentation Environment (SE4)

    Science.gov (United States)

    Buell, D.; Duff, F.; Goding, J.; Bankston, M.; McLaughlin, T.; Six, S.; Taylor, S.; Wootton, S.

    2011-09-01

    As the resident space object population increases from new launches and events such as the COSMOS/IRIDIUM collision, the maintenance of high-level Space Situational Awareness (SSA) has become increasingly difficult. To maintain situational awareness of the changing environment, new systems and methods must be developed. The Sensor Exposure, Exploitation and Experimentation Environment (SE4) provides a platform to illustrate “The Art of the Possible” that shows the potential benefit of enriched sensor data collections and real-time data sharing. Through modeling and simulation, and a net-centric architecture, SE4 shows the added value of sharing data in real-time and exposing new types of sensor data. The objective of SE4 is to develop an experimentation and innovation environment for sensor data exposure, composable sensor capabilities, reuse, and exploitation that accelerates the delivery of needed Command and Control, Intelligence, Surveillance, and Reconnaissance capabilities to the warfighter. Through modeling, simulation and rapid prototyping, the art of the possible for a fully-connected, net-centric space Command and Control (C2) and sensor enterprise can be demonstrated. This paper provides results that demonstrate the potential for faster cataloging of breakup events and additional event monitoring that are possible with data available today in the Space Surveillance Network (SSN). Demonstrating the art of the possible for the enterprise will guide net-centric requirements definition and facilitate discussions with stakeholder organizations on the Concept of Operations (CONOPS), policy, and Tactics, Techniques, and Procedures (TTP) evolution necessary to take full advantage of net-centric operations. SE4 aligns with direction from Secretary Gates and the Chairman Joint Chief of Staff that emphasizes the need to get the most out of our existing systems. Continuing to utilize SE4 will enable the enterprise by demonstrating the benefits of applying

  16. Exploiting risk-reward structures in decision making under uncertainty.

    Science.gov (United States)

    Leuker, Christina; Pachur, Thorsten; Hertwig, Ralph; Pleskac, Timothy J

    2018-06-01

    People often have to make decisions under uncertainty-that is, in situations where the probabilities of obtaining a payoff are unknown or at least difficult to ascertain. One solution to this problem is to infer the probability from the magnitude of the potential payoff and thus exploit the inverse relationship between payoffs and probabilities that occurs in many domains in the environment. Here, we investigated how the mind may implement such a solution: (1) Do people learn about risk-reward relationships from the environment-and if so, how? (2) How do learned risk-reward relationships impact preferences in decision-making under uncertainty? Across three experiments (N = 352), we found that participants can learn risk-reward relationships from being exposed to choice environments with a negative, positive, or uncorrelated risk-reward relationship. They were able to learn the associations both from gambles with explicitly stated payoffs and probabilities (Experiments 1 & 2) and from gambles about epistemic events (Experiment 3). In subsequent decisions under uncertainty, participants often exploited the learned association by inferring probabilities from the magnitudes of the payoffs. This inference systematically influenced their preferences under uncertainty: Participants who had been exposed to a negative risk-reward relationship tended to prefer the uncertain option over a smaller sure option for low payoffs, but not for high payoffs. This pattern reversed in the positive condition and disappeared in the uncorrelated condition. This adaptive change in preferences is consistent with the use of the risk-reward heuristic. Copyright © 2018 Elsevier B.V. All rights reserved.

  17. A Mobile Application Recommendation Framework by Exploiting Personal Preference with Constraints

    Directory of Open Access Journals (Sweden)

    Konglin Zhu

    2017-01-01

    Full Text Available Explosive mobile applications (Apps are proliferating with the popularity of mobile devices (e.g., smartphones, tablets. These Apps are developed to satisfy different function needs of users. Majority of existing App Stores have difficulty in recommending proper Apps for users. Therefore, it is of significance to recommend mobile Apps for users according to personal preference and various constraints of mobile devices (e.g., battery power. In this paper, we propose a mobile App recommendation framework by incorporating different requirements from users. We exploit modern portfolio theory (MPT to combine the popularity of mobile Apps, personal preference, and mobile device constraints for mobile App recommendation. Based on this framework, we discuss the recommendation approaches by constraints of phone power and limited mobile data plan. Extensive evaluations show that the proposed mobile App recommendation framework can well adapt to power and network data plan constraints. It satisfies the user App preference and mobile device constraints.

  18. Exploiting Scanning Behavior for Predators Can Reduce Rice Damage Caused by Birds

    Directory of Open Access Journals (Sweden)

    Takeshi Honda

    2015-01-01

    Full Text Available Rice is often damaged by birds, especially sparrows, in Asia. Bird nets are sometimes used as countermeasures; however this approach is expensive and labor intensive. For this reason, farmers generally eschew bird nets, even though no alternative countermeasures are available. This study focused on exploiting the bird behavior of scanning for predators to reduce crop damage. When birds forage for seeds on the ground they often stop pecking and briefly raise their heads, apparently to scan for predators. Low visibility habitats increase scanning behavior and increased scanning behavior reduces habitat quality from the bird’s perspective; therefore, this study tested the relationship between rice damage rate and visibility at the periphery of rice fields, where tree sparrows rest after feeding. Overall, low visibility reduced damage to rice. Because visibility was mainly affected by weeds, weed management techniques contribute to crop damage management. To reduce damage, weeding can be decreased; therefore, this technique is cost- and labor-efficient.

  19. Combined effects of global climate change and regional ecosystem drivers on an exploited marine food web

    DEFF Research Database (Denmark)

    Niiranen, S.; Yletyinen, J.; Tomczak, M.T.

    2013-01-01

    approach to project how the interaction of climate, nutrient loads, and cod fishing may affect the future of the open Central Baltic Sea food web. Regionally downscaled global climate scenarios were, in combination with three nutrient load scenarios, used to drive an ensemble of three regional...... biogeochemical models (BGMs). An Ecopath with Ecosim food web model was then forced with the BGM results from different nutrient-climate scenarios in combination with two different cod fishing scenarios. The results showed that regional management is likely to play a major role in determining the future......Changes in climate, in combination with intensive exploitation of marine resources, have caused large-scale reorganizations in many of the world's marine ecosystems during the past decades. The Baltic Sea in Northern Europe is one of the systems most affected. In addition to being exposed...

  20. The Impact of Tayub Exploitation on The Tradition and Life of Javanese Society

    Directory of Open Access Journals (Sweden)

    Noordiana Noordiana

    2017-01-01

    Full Text Available This study is aiming at finding out the impact of Tayub exploitation on the tradition and life of Javanese society. Research approach implemented in this study was qualitative. In addition, the research technique employed was interview, observation, documentation, and literary study. Results show that the new form of Tayub diminishes the structure of feminism, neglects simplicity, gentleness and spontaneity that are supposed to be part of Tayub dance. The movement of dance, music, and costume are also changed into a total different form, compared with the genuine version of Tayub dance. These major changes do not only bring negative impacts on the dance structure, but also change the society’s mindset and behavior. People living in the countryside part of Java have lost their control towards customs’ regulation and a philosophy that used to be held tightly by them.

  1. Exploiting attractiveness in persuasion: senders' implicit theories about receivers' processing motivation.

    Science.gov (United States)

    Vogel, Tobias; Kutzner, Florian; Fiedler, Klaus; Freytag, Peter

    2010-06-01

    Previous research suggests a positive correlation between physical attractiveness and the expectation of positive outcomes in social interactions, such as successful persuasion. However, prominent persuasion theories do not imply a general advantage of attractive senders. Instead, the persuasion success should vary with the receivers' processing motivation and processing capacity. Focusing on the perspective of the sender, the authors elaborate on lay theories about how attractiveness affects persuasion success. They propose that lay theories (a) match scientific models in that they also comprise the interaction of senders' attractiveness and receivers' processing characteristics, (b) guide laypersons' anticipation of persuasion success, and (c) translate into strategic behavior. They show that anticipated persuasion success depends on the interplay of perceived attractiveness and expectations about receivers' processing motivation (Experiment 1 and 2). Further experiments show that laypersons strategically attempt to exploit attractiveness in that they approach situations (Experiment 3) and persons (Experiment 4) that promise persuasion success.

  2. Chemomimetic biocatalysis: exploiting the synthetic potential of cofactor-dependent enzymes to create new catalysts.

    Science.gov (United States)

    Prier, Christopher K; Arnold, Frances H

    2015-11-11

    Despite the astonishing breadth of enzymes in nature, no enzymes are known for many of the valuable catalytic transformations discovered by chemists. Recent work in enzyme design and evolution, however, gives us good reason to think that this will change. We describe a chemomimetic biocatalysis approach that draws from small-molecule catalysis and synthetic chemistry, enzymology, and molecular evolution to discover or create enzymes with non-natural reactivities. We illustrate how cofactor-dependent enzymes can be exploited to promote reactions first established with related chemical catalysts. The cofactors can be biological, or they can be non-biological to further expand catalytic possibilities. The ability of enzymes to amplify and precisely control the reactivity of their cofactors together with the ability to optimize non-natural reactivity by directed evolution promises to yield exceptional catalysts for challenging transformations that have no biological counterparts.

  3. A bi-population based scheme for an explicit exploration/exploitation trade-off in dynamic environments

    Science.gov (United States)

    Ben-Romdhane, Hajer; Krichen, Saoussen; Alba, Enrique

    2017-05-01

    Optimisation in changing environments is a challenging research topic since many real-world problems are inherently dynamic. Inspired by the natural evolution process, evolutionary algorithms (EAs) are among the most successful and promising approaches that have addressed dynamic optimisation problems. However, managing the exploration/exploitation trade-off in EAs is still a prevalent issue, and this is due to the difficulties associated with the control and measurement of such a behaviour. The proposal of this paper is to achieve a balance between exploration and exploitation in an explicit manner. The idea is to use two equally sized populations: the first one performs exploration while the second one is responsible for exploitation. These tasks are alternated from one generation to the next one in a regular pattern, so as to obtain a balanced search engine. Besides, we reinforce the ability of our algorithm to quickly adapt after cnhanges by means of a memory of past solutions. Such a combination aims to restrain the premature convergence, to broaden the search area, and to speed up the optimisation. We show through computational experiments, and based on a series of dynamic problems and many performance measures, that our approach improves the performance of EAs and outperforms competing algorithms.

  4. Current and upcoming approaches to exploit the reversibility of epigenetic mutations in breast cancer

    NARCIS (Netherlands)

    Falahi, Fahimeh; van Kruchten, Michel; Martinet, Nadine; Hospers, Geesiena; Rots, Marianne G.

    2014-01-01

    DNA methylation and histone modifications are important epigenetic modifications associated with gene (dys) regulation. The epigenetic modifications are balanced by epigenetic enzymes, so-called writers and erasers, such as DNA (de)methylases and histone (de)acetylases. Aberrant epigenetic

  5. Exploiting enhanced non-testing approaches to meet the needs for sustainable chemistry

    Science.gov (United States)

    Sustainable chemistry is the design and use of chemicals that minimize impacts to human health, ecosystems and the environment. To assess sustainability, chemicals must be evaluated not only for their toxicity to humans and other species, but also for environmental persistence an...

  6. Target discovery focused approaches to overcome bottlenecks in the exploitation of antimycobacterial natural products.

    Science.gov (United States)

    Baptista, Rafael; Bhowmick, Sumana; Nash, Robert J; Baillie, Les; Mur, Luis Aj

    2018-04-01

    Tuberculosis is a major global health hazard. The search for new antimycobacterials has focused on such as screening combinational chemistry libraries or designing chemicals to target predefined pockets of essential bacterial proteins. The relative ineffectiveness of these has led to a reappraisal of natural products for new antimycobacterial drug leads. However, progress has been limited, we suggest through a failure in many cases to define the drug target and optimize the hits using this information. We highlight methods of target discovery needed to develop a drug into a candidate for clinical trials. We incorporate these into suggested analysis pipelines which could inform the research strategies to accelerate the development of new drug leads from natural products.

  7. Some exploitations of the self-consistent QRPA approach with the Gogny force

    Energy Technology Data Exchange (ETDEWEB)

    Peru, S.; Martini, M.; Dupuis, M. [CEA,DAM, DIF, F-91297 Arpajon (France); Institut d' Astronomie et d' Astrophysique, Universite Libre de Bruxelles, CP-226, 1050 Brussels, Belgium and CEA,DAM, DIF, F-91297 Arpajon (France); CEA,DAM, DIF, F-91297 Arpajon (France)

    2012-10-20

    Fully consistent axially-symmetric-deformed quasiparticle random phase approximation calculations have been performed with the D1S Gogny force. Giant resonances in exotic nuclei as well as in deformed Mg and Si isotopes have been studied. Dipole responses have been calculated in Ne isotopes and N=16 isotones to study the existence of soft dipole modes in exotic nuclei. The same formalism has been used to describe multipole responses up to octupole in the deformed and heavy nucleus {sup 238}U. Low energy spectroscopy of nickel isotopes has been studied, revealing 0{sup +} states which display a particular structure.

  8. Preliminary exploitation of industrial facility for flue gas treatment

    International Nuclear Information System (INIS)

    Chmielewski, A.G.; Zimek, Z.; Iller, E.; Tyminski, B.; Licki, J.

    2001-01-01

    laboratory and pilot installation in Poland has lead to decision concerning design and construction of the industrial demonstration plant for electron beam flue gas treatment. Industrial demonstration facility for electron beam flue gas treatment was designed and installed in EPS Pomorzany in Szczecin. This flue gas purification installation treats exhaust gases coming from a block which consists of two Benson type boilers of power 56 MWe each, supplying additional steam for heating purposes up to 40 MWth each. The 270,000 Nm 3 /h flue gases (half of produced by the blocks) is treated meet Polish regulations which are imposed since 1997. Four electron accelerators has been constructed by Nissin High Voltage, Kyoto, Japan to provide 1200 kW of total beam power with electron energy 0,8 MeV to be installed in EPS Pomorzany. Two-stage irradiation was applied as it was tested at the pilot plant. The industrial installation located at EPS Pomorzany consist of two independent reaction chambers, humidification tower with water and steam supply systems, ammonia water handling system with ammonia injection, electrostatic precipitator, by product handling system, measuring and control systems. Solid particles which are formed as salts are separated in ESP and byproduct pretreated in handling system with amount up to 700 kg/h. All systems including accelerators were tested separately to meet EPS regulations (72 h continues run) and confirm producer warranted parameters and facility design specification. Some necessary modifications including accelerators were introduced by equipment producers depends on obtained results of performed measurements. The quality of shielding properties of accelerator chamber walls was tested according to national regulation and the license on accelerator exploitation and personnel qualification were issued by polish authorities. The spatial dose distribution and dose rate measurement were carried on with electron energy 700 and 800 keV. Preliminary results

  9. Numerical simulation of gas hydrate exploitation from subsea reservoirs in the Black Sea

    Science.gov (United States)

    Janicki, Georg; Schlüter, Stefan; Hennig, Torsten; Deerberg, Görge

    2017-04-01

    Natural gas (methane) is the most environmental friendly source of fossil energy. When coal is replace by natural gas in power production the emission of carbon dioxide is reduced by 50 %. The vast amount of methane assumed in gas hydrate deposits can help to overcome a shortage of fossil energy resources in the future. To increase their potential for energy applications new technological approaches are being discussed and developed worldwide. Besides technical challenges that have to be overcome climate and safety issues have to be considered before a commercial exploitation of such unconventional reservoirs. The potential of producing natural gas from subsea gas hydrate deposits by various means (e. g. depressurization and/or carbon dioxide injection) is numerically studied in the frame of the German research project »SUGAR - Submarine Gas Hydrate Reservoirs«. In order to simulate the exploitation of hydrate-bearing sediments in the subsea, an in-house simulation model HyReS which is implemented in the general-purpose software COMSOL Multiphysics is used. This tool turned out to be especially suited for the flexible implementation of non-standard correlations concerning heat transfer, fluid flow, hydrate kinetics, and other relevant model data. Partially based on the simulation results, the development of a technical concept and its evaluation are the subject of ongoing investigations, whereby geological and ecological criteria are to be considered. The results illustrate the processes and effects occurring during the gas production from a subsea gas hydrate deposit by depressurization. The simulation results from a case study for a deposit located in the Black Sea reveal that the production of natural gas by simple depressurization is possible but with quite low rates. It can be shown that the hydrate decomposition and thus the gas production strongly depend on the geophysical properties of the reservoir, the mass and heat transport within the reservoir, and

  10. Thermal exploitation of shallow aquifers. Guide for the preparation of preliminary studies of technical feasibility

    International Nuclear Information System (INIS)

    Ausseur, J.Y.; Sauty, J.P.

    1982-08-01

    This report presents the main devices aimed at exploiting surface aquifers. After an introduction to the different systems of thermal exploitation of aquifers (generalities, very low energy geothermal, sensitive heat storage, interest of thermal exploitation of aquifers, indication of possible systems), this report presents the different possible systems and analyses their characteristics and performance. These systems are: direct exploitation of groundwater bodies at their natural temperature by heat sink and with release in surface networks or by geothermal dipole, or exploitation with artificial thermal refill. Thus the report addresses the single sink device with or without storage, heat pumps on dipole in surface groundwater bodies or very low temperature geothermal, the scanning dipole system, and the dipole system with hot sink and cold sink. It discusses the choice and sizing of the exploitation system. An appendix reports a feasibility preliminary study of nine cases of thermal exploitation of surface aquifers by double drills

  11. Quality and innovation between tipical products exploiting and new food design

    Directory of Open Access Journals (Sweden)

    Marco Dalla Rosa

    2011-02-01

    Full Text Available Scientific approach is often ignored in the production of typical and marginal foods which come from empiric trial and procedures consolidated along the time. At the beginning of the twentieth century food science starter influencing food production and processing by a multidisciplinary approach aiming at the safety guarantee of industrial products intended for large scale consumption. In the last decades researchers started taking into account traditional and marginal food products by an accurate scientific approach aiming to their exploitation and to define their quality and safety parameters. Scientific approach to marginal products can be schematically divided in two levels: analytical and technological/engineering. In general, the analytical approach focuses on chemical aspects, physical properties, aromatic and sensorial characteristics and on the microbiological and genetic characterizations. 

    The technological/engineering approach must be considered a san integration of the knowledge both about the finished product and the production process and consists of: the definition of markers connecting quality to first matter; the study of seasonal and annual variability; the search for correlations among process/environment/quality on molecular basis; the pointing out of markers to set traceability systems up; the definition of key-factors to characterize the land according to its food production as an impulse for the development of other sectors such as tourism. Finally, innovation in the sector of traditional and marginal production should concern the definition of chemicalphysical and sensorial characteristics, the rationalization of traditional processes and the introduction of new compatible technology phases, the introduction of new packaging forms to elongate the shelf life and to enlarge distribution areas guaranteeing, at the same time, the maintenance of product peculiarity and typicality. New food design is one of the most

  12. Quality and innovation between tipical products exploiting and new food design

    Directory of Open Access Journals (Sweden)

    Dino Mastrocola

    2008-04-01

    Full Text Available Scientific approach is often ignored in the production of typical and marginal foods which come from empiric trial and procedures consolidated along the time. At the beginning of the twentieth century food science starter influencing food production and processing by a multidisciplinary approach aiming at the safety guarantee of industrial products intended for large scale consumption. In the last decades researchers started taking into account traditional and marginal food products by an accurate scientific approach aiming to their exploitation and to define their quality and safety parameters. Scientific approach to marginal products can be schematically divided in two levels: analytical and technological/engineering. In general, the analytical approach focuses on chemical aspects, physical properties, aromatic and sensorial characteristics and on the microbiological and genetic characterizations. The technological/engineering approach must be considered a san integration of the knowledge both about the finished product and the production process and consists of: the definition of markers connecting quality to first matter; the study of seasonal and annual variability; the search for correlations among process/environment/quality on molecular basis; the pointing out of markers to set traceability systems up; the definition of key-factors to characterize the land according to its food production as an impulse for the development of other sectors such as tourism. Finally, innovation in the sector of traditional and marginal production should concern the definition of chemicalphysical and sensorial characteristics, the rationalization of traditional processes and the introduction of new compatible technology phases, the introduction of new packaging forms to elongate the shelf life and to enlarge distribution areas guaranteeing, at the same time, the maintenance of product peculiarity and typicality. New food design is one of the most

  13. Economic value of ecological information in ecosystem-based natural resource management depends on exploitation history.

    Science.gov (United States)

    Essington, Timothy E; Sanchirico, James N; Baskett, Marissa L

    2018-02-13

    Ecosystem approaches to natural resource management are seen as a way to provide better outcomes for ecosystems and for people, yet the nature and strength of interactions among ecosystem components is usually unknown. Here we characterize the economic benefits of ecological knowledge through a simple model of fisheries that target a predator (piscivore) and its prey. We solve for the management (harvest) trajectory that maximizes net present value (NPV) for different ecological interactions and initial conditions that represent different levels of exploitation history. Optimal management trajectories generally approached similar harvest levels, but the pathways toward those levels varied considerably by ecological scenario. Application of the wrong harvest trajectory, which would happen if one type of ecological interaction were assumed but in fact another were occurring, generally led to only modest reductions in NPV. However, the risks were not equal across fleets: risks of incurring large losses of NPV and missing management targets were much higher in the fishery targeting piscivores, especially when piscivores were heavily depleted. Our findings suggest that the ecosystem approach might provide the greatest benefits when used to identify system states where management performs poorly with imperfect knowledge of system linkages so that management strategies can be adopted to avoid those states. Copyright © 2018 the Author(s). Published by PNAS.

  14. Coaching the exploration and exploitation in active learning for interactive video retrieval.

    Science.gov (United States)

    Wei, Xiao-Yong; Yang, Zhen-Qun

    2013-03-01

    Conventional active learning approaches for interactive video/image retrieval usually assume the query distribution is unknown, as it is difficult to estimate with only a limited number of labeled instances available. Thus, it is easy to put the system in a dilemma whether to explore the feature space in uncertain areas for a better understanding of the query distribution or to harvest in certain areas for more relevant instances. In this paper, we propose a novel approach called coached active learning that makes the query distribution predictable through training and, therefore, avoids the risk of searching on a completely unknown space. The estimated distribution, which provides a more global view of the feature space, can be used to schedule not only the timing but also the step sizes of the exploration and the exploitation in a principled way. The results of the experiments on a large-scale data set from TRECVID 2005-2009 validate the efficiency and effectiveness of our approach, which demonstrates an encouraging performance when facing domain-shift, outperforms eight conventional active learning methods, and shows superiority to six state-of-the-art interactive video retrieval systems.

  15. The ESA Scientific Exploitation of Operational Missions element

    Science.gov (United States)

    Desnos, Yves-Louis; Regner, Peter; Zehner, Claus; Engdahl, Marcus; Benveniste, Jerome; Delwart, Steven; Gascon, Ferran; Mathieu, Pierre-Philippe; Bojkov, Bojan; Koetz, Benjamin; Arino, Olivier; Donlon, Craig; Davidson, Malcolm; Goryl, Philippe; Foumelis, Michael

    2014-05-01

    The objectives of the ESA Scientific Exploitation of Operational Missions (SEOM) programme element are • to federate, support and expand the research community • to strengthen the leadership of European EO research community • to enable the science community to address new scientific research As a preparation for the SEOM element a series of international science users consultation has been organized by ESA in 2012 and 2013 In particular the ESA Living Planet Symposium was successfully organized in Edinburgh September 2013 and involving 1700 participants from 60 countries. The science users recommendations have been gathered and form the basis for the 2014 SEOM work plan approved by ESA member states. The SEOM element is organized along the following action lines: 1. Developing open-source, multi-mission, scientific toolboxes : the new toolboxes for Sentinel 1/2/3 and 5P will be introduced 2. Research and development studies: the first SEOM studies are being launched such as the INSARAP studies for Sentinel 1 interferometry in orbit demonstration , the IAS study to generate an improved spectroscopic database of the trace gas species CH4, H2O, and CO in the 2.3 μm region and SO2 in the UV region for Sentinel 5 P. In addition larger Sentinels for science call will be tendered in 2014 covering grouped studies for Sentinel 1 Land , Sentinel 1 Ocean , Sentinel 2 Land, Sentinel 3 SAR Altimetry ,Sentinel 3 Ocean color, Sentinel 3 Land and Sentinels Synergy . 3. Science users consultation : the Sentinel 2 for Science workshop is planned from 20 to 22 may 2014 at ESRIN to prepare for scientific exploitation of the Sentinel-2 mission (http://seom.esa.int/S2forScience2014 ) . In addition the FRINGE workshop focusing on scientific explotation of Sentinel1 using SAR interferometry is planned to be held at ESA ESRIN in Q2 2015 4. Training the next generation of European EO scientists on the scientific exploitation of Sentinels data: the Advanced Training course Land

  16. Rare earth elements exploitation, geopolitical implications and raw materials trading

    Science.gov (United States)

    Chemin, Marie-Charlotte

    2015-04-01

    Rare earth elements (REE) correspond to seventeen elements of the periodic table. They are used in high technology, cracking, electric cars' magnet, metal alloy for batteries, and also in phone construction or ceramics for electronic card. REEs are an important resource for high technology. This project targets 16 years old students in the subject "personalized aid" and will last six weeks. The purpose of this project is to develop autonomy and research in groups for a transdisciplinary work. This project gathers knowledge in geology, geography and economics. During the first session students analyze the geology applications of the REE. They begin the analysis with learning the composition in different rocks such as basalt and diorite to make the link with crystallization. Then they compare it with adakite to understand the formation of these rocks. In the second session, they study REE exploitation. We can find them as oxides in many deposits. The principal concentrations of rare earth elements are associated with uncommon varieties of igneous rocks, such as carbonatites. They can use Qgis, to localize this high concentration. In the third session, they study the environmental costs of REE exploitation. Indeed, the exploitation produces thorium and carcinogenic toxins: sulphates, ammonia and hydrochloric acid. Processing one ton of rare earths produces 2,000 tons of toxic waste. This session focuses, first, on Baotou's region, and then on an example they are free to choose. In the fourth session, they study the geopolitical issues of REE with a focus on China. In fact this country is the largest producer of REE, and is providing 95% of the overall production. REE in China are at the center of a geopolitical strategy. In fact, China implements a sort of protectionism. Indeed, the export tax on REE is very high so, as a foreign company, it is financially attractive to establish a manufacturing subsidiary in China in order to use REE. As a matter of fact

  17. Toward a dynamic perspective on explorative and exploitative innovation activities: a longitudinal study of innovation in the wind blade industry

    NARCIS (Netherlands)

    de Visser, Matthias

    2010-01-01

    Innovation requires a combination of explorative and exploitative innovation activities. Previous studies have provided valuable insights in the antecedents of investing in explorative and exploitative activities, the structural governance of exploration and exploitation and the performance

  18. Toward a dynamic perspective on explorative and exploitative innovation activities: A longitudinal study of innovation in the wind blade industry

    NARCIS (Netherlands)

    de Visser, Matthias; Faems, D.L.M.

    2010-01-01

    Innovation requires a combination of explorative and exploitative innovation activities. Previous studies have provided valuable insights in the antecedents of investing in explorative and exploitative activities, the structural governance of exploration and exploitation and the performance

  19. Analysis of energetic exploitation of straw in Vojvodina

    International Nuclear Information System (INIS)

    Dodic, Sinisa N.; Dodic, Jelena M.; Popov, Stevan D.; Zekic, Vladislav N.; Rodic, Vesna O.; Tica, Nedeljko Lj.

    2011-01-01

    The Autonomous Province of Vojvodina is an autonomous province in the Republic of Serbia. It is located in the northern part of the country, in the Pannonia plain. Vojvodina is an energy-deficient province. The average yearly quantity of the cellulose wastes in Vojvodina amounts to about 9 millions tons barely in the agriculture, and the same potential on the level of Serbia estimates to almost 13 million tons. This study gives the analysis of energetic exploitation of straws from stubble cereals processed in different forms. Costs for the equipment that uses biomass in the EU are approximately two times higher with respect to those for the equipment for combustion of natural gas or of fuel oil. Costs of investments for combustion of biomass in Vojvodina if compared with the cited data are approximately for 40-50% lower. The difference of the investment costs for the construction of such units is because units for straw combustion designed and constructed in our country, have neither the complicated devices for manipulation of fuels, nor the devices for the waste gasses processing. The definite conclusions about the economic justification of the energetic exploitation of stubble straws can be obtained only by comparison of costs of the so obtained energy, with the costs of energy obtained through the combustion of classical fuels. Previous comparisons were the most often based on the comparisons of value of prices of the equivalent straw quantity with the process of fuel oil of other classical fuels. Such the comparisons leaded to the very positive evaluations of the economical effects of straws, without taking into account the realizability of the named method. Namely, comparisons of straw and fuel oil hardly could lead to the conclusion that these two fuels are mutually substitutable. According to its physical properties, straw is most similar to firewood, but the preciousness and lacking of this the very resource excludes it from the comparative analysis, so

  20. Balancing exploration and exploitation in learning to rank online

    NARCIS (Netherlands)

    Hofmann, K.; Whiteson, S.; de Rijke, M.

    2011-01-01

    As retrieval systems become more complex, learning to rank approaches are being developed to automatically tune their parameters. Using online learning to rank approaches, retrieval systems can learn directly from implicit feedback, while they are running. In such an online setting, algorithms need

  1. Exploitation réseau électrique Bilan 2000

    CERN Document Server

    Cumer, G

    2001-01-01

    Ce document présente le bilan annuel d'exploitation du réseau électrique pour l'année 2000. Après une présentation succincte des nouvelles sous-stations et équipements mis en service cette année, ce bilan est proposé au travers des statistiques des pannes et des demandes d'interventions des salles de contrôles PCR, MCR et PCR. Cette année 2000 aura été marquée par quelques pannes majeures ayant affecté le LEP et le SPS. L'analyse de ces incidents en fait apparaître les causes d'origines techniques, humaines ou extérieures au CERN, détaille les catégories d'équipements concernés. Ces données permettent de souligner l'impact et les conséquences lourdes de la moindre coupure électrique sur le fonctionnement des accélérateurs. Elles permettent d'autre part de mettre en lumière les points faibles actuels que sont les contrôleurs Micène, les câbles et les protections 18 kV SPS. Dans ce contexte et au vu des incidents de ces dernières années, un historique des pannes survenues sur les...

  2. Cosimulation of electromagnetics-circuit systems exploiting DGTD and MNA

    KAUST Repository

    Li, Ping

    2014-06-01

    A hybrid electromagnetics (EM)-circuit simulator exploiting the discontinuous Galerkin time domain (DGTD) method and the modified nodal analysis (MNA) algorithm is developed for analyzing hybrid distributive and nonlinear multiport lumped circuit systems. The computational domain is split into two subsystems. One is the EM subsystem that is analyzed by DGTD, while the other is the circuit subsystem that is solved by the MNA method. The coupling between the EM and circuit subsystems is enforced at the lumped port where related field and circuit unknowns are coupled via the use of numerical flux, port voltages, and current sources. Since the spatial operations of DGTD are localized, thanks to the use of numerical flux, coupling matrices between EM and circuit subsystems are small and are directly inverted. To handle nonlinear devices within the circuit subsystem, the standard Newton-Raphson method is applied to the nonlinear coupling matrix system. In addition, a local time-stepping scheme is applied to improve the efficiency of the hybrid solver. Numerical examples including single and multiport linear/nonlinear circuit networks are presented to validate the proposed solver. © 2014 IEEE.

  3. Improving industrial yeast strains: exploiting natural and artificial diversity.

    Science.gov (United States)

    Steensels, Jan; Snoek, Tim; Meersman, Esther; Picca Nicolino, Martina; Voordeckers, Karin; Verstrepen, Kevin J

    2014-09-01

    Yeasts have been used for thousands of years to make fermented foods and beverages, such as beer, wine, sake, and bread. However, the choice for a particular yeast strain or species for a specific industrial application is often based on historical, rather than scientific grounds. Moreover, new biotechnological yeast applications, such as the production of second-generation biofuels, confront yeast with environments and challenges that differ from those encountered in traditional food fermentations. Together, this implies that there are interesting opportunities to isolate or generate yeast variants that perform better than the currently used strains. Here, we discuss the different strategies of strain selection and improvement available for both conventional and nonconventional yeasts. Exploiting the existing natural diversity and using techniques such as mutagenesis, protoplast fusion, breeding, genome shuffling and directed evolution to generate artificial diversity, or the use of genetic modification strategies to alter traits in a more targeted way, have led to the selection of superior industrial yeasts. Furthermore, recent technological advances allowed the development of high-throughput techniques, such as 'global transcription machinery engineering' (gTME), to induce genetic variation, providing a new source of yeast genetic diversity. © 2014 The Authors. FEMS Microbiology Reviews published by John Wiley & Sons Ltd on behalf of Federation of European Microbiological Societies.

  4. Exploiting nonlinear dynamics in a coupled-core fluxgate magnetometer

    International Nuclear Information System (INIS)

    Bulsara, Adi R; In, Visarath; Kho, Andy; Longhini, Patrick; Neff, Joe; Anderson, Gregory; Obra, Christopher; Palacios, Antonio; Baglio, Salvatore; Ando, Bruno

    2008-01-01

    Unforced bistable dynamical systems having dynamics of the general form τ F x-dot (t)=-∇ x U(x) cannot oscillate (i.e. switch between their stable attractors). However, a number of such systems subject to carefully crafted coupling schemes have been shown to exhibit oscillatory behavior under carefully chosen operating conditions. This behavior, in turn, affords a new mechanism for the detection and quantification of target signals having magnitude far smaller than the energy barrier height in the potential energy function U(x) for a single (uncoupled) element. The coupling-induced oscillations are a feature that appears to be universal in systems described by bi- or multi-stable potential energy functions U(x), and are being exploited in a new class of dynamical sensors being developed by us. In this work we describe one of these devices, a coupled-core fluxgate magnetometer (CCFM), whose operation is underpinned by this dynamic behavior. We provide an overview of the underlying dynamics and, also, quantify the performance of our test device; in particular, we provide a quantitative performance comparison to a conventional (single-core) fluxgate magnetometer via a 'resolution' parameter that embodies the device sensitivity (the slope of its input–output transfer characteristic) as well as the noise floor

  5. Exploiting parallel R in the cloud with SPRINT.

    Science.gov (United States)

    Piotrowski, M; McGilvary, G A; Sloan, T M; Mewissen, M; Lloyd, A D; Forster, T; Mitchell, L; Ghazal, P; Hill, J

    2013-01-01

    Advances in DNA Microarray devices and next-generation massively parallel DNA sequencing platforms have led to an exponential growth in data availability but the arising opportunities require adequate computing resources. High Performance Computing (HPC) in the Cloud offers an affordable way of meeting this need. Bioconductor, a popular tool for high-throughput genomic data analysis, is distributed as add-on modules for the R statistical programming language but R has no native capabilities for exploiting multi-processor architectures. SPRINT is an R package that enables easy access to HPC for genomics researchers. This paper investigates: setting up and running SPRINT-enabled genomic analyses on Amazon's Elastic Compute Cloud (EC2), the advantages of submitting applications to EC2 from different parts of the world and, if resource underutilization can improve application performance. The SPRINT parallel implementations of correlation, permutation testing, partitioning around medoids and the multi-purpose papply have been benchmarked on data sets of various size on Amazon EC2. Jobs have been submitted from both the UK and Thailand to investigate monetary differences. It is possible to obtain good, scalable performance but the level of improvement is dependent upon the nature of the algorithm. Resource underutilization can further improve the time to result. End-user's location impacts on costs due to factors such as local taxation. Although not designed to satisfy HPC requirements, Amazon EC2 and cloud computing in general provides an interesting alternative and provides new possibilities for smaller organisations with limited funds.

  6. IN A PARALLEL UNIVERSE: HOW ART EXPLOITS TECHNOLOGY

    CERN Multimedia

    CERN. Geneva

    2012-01-01

    Technical innovation in the arts creates new opportunities for perceptual shifts that lead to lasting achievements. One of the most important events took place in the 15th century not far from CERN on the other side of the Alps in Venice. Titian, in one life time, exploited these new material developments to expand the range of expression like no other artist of his generation. Titian was able to harness these new innovations to emerge as the supreme competitor and hustler, a notion that seems very much a part of the modern promotion of art as exemplified by Warhol , Jeff Koons and Damian Hirst. The language of science and technology has created social networks, changed the mediums and the subject of fine art. Fast forward to CERN 2012, the most expensive experiment in the history of science. The knowledge of dark matter will either help confirm, or not, the Standard Model. This information will be part of what Michel Foucault calls "epistemological breaks", shifts in consciousness that change our p...

  7. Energy harvesting from human motion: exploiting swing and shock excitations

    International Nuclear Information System (INIS)

    Ylli, K; Hoffmann, D; Willmann, A; Becker, P; Folkmer, B; Manoli, Y

    2015-01-01

    Modern compact and low power sensors and systems are leading towards increasingly integrated wearable systems. One key bottleneck of this technology is the power supply. The use of energy harvesting techniques offers a way of supplying sensor systems without the need for batteries and maintenance. In this work we present the development and characterization of two inductive energy harvesters which exploit different characteristics of the human gait. A multi-coil topology harvester is presented which uses the swing motion of the foot. The second device is a shock-type harvester which is excited into resonance upon heel strike. Both devices were modeled and designed with the key constraint of device height in mind, in order to facilitate the integration into the shoe sole. The devices were characterized under different motion speeds and with two test subjects on a treadmill. An average power output of up to 0.84 mW is achieved with the swing harvester. With a total device volume including the housing of 21 cm 3 a power density of 40 μW cm −3 results. The shock harvester generates an average power output of up to 4.13 mW. The power density amounts to 86 μW cm −3 for the total device volume of 48 cm 3 . Difficulties and potential improvements are discussed briefly. (paper)

  8. Exploration and exploitation during information search and experimential choice

    Directory of Open Access Journals (Sweden)

    Cleotilde Gonzalez

    2016-07-01

    Full Text Available Before making a choice we often search and explore the options available. For example, we try clothes on before selecting the one to buy and we search for career options before deciding a career to pursue. Although the exploration process, where one is free to sample available options is pervasive, we know little about how and why humans explore an environment before making choices. This research contributes to the clarification of some of the phenomena that describes how people perform search during free sampling: we find a gradual decrease of exploration and, in parallel, a tendency to explore and choose options of high value. These patterns provide support to the existence of learning and an exploration-exploitation tradeoff that may occur during free sampling. Thus, explorations in free sampling is not led by the purely epistemic value of the available options. Rather, exploration during free sampling is a learning process that is influenced by memory effects and by the value of the options available, where participants pursue options of high value more frequently. These parallel processes predict the consequential choice.

  9. Strategic aspects of exploiting geothermal energy for industrial purposes

    International Nuclear Information System (INIS)

    Ludviksson, V.

    1992-01-01

    Geothermal energy is widely used in Iceland for space heating swimming pools and snow melting systems as well as for greenhouses and soil heating and aquaculture. Its contribution to the standard of living in Iceland is very substantial. The industrial applications are, however, fewer today than anticipated twenty years ago. This paper considers some of the socio-economic reasons for that. Although geothermal energy is generally a cost competitive source of energy, it is site limited and does not by itself provide sufficient economic incentive to attract manufacturing or process industries. This generally requires another, locally available production factor offering further competitive advantage to justify greenfield investments. World economic slow-downs, and structural problems in many process industries after the energy crisis of the seventies have reduced interest for investments in energy intensify industries world wide. While public sector initiative motivated by technological possibilities was instrumental for developing geothermal resources in the past, time has now come for private sector initiative, led by market interest, to identify and exploit opportunities for using geothermal energy for industrial purposes. National and local governments must, however, provide the appropriate incentives to stimulate such developments

  10. MAPI: towards the integrated exploitation of bioinformatics Web Services.

    Science.gov (United States)

    Ramirez, Sergio; Karlsson, Johan; Trelles, Oswaldo

    2011-10-27

    Bioinformatics is commonly featured as a well assorted list of available web resources. Although diversity of services is positive in general, the proliferation of tools, their dispersion and heterogeneity complicate the integrated exploitation of such data processing capacity. To facilitate the construction of software clients and make integrated use of this variety of tools, we present a modular programmatic application interface (MAPI) that provides the necessary functionality for uniform representation of Web Services metadata descriptors including their management and invocation protocols of the services which they represent. This document describes the main functionality of the framework and how it can be used to facilitate the deployment of new software under a unified structure of bioinformatics Web Services. A notable feature of MAPI is the modular organization of the functionality into different modules associated with specific tasks. This means that only the modules needed for the client have to be installed, and that the module functionality can be extended without the need for re-writing the software client. The potential utility and versatility of the software library has been demonstrated by the implementation of several currently available clients that cover different aspects of integrated data processing, ranging from service discovery to service invocation with advanced features such as workflows composition and asynchronous services calls to multiple types of Web Services including those registered in repositories (e.g. GRID-based, SOAP, BioMOBY, R-bioconductor, and others).

  11. Bacterial multidrug efflux pumps: mechanisms, physiology and pharmacological exploitations.

    Science.gov (United States)

    Sun, Jingjing; Deng, Ziqing; Yan, Aixin

    2014-10-17

    Multidrug resistance (MDR) refers to the capability of bacterial pathogens to withstand lethal doses of structurally diverse drugs which are capable of eradicating non-resistant strains. MDR has been identified as a major threat to the public health of human being by the World Health Organization (WHO). Among the four general mechanisms that cause antibiotic resistance including target alteration, drug inactivation, decreased permeability and increased efflux, drug extrusion by the multidrug efflux pumps serves as an important mechanism of MDR. Efflux pumps not only can expel a broad range of antibiotics owing to their poly-substrate specificity, but also drive the acquisition of additional resistance mechanisms by lowering intracellular antibiotic concentration and promoting mutation accumulation. Over-expression of multidrug efflux pumps have been increasingly found to be associated with clinically relevant drug resistance. On the other hand, accumulating evidence has suggested that efflux pumps also have physiological functions in bacteria and their expression is subject tight regulation in response to various of environmental and physiological signals. A comprehensive understanding of the mechanisms of drug extrusion, and regulation and physiological functions of efflux pumps is essential for the development of anti-resistance interventions. In this review, we summarize the development of these research areas in the recent decades and present the pharmacological exploitation of efflux pump inhibitors as a promising anti-drug resistance intervention. Copyright © 2014 The Authors. Published by Elsevier Inc. All rights reserved.

  12. Efficient Resource Scheduling by Exploiting Relay Cache for Cellular Networks

    Directory of Open Access Journals (Sweden)

    Chun He

    2015-01-01

    Full Text Available In relay-enhanced cellular systems, throughput of User Equipment (UE is constrained by the bottleneck of the two-hop link, backhaul link (or the first hop link, and access link (the second hop link. To maximize the throughput, resource allocation should be coordinated between these two hops. A common resource scheduling algorithm, Adaptive Distributed Proportional Fair, only ensures that the throughput of the first hop is greater than or equal to that of the second hop. But it cannot guarantee a good balance of the throughput and fairness between the two hops. In this paper, we propose a Two-Hop Balanced Distributed Scheduling (TBS algorithm by exploiting relay cache for non-real-time data traffic. The evolved Node Basestation (eNB adaptively adjusts the number of Resource Blocks (RBs allocated to the backhaul link and direct links based on the cache information of relays. Each relay allocates RBs for relay UEs based on the size of the relay UE’s Transport Block. We also design a relay UE’s ACK feedback mechanism to update the data at relay cache. Simulation results show that the proposed TBS can effectively improve resource utilization and achieve a good trade-off between system throughput and fairness by balancing the throughput of backhaul and access link.

  13. Exploitation of vegetables and fruits through lactic acid fermentation.

    Science.gov (United States)

    Di Cagno, Raffaella; Coda, Rossana; De Angelis, Maria; Gobbetti, Marco

    2013-02-01

    Lactic acid fermentation represents the easiest and the most suitable way for increasing the daily consumption of fresh-like vegetables and fruits. Literature data are accumulating, and this review aims at describing the main features of the lactic acid bacteria to be used for fermentation. Lactic acid bacteria are a small part of the autochthonous microbiota of vegetables and fruits. The diversity of the microbiota markedly depends on the intrinsic and extrinsic parameters of the plant matrix. Notwithstanding the reliable value of the spontaneous fermentation to stabilize and preserve raw vegetables and fruits, a number of factors are in favour of using selected starters. Two main options may be pursued for the controlled lactic acid fermentation of vegetables and fruits: the use of commercial/allochthonous and the use of autochthonous starters. Several evidences were described in favour of the use of selected autochthonous starters, which are tailored for the specific plant matrix. Pro-technological, sensory and nutritional criteria for selecting starters were reported as well as several functional properties, which were recently ascribed to autochthonous lactic acid bacteria. The main features of the protocols used for the manufacture of traditional, emerging and innovative fermented vegetables and fruits were reviewed. Tailored lactic acid bacteria starters completely exploit the potential of vegetables and fruits, which enhances the hygiene, sensory, nutritional and shelf life properties. Copyright © 2012 Elsevier Ltd. All rights reserved.

  14. Exploiting Data Sparsity for Large-Scale Matrix Computations

    KAUST Repository

    Akbudak, Kadir; Ltaief, Hatem; Mikhalev, Aleksandr; Charara, Ali; Keyes, David E.

    2018-01-01

    Exploiting data sparsity in dense matrices is an algorithmic bridge between architectures that are increasingly memory-austere on a per-core basis and extreme-scale applications. The Hierarchical matrix Computations on Manycore Architectures (HiCMA) library tackles this challenging problem by achieving significant reductions in time to solution and memory footprint, while preserving a specified accuracy requirement of the application. HiCMA provides a high-performance implementation on distributed-memory systems of one of the most widely used matrix factorization in large-scale scientific applications, i.e., the Cholesky factorization. It employs the tile low-rank data format to compress the dense data-sparse off-diagonal tiles of the matrix. It then decomposes the matrix computations into interdependent tasks and relies on the dynamic runtime system StarPU for asynchronous out-of-order scheduling, while allowing high user-productivity. Performance comparisons and memory footprint on matrix dimensions up to eleven million show a performance gain and memory saving of more than an order of magnitude for both metrics on thousands of cores, against state-of-the-art open-source and vendor optimized numerical libraries. This represents an important milestone in enabling large-scale matrix computations toward solving big data problems in geospatial statistics for climate/weather forecasting applications.

  15. Improving industrial yeast strains: exploiting natural and artificial diversity

    Science.gov (United States)

    Steensels, Jan; Snoek, Tim; Meersman, Esther; Nicolino, Martina Picca; Voordeckers, Karin; Verstrepen, Kevin J

    2014-01-01

    Yeasts have been used for thousands of years to make fermented foods and beverages, such as beer, wine, sake, and bread. However, the choice for a particular yeast strain or species for a specific industrial application is often based on historical, rather than scientific grounds. Moreover, new biotechnological yeast applications, such as the production of second-generation biofuels, confront yeast with environments and challenges that differ from those encountered in traditional food fermentations. Together, this implies that there are interesting opportunities to isolate or generate yeast variants that perform better than the currently used strains. Here, we discuss the different strategies of strain selection and improvement available for both conventional and nonconventional yeasts. Exploiting the existing natural diversity and using techniques such as mutagenesis, protoplast fusion, breeding, genome shuffling and directed evolution to generate artificial diversity, or the use of genetic modification strategies to alter traits in a more targeted way, have led to the selection of superior industrial yeasts. Furthermore, recent technological advances allowed the development of high-throughput techniques, such as ‘global transcription machinery engineering’ (gTME), to induce genetic variation, providing a new source of yeast genetic diversity. PMID:24724938

  16. Exploitation of high resolution beam spectroscopy diagnostics on MAST

    Science.gov (United States)

    Michael, Clive; Debock, Maarten; Conway, Neil; Akers, Rob; Appel, Lynton; Field, Anthony; Walsh, Mike; Wisse, Marco

    2009-11-01

    Recent developments in beam spectroscopy on MAST, including CXRS, MSE and a pilot FIDA system have revealed new information about phenomena such as ITBs, MHD instabilities, transport and fast particle physics. For example, ITBs in the ion temperature and toroidal rotation have been observed with the 64ch CXRS system, while reverse-shear q profiles have been observed with the recently commissioned 35ch MSE system. Thus, the synergy of these diagnostics helps us to understand, among other things, the role of magnetic and rotational shear on ITBs. MSE measurements have also helped to understand MHD phenomena such as locked modes (characterized by changes in toroidal momentum, revealed by CXRS), sawteeth, and internal reconnection events. Finally, the temporal/spatial resolution and SNR of the MSE system have been exploited. Interesting results include the detection of low frequency (˜2kHz) magnetic field fluctuations, characterization of the radial structure of higher frequency (<100kHz) broadband and coherent density (BES) fluctuations, and the identification of short scale length features (˜1.8cm) in the current profile near the edge pedestal.

  17. Solar system for exploitation of the whole collected energy

    Science.gov (United States)

    Ciamberlini, C.; Francini, F.; Longobardi, G.; Piattelli, M.; Sansoni, P.

    2003-09-01

    An innovative architecture for the exploitation of the whole collected solar energy is described. A sun pointing optical concentrator focuses the received energy, containing the part of the required solar spectrum, in a low loss optical fibre transmission line. The optical panel is small in size and able to follow the sun in order to collect the maximum of its energy. The support is flat, 5 mm thick and includes four optical concentrators. The efficiency of the optical system depends on the optical configuration and on the material utilised for the optical components. Single commercial connector to the fixed fibres connects the fibre optics' four free ends. The energy is therefore properly transported to any user's end with an easy installation. The system was experimented for lightening, during the day, dissipated in a dark load in order to produce heat in some equipment and for photovoltaic applications. The total efficiency of the system was between 68% and 72%. Once the solar energy reaches the end of the transmission line, it can be addressed to the required utilisation by means of an optical switch, which redirects the sunlight towards the desired applicator. This procedure allows utilising the 100% of the sun-collected energy. Since the size of the panel was small, it can be placed, on the roof, on the garden, on the window-sill, on the field and on all sides exposed to sunlight.

  18. Exploiting Data Sparsity for Large-Scale Matrix Computations

    KAUST Repository

    Akbudak, Kadir

    2018-02-24

    Exploiting data sparsity in dense matrices is an algorithmic bridge between architectures that are increasingly memory-austere on a per-core basis and extreme-scale applications. The Hierarchical matrix Computations on Manycore Architectures (HiCMA) library tackles this challenging problem by achieving significant reductions in time to solution and memory footprint, while preserving a specified accuracy requirement of the application. HiCMA provides a high-performance implementation on distributed-memory systems of one of the most widely used matrix factorization in large-scale scientific applications, i.e., the Cholesky factorization. It employs the tile low-rank data format to compress the dense data-sparse off-diagonal tiles of the matrix. It then decomposes the matrix computations into interdependent tasks and relies on the dynamic runtime system StarPU for asynchronous out-of-order scheduling, while allowing high user-productivity. Performance comparisons and memory footprint on matrix dimensions up to eleven million show a performance gain and memory saving of more than an order of magnitude for both metrics on thousands of cores, against state-of-the-art open-source and vendor optimized numerical libraries. This represents an important milestone in enabling large-scale matrix computations toward solving big data problems in geospatial statistics for climate/weather forecasting applications.

  19. Evolution of Cretan Aqueducts and Their Potential for Hydroelectric Exploitation

    Directory of Open Access Journals (Sweden)

    Triantafyllia G. Nikolaou

    2017-01-01

    Full Text Available In this article, several archaeological, historical and other aspects of aqueducts in Crete, Greece, since the prehistoric times until today, are reviewed and presented. In Crete, since the Minoan era, various water management techniques that are found in modern water technologies were developed and applied. One of the most significant features of the Minoan civilization was the architecture of water supply systems in the palaces and other settlements. These technologies were continued and improved mainly during the Classical, Hellenistic and Roman periods and at the same time spread to other towns in the mainland and islands. The aqueduct technologies developed during the Classical and Hellenistic periods were further developed by Romans, mainly by enlarging their application scale (e.g., water bridges. Several paradigms of Cretan aqueducts are considered by which the significance of those technologies for water supply in areas with limited water resources is justified. A brief presentation and discussion of climatic conditions, the karst hydrogeology and the water resources management in Crete is also included. The article also describes the present water management profile of the island, in terms of the water plants, water supply–irrigation networks, and water renewable energy exploitation of dams and water pipelines.

  20. Nuclear techniques in the prospecting and exploitation of petroleum

    International Nuclear Information System (INIS)

    Balcazar, M.; Lopez, A.; Castellanos, J.P.

    2003-01-01

    The apatite is a mineral that is found in the perforation nucleus of petroleum exploration whose natural content of Uranium is of around 10 ppm. This uranium is spontaneously fissioned producing fission traces whose number it is proportional to the age of the apatite and whose longitudes remained stable to temperatures smaller than 60 C, they decreased partially in the temperature range of 60 to 120 C and they faded totally if the nucleus of perforation was to temperatures bigger than 120 C. This agreement in the call 'thermal formation window' of the petroleum among 60 and 120 C and the partial erased of the longitudes of fission traces in the apatite, it allows to use this to determine not only the age of the petroleum field, but also their geologic thermal history (paleo temperature), it also allows to model the formation of the petroleum field and to contribute to outline to PEMEX on exploitation and exploration strategies. In this work it is presented: the visualization of the fission traces in the apatite of Cerro de Mercado, Durango, considered as an international standard of dating; the basic principles of this nuclear technique that allow to determine the age of the apatite; the formation of horizontal fission traces inside the apatite, by irradiation with fission fragments; and as the analysis of the thermal instability of the lengths of the fission traces it provides information of the paleo temperature of the petroleum basin. (Author)